Event ID : 1168
Source : NTDS General
Solution:
- Error: 1032 - See "JSI Tip 2599".
- Error: -1073741823 - See 930850 for a hotfix applicable to Microsoft Windows Server 2003.
In my case, this event occurred while trying to add a new domain controller. I had two errors: -1073741823(c0000001) and 183(b7). Article 232070 helped me solve the problem.
- Error: 1053(41d) - This event can be ignored if it occurred when Windows was started in Active Directory Restore mode or some other form of Safe Mode. Otherwise, investigate further.
Error 6(6)- This log entry appears after a failed attempt to move a user from one child domain to another in the same forest using the ADMT version 2.
- Error: 8352(20a0) - See 826892.
- Error: 8430(20ee) - See 827531.
- Error: 997(3e5) - See 305837.
- Error: 49(31) - See 305837.
- Error: 131174 - See 303077.
- Error: -550 - See 295932.
- Error: 1032 - See 258062.
- Error: 1004(3ec) - See 838419.
- Error: 8374(20b6) - See 830574.
- Error: -11073741823 - See 826927 for a hotfix applicable to Microsoft Windows 2000. Also, check 298601 for additional information.
- Error: 1747(6d3) - See 322267.
- Error: 8(8) - See 884591 for a hotfix applicable to Microsoft Windows 2000.
Also, check 240147, 240362, 839880, 842394, and the link to "EventID 1168 from source Active Directory" for more details.
Error: 1712(6b0) - "The type universal unique identifier (UUID) has already been registered." See 311874
Error 1032 - See 265089.
Directory Services cannot start error message when you start your Windows-based or SBS-based domain controller
- Verifying that the Active Directory directory service files exist
- Verifying that the file system permissions are correct
- Checking the integrity of the Active Directory database
- Performing a semantic database analysis
- Repairing the Active Directory database
- Removing and recreating the Active Directory database
SYMPTOMS
Please click OK to shutdown this system and reboot into directory services restore mode, check the event log for more detailed information.
Event ID: 700
Description: "NTDS (260) Online defragmentation is beginning a pass on database NTDS.DIT."
Event ID: 701
Description: "NTDS (268) Online defragmentation has completed a full pass on database 'C:\WINNT\NTDS\ntds.dit'."
Event ID: 101
Description: "NTDS (260) the database engine stopped."
Event ID: 1004
Description: "The directory was shut down successfully."
Event ID: 1168
Description: "Error: 1032 (fffffbf8) has occurred. (internal ID 4042b). Please contact Microsoft product support services for assistance."
Event ID: 1103
Description: "The windows directory services database could not be initialized and returned error 1032. Unrecoverable error, the directory can't continue."
CAUSE
- The NTFS file system permissions on the root of the drive are too restrictive.
- The NTFS file system permissions on the NTDS folder are too restrictive.
- The drive letter of the volume that contains the Active Directory database has changed.
- The Active Directory database (Ntds.dit) is corrupted.
- The NTDS folder is compressed.
RESOLUTION
- Restart the domain controller.
- When the BIOS information appears, press F8.
- Select Directory Services Restore Mode, and then press ENTER.
- Log on by using the Directory Services Restore Mode password.
- Click Start, select Run, type cmd in the Open box, and then click OK.
- At the command prompt, type ntdsutil files info.
Output that is similar to the following appears:
Drive Information: C:\ NTFS (Fixed Drive ) free(533.3 Mb) total(4.1 Gb) DS Path Information: Database : C:\WINDOWS\NTDS\ntds.dit - 10.1 Mb Backup dir : C:\WINDOWS\NTDS\dsadata.bak Working dir: C:\WINDOWS\NTDS Log dir : C:\WINDOWS\NTDS - 42.1 Mb total temp.edb - 2.1 Mb res2.log - 10.0 Mb res1.log - 10.0 Mb edb00001.log - 10.0 Mb edb.log - 10.0 Mb
Note The file locations that are included in this output are also found in the following registry subkey:HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\ParametersThe following entries in this key contain the file locations- Database Backup path
- Database Log files path
- DSA Working Directory
- Verify that the files that are listed in the output in step 6 exist. If the files do not exist, follow the steps in the following Microsoft Knowledge Base article: 240362
- Verify that the folders in the Ntdsutil output have the correct permissions. The correct permissions are specified in the following tables.
