Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

AD Sites and Services Replication Connecteion Deleted

Posted on 2011-02-25
1
Medium Priority
?
956 Views
Last Modified: 2012-05-11
I accidently deleted a connection under the NTDS Settings between 2 of our sites. Meant to do a Replicate Now. When I realized I deleted it. I added it back. Now I have the name I added back, but I also have <DCName>CNF:73213247-9ae8-467f-aba8-6cfba22e24df as a connection. Should I delete the DCName or delete the <DCName>CNF:73213247-9ae8-467f-aba8-6cfba22e24df or leave them both? I have not seen any error in the logs but I have seen some warnings. ID 13562 with Following is the summary of warnings and errors encountered by File Replication Service while polling the Domain Controller <DCName> for FRS replica set configuration information. Any ideas on what would be best?

Barry
0
Comment
Question by:barrykeel
1 Comment
 
LVL 57

Accepted Solution

by:
Mike Kline earned 2000 total points
ID: 34982944
0

Featured Post

Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wouldn't it be nice if objects in Active Directory automatically moved into the correct Organizational Units? This is what AutoAD aims to do and as a plus, it automatically creates Sites, Subnets, and Organizational Units.
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question