Solved

Tombstoned DC, now cleared off AD via metadatacleanup. Now i want it back on the network as a DC.

Posted on 2013-12-09
4
230 Views
Last Modified: 2013-12-09
Please refer to  -

OS  - server 2003 running on esxi 5

http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Q_28293009.html

I had a DC that had tombstoned. I removed it via metadata cleanup, I did not DCPROMO it as I was getting errors

I now have an old DC switched of (virtually) and gathering virtual dust.

I want to get it back on my network as a DC.


So, how do i do this?

1. Remove network cable, power up and then DCPROMO it, put in into a workgroup, and change it's name, then add it to the domain and then DCPROMO? In order for DCPROMO to work, does it need to contact another DC?

2. Wipe the OS and start the build from scratch?
0
Comment
Question by:APC_40
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 11

Assisted Solution

by:BillBondo
BillBondo earned 250 total points
ID: 39706934
Either way will give you the same result. I would start with a fresh install myself.
0
 
LVL 2

Expert Comment

by:Krokodili
ID: 39706969
In order to add it to an existing domain, it should connect to another DC. I should suggest to unplug from the virtual network, make it a Workgroup, plug back the virtual network and join it to the existing domain. So less work and fewer restarts.
0
 
LVL 35

Accepted Solution

by:
Joseph Daly earned 250 total points
ID: 39706994
If theres nothing else on the server that needs to be kept id blow it away and start from scratch. Just safer that way and nothing hidden to get you in trouble down the line.
0
 

Author Closing Comment

by:APC_40
ID: 39707081
Yeah, I'll wipe it and start from scratch.

Thanks
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many companies are making the switch from Microsoft to Google Apps (https://www.google.com/work/apps/business/). Use this article to learn more about what Google Apps has to offer and to help if you’re planning on migrating to Google Apps. It is …
When you upgrade from Windows 8 to 8.1 or to Windows 10 or if you are like me you are on the Insider Program you may find yourself with many 450MB recovery partitions.  With a traditional disk that may not be a problem but with relatively smaller SS…
The viewer will learn how to use the =DISCRINV command to create a discrete random variable, use this command to model a set of probabilities and outcomes in a Monte Carlo simulation, and learn how to find the standard deviation of a set of probabil…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question