[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now


ntfrsutl forcerepl (not in our version of ntfrsutl)

Posted on 2010-11-16
Medium Priority
Last Modified: 2012-06-27
Hi guys hope you are well and can help.

We wish to force replication of the sysvol on 2 domain controllers, and went to use ntfrsutl with the forcerepl, but as you can see below, in our version, it is not present.

Can anyone suggest how to get the version of ntfrsutl that does have the required functionality to force replication of the sysvol between domain controllers?

Our servers are running Windows Server 2003 with SP2.

Any help greatly appreciated.

C:\Program Files\Support Tools>ntfrsutl /?
Ntfrsutl dumps the internal tables, thread and memory information
for the ntfrs service.It runs against local as well as remote server.

Note : To access the internal information, the logged in user should
       have the required access on the following registry keys on the
       target server.

       HKLM\System\CCS\Services\Ntfrs\Parameters\Access Checks\
            Get Internal Information : Full control
            Get Ds Polling Interval  : Read
            Set Ds Polling Interval  : Full Control

ntfrsutl [idtable | configtable | inlog | outlog] [computer]
                  = enumerate the service's idtable/configtable/inlog/outlog
        computer  = talk to the NtFrs service on this machine.

ntfrsutl [memory|threads|stage] [computer]
                  = list the service's memory usage
        computer  = talk to the NtFrs service on this machine.

ntfrsutl ds [computer]
                  = list the service's view of the DS
        computer  = talk to the NtFrs service on this machine.

ntfrsutl sets [computer]
                  = list the active replica sets
        computer  = talk to the NtFrs service on this machine.

ntfrsutl version [computer]
                  = list the api and service versions
        computer  = talk to the NtFrs service on this machine.

ntfrsutl poll [/quickly[=[N]]] [/slowly[=[N]]] [/now] [computer]
                  = list the current polling intervals.
        now       = Poll now.
        quickly   = Poll quickly until stable configuration retrieved.
        quickly=  = Poll quickly every default minutes.
        quickly=N = Poll quickly every N minutes.
        slowly    = Poll slowly until stable configuration retrieved.
        slowly=   = Poll slowly every default minutes.
        slowly=N  = Poll slowly every N minutes.
        computer  = talk to the NtFrs service on this machine.

C:\Program Files\Support Tools>ntfrsutl version
NtFrsApi Version Information
   NtFrsApi Major      : 0
   NtFrsApi Minor      : 0
   NtFrsApi Compiled on: Feb 16 2007 20:01:19
NtFrs Version Information
   NtFrs Major        : 0
   NtFrs Minor        : 0
   NtFrs Compiled on  : Feb 16 2007 20:01:30
   Latest changes:
   Install Override fix
OS Version 5.2 (3790) -
SP (2.0) SM: 0x0110  PT: 0x02
Processor:  INTEL Level: 0x0006  Revision: 0x1706  Processor num/mask: 1/00000001

C:\Program Files\Support Tools>
Question by:Simon336697
LVL 57

Accepted Solution

Mike Kline earned 2000 total points
ID: 34151636

Author Comment

ID: 34199977
Thanks Mike

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A hard and fast method for reducing Active Directory Administrators members.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question