Domain Naming Master Offline after DCPRO Windows 2008 Server

Hello

I just upgrade my domain to a Windows 2008 DC.  Right after that I noticed that the Domain Naming Master went offline before  I could move it from the Window 2003 DC to the Windows 2008 DC.

when I run netdom query fsmo this is what I get.

Domain naming master        *** Warning: role owner is a deleted DC: CN=NTDS Set
tings\0ADEL:948d2692-3640-4118-8ed6-98036aa067db,CN=SERVER1\0ADEL:f5713379-6794-
46a8-bbe6-2ef678110ba2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configu
ration,DC=ccichicago,DC=cci-exchange,DC=com
jacobb_2000Asked:
Who is Participating?
 
Seth SimmonsConnect With a Mentor Sr. Systems AdministratorCommented:
If that DC is no longer accessible then use another DC to seize that FSMO role.

http://support.microsoft.com/kb/255504

Skip down to the Seize FSMO roles section and do that for the domain naming master role.
0
 
Glen KnightCommented:
Before you do that, it's important to check why this is happening, if you seize the role from another server that already has it then the one you seize it from will need to be completely rebuilt.

From both domain controllers run the following command:

NETDOM QUERY FSMO

Post the results, also post the results of DCDIAG and IPCONFIG /ALL from both DC's please.
0
 
AwinishCommented:
There is two way to move FSMO role to another server first is transfer the FSMO role to another server, transfer normally happens when server is going for maintenance like disk crash, driver update, patches updates etc, so you don't want your FSMO role donw you temporary transfer the FSMO roles.

Another way is to seize the FSMO role on another server, its same like king is dead & assigning his heir to hold the throne further by making him the King, seizing works in same way, if the server holding FSMO role is dead & it can't be revert back, you have to seize the FSMO role on another DC, once you seize the dc you can't bring the crash server back to network even it can be as you have seize the role, the new dc will be treated as authoritative server, so never put back the DC from which you seize the FSMO role.  If you want to reuse the server & DC name or server, perform the metadata cleanup for AD, removed all the left out records from AD DNS manually, allow time for replication to another DC's & once you verify changes are replicated & there is no more traces using repadmin tool, you can format the new server, install the fresh OS & configure as DC & transfer the roles if you wish.

So Seizing happens in disaster recover scenario where you can't transfer the FSMO role , in your case it looks same to me you can seize the FSMO role on healthy dc but make sure w/o performing metadata steps don't connect the dc even if it can be connected.

So, if you think you don't wanna bring old dc back seize the FSMO role & also check there is no replication error in your current domain.

http://www.petri.co.il/seizing_fsmo_roles.htm
http://technet.microsoft.com/en-us/library/cc816907%28WS.10%29.aspx

0
Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

 
Glen KnightCommented:
Why is everyone insisting on seizing the roles?? We don't even know what the problem is yet!!!
0
 
Glen KnightCommented:
So you weren't interested in actually finding out what the problem was? What about the server that currently has that role on it? You will now have to rebuild that server if it's live.
0
 
jacobb_2000Author Commented:
I talked with Microsoft and we were unable to get the old DC working.
we will be demoting the old Server.

thx

Jake
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.