Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

roaming profile after remove metadata

Posted on 2013-12-07
3
Medium Priority
?
335 Views
Last Modified: 2013-12-09
I recently installed a new server running server 2008R2 on the network.  It is a small network with a very sick server 2003 running.  The FSMO all transferred as expected, and all domain users [roaming domain profiles worked fine.

I was not able to demote the old server using dcpromo.  I had to use dcpromo /forceremoval.

I ran the metadata cleanup processes and all seemed to go well.

I now have an issue when logging on to the new server [old one is not on line] with the users on their workstations.  The Roaming Profile cannot be found and a comment that "possible attempt to compromise" shows up in the User profile error.

The domain has always been name.url.com, but the user was NAME\User.  I get the same results using name.url.com\User as using the old pre 2000 method of NAME\User.

Is there any way to connect the old profile other than remove the workstation to a workgroup and then reconnect to the new server domain.  Will I need to delete the users and recreate them?
0
Comment
Question by:wilf_thorburn
  • 2
3 Comments
 
LVL 30

Accepted Solution

by:
Britt Thompson earned 1500 total points
ID: 39704683
Did you rehome the roaming profiles to point to the new server in AD or the GPO? Has DNS been updated in DHCP for the clients to use the new DC and did you clean up all the DNS records pointing to the old server?
0
 

Author Comment

by:wilf_thorburn
ID: 39706525
I did those items.  It seemed that I could not always get the global catalog to bind to the new server properly.  Not sure if it was the catalog or RPC.

I ended up demoting the server as the last server and reinstalling it.  It works fine now, and was a small network, so I was able to do that
0
 

Author Closing Comment

by:wilf_thorburn
ID: 39706528
Thanks
0

Featured Post

[Webinar] Cloud Security

In this webinar you will learn:

-Why existing firewall and DMZ architectures are not suited for securing cloud applications
-How to make your enterprise “Cloud Ready”, and fix your aging DMZ architecture
-How to transform your enterprise and become a Cloud Enabler

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Log files are useful in diagnosing and repairing problems.  This is a list of common log files and their standard locations that I've compiled.   While this is not exhaustive, it is a pretty good list that I've found to be useful.  I may update it f…
Citrix XenApp, Internet Explorer 11 set to Enterprise Mode and using central hosted sites.xml file.
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question