Solved

roaming profile after remove metadata

Posted on 2013-12-07
3
323 Views
Last Modified: 2013-12-09
I recently installed a new server running server 2008R2 on the network.  It is a small network with a very sick server 2003 running.  The FSMO all transferred as expected, and all domain users [roaming domain profiles worked fine.

I was not able to demote the old server using dcpromo.  I had to use dcpromo /forceremoval.

I ran the metadata cleanup processes and all seemed to go well.

I now have an issue when logging on to the new server [old one is not on line] with the users on their workstations.  The Roaming Profile cannot be found and a comment that "possible attempt to compromise" shows up in the User profile error.

The domain has always been name.url.com, but the user was NAME\User.  I get the same results using name.url.com\User as using the old pre 2000 method of NAME\User.

Is there any way to connect the old profile other than remove the workstation to a workgroup and then reconnect to the new server domain.  Will I need to delete the users and recreate them?
0
Comment
Question by:wilf_thorburn
  • 2
3 Comments
 
LVL 30

Accepted Solution

by:
renazonse earned 500 total points
ID: 39704683
Did you rehome the roaming profiles to point to the new server in AD or the GPO? Has DNS been updated in DHCP for the clients to use the new DC and did you clean up all the DNS records pointing to the old server?
0
 

Author Comment

by:wilf_thorburn
ID: 39706525
I did those items.  It seemed that I could not always get the global catalog to bind to the new server properly.  Not sure if it was the catalog or RPC.

I ended up demoting the server as the last server and reinstalling it.  It works fine now, and was a small network, so I was able to do that
0
 

Author Closing Comment

by:wilf_thorburn
ID: 39706528
Thanks
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

INTRODUCTION The purpose of this document is to demonstrate the Installation and configuration of the Data Protection Manager product. Note that this demonstration was prepared on the basis of Windows OS is 2008 R2 and DPM 2010. DATA PROTECTI…
Citrix XenApp, Internet Explorer 11 set to Enterprise Mode and using central hosted sites.xml file.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now