Solved

Move FSMO Roles

Posted on 2014-02-22
7
568 Views
Last Modified: 2014-02-22
Hello IT pros.

I'm looking for information to transfer all FSMO roles from one Windows 2012 R2 to another Windows 2012 R2.

I'd like to know if the process is the same as from 2008 to 2012 or has something changed?


Thanks in advance.

Regards
0
Comment
Question by:Katrach0
  • 3
  • 3
7 Comments
 
LVL 57

Expert Comment

by:Cliff Galiher
ID: 39880080
There are now powershell cmdlets to manage the FSMO roles and this is the method I'd recommend. Otherwise you spend a lot more time hunting through the various GUI tools that haven't been merged into 2012s new server manager native GUI yet.
0
 

Author Comment

by:Katrach0
ID: 39880083
Do you have a link how is done?
0
 
LVL 16

Accepted Solution

by:
Michael Ortega (Internetwerx, Inc.) earned 500 total points
ID: 39880096
Move-ADDirectoryServerOperationMasterRole -Identity "SERVERNAME" -OperationMasterRole 0,1,2,3,4
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 
LVL 16

Assisted Solution

by:Michael Ortega (Internetwerx, Inc.)
Michael Ortega (Internetwerx, Inc.) earned 500 total points
ID: 39880099
0
 

Author Comment

by:Katrach0
ID: 39880103
mgortega:

If I use this in PowerShell:

Move-ADDirectoryServerOperationMasterRole -Identity "TargetServer" -OperationMasterRole 0,1,2,3,4

And this is it? no extra steps?
0
 
LVL 16
ID: 39880111
If your intent is to move all FSMO roles from one server to a new server then that's the command you want to use.

MO
0
 

Author Closing Comment

by:Katrach0
ID: 39880114
Will do this... Thanks.

Is the command run from the current FSMO holder or from the target?
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hi Everyone Now IIS AppPool issues is something we have always had because of the amazing custom development and in-house applications we have :) The issues we had were getting out of control and it was time to do something about it, just for…
This collection of functions covers all the normal rounding methods of just about any numeric value.
The viewer will learn how to use the =DISCRINV command to create a discrete random variable, use this command to model a set of probabilities and outcomes in a Monte Carlo simulation, and learn how to find the standard deviation of a set of probabil…
The viewer will learn how to use a discrete random variable to simulate the return on an investment over a period of years, create a Monte Carlo simulation using the discrete random variable, and create a graph to represent the possible returns over…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question