Windows Tools

NLTest Examples

Overview | Syntax | Examples | Related Tools Open Command Prompt

Example 1: Verify DCs in a Domain

In this example, you have just added two DCs to a domain (a-dc2 and a-dc3) and you want to verify that they have actually been added.  At the command prompt, type:

C:\Program Files\SupportTools>nltest /dclist:reskita

Output displays similar to the following:


Get list of DCs in domain 'reskita' from '\\A-DCP'.
	a-dcp.reskita.microsoft.com [PDC] [DS] Site: Default-First-Site
	a-dc3.reskita.microsoft.com	 [DS] Site: Default-First-Site
	a-dc1.reskita.microsoft.com	 [DS] Site: Default-First-Site
	a-dc2.reskita.microsoft.com	 [DS] Site: Default-First-Site
The command completed successfully

You can see that the DCs were properly added and are functioning. You can also see that a-dcp is the PDC emulator for the domain.

Example 2: Advanced Information About Users

In this example, you want to find out detailed information about a certain user. At the command prompt, type:

C:\Program Files\SupportTools>nltest /user:"TestAdmin"

Output displays similar the following:


 User: TestAdmin
Rid: 0x3eb
Version: 0x10002
LastLogon: 2ee61c9a 01c0e947 = 5/30/2001 13:29:10
PasswordLastSet: 9dad5428 01c0e577 = 5/25/2001 17:05:47
AccountExpires: ffffffff 7fffffff = 9/13/30828 19:48:05
PrimaryGroupId: 0x201
UserAccountControl: 0x210
CountryCode: 0x0
CodePage: 0x0
BadPasswordCount: 0x0
LogonCount: 0x33
AdminCount: 0x1
SecurityDescriptor: 80140001 0000009c 000000ac 00000014 00000044 00300002 000000
02 0014c002 01050044 00000101 01000000 00000000 0014c002 000f07ff 00000101 05000
000 00000007 00580002 00000003 00240000 00020044 00000501 05000000 00000015 22cd
b7b4 7112b3f1 2b3be507 000003eb 00180000 000f07ff 00000201 05000000 00000020 000
00220 00140000 0002035b 00000101 01000000 00000000 00000201 05000000 00000020 00
000220 00000201 05000000 00000020 00000220
AccountName: Test Administrator
Groups: 00000201 00000007
LmOwfPassword: fb820c9c 5c7e7e09 ee58593b d959c681
NtOwfPassword: d82959cc 81a342ac df600c37 4e58a478
NtPasswordHistory: 00010001
LmPasswordHistory: 00010001
The command completed successfully

The detailed information provided can be used to troubleshoot many issues.

Example 3: Verify Trust Relationship with a Specific Server

In this example, you want to verify that the server a-dc1 has a valid trust relationship with the domain. At the command prompt, type:

C:\Program Files\SupportTools>nltest /query /server:a-dc1

Output displays similar to the following:


Flags: 0
Connection Status = 0 0x0 NERR_Success
The command completed successfully

You see that the command completed with NERR_Success status, so the trust relationship is valid and working.

Example 4: Determine the PDC Emulator for a Domain

In this example, you want to determine which DC in your domain the Windows NT 4.0-based computers are looking to as the PDC. At the command prompt, type:

C:\Program Files\SupportTools>nltest /dcname:reskita

Output displays similar to the following:


PDC for Domain reskita is \\A-DCP
The command completed successfully

You can see that a-dcp is the PDC emulator for your domain.

Example 5: Show Trust Relationships for a Domain

In this example, you want to view the established trust relationships for your domain. At the command prompt, type:

C:\Program Files\SupportTools>nltest /domain_trusts

Output displays similar to the following:


List of domain trusts:
	0: RESKITA reskita.microsoft.com (NT 5) (Forest Tree Root) (Primary Domain)
The command completed successfully

This example shows that one domain is trusting itself and no others.