Solved

Problem using NTDSUTIL connections command

Posted on 2011-03-14
2
795 Views
Last Modified: 2012-05-11
I am trying to remove old metadata for an old dc that was never properly removed from the domain.  I get into NTDSUTIL and get to the "connections" prompt. The instructions from the MS KB article tell me to "type set creds DomainNameUserNamePassword" I am a little confused at that part. Lets say my domain name is CONFUSED and ADMINISTRATOR is my username and my password is DAZED. How exactly should I type it?
0
Comment
Question by:steveLaMi
2 Comments
 
LVL 76

Accepted Solution

by:
Alan Hardisty earned 500 total points
ID: 35134639
Try the following article instead:

http://www.petri.co.il/delete_failed_dcs_from_ad.htm

Much easier and never failed for me.
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 35134744
I also like this article http://msmvps.com/blogs/ad/archive/2008/12/17/how-to-remove-a-failed-or-offline-dc.aspx

that KB 216498 is not great

...this gets so much easier in 2008 and 2008 R2 when you can delete the dead DC in ADUC (that cleans the metadata)

Thanks

Mike
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Learn about cloud computing and its benefits for small business owners.
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question