Beruflich Dokumente
Kultur Dokumente
Ans: Microsoft’s directory database for Windows 2000/2003 networks. Stores information
about resources on the network and provides a means of centrally organizing, managing, and
controlling access to the resources.
What is Active Directory? Active Directory is a network-based object store and
service that locates and manages resources, and makes these resources available to
authorized users and groups. An underlying principle of the Active Directory is that
everything is considered an object—people, servers, workstations, printers,
documents, and devices. Each object has certain attributes and its own security access
control list (ACL).
2. What is LDAP?
Ans: Lightweight Directory Access Protocol. It is a database of active directory and is used to
store the active directory objects in windows 2000. It is named as Active Directory in windows
2000/2003.
How can you authenticate between forests? Four types of authentication are used
across forests: (1) Kerberos and NTLM network logon for remote access to a server
in another forest; (2) Kerberos and NTLM interactive logon for physical logon
outside the user’s home forest; (3) Kerberos delegation to N-tier application in
another forest; and (4) user principal name (UPN) credentials.
What snap-in administrative tools are available for Active Directory? Active
Directory Domains and Trusts Manager, Active Directory Sites and Services
Manager, Active Directory Users and Group Manager, Active Directory Replication
(optional, available from the Resource Kit), Active Directory Schema Manager
(optional, available from adminpak)
What types of classes exist in Windows Server 2003 Active Directory?
• Structural class. The structural class is important to the system administrator in that
it is the only type from which new Active Directory objects are created. Structural
classes are developed from either the modification of an existing structural type or the
use of one or more abstract classes.
• Abstract class. Abstract classes are so named because they take the form of templates
that actually create other templates (abstracts) and structural and auxiliary classes.
Think of abstract classes as frameworks for the defining objects.
• Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous
attributes when creating a structural class, it provides a streamlined alternative by
applying a combination of attributes with a single include action.
• 88 class. The 88 class includes object classes defined prior to 1993, when the 1988
X.500 specification was adopted. This type does not use the structural, abstract, and
auxiliary definitions, nor is it in common use for the development of objects in
Windows Server 2003 environments.
How do you delete a lingering object? Windows Server 2003 provides a command
called Repadmin that provides the ability to delete lingering objects in the Active
Directory.
a. Authoritative Restore:
The main purpose of Authoritative restore is to undo or roll back changes that have
been made to active directory, or to reset data stored in a distributed directory such
as sysvol.
b. Non-Authoritative Restore.
The data and distributed services on a domain controller are restored from a backup
media and then updated through normal replication.
Example: If a restore backup contains a user named “Mark” and the user was deleted
after last backup, the mark user object will also be deleted on the restored domain
controller via the replication process
Reason for Non-Authoritative Restore
I. Restoring a single domain controller in an environment that includes
multiple domain controller
II. Attempting to restore SYSVOL or File Replication Service data on
domain controllers.
c. Primary Restore
New in windows 2003
Reason for Primary Restore
I. Restoring the only domain controller in an Active Directory
Environment
II. Restoring the first of several domain controllers
III. Restoring the first domain controller in a replica set.
When All the domain controller or the only domain controller in a domain have failed,
primary restore in needed. If a domain is lost, the first domain controller should be
restored as primary restore, and any subsequent domain controller should be
restored using a Normal or Non-Authoritative restore.
What is the difference between Authoritative and Non-Authoritative Restore?
n environments with multiple domain controllers (DCs) providing fault tolerance,
there are two ways to restore the active directory.
Note: To restore the active directory, the System State for Windows 2000 Servers and
Shadow Copy Components for Windows 2003 Servers must be backed up. The system
directories on the servers such as C:\winnt or C:\Windows must also be backed up
regularly.
The second method of restoring an active directory is Authoritative restore. This method
restores the DC directory to the state that it was in when the backup was made, then
overwrites all the other DCs to match the restored DC, thereby removing any changes
made since backup. Authoritative restores do not have to be made of the entire directory,
as you can choose to restore only parts of the directory. When only parts of the active
directory are restored, say an organizational unit, this information is pushed out to the
remaining DCs and they are overwritten. However, the rest of the directory's information
is then replicated to the restored DC's directory and it is updated.
