Leaving them can potentially slow down the DCLocator service, which is used during the logon process. I’d clean them up.
I’m not aware of any tool for cleaning them up.
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/ntsysadmin/CAHBr%2B%2Bhc8XLh6UQPqCx6eB_b_cn5NiA9FEAT3bijA0opy3BHqQ%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CADy1Ce6qffRxFva21jV%3DUbyfZ0MdcSaVgOr_Rxys2O5W8F3zMA%40mail.gmail.com.
Charlie Sullivan
Principal Windows Systems Administrator
No. It’s like someone did a really crappy job, no pun intended, of cleaning up that mess and there’s no automagic way to remove them from what I know.
Sites
DNS
* All DNS integrated zones
* All FLZ and rDNS zones
ADUC
It’s a bit of a process to hunt and peck but once done there’s no more worries.
Before doing so, if the DC was a FSMO Role holder verify across the forest/domain by spot check that the FSMO Roles reside where they are supposed to:
# Check FSMO
Get-ADForest | FT SchemaMaster,DomainNamingMaster
Get-ADDomain | FT PDCEmulator,RIDMaster,InfrastructureMaster
We’ve seen “ghost” FSMO Role holders break things especially demotions.
There’s times where doing a metadata check would be good using NTDSUtil.
metadata cleanup
connections
connect to server NAME
quit
Select Operation Target
List Domains
Select Domain #
List Sites
Select Site #
List Servers in Site
Select Server #
quit
Remove Selected Server
quit
After running all of the above you’re golden.
Philip Elder MCTS
Senior Technical Architect
Microsoft High Availability MVP
E-mail: Phili...@mpecsinc.ca
Phone: +1 (780) 458-2028
Web: www.mpecsinc.com
Blog: blog.mpecsinc.com
Twitter: Twitter.com/MPECSInc
Skype: MPECSInc.
Please note: Although we may sometimes respond to email, text and phone calls instantly at all hours of the day, our regular business hours are 8:00 AM - 5:00 PM, Monday thru Friday.
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Mike Leone
Sent: Tuesday, July 23, 2024 07:59
To: NTSysAdmin <ntsys...@googlegroups.com>
Subject: [ntsysadmin] DNS cleanup after a DC demotion - is there a cleanup tool?
So I still have a couple Win 2012 R2 DCs (don't judge me LOL). Anyways, today I was finally able to demote one of them. That all went fine, I also told it to remove DNS delegation when I did it. And it's all mostly gone from my DNS.
--
No. It’s like someone did a really crappy job, no pun intended, of cleaning up that mess and there’s no automagic way to remove them from what I know.
Sites
DNS
* All DNS integrated zones
* All FLZ and rDNS zones
ADUC
It’s a bit of a process to hunt and peck but once done there’s no more worries.
Before doing so, if the DC was a FSMO Role holder verify across the forest/domain by spot check that the FSMO Roles reside where they are supposed to:
# Check FSMO
Get-ADForest | FT SchemaMaster,DomainNamingMaster
Get-ADDomain | FT PDCEmulator,RIDMaster,InfrastructureMaster
There’s times where doing a metadata check would be good using NTDSUtil.
metadata cleanup
connections
connect to server NAME
quit
Select Operation Target
List Domains
Select Domain #
List Sites
Select Site #
List Servers in Site
Select Server #
quit
Remove Selected Server
quit
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/decb75eb26114cf4ac191178c4870425%40MPECSInc.Ca.
Sites can do that if there’s replication links with time delays.
The main thing is that there’s no references anywhere to previous DCs.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CAHBr%2B%2Bg3sOUgKVzORje3JqgSOBok-r8te8G6RDeDWT5hz6dGtg%40mail.gmail.com.