Documente Academic
Documente Profesional
Documente Cultură
DRAFT V9.3
About the Authors Author: Bio: Justin Turner Justin is a Sr. Support Escalation Engineer with the Directory Services group based in Irving Texas with over 10 years of support and Active Directory experience. Justin has created or contributed too many training courses and KB articles for the Microsoft Knowledgebase. Justin Turner
Table of Contents
1.0 TAP .......................................................................................................................................................... 1
1.1 Topic ................................................................................................................................................................1 1.2 Audience ..........................................................................................................................................................1 1.3 Purpose ...........................................................................................................................................................1 1.4 Format .............................................................................................................................................................1
7.0 Timeline................................................................................................................................................. 18 8.0 Job Aid ................................................................................................................................................... 20 8.1 Instructor Job Aid .................................................................................................................................. 21
Course Parameters ..............................................................................................................................................21 Note to Trainers ..................................................................................................................................................22 Obtaining Access to Virtual Machines .................................................................................................................23 Activities ..............................................................................................................................................................24 8.2 Learner Job Aid ..................................................................................................................................................25 Lingering Object Terminology .............................................................................................................................25 Tombstone Lifetime Default Values ....................................................................................................................26 Replication Consistency Settings .........................................................................................................................26 Troubleshooting Overview ..................................................................................................................................29 Repadmin /removelingeringobjects Quick Reference ........................................................................................29 Un-hosting a partition .........................................................................................................................................30 Manually adding a replication connection using repadmin.exe .........................................................................31 Repldiag quick reference .....................................................................................................................................32
Replication Errors Caused by Lingering Objects ..................................................................................................50 Cause of Lingering Objects ......................................................................................................................................51 How lingering objects occur ................................................................................................................................51 Five Causes of Lingering Objects .........................................................................................................................51 Lingering Object Prevention ................................................................................................................................53
Using the Keyboard and Mouse in a Virtual Machine .............................................................................................75 Using the Keyboard .............................................................................................................................................75 Using the Mouse .................................................................................................................................................76
Lab 4: Lingering Object removal using ldp and repldiag ............................................................................. 89 Lab 5: Abandoned Object and Abandoned Deleted object remediation ................................................... 90 Lab 6: Lingering Link identification and cleanup......................................................................................... 91 10.0 Presentation Slides.............................................................................................................................. 92
DRAFT V9.3
1.0 TAP
This will be a half-day course covering Troubleshooting Lingering Objects. The proposed solution will consist of lecture, classroom discussion, case study and a hands-on laboratory environment using virtualized domain controllers on a Hyper-V server. Client: Stacy Raynor | Support Escalation Manager | Microsoft Corporation Problem: High case TMPI and escalation rate for AD Replication (lingering object) issues Solution: 6 hour training module
1.1 Topic
Troubleshooting Lingering Objects: Symptom, Cause and Resolution
1.2 Audience
Support Engineers at Microsoft Corporation
1.3 Purpose
The purpose of this workshop is to equip Microsoft Support Engineers with the necessary background knowledge and skills required to troubleshoot and resolve Active Directory Replication failures involving Lingering Objects.
1.4 Format
Instructor Led in classroom and remotely through Live Meeting consisting of: Lecture Classroom discussion Case study Lab Assessment
DRAFT V9.3
2.0 Problem
Analysis of over 3,000 cases revealed that the Total Minutes per Incident (TMPI) for Active Directory replication issues involving lingering objects is more than twice the TMPI average of standard Active Directory replication cases. Interviews of SMEs and other engineers who work these issues revealed the following as likely contributors to the higher TMPI metric: Lack of consolidated documentation Complicated terminology, troubleshooting and remediation methods
DRAFT V9.3
o
Repldiag was created several years ago to make lingering object cleanup faster and easier. Case data and SME interviews suggest that this tool is rarely used. o The SMEs ask if Ive already tried X. How would I know to try something when its not documented? Terminology is well defined and easy to understand o There are a lot of different terms used when SMEs discuss lingering objects. The terminology is difficult to grasp. How can I understand your action plan if I dont know what youre saying? Practice performing the different clean-up procedures. o Lab materials that support the course (Hands-on experience with analysis and resolution steps) To be able to understand the full scope of a lingering object problem in a large environment o I understand how to fix one or two DCs, but its a little scary when the customer has hundreds of servers and most of them have problems. To be able to understand which method to use o There are five or more methods that do the same thing. Which one should I use?
DRAFT V9.3
DRAFT V9.3
course workbook will contain all necessary supporting documentation and will include realworld examples of actual cases in a "Did you know?" format.
3.3 Resources
The instructor and students will have pre-requisite knowledge of Active Directory replication troubleshooting The instructor and students will have a computer running Windows 7 with Microsoft Office 2010 and remote desktop access to a Server running Windows Server 2008 R2 with HyperV. Hyper-V will contain the required virtualized domain controllers. The classroom will have a project, screen, and whiteboard
DRAFT V9.3
Real-world examples
Present new information in context in which it will be used
DRAFT V9.3
Case study
Present case studies, role lays, or simulations in which learners demonstrate skills, knowledge, attitudes
DRAFT V9.3
5.0 Assessment
There are two different assessments: One is accessible via an Intranet web page and consists of a short-answer, matching, multiple choice, and free recall format exam. The other assessment is a performance-based lab assessment where the student is presented with a common lingering object scenario and has to document the issue, action plan and perform the procedure to correctly remove the lingering objects.
DRAFT V9.3
5.1 The learner will be able to execute the steps in an action plan in order to remove lingering objects (performance assessment) 5.2 The learner will be able to remove lingering objects using five different methods. (Performance assessment)
Which of the following lingering object removal methods automates the removal of lingering objects?
[Objective 4.2]
A. B. C. D. E. F. G. 3.
repadmin /unhost repadmin /removelingeringobjects repadmin /rehost repldiag /removelingeringobjects ldp removelingeringobjects primitive replfix None of the above
Which of the following lingering object removal methods will remove objects on Windows 2000 Windows 2008 R2 and will remove abandoned objects? [Objective 4.2] A. B. C. D. E. F. G. repadmin /unhost repadmin /removelingeringobjects repadmin /rehost repldiag /removelingeringobjects ldp removelingeringobjects primitive replfix None of the above
4.
Which of the following lingering object removal methods allow you to review which objects will be removed prior to actually removing the objects? [Objective 4.2] A. B. C. D. E. F. repadmin /unhost repadmin /removelingeringobjects repadmin /rehost repldiag /removelingeringobjects ldp removelingeringobjects primitive replfix
DRAFT V9.3
G. B and F H. D and E
True or False: For each statement, circle True or False. (2 points each) [Objective 1.3]
True True True True True True False False False False False False 5. 6. 7. 8. 9. Replication status 8606 indicates that lingering objects are present on the source DC in a replication report. Event ID 1988 indicates that the source DC contains one or more lingering objects. Replication status 8453 indicates that lingering objects are present on the destination DC. Event ID 1388 indicates a lingering object was purged from the database.
Event ID 1945 indicates that a lingering object was detected after running repadmin /removelingeringobjects. 10. Abandoned objects can be removed using repadmin /removelingeringobjects.
