• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
OpenTechTips

OpenTechTips

Comprehensive IT Guides for Pros and Enthusiasts

MENUMENU
  • HOME
  • ALL TOPICS
    • Exchange
    • InfoSec
    • Linux
    • Networking
    • Scripting
      • PowerShell
    • SSL
    • Tools
    • Virtualization
    • Web
    • Windows
  • ABOUT
  • SUBSCRIBE
Home » What Happens When a FSMO Role Fails

What Happens When a FSMO Role Fails

October 2, 2020 - by Zsolt Agoston - last edited on October 4, 2020

In our earlier article we went through the history and the ins and outs of the FSMO roles. But how do we know if a FSMO server fails and cannot fulfil it's role?

So What Happens When a FSMO Role Fails?

 

1. Domain Naming Master

Failure of the server that hold this role is not immediately obvious. This role is only needed when adding or removing domains to or from the forest so if there are no similar changes, the role server can even powered down for an extended period of time, it's absence would not be noticeable.

2. Schema Master

When failing, no changes to the schema can be implemented. Schema changes happen for example when installing a new version of Exchange server in the organization, or upgrading the forest of domain functional levels to a higher level.

3. RID Master

A symptom would be not being able to create new users or joining computers to the domain. However, the domain controllers have an allocated number of RIDs for new accounts, so first they would need to run out of those allocated pool before asking for more from the RID master would failures.

4. PDC Emulator

Probably the failure of this role has the most obvious symptoms, that includes the following:

  • password resets don't work in the domain
  • accounts are not locking out when trying the wrong password too many times
  • GPO changes would not be registered
  • computer clocks across the domain are not being synchronized. It can be dangerous as if time on the client computers or servers differ by more than 5 minutes from the authenticator's set time (domain controller), Kerberos would fail on domain joined computers.

5. Infractructure Master

If failing, in groups or ACLs (security settings in file, folder or AD objects) the long SID would be showing for accounts from other domains, their proper name would not be displayed correctly.
What Happens When a FSMO Role Fails

Related Articles

  • FSMO Roles Simply Explained
  • How to Transfer the FSMO Roles
  • How to Seize the FSMO Roles

Reader Interactions

Comments Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Tools

Secondary Sidebar

CONTENTS

  • So What Happens When a FSMO Role Fails?
  • 1. Domain Naming Master
  • 2. Schema Master
  • 3. RID Master
  • 4. PDC Emulator
  • 5. Infractructure Master
  • Related Articles

  • Terms of Use
  • Disclaimer
  • Privacy Policy
Manage your privacy

To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.

Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}