Seizing Active Directory FSMO (Flexible Single Master Operations ) roles with Powershell.

I have been running 2 Virtual Machines as Active Directory Domain Controllers in the Lab for sometime now. DC00 was running Windows Server 2003 R2 and DC01 is running Windows Server 2008 R2. But recently I lost a Hyper-v machine hosting DC00 Domain Controller VM, I had no replica available to immediately failover and didn’t want to do a restore from backup. So, I decided to spin up a WS2012 Domain Controller . There was a small problem though, the failed DC00 held all the FSMO roles: the PDCEmulator, DomainNamingMaster, RIDMaster, InfrastructureMaster and Schema FSMO roles. This scenario disrupted my initial attempt to add another Domain Controller.

I had to seize all the roles and move them to the only existing Domain Controller DC01. Normally I would use the NTDSUTIL tool and all its subcommands: roles, fsmo maintenance etc. , to achieve this task . But with PowerShell 4.0, the task is simpler and can be achieved with one single cmdlet and one line of PowerShell code (Awesome.) I ran the cmdlet from a remote Windows Server 2012 R2 machine. The following screenshots show how I achieved this task:

Identify the current Roles:

The Get-ADDomain and Get-ADForest cmdlets helped me identify what roles needed to be seized from the failed Domain Controller DC00. After identifying the Operation Master roles, I used the Move-ADDirectoryServerOperationMasterRole cmdlet, with the Force parameter to actually seize and move the roles to the target Domain Controller DC01:

FSMO00

FSMO01

I forgot to seize the DomainNamingMaster and so ran the cmdlet again for that specific role:

FSMO02

FSMO03

After running the cmdlet, you will observe that all the specified roles have successfully been seized and moved to the target Domain Controller.I verified to make sure the roles have been moved to the target Domain Controller DC01, with the ; Get-ADDomain and Get-ADForest cmdlets.

Using this cmdlet, requires PowerShell 4.0. This cmdlet eliminates using the ntdsutil tool and the multiple steps involved in accomplishing the same task.

Advertisements
This entry was posted in Active Directory, Active Directory Domain Services, AD Forest, Domain Controller, Flexible Single Master Operations, FSMO, NTDSUtil, PowerShell, PowerShell 3.0, Powershell 4.0, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2 and tagged , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s