NTDsutil 
			
			
			
			
			This page is from Microsoft
			Updated: January 21, 2005
			addlink
			Ntdsutil.exe is a command-line tool that provides management 
			facilities for Active Directory. Use Ntdsutil.exe to perform 
			database maintenance of Active Directory, manage and control single 
			master operations, and remove metadata left behind by domain 
			controllers that were removed from the network without being 
			properly uninstalled. This tool is intended for use by experienced 
			administrators.
To view the command syntax, click a command:
			
			Authoritative restore
			
				
				Restores domain controllers to a specific point in time and 
				marks objects in Active Directory as being authoritative with 
				respect to their replication partners. In forests that have a 
				functional level of Windows Server 2003 or Windows Server 2003 
				interim, this option also restores backlinks for links that were 
				created after the functional level was raised. (For example, the 
				member attributes of groups to which a restored user object 
				belongs are updated.) On domain controllers that are running the 
				version of Ntdsutil that is included in Windows Server 2003 
				Service Pack 1 (SP1), authoritative restore creates an 
				LDAP Data Interchange Format (LDIF) file that can be used to 
				restore backlinks for links that were created before the 
				functional level was raised.
				At the authoritative restore: 
				prompt, type any of the parameters listed under Syntax.
			 
			Syntax
			
				{create ldif file(s) from %s|restore database|restore 
				database verinc %d|restore object %s|restore 
				object verinc %d|restore subtree %s|restore 
				subtree %s verinc %d}
			Parameters
			
				
					
						
							create ldif file(s) from %s
						
							Available in the version of Ntdsutil that is 
							included with Windows Server 2003 SP1. This option 
							creates an LDIF file of link updates from the 
							Ntdsutil-generated text file that is named in %s. 
							This file can be used to update backlinks on objects 
							in a domain other than the domain of the restored 
							object. For example, this file can be used to 
							restore group membership for a user where the group 
							belongs to a different domain than the user.
					 
					
						
							restore database
						
							Marks the entire Ntds.dit (both the domain and 
							configuration directory partitions held by the 
							domain controller) as authoritative. The schema 
							cannot be authoritatively restored.
					 
					
						
							restore database verinc %d
						
							Marks the entire Ntds.dit (both the domain and 
							configuration directory partitions held by the 
							domain controller) as authoritative and increments 
							the version number by %d times the number of 
							days since backup. Use this option only to 
							authoritatively restore over a previous, incorrect, 
							authoritative restore, such as an authoritative 
							restore from a backup that contains the problem you 
							want to restore.
					 
					
						
							%d
						
							A numeric value that overrides the default value of 
							100,000. The version number of the object or 
							database being authoritatively restored will be 
							increased by this value times the number of days 
							since backup.
					 
					
						
							restore object %s
						
							Marks object %s as being authoritative. When 
							you use the version of Ntdsutil that is included 
							with Windows Server 2003 SP1, this option also 
							generates a text file that contains the 
							distinguished name of the restored object and an 
							LDIF file that can be used to restore backlinks for 
							objects that are being authoritatively restored 
							(such as group memberships of users).
					 
					
						
							restore object %s verinc %d
						
							Marks object %sas being authoritative and 
							updates links as described in restore object 
							%s, and also increments the version number 
							by %d times the number of days since backup. 
							Use this option only to authoritatively restore over 
							a previous, incorrect, authoritative restore, such 
							as an authoritative restore from a backup that 
							contains the problem that you want to restore.
					 
					
						
							restore subtree %s
						
							Marks subtree %s (and all children of the 
							subtree) as being authoritative. When you use the 
							version of Ntdsutil that is included with 
							Windows Server 2003 SP1, this option also generates 
							a text file that contains the distinguished names of 
							the restored objects and an LDIF file that can be 
							used to restore backlinks for objects that are being 
							authoritatively restored (such as group memberships 
							of users).
					 
					
						
							restore subtree %s verinc %d
						
							Marks subtree %s (and all children of the 
							subtree) as being authoritative and updates links as 
							described in restore subtree %s, and 
							also increments the version number by %d 
							times the number of days since backup. Use this 
							option only to authoritatively restore over a 
							previous, incorrect, authoritative restore, such as 
							an authoritative restore from a backup that contains 
							the problem that you want to restore.
					 
					
						
							%s
						
							An alphanumeric variable, either a distinguished 
							name for a restored object or subtree, or a file 
							name for a text file that is used to create an LDIF 
							file.
					 
					
						
							quit
						
							Takes you back to the previous menu or exits the 
							utility.
					 
