Event ID 4513 — DNS Server Active Directory Integration
Applies To: Windows Server 2008
You can configure the DNS Server service to use Active Directory Domain Services (AD DS) to store zone data. This makes it possible for the DNS server to rely on directory replication, which enhances security, reliability, and ease of administration.
Event Details
Product: | Windows Operating System |
ID: | 4513 |
Source: | Microsoft-Windows-DNS-Server-Service |
Version: | 6.0 |
Symbolic Name: | DNS_EVENT_DP_CANT_JOIN_FOREST_BUILTIN |
Message: | The DNS server detected that it is not enlisted in the replication scope of the directory partition %1. This prevents the zones that should be replicated to all DNS servers in the %2 forest from replicating to this DNS server. To create or repair the forest-wide DNS directory partition, open the the DNS console. Right-click the applicable DNS server, and then click 'Create Default Application Directory Partitions'. Follow the instructions to create the default DNS application directory partitions. For more information, see 'To create the default DNS application directory partitions' in Help and Support. The error was %3. |
Resolve
Create the DNS directory partition
Domain Name System (DNS) zones can be stored in the domain or application directory partitions of Active Directory Domain Services (AD DS). You can correct problems related to accessing directory partitions by creating a default application directory partition.
To perform this procedure, you must have membership in Administrators, or you must have been delegated the appropriate authority.
To create a forest-wide and domain-wide DNS directory partition:
- On the DNS server, start Server Manager. To start Server Manager, click Start, click Administrative Tools, and then click Server Manager.
- In the console tree, expand Roles, expand DNS Server, and then expand DNS.
- Right-click the DNS server, and then click Create Default Application Directory Partitions.
- Follow the instructions to create the DNS application directory partitions.
Verify
Ensure that Event IDs 4523 and 4524 are being logged and that no events in the range 4000 to 4019 appear in the Domain Name System (DNS) event log.