Solved

Netbois name keeps changing to FQDN on Work stations

Posted on 2011-09-23
3
271 Views
Last Modified: 2012-05-12
Hello EE. We have a windows 2003 R2 server running AD, DNS, DHCP, and WINS. Intermittently I have users complaining about logging in to their domain pcs. They get "No Trust Relationship.......". When I check their settings the domain name has changed from the netbios name to the FQDN. When I change it back to the netbios name everything works fine. I am experiencing this throughout the domain. Even when I change it back it goes back to the FQDN setting some time later. What could be causing this?
0
Comment
Question by:InSearchOf
  • 2
3 Comments
 
LVL 63

Accepted Solution

by:
SysExpert earned 500 total points
ID: 36588623
Is there only one DC ?


DCDIAG /V /D /E /C > c:\DCDIAG-srvname.log
NETDIAG /V > c:\NETDIAG-srvname.log

look for FAIL or errors in the above logs

I hope this helps !



0
 

Author Comment

by:InSearchOf
ID: 36593713
No, as a matter of fact we have 4 DCs. 2 at the main location and 2 at 2 different location. It is one domain spread across different subnets. The remote locations are connected via site to site VPN tunnels.
0
 

Author Closing Comment

by:InSearchOf
ID: 37046964
Did not resolve my issue. No comments added since my response.
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

While rebooting windows server 2003 server , it's showing "active directory rebuilding indices please wait" at startup. It took a little while for this process to complete and once we logged on not all the services were started so another reboot is …
A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question