					
						
							? or help
						
							Displays help at the command prompt.
					 
				 
			 
			Remarks
			
				- When you are restoring a domain controller by using backup 
				and restore programs, such as Ntbackup or those from other 
				providers, the default mode for the restore is nonauthoritative. 
				This means that the restored server is brought up to date with 
				its replicas through the normal replication mechanism. For 
				example, if a domain controller is restored from a backup tape 
				that is two weeks old, when you restart it, the normal 
				replication mechanism brings it up to date with respect to its 
				replication partners.
- You might need to perform an authoritative restore if an 
				administrator inadvertently deletes an organizational unit 
				containing a large number of users. If you restore the server 
				from tape, the normal replication process would not restore the 
				inadvertently deleted organizational unit. Authoritative restore 
				allows you to mark the organizational unit as authoritative and 
				force the replication process to restore it to all of the other 
				domain controllers in the domain.
Return to Top
			 
			Configurable settings
			
				Aids in modifying the TTL of dynamic data stored in Active 
				Directory. At the configurable setting: prompt, type any 
				of the parameters listed under Syntax.
			Syntax
			
				{cancel changes|connections|list|set 
				%s to %s|show values}
			Parameters
			
				
					
						
							cancel changes
						
							Cancels the changes made, but not yet committed.
					 
					
						
							connections
						
							Invokes the server connections submenu.
					 
					
						
							list
						
							Lists the names of the supported configurable 
							settings.
					 
					
						
							set %s to %s
						
							Sets the configurable settings %s1 to the 
							value %s2.
					 
					
						
							show values
						
							Displays values of configurable settings.
					 
					
						
							%s
						
							An alphanumeric variable, such as a domain or domain 
							controller name.
					 
					
						
							quit
						
							Takes you back to the previous menu or exits the 
							utility.
					 
					
						
							? or help
						
							Displays help at the command prompt.
					 
				 
			 
			Return to Top
			 
			Domain management
			
				Allows administrators who are members of the Enterprise 
				Administrators group to prepare cross-reference and server 
				objects in the directory. At the domain management: 
				prompt, type any of the parameters listed under Syntax.
			Syntax
			
				{add nc replica %s %s|connections|create 
				nc %s %s|remove nc replica %s %s|list|list 
				nc information %s|list nc replicas %s|precreate
				%s %s|delete NC %s|select operation 
				target|set nc reference domain %s %s|set nc 
				reference domain %s %s|set nc replicate 
				notification delay %s %d %d}
			Parameters
			
				
					
						
							add nc replica %s %s
						
							Adds the domain controller %s2 to the replica 
							set for the Non-Domain Naming Context %s1. If
							%s2 is not specified, the domain controller 
							that you are connected to is used as the default.
					 
					
						
							connections
						
							Invokes the Server connections submenu.
					 
					
						
							create nc %s %s
						
							Creates the Non-Domain Naming Context %s1, on 
							the DC %s2. If %s2 is not specified, 
							then the currently connected domain controller is 
							used. To not specify an argument enter (NULL).
					 
					
						
							remove nc replica %s %s
						
							Removes the domain controller %s2 from the 
							replica set for the Non-Domain Naming Context %s1. 
							If %s2 is not specified, the currently 
							connected to domain controller is used.
					 
					
						
							list
						
							Lists all the naming contexts that exist in the 
							enterprise, the schema and configuration naming 
							contexts, as well as all domain naming contexts.
					 
					
						
							list nc information %s
						
							Prints out the reference domain, and replication 
							delays for the Non-Domain Naming Context.
					 
					
						
							list nc replicas %s
						
							Prints the list of domain controllers in the replica 
							set for the Non-Domain Naming Context %s. 
							Remember that this is the list of domain controllers 
							to eventually hold replicas of the Non-Domain Naming 
							Contexts, and that these replicas may not 
							necessarily be fully replicated yet.
					 
					
						
							precreate %s %s
						
							Creates a cross-reference object for the domain 
							%s1 allowing a server named %s2 to be 
							promoted as the domain controller for that domain. 
							The domain name must be specified by using a fully 
							distinguished name, and the server must be named by 
							using the fully qualified DNS name.
					 
					
						
							delete nc %s
						
							Removes the Non-Domain Naming Context %s. 
							Before removing an Non-Domain Naming Context all the 
							replicas must be removed and their removal must 
							replicate back to the domain naming operations 
							master.
					 
					
						
							select operation target
						
							Invokes the Select operation target submenu.
					 