Fill in the Blank and Matching: Into each sentence below, copy a term from the word bank that correctly completes the sentence. (5 points each) [objective 1.1]
Lingering Links Abandoned Object Abandoned Delete Lingering Object Loose Replication Consistency Strict Replication Consistency Tombstone Tombstone Lifetime
11. The length of time that a deleted object will remain in the database is referred to as _______. 12. A _________ is an object that is present on one replica, but has been deleted and garbage collected on another replica. 13. A linked attribute contains the DN of an object that no longer exists in Active Directory. These stale references are referred to as ___________. 14. An object that has been deleted but not yet garbage collected. _________ 15. An object created on one DC that never got replicated to other DCs hosting a writable copy of the NC but does get replicated to DCs/GCs hosting a read-only copy of the NC. The originating DC goes offline prior to replicating the originating write to other DCs that contain a writable copy of the partition. _________ 16. With this behavior enabled, if a destination DC receives a change to an attribute for an object that it does not have, the entire object is replicated to the target for the sake of replication consistency. This undesirable behavior causes a lingering object to be reanimated. _________ 17. An object deleted on one DC that never got replicated to other DCs hosting a writable copy of the NC for that object. The deletion replicates to DCs/GCs hosting a read-only copy of the NC. The DC that originated the object deletion goes offline prior to replicating the change to other DCs hosting a writable copy of the partition. ____________
10
DRAFT V9.3
18. With this behavior enabled, if a destination DC receives a change to an attribute for an object that it does not have, replication is blocked with the source DC for the partition where the lingering object was detected. __________
19. Essay Question: List three or more methods to prevent lingering objects (8 points) (objective 2.1)
20. Essay Question: Use Figure 1 Replication Status, document every DC containing lingering objects and for which partition. (10 points) (objective 3.2)
11
DRAFT V9.3
21. Essay Question: Using Figure 1 Replication Status and the following information, provide the exact command line syntax to log all lingering objects on DC 5thWardCorpDC to the event log, and the syntax to remove those lingering objects. (10 points) (objective 4.1)
Repadmin /removelingeringobjects <Dest_DSA_LIST> <Source DSA GUID> <NC> [/ADVISORY_MODE] The following DCs host writable copies of the partition in question: Dallas\DALCORPDC DC Options: IS_GC Site Options: (none) DC object GUID: 87ccb4f8-1057-4cfa-aed6-79b5626db9fd DC invocationID: 56f7cb84-0a67-43c1-93de-9d01f53e02c5 Dallas\NYCORPDC DC Options: IS_GC Site Options: (none) DC object GUID: 4009aef6-b279-43d2-82f6-4298f02505e8 DC invocationID: a29c83ab-5dea-4829-bbbf-1343f037098d Liverpool\LONCONTOSODC DC Options: IS_GC Site Options: (none) DC object GUID: a29bbfda-8425-4cb9-9c66-8e07d505a5c6 DC invocationID: d58a6322-6a28-4708-82d3-53b7dcc13c1a Liverpool\LONEMEADC DC Options: IS_GC Site Options: (none) DC object GUID: ba9bcfb2-7445-2cd9-8c66-9b27d534a4b3 DC invocationID: e38b6355-fb31-3785-71b1-42c6ddc23f8e Houston\5THWARDCORPDC DC Options: IS_GC Site Options: (none) DC object GUID: 9653cb84-7aa2-4a59-ab46-382e5dc1d3a8 DC invocationID: e0cb69c0-5d24-4254-b830-99b0c9b4da1f
12
DRAFT V9.3
21.
Repadmin /removelingeringobjects 5thwardCorpDC ba9bcfb2-7445-2cd9-8c669b27d534a4b3 cn=configuration,dc=contoso,dc=com /advisory_mode
justin.turner@microsoft.com Microsoft Corporation
13
DRAFT V9.3
Please ensure that you document each problem thoroughly. This documentation should include forest and DC environment settings (tombstone lifetime and replication consistency), symptom, cause and resolution sections. The symptoms section should contain a list of all "problematic objects." The resolution section should have a thoroughly documented action plan. Implement your action plan after documenting the issue.
14
DRAFT V9.3
Average (65-85%)
Symptom, cause and resolution sections are mostly documented The symptoms section contains a partial list of all objects The action plan is missing one to two steps Most (greater than 75%) of lingering objects are removed.
Poor (0 - 65%)
Symptom, cause and resolution sections is inadequate Less than 25% of all objects are listed The action plan will not resolve the issue or will make things worse Less than 25% of lingering objects are removed AD Replication is not successful Abandoned object is still present on most DCs
AD Replication and Lingering object cleanup (5.1, 5.2) Abandoned object cleanup (5.1, 5.2)
25
All lingering objects are removed from the environment AD Replication is successful Abandoned object is no longer present on any DC new object is created in its place Object completely removed from the environment CorpVP group contains correct group membership on all DCs Group still has the same objectSID
25
Abandoned object is no longer present on most DCs (greater than 75%) Object mostly removed from the environment CorpVP group contains correct group membership on all DCs Group does not have the same ObjectSID
25
Object is still present on most DCs in the environment CorpVP group has inconsistent group membership on most DCs
15
TOTAL:
100
15
DRAFT V9.3
6.0 Evaluation
Following the conclusion of the course, the students are emailed a link to a survey to take online.
# Question
1 I was provided with the information I needed Strongly Agree Agree (logistics, pre-work) for the training in a timely manner. 2 The classroom setup and hardware (if supplied) functioned appropriately to support face-to-face learning.
Strongly Agree Agree
3 The instructor was knowledgeable about the Strongly Agree Agree subject matter. 4 The instructor's presentation skills helped me better understand the content.
Strongly Agree Agree
5 The instructor consistently linked the course Strongly Agree content to Microsofts business and/or my Agree role. 6 The length of the course was appropriate
Strongly Agree Agree
8 This course builds skills improving how I sell, Strongly Agree Agree market, and/or provide services to our customers and partners. 9 This course was a valuable use of my time.
Strongly Agree Agree
16
DRAFT V9.3
10 I would recommend this course.
Strongly Agree Agree
Neither Disagree Strongly Don't Agree Disagree Know nor Disagree Neither Disagree Strongly Don't Agree Disagree Know nor Disagree
11 The messaging in this course is relevant to Microsoft's customers and/or partners. 12 If not, please provide additional feedback. 13 How soon will you be able to apply this learning?
Neither Disagree Strongly Don't Agree Disagree Know nor Disagree Neither Disagree Strongly Don't Agree Disagree Know nor Disagree
14 My manager and I have discussed how I will Strongly Agree Agree apply this training to my job. 15 What are you going to do differently as a result of this course? 16 What was the most useful portion of this course? (Please provide specifics, e.g. instructor effectiveness, content quality, materials usefulness). 17 What was the least useful portion of this course? (Please provide specifics, e.g. instructor effectiveness, content quality, materials usefulness). 18 Please provide any additional comments (e.g. learning environment, instructor effectiveness, content/materials quality, content level, relevance, application).
17
DRAFT V9.3
7.0 Timeline
The following proposed timeline should allow for sufficient coverage of the course material. Time Objectives Activities / Training Methods
Intro and Classroom discussion Lecture and discussion
Materials
9:00 AM 15 minutes
Welcome and Instructor Introduction 1.2 Lingering Object Fundamentals 1.1 Exploring Lingering Object Fundamentals 1.4 Symptoms and Cause 1.2, 1.3, 2.1 Identification and Classification 3.1, 3.2
9:15 AM 20 minutes
Lesson 1 Slides
9:35 AM 15 minutes
Lab 1exercise
Lesson 2 Slides Provide real-word scenarios Lesson 3 Slides Show prior case action plans
Break
Lingering Object Diagnosis and Documentation 3.1, 3.2, 4.1 Lingering Object Removal 5.1, 5.2 Lunch
Lab 2 exercise
Lesson 4 Slides
Lab exercise 4 6
18
DRAFT V9.3
2:30 PM 10 minutes 2:40 PM 10 minutes 2:50 PM 30 Minutes
Real World Application 4.2, 4.3 Real-world case study 4.2, 4.3 Break
Lesson 5 Slides
Case data in instructor share Case Details, Diagnostic Data Present the high-level symptoms. What data do you want to see? Show the data What is the action plan?
Question Time
Ask if there are any questions Post-course test Share assessment URL on-screen
Assessment
Break
Performance assessment
Lab-based assessment
19
DRAFT V9.3
20
DRAFT V9.3
21
DRAFT V9.3
Note to Trainers
Checklist of Supplies
Print out slides with notes pages. The notes pages provide the necessary material to help explain the contents of each slide. Alternatively, you can have the students copy the course materials to their computer and print out the slides to a new Microsoft OneNote notebook. The student lab guide is stored electronically on the hyper-v image: DC1
Room Arrangement
Standard Microsoft classroom configuration: Classroom style with whiteboard and projector screen at the front of the room
Preparation
Before Class starts: 1. Have PowerPoint slide deck opened up 2. On instructor machine: Launch Hyper-V, and launch DC1s image 3. Ensure classroom has intranet connectivity
22
DRAFT V9.3
Note:
For more information, click links in the Documents section on the right to open course documents included in the VM package.
23
DRAFT V9.3
Activities
Introduction
Welcome the students to the course. Ask them to share the following: Name Role Time at Microsoft Something that no one (at work) else knows about them or something unique
Classroom Discussion
After the introduction, lead a discussion to gauge student's prior knowledge. Ask probing questions like: What is a lingering object? Why do I care about removing them from my environment? What does tombstone lifetime have to do with this? Who can explain the different between strict and loose replication consistency? What is an abandoned object? How is that different from a lingering object? What is a lingering linked value? Who here has worked a lingering object issue? Were you able to resolve it? How long did it take? Who here has used repldiag? What did you think about it?
Real-world examples
Where appropriate, provide examples of actual cases worked. Highlight the successes and failures (what went right and what went wrong). Present new information in context in which it will be used
Case Study
The case study within the course includes real diagnostics data from an actual customer case. The data was scrubbed to remove personally identifiable information (PII). Present the facts of the case and encourage the students to play the role of engineer. There is an action plan included in the case study. The action plan is intentionally poor in quality and if implemented would result in disastrous results. Together come up with the appropriate action plan to resolve the problem.