If the environment only has a single domain controller, then there is never a reason to
perform an authoritative restore as there are no replication partners.
During a normal restore operation, Backup operates in nonauthoritative restore mode. That is,
any data that you restore, including Active Directory objects, will have their original update
sequence number. The Active Directory replication system uses this number to detect and
propagate Active Directory changes among the servers in your organization. Because of this,
any data that is restored nonauthoritatively will appear to the Active Directory replication
system as though it is old, which means the data will never get replicated to your other
servers. Instead, if newer data is available from your other servers, the Active Directory
replication system will use this to update the restored data. To replicate the restored data to
the other servers, you must use an authoritative restore.
Authoritative restore
To authoritatively restore Active Directory data, you need to run the Ntdsutil
utility after you have restored the System State data but before you restart the
server. The Ntdsutil utility lets you mark Active Directory objects for
authoritative restore. When an object is marked for authoritative restore its
update sequence number (USN - Each object has an Update Sequence
Number (USN), and if the object is modified, the USN is incremented. This
number is different on each domain controller.) Is changed so that it is
higher than any other update sequence number in the Active Directory
replication system. This will ensure that any replicated or distributed data that
you restore is properly replicated or distributed throughout your organization.
For example, if you inadvertently delete or modify objects stored in the Active
Directory directory service, and those objects are replicated or distributed to
other servers, you will need to authoritatively restore those objects so they are
replicated or distributed to the other servers. If you do not authoritatively restore
the objects, they will never get replicated or distributed to your other servers
because they will appear to be older than the objects currently on your other
servers. Using the Ntdsutil utility to mark objects for authoritative restore
ensures that the data you want to restore gets replicated or distributed
throughout your organization. On the other hand, if your system disk has failed
or the Active Directory database is corrupted, then you can simply restore the
data nonauthoritatively without using the Ntdsutil utility.
You can run the Ntdsutil command-line utility from the command prompt. For more
information about using ntsustil to perform an authoritative restore, see Ntdsutil . Help for
the Ntdsutil utility is also available through the command prompt by typing ntdsutil /?.
Distributed Data Reason for using Authoritative Restore of System State Data
Active DirectoryRolling back or undoing changes.
SYSVOL Resetting data.
Replica Sets Rolling back or undoing changes.
Caution
•
When you restore the System State data, and you do not designate an alternate location for the
data, Backup will erase the System State data that is currently on your computer and replace it
with the System State data you are restoring.
Notes
•To restore the System State data on a domain controller, you must first start your computer
in Directory Services Restore Mode. This will allow you to restore the SYSVOL directory
and the Active Directory. For more information on starting your computer in Directory
Services Restore Mode, see Startup options .
•You can only restore the System State data on a local computer. You cannot restore the
System State data on a remote computer.
MAIN DIFFERENCE:
To replicate the restored data to the other servers, you must use an authoritative
restore.
In single Domain Controller Environment we should use only Non-Authoritative
Restore.
Running NTDSUTIL
Run NTDSUTIL and mark all appropriate objects as “Authoritative." To mark just a subtree
as authoritative, type in the text "restore subtree <name>", where <name> is a string (e.g.
"restore subtree
cn=DomainController,ou=DomainControllers,c=DomainName,dc=TopLevelDomainName"),
at the authoritative restore prompt and press "Enter." For more information, see Microsoft's
documentation on restoring subtrees. NTDSUTIL can be run from the Command prompt.
5. NTDSUTIL will return the number of records that need updating, as well as the
number of records updated.
OR
E:\ntdsutil>ntdsutil
ntdsutil: authoritative restore
authoritative restore: restore object OU=bosses,DC=ourdom,DC=com
Start/Reboot
Press F8
Choose Directory Services Restore Mode and press ENTER.
Press ENTER again to start the boot process.