					
						
							set nc reference domain %s %s
						
							Sets the reference domain of the Non-Domain Naming 
							Context %s1 to %s2. The domain %s2 
							should be specified in a domain's DNS name format. 
							Example: widgets.microsoft.com.
					 
					
						
							set nc replicate notification delay %s %d 
							%d
						
							Sets the Non-Domain Naming Context %s's notification 
							delays to %d1 and %d2 for the delay between 
							notifying the first domain controller of changes and 
							the delay of notifying subsequent domain controllers 
							of changes respectively.
					 
					
						
							%s
						
							An alphanumeric variable, such as a domain or domain 
							controller name.
					 
					
						
							%d
						
							A numeric variable, such as replication delay time 
							periods.
					 
					
						
							quit
						
							Takes you back to the previous menu or exits the 
							utility.
					 
					
						
							? or help
						
							Displays help at the command prompt.
					 
				 
			 
			Return to Top
			 
			Files
			
				Provides commands for managing the directory service data and 
				log files. The data file is called Ntds.dit. At the files: 
				prompt, type any of the parameters listed under Syntax.
			Syntax
			
				{compact to %s|header|info|integrity|move 
				DB to %s|move logs to %s|recover|set 
				path backup %s|set path db %s|set 
				path logs %s|set path working dir %s}
			Parameters
			
				
					
						
							compact to %s (where %s 
							identifies an empty target directory) 
						
							Invokes Esentutl.exe to compact the existing data 
							file and writes the compacted file to the specified 
							directory. The directory can be remote, that is, 
							mapped by means of the net use command or 
							similar means. After compaction is complete, archive 
							the old data file, and move the newly compacted file 
							back to the original location of the data file. 
							ESENT supports online compaction, but this 
							compaction only rearranges pages within the data 
							file and does not release space back to the file 
							system. (The directory service invokes online 
							compaction regularly.)
					 
					
						
							header
						
							Writes the header of the Ntds.dit data file to the 
							screen. This command can help support personnel 
							analyze database problems.
					 
					
						
							info
						
							Analyzes and reports the free space for the disks 
							that are installed in the system, reads the 
							registry, and then reports the sizes of the data and 
							log files. (The directory service maintains the 
							registry, which identifies the location of the data 
							files, log files, and directory service working 
							directory.)
					 
					
						
							integrity
						
							Invokes Esentutl.exe to perform an integrity check 
							on the data file, which can detect any kind of 
							low-level database corruption. It reads every byte 
							of your data file; thus it can take a long time to 
							process large databases. Note that you should always 
							run Recover before performing an integrity check.
					 
					
						
							move DB to %s (where %s 
							identifies a target directory) 
						
							Moves the Ntds.dit data file to the new directory 
							specified by %s and updates the registry so 
							that, upon system restart, the directory service 
							uses the new location.
					 
					
						
							move logs to %s (where %s 
							identifies a target directory) 
						
							Moves the directory service log files to the new 
							directory specified by %s and updates the 
							registry so that, upon system restart, the directory 
							service uses the new location.
					 
					
						
							recover
						
							Invokes Esentutl.exe to perform a soft recovery of 
							the database. Soft recovery scans the log files and 
							ensures all committed transactions therein are also 
							reflected in the data file. The Windows 2000 Backup 
							program truncates the log files appropriately.Logs 
							are used to ensure committed transactions are not 
							lost if your system fails or if you have unexpected 
							power loss. In essence, transaction data is written 
							first to a log file and then to the data file. When 
							you restart after failure, you can rerun the log to 
							reproduce the transactions that were committed but 
							hadn't made it to the data file.
					 
					
						
							set path backup %s (where %s 
							identifies a target directory) 
						
							Sets the disk-to-disk backup target to the directory 
							specified by %s. The directory service can be 
							configured to perform an online disk-to-disk backup 
							at scheduled intervals.
					 
					
						
							set path db %s (where %s 
							identifies a target directory) 
						
							Updates the part of the registry that identifies the 
							location and file name of the data file. Use this 
							command only to rebuild a domain controller that has 
							lost its data file and that is not being restored by 
							means of normal restoration procedures.
					 
					
						
							set path logs %s (where %s 
							identifies a target directory) 
						
							Updates the part of the registry that identifies the 
							location of the log files. Use this command only if 
							you are rebuilding a domain controller that has lost 
							its log files and is not being restored by means of 
							normal restoration procedures.
					 
					
						
							set path working dir %s (where %s
							identifies a target directory) 
						
							Sets the part of the registry that identifies the 
							directory service's working directory to the 
							directory specified by %s.
					 
					
						
							%s
						
							An alphanumeric variable, such as a domain or domain 
							controller name.
					 