24
DRAFT V9.3
Present case studies, role plays, or simulations in which learners demonstrate skills, knowledge, attitudes Present problems and demonstrate how to solve, explicitly stating the strategies that were used.
Lab Activities
Students have access to their lab environment through the VMAS site. Each lab activity corresponds to a lesson in the course. You may be tempted to do the entire lecture at once and then all lab activities at the end of the course. It is important not to do this. Please have the students complete the lab activities along with the appropriate lesson in the course.
Hands-on lab
If unfamiliar with the lab environment and lab material, you should work through each lab activity at least one time prior to the course Provide support and coaching as needed when learners are performing tasks Ask learners to demonstrate skill; provide corrective feedback
Term
Abandoned delete
Definition
An object deleted on one DC that never got replicated to other DCs hosting a writable copy of the NC for that object. The deletion replicates to DCs/GCs hosting a read-only copy of the NC. The DC that originated the object deletion goes offline prior to replicating the change to other DCs hosting a writable copy of the partition. An object created on one DC that never got replicated to other DCs hosting a writable copy of the NC but does get replicated to DCs/GCs hosting a read-only copy of the NC. The originating DC goes offline prior to replicating the originating write to other DCs that contain a writable copy of the partition. A linked attribute contains the DN of an object that no longer exists in Active Directory. These stale references are referred to as lingering links.
Abandoned object
Lingering link
25
DRAFT V9.3
An object that is present on one replica, but has been deleted and garbage collected on another replica. With this behavior enabled, if a destination DC receives a change to an attribute for an object that it does not have, the entire object is replicated to the target for the sake of replication consistency. This undesirable behavior causes a lingering object to be reanimated. With this behavior enabled, if a destination DC receives a change to an attribute for an object that it does not have, replication is blocked with the source DC for the partition where the lingering object was detected
Lingering Object
Tombstone
An object that has been deleted but not yet garbage collected The amount of time tombstones are retained in Active Directory before being garbage collected and permanently purged from the database.
OS Install Path Windows 2000 RTM Windows 2003 RTM, 2003 R2 Windows 2000RTM upgrade to Windows 2003 SP1 Windows 2003SP1, 2003SP2, 2008, 2008R2 NT4 upgrade to Windows 2003 SP1
26
DRAFT V9.3
o o o
Destination DCs should see USN for creates before object is modified Only modifies for lingering objects arrive for object not on destination DC Only destination DCs enforce strict replication and log events
Destination DCs stop replicating from source DCs partitions containing LOs Lingering objects are quarantined on source DCs where they can be detected End-to-end replication may be impacted for partitions containing lingering objects Administrators must remove lingering objects to restore replication
You can also enable strict replication by manually setting the Strict Replication Consistency registry value to 1. HKLM\System\CurrentControlSet\Services\NTDS\Parameter Strict Replication Consistency (Reg_DWORD) to 1 1 (enabled): Inbound replication of the specified directory partition from the source is stopped on the destination.
Warning: Ensure you are prepared to deal with replication failures after enabling strict replication consistency due to the existence of lingering objects.
27
DRAFT V9.3
For all global catalog servers, type: repadmin /regkey gc: -strict
You can also enable strict replication by manually setting the Strict Replication Consistency registry value to 0.
HKLM\System\CurrentControlSet\Services\NTDS\Parameters Value: Strict Replication Consistency Type: (Reg_DWORD) Value Data: 0 0 (disabled): The destination requests the full object from the source domain controller, and the lingering object is revived in the directory as a new object. Critical: The Loose Replication Consistency setting will cause the undesirable behavior of reanimation of lingering objects.
Windows NT 4.0 to Windows 2000 Root Windows 2000 to Windows Server 2003 SP1
Loose Loose Upgrading a Windows 2000 forest to Windows Server 2003 slipstreamed with SP1 does not enabled strict replication consistency. DCPROMO creates an operational GUID that causes Windows Server 2003 domain controllers to inherit strict replication mode but is ignored by Windows 2000 domain controllers. Same as above. DCPROMO creates an operational GUID that causes
Strict
Windows Server 2003 SP1 root Windows NT 4.0 to Windows Server 2003 root
Strict Strict
28
DRAFT V9.3
Windows Server 2003 domain controllers to inherit strict replication mode but is ignored by Windows 2000 domain controllers.
The default value for the strict replication consistency registry entry is determined by the conditions under which the domain controller was installed into the forest. Note: Raising the domain or forest functional level does not change the replication consistency setting on any domain controller.
More Information: For more information about this topic, see: http://blogs.technet.com/b/askds/archive/2010/02/15/strict-replication-consistencymyth-versus-reality.aspx
Troubleshooting Overview
Common methods to remove lingering objects include: Repadmin /Removelingeringobjects Replfix Repldiag Manually through LDP or using script Rehost the partition: Repadmin /rehost (or /unhost and /add) (only if the partition is not-writable on the DC containing lingering objects) Un-GC (but you dont really have control over who the DCs sources the partition from) Demote and Promote (DCPromo)
29
DRAFT V9.3
-------------------------------------------------------------------------------------------------
Un-hosting a partition
It is sometimes necessary to remove a partition from the database of a DC temporarily. Repadmin includes a /rehost option that allows you to do this, but the /unhost option allows you to exercise more control over the procedure. Take note that /unhost only allows you to remove a read-only copy of the partition. With the exception of application partitions, you cannot remove a writable copy of a partition from a DC without using DCPROMO.
Repadmin /?:unhost Remove a specific read-only partition from a GC. [SYNTAX] /unhost DSA <Naming Context> Repadmin /unhost ContosoDC1 dc=corp,dc=contoso,dc=com
Event ID 1659 indicates the status of the un-host operation. Do not re-add the partition until event ID 1660 is logged in the Directory Services event log. The re-host operation may fail with error 8339 if you attempt to re-add the partition too soon after the un-host.
30
DRAFT V9.3
Disable KCC connection translation so that KCC doesnt remove our temporary replication connection:
Repadmin /options ContosoDC1 +disable_ntdsconn_xlate
Then add a replication connection for the configuration partition of the server we want to source the partition from:
Repadmin /add <Naming Context> <Dest DSA> <Source DSA> [/readonly] [/selsecrets] <Source DSA> The source DSA must be specified by fully qualified computername. repadmin /add cn=configuration,dc=contoso,dc=com ContosoDC1.contoso.com LONEMEADC.Emea.contoso.com One-way replication from source:LONEMEADC.Emea.contoso.com to dest:ContosoDC1.contoso.com established.
Add a replication connection to the server for the domain partition that we need to source from (/readonly is specified if the partition is a GC non-writable
partition /selsecrets needs to be specified if the destination DC is an RODC):
repadmin /add dc=emea,dc=contoso,dc=com ContosoDC1.contoso.com LONEMEADC.Emea.contoso.com /readonly
One-way replication from source:LONEMEADC.Emea.contoso.com to dest:ContosoDC1.contoso.com established.
31
DRAFT V9.3
If you need to replicate the other way, then just reverse the order of the server names in the commands. To begin a normal sync of the partition using the new replication connection:
Repadmin /replicate <Dest_DSA_LIST> <Source DSA_NAME> <Naming Context> [/force] [/async] [/full] [/addref] [/readonly] repadmin /replicate ContosoDC1.contoso.com LONEMEADC.Emea.contoso.com dc=emea,dc=contoso,dc=com /readonly
To begin a full sync of that partition using the new replication connection:
repadmin /replicate ContosoDC1.contoso.com LONEMEADC.Emea.contoso.com dc=emea,dc=contoso,dc=com /readonly /full
Sync from LONEMEADC.Emea.contoso.com to ContosoDC1.contoso.com completed successfully.
