Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Windows Server » How to fix ADDS already contain a computer account

How to fix ADDS already contain a computer account

Posted on 01/04/202601/04/2026 Christian By Christian No Comments on How to fix ADDS already contain a computer account
ADDS Already Contain A Computer Account

In this blogpost, we will learn how to fix ADDS already contain a computer account. This issue can occur after a swing migration, such as the one outlined in “Build a New DC vs Swing Migration: Upgrade Server OS Correctly“. Replacing a Domain Controller (DC) hardware is one of those tasks that looks simple but can quickly become catastrophic if done incorrectly. Please, see Active Directory: How to Setup a Domain Controller, and How to add a second Domain Controller.

Active Directory is not just another application. It is a distributed database, a security boundary, and the identity backbone of the entire environment.

Upgrading Domain Controllers (DCs) while retaining the same IP addresses is a common practice in environments where static IPs are hardcoded into applications, printers, or networking equipment. Most times, this will lead you to performing a swing migration which I recommend against or performing a DC in-place upgrade, or rebuilding a new Domain Controller (DC) which is the recommended best practice. If you performed a swing migration or perform in-place upgrade, you might encounter this error.

Microsoft’s recommended method for upgrading a Domain Controller’s operating system involves provisioning a new server with the desired operating system (OS), promoting it to a Domain Controller (DC) within the existing domain, transferring FSMO roles (if applicable), verifying replication, and then gracefully demoting the old DC. 

My take away, do not perform a swing migration or in-place upgrade. A simple rebuild is better as discussed here (Reddit), Silverpchu, and here (Microsoft).

Why this happens “ADDS already contain a computer account”?

As you can see below, we already had a DC with the name that has been removed from the Domain but not correctly demoted with the server object named TECHDC02 in Active Directory with the command below.

netdom computername TempDC /makeprimary:TechDC02.techdirectarchive.com

So, netdom would not let the alternate name become the primary name. In other words, the name was already reserved somewhere in AD metadata, even if we thought the server had been remove via the forceful DC removal via Sites and Services.

Cannot Be Made Primary
Wizard detects “duplicate/conflicting” object and blocks it to prevent AD corruption.

Note: netdom checks AD for duplicate names before it renames the computer. Since TechDC02 already exists as a server object in Active Directory Sites and Services. The rename is blocked to avoid creating a duplicate identity.

Please see AZURE Kubernetes Service (AKS) upgrade minor version from 1.32.3 to 1.33.7, Service Principal Name: How to add or reset and delete SPNs, and Specify user account name when adding a DC to an existing Forest.

Cleanup Stale Metadata

To perform some cleanup, I will launch Active Directory Site and Services. Then, navigate to Sites and then Servers. As you can see, there is a lingering DC with the name TechDC02 which we are currently having issues with. I will proceed and have them removed.

Delete Techdc02

Removal of DCs in progress.

Confirm Delete

For a quick test, I will want to test AD replication. As you can see, we only have one DC left and the result should support this argument for a single DC with the below query.

The below commands shows every naming context on TECHDC01 syncing successfully. This means there are no replication errors to another partner in the current state (Syncall finished with no erros).

repadmin /sync /AdeP
Force Ad Replication
With only one domain controller, there are no replication partners, so the output should not show meaningful inbound/outbound replication traffic to another DC

DC Alternate Name and Rename to fix ADDS already contain a computer account

Now that we have removed all lingering meta data and no replication issue for TechDC01. We will have an alternate name for the second DC “TechDC02”. We should be able to without issues this time as we have removed the lingering data.

netdom computername TempDC /makeprimary:TechDC02.techdirectarchive.com

The /enumerate flag lists the names currently registered on that server. This way, you can confirm the rename state before and after /makeprimary and /remove flag as the case maybe.

netdom computername TempDC /enumerate

Note: If /enumerate does not show the new name after /add, then /makeprimary will fail because the name is not yet registered as an alternate name. That is the safest way to check whether AD still has a conflicting object or whether the rename is progressing correctly.

Confirm New Dc Add

To change the DC name during a swing operation. You have to run the command below but replacing with your FQDN or servername.

netdom computername TempDC /makeprimary:TechDC02.techdirectarchive.com

As you can see, after cleaning up the meta data and removing the duplicate name. We are able to rename the DC from TempDC to TechDC02 as the primary name.

Primary Dc

Note that this process requires a reboot to complete the change. You can employ any of the arious ways on Wuindows Server to perform a restart. Here I will be using the command below since I am already on the Termainal (Comamnd Prompt/PowerShell).

