Solved

Problem using NTDSUTIL connections command

Posted on 2011-03-14
2
801 Views
Last Modified: 2012-05-11
I am trying to remove old metadata for an old dc that was never properly removed from the domain.  I get into NTDSUTIL and get to the "connections" prompt. The instructions from the MS KB article tell me to "type set creds DomainNameUserNamePassword" I am a little confused at that part. Lets say my domain name is CONFUSED and ADMINISTRATOR is my username and my password is DAZED. How exactly should I type it?
0
Comment
Question by:steveLaMi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 76

Accepted Solution

by:
Alan Hardisty earned 500 total points
ID: 35134639
Try the following article instead:

http://www.petri.co.il/delete_failed_dcs_from_ad.htm

Much easier and never failed for me.
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 35134744
I also like this article http://msmvps.com/blogs/ad/archive/2008/12/17/how-to-remove-a-failed-or-offline-dc.aspx

that KB 216498 is not great

...this gets so much easier in 2008 and 2008 R2 when you can delete the dead DC in ADUC (that cleans the metadata)

Thanks

Mike
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article runs through the process of deploying a single EXE application selectively to a group of user.
A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question