Solved

Problem using NTDSUTIL connections command

Posted on 2011-03-14
2
798 Views
Last Modified: 2012-05-11
I am trying to remove old metadata for an old dc that was never properly removed from the domain.  I get into NTDSUTIL and get to the "connections" prompt. The instructions from the MS KB article tell me to "type set creds DomainNameUserNamePassword" I am a little confused at that part. Lets say my domain name is CONFUSED and ADMINISTRATOR is my username and my password is DAZED. How exactly should I type it?
0
Comment
Question by:steveLaMi
2 Comments
 
LVL 76

Accepted Solution

by:
Alan Hardisty earned 500 total points
ID: 35134639
Try the following article instead:

http://www.petri.co.il/delete_failed_dcs_from_ad.htm

Much easier and never failed for me.
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 35134744
I also like this article http://msmvps.com/blogs/ad/archive/2008/12/17/how-to-remove-a-failed-or-offline-dc.aspx

that KB 216498 is not great

...this gets so much easier in 2008 and 2008 R2 when you can delete the dead DC in ADUC (that cleans the metadata)

Thanks

Mike
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In-place Upgrading Dirsync to Azure AD Connect
This article explains the steps required to use the default Photos screensaver to display branding/corporate images
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question