1. Reset Administrator password
ntdsutil
 reset password on server [servername]
 [password], confirm [password]
 quit, quit
 2. Restart server
     Press F8 to select Domain Controller Restore mode
     Iron Mountain:
     Initiate System state restore
 3. Authoritative restore
 ntdsutil
 authoritative restore
 restore database
 quit
 4. Restart in normal mode
 5. Seize all FSMO roles
 ntdsutil
 roles
 connections
 connect to server [servername]
 q
 seize role
 seize domain naming master
 seize infrastructure master
 seize PDC
 seize RID master
 seize schema master
 quit
 — How to make Active Directory behave like an AD
Troubleshoot:
 nslookup
 kimconnect.local (this should show the PDC of the domain, if not then AD is not working)
 On the AD server, check this log to see the issues with Active Directory: 
 C:\Windows\Debug\netsetup.log
 
  dnsmgmt : DNS console run command
 
 There are two very important folders that allow an Active Directory Server to behave like one:
 – c:\windows\sysvol (contains all the AD objects)
 – NETLOGON (contains all the scripts and GPO policies)
 Fix:
 
 Run
 Net stop ntfrs – to stop AD
 < Restore, recover SYSVOL folder, which contains NETLOGON>
 Net start ntfrs – restart AD (Make SYSVOL authoritative)
 < Use event viewer to see if event #13516 appears to signify File Replication Service the describe Sysvol remount>
 Net Share SYSVOL (<create SYSVOL share> on domain controller if necessary)
 Manual force SYSVOL authoritiative:
 RegEdit
 hkey\local machine\system\current control set\services\ntfrs\parameters\Backup and restore
 <value D2 = nonauthoritative, D4 = Authoritative (non-issue on a single DC)
 
6. DHCP migration
 – Export from old server
 netsh dhcp server export [c:\dhcp.txt] all
 – Import to new server
 netsh dhcp server import [c:\dhcp.txt] all
– Edit DHCP to reflect new DNS servers 
– Authorize
 7. DNS
 8. Flush all DNS information on client machines, peer servers 
 9. Test all services