Reboot

Also see Video Conversion Desktop Software for Windows, How to Reset a Cisco 3650 Catalyst Switch, and how to reset and reinstall Windows 10 locally.

FAQs

Why is it better to offload DNS and DHCP from a domain controller?

Offloading DNS and DHCP reduces the DC’s role as a critical network dependency. Clients no longer rely on the DC for name resolution, so AD replication, logons, and GPO processing continue without interruption. This makes DC replacements or rebuilds much safer and easier.

Do I need to reuse the old DC’s hostname or IP when replacing it?

It depends on where DNS is hosted:
–> External DNS: No, you don’t need to reuse the old hostname or IP. New DCs automatically register their DNS A and SRV records, and clients dynamically resolve DCs via _ldap._tcp.dc._msdcs.domain.local. Functionality remains intact even with different hostnames or IPs.
–> DC-hosted DNS: Yes, reusing the old hostname or IP may be necessary temporarily. Many servers and applications rely on static DNS entries pointing to the old DC. Replacing it with a new hostname or IP can cause resolution issues until DNS replication and updates fully propagate. Careful planning is required to avoid service disruptions.

How does external DHCP help during a DC transition?

External DHCP servers that dynamically update DNS records ensure clients always have valid name resolution. This eliminates dependency on the DC for DNS updates and maintains DNS integrity even while promoting, demoting, or rebuilding domain controllers.

Does separating DNS/DHCP improve security or stability?

Yes. Running DNS and DHCP externally isolates network services from authentication tasks. DCs can focus solely on Active Directory operations, reducing load, minimizing update impacts, and allowing easier patching or rollback without affecting client connectivity.

I hope you found this article on how to fix ADDS already contain a computer account very useful. Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory computer account already exists error, Active Directory Domain Services, ADDS already contains a computer account error fix, computer account already exists in Active Directory solution, DC Rename, fix ADDS already contain a computer account, fix ADDS join error existing computer account, fix domain join error computer account already exists, resolve ADDS duplicate computer account issue

Post navigation

Previous Post: AZURE Kubernetes Service (AKS) upgrade minor version from 1.32.3 to 1.33.7
Next Post: Fix unable to contact Server: This may be the server does not exist

Related Posts

  • Various Msiexec.exe Command Line Switches
    Various Msiexec.exe Command Line Switches Windows Server
  • article 1280x720.192a2586 1
    Windows Always On VPN (AOVPN) Overview and Requirements Windows Server
  • How to Install Windows Admin Center on Windows 10 11​
    Install Windows Admin Center on Windows 10 and Windows 11 Windows
  • Microsoft Enterprise Root Certification Authority and Forest Domain to Azure migration
    Migrate Microsoft Enterprise Root Certification Authority and Forest Domain to Azure AWS/Azure/OpenShift
  • image 64
    How to install Fax Server on a Windows Server Windows
  • maxresdefault
    How to join a computer to the Domain Windows Server

More Related Articles

Various Msiexec.exe Command Line Switches Various Msiexec.exe Command Line Switches Windows Server
article 1280x720.192a2586 1 Windows Always On VPN (AOVPN) Overview and Requirements Windows Server
How to Install Windows Admin Center on Windows 10 11​ Install Windows Admin Center on Windows 10 and Windows 11 Windows
Microsoft Enterprise Root Certification Authority and Forest Domain to Azure migration Migrate Microsoft Enterprise Root Certification Authority and Forest Domain to Azure AWS/Azure/OpenShift
image 64 How to install Fax Server on a Windows Server Windows
maxresdefault How to join a computer to the Domain Windows Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • image 30
    How to Fix “Insufficient System Resources Exist to Complete the Requested Service” error Windows
  • screenshot 2020 03 07 at 22.25.21
    How to export and import User Profile – FrontFace Lockdown Tool Windows
  • Active Directory with IPMI for Out of Band Management
    Integrate Active Directory with IPMI for Out-of-Band Management Backup
  • HP driver
    Printer Driver Information: How to determine the version and type of a Printer Driver Windows
  • maxresdefault
    How to delete Organizational Unit in Active Directory Windows Server
  • App Locker
    Harden your Veeam Backup Server with Microsoft AppLocker Windows
  • SysInternals Tools set
    Download and use Windows Sysinternals Tools locally Windows
  • Slide1
    Configure Desktop Wallpaper and Screen Saver Management via GPO Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,811 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.