S
Steve
(Sorry this is long...)
Basically I've inherited a network at short notice, with several
problems and several people making problems... and as I'm no Windows
expert I wonder if I could ask some advice?
The domain (Windows 2003) caters for around 150-200 computers max, of
which maybe half will be being used at any one time. It is provided
for one school, but two departments. Therefore, it is divided
logically into 2, and each half is being looked after by a different
admin. There is little communication between them (the admins that
is!). As far as I can see it, the only reason they share the same
domain is because the users need to be able to log on in either
department, so it looks like they don't want to maintain two lists of
users.
The above situation scares me somewhat, and today my worries were
justified when one of the admins re-connected a previous DC after it
had been disconnected for a few months. The first I noticed was all my
GPO-installed software uninstalled itself at boot-time. I then noticed
errors in the some event log, that more than one object had the same
upn, which was because 12 users suddenly had a blank login name!. I
fixed that pretty quickly though. After booting the rogue DC off the
network and fixing the remaining replication issues I now find that my
machine, although it can re-join the domain, cannot authenticate/locate
a domain controller, hence no GPOs are being applied. GPResult shows
"Access Denied" for each of them. Incidentally, GPResult lists my
machine as being a member of security group "Null SID". The error in
my event log is "Kerberos - PAC authentication failure". Before I left
work I noticed the same error on another machine for which I'm not
responsible... I fear the worst come Monday morning. There is also a
DNS error on the main DC, "DNS received a critical failure from the
Active Directory" (or words to that effect).
I guess the old DC, although it shouldn't replicate old objects,
somehow screwed up AD and DNS in a way that I can't seem to repair. If
I were to remove the domain forward lookup zone, and use the DNS
facility to re-create the AD stuff in DNS, will that work, or will it
completely mess up everybody?
I have a backup of AD from 2 days ago, but since then I've transferred
a dozen or so machines from another (NT) domain to this one and it's a
real pain in the ass. I don't want to lose that. How easy/hard is it
to do an authoritative restore, and is that the only/best way to fix
this?
What is also of interest to me is, why we're not running 2 separate
domains? If the admins don't really know what the other is doing,
because they work in different sites (yes, the domain is in two
physically separate locations) this kind of event I'm sure will happen
all too often.
Given the requirement that the same set of users will need to log in at
either site and access their information, dos it make sense to remain
as one domain, or have two separate domains with trusts? Would
accounts have to be synchronized between both domains? If there was a
specially created top-level domain, and these two departments each had
a child domain, is that the better way to go?
Any help would be most appreciated.
Kind regards,
Steve
Basically I've inherited a network at short notice, with several
problems and several people making problems... and as I'm no Windows
expert I wonder if I could ask some advice?
The domain (Windows 2003) caters for around 150-200 computers max, of
which maybe half will be being used at any one time. It is provided
for one school, but two departments. Therefore, it is divided
logically into 2, and each half is being looked after by a different
admin. There is little communication between them (the admins that
is!). As far as I can see it, the only reason they share the same
domain is because the users need to be able to log on in either
department, so it looks like they don't want to maintain two lists of
users.
The above situation scares me somewhat, and today my worries were
justified when one of the admins re-connected a previous DC after it
had been disconnected for a few months. The first I noticed was all my
GPO-installed software uninstalled itself at boot-time. I then noticed
errors in the some event log, that more than one object had the same
upn, which was because 12 users suddenly had a blank login name!. I
fixed that pretty quickly though. After booting the rogue DC off the
network and fixing the remaining replication issues I now find that my
machine, although it can re-join the domain, cannot authenticate/locate
a domain controller, hence no GPOs are being applied. GPResult shows
"Access Denied" for each of them. Incidentally, GPResult lists my
machine as being a member of security group "Null SID". The error in
my event log is "Kerberos - PAC authentication failure". Before I left
work I noticed the same error on another machine for which I'm not
responsible... I fear the worst come Monday morning. There is also a
DNS error on the main DC, "DNS received a critical failure from the
Active Directory" (or words to that effect).
I guess the old DC, although it shouldn't replicate old objects,
somehow screwed up AD and DNS in a way that I can't seem to repair. If
I were to remove the domain forward lookup zone, and use the DNS
facility to re-create the AD stuff in DNS, will that work, or will it
completely mess up everybody?
I have a backup of AD from 2 days ago, but since then I've transferred
a dozen or so machines from another (NT) domain to this one and it's a
real pain in the ass. I don't want to lose that. How easy/hard is it
to do an authoritative restore, and is that the only/best way to fix
this?
What is also of interest to me is, why we're not running 2 separate
domains? If the admins don't really know what the other is doing,
because they work in different sites (yes, the domain is in two
physically separate locations) this kind of event I'm sure will happen
all too often.
Given the requirement that the same set of users will need to log in at
either site and access their information, dos it make sense to remain
as one domain, or have two separate domains with trusts? Would
accounts have to be synchronized between both domains? If there was a
specially created top-level domain, and these two departments each had
a child domain, is that the better way to go?
Any help would be most appreciated.
Kind regards,
Steve