Logon using the password defined for the local Administrator account
Open the Command Prompt
At the command prompt,
Run the ntdsutil command.
When ntdsutil has started
Type files and press ENTER.
Type info and then press ENTER. This will display current information about the path
and size of the Active Directory database and its log files
In a Windows 2000/2003 domain, the PDC emulator role holder retains the following
functions:
This part of the PDC emulator role becomes unnecessary when all workstations, member
servers, and domain controllers that are running Windows NT 4.0 or earlier are all upgraded
to Windows 2000/2003. The PDC emulator still performs the other functions as described in a
Windows 2000/2003 environment
Additionally, if your domain is a mixed mode domain that contains Windows NT 4 BDCs, then the
Windows 2000 domain controller, that is the PDC emulator, acts as a Windows NT 4 PDC to the
BDCs.
Note: Some consider the PDC emulator to only be relevant in a mixed mode domain. This is not
true. Even after you have changed your domain to native mode (no more NT 4 domain controllers),
the PDC emulator is still necessary for the reasons above.
4. RID Master (Domain level)
The RID master FSMO role holder is the single DC responsible for processing RID Pool requests from
all DCs within a given domain. It is also responsible for removing an object from its domain and
putting it in another domain during an object move.
When a DC creates a security principal object such as a user, group or computer account, it attaches
a unique Security ID (SID) to the object. This SID consists of a domain SID (the same for all SIDs
created in a domain), and a relative ID (RID) that makes the object unique in a domain.
Each Windows 2000 DC in a domain is allocated a pool of RIDs that it assigns to the security
principals it creates. When a DC's allocated RID pool falls below a threshold, that DC issues a request
for additional RIDs to the domain's RID master. The domain RID master responds to the request by
retrieving RIDs from the domain's unallocated RID pool and assigns them to the pool of the
requesting DC.
When a user in DomainA is added to a group in DomainB, then the Infrastructure master is involved.
Likewise, if that user in DomainA, who has been added to a group in DomainB, then changes his
username in DomainA, the Infrastructure master must update the group membership(s) in DomainB
with the name change.
Schema Master No updates to the Active Directory schema will be possible. Since schema
updates are rare (usually done by certain applications and possibly an
Administrator adding an attribute to an object), then the malfunction of the
server holding the Schema Master role will not pose a critical problem.
Domain Naming Master The Domain Naming Master must be available when adding or removing a
domain from the forest (i.e. running DCPROMO). If it is not, then the domain
cannot be added or removed. It is also needed when promoting or demoting
a server to/from a Domain Controller. Like the Schema Master, this
functionality is only used on occasion and is not critical unless you are
modifying your domain or forest structure.
PDC Emulator The server holding the PDC emulator role will cause the most problems if it is
unavailable. This would be most noticeable in a mixed mode domain where
you are still running NT 4 BDCs and if you are using downlevel clients (NT
and Win9x). Since the PDC emulator acts as a NT 4 PDC, then any actions
that depend on the PDC would be affected (User Manager for Domains,
Server Manager, changing passwords, browsing and BDC replication).
In a native mode domain the failure of the PDC emulator isn't as critical
because other domain controllers can assume most of the responsibilities of
the PDC emulator.
RID Master The RID Master provides RIDs for security principles (users, groups,
computer accounts). The failure of this FSMO server would have little impact
unless you are adding a very large number of users or groups.
Each DC in the domain has a pool of RIDs already, and a problem would
occur only if the DC you adding the users/groups on ran out of RIDs.
Infrastructure Master This FSMO server is only relevant in a multi-domain environment. If you only
have one domain, then the Infrastructure Master is irrelevant. Failure of this
server in a multi-domain environment would be a problem if you are trying
to add objects from one domain to another.
The Schema Master and Domain Naming Master should reside on the same server, and that machine should
be a Global Catalog server. Since all three are, by default, on the first domain controller installed in a forest,
then you can leave them as they are.
