Solved

ACTIVE DIRECTORY

Posted on 2016-11-18
4
45 Views
Last Modified: 2016-11-18
I ran IDFix tool and it gave some duplicate names in error

value abc@domain.com   update : [E} abc@domain.com (error attached)

I have genuine abc@domain.com what is the other implies

Can idfix run against multiple domains or just one I ran from pc joined domain
C--Users-ic1pxk-Desktop-Capture.JPG
0
Comment
Question by:pramod1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 7

Expert Comment

by:No More
ID: 41893341
This mean that two users have same email address in profile or attribute

Follow CN=70010
0
 
LVL 6

Expert Comment

by:Kevin Stanush
ID: 41893345
I think its telling you that you have more than one account with the same email address.
0
 
LVL 7

Assisted Solution

by:No More
No More earned 250 total points
ID: 41893347
0
 
LVL 6

Accepted Solution

by:
Kevin Stanush earned 250 total points
ID: 41893348
To run it on another domain, you will probably have to either remote into another computer that is joined to the other domain, or do the same to a domain controller in the other domain and run it directly on a DC for that domain.
0

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question