- Verifying that the Active Directory directory service files exist
- Verifying that the file system permissions are correct
- Checking the integrity of the Active Directory database
- Performing a semantic database analysis
- Repairing the Active Directory database
- Removing and recreating the Active Directory database
Please click OK to shutdown this system and reboot into directory services restore mode, check the event log for more detailed information.
- The NTFS file system permissions on the root of the drive are too restrictive.
- The NTFS file system permissions on the NTDS folder are too restrictive.
- The drive letter of the volume that contains the Active Directory database has changed.
- The Active Directory database (Ntds.dit) is corrupted.
- The NTDS folder is compressed.
- Restart the domain controller.
- When the BIOS information appears, press F8.
- Select Directory Services Restore Mode, and then press ENTER.
- Log on by using the Directory Services Restore Mode password.
Note If you cannot log on, visit the following Microsoft Knowledge Base article:249321 Unable to log on if the boot partition drive letter has changed
- Click Start, select Run, type cmd in the Open box, and then click OK.
- At the command prompt, type ntdsutil files info.
Output that is similar to the following appears:
C:\ NTFS (Fixed Drive ) free(533.3 Mb) total(4.1 Gb)
DS Path Information:
Database : C:\WINDOWS\NTDS\ntds.dit - 10.1 Mb
Backup dir : C:\WINDOWS\NTDS\dsadata.bak
Working dir: C:\WINDOWS\NTDS
Log dir : C:\WINDOWS\NTDS - 42.1 Mb total
temp.edb - 2.1 Mb
res2.log - 10.0 Mb
res1.log - 10.0 Mb
edb00001.log - 10.0 Mb
edb.log - 10.0 Mb
Note The file locations that are included in this output are also found in the following registry subkey:HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\ParametersThe following entries in this key contain the file locations
- Database Backup path
- Database Log files path
- DSA Working Directory
- Verify that the files that are listed in the output in step 6 exist. If the files do not exist, follow the steps in the following Microsoft Knowledge Base article:240362 Directory Services does not start if Ntds.dit file is missing
- Verify that the folders in the Ntdsutil output have the correct permissions. The correct permissions are specified in the following tables.
Windows Server 2003
Account Permissions Inheritance System Full Control This folder, subfolders and files Administrators Full Control This folder, subfolders and files Creator Owner Full Control Subfolders and Files only Local Service Create Folders / Append Data This folder and subfolders
Windows 2000Note Additionally, the System account requires Full Control permissions on the following folders:
Account Permissions Inheritance Administrators Full Control This folder, subfolders and files System Full Control This folder, subfolders and files
- The root of the drive that contains the Ntds folder
- The %WINDIR% folder
- Check the integrity of the Active Directory database. To do this, type ntdsutil files integrity at the command prompt.
If the integrity check indicates no errors, restart the domain controller in normal mode. If the integrity check does not finish without errors, continue to the following steps.
- Perform a semantic database analysis. To do this, type the following command at the command prompt, including the quotation marks:ntdsutil "sem d a" go
- If the semantic database analysis indicates no errors, continue to the following steps. If the analysis reports any errors, type the following command at the command prompt, including the quotation marks:ntdsutil "sem d a" "go f"
- Follow the steps in the following Microsoft Knowledge Base article to perform an offline defragmentation of the Active Directory database:232122 Performing offline defragmentation of the Active Directory database
- If the problem still exists after the offline defragmentation, and there are other functional domain controllers in the same domain, remove Active Directory from the server, and then reinstall Active Directory. To do this, follow the steps in the "Workaround" section in the following Microsoft Knowledge Base article:332199 Domain controllers do not demote gracefully when you use the Active Directory Installation Wizard to force demotion in Windows Server 2003 and in Windows 2000 ServerNote If your domain controller is running Microsoft Small Business Server, you cannot perform this step, because Small Business Server cannot be added to an existing domain as an additional domain controller (replica). If you have a system state backup that is newer than the tombstone lifetime, restore that system state backup instead of removing Active Directory from the server. By default, the tombstone lifetime is 60 days.
For more information about how to restore a system state backup, click the following article number to view the article in the Microsoft Knowledge Base:240363 How to use the Backup program to back up and restore the system state
- If no system state backup is available, and there are no other healthy domain controllers in the domain, we recommend that you rebuild the domain by removing Active Directory and then reinstalling Active Directory on the server, creating a new domain. You can use the old domain name again or use a new domain name. You can also rebuild the domain by reformatting and reinstalling Windows on the server. However, removing Active Directory is quicker, and effectively removes the corrupted Active Directory database.
If no system state backup is available, there are no other healthy domain controllers in the domain, and you must have the domain controller working immediately, perform a lossy repair by using either Ntdsutil or Esentutl.
Note Microsoft does not support domain controllers after Ntdsutil or Esentutl is used to recover from Active Directory database corruption. If you perform this kind of repair, you must rebuild the domain controller for Active Directory to be in a supported configuration. The repair command in Ntdsutil uses the Esentutl utility to perform a lossy repair of the database. This kind of repair fixes corruption by deleting data from the database. Only use this kind of repair as a last resort.
Although the domain controller may start and may appear to function correctly after the repair, its state is unsupported because the data that is deleted from the database can cause any number of problems that may not surface until later. There is no way to determine what data was deleted when the database was repaired. As soon as possible after the repair, you must rebuild the domain to return Active Directory to a supported configuration. If you only use the offline defragmentation or semantic database analysis methods that are referenced in this article, you do not have to rebuild the domain controller afterward.
- Before you perform a lossy repair, contact Microsoft Product Support Services to confirm that you have reviewed all possible recovery options and to verify that the database truly is in an unrecoverable state. For a complete list of Microsoft Product Support Services phone numbers and information about support costs, visit the following Microsoft Web site:
ntdsutil files repair at a command prompt in Directory Service Restore Mode.
To perform a lossy repair of a Windows Server 2003-based domain controller, use the Esentutl.exe tool to recover the Active Directory database. To do this, type
esentutl /p at a command prompt on the Windows Server 2003-based domain controller.
- After the repair operation is complete, rename the .log files in the NTDS folder by using a different extension such as .bak, and try to start the domain controller in normal mode.
- If you can start the domain controller in normal mode after the repair, migrate relevant Active Directory objects to a new forest as soon as possible. Because this lossy repair method fixes corruption by deleting data, it can cause later problems that are extremely difficult to troubleshoot. At the first opportunity after the repair, you must rebuild the domain to bring Active Directory back to a supported configuration.
You can migrate users, computers, and groups by using the Active Directory Migration Tool (ADMT), Ldifde, or a non-Microsoft migration tool. ADMT can migrate user accounts, computer accounts and security groups with or without the security identifier (SID) history. ADMT also migrates user profiles. To use ADMT in a Small Business Server environment, review the "Migrating from Small Business Server 2000 or Windows 2000 Server" white paper. To obtain this white paper, visit the following Microsoft Web site:
For more information about how to use Ldifde, click the following article number to view the article in the Microsoft Knowledge Base:237677 Using Ldifde to import and export directory objects to Active DirectoryYou can use the Group Policy Management Console (GPMC) to export the file system and the Active Directory part of the group policy object from the damaged domain to the new domain.
To obtain the GPMC, visit the following Microsoft Web site:
- After the recovery, evaluate your current backup plan to make sure that you have scheduled system state backups frequently enough. Schedule system state backups at least every day, or after every significant change. System state backups must contain the required level of fault tolerance. For example, do not store backups on the same drive as the computer that you are backing up. Whenever possible, use more than one domain controller to avoid a single point of failure. Store backups in an off-site location so that site disaster (fire, theft, flood, computer theft) does not affect your ability to recover. The following Microsoft Web sites can help you develop a backup plan.
- Windows Server 2003:
- Windows 2000:
- Windows Small Business Server:
- Windows Small Business Server 2003:
Article ID: 258062 - Last Review: Sep 11, 2011 - Revision: 1