Solved

active directory

Posted on 2016-11-12
1
40 Views
Last Modified: 2016-11-13
I need to know following
1) steps for authoritative and non authoritative restore of domain controller
2) in what situation one performs D2 and D4 restore, does it anything to do with USN
0
Comment
Question by:pramod1
1 Comment
 
LVL 7

Accepted Solution

by:
Senior IT System Engineer earned 500 total points
ID: 41885281
Hi Pramod,

The D2 is generally called Non-Authoritative.
D2 is a registry key entry which is used as a FRS non-authoritative restore which is used to bring the local FRS replica set back up to date with its partners. The is completed by comparing all the local files in the replica with the ones of its upstream neighbour. The D2 element refers to the BURFLAG (Backup and Restore Flag) registry key. When this registry key is populated with a D2 entry this directs the local replica to re-initialize with its upstream partner.

The D4 is called Authoritative
D4 is a registry key as above which is used by FRS to signify an Authoritative restore. This makes the current replica set of existing files authoritative for all the members of this replica set. The FRS replication service MUST be stopped on all replication partners of a replica set before carrying out this procedure otherwise you will initiate a morphed condition. (More about morphing tomorrow). IMPORTANT you must only perform the two procedures above by first consulting your support provider, as it is often a last resort solution. Also thoroughly read the following KB article http://support.Microsoft.com/kb/315457/.

When should you use them?

Don't just go ahead with D4/D2. D4/D2 shall be the last resort except the followings:

FRS computer is throwing JOURNAL WRAP Errors in the FRS Event Log
Junction Points have been changed or deleted
File/folders are morphed
For troubleshooting FRS and when you to use D4/D2, please check the following Knowledge Base at Microsoft site:

http://technet.microsoft.com/en-us/library/Bb727056.aspx
0

Join & Write a Comment

Mapping Drives using Group policy preferences Are you still using old scripts to map your network drives if so this article will show you how to get away for old scripts and move toward Group Policy Preference for mapping them. First things f…
Introduction You may have a need to setup a group of users to allow local administrative access on workstations.  In a domain environment this can easily be achieved with Restricted Groups and Group Policies. This article will demonstrate how to…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now