adroleseizing
AD DC Role Seizing
Summary: A post about seizing Active Directory Domain Controller roles, also known as FMSO.
Date: Around 2014
Refactor: 13 February 2025: Checked links and formatting.
Whenever you're in the situation the AD Domain Controller roles (FMSO) are not what they should be you can always seizes the roles you need. This small howto shows you how.
Note: This is a quite common scenario after doing a test failover with Site Recovery Manager 5.1.
Using NTDSUTIL
Ntdsutil is the tool we need, and note that for the seizing of the schema role you need to be in the “schema admins” group:
- Open an elevated command prompt
- Start the program
ntdsutil
C:\ ntdsutil ntdsutil:
- Type
roles
ntdsutil: roles fsmo maintenance:
- Type
connections
fsmo maintenance: connections server connections:
- Type
connect to server <servername>
server connections: connect to server dcserver Binding to dcserver ... Connected to dcserver using credentials of locally logged on user. server connections:
- Type
q
to return to maintenance mode
server connections: q fsmo maintenance:
- Type these commands to seize the roles for AD 2003:
- Seize domain naming master
- Seize infrastructure master
- Seize PDC
- Seize RID master
- Seize schema master
- Type these commands to seize the roles for AD 2008:
- Seize naming master
- Seize infrastructure master
- Seize PDC
- Seize RID master
- Seize schema master
Note that confirmation will be asked, you'll have to click “yes” to proceed.
adroleseizing.txt · Last modified: by 127.0.0.1