what are fsmo roles
Answers were Sorted based on User's Feedback
Answer / kannan
FSMO Roles
In a forest, there are at least five FSMO roles that are
assigned to one or more domain controllers. The five FSMO
roles are:
* Schema Master: The schema master domain controller
controls all updates and modifications to the schema. To
update the schema of a forest, you must have access to the
schema master. There can be only one schema master in the
whole forest.
* Domain naming master: The domain naming master domain
controller controls the addition or removal of domains in
the forest. There can be only one domain naming master in
the whole forest.
* Infrastructure Master: The infrastructure is
responsible for updating references from objects in its
domain to objects in other domains. At any one time, there
can be only one domain controller acting as the
infrastructure master in each domain.
* Relative ID (RID) Master: The RID master is
responsible for processing RID pool requests from all domain
controllers in a particular domain. At any one time, there
can be only one domain controller acting as the RID master
in the domain.
* PDC Emulator: The PDC emulator is a domain controller
that advertises itself as the primary domain controller
(PDC) to workstations, member servers, and domain
controllers that are running earlier versions of Windows.
For example, if the domain contains computers that are not
running Microsoft Windows XP Professional or Microsoft
Windows 2000 client software, or if it contains Microsoft
Windows NT backup domain controllers, the PDC emulator
master acts as a Windows NT PDC. It is also the Domain
Master Browser, and it handles password discrepancies. At
any one time, there can be only one domain controller acting
as the PDC emulator master in each domain in the forest.
You can transfer FSMO roles by using the Ntdsutil.exe
command-line utility or by using an MMC snap-in tool.
Depending on the FSMO role that you want to transfer, you
can use one of the following three MMC snap-in tools:
Active Directory Schema snap-in
Active Directory Domains and Trusts snap-in
Active Directory Users and Computers snap-in
If a computer no longer exists, the role must be seized. To
seize a role, use the Ntdsutil.exe utility.
| Is This Answer Correct ? | 9 Yes | 2 No |
Answer / vikas sharma
there are five types of fsmo roles
1 schema master
2 domain naming master
3 pdc emulater master
4 relative id (rid) master
5 infrastructure master
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / vijaykrishna4321
A multi-master enabled database, such as the Active
Directory, provides the flexibility of allowing changes to
occur at any DC in the enterprise, but it also introduces
the possibility of conflicts that can potentially lead to
problems once the data is replicated to the rest of the
enterprise. One way Windows 2000/2003 deals with
conflicting updates is by having a conflict resolution
algorithm handle discrepancies in values by resolving to
the DC to which changes were written last (that is, "the
last writer wins"), while discarding the changes in all
other DCs. Although this resolution method may be
acceptable in some cases, there are times when conflicts
are just too difficult to resolve using the "last writer
wins" approach. In such cases, it is best to prevent the
conflict from occurring rather than to try to resolve it
after the fact.
| Is This Answer Correct ? | 4 Yes | 7 No |
If you wanted to run a Solaris Machine as a router, which steps have to be taken ?
What do you use to monitor TCP/IP stats since the last reboot?
OSI Stands for:
what is the difference between DNS & WINS servers
Describe profile in terms of networking concept?
The first octet of the IP address of a Class A host must be between __ and __
Which protocol does in.routed use ?
respected sir., i need knowledge, i want to do R.H.E.C but problem is this i am science graduate and a new to software line, i want to develop my carrier in I.t sector. please guide. thanks
In a peer-to-peer network, each computer can act as both a server and a _____ .
Explain the use of a default gateway?
Mail messages remain on the server while being manipulated by client. This is the _______ type mail access supported by IMAP4.
True or False: All network cards are 16 bit.