					
						
							quit
						
							Takes you back to the previous menu or exits the 
							utility.
					 
					
						
							? or help
						
							Displays help at the command prompt.
					 
				 
				Caution
			 
			
				- Incorrectly editing the registry may severely damage your 
				system. Before making changes to the registry, you should back 
				up any valued data on the computer.
Remarks
			
				- Active Directory is implemented on top of an indexed 
				sequential access method (ISAM) table manager. This is the same 
				table manager used by Microsoft Exchange Server, the file 
				replication service, the security configuration editor, the 
				certificate server, Windows Internet Name Service (WINS), and 
				other Windows components. The version of the database that 
				Windows 2000 and Windows Server 2003, Standard Edition use is 
				called extensible storage engine (ESENT).ESENT is a 
				transacted database system that uses log files to support 
				rollback semantics to ensure that transactions are committed to 
				the database. Ideally, data and log files should be located on 
				separate drives to improve performance and support recovery of 
				the data if a disk fails. 
- 
				
					ESENT provides its own tool for certain database file 
				management functions called Esentutl.exe, which is also 
				installed in the systemroot\System32 folder. Several of 
				the Ntdsutil file management commands invoke Esentutl, reducing 
				the need to learn the tool's command-line arguments. In the 
				cases where Ntdsutil invokes Esentutl, it brings up a separate 
				window configured with a large history so that you can scroll 
				back to see all of the Esentutl progress indicators.
				 Active Directory opens its files in exclusive mode. This 
				means the files cannot be managed while the system is operating 
				as a domain controller. To manage directory service files 
				- Start the computer.
- When the Starting Windows progress bar appears, press
				F8.
- From the Windows 2000 Advanced Options Menu, select
				Directory Services Restore Mode.
Note
			
				- Starting the computer in Directory Services Restore Mode 
				causes your domain controller to temporarily operate as a 
				stand-alone server. This causes some services to fail, 
				especially those that are integrated with the directory service. 
				When operating in this mode, the security accounts manager (SAM) 
				uses a minimal set of user and group definitions stored in the 
				registry. If your domain controller is not physically secure, 
				you should set the administrative password for the Directory 
				Services Restore Mode. 
Return to Top
			 
			LDAP policies
			
				Sets the LDAP administration limits for the Default-Query Policy 
				object. At the LDAP policies: prompt, type any of the 
				parameters listed under Syntax.
			Syntax
			
				{cancel changes|commit changes|connections|list|set
				%s to %s|show values}
			Parameters
			
				
					
						
							cancel changes
						
							Cancels any uncommitted modifications of the LDAP 
							administration limits to the default query policy.
					 
					
						
							commit changes
						
							Commits all modifications of the LDAP administration 
							limits to the default query policy.
					 
					
						
							connections
						
							Invokes the Server connections submenu.
					 
					
						
							list
						
							Lists all supported LDAP administration limits for 
							the domain controller.
					 
					
						
							set %s1 to %s2
						
							Sets the value of the LDAP administration limit 
							%s1 to the value %s2.
					 
					
						
							show values
						
							Shows the current and proposed values for the LDAP 
							administration limits.
					 
					
						
							%s
						
							An alphanumeric variable, such as a domain or domain 
							controller name.
					 
					
						
							quit
						
							Takes you back to the previous menu or exits the 
							utility.
					 
					
						
							? or help
						
							Displays help at the command prompt.
					 
				 
			 
			Remarks
			
				- The following table lists and describes the LDAP 
				administration limits, with default values noted in parentheses.
					
					
						| InitRecvTimeout | Initial receive time-out (120 seconds) |  
						| MaxConnections | Maximum number of open connections (5000) |  
						| MaxConnIdleTime | Maximum amount of time a connection can be idle (900 
						seconds) |  
						| MaxActiveQueries | Maximum number of queries that can be active at one 
						time (20) |  
						| MaxNotificationPerConnection | Maximum number of notifications that a client can 
						request for a given connection (5) |  
						| MaxPageSize | Maximum page size supported for LDAP responses (1000 
						records) |  
						| MaxQueryDuration | Maximum length of time the domain controller can 
						execute a query (120 seconds) |  
						| MaxTempTableSize | Maximum size of temporary storage allocated to 
						execute queries (10,000 records) |  
						| MaxResultSetSize | Maximum size of the LDAP Result Set (262144 bytes) |  
						| MaxPoolThreads | Maximum number of threads created by the domain 
						controller for query execution (4 per processor) |  
						| MaxDatagramRecv | Maximum number of datagrams that can be processed by 
						the domain controller simultaneously (1024) |  
 