Turn KCC connection translation back on when you no longer need the connection:
Repadmin /options ContosoDC1 -disable_ntdsconn_xlate
32
DRAFT V9.3
repadmin /removelingeringobjects loncontosodc.contoso.com 4009aef6-b279-43d2-82f64298f02505e8 dc=forestdnszones,dc=contoso,dc=com repadmin /removelingeringobjects loncontosodc.contoso.com b3ff6e2e-6025-4782-9d7b54b0431a374a dc=forestdnszones,dc=contoso,dc=com repadmin /removelingeringobjects loncontosodc.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects loncontosodc.contoso.com 87ccb4f8-1057-4cfa-aed679b5626db9fd cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects loncontosodc.contoso.com 4009aef6-b279-43d2-82f64298f02505e8 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects loncontosodc.contoso.com b3ff6e2e-6025-4782-9d7b54b0431a374a cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com 87ccb4f8-1057-4cfa-aed679b5626db9fd dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com 4009aef6-b279-43d2-82f64298f02505e8 dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com b3ff6e2e-6025-4782-9d7b54b0431a374a dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com 87ccb4f8-1057-4cfa-aed679b5626db9fd dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com 4009aef6-b279-43d2-82f64298f02505e8 dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com b3ff6e2e-6025-4782-9d7b54b0431a374a dc=corp,dc=contoso,dc=com Reference NCs cleaned in 0h:0m:0s. Cleaning everything else against reference NCs. repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=forestdnszones,dc=contoso,dc=com repadmin /removelingeringobjects dalcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=forestdnszones,dc=contoso,dc=com repadmin /removelingeringobjects nycorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=forestdnszones,dc=contoso,dc=com repadmin /removelingeringobjects seacorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=forestdnszones,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects dalcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects nycorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects seacorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=contoso,dc=com repadmin /removelingeringobjects dalcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=contoso,dc=com repadmin /removelingeringobjects nycorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=contoso,dc=com repadmin /removelingeringobjects seacorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=contoso,dc=com repadmin /removelingeringobjects dalcorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects nycorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects seacorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects loncontosodc.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects dalcorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects nycorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=corp,dc=contoso,dc=com justin.turner@microsoft.com Microsoft Corporation
33
DRAFT V9.3
This output can also be viewed in Excel: Copy commands to a text file. Modify the text file to include only the command portion of the output. Then open up the text file in Exel. (space delimited)
repldiag /removelingeringobjects /overridedefaultreferencedc:"cn=configuration,dc=contoso,dc=com":nycorpdc.corp. contoso.com /overridedefaultreferencedc:"dc=corp,dc=contoso,dc=com":seacorpdc.corp.contoso. com /overridedefaultreferencedc:"dc=forestdnszones,dc=contoso,dc=com":5thwardcorpdc .corp.contoso.com /outputrepadmincommandlinesyntax Replication topology analyzer. Written by kenbrumf@microsoft.com Version: 2.0.3397.24022 Command Line Switch: /removelingeringobjects Command Line Switch: /overridedefaultreferencedc:cn=configuration,dc=contoso,dc=com:nycorpdc.corp.co ntoso.com Command Line Switch: /overridedefaultreferencedc:dc=corp,dc=contoso,dc=com:seacorpdc.corp.contoso.co m Command Line Switch: /overridedefaultreferencedc:dc=forestdnszones,dc=contoso,dc=com:5thwardcorpdc.c orp.contoso.com Command Line Switch: /outputrepadmincommandlinesyntax Attempting to override NC cn=configuration,dc=contoso,dc=com with DC nycorpdc.corp.contoso.com... Overriden Attempting to override NC dc=corp,dc=contoso,dc=com with DC seacorpdc.corp.contoso.com... Overriden Attempting to override NC dc=forestdnszones,dc=contoso,dc=com with DC 5thwardcorpdc.corp.contoso.com... Overriden
/UseRobustDCLocation
34
DRAFT V9.3
Query each and every DC for a list of DCs in forest. Ensures replication instability does not cause any to be missed. Weve had cases where we clean up lingering objects in the forest but do to an AD topology problem some DCs were not cleaned up. This option is almost always recommended if you want it to do a thorough job.
35
DRAFT V9.3
where: d: is the drive letter where the operating system is installed. %systemroot% is the folder where the operating system is installed.
Volume in drive C is Main Volume Serial Number is 000A-BCDE Directory of C:\Windows 12/19/2004 11:56 AM <DIR> 12/19/2004 11:56 AM <DIR> 07/07/2003 06:57 AM <DIR> 11/17/2004 02:45 PM <DIR> 11/17/2004 02:47 PM <DIR> 11/17/2004 02:42 PM <DIR> ...
The ellipsis (...) on the last line indicates a partial listing. The following conventions apply to all commands and program code listings: Type command statement elements that appear in Bold exactly as they appear in the example, including quotation marks. Italic elements in command statements indicate placeholders for variable information.
36
DRAFT V9.3
Braces ({ }) enclose required items as shown by {parameter1, parameter2, title} in the example. Commas separate multiple items. Type quotation marks as shown; do not type the braces. Square brackets ([ ]) enclose optional items as shown by [option1 | option2] in the example. Pipe symbols ( | ) indicate alternate choices. If multiple options are listed, only type one option. Do not type the brackets or pipe symbols.
Notes
Icons and labels call attention to informational notes and reader alerts as shown in the following table.
Table 3. Note Icons and Labels
Icon
Label Note/Important Important Tip Critical Warning Do Not More Information More Help Trends
Description Emphasizes content and provides additional information. Strongly emphasizes key content. Highlights a best practice. Indicates strongly recommended actions. Indicates strongly recommended actions required to prevent data loss or other undesirable results. Warns against actions that may cause system failure or data loss. Link to reference material. Link to guides, white papers, or KB articles. Indicates industry trends, top support issue trends, etc.
37
DRAFT V9.3
In each module, slide number paragraphs shown in the following figure identify the presentation slide that accompanies the topic.
Figure 2. Slide Number Paragraph Slide ##
The first slide in each presentation is unnumbered. Subsequent slides and slide indicator paragraphs in each module are numbered sequentially starting with 1.
Each presentation slide corresponds to a topic section in the module. Topic sections that include supplemental information may not be referenced on corresponding presentation slides.
Note:
38
DRAFT V9.3
Tombstone
When Active Directory deletes an object from the directory, it does not physically remove the object from the database. Instead, Active Directory marks the object as deleted by setting the object's isDeleted attribute to TRUE, stripping most of the attributes from the object, renaming the object, and then moving * the object to a special container in the object's naming context (NC) named CN=Deleted Objects. The object, now called a tombstone, is invisible to normal directory operations. Some objects dont get moved upon deletion and will therefore not be moved into the Deleted Objects container.
Note:
39
DRAFT V9.3
In most cases, the default value is 60 days. If the forest was built on 2008 or later, it should be 180. The minimum setting is 2 days.
Do Not: Do not reduce TSL to 2 days. (Unless directed to do so by a senior AD Replication SME)
OS Install Path Windows 2000 RTM Windows 2003 RTM, 2003 R2 Windows 2000RTM upgrade to Windows 2003 SP1 Windows 2003SP1, 2003SP2, 2008, 2008R2 NT4 upgrade to Windows 2003 SP1
To avoid such conditions, incorporate monitoring regimens that detect domain controller replication problems.
40
DRAFT V9.3
Outdated objects can also occur due to hardware and software problems that render the domain controller unreachable. Regardless of the reason, a deleted object can remain on a domain controller in either of the following circumstances. A domain controller goes offline immediately before the deletion of an object on another domain controller, and remains offline for a period that exceeds the tombstone lifetime. A domain controller goes offline immediately after the deletion of an object on another domain controller, but before receiving replication of the tombstone, and remains offline for a period that exceeds the tombstone lifetime.
The following provides information for a legacy operating system but is included here as it is still relevant. Additionally, some pre-Windows 2000 SP3 domain controllers experience a replication error condition after a non-authoritative restore. A large number of objects created after the restore may never be considered for replication.
More Information: For more information about this topic, see: Microsoft Knowledge Base Article 316829, Possible Active Directory Inconsistency after You Restore a Domain Controller.
On domain controllers that are running Windows Server 2003 or later, you can use the Repadmin support tool to analyze and remove lingering objects from a domain controller that you suspect or know has not replicated for a tombstone lifetime. This tool includes the RemoveLingeringObjects command. This command removes objects that are outdated (do not exist in a replica of the same directory partition on the source domain controller).
Important:
41
DRAFT V9.3
names, causing confusion on directory searches. For example, if the relative distinguished name of two objects cannot be resolved, conflict resolution appends "*CNF:GUID" to the name, where * represents a reserved character, CNF is a constant that indicates a conflict resolution, and GUID represents the objectGUID attribute value. E-mail messages are not delivered to a user whose Active Directory account appears to be current. After an outdated domain controller or global catalog server becomes reconnected, both instances of the user object appear in the global catalog. Because both objects have the same e-mail address, e-mail messages cannot be delivered. A universal group that no longer exists continues to appear in a users access token. Although the group no longer exists, if a user account still has the group in its security token, the user might have access to a resource that you intended to be unavailable to that user. A new object or Exchange mailbox cannot be created, but you do not see the object in Active Directory. An error message reports that the object already exists. Searches that use attributes of an existing object incorrectly find multiple copies of an object of the same name. One object has been deleted from the domain, but it remains in an isolated global catalog server.
42
DRAFT V9.3
Note A post-SP2 hot fix (also included in the SRP) from November of 2001 used a different registry value. A setting of 0 will not recreate the missing object (strict), and a setting of 1 will create the missing object. This value is only needed with the November version of the hot fix.
