?
Solved

Rollback changes with LDIFDE (Urgent)

Posted on 2011-03-03
6
Medium Priority
?
349 Views
Last Modified: 2012-05-11
Hi there

I have executed a series of changes in AD and I want the same to be rolledback. I have used the following command: ldifde -i -f file_to_import.ldf

Inside that file some changes are as follow:

dn: CN=34weasdasd-de44-4fc3-a8e6-fda0fd23423491.3434.0023404,CN=SERVER1,CN=RpcServices,CN=System,DC=domain,DC=com
changetype: add
objectClass: top
objectClass: leaf
objectClass: connectionPoint
objectClass: rpcEntry
objectClass: rpcServerElement
rpcNsBindings: ncacn_ip_tcp:SERVER1
rpcNsInterfaceID: 3cc90b05-asd-4fc3-a8e6-asdasd.0234.0004
rpcNsTransferSyntax: 8a885d04-1ceb-11c9-9fe8-asdasdasd.0002.0000

Please I need help urgently
Thanks!
0
Comment
Question by:M7K
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
6 Comments
 
LVL 11

Expert Comment

by:Tasmant
ID: 35026491
but do you know what were the values before?
else you need to do an authoritative restore of the objects you have modified
this guilde will help: http://technet.microsoft.com/en-us/library/cc779573%28WS.10%29.aspx
0
 

Author Comment

by:M7K
ID: 35026524
Hi Tasman
This changes were made on a new test domain, so we can remove them as they are made for a particular application.
In that case, should I use ADSI edit and look for the entries manually? or is it there any other easy way to achieve the removal of all the changes I made?

Thanks a mil.
0
 
LVL 11

Expert Comment

by:Tasmant
ID: 35026677
you can use LDIFDE as well as you did the first time.
to clear attributes:
------
dn: CN=34weasdasd-de44-4fc3-a8e6-fda0fd23423491.3434.0023404,CN=SERVER1,CN=RpcServices,CN=System,DC=domain,DC=com
changetype: modify
objectClass: top
objectClass: leaf
objectClass: connectionPoint
objectClass: rpcEntry
objectClass: rpcServerElement
delete: rpcNsBindings
delete: rpcNsInterfaceID
delete: rpcNsTransferSyntax
-

-----
0
Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

 

Author Comment

by:M7K
ID: 35027407
Tasman thats great, one last question, should I remove the objectClass like objectClass: connectionPoint ? if so, how the syntax will be?

Thanks  very much
0
 
LVL 11

Expert Comment

by:Tasmant
ID: 35027639
This should work:

------
dn: CN=34weasdasd-de44-4fc3-a8e6-fda0fd23423491.3434.0023404,CN=SERVER1,CN=RpcServices,CN=System,DC=domain,DC=com
changetype: modify
delete: objectClass
objectClass: connectionPoint
delete: rpcNsBindings
delete: rpcNsInterfaceID
delete: rpcNsTransferSyntax
-

-----
0
 
LVL 11

Accepted Solution

by:
Tasmant earned 2000 total points
ID: 35027649
but i cannot answer to your question about removing or not the objectclass attribute.
but if you performed the "add", you should then clean it.
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question