To control the blocks of time during which intersite replication can occur over a site link, you can use the Active Directory Sites and Services snap-in to configure the availability settings in the site link schedule.
Membership in the Enterprise Admins group in the forest or the Domain Admins group in the forest root domain, or equivalent, is the minimum required to complete this procedure. Review details about using the appropriate accounts and group memberships at
To configure intersite replication availability |
Open Active Directory Sites and Services. To open Active Directory Sites and Services, click Start, click Administrative Tools, and then click Active Directory Sites and Services.
In the console tree, click the intersite transport folder that contains the site link for which you are configuring intersite replication availability.
Where?
-
Active Directory Sites and Services\Sites\Inter-Site Transports\IP or SMTP
-
Active Directory Sites and Services\Sites\Inter-Site Transports\IP or SMTP
In the details pane, right-click the site link whose schedule you want to configure, and then click Properties.
Click Change Schedule.
Note When you are logged on with an account that does not have sufficient credentials to change the schedule, the available option is View Schedule.
Select the block of time during which you want replication to be either available or not available, and then click Replication Not Available or Replication Available, respectively.
Important | |
Use the IP intersite transport unless your network has remote sites where network connectivity is intermittent or end-to-end IP connectivity is not available. Simple Mail Transfer Protocol (SMTP) replication has restrictions that do not apply to IP replication. For more information about using the SMTP transport, see Understanding Replication Between Sites. |
Additional considerations
-
To perform this procedure, you must be a member of the Enterprise Admins group in the forest or the Domain Admins group in the forest root domain, or you must have been delegated the appropriate authority. As a security best practice, use Run as administrator to perform this procedure. Log on with your lowest-level user account and use administrative credentials when you manage Active Directory Domain Services (AD DS).