Beruflich Dokumente
Kultur Dokumente
0)
o
2.
3.
256
32
i.
Authoritative Restore - Authoritatively restores the Active Directory database or AD LDS
instance
ii.
ifm - Create installation media for writable and RODC setups (Offline DC provisioning)
iii.
iv.
v.
vi.
snapshot - Manages snapshots of the volumes that contain the Active Directory database and
log files
4.
5.
http://vmwindowsadmin.blogspot.in/2013/07/fsmo-roles-in-nutshell.html
6.
Loadbalancer vs Clustering
o
Clustering
i.
Cluster is a group of resources that are trying to achieve a common objective, and are aware of
one another.
ii.
Clustering usually involves setting up the resources (servers usually) to exchange details on a
particular channel (port) and keep exchanging their states, so a resources state is replicated at other
places as well.
iii.
It usually also includes load balancing, wherein, the request is routed to one of the resources in
the cluster as per the load balancing policy
o
Load Balancing
.
Used to forward requests to either one server or other, but one server does not use the other
servers resources. Also, one resource does not share its state with other resources.
7.
i.
Assigning
ii.
Publishing
o
Assign :
.
If you assign the program to a user, it is installed when the user logs on to the computer. When
the user first runs the program, the installation is completed.
i.
If you assign the program to a computer, it is installed when the computer starts, and it is
available to all users who log on to the computer. When a user first runs the program, the installation is
completed.
Publish :
i.
When the user logs on to the computer, the published program is displayed in the Add or
Remove Programs dialog box, and it can be installed from there.
o
msi packages are used for installation. Normal exe would not work.
Windows cannot install the software while the user is already logged on. The user need
to log off and log in
8.
Group policy security filtering for users. Which all users are in there by default. Members of
Authenticated Users group
9.
10.
Security filtering is a way of refining which users and computers will receive and apply
the settings in a Group Policy object (GPO)
In order for the GPO to apply to a given user or computer, that user or computer must
have both Read and Apply Group Policy (AGP) permissions on the GPO, either explicitly,
or effectively through group membership
By default, all GPOs have Read and AGP both Allowed for the Authenticated Users
group.
The Authenticated Users group includes both users and computers. This is how all
authenticated users receive the settings of a new GPO when it is applied to an
organizational unit, domain or site
Location : C:\Windows\System32\Drivers\etc
L3 switch vs Routers
11.
12.
L3 switches just have the ethernet ports only whereas the routers have WAN interfaces
Routers have expansion slots and cards that allow them to use different media types,
like serial connections for T1 and T3 circuits
VLAN vs Subnet
o
Subnets have weaker security than VLANs as all the subnet uses the same physical
network
Registry
13.
14.
15.
16.
Incremental backup - Will take the backup of files whose archive bits are set and resets
it after backup
Differential backup - Will take the backup of files whose archive bits are set but does not
reset it after backup
Robocopy
o
In WSUS, we can create several computer groups to manage this patch process.
GPO - Group Policy Object : Refers to the policy that is configured at the Active Directory
level and is inherited by the domain member computers. You can configure a GPO at the
site level, domain level or OU level. GPO stores policy settings in two locations GPC and
GPT
GPO behaviour : Local Policy > Site GPO > Domain GPO > OU GPO > Child OU GPO
GPC - Group Policy Container :This is the AD portion of the group policy. This can be
viewed using ADSI edit. It stores version information, status information, and other
policy information. When you create a new GPO, an AD object of class
groupPolicyContainer gets created under the System\Policies container within your AD
domain
17.
GPT - Group Policy Template : The GPT is where the GPO stores the actual settings. It
stores software policy script, and deployment information.
By setting CPU affinity for each VM, you can restrict the assignment of VMs to a subset
of available processors
The main use of setting CPU affinity is when there are display intensive workloads which
requires additional threads with vCPUs.
http://frankdenneman.nl/2011/01/11/beating-a-dead-horse-using-cpu-affinity/
18.
VMversion 4 vs VMversion 7
o
Version 4
i.
ii.
iii.
Max vCPUs 4
iv.
v.
4 NICs/VM
vi.
No USB Support
o
Version 7
i.
ii.
Max vCPUs 8
iii.
MS cluster is supported
iv.
10 NICs/VM
v.
USB support
19.
In case of standalone servers , VMware recommends that VMs should be powered off
before putting the server in maintenance mode
If we put the standalone host in maintenance mode without powering off the VMs, it
will remain in the entering maintenance mode state until the VMs are all shutdown
When all the VMs are powered down, the host status changes to under maintenance
http://pubs.vmware.com/vsphere-4-esxvcenter/index.jsp#using_drs_clusters_to_manage_resources/c_using_maintenance_mode.html
20.
Server core improvements: no need of fresh installation, you can add/remove GUI from
server manager
Remotely manage servers , add/remove roles etc using Server manager-manage 2008
and 2008 R2 with WMF 3.0 installation, installed by default in Server 2012
Remote server administration tools available for windows 8 to manage Windows server
2012 infrastructure
Powershell v3
Hyper-V 3.0
i.
ii.
iii.
Shared nothing live migration, move around VMs without shared storage
21.
22.
23.
ReFS(Resilient file system), upgraded version of NTFS- supports larger file and directory
sizes. Removes the 255 character limitation on long file names and paths, the limit on
the path/filename size is now 32K characters!
Improved CHKDSK utility that will fix disk corruptions in the background without
disruption
How does the backup software recognize that a file has changed since last backup?
o
The files use a bit called archive bit for tracking any change in the file.
The backup softwares normally checks the archive bit of the file to determine whether
the file has to be backed up or not
After making necessary machines in the virtual machine, convert the virtual machine
back to template
i.
ESXi 5.1
VMs
1. vCPUs - 64
2. RAM - 1 TB
3. vNICs - 10
4. vmdk size - 1TB
ii.
Hosts
1. LUNs - 256
2. LUN size - 64TB
3. Distributed vSwitches - 128
4. Ports in a switch - 4096
5. Logical CPUs - 160
6. Memory - 2 TB
7. Virtual machines - 512
i.
ESXi 5.0
VMs
1. vCPUs - 32
2. RAM - 1 TB
3. vNICs - 10
4. vmdk size - 1TB
ii.
Hosts
1. LUNs - 256
2. LUN size - 64TB
3. Distributed vSwitches - 32
4. Ports in a switch - 4096
5. Logical CPUs - 160
6. Memory - 2 TB
ESXi 4.x
ii.
VMs
1. vCPUs - 8
2. RAM - 255GB
3. vNICs - 10
4. vmdk size - 256GB/512GB/1TB/2TB for 1/2/4/8 block sizes
ii.
Hosts
1. LUNs - 256
2. LUN size - 64TB
3. vSwitches - 32
4. Virtual machines - 320
5. Ports in a switch - 4096
24.
What is the major difference between Windows server 2008 and windows server 2012 in
terms of AD promotion?
In Win 2012, dcpromo has been depreciated.In Order to make a Windows server 2012 to a
domain controller, the ADDS service has to be installed from the server manager. After installation, run
the post-deployment configuration wizard from server manager to promote the server as AD
25.