Event ID 1168 NTDS General : "Directory Services cannot start" error message when you start your Windows-based or SBS-based domain controller

Thursday, May 7, 2009

Event ID 1168 NTDS General :
 
Event ID :  1168
Source  :   NTDS General
Type :   Error 
Description :Error <error code>(<hex error code>) has occurred (Internal ID <hex code>). Please contact Microsoft Product Support Services for assistance. 
   
 
Solution:

- Error: 1032 - See "JSI Tip 2599".
- Error: -1073741823 - See
930850 for a hotfix applicable to Microsoft Windows Server 2003.


In my case, this event occurred while trying to add a new domain controller. I had two errors: -1073741823(c0000001) and 183(b7). Article
232070 helped me solve the problem.


- Error: 1053(41d) - This event can be ignored if it occurred when Windows was started in Active Directory Restore mode or some other form of Safe Mode. Otherwise, investigate further.


Error 6(6)- This log entry appears after a failed attempt to move a user from one child domain to another in the same forest using the ADMT version 2.


- Error: 8352(20a0) - See
826892.
- Error: 8430(20ee) - See
827531.
- Error: 997(3e5) - See
305837.
- Error: 49(31) - See
305837.
- Error: 131174 - See
303077.
- Error: -550 - See
295932.
- Error: 1032 - See
258062.
- Error: 1004(3ec) - See
838419.
- Error: 8374(20b6) - See
830574.

- Error: -11073741823 - See
826927 for a hotfix applicable to Microsoft Windows 2000. Also, check 298601 for additional information.
- Error: 1747(6d3) - See
322267.
- Error: 8(8) - See
884591 for a hotfix applicable to Microsoft Windows 2000.

Also, check
240147, 240362, 839880, 842394, and the link to "EventID 1168 from source Active Directory" for more details.


Error: 1712(6b0) - "The type universal unique identifier (UUID) has already been registered." See
311874

Error 1032 - See
265089.
 
Error -1811 - See 280364.
 

Directory Services cannot start  error message when you start your Windows-based or SBS-based domain controller

This article leads you through a series of steps that may help you diagnose the cause of the "Directory Services cannot start" system error. These steps may include:
  • Verifying that the Active Directory directory service files exist
  • Verifying that the file system permissions are correct
  • Checking the integrity of the Active Directory database
  • Performing a semantic database analysis
  • Repairing the Active Directory database
  • Removing and recreating the Active Directory database
This article also tells you how to use Ntdsutil or Esentutl to perform a lossy repair of the Active Directory database. Because a lossy repair deletes data and may introduce new problems, only perform a lossy repair if it is the only available option.
 

SYMPTOMS

When you start your domain controller, the screen may go blank, and you may receive the following error message:
LSASS.EXE - System Error, security accounts manager initialization failed because of the following error: Directory Services cannot start. Error status 0xc00002e1.

Please click OK to shutdown this system and reboot into directory services restore mode, check the event log for more detailed information.
Additionally, the following event ID messages may appear in the event log:

Event ID: 700
Description: "NTDS (260) Online defragmentation is beginning a pass on database NTDS.DIT."

Event ID: 701
Description: "NTDS (268) Online defragmentation has completed a full pass on database 'C:\WINNT\NTDS\ntds.dit'."

Event ID: 101
Description: "NTDS (260) the database engine stopped."

Event ID: 1004
Description: "The directory was shut down successfully."

Event ID: 1168
Description: "Error: 1032 (fffffbf8) has occurred. (internal ID 4042b). Please contact Microsoft product support services for assistance."

Event ID: 1103
Description: "The windows directory services database could not be initialized and returned error 1032. Unrecoverable error, the directory can't continue."

 

CAUSE

This problem occurs because one or more of the following conditions are true:
  • The NTFS file system permissions on the root of the drive are too restrictive.
  • The NTFS file system permissions on the NTDS folder are too restrictive.
  • The drive letter of the volume that contains the Active Directory database has changed.
  • The Active Directory database (Ntds.dit) is corrupted.
  • The NTDS folder is compressed.
 

RESOLUTION

To resolve this problem, follow these steps:
  1. Restart the domain controller.
  2. When the BIOS information appears, press F8.
  3. Select Directory Services Restore Mode, and then press ENTER.
  4. Log on by using the Directory Services Restore Mode password.