Value Name: Correct Missing Objects Data type: REG_DWORD Value: 1
Defines how a destination DC behaves if a source DC sends updates to an object that does not exist in the destination DCs local copy of Active Directory. o o o Destination DCs should see USN for creates before object is modified Only modifies for lingering objects arrive for object not on destination DC Only destination DCs enforce strict replication and log events
Destination DCs stop replicating from source DCs partitions containing LOs Lingering objects are quarantined on source DCs where they can be detected End-to-end replication may be impacted for partitions containing lingering objects Administrators must remove lingering objects to restore replication
43
DRAFT V9.3
For all global catalog servers, type: repadmin /regkey gc: +strict
You can also enable strict replication by manually setting the Strict Replication Consistency registry value to 1. HKLM\System\CurrentControlSet\Services\NTDS\Parameter Strict Replication Consistency (Reg_DWORD) to 1 1 (enabled): Inbound replication of the specified directory partition from the source is stopped on the destination.
Warning: Ensure you are prepared to deal with replication failures after enabling strict replication consistency.
For all domain controllers, type: repadmin /regkey * -strict For all global catalog servers, type: repadmin /regkey gc: -strict
You can also enable strict replication by manually setting the Strict Replication Consistency registry value to 0.
HKLM\System\CurrentControlSet\Services\NTDS\Parameters Value: Strict Replication Consistency Type: (Reg_DWORD) Value Data: 0 0 (disabled): The destination requests the full object from the source domain controller, and the lingering object is revived in the directory as a new object. Critical: The Loose Replication Consistency setting will cause the undesirable behavior of reanimation of lingering objects.
44
DRAFT V9.3
Perform the following procedure on any domain controller in the forest to add this object to the configuration directory partition. Requirements: Administrative credentials: To complete this procedure, you must be a member of the Domain Admins group. Tools: Ldifde.exe, Notepad To create the object that ensures strict replication consistency on new domain controllers 1. In a text editor such as Notepad, create the following text file:
dn: CN=94fdebc6-8eeb-4640-80deec52b9ca17fa,CN=Operations,CN=ForestUpdates,CN=Configuration,DC=<ForestRootDo main> changetype: add objectClass: container showInAdvancedViewOnly: TRUE name: 94fdebc6-8eeb-4640-80de-ec52b9ca17fa objectCategory: CN=Container,CN=Schema,CN=Configuration,DC=<ForestRootDomain>
Where <ForestRootDomain> contains all domain components (DC=) of the forest root domain. For example, for the contoso.com forest, DC=contoso,DC=com; for the fineartschool.net forest, DC=fineartschool,DC=net.
45
DRAFT V9.3
2. Open a Command Prompt as an administrator: On the Start menu, right-click Command Prompt, and then click Run as administrator. If the User Account Control dialog box appears, provide Enterprise Admins credentials, if required, and then click Continue. 3. At the command prompt, type the following command and then press ENTER:
ldife -i f <Path\FileName>
Value -i -f <Path\FileName>
Description Specifies import mode. If not specified, the default mode is export. Identifies the import or export file name. The path and name of the import file that you created in step 1. For example, C:\ldifde.txt.
More Information:
Abandoned object
An object created on one DC that is not replicated to other DCs hosting a writable copy of the NC but is replicated to DCs/GCs hosting a read-only copy of the NC. The originating DC goes offline prior to replicating the originating write to other DCs that contain a writable copy of the partition. The net effect is the object exists only in read-only copies of the partition. The object is present on RODCs or GCs hosting a read-only copy of the partition.
Abandoned delete
An object deleted on one DC that never got replicated to other DCs hosting a writable copy of the NC for that object. The deletion replicates to DCs/GCs hosting a read-only copy of the NC. The DC that originated the object deletion goes offline prior to replicating the change to other DCs hosting a writable copy of the partition.
Table 5: Lingering Object Terminology
Term
Abandoned delete
Definition
An object deleted on one DC that never got replicated to other DCs hosting a writable copy of the NC for that object. The deletion replicates to DCs/GCs hosting a read-only copy of the NC. The DC that originated the object deletion goes offline prior to replicating the change to other DCs hosting a writable copy of the partition. An object created on one DC that never got replicated
Abandoned object
46
DRAFT V9.3
to other DCs hosting a writable copy of the NC but does get replicated to DCs/GCs hosting a read-only copy of the NC. The originating DC goes offline prior to replicating the originating write to other DCs that contain a writable copy of the partition. Lingering link A linked attribute contains the DN of an object that no longer exists in Active Directory. These stale references are referred to as lingering links. An object that is present on one replica, but has been deleted and garbage collected on another replica. With this behavior enabled, if a destination DC receives a change to an attribute for an object that it does not have, the entire object is replicated to the target for the sake of replication consistency. This undesirable behavior causes a lingering object to be reanimated. With this behavior enabled, if a destination DC receives a change to an attribute for an object that it does not have, replication is blocked with the source DC for the partition where the lingering object was detected Tombstone An object that has been deleted but not yet garbage collected The amount of time tombstones are retained in Active Directory before being garbage collected and permanently purged from the database.
Lingering Object
47
DRAFT V9.3
48
DRAFT V9.3
2. Remove any lingering objects on the non-replicating domain controller, and then enable replication with divergent or corrupt partners (as follows). a. Run repadmin /removelingeringobjects (see Removing Lingering Objects with Repadmin for instructions). b. Enable replication with divergent or corrupt partners by adding the following registry key.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters Allow Replication With Divergent and Corrupt Partner Value: 1 (Set to 0 to disable) Data type: REG_DWORD
Important Before using the above-mentioned key to override this replication safeguard, be sure to use repadmin /removelingeringobjects command to prevent the spread of unwanted lingering objects. Once replication has succeeded, be sure to remove the Replication With Divergent and Corrupt Partner value, or set it to zero.
Event Source: NTDS Replication Event Type: Error Event Category: Replication Event ID: 2042 Description: It has been too long since this machine last replicated with the named source machine. The time between replications with this source has exceeded the tombstone lifetime. Replication has been stopped with this source. The reason that replication is not allowed to continue is that the two machine's views of deleted objects may now be different. The source machine may still have copies of objects that have been deleted (and garbage collected) on this machine. If they were allowed to replicate, the source machine might return objects which have already been deleted. Time of last successful replication: <date and time of last replication> Invocation ID of source: <invocation ID of the source DC> Name of source: <replication guid._msdcs.forest.root of source DC> Tombstone lifetime (days): 60 The replication operation has failed. User Action: Determine which of the two machines was disconnected from the forest and is now out of date. You have three options: 1. Demote or reinstall the machine(s) that were disconnected.
49
DRAFT V9.3
2. Use the "repadmin /removelingeringobjects" tool to remove inconsistent deleted objects and then resume replication. 3. Resume replication. Inconsistent deleted objects may be introduced. You can continue replication by using the following registry key. Once the systems replicate once, it is recommended that you remove the key to reinstate the protection. Registry Key: HKLM\System\CurrentControlSet\Services\NTDS\Parameters\Allow Replication With Divergent and Corrupt Partner
Repadmin /showreps
50
DRAFT V9.3
If the destination domain controller has Strict Replication Consistency enabled, the controller recognizes that it cannot update the object. The controller locally stops inbound replication of the directory partition from the source domain controller.
If the destination domain controller has Strict Replication Consistency disabled, the controller requests the full replica of the updated object. In this case, the object is reintroduced into the directory.
51
DRAFT V9.3
An object deleted on one DC that never got replicated to other DCs hosting a writable copy of the NC for that object. The deletion replicates to DCs/GCs hosting a read-only copy of the NC. The DC that originated the object deletion goes offline prior to replicating the change to other DCs hosting a writable copy of the partition.
Cause 2: The Source DC sends updates to objects @ the cusp of TSL expiration that have already been garbage collected by a strict mode destination DC
The CONTOSO.COM domain contains two DCs in the same domain. Tombstone lifetime = 60 days. Strict replication is enabled on both DCs. DC1 and DC2 replicate every 24 hours. DC1 originates deletes on a daily basis. DC1 is in-place upgraded to W2K8 R2 which stamps new attributes on all objects in the configuration and writable domain partitions, including objects currently in the deleted objects container, some of which were deleted 60 days ago and now at the cusp of tombstone expiration. DC2 garbage collects some of the objects deleted TSL days ago before the replication schedule opens with DC2. Error 8606 is logged until DC1 garbage collects the blocking objects. Any updates to the partial attribute set can cause temporary lingering objects that, like the addition of the 1st W2K8 R2 DC to an existing forest, will clear themselves up once source DCs garbage collect deleted objects @ the cusp of TSL expiration.
