Solved

active directory

Posted on 2016-11-12
1
43 Views
Last Modified: 2016-11-13
I need to know following
1) steps for authoritative and non authoritative restore of domain controller
2) in what situation one performs D2 and D4 restore, does it anything to do with USN
0
Comment
Question by:pramod1
1 Comment
 
LVL 7

Accepted Solution

by:
Senior IT System Engineer earned 500 total points
ID: 41885281
Hi Pramod,

The D2 is generally called Non-Authoritative.
D2 is a registry key entry which is used as a FRS non-authoritative restore which is used to bring the local FRS replica set back up to date with its partners. The is completed by comparing all the local files in the replica with the ones of its upstream neighbour. The D2 element refers to the BURFLAG (Backup and Restore Flag) registry key. When this registry key is populated with a D2 entry this directs the local replica to re-initialize with its upstream partner.

The D4 is called Authoritative
D4 is a registry key as above which is used by FRS to signify an Authoritative restore. This makes the current replica set of existing files authoritative for all the members of this replica set. The FRS replication service MUST be stopped on all replication partners of a replica set before carrying out this procedure otherwise you will initiate a morphed condition. (More about morphing tomorrow). IMPORTANT you must only perform the two procedures above by first consulting your support provider, as it is often a last resort solution. Also thoroughly read the following KB article http://support.Microsoft.com/kb/315457/.

When should you use them?

Don't just go ahead with D4/D2. D4/D2 shall be the last resort except the followings:

FRS computer is throwing JOURNAL WRAP Errors in the FRS Event Log
Junction Points have been changed or deleted
File/folders are morphed
For troubleshooting FRS and when you to use D4/D2, please check the following Knowledge Base at Microsoft site:

http://technet.microsoft.com/en-us/library/Bb727056.aspx
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I'm sure that every Windows systems administrator has written, or at least used, a batch or VBS login script at some point in their career, whether it is to map network drives, install printers, or set some user preferences.  No more! With Window…
This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now