     
  5. Click Start, select Run, type cmd in the Open box, and then click OK.
  6. At the command prompt, type ntdsutil files info.

    Output that is similar to the following appears:
    Drive Information:          C:\ NTFS (Fixed Drive  ) free(533.3 Mb) total(4.1 Gb)  DS Path Information:          Database   : C:\WINDOWS\NTDS\ntds.dit - 10.1 Mb         Backup dir : C:\WINDOWS\NTDS\dsadata.bak         Working dir: C:\WINDOWS\NTDS         Log dir    : C:\WINDOWS\NTDS - 42.1 Mb total                         temp.edb - 2.1 Mb                         res2.log - 10.0 Mb                         res1.log - 10.0 Mb                         edb00001.log - 10.0 Mb                         edb.log - 10.0 Mb

    Note The file locations that are included in this output are also found in the following registry subkey:
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
    The following entries in this key contain the file locations
    • Database Backup path
    • Database Log files path
    • DSA Working Directory
  7. Verify that the files that are listed in the output in step 6 exist. If the files do not exist, follow the steps in the following Microsoft Knowledge Base article:
    240362
  8. Verify that the folders in the Ntdsutil output have the correct permissions. The correct permissions are specified in the following tables.
     

    Windows Server 2003

    Collapse this tableExpand this table
    Account Permissions Inheritance
    System Full Control This folder, subfolders and files
    Administrators Full Control This folder, subfolders and files
    Creator Owner Full Control Subfolders and Files only
    Local Service Create Folders / Append Data This folder and subfolders
     

    Windows 2000

    Collapse this tableExpand this table
    Account Permissions Inheritance
    Administrators Full Control This folder, subfolders and files
    System Full Control This folder, subfolders and files
    Note Additionally, the System account requires Full Control permissions on the following folders:
    • The root of the drive that contains the Ntds folder
    • The %WINDIR% folder
    In Windows Server 2003, the default location of the %WINDIR% folder is C:\WINDOWS. In Windows 2000, the default location of the %WINDIR% folder is C:\WINNT.
  9. Check the integrity of the Active Directory database. To do this, type ntdsutil files integrity at the command prompt.

    If the integrity check indicates no errors, restart the domain controller in normal mode. If the integrity check does not finish without errors, continue to the following steps.
  10. Perform a semantic database analysis. To do this, type the following command at the command prompt, including the quotation marks:
    ntdsutil "sem d a" go
  11. If the semantic database analysis indicates no errors, continue to the following steps. If the analysis reports any errors, type the following command at the command prompt, including the quotation marks:
    ntdsutil "sem d a" "go f"
  12. Follow the steps in the following Microsoft Knowledge Base article to perform an offline defragmentation of the Active Directory database:
    232122 Performing offline defragmentation of the Active Directory database
  13. If the problem still exists after the offline defragmentation, and there are other functional domain controllers in the same domain, remove Active Directory from the server, and then reinstall Active Directory. To do this, follow the steps in the "Workaround" section in the following Microsoft Knowledge Base article:
    332199 Domain controllers do not demote gracefully when you use the Active Directory Installation Wizard to force demotion in Windows Server 2003 and in Windows 2000 Server
    Note If your domain controller is running Microsoft Small Business Server, you cannot perform this step, because Small Business Server cannot be added to an existing domain as an additional domain controller (replica). If you have a system state backup that is newer than the tombstone lifetime, restore that system state backup instead of removing Active Directory from the server. By default, the tombstone lifetime is 60 days.

    For more information about how to restore a system state backup, click the following article number to view the article in the Microsoft Knowledge Base:
    240363 How to use the Backup program to back up and restore the system state
  14. If no system state backup is available, and there are no other healthy domain controllers in the domain, we recommend that you rebuild the domain by removing Active Directory and then reinstalling Active Directory on the server, creating a new domain. You can use the old domain name again or use a new domain name. You can also rebuild the domain by reformatting and reinstalling Windows on the server. However, removing Active Directory is quicker, and effectively removes the corrupted Active Directory database.

    If no system state backup is available, there are no other healthy domain controllers in the domain, and you must have the domain controller working immediately, perform a lossy repair by using either Ntdsutil or Esentutl.