Windows Server 2003
Collapse this tableAccount Permissions Inheritance System Full Control This folder, subfolders and files Administrators Full Control This folder, subfolders and files Creator Owner Full Control Subfolders and Files only Local Service Create Folders / Append Data This folder and subfolders Windows 2000
Collapse this tableAccount Permissions Inheritance Administrators Full Control This folder, subfolders and files System Full Control This folder, subfolders and files - The root of the drive that contains the Ntds folder
- The %WINDIR% folder
- Check the integrity of the Active Directory database. To do this, type ntdsutil files integrity at the command prompt.
If the integrity check indicates no errors, restart the domain controller in normal mode. If the integrity check does not finish without errors, continue to the following steps. - Perform a semantic database analysis. To do this, type the following command at the command prompt, including the quotation marks: ntdsutil "sem d a" go
- If the semantic database analysis indicates no errors, continue to the following steps. If the analysis reports any errors, type the following command at the command prompt, including the quotation marks: ntdsutil "sem d a" "go f"
- Follow the steps in the following Microsoft Knowledge Base article to perform an offline defragmentation of the Active Directory database: 232122 Performing offline defragmentation of the Active Directory database
- If the problem still exists after the offline defragmentation, and there are other functional domain controllers in the same domain, remove Active Directory from the server, and then reinstall Active Directory. To do this, follow the steps in the "Workaround" section in the following Microsoft Knowledge Base article: 332199 Domain controllers do not demote gracefully when you use the Active Directory Installation Wizard to force demotion in Windows Server 2003 and in Windows 2000 ServerNote If your domain controller is running Microsoft Small Business Server, you cannot perform this step, because Small Business Server cannot be added to an existing domain as an additional domain controller (replica). If you have a system state backup that is newer than the tombstone lifetime, restore that system state backup instead of removing Active Directory from the server. By default, the tombstone lifetime is 60 days.
For more information about how to restore a system state backup, click the following article number to view the article in the Microsoft Knowledge Base:240363 How to use the Backup program to back up and restore the system state - If no system state backup is available, and there are no other healthy domain controllers in the domain, we recommend that you rebuild the domain by removing Active Directory and then reinstalling Active Directory on the server, creating a new domain. You can use the old domain name again or use a new domain name. You can also rebuild the domain by reformatting and reinstalling Windows on the server. However, removing Active Directory is quicker, and effectively removes the corrupted Active Directory database.
If no system state backup is available, there are no other healthy domain controllers in the domain, and you must have the domain controller working immediately, perform a lossy repair by using either Ntdsutil or Esentutl.
Note Microsoft does not support domain controllers after Ntdsutil or Esentutl is used to recover from Active Directory database corruption. If you perform this kind of repair, you must rebuild the domain controller for Active Directory to be in a supported configuration. The repair command in Ntdsutil uses the Esentutl utility to perform a lossy repair of the database. This kind of repair fixes corruption by deleting data from the database. Only use this kind of repair as a last resort.
Although the domain controller may start and may appear to function correctly after the repair, its state is unsupported because the data that is deleted from the database can cause any number of problems that may not surface until later. There is no way to determine what data was deleted when the database was repaired. As soon as possible after the repair, you must rebuild the domain to return Active Directory to a supported configuration. If you only use the offline defragmentation or semantic database analysis methods that are referenced in this article, you do not have to rebuild the domain controller afterward. - Before you perform a lossy repair, contact Microsoft Product Support Services to confirm that you have reviewed all possible recovery options and to verify that the database truly is in an unrecoverable state. For a complete list of Microsoft Product Support Services phone numbers and information about support costs, visit the following Microsoft Web site: http://support.microsoft.com/default.aspx?scid=fh;EN-US;CNTACTMS (http://support.microsoft.com/default.aspx?scid=fh;en-us;cntactms)On a Windows 2000 Server-based domain controller, use Ntdsutil to recover the Active Directory database. To do this, type ntdsutil files repair at a command prompt in Directory Service Restore Mode.
