Solved

Microsoft Server 2012 Active Directory

Posted on 2013-10-30
4
258 Views
Last Modified: 2013-10-31
We had a computer object deleted, and it was advised to recover it using LDP.EXE.

If I do this, will the SID remain the same and would I have to put it back in a workgroup and rejoin the domain?

What are the ramifications if I recover this computer object.
0
Comment
Question by:techgenious
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 18

Expert Comment

by:Sarang Tinguria
ID: 39613196
Why LDP..Dont you have AD recycle bin enabled..??
Anyways .. I would have rejoined the machine to domain rather than all LDP stuff...It makes no difference
0
 
LVL 9

Accepted Solution

by:
Zenvenky earned 240 total points
ID: 39613205
LDP is useful for User objects, I would suggest you to un-join and rejoin machine to domain. If you try to retrieve computer object from LDP, it is of no use and it is as equal as corrupt object (Machine account expired). So better proceed with Unjoin and rejoin.
0
 

Author Comment

by:techgenious
ID: 39615181
zenvenky your correct.
It did not show up when I used the recycle bin, and it showed the deleted object using ldp.exe.

thanks going to un-join/rejoin the domain
0
 

Author Closing Comment

by:techgenious
ID: 39615184
Excellent answer
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question