In the past I explained in multiple posts how to restore the SYSVOL on a DC when it is replicated through either NTFRS or DFS-R. Those procedures (including screen dumps) can be found through the following links:
In this post I will explain another method that is also available to restore the SYSVOL in an authoritative and non-authoritative way when it is replicated through DFS-R. The information posted here will be based upon the following Microsoft KB article:
In addition to what the KB article already mentions, this post will contain additional information such as PowerShell command lines used and screen dumps.
–
SYSVOL Replicated Through DFS-R – Authoritative Restore – Steps To Take
To perform an authoritative restore of the SYSVOL when using DFS-R, use the following steps (preferably on the RWDC with the PDC FSMO role!):
Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Get-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRWDC1,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -properties *

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Set-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRWDC1,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -Replace @{"msDFSR-Enabled"="FALSE";"msDFSR-Options"=1}
(this disables the replicated folder on this target and marks the target as primary, or in other words authoritative)

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Get-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRWDC1,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -properties *

Within a DOS command prompt

Event ID 4114 in the DFS Replication Event Log appears (after the first occurrence, this event will be repeated every 5 minutes):

Event ID 4008 in the DFS Replication Event Log appears:

Event ID 2010 in the DFS Replication Event Log appears:

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Set-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRWDC1,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -Replace @{"msDFSR-Enabled"="TRUE"}
(this re-enables the replicated folder on this target)

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Get-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRWDC1,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -properties *

Within a DOS command prompt

Event ID 4602 in the DFS Replication Event Log appears:

–
SYSVOL Replicated Through DFS-R – Non-Authoritative Restore On RWDC – Steps To Take
To perform an authoritative restore of the SYSVOL when using DFS-R on a RWDC, use the following steps:
Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Get-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRWDC2,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -properties *

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Set-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRWDC2,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -Replace @{"msDFSR-Enabled"="FALSE"}
(this disables the replicated folder on this target)

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Get-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRWDC2,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -properties *

Within a DOS command prompt

Event ID 4114 in the DFS Replication Event Log appears (after the first occurrence, this event will be repeated every 5 minutes):

Event ID 4008 in the DFS Replication Event Log appears:

Event ID 2010 in the DFS Replication Event Log appears:

As an optional steps, you can specify a specific replication (sourcing) partner for the SYSVOL
REMARK: If you do not use this method to specify the source computer, any Active Directory replication partner that has the SYSVOL replicated folder in the NORMAL state could end up being used as the source.
–
Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Set-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRWDC2,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -Replace @{"msDFSR-Enabled"="TRUE"}
(this re-enables the replicated folder on this target)

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Get-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRWDC2,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -properties *

Within a DOS command prompt

Event ID 4614 in the DFS Replication Event Log appears:

Event ID 4604 in the DFS Replication Event Log appears:

–
SYSVOL Replicated Through DFS-R – Non-Authoritative Restore On RODC – Steps To Take
To perform an authoritative restore of the SYSVOL when using DFS-R on a RODC, use the following steps:
Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Get-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRODC5,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -properties *

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Set-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRODC5,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -Replace @{"msDFSR-Enabled"="FALSE"}
(this disables the replicated folder on this target)
(execute this either on the RODC with sufficient permissions AND make sure you can access the Active Directory Web Service (ADWS) (tcp:9389) on the RWDC (through referral by RODC) from the RODC, OR execute this on the RWDC with sufficient access permissions)

You then either wait until the change that originated on an RWDC reaches the RODC, or you force inbound AD replication on the RODC. Within a DOS command prompt
- REPADMIN /SYNCALL R2FSRODC5.ADDMZ.LAN /A /d /q

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Get-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRODC5,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -properties *

Within a DOS command prompt

Event ID 4114 in the DFS Replication Event Log appears (after the first occurrence, this event will be repeated every 5 minutes):

Event ID 4008 in the DFS Replication Event Log appears:

Event ID 2010 in the DFS Replication Event Log appears:

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Set-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRODC5,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -Replace @{"msDFSR-Enabled"="TRUE"}
(this re-enables the replicated folder on this target)
(execute this either on the RODC with sufficient permissions AND make sure you can access the Active Directory Web Service (ADWS) (tcp:9389) on the RWDC (through referral by RODC) from the RODC, OR execute this on the RWDC with sufficient access permissions)

You then either wait until the change that originated on an RWDC reaches the RODC, or you force inbound AD replication on the RODC. Within a DOS command prompt
- REPADMIN /SYNCALL R2FSRODC5.ADDMZ.LAN /A /d /q

Within a PowerShell command prompt
- Import-Module ActiveDirectory (only if not already done previously within the same PowerShell command prompt window)
- Get-ADObject "CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=R2FSRODC5,OU=Domain Controllers,DC=ADDMZ,DC=LAN" -properties *

Within a DOS command prompt

Event ID 4614 in the DFS Replication Event Log appears:

Event ID 4604 in the DFS Replication Event Log appears:

–
Cheers,
Jorge
———————————————————————————————
* This posting is provided "AS IS" with no warranties and confers no rights!
* Always evaluate/test yourself before using/implementing this!
* DISCLAIMER: https://jorgequestforknowledge.wordpress.com/disclaimer/
———————————————————————————————
############### Jorge’s Quest For Knowledge #############
######### http://JorgeQuestForKnowledge.wordpress.com/ ########
———————————————————————————————
Like this:
Like Loading...