To perform a lossy repair of a Windows Server 2003-based domain controller, use the Esentutl.exe tool to recover the Active Directory database. To do this, type esentutl /p at a command prompt on the Windows Server 2003-based domain controller.
- After the repair operation is complete, rename the .log files in the NTDS folder by using a different extension such as .bak, and try to start the domain controller in normal mode.
- If you can start the domain controller in normal mode after the repair, migrate relevant Active Directory objects to a new forest as soon as possible. Because this lossy repair method fixes corruption by deleting data, it can cause later problems that are extremely difficult to troubleshoot. At the first opportunity after the repair, you must rebuild the domain to bring Active Directory back to a supported configuration.
You can migrate users, computers, and groups by using the Active Directory Migration Tool (ADMT), Ldifde, or a non-Microsoft migration tool. ADMT can migrate user accounts, computer accounts and security groups with or without the security identifier (SID) history. ADMT also migrates user profiles. To use ADMT in a Small Business Server environment, review the "Migrating from Small Business Server 2000 or Windows 2000 Server" white paper. To obtain this white paper, visit the following Microsoft Web site:http://technet.microsoft.com/en-us/library/cc719892.aspx (http://technet.microsoft.com/en-us/library/cc719892.aspx)You can use Ldifde to export and import many types of objects from the damaged domain to the new domain. These objects include user accounts, computer accounts, security groups, organization units, Active Directory sites, subnets, and site links. Ldifde cannot migrate the SID history. Ldifde is part of Windows 2000 Server and Windows Server 2003. For more information about how to use Ldifde, click the following article number to view the article in the Microsoft Knowledge Base: You can use the Group Policy Management Console (GPMC) to export the file system and the Active Directory part of the group policy object from the damaged domain to the new domain.
To obtain the GPMC, visit the following Microsoft Web site:http://www.microsoft.com/windowsserver2003/gpmc/default.mspx (http://www.microsoft.com/windowsserver2003/gpmc/default.mspx)For information about how to migrate group policy objects by using the GPMC, review the "Migrate GPOs across domains with GPMC" white paper. To obtain this white paper, visit the following Microsoft Web site:http://www.microsoft.com/windowsserver2003/gpmc/migrgpo.mspx (http://www.microsoft.com/windowsserver2003/gpmc/migrgpo.mspx) - After the recovery, evaluate your current backup plan to make sure that you have scheduled system state backups frequently enough. Schedule system state backups at least every day, or after every significant change. System state backups must contain the required level of fault tolerance. For example, do not store backups on the same drive as the computer that you are backing up. Whenever possible, use more than one domain controller to avoid a single point of failure. Store backups in an off-site location so that site disaster (fire, theft, flood, computer theft) does not affect your ability to recover. The following Microsoft Web sites can help you develop a backup plan.
- Windows Server 2003: http://technet2.microsoft.com/windowsserver/en/library/BC401E10-2243-4A4F-9708-2021EA14A7D91033.mspx (http://technet2.microsoft.com/windowsserver/en/library/BC401E10-2243-4A4F-9708-2021EA14A7D91033.mspx)
- Windows 2000: http://technet.microsoft.com/en-us/library/bb727106.aspx (http://technet.microsoft.com/en-us/library/bb727106.aspx)
- Windows Small Business Server: http://technet.microsoft.com/en-us/library/cc514417.aspx (http://technet.microsoft.com/en-us/library/cc514417.aspx)
- Windows Small Business Server 2003: http://www.microsoft.com/downloads/details.aspx?FamilyID=487736f8-f6f5-436d-a82d-0c8d66e2a634&DisplayLang=en (http://www.microsoft.com/downloads/details.aspx?FamilyID=487736f8-f6f5-436d-a82d-0c8d66e2a634&DisplayLang=en)
- Windows Server 2003: