Performing an unplanned or poorly executed demotion can lead to serious consequences for your Active Directory infrastructure.
Demoting a domain controller (DC) is a critical task in Microsoft Active Directory management that requires careful planning and solid steps to maintain the integrity of your environment. You may need to retire an old physical server, consolidate resources, or troubleshoot replication issues. Understanding the demotion process ensures a smooth transition without disrupting your directory services environment.
In this guide, we’ll walk through the ‘Whys,’ the steps, best practices, and common post-demotion steps to help IT professionals, both new and experienced, safely remove a domain controller while preserving the stability of your Active Directory infrastructure.
🎬 Watch This Week in IT.
Before you initiate the demotion process, it’s essential to ensure your environment is prepared to handle the change without disruption. A pre-demotion checklist helps confirm that critical roles are transferred, replication is healthy, and backups are in place. Skipping these steps can quickly lead to painful headaches and your need to clear your schedule for the next few days!
By following a structured checklist, you minimize risk and guarantee a smooth transition for the process.
Before demoting a domain controller, confirm that Active Directory replication is functioning correctly across all DCs. Your best option is to use the command-line commands: repadmin /replsummary. As of June 2023, the Active Directory Replication Status Tool is no longer available for download, due to its very old age. However, you can review the archived article for reference.
Healthy replication ensures that changes made during demotion propagate properly, preventing orphaned objects or inconsistent directory data.
If the domain controller holds any FSMO (Flexible Single Master Operations) roles, these must be transferred to another DC before demotion. Roles like Schema Master, Domain Naming Master, and PDC Emulator are critical for AD operations. Failing to move them can lead to authentication issues, schema updates failing, or domain-wide instability.
I’m getting ready to demote one of my DCs later in this article to demonstrate the process. I am running this from ‘WS25-DC05’ in my Active Directory (2025) Hyper-V lab environment.
netdom query fsmo
I’m safe. None of the roles is being used by my DC.
Domain controllers also act as DNS servers. Before demotion, verify that DNS zones and records are replicated to other servers and that clients can resolve names without relying on the soon-to-be-removed DC. Update DHCP scopes or static configurations to point to alternate DNS servers to avoid name resolution failures.
This is often handled autonomously by Active Directory. I’m including it here for completeness.
Always perform a full system state backup of one of your domain controllers before demoting it. It is not necessary to specify a specific DC or the one you’re about to demote. As long as the replication status is nominal, any DC will do.
A system-state backup includes the AD database, SYSVOL, and registry settings, providing a recovery point in case something goes wrong. A reliable backup can save hours of troubleshooting and prevent data loss during unexpected failures.
Communication is key to avoiding surprises. Notify IT teams, application owners, and end-users if the demotion might impact authentication or DNS services. Scheduling the demotion during a maintenance window and providing clear timelines helps minimize disruption and ensures everyone is prepared for potential changes.
Here I’ll show you the steps using Server Manager and PowerShell on how to demote a domain controller. I’ll also include the potential need to clean up stale and/or orphaned metadata in case the automated wizards fail for some reason.
I’m logged into one of my DCs, WS25-DC05.reinders.local. This is one of 5 DCs in my Active Directory lab running on Hyper-V. We’ll start in the Server Manager application available from the Start Menu.
After a few minutes, all the necessary steps will be performed, and the server will automatically reboot.
I then logged into WS16-DC2 and opened Active Directory Users and Computers. I selected Domain Controllers and saw that the process was a success!
The server is no longer a DC. In this case, there will be no need for any metadata cleanup as AD is already in the correct state. I’ll speak to what steps you may need to take if that process fails.
We can also perform these steps using PowerShell. And, as is often the case, you’ll probably be amazed at how much simpler this method is. Just a command or two takes care of all the above steps in one fell swoop.
Let’s try this:
Uninstall-ADDSDomainController `
-DemoteOperationMasterRole:$false `
-RemoveApplicationPartitions `
-LocalAdministratorPassword (Read-Host -AsSecureString "Enter local admin password")`
-Confirm:$true
Because the server does not hold any FSMO roles, I chose ‘$false’ under the ‘-Demote…’ option.

Progress ensued. As with the GUI method, the server rebooted after the process was complete. Done!
If the dcpromo / demotion process does not complete successfully, you’ll very likely need to clean up some metadata from the orphaned DC in Active Directory. There are two major steps.
Let’s finish out this article by mentioning a few post-demotion tasks you can perform to make sure all is hunky-dory.
First, open the DNS applet on an existing DC and confirm there are no errant entries for your demoted DC. Specifically, there should be no Nameserver or ‘NS’ record for your old DC anymore.
Open up the Event Viewer application and check the System view. Confirm there are no Errors or Warnings related to AD, domain controllers, or DC replication.
If you were monitoring any AD-related processes in your monitoring software, be sure to remove the server object from the environment. You can continue basic Windows Server monitoring if your server will continue as a Member Server (app server, web server, etc.). But, again, I would decommission – it’s always good to start new when adding a Role to Windows Server.
If you’re working with a physical server that has passed its hardware lifecycle thresholds, you should decommission it. The corresponding steps vary due to your company’s compliance and other guidelines, but removing the asset from financials, donating the hardware, or having it recycled is most important.
In some cases, a domain controller simply cannot be demoted using the standard Server Manager or PowerShell methods. This typically indicates a deeper health issue—replication failures, DNS corruption, missing SYSVOL data, or communication problems with other domain controllers. A forced demotion is a last-resort option that removes Active Directory Domain Services from the server without contacting other DCs or replicating final changes.
Forced demotion should be performed only when a graceful demotion is impossible, and you must be prepared to perform manual metadata cleanup afterward.
Not every domain controller gets a peaceful retirement. Sometimes one fails so badly that the normal “Remove Roles and Features” path just isn’t going to happen. You’re in forced-demotion territory when:
When your DC hits this point, manual deletion is often the only path forward.
A forced demotion:
This is normal. You’ll clean those up manually after the demotion.
PowerShell is the recommended method, as it provides better visibility and fewer GUI-related hangs.
Uninstall-ADDSDomainController `
-ForceRemoval `
-LocalAdministratorPassword (Read-Host -AsSecureString "Enter local admin password") `
-DemoteOperationMasterRole:$true `
-RemoveApplicationPartitions `
-Confirm:$true
If PowerShell isn’t available or fails, Server Manager can force a demotion.
Because AD doesn’t clean anything up after a forced removal, you must do so manually.
Perform these actions on a healthy domain controller, not the server you just demoted.
This removes its computer account and NTDS settings reference.
This removes stale replication topology entries.
Open DNS Manager and look for:
_msdcsDelete anything referencing the former DC.
If the server held FSMO roles at the time of forced demotion, you must seize them.
Run:
netdom query fsmo
If any show as “unavailable,” seize them using:
ntdsutil roles connections connect to server <healthyDC> quit seize <role>
On a healthy DC:
dcdiag /v
repadmin /replsummary
repadmin /showrepl *
Get-ADDomainController -Filter *
Look for:
Avoid forced demotion if:
In most cases, repairing the issue first allows a graceful demotion, which is safer and requires less cleanup.
Common reasons for demoting a domain controller (DC) include decommissioning outdated hardware, reducing the number of DCs to conserve resources, or removing a server that’s causing replication or performance issues. In some cases, organizations migrate to newer operating systems or cloud-based solutions, making older domain controllers redundant. Understanding these scenarios helps IT professionals plan and avoid disruptions to users’ ability to log in to their computers, amongst other requirements of Active Directory.
Demotion typically occurs when a domain controller is no longer required or is being replaced. This could be due to hardware upgrades, virtualization initiatives, or migration to newer versions of Windows Server. Organizations also demote DCs during site consolidations, when branch offices close, or when moving toward cloud-based identity solutions like Entra ID. In some cases, demotion is part of troubleshooting, removing a problematic DC that’s causing replication errors or DNS issues can restore stability to the environment.
Performing an unplanned or poorly executed demotion can lead to serious consequences for your Active Directory infrastructure. If the DC holds critical roles such as FSMO (Flexible Single Master Operations), DNS, or Global Catalog, removing it without proper transfer of these roles can disrupt authentication and replication across the domain. This can very quickly bring your network, or at least your users’ ability to work, to a standstill.
Additionally, lingering metadata from an improperly demoted DC can cause orphaned objects, replication failures, and security vulnerabilities. These risks highlight why careful planning and cleanup are essential before initiating the procedure.
Forced demotion is an emergency-only tool but when used correctly, it can prevent a misbehaving domain controller from causing long-term AD corruption. With a clear understanding of when to use it, the required cleanup steps, and validation afterward, you can safely recover your Active Directory environment even in difficult scenarios.
It means removing the domain controller role (and its associated services) from a server. The server will stop acting as a domain controller and it loses its copy of the Active Directory database and no longer handles authentication/authorization for the domain.
Open Server Manager → go to Manage › Remove Roles and Features → select the target server → uncheck “Active Directory Domain Services (AD DS)” → during the wizard choose “Demote this domain controller,” follow the prompts (credentials, confirm removal, optionally remove DNS delegation), then the server will reboot and become a regular member server.
Yes. If the DC holds any of the special roles (called FSMO roles), you must ensure those roles are moved to another domain controller before demoting. Otherwise, you risk disrupting directory-wide functions.
If you demote the last DC in a domain, and it indeed is the final DC, then demoting it effectively removes the domain (or, if last in forest, removes the entire forest). That’s a major action and must be done with care.