Cause 3: A time jump on a destination DC prematurely accelerates the garbage collection of deleted objects on a destination DC
The CONTOSO.COM domain contains two DCs in the same domain. Tombstone lifetime = 60 days. Strict replication is enabled on both DCs. DC1 and DC2 replicate every 24 hours. DC1 originates deletes on a daily basis. The reference time source used by DC1 (but not DC2) rolls forward to calendar year 2039, causing DC2 to also adopt a system time in CY2039 which causes DC1 to prematurely purge objects deleted today from its deleted objects container. DC2 meanwhile originates changes to attributes on users, computers and groups that are live on DC2 but deleted and now prematurely garbage collected on DC1. DC1 will log error 8606 when it next inbound-replicates changes for the premature deleted objects.
52
DRAFT V9.3
accidentally deleted. A system state backup made at the cusp of TSL in the past is auth restored on DC2. The backup contains objects that are live on DC2 but already deleted and garbage collected DC1.
o o o o o o
Resolve replication failures within TSL Ensure Strict Replication Consistency is enabled Ensure large jumps in system time are blocked via registry key or policy Don't remove replication quarantine with "allowDivergent" setting without removing LOs first Don't restore system backups that are near TSL number of days old Don't bring DCs back online that haven't replicated within TSL
53
DRAFT V9.3
3. Open Microsoft Excel. 4. Click the Office button (File menu for versions prior to Excel 2010), click Open, navigate to showrepl.csv, and then click Open. 5. Hide or delete column A and column G, as follows: To hide a column, right click the column header then click Hide To delete a column, right click the column header then click Delete 6. Select a column that you want to hide or delete. 7. Select row 1 beneath the column heading row. On the View tab, click Freeze Panes, and then click Freeze Top Row. 8. Select any cell. On the Data tab, click Filter.
54
DRAFT V9.3
9. In the Last Failure Status column, click the filter down arrow, deselect the value 0. You now have a filtered report showing only the replication failures. Deselect all values except value 8606 to display just the replication failures caused by lingering objects..
Use AD Replication report and repadmin to determine the scope of the problem
The list of DCs in the Source DC column contain lingering objects when the replication report is filtered on value 8606 in column K. This display gives you the following information: DC containing lingering objects Partition where lingering objects exist
This is two of the three data points needed for repadmin /removelingeringobjects.
Important: Repadmin /RemoveLingeringObjects DestinationDC SourceDC_Guid DirectoryPartition (Optional switch /advisory_mode)
DC containing lingering objects = DestinationDC Partition where lingering objects exist = DirectoryPartition
A common misconception is that the list you have just generated is comprehensive and once you remove lingering objects from the DCs in the Source DC column your job is done. However, that may not be the case as this is only a list of DCs where replication is currently blocked. It is entirely possible that once you remove lingering objects from these DCs, replication will begin failing with these now-clean DCs as the destination and a new list of DCs as the source. Once you have a list of DCs containing lingering objects
To save time, act as if all DC / GCs contain lingering objects for the partition in question. Tip:
55
DRAFT V9.3
Run repadmin /removelingeringobjects in /advisory_mode first to see what objects are considered lingering on the DC. Event ID 1946 is logged once per lingering objects on the destination DCs Directory Services event log.
Increase the size of the Directory Services event log prior to running repadmin /removelingeringobjects with the /advisory_mode option. It is common to see the event log wrap when this command is run and the event log is the default size.
Tip:
You can also use ldifde and replfix.exe to generate a list of lingering objects. This process is describe in Lesson 4.
56
DRAFT V9.3
where DestinationDC is the DNS name or IP address of the domain controller that has outdated objects; and, SourceDC_Guid is the domain controllers object GUID. To obtain the objects GUID, do one of the following.
57
DRAFT V9.3
o -or-
Use Repadmin /showrepl SourceDCName. The domain controllers object GUID is listed as domain controller object GUID.
In Active Directory Sites and Services, find the Source domain controller under Sites\<the domain controllers Site>\ Servers\ DCname\ NTDS Settings\ Properties. Look in the DNS Alias box. The GUID prior to _msdcs.forestrootname.com is the domain controllers Object GUID. Repadmin only needs the GUID. Omit _msdcs.forestrootname.com from the Repadmin syntax. DirectoryPartition is the distinguished name of the directory partition from which to remove outdated objects. 2. Repeat the procedure for the following partitions, as needed. Domain directory partition dc=DomainName,dc=ForestRootDomainName o Configuration directory partition cn=configuration,dc=DomainName,dc=ForestRootDomainName Application directory partition or partitions cn=ApplicationDirectoryPartitionName,dc=DomainName,dc=ForestRootDomainName Schema directory partition cn=schema,cn=configuration,dc=ForestRootDomainName
58
DRAFT V9.3
Object:DC= <dn of lingering object> Object GUID:<objectGUID> Source DC: <dc guid> ._msdcs.<forest root>
Event ID 1939: NTDS Replication. Lingering Object Removal has executed successfully on this domain controller. All objects on this domain controller have had their existence verified on the source domain controller. Objects that had been deleted and garbage collected from the source domain controller were DELETED from this domain controller. Previous event logs list all such objects. Source DC: <source DC guid> ._msdcs.<forest root> Lingering Objects Deleted 23
Tip:
Repldiag is by far the easiest and fastest way to remove lingering objects. The other methods are important to know when repldiag is not an option.
Help
Replication topology analyzer. Written by kenbrumf@microsoft.com Version: 2.0.3397.24022 Command Line Options: ReplDiag [/Save] [/CheckForStableReplTopology] [/RemoveLingeringObjects] [/ImportData:<FileName.XML>] [/ShowTestCases] [/OverrideDefaultReferenceDC:"dc=namingcontext,dc=com":domainController.namingcontext.com] /UseRobustDCLocation -Query each and every DC for a list of DCs in forest. Ensures replication instability does not cause any to be missed. /Save -Save out the data from the current environment to XML. File is named "ReplicationData.xml" and is located in the current directory. /ImportData -Import the XML that was saved during a prior execution of this utility. Run one of the other options to do something with the data. /ShowTestCases -Show detail about test cases. Lingering Object Cleanup: /RemoveLingeringObjects -Use the current forest topology to clean all the
59
Troubleshooting Lingering Objects Lesson 4: Lingering Object Removal NCs in the forest. WILL NOT CLEAN WINDOWS 2000 SYSTEMS!!! /AdvisoryMode -Check for lingering objects only, do not clean. Must be used with /RemoveLingeringObjects. /OverrideDefaultReferenceDC -Specify reference DC for a naming context when when removing lingering objects, can be used multiple times for different NCs. Only functional if using /RemoveLingeringObjects. /OutputRepadminCommandLineSyntax -Output the command line syntax for repadmin. Only active in conjunction with /RemoveLingeringObjects. Example syntax: ReplDiag /Save - Collect the AD replication topology from the environment and save it. ReplDiag /ImportData:"ReplicationData.xml" - Load in previously collected data and check replication status. ReplDiag /RemoveLingeringObjects /OverrideDefaultReferenceDC:"cn=Configuration,dc=forestroot,dc=com":dc1.forestroot.com /OverrideDefaultReferenceDC:"dc=forestroot,dc=com":dc2.forestroot.com
DRAFT V9.3
Sample output
Repldiag.exe /save
60
DRAFT V9.3
repadmin /removelingeringobjects loncontosodc.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects loncontosodc.contoso.com 87ccb4f8-1057-4cfa-aed679b5626db9fd cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects loncontosodc.contoso.com 4009aef6-b279-43d2-82f64298f02505e8 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects loncontosodc.contoso.com b3ff6e2e-6025-4782-9d7b54b0431a374a cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com 87ccb4f8-1057-4cfa-aed679b5626db9fd dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com 4009aef6-b279-43d2-82f64298f02505e8 dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com b3ff6e2e-6025-4782-9d7b54b0431a374a dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com 87ccb4f8-1057-4cfa-aed679b5626db9fd dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com 4009aef6-b279-43d2-82f64298f02505e8 dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com b3ff6e2e-6025-4782-9d7b54b0431a374a dc=corp,dc=contoso,dc=com Reference NCs cleaned in 0h:0m:0s. Cleaning everything else against reference NCs. repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=forestdnszones,dc=contoso,dc=com repadmin /removelingeringobjects dalcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=forestdnszones,dc=contoso,dc=com repadmin /removelingeringobjects nycorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=forestdnszones,dc=contoso,dc=com repadmin /removelingeringobjects seacorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=forestdnszones,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects dalcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects nycorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects seacorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 cn=configuration,dc=contoso,dc=com repadmin /removelingeringobjects 5thwardcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=contoso,dc=com repadmin /removelingeringobjects dalcorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=contoso,dc=com repadmin /removelingeringobjects nycorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=contoso,dc=com repadmin /removelingeringobjects seacorpdc.corp.contoso.com a29bbfda-8425-4cb9-9c668e07d505a5c6 dc=contoso,dc=com repadmin /removelingeringobjects dalcorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects nycorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects seacorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=domaindnszones,dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects loncontosodc.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects dalcorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects nycorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=corp,dc=contoso,dc=com repadmin /removelingeringobjects seacorpdc.corp.contoso.com 9653cb84-7aa2-4a59-ab46382e5dc1d3a8 dc=corp,dc=contoso,dc=com All NCs cleaned in 0h:0m:0s.
