To control the blocks of time during which intersite replication can occur over a site link, you can use the Active Directory Sites and Services snap-in to configure the availability settings in the site link schedule.
Membership in the Enterprise Admins group in the forest or the Domain Admins group in the forest root domain, or equivalent, is the minimum required to complete this procedure. Review details about using the appropriate accounts and group memberships at http://go.microsoft.com/fwlink/?LinkId=83477.
|To configure intersite replication availability|
Open Active Directory Sites and Services. To open Active Directory Sites and Services, click Start, click Administrative Tools, and then click Active Directory Sites and Services.
In the console tree, click the intersite transport folder that contains the site link for which you are configuring intersite replication availability.
- Active Directory Sites and
Services\Sites\Inter-Site Transports\IP or SMTP
- Active Directory Sites and Services\Sites\Inter-Site Transports\IP or SMTP
In the details pane, right-click the site link whose schedule you want to configure, and then click Properties.
Click Change Schedule.
When you are logged on with an account that does not have sufficient credentials to change the schedule, the available option is View Schedule.
Select the block of time during which you want replication to be either available or not available, and then click Replication Not Available or Replication Available, respectively.
Use the IP intersite transport unless your network has remote sites where network connectivity is intermittent or end-to-end IP connectivity is not available. Simple Mail Transfer Protocol (SMTP) replication has restrictions that do not apply to IP replication. For more information about using the SMTP transport, see Understanding Replication Between Sites.
- To perform this procedure, you must be a
member of the Enterprise Admins group in the forest or the Domain
Admins group in the forest root domain, or you must have been
delegated the appropriate authority. As a security best practice,
use Run as administrator to perform this procedure. Log on
with your lowest-level user account and use administrative
credentials when you manage Active Directory Domain Services