- To ensure that domain controllers can support service level 
				guarantees, you need to specify operational limits for a number 
				of Lightweight Directory Access Protocol (LDAP) operations. 
				These limits prevent specific operations from adversely 
				impacting the performance of the server and also make the server 
				resilient to denial of service attacks.LDAP policies are 
				implemented by using objects of the class queryPolicy. Query 
				Policy objects can be created in the container Query Policies, 
				which is a child of the Directory Service container in the 
				configuration naming context. For example: CN=Query-Policies, 
				CN=Directory Service, CN=Windows NT, CN=Services (configuration 
				directory partition). A domain controller uses the following three mechanisms to 
				apply LDAP policies: 
					- A domain controller might refer to a specific LDAP 
					policy. The nTDSASettings object includes an optional 
					attribute queryPolicyObject, which contains the 
					distinguished name of a Query Policy.
- In the absence of a specific query policy being applied 
					to a domain controller, the domain controller applies the 
					Query Policy that has been assigned to the domain 
					controller's site. The ntDSSiteSettings object includes an 
					optional attribute queryPolicyObject, which contains the 
					distinguished name of a Query Policy.
- In the absence of a specific domain controller or site 
					Query Policy, a domain controller uses the default query 
					policy named Default-Query Policy.
- A Query Policy object includes the multivalued 
					attributes LDAPIPDenyList and LDAPAdminLimits. Ntdsutil 
					allows the administrator to set the LDAP administration 
					limits and IP Deny list for the Default-Query Policy object.
 
Return to Top
			 
			Metadata cleanup
			
				Cleans up metadata for failed domain controllers. When a failed 
				domain controller stores the only copy of one or more domains or 
				application directory partitions (also called "naming 
				contexts"), metadata cleanup also cleans up metadata for 
				selected domains or application directory partitions. When you 
				use the version of Ntdsutil.exe that is included with 
				Windows Server 2003 Service Pack 1 (SP1), metadata cleanup also 
				removes File replication service (FRS) connections and attempts 
				to transfer or seize any operations master roles that the 
				retired domain controller holds.
At the metadata cleanup: 
				prompt, type any of the parameters listed under Syntax.
			Syntax
			
				{connections|remove selected domain|remove 
				selected naming context|remove selected server|remove 
				selected server %s|remove selected server 
				%s1 on %s2|select operation target}
			Parameters
			
				Note
			
				- When you use the version of Ntdsutil.exe that is included 
				with Windows Server 2003 SP1, you can remove server metadata by 
				using the remove selected server %s or remove 
				selected server %s on %2 commands 
				without first using the Server connections and Select 
				operation target submenus.
				
					
						
							connections
						
							Invokes the Server connections submenu.
					 
					
						
							remove selected domain
						
							Removes the metadata associated with the domain 
							selected in the Select operation target 
							submenu.
					 
					
						
							remove selected naming context
						
							Removes the metadata associated with the Naming 
							Context selected in the Select operation target 
							submenu.
					 
					
						
							remove selected server
						
							Removes the metadata associated with the domain 
							controller selected in the Select operation 
							target submenu.
					 
					
						
							remove selected server %s
						
							In the version of Ntdsutil.exe that is included with 
							Windows Server 2003 SP1, removes directory and FRS 
							metadata for the disabled server %s from the 
							directory on localhost, and attempts to transfer or 
							seize any operations master roles held by server 
							%s to localhost.
					 
					
						
							remove selected server %s1 on 
							%s2
						
							In the version of Ntdsutil.exe that ships with 
							Windows Server 2003 SP1, connects to server %s2, 
							removes directory and FRS metadata for server %s1 
							from the directory on server %s2, and 
							attempts to transfer or seize any operations master 
							roles held by server %s1 to server %s2.
					 
					
						
							select operation target
						
							Invokes the Select operation target submenu.
					 
					
						
							quit
						
							Takes you back to the previous menu or exits the 
							utility.
					 
					
						
							? or help
						
							Displays help at the command prompt.
					 