61
DRAFT V9.3
This output can also be viewed in Excel: Copy commands to a text file. Modify the text file to include only the command portion of the output. Then open up the text file in Exel. (space delimited)
/UseRobustDCLocation
Query each and every DC for a list of DCs in forest. Ensures replication instability does not cause any to be missed. Weve had cases where we clean up lingering objects in the forest but do to an AD topology problem some DCs were not cleaned up. This option is almost always recommended if you want it to do a thorough job.
62
DRAFT V9.3
Remove Lingering Objects Using Replfix Remove Lingering Object using LDP or Script
Removing Lingering Objects in Windows 2000
Unfortunately, Windows 2000 provides no easy way to detect and remove lingering objects. A supported method to delete these objects is documented in MSKB 314282: Lingering Objects May Remain After You Bring an Out-of-Date Global Catalog Server Back Online In Windows 2000 SP3 (and in the post-SP2 hot fix), enhancements were made that allow an administrator to enable strict replication. This will help identify lingering objects and prevent them from replicating. However, lingering objects will not be detected unless an attribute on the object is changed.
Even though this method was first used for Windows 2000, it is still sometimes needed in certain scenarios.
Note:
Tip:
Un-hosting a partition
It is sometimes necessary to remove a partition from the database of a DC temporarily. Repadmin includes a /rehost option that allows you to do this, but the /unhost option allows you to exercise more control over the procedure. Take note that /unhost only allows you to remove a read-only copy of the partition. With the exception of application partitions, you cannot remove a writable copy of a partition from a DC without using DCPROMO.
Repadmin /?:unhost Remove a specific read-only partition from a GC. [SYNTAX] /unhost DSA <Naming Context> Repadmin /unhost ContosoDC1 dc=corp,dc=contoso,dc=com
63
DRAFT V9.3
Event ID 1659 indicates the status of the un-host operation. Do not re-add the partition until event ID 1660 is logged in the Directory Services event log.
Warning: The re-host operation may fail with error 8339 if you attempt to re-add the partition too soon after the un-host.
Disable KCC connection translation so that KCC doesnt remove our temporary replication connection:
Repadmin /options ContosoDC1 +disable_ntdsconn_xlate
Then add a replication connection for the configuration partition of the server we want to source the partition from:
Repadmin /add <Naming Context> <Dest DSA> <Source DSA> [/readonly] [/selsecrets] <Source DSA> The source DSA must be specified by fully qualified computername. repadmin /add cn=configuration,dc=contoso,dc=com ContosoDC1.contoso.com LONEMEADC.Emea.contoso.com One-way replication from source:LONEMEADC.Emea.contoso.com to dest:ContosoDC1.contoso.com established.
Add a replication connection to the server for the domain partition that we need to source from (/readonly is specified if the partition is a GC non-writable
partition /selsecrets needs to be specified if the destination DC is an RODC):
64
DRAFT V9.3
If you need to replicate the other way, then just reverse the order of the server names in the commands. To begin a normal sync of the partition using the new replication connection:
Repadmin /replicate <Dest_DSA_LIST> <Source DSA_NAME> <Naming Context> [/force] [/async] [/full] [/addref] [/readonly] repadmin /replicate ContosoDC1.contoso.com LONEMEADC.Emea.contoso.com dc=emea,dc=contoso,dc=com /readonly
To begin a full sync of that partition using the new replication connection:
repadmin /replicate ContosoDC1.contoso.com LONEMEADC.Emea.contoso.com dc=emea,dc=contoso,dc=com /readonly /full
Sync from LONEMEADC.Emea.contoso.com to ContosoDC1.contoso.com completed successfully.
Turn KCC connection translation back on when you no longer need the connection:
Repadmin /options ContosoDC1 -disable_ntdsconn_xlate
DSASTAT
Dsastat can be used to compare the number of objects that exist on two domain controllers. However, it cannot report on which objects exist on one and not the other. Likewise, it cannot make an intelligent determination about the differences. Replication latency or other factors might result in valid cases where an object exists but has not replicated out. Some objects are set to not replicate (like the Universal group membership cache). For this reason, DSASTAT can only be used as a guideline for comparisons between naming contexts hosted on different domain controllers.
65
DRAFT V9.3
context. In this case, the global catalog might replicate from another global catalog. This would return the object you were trying to delete. A better solution is to determine whether the object exists on all global catalogs. If it does not, remove the global catalog function from all servers that contain the object. Then reinstate the global catalog function on all of them, and let a clean copy of the directory replicate in. In larger environments, removing and reinstating the global catalog function might be undesirable and prohibited. Applications such as Microsoft Exchange Server depend on the global catalog to operate. Moreover, the additional traffic incurred as the domains re-replicate into the global catalog might be undesirable. In this case, use the post-SP2 hot fix and process described in the following article. MSKB 314282: Lingering Objects May Remain After You Bring an Out-of-Date Global Catalog Server Back Online
66
DRAFT V9.3
The next section examines what to do with intended and unintended objects.
Unintended Objects
Use Repadmin to delete these lingering objects (see below).
justin.turner@microsoft.com Microsoft Corporation
67
DRAFT V9.3
Intended Objects
Change the replication consistency on the inbound domain controller. The object will be reanimated on this domain controller. When using this method, the following things should be considered. After the object has been reanimated and replicated into the domain controller, it will replicate out to the domain controllers other partners. It is not likely that the other partners will have the object, and inbound replication will be blocked until the consistency setting is changed. This might result in the lingering object or re-animation moving throughout the domain. To animate the object fully, you might have to .chase. the replication failures throughout the forest. Use Eventcomb to monitor for the lingering object detection event. While the idea of chasing a lingering object around a forest might not seem like much fun, there is a good reason to do it. It is possible to turn off replication consistency in a domain or forest (using scripts or custom ADM files with Group Policy). However, this could have some unwanted side effects: for example, replication would be blocked for the first lingering object.
68
DRAFT V9.3
Practice exercises are performed on physical and virtual machines on one computer per participant. To complete the exercises, your computer hardware and software must be configured as described in this section. For additional details, refer to the Classroom Setup Guide that accompanies this course.
Critical: Lab sessions that accompany this course use a preconfigured virtual machine environment. If you start or modify VMs in any way prior to use in lab exercises, exercise tasks and steps will not work as intended. DO NOT start or modify any VM until instructed to do so in the lab exercises. Preconfigured VMs use lab environment scripts to complete certain steps at first launch based on the computer name entered in mini-setup. Failure to enter computer names specified in the lab exercises exactly as shown will incorrectly configure VMs, which will cause lab exercise tasks and steps to fail.
69
DRAFT V9.3
Lab Sessions
This manual includes the following lab sessions. Each lab includes step-by-step instructions to complete the exercises. You can use the problem solving lab exercises in your workbook to challenge your understanding of course material and refer to the Lab Manual for detailed steps if needed.
70
DRAFT V9.3
Hardware
Practice exercises assume that all lab hardware is listed on the Hardware Compatibility List (HCL) as compatible with operating systems and applications described later in this section. The following table describes minimum hardware requirements for practice exercises.
Table 6: Minimum Hardware Requirements
Minimum System Requirements Computer/Processor Operating System Memory Storage Display Peripherals Computer with a 2.4 GHz processor or higher (If available, disable hyperthreading and enable hardware virtualization) <Host OS>; see Classroom Setup Guide for details 4 GB RAM 160 GB hard drive CD or DVD drive (DVD drive recommended) Super VGA (800 x 600) or higher-resolution monitor with 256 color (Recommended: 1024 x 768 with 16-bit or higher color) Microsoft Mouse or compatible pointing device Microsoft or compatible keyboard
Software
Operating systems and applications listed in the following table must be installed on all computers.
