Access denied Active Directory Users and Computers

I have a primary domain controller running Server 2012 R2. It is running just fine. I have a secondary server running Server 2008 R2 Datacenter. The 2008 R2 server is not a domain controller. The Remote Server Administration Tools have been installed because I want to be able to use Active Directory Users & Computers from this server.

Every time I launch ADUC, I get an error:

"Naming information cannot be located because: Access is denied"

Every time I launch AD Domains & Trusts, I get an error:

"The configuration information describing this enterprise is not available"

I have checked IPv4 settings between the two servers and they match. I am also a member of the domain administrators group which does have local admin on the server.

I am wondering what kind of cause could this 'access denied' be coming from? I just can't get it to see the domain controller...

Thanks for your help!

Edit, ipconfig /all output:

Domain Controller: Windows IP Configuration Host Name . . . . . . . . . . . . : mydc01 Primary Dns Suffix . . . . . . . : mydomain.com Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : mydomain.com my-dc.c3.internal.cloudapp.net Ethernet adapter Ethernet 3: Connection-specific DNS Suffix . : my-dc.c3.internal.cloudapp.net Description . . . . . . . . . . . : Microsoft Hyper-V Network Adapter #3 Physical Address. . . . . . . . . : 00-0E-3B-00-61-1E DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::888f:ae4c:8194:33c6%16(Preferred) IPv4 Address. . . . . . . . . . . : 10.183.209.132(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.240 Lease Obtained. . . . . . . . . . : Thursday, October 1, 2015 10:08:09 AM Lease Expires . . . . . . . . . . : Friday, December 3, 2151 12:56:30 AM Default Gateway . . . . . . . . . : 10.183.209.129 DHCP Server . . . . . . . . . . . : 168.63.129.16 DHCPv6 IAID . . . . . . . . . . . : 369102138 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1C-D3-FC-0D-00-0D-3A-00-21-1F DNS Servers . . . . . . . . . . . : 10.183.209.132 10.183.209.133 NetBIOS over Tcpip. . . . . . . . : Enabled Secondary Server: Windows IP Configuration Host Name . . . . . . . . . . . . : my-util01 Primary Dns Suffix . . . . . . . : mydomain.com Node Type . . . . . . . . . . . . : Peer-Peer IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : mydomain.com my-util01.c3.internal.cloudapp.net Ethernet adapter Local Area Connection 28: Connection-specific DNS Suffix . : my-util01.c3.internal.cloudapp.net Description . . . . . . . . . . . : Microsoft Virtual Machine Bus Network Ada pter #28 Physical Address. . . . . . . . . : 00-0E-5F-00-3E-F6 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::cdec:c904:e5a7:102c%42(Preferred) IPv4 Address. . . . . . . . . . . : 10.183.209.134(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.240 Lease Obtained. . . . . . . . . . : Monday, October 26, 2015 6:21:50 PM Lease Expires . . . . . . . . . . : Friday, December 03, 2151 1:00:22 AM Default Gateway . . . . . . . . . : 10.183.209.129 DHCP Server . . . . . . . . . . . : 168.63.129.16 DHCPv6 IAID . . . . . . . . . . . : 754978106 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-18-17-3D-0F-00-15-5D-05-4B-22 DNS Servers . . . . . . . . . . . : 10.183.209.132 10.183.209.133 NetBIOS over Tcpip. . . . . . . . : Enabled

I often find browsing through the organizational unit (OU) tree to examine user accounts impractical. Can I use the Microsoft Management Console (MMC) Active Directory Users and Computers snap-in to get a complete list of all the users in my domain regardless of the OU structure?

Yes. From the snap-in console, select Action\Find, then select the Advanced tab. Use the In drop-down list to select your domain. Next, select User from the Field menu and select Logon Name. Change the condition to Present, click Add, then click Find Now. Windows 2000 will populate the object list with all the user objects in your domain. Field\User\Logon Name works because only user objects have a User Logon Name, and—because the User Logon Name is required—it's always present. To see all users in the entire forest, select Entire Directory from the In drop-down list and click Find Now. Be careful, however: This choice can involve a lot of users.

You can double-click any user in the list to view user-account properties the same way you would in the main window of the Active Directory Users and Computers snap-in. You can click a column heading to sort by any column in the list. You can use View\Choose Columns to add other properties to the object list for sorting. You can also use Field\Group\Name to obtain a list of all groups. To further filter the objects in a list, you can activate View\Filter, which lets you create filters on any of the columns in the list by using criteria such as Contains, Starts With, and Ends With.

I am creating a user in an active directory with lap connection (c#) from server 1 OU to another server OU with User (Domain user) having permission to create / set password , created through delegate wizard. e.g.

PrincipalContext newContext = new PrincipalContext(ContextType.Domain, "LdapPath:389", oupath, ContextOptions.SimpleBind, username, password); UserPrincipal newUserPricipal = new UserPrincipal(newContext, Convert.ToString(result.Properties["SAMAccountName"][0]), "somerandompassword", true); newUserPricipal.Save();

User details with all properties get synced but set password throws Access denied exception.

I cannot make user administrator or domain admin as per policy. This worked with Windows Server 2012 R2. But not in Windows Server 2016. Why?

When you attempt to move an object from one container to another within Active Directory, you receive an access denied error. A common reason for this error is that security is enabled on the object that will prevent you from accidentally deleting said object. The How-To below is based on a User Object, but can be applied to Computer Objects and containers as well.

To complete the steps below you will need to be a Domain Admin, have local ADUC access or using RSAT (preferred method) from a Windows 7 or 8.1 machine. These screenshots are from a Windows Serve 2008 R2 AD / Windows 7 environment.

Access denied Active Directory Users and Computers

Click the Windows Orb (Start Button) and type in "Active Directory Users and Computers. You should see the RSAT tool appear in the results. Click "Active Directory Users and Computers" or press "Enter" to select and open the ADUC MMC.

Access denied Active Directory Users and Computers

Right click on the container or object and choose "Properties".

Access denied Active Directory Users and Computers

Navigate to the "Object" tab (green arrow) of the container or object's properties window. Then, de-select this option (shown in red box at right) and click "Apply" and "Close".

Access denied Active Directory Users and Computers

Right click on the container or object again and choose "Move". Select the location to which you wish to move said container or object. The move should complete without error now.

Access denied Active Directory Users and Computers

This step is optional but recommended. Perform Step #3 in reverse by re-selecting the option and applying it.

The "Protect objects from accidental deletion" was a great addition to AD starting with Windows Server 2008. It does provide some basic protection and helps admins check themselves. For more information on this option, give the following link listed in the references a read.

I hope that this simple 4 step process helps you as I find myself having to do these steps often. I'm looking at how to do these same steps with Powershell and will create a how-to for that process once I have it narrowed down and screen captured.