Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

What else FSMO roles to tranfer?

Posted on 2011-09-17
6
Medium Priority
?
678 Views
Last Modified: 2012-05-12
Hi EE,

I've migrated W2K Domain controller to W2K8 Domain contoller.

Then, transferred the following FSMO roles:

Domain Operations Master
RID
PDC
Infrastructure Master

As far as I know there are 5 FSMO roles, but I can only transfer 4 FSMO roles. Where is the Schema Master role?

The W2K domain controller which holds all the FSMO roles.   Is this means that my domain controller is also the Schema Master because this role has not been transferred since day one?

Thanks heaps.
0
Comment
Question by:mcse2007
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 

Assisted Solution

by:JulietTango
JulietTango earned 100 total points
ID: 36555397
Sorry, didn't get the correct page for you.

http://support.microsoft.com/kb/255504
0
 
LVL 9

Assisted Solution

by:ghodder
ghodder earned 100 total points
ID: 36555411
See this Technet article.
0
Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

 
LVL 24

Accepted Solution

by:
Sandeshdubey earned 800 total points
ID: 36555448
0
 
LVL 13

Expert Comment

by:5g6tdcv4
ID: 36555460
I think the real issue is whether or not your 2K8 server can functionally replace the 2000 server.  (assuming you have transferred the schema role to the 2K8 server)
dcdiag /v /c /d /e /s:dcname  > c:\DIAG.txt
What does dcdiag report?
(don't shutdown/demote the 2000 server until you absolutley have to)
0
 
LVL 7

Author Closing Comment

by:mcse2007
ID: 36555567
Thanks
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
How to deal with a specific error when using the Enable-RemoteMailbox cmdlet to create a mailbox in the cloud-based service, for an existing user in an on-premises Active Directory.
This tutorial will walk an individual through the steps necessary to install and configure the Windows Server Backup Utility. Directly connect an external storage device such as a USB drive, or CD\DVD burner: If the device is a USB drive, ensure i…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

661 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question