Table 7: Lab Computer requirements
Software Microsoft Windows 7, Enterprise Edition Current Microsoft Windows 7, Enterprise Edition Service Pack 1 and Critical Updates Office 2010 Professional Microsoft Office 2010 OneNote Current Office 2010 Service Pack 1 and Critical Updates Microsoft .NET Framework Version 2.0 Current .NET Framework 2.0 Service Pack and Critical Updates Microsoft .NET Framework Version 3.0 Current .NET Framework 3.0 Service Pack and Critical Updates
Retail
Retail
71
DRAFT V9.3
Version tested and notes Retail
Software Current Adobe Reader Version Current Adobe Reader Critical Updates
Network Layout
The following figure illustrates the lab network. The lab network must be isolated from production networks.
Figure 3: Network Layout
72
DRAFT V9.3
For example, participant computer 1 in the Rio Grande classroom in Las Colinas Building 2 would be named LC2-1693-1 or LC2-1693-1A (see table). Replace x in IP address with the classroom number or any representative number that is unique on the overall classroom subnet and reference this number in all lab exercises.
This computer naming convention eliminates potential issues when multiple classrooms are connected to the same subnet during classroom configuration or course delivery.
Important:
Computer Name <Host>- Instr-1 <Host>-Instr-2 <Host>-1 <Host>-2 <Host>-3 <Host>-4 <Host>-5 <Host>-6 <Host>-7 <Host>-8 <Host>-9 <Host>-10 <Host>-11 <Host>-12 <Host>-13 <Host>-14 <Host>-15 <Host>-16
IP Address 172.168.1.200 172.168.x.201 172.168.x.101 172.168.x.102 172.168.x.103 172.168.x.104 172.168.x.105 172.168.x.106 172.168.x.107 172.168.x.108 172.168.x.109 172.168.x.110 172.168.x.111 172.168.x.112 172.168.x.113 172.168.x.114 172.168.x.115 172.168.x.116
Preferred DNS Server 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200 192.168.x.200
Role Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server Stand-alone Server
73
DRAFT V9.3
Note:
Windows Server 2008 DVD media or installation ISO file in <path>. Virtual machines installed or created on the computer: o o o <VMName>: <OS | Role | description> <VMName>: <OS | Role | description> <VMName>: <OS | Role | description>
Course files located in the C:\Labfiles and C:\VS folders on your computer or accessible from a network share on the instructor computer.
The following user accounts and passwords must be configured on the physical computer and in all virtual machines: Administrative username and password
Administrator Local Administrators Password: LS1setup!
Replace n in Studentn with the number assigned to your classroom computer by the instructor.
Domain Membership
Your physical computer is not joined to a domain. Lab exercises may require you to join the following virtual domain(s): Contoso.com
74
DRAFT V9.3
Virtual machines joined to a virtual domain require group and account configurations as shown in the following table.
Table 9: Groups and Accounts
Group Domain Groups Domain Administrators Domain Users Local Groups Administrators Users
Members
Administrator Studentn
75
DRAFT V9.3
Use the Host key in combination with other keys for specific functions as described in the following table.
Key Combination Host Key+Delete Host Key+C Host Key+A Host Key+I Host Key+V Host Key+H Host Key+Enter
Description Sends Ctrl+Alt+Delete functionality to the virtual machine operating system. Connects the Remote Control or VMRC to the VMRC server. Switches the Remote Control or VMRC to the Administrator Display. Displays connection information. Sets the virtual machine so that the guest operating system cannot be manipulated. You can only view the virtual machine window. Displays the control to set the Host key. Switches the virtual machine window to full-screen display. This option is available only when you connect to a virtual machine using the VMRC client. Switches to the previous virtual machine. This option is available only when you connect to a virtual machine using the VMRC client. Switches to the next virtual machine. This option is available only when you connect to a virtual machine using the VMRC client.
Tip:
As shown in the preceding table, you can use Host Key+Delete to send the functionality of the Ctrl+Alt+Delete keyboard shortcut to a guest operating system running in a virtual machine. You can also use Send Ctrl+Alt+Del from the Remote Control menu of either the VMRC or Remote View page.
If a pointer is captured by a virtual machine on which Virtual Machine Additions is not installed, the virtual machine must release it before you can use the mouse on the host
76
DRAFT V9.3
operating system or in another virtual machine window. You can use the Host key to return the use of the mouse to the host operating system.
77
DRAFT V9.3
Scenario
You are assisting a customer who is having issues with
Exercises may also require files located in the C:\Labfiles folder on your computer or accessible from a network share on the instructor computer.
The following user accounts and passwords must be configured on the physical computer and in all virtual machines:
78
DRAFT V9.3
Administrative username and password Username: Administrator
Member of: Local Administrators
Password:
LS1Setup!
Password:
LS1Setup!
Replace n in Usern with the number assigned to your classroom computer by the instructor.
Domain Membership
Lab exercises may require virtual machines to be joined to the following virtual domain(s): Contoso.com
Virtual machines joined to a virtual domain require group and account configurations as shown in the following table.
Table 11. Groups and Accounts
Group Domain Groups Domain Administrators Domain Users Local Groups Administrators Users
Members
Administrator Usern
Scenario
You are assisting a customer that is having issues
Task Detailed Steps Complete these steps by connecting to DC1
79
DRAFT V9.3
Detailed Steps 1. Step. a. Sub-step. Setting | Parameter Item 1 Item 2 b. Sub-step. c. Sub-step. 2. Step. Value
Task Description
Sub-step
Task Description
Review
1. <Question> Answer
80
DRAFT V9.3
2. <Question> Answer
Scenario
You are assisting a customer that is having issues <add scenario here>.
Task Detailed Steps Complete these steps by connecting to <VM name> Task Description 3. Step. a. Sub-step. Setting | Parameter Item 1 Item 2 b. Sub-step. c. Sub-step. 4. Step. Task Description 3. Step. a. Sub-step. b. Edit the registry as shown below:
Key Name: HKEY_CURRENT_USER\Software\Microsoft\PCHealth\ErrorReportin g\DW Value: Name: DWAllQueuesHeadless Type: REG_DWORD Data: 0x1
Value
Sub-step
81
DRAFT V9.3
Task Description
Review
3. <Question> Answer
4. <Question> Answer
82
DRAFT V9.3
Scenario
You are assisting a customer who is having issues with
Scenario
You are assisting a customer that is having issues <add scenario here>.
Tasks
<Define starting conditions, including virtual machines and lab files required>. 1. <Task>. a. <Step>. i. <Sub-step>. ii. <Sub-step>. b. <Step>. 2. <Task>.
83
DRAFT V9.3
Value
b. <Step>.
Review
1. <Question> Answer
2. <Question> Answer
Scenario
You are assisting a customer that is having issues <add scenario here>.
Tasks
<Define starting conditions, including virtual machines and lab files required>.
84 2011 Microsoft Corporation. All rights reserved.
DRAFT V9.3
4. <Task>. a. <Step>. i. <Sub-step>. ii. <Sub-step>. b. <Step>. 5. <Task>.
Setting | Parameter Item 1 Item 2
Value
b. <Step>.
Review
3. <Question> Answer
4. <Question> Answer
85
DRAFT V9.3
Scenario
You are assisting a customer who is having issues with
Scenario
You have completed recovering files from a back up and now need to restore the files.
Tasks
<Define starting conditions, including virtual machines and lab files required>. 1. <Task>. a. <Step>. b. <Step>.
Setting | Parameter Item 1 Item 2 Value
2. <Task>.
86
DRAFT V9.3
Sample solution
Your result should look something like the Sample in <Lab Title>, <Exercise Title> in the Lab Manual that accompanies this course. For step by step instructions, see <Lab Title>, <Exercise Title> in the Lab Manual that accompanies this course.
Review
1. <Question> Answer
2. <Question> Answer
Scenario
You have received email from your manager requesting a maintenance action.
Tasks
1. Read Email from your manager explaining the situation. <Add email text here> 2. Review supporting documents in <local path>: a. Company organization chart. b. Company ____ data. c. Report on problems with the ____ system.
87
DRAFT V9.3
3. Open the VM containing the company system and resolve the issues.
Sample solution
Your result should look something like the Sample in <Lab Title>, <Exercise Title> in the Lab Manual that accompanies this course. For step by step instructions, see <Lab Title>, <Exercise Title> in the Lab Manual that accompanies this course.
Review
1. <Question> Answer
2. <Question> Answer
88
DRAFT V9.3
Scenario
You are assisting a customer who is having issues with
89
Troubleshooting Lingering Objects Lab 5: Abandoned Object and Abandoned Deleted object remediation
DRAFT V9.3
Scenario
You are assisting a customer who is having issues with
90
DRAFT V9.3
Scenario
You are assisting a customer who is having issues with
91
DRAFT V9.3
92
DRAFT V9.3
93
DRAFT V9.3
94
DRAFT V9.3
95
DRAFT V9.3
96
DRAFT V9.3
97
DRAFT V9.3
98