Solved

AD Sites and Services Replication Connecteion Deleted

Posted on 2011-02-25
1
941 Views
Last Modified: 2012-05-11
I accidently deleted a connection under the NTDS Settings between 2 of our sites. Meant to do a Replicate Now. When I realized I deleted it. I added it back. Now I have the name I added back, but I also have <DCName>CNF:73213247-9ae8-467f-aba8-6cfba22e24df as a connection. Should I delete the DCName or delete the <DCName>CNF:73213247-9ae8-467f-aba8-6cfba22e24df or leave them both? I have not seen any error in the logs but I have seen some warnings. ID 13562 with Following is the summary of warnings and errors encountered by File Replication Service while polling the Domain Controller <DCName> for FRS replica set configuration information. Any ideas on what would be best?

Barry
0
Comment
Question by:barrykeel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 57

Accepted Solution

by:
Mike Kline earned 500 total points
ID: 34982944
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In-place Upgrading Dirsync to Azure AD Connect
Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question