I also found the following information which contains more detail to this
response
* If the schema master fails, you won’t usually see an immediate impact. The
schema master is needed only when the schema needs to change or when two
domain trees establish a trust between one another.
* The domain-naming master is needed only to add and remove domains from a
forest, so its failure doesn’t usually create an immediate impact.
* If the relative identifier (RID) master for a domain fails, you won’t
usually see an
immediate impact. The RID master issues RIDs in blocks, so you’ll be able to
create new objects in the domain until it runs out of RIDs and needs the RID
master to issue more. When that happens, you’ll be unable to create new
objects in the domain.
* The loss of the primary domain controller (PDC) emulator is noticeable if
you still have NT backup domain controllers (BDCs) or pre-Windows 2000
(Win2K) client computers. BDCs will stop receiving updates to users and
groups, and pre-Win2K client computers won’t be able to process password
changes for their users.
* The infrastructure master is needed only when you change group membership
or rename the members of groups. If the infrastructure master fails, you’ll
still be able to perform those tasks, but AD may seem to ignore your changes
until the infrastructure master is online again.
Post by Jorge de Almeida PintoForest FSMOs
* Schema Master --> needed when updating the schema
* Domain Naming master --> needed when adding or removing domains within the
forest
Domain FSMOs
* PDC Emulator --> needed for legacy clients (NT4, W9x) when changing
passwords, used for time sync, is used for pwd checking when a user enters
an incorrect pwd at another DC, used by DFS roots to get DFS info
* RID Master --> needed to distribute RID pools to DCs that have exhausted
their current RID pool for 50% (=250 RIDs)
* Infrastructure --> needed to update references between domains in a forest
(does not do anything in a single domain forest)
--
Cheers,
# Jorge de Almeida Pinto #
BLOG --> http://blogs.dirteam.com/blogs/jorge/default.aspx
-----------------------------------------------------------------------------
* This posting is provided "AS IS" with no warranties and confers no rights!
* Always test before implementing!
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
Post by EdogI have a AD Domain with 2 DCs. The first DC holds all 5 FSMO roles for the
domain and forest (single forest, single domain) From what I understand, if
that DC goes down, then all 5 FSMO roles are unavailable until I go in and
seize the roles from DC 2. Is this correct? There is no automatic failover of
these roles?
What is the impact of FSMO role holders being unreachable? Changes made to
AD can't be made, or just can't be replicated? Can't create new domains?
Can't change passwords, etc. Essentially the domain would be frozen in time,
or would the changes be allowed and when DC 1 came back online, or the roles
were seized and changes made would be replicated at that time?
Thanks!