				 
			 
			Remarks
			
				- 
				
					The directory service maintains various metadata for each 
				domain and server known to the forest. Normally, domains and 
				domain controllers are created by means of promotion using the 
				Active Directory Installation Wizard and are removed by means of 
				demotion using the same tool. You can invoke the Active 
				Directory Installation Wizard by typing dcpromo at the 
				command prompt. Promotion and demotion are designed to 
				correctly clean up the appropriate metadata. In the directory, 
				however, you might have domain controllers that were 
				decommissioned incorrectly. In this case, their metadata is not 
				cleaned up. For example, a domain controller has failed, and 
				rather than attempting to restore it, you decide to retire the 
				server. This leaves some information about the retired domain 
				controller in the directory. The general model of operation is 
				to connect to a server known to have a copy of the offending 
				metadata, select an operation target, and then delete the 
				metadata of the selected target. The version of Ntdsutil.exe 
				that is included with Windows Server 2003 SP1 can automatically 
				connect to a specified server and remove metadata for a 
				specified target in the same step. Caution 
					- Do not delete the metadata of existing domains and 
					domain controllers.
 
Roles
			
				Transfers and seizes operations master roles. At the roles: 
				prompt, type any of the parameters listed under Syntax.
			Syntax
			
				{connections|seize domain naming master|seize 
				infrastructure master|seize PDC|seize RID master|seize 
				schema master|select operation target|transfer 
				domain naming master|transfer infrastructure master|transfer 
				PDC|transfer RID master|transfer schema master}
			Parameters
			
				
					
						
							connections
						
							Invokes the Server connections submenu.
					 
					
						
							seize domain naming master
						
							Forces the domain controller to which you are 
							connected to claim ownership of the domain-naming 
							operations master role without regard to the data 
							associated with the role. Use only for recovery 
							purposes.
					 
					
						
							seize infrastructure master
						
							Forces the domain controller to which you are 
							connected to claim ownership of the infrastructure 
							operations master role without regard to the data 
							associated with the role. Use only for recovery 
							purposes.
					 
					
						
							seize PDC
						
							Forces the domain controller to which you are 
							connected to claim ownership of the PDC operations 
							master role without regard to the data associated 
							with the role. Use only for recovery purposes.
					 
					
						
							seize RID master
						
							Forces the domain controller to which you are 
							connected to claim ownership of the relative ID 
							master role without regard to the data associated 
							with the role. Use only for recovery purposes.
					 
					
						
							seize schema master
						
							Forces the domain controller to which you are 
							connected to claim ownership of the schema 
							operations master role without regard to the data 
							associated with the role. Use only for recovery 
							purposes.
					 
					
						
							select operation target
						
							Invokes the Select operation target submenu.
					 
					
						
							transfer domain naming master
						
							Instructs the domain controller to which you are 
							connected to obtain the domain-naming role by means 
							of controlled transfer.
					 
					
						
							transfer infrastructure master
						
							Instructs the domain controller to which you are 
							connected to obtain the infrastructure operations 
							master role by means of controlled transfer.
					 
					
						
							transfer PDC
						
							Instructs the domain controller to which you are 
							connected to obtain the PDC operations master by 
							means of controlled transfer.
					 
					
						
							transfer RID master
						
							Instructs the domain controller to which you are 
							connected to obtain the relative ID master role by 
							means of controlled transfer.
					 
					
						
							transfer schema master
						
							Instructs the domain controller to which you are 
							connected to obtain the schema operations master 
							role by means of controlled transfer.
					 
					
						
							quit
						
							Takes you back to the previous menu or exits the 
							utility.
					 
					
						
							? or help
						
							Displays help at the command prompt.
					 
				 
			 
			Remarks
			
				- Although Active Directory is based on a multimaster 
				administration model, some operations support only a single 
				master. For multimaster operations, conflict resolution ensures 
				that after the system finishes replicating, all replicas agree 
				on the value for a given property on a given object. However, 
				some data, for which adequate conflict resolution is not 
				possible, is key to the operation of the system as a whole. This 
				data is controlled by individual domain controllers called 
				operations masters. These domain controllers are referred to as 
				holding a particular operations master role.Following are the 
				five operations master roles, some are enterprise-wide and some 
				are per domain: 
					- Schema Operations Master. There is a single 
					schema operations master role for the entire enterprise. 
					This role allows the operations master server to accept 
					schema updates. There are other restrictions on schema 
					updates.
- Relative ID Master. There is one relative ID 
					master per domain. Each domain controller in a domain has 
					the ability to create security principals. Each security 
					principal is assigned a relative ID. Each domain controller 
					is allocated a small set of relative IDs out of a 
					domain-wide relative ID pool. The relative ID master role 
					allows the domain controller to allocate new subpools out of 
					the domain-wide relative ID pool.
- Domain-Naming Master. There is a single 
					domain-naming master role for the entire enterprise. The 
					domain-naming master role allows the owner to define new 
					cross-reference objects representing domains in the 
					Partitions container.
- PDC Operations Master. There is one primary 
					domain controller (PDC) operations master role per domain. 
					The owner of the PDC operations master role identifies which 
					domain controller in a domain performs Windows NT 4.0 PDC 
					activities in support of Windows NT 4.0 backup domain 
					controllers and clients using earlier versions of Windows.
- Infrastructure Master. There is one 
					infrastructure master role per domain. The owner of this 
					role ensures the referential integrity of objects with 
					attributes that contain distinguished names of other objects 
					that might exist in other domains. Because Active Directory 
					allows objects to be moved or renamed, the infrastructure 
					master periodically checks for object modifications and 
					maintains the referential integrity of these objects.
 
