Solved

Using Burflags with DC that hosts DFS Replica

Posted on 2011-09-21
1
1,062 Views
Last Modified: 2012-05-12
Hi Experts,

Our company has a DC that's is used as a file server (i know file server shouldn't be there...). We are facing many AD replication issues.

I've found Burflags D2 may solve theses issues. I've already used it couple times in other companies with some success. But never used it when the DC is also a File Server that hosts a DFS replica.

Question: How Burflags also affects other DFS replicas besides Sysvol?

Regards,

Rodrigo Garcone
0
Comment
Question by:garconer
1 Comment
 
LVL 24

Accepted Solution

by:
Sandeshdubey earned 500 total points
ID: 36578082
Refer this link:http://support.microsoft.com/kb/290762

Kindly take the backup of sysvol folder before you proceed.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question