Solved

How do you force workstations for log on to new DC?

Posted on 2012-12-30
5
706 Views
Last Modified: 2012-12-30
I'm trying to force all the workstations to connect to a different DC.  Rather than shutting down the DC, is there a service I can stop on the old DC that will stop workstations from authenticating to it?
0
Comment
Question by:J.R. Sitman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 14

Accepted Solution

by:
mds-cos earned 250 total points
ID: 38731590
Demote the DC with dcpromo and it will no longer authenticate logons.

http://technet.microsoft.com/en-us/library/cc771844(v=ws.10).aspx


You can promote the system again at a later date should you decide that you want it to act as a DC again.
0
 
LVL 23

Assisted Solution

by:Stelian Stan
Stelian Stan earned 150 total points
ID: 38731651
On your old DC open a command prompt and run this:
netdom /query fsmo

If all the FSMO roles are running on that server then you need to move them to new server. Only after you moved all the roles you can consider to demote the old server.

To move the FSMO roles: http://support.microsoft.com/kb/255690
0
 

Author Closing Comment

by:J.R. Sitman
ID: 38731679
@clonyxlro, thanks for reminding me.
0
 
LVL 81

Expert Comment

by:David Johnson, CD, MVP
ID: 38731681
Explain your situation in more detail please.  It will use the first DC that it finds using DNS

http://support.microsoft.com/kb/247811?wa=wsignin1.0
0
 
LVL 23

Expert Comment

by:Stelian Stan
ID: 38731687
No problem. Happy New Year !!!
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question