- An operations master role can only be moved by 
				administrative involvement; it is not moved automatically. 
				Additionally, moving a role is controlled by standard access 
				controls. Thus a corporation should tightly control the location 
				and movement of operations master roles. For example, an 
				organization with a strong IT presence might place the schema 
				role on a server in the IT group and configure its access 
				control list (ACL) so that it cannot be moved at all.
				Operations master roles require two forms of management: 
				controlled transfer and seizure. Use controlled transfer when you want to move a role from one 
				server to another, perhaps to track a policy change with respect 
				to role location or in anticipation of a server being shut down, 
				moved, or decommissioned. Seizure is required when a server that is holding a role 
				fails and you do not intend to restore it. Even in the case of a 
				server recovered from a backup, the server does not assume that 
				it owns a role (even if the backup tape says so), because the 
				server cannot determine if the role was legitimately transferred 
				to another server in the time period between when the backup was 
				made and the server failed and was recovered. The restored 
				server assumes role ownership only if a quorum of existing 
				servers is available during recovery and they all agree that the 
				restored server is still the owner. The Roles submenu in Ntdsutil is used to perform controlled 
				transfer and recovery of operations master roles. Controlled 
				transfer is simple and safe. Because the source and destination 
				servers are running, the system software guarantees that the 
				operations master role token and its associated data is 
				transferred atomically. Operations master role seizure is 
				equally simple but not as safe. You simply tell a particular 
				domain controller that it is now the owner of a particular role. Caution 
					- Do not make a server a role owner by means of seizure 
					commands if the real role holder exists on the network. 
					Doing this could create irreconcilable conflicts for key 
					system data. If an operations master role owner is 
					temporarily unavailable, do not make another domain 
					controller the role owner. This could result in a situation 
					where two computers function as the role owner, which might 
					cause irreconcilable conflicts for key system data.
 
Return to Top
			 
			Security account management
			
				Manages security identifiers (SIDs). At the security account 
				management: prompt, type any of the parameters listed under
				Syntax.
			Syntax
			
				{check duplicate SID|cleanup duplicate SID|connect 
				to server %s|log file %s}
			Parameters
			
				
					
						
							check duplicate SID
						
							Checks the domain for any objects that have 
							duplicate security identifiers.
					 
					
						
							cleanup duplicate SID
						
							Deletes all objects that have duplicate security 
							identifiers and logs these entries into the log 
							file.
					 
					
						
							connect to server %s
						
							Connects to server, NetBIOS name or DNS host name.
					 
					
						
							log file %s
						
							Sets the log file to %s. If a log file is not 
							explicitly set, the log file defaults to Dupsid.log.
					 
					
						
							%s
						
							An alphanumeric variable, such as a domain or domain 
							controller name.
					 
					
						
							quit
						
							Takes you back to the previous menu or exits the 
							utility.
					 
					
						
							? or help
						
							Displays help at the command prompt.
					 
				 
			 
			Remarks
			
				- Each security account (users, groups, and computers) is 
				identified by a unique security identifier (SID). Use a SID to 
				uniquely identify a security account and to perform access 
				checks against resources, such as files, file directories, 
				printers, Exchange mailboxes, Microsoft SQL server databases, 
				objects stored in Active Directory, or any data that is 
				protected by the Windows Server 2003, Standard Edition security 
				model.A SID is made up of header information and a set of 
				relative identifiers that identify the domain and the security 
				account. Within a domain, each domain controller is capable of 
				creating accounts and issuing each account a unique security 
				identifier. Each domain controller maintains a pool of relative 
				IDs that is used in the creation of security identifiers. When 
				80 percent of the relative ID pool is consumed, the domain 
				controller requests a new pool of relative identifiers from the 
				relative ID operations master. This ensures that the same pool 
				of relative IDs is never allocated to different domain 
				controllers and prevents the allocation of duplicate security 
				identifiers. However, because it is possible (but rare) for a 
				duplicate relative ID pool to be allocated, you need to identify 
				those accounts that have been issued duplicate security 
				identifiers so that you prevent undesirable application of 
				security. One cause of duplicate relative ID pools is when the 
				administrator seizes the relative ID master role while the 
				original relative ID master is operational but temporarily 
				disconnected from the network. In normal practice, after one 
				replication cycle, the relative ID master role is assumed by 
				just one domain controller, but it is possible that before the 
				role ownership is resolved, two different domain controllers 
				might each request a new relative ID pool and be allocated the 
				same relative ID pool. 
Return to Top
			 