Note: According to MS, the Domain Naming master needs to be on a Global Catalog Server. If you are going
to separate the Domain Naming master and Schema master, just make sure they are both on Global Catalog
servers.
IMP:- Why Infrastructure Master should not be on the same server that acts as a Global Catalog
server?
The Infrastructure Master should not be on the same server that acts as a Global Catalog server.
The reason for this is the Global Catalog contains information about every object in the forest. When the
Infrastructure Master, which is responsible for updating Active Directory information about cross domain object
changes, needs information about objects not in it's domain, it contacts the Global Catalog server for this
information. If they both reside on the same server, then the Infrastructure Master will never think there are
changes to objects that reside in other domains because the Global Catalog will keep it constantly updated.
This would result in the Infrastructure Master never replicating changes to other domain controllers in its
domain.
Note: In a single domain environment this is not an issue.
Microsoft also recommends that the PDC Emulator and RID Master be on the same server. This is not
mandatory like the Infrastructure Master and the Global Catalog server above, but is recommended. Also, since
the PDC Emulator will receive more traffic than any other FSMO role holder, it should be on a server that can
handle the load.
It is also recommended that all FSMO role holders be direct replication partners and they have high bandwidth
connections to one another as well as a Global Catalog server.
Before you can transfer a role, you must have the appropriate permissions depending on which role you plan to
transfer:
FSMO TOOLS
Q8. Tools to find out what servers in your domain/forest hold what server roles?
1. Active Directory Users and Computers:- use this snap-in to find out where the domain level FSMO roles
are located (PDC Emulator, RID Master, Infrastructure Master), and also to change the location of one or more
of these 3 FSMO roles.
Open Active Directory Users and Computers, right click on the domain you want to view the FSMO roles for and
click "Operations Masters". A dialog box (below) will open with three tabs, one for each FSMO role. Click each
tab to see what server that role resides on. To change the server roles, you must first connect to the domain
controller you want to move it to. Do this by right clicking "Active Directory Users and Computers" at the top
of the Active Directory Users and Computers snap-in and choose "Connect to Domain Controller". Once
connected to the DC, go back into the Operations Masters dialog box, choose a role to move and click the
Change button.
When you do connect to another DC, you will notice the name of that DC will be in the field below the Change
button (not in this graphic).
2. Active Directory Domains and Trusts - use this snap-in to find out where the Domain Naming Master
FSMO role is and to change it's location.
The process is the same as it is when viewing and changing the Domain level FSMO roles in Active Directory
Users and Computers, except you use the Active Directory Domains and Trusts snap-in. Open Active Directory
Domains and Trusts, right click "Active Directory Domains and Trusts" at the top of the tree, and choose
"Operations Master". When you do, you will see the dialog box below. Changing the server that houses the
Domain Naming Master requires that you first connect to the new domain controller, then click the Change
button. You can connect to another domain controller by right clicking "Active Directory Domains and Trusts"
at the top of the Active Directory Domains and Trusts snap-in and choosing "Connect to Domain Controller".
3. Active Directory Schema - this snap-in is used to view and change the Schema Master FSMO role.
However... the Active Directory Schema snap-in is not part of the default Windows 2000 administrative tools or
installation. You first have to install the Support Tools from the \Support directory on the Windows 2000
server CD or install the Windows 2000 Server Resource Kit. Once you install the support tools you can open
up a blank Microsoft Management Console (start, run, mmc) and add the snap-in to the console. Once the
snap-in is open, right click "Active Directory Schema" at the top of the tree and choose "Operations Masters".
You will see the dialog box below. Changing the server the Schema Master resides on requires you first
connect to another domain controller, and then click the Change button.
You can connect to another domain controller by right clicking "Active Directory Schema" at the top of the
Active Directory Schema snap-in and choosing "Connect to Domain Controller".
4.Netdom
The easiest and fastest way to find out what server holds what FSMO role is by using the Netdom command
line utility. Like the Active Directory Schema snap-in, the Netdom utility is only available if you have installed
the Support Tools from the Windows 2000 CD or the Win2K