    Note Microsoft does not support domain controllers after Ntdsutil or Esentutl is used to recover from Active Directory database corruption. If you perform this kind of repair, you must rebuild the domain controller for Active Directory to be in a supported configuration. The repair command in Ntdsutil uses the Esentutl utility to perform a lossy repair of the database. This kind of repair fixes corruption by deleting data from the database. Only use this kind of repair as a last resort.

    Although the domain controller may start and may appear to function correctly after the repair, its state is unsupported because the data that is deleted from the database can cause any number of problems that may not surface until later. There is no way to determine what data was deleted when the database was repaired. As soon as possible after the repair, you must rebuild the domain to return Active Directory to a supported configuration. If you only use the offline defragmentation or semantic database analysis methods that are referenced in this article, you do not have to rebuild the domain controller afterward.
  15. Before you perform a lossy repair, contact Microsoft Product Support Services to confirm that you have reviewed all possible recovery options and to verify that the database truly is in an unrecoverable state. For a complete list of Microsoft Product Support Services phone numbers and information about support costs, visit the following Microsoft Web site:
    http://support.microsoft.com/default.aspx?scid=fh;EN-US;CNTACTMS (http://support.microsoft.com/default.aspx?scid=fh;en-us;cntactms)
    On a Windows 2000 Server-based domain controller, use Ntdsutil to recover the Active Directory database. To do this, type ntdsutil files repair at a command prompt in Directory Service Restore Mode.

    To perform a lossy repair of a Windows Server 2003-based domain controller, use the Esentutl.exe tool to recover the Active Directory database. To do this, type esentutl /p at a command prompt on the Windows Server 2003-based domain controller.
  16. After the repair operation is complete, rename the .log files in the NTDS folder by using a different extension such as .bak, and try to start the domain controller in normal mode.
  17. If you can start the domain controller in normal mode after the repair, migrate relevant Active Directory objects to a new forest as soon as possible. Because this lossy repair method fixes corruption by deleting data, it can cause later problems that are extremely difficult to troubleshoot. At the first opportunity after the repair, you must rebuild the domain to bring Active Directory back to a supported configuration.

    You can migrate users, computers, and groups by using the Active Directory Migration Tool (ADMT), Ldifde, or a non-Microsoft migration tool. ADMT can migrate user accounts, computer accounts and security groups with or without the security identifier (SID) history. ADMT also migrates user profiles. To use ADMT in a Small Business Server environment, review the "Migrating from Small Business Server 2000 or Windows 2000 Server" white paper. To obtain this white paper, visit the following Microsoft Web site:
    http://technet.microsoft.com/en-us/library/cc719892.aspx (http://technet.microsoft.com/en-us/library/cc719892.aspx)
    You can use Ldifde to export and import many types of objects from the damaged domain to the new domain. These objects include user accounts, computer accounts, security groups, organization units, Active Directory sites, subnets, and site links. Ldifde cannot migrate the SID history. Ldifde is part of Windows 2000 Server and Windows Server 2003. For more information about how to use Ldifde, click the following article number to view the article in the Microsoft Knowledge Base: You can use the Group Policy Management Console (GPMC) to export the file system and the Active Directory part of the group policy object from the damaged domain to the new domain.

    To obtain the GPMC, visit the following Microsoft Web site:
    http://www.microsoft.com/windowsserver2003/gpmc/default.mspx (http://www.microsoft.com/windowsserver2003/gpmc/default.mspx)
    For information about how to migrate group policy objects by using the GPMC, review the "Migrate GPOs across domains with GPMC" white paper. To obtain this white paper, visit the following Microsoft Web site:
    http://www.microsoft.com/windowsserver2003/gpmc/migrgpo.mspx (http://www.microsoft.com/windowsserver2003/gpmc/migrgpo.mspx)
  18. After the recovery, evaluate your current backup plan to make sure that you have scheduled system state backups frequently enough. Schedule system state backups at least every day, or after every significant change. System state backups must contain the required level of fault tolerance. For example, do not store backups on the same drive as the computer that you are backing up. Whenever possible, use more than one domain controller to avoid a single point of failure. Store backups in an off-site location so that site disaster (fire, theft, flood, computer theft) does not affect your ability to recover. The following Microsoft Web sites can help you develop a backup plan. For more information about Active Directory disaster recovery, visit the following Microsoft Web site:
 

 
 
 

Popular Posts