			Semantic database analysis
			
				Analyzes data with respect to Active Directory semantics. At the
				semantic database analysis: prompt, type any of the 
				parameters listed under Syntax.
			Syntax
			
				{get %d|go|verbose %s}
			Parameters
			
				
					
						
							get %d
						
							Retrieves record number %d from the Ntds.dit.
					 
					
						
							go
						
							Starts the semantic analysis of the Ntds.dit. A 
							report is generated and written to a file named 
							Dsdit.dmp.n, in the current directory, where n is an 
							integer incremented each time that you carry out the 
							command.
					 
					
						
							verbose %s
						
							Toggles verbose mode on or off.
					 
					
						
							%d
						
							A numeric variable, such as replication delay time 
							periods.
					 
					
						
							%s
						
							An alphanumeric variable, such as a domain or domain 
							controller name.
					 
					
						
							quit
						
							Takes you back to the previous menu or exits the 
							utility.
					 
					
						
							? or help
						
							Displays help at the command prompt.
					 
				 
			 
			Remarks
			
				- Unlike the file management commands described earlier, which 
				test the integrity of the database with respect to the ESENT 
				database semantics, the semantic analysis analyzes the data with 
				respect to Active Directory semantics. It generates reports on 
				the number of records present, including deleted and phantom 
				records.Note 
					- End users should not use this command except when 
					Microsoft requests them to use it as an aid to fault 
					diagnosis.
 
Set DSRM Password
			
				Resets the directory services restore mode (DSRM) password on a 
				domain controller. At the Reset DSRM Administrator Password: 
				prompt, type any of the following parameters listed under 
				Syntax.
			Syntax
			
				Reset Password on server %s
			Parameters
			
				
					
						
							Reset Password on server %s
						
							Prompts for a new DSRM password for a domain 
							controller. Use NULL as the domain controller name 
							to reset the DSRM password on the current server. 
							After entering this parameter, the Please type 
							password for DS Restore Mode Administrator Account: 
							prompt appears. At this prompt, type the desired new 
							DSRM password.
					 
					
						
							%s
						
							An alphanumeric variable, such as a domain or domain 
							controller name.
					 
					
						
							quit
						
							Takes you back to the previous menu or exits the 
							utility.
					 
					
						
							? or help
						
							Displays help at the command prompt.
					 
				 
			 
			Remarks
			
				- The DSRM password on a domain controller is initially set 
				when the Active Directory Installation Wizard (Dcpromo) is run 
				on a server to promote it to a domain controller.
- If the domain controller is in directory services restore 
				mode, you cannot reset the DSRM password on a domain controller 
				using ntdsutil.
Return to Top
			Group membership evaluation
			
				Windows Server 2003 and Windows 2000 Server environments that 
				contain complex group structures can encounter problems with an 
				access token limitation during authentication. This problem can 
				result in the inability of a user to log on or access resources.
				A version of Ntdsutil is available that contains the group 
				membership evaluation option, which you can use to generate 
				a report. By analyzing the results of the report, you can 
				identify the source of the problem.
				The version of Ntdsutil that includes the group membership 
				evaluation option is available for download on the Microsoft 
				Web site. To download the tool, and for detailed information 
				about the access token limitation issue and how to use the 
				group membership evaluation option in Ntdsutil, see
				
				Addressing Problems Due to Access Token Limitation
 				on the Microsoft Web site (http://go.microsoft.com/fwlink/?LinkId=62237).
			Return to Top
			
			
				 
			Formatting legend
			
				
					
					
						| Italic | Information that the user must supply | 
					
						| Bold | Elements that the user must type exactly as shown | 
					
						| Ellipsis (...) | Parameter that can be repeated several times in a 
						command line | 
					
						| Between brackets ([]) | Optional items | 
					
						| Between braces ({}); choices separated by pipe (|). 
						Example: {even|odd} | Set of choices from which the user must choose only 
						one | 
					
						| Courier font | Code or program output | 
				
			 
			
			
			
 |  |