Solved

How do I remove a DC from AD when it dies

Posted on 2012-03-15
5
344 Views
Last Modified: 2012-06-27
I had my 2nd Domain controller just totally die last night. I need to rebuild it, but first I need to have it removed from my AD.  How do I cleanly remove it?
0
Comment
Question by:MushroomStamp
5 Comments
 
LVL 59

Accepted Solution

by:
Darius Ghassem earned 250 total points
ID: 37725578
0
 
LVL 5

Assisted Solution

by:Voodoocrazy
Voodoocrazy earned 250 total points
ID: 37725582
0
 
LVL 8

Expert Comment

by:thomasdavis
ID: 37725589
use adsitedit remove all records for the dc then force a replication to any other dc's on the network.  If any fsmo roles lived on that server you will need to seize them then transfer.
0
 
LVL 8

Expert Comment

by:thomasdavis
ID: 37725602
0
 
LVL 95

Expert Comment

by:Lee W, MVP
ID: 37727269
Personally, I follow Dan Petri's instructions.  I think they are clearer than Microsoft's.
www.petri.co.il/delete_failed_dcs_from_ad.htm
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Synchronize a new Active Directory domain with an existing Office 365 tenant
A procedure for exporting installed hotfix details of remote computers using powershell
This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question