How to see if FSMO roles have been seized

          I am working on transitioning a server 2003 R2 active directory to a server 2012 R2 active directory. There is some question as to whether the FSMO role where seized when the original server had crashed. We are in the process repairing the original server but are not sure weather the roles were seized by the backup PDC or transfered. I was wondering if there is some way to tell? Some command line tool or other means.

Thank you in advance.
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Yes, you can use ntdsutil to determine your FSMO holder(s).Capture.JPG

jplatt1Author Commented:
Thank you for your response. I am specifically looking for a command that will tell me whether the FSMO roles were seized from the old server. Wondering if there is a way to tell that. I know who is holding the roles now,  but not sire whether they were transffered or seized.
Lee W, MVPTechnology and Business Process AdvisorCommented:
Why is it important if they transferred or seized?  The seizure process attempts a safe transfer first and then seizes if it cannot safely transfer.
Determine the Perfect Price for Your IT Services

Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden with our free interactive tool and use it to determine the right price for your IT services. Download your free eBook now!

Lee W, MVPTechnology and Business Process AdvisorCommented:
If you know WHEN it was done and depending on your event log configuration, you MAY be able to review them to determine what happened.  Look at the Directory Service event log for event ID 1458

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
jplatt1Author Commented:
Thank you. Will try that and get back to you.
Will SzymkowskiSenior Solution ArchitectCommented:
We are in the process repairing the original server but are not sure weather the roles were seized
When you talk about repairing the server are you talking about the Hardware or the OS? If you are having issues with a DC the best method is just to demote it (seize, only if you have to) and then re-load the OS and re-promote the server as a DC again, if that is what you are planning on doing.

As for checking the FSMO roles there is a much easier and faster way to identity the FSMO role holder. Use the below command...
- netdom query fsmo

Also you might want to run another command which will list all of the domain controllers that are present in AD
- netdom query dc

The netdom query dc is a good command because it will provide a list of all the DC's that are registered in AD. So if you have a DC that you know is no longer online due to demotion or seizer and it shows up in using this command then you know it was not properly demoted and you will need to perform a metadata cleanup.

jplatt1Author Commented:
Thank you very much for the suggestion. The time frame was over a year ago and the relevant logs were missing. In order to make sure we did not make a tragic mistake we decided to go with a metadata cleanup of the the old server objects in active directory. Thank you all for the info and thank you for the event code, very helpful for future reference.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Active Directory

From novice to tech pro — start learning today.