?
Solved

Metadata cleanup failed

Posted on 2012-12-24
4
Medium Priority
?
1,408 Views
Last Modified: 2012-12-26
Hi,


My DC is down so I reinstall Windows 2003.

During the process of metadata cleanup with NTDSUTIL I got err msg at the end when I did: remove selected server

I got this msg:
-------------------------------------------------------------------------------------
LDAP error 0x32(50 (Insufficient Rights).
Ldap extended error message is 00000005: SecErr: DSID-03151D15, problem 4003 (IN
SUFF_ACCESS_RIGHTS), data 0

Win32 error returned is 0x5(Access is denied.)

-------------------------------------------------------------------------------------

Now my problem I can't delete the DC in ADUC, it keeps telling me:

Access is denied.


If try to run metadata cleanup again it doesn't work because the server is not in site anymore. It seems the first metadata cleanup do the job but did not finish...

What can I do now?
0
Comment
Question by:SAM2009
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 18

Accepted Solution

by:
Sarang Tinguria earned 1200 total points
ID: 38719697
Check the security rights on that  DC from ADUC and assign ur self full permission if its not there

Make sure u have enterprise admin rights
0
 
LVL 26

Assisted Solution

by:Leon Fester
Leon Fester earned 400 total points
ID: 38720247
Typically you only need domain admins, unless somebody has removed permissions from this group.

So agreed that you try the enterprise admin group.

You mention that this is a Win2K3 DC, but what level is your AD?
If you're running Win2K8 DC's then it could be that this object is protected from accidental delete.

Check the properties of the computer object to confirm if it can be deleted.
0
 
LVL 24

Assisted Solution

by:Sandeshdubey
Sandeshdubey earned 400 total points
ID: 38720594
Ensuer that you are using domain/enterprise/schema admin user rights user id.If the server is not listed in ntdutil then this indicates that the same is deleted.However also ensure that the faulty DC instances are removed from ADsites and services,DC OU & DNS.

How to remove data in Active Directory after an unsuccessful domain controller demotion
http://support.microsoft.com/kb/216498?wa=wsignin1.0

Delete Failed DCs from Active Directory
http://sandeshdubey.wordpress.com/2011/10/12/metadata-cleanup-of-a-domain-controller/

Once the instances are remove run dcdiag /q and repadmin /replsum to check the health of online DC if error is reported post the same.

Note:If faulty DC is FSMO role holder you need to seize the FSMO on other DC.Also ensure Authorative time server is configured on PDC role holder server.

Seize FSMO role: http://www.petri.co.il/seizing_fsmo_roles.htm

Configuring the time service on the PDC Emulator FSMO role holder
http://msmvps.com/blogs/acefekay/archive/2009/09/18/configuring-the-windows-time-service-for-windows-server.aspx

Hope this helps
0
 
LVL 1

Author Closing Comment

by:SAM2009
ID: 38721959
Thanks everybody! In fact, even if Enterprise admins have full right in the DC OU someone restrict the rights on the DC object itself. After checking full right on the object, it works!

Thanks again for all you suggestions!
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Suggested Courses
Course of the Month12 days, 15 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question