Solved

Problem using NTDSUTIL connections command

Posted on 2011-03-14
2
796 Views
Last Modified: 2012-05-11
I am trying to remove old metadata for an old dc that was never properly removed from the domain.  I get into NTDSUTIL and get to the "connections" prompt. The instructions from the MS KB article tell me to "type set creds DomainNameUserNamePassword" I am a little confused at that part. Lets say my domain name is CONFUSED and ADMINISTRATOR is my username and my password is DAZED. How exactly should I type it?
0
Comment
Question by:steveLaMi
2 Comments
 
LVL 76

Accepted Solution

by:
Alan Hardisty earned 500 total points
ID: 35134639
Try the following article instead:

http://www.petri.co.il/delete_failed_dcs_from_ad.htm

Much easier and never failed for me.
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 35134744
I also like this article http://msmvps.com/blogs/ad/archive/2008/12/17/how-to-remove-a-failed-or-offline-dc.aspx

that KB 216498 is not great

...this gets so much easier in 2008 and 2008 R2 when you can delete the dead DC in ADUC (that cleans the metadata)

Thanks

Mike
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
This article explains the steps required to use the default Photos screensaver to display branding/corporate images
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question