Solved

Rollback changes with LDIFDE (Urgent)

Posted on 2011-03-03
6
345 Views
Last Modified: 2012-05-11
Hi there

I have executed a series of changes in AD and I want the same to be rolledback. I have used the following command: ldifde -i -f file_to_import.ldf

Inside that file some changes are as follow:

dn: CN=34weasdasd-de44-4fc3-a8e6-fda0fd23423491.3434.0023404,CN=SERVER1,CN=RpcServices,CN=System,DC=domain,DC=com
changetype: add
objectClass: top
objectClass: leaf
objectClass: connectionPoint
objectClass: rpcEntry
objectClass: rpcServerElement
rpcNsBindings: ncacn_ip_tcp:SERVER1
rpcNsInterfaceID: 3cc90b05-asd-4fc3-a8e6-asdasd.0234.0004
rpcNsTransferSyntax: 8a885d04-1ceb-11c9-9fe8-asdasdasd.0002.0000

Please I need help urgently
Thanks!
0
Comment
Question by:M7K
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
6 Comments
 
LVL 11

Expert Comment

by:Tasmant
ID: 35026491
but do you know what were the values before?
else you need to do an authoritative restore of the objects you have modified
this guilde will help: http://technet.microsoft.com/en-us/library/cc779573%28WS.10%29.aspx
0
 

Author Comment

by:M7K
ID: 35026524
Hi Tasman
This changes were made on a new test domain, so we can remove them as they are made for a particular application.
In that case, should I use ADSI edit and look for the entries manually? or is it there any other easy way to achieve the removal of all the changes I made?

Thanks a mil.
0
 
LVL 11

Expert Comment

by:Tasmant
ID: 35026677
you can use LDIFDE as well as you did the first time.
to clear attributes:
------
dn: CN=34weasdasd-de44-4fc3-a8e6-fda0fd23423491.3434.0023404,CN=SERVER1,CN=RpcServices,CN=System,DC=domain,DC=com
changetype: modify
objectClass: top
objectClass: leaf
objectClass: connectionPoint
objectClass: rpcEntry
objectClass: rpcServerElement
delete: rpcNsBindings
delete: rpcNsInterfaceID
delete: rpcNsTransferSyntax
-

-----
0
Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

 

Author Comment

by:M7K
ID: 35027407
Tasman thats great, one last question, should I remove the objectClass like objectClass: connectionPoint ? if so, how the syntax will be?

Thanks  very much
0
 
LVL 11

Expert Comment

by:Tasmant
ID: 35027639
This should work:

------
dn: CN=34weasdasd-de44-4fc3-a8e6-fda0fd23423491.3434.0023404,CN=SERVER1,CN=RpcServices,CN=System,DC=domain,DC=com
changetype: modify
delete: objectClass
objectClass: connectionPoint
delete: rpcNsBindings
delete: rpcNsInterfaceID
delete: rpcNsTransferSyntax
-

-----
0
 
LVL 11

Accepted Solution

by:
Tasmant earned 500 total points
ID: 35027649
but i cannot answer to your question about removing or not the objectclass attribute.
but if you performed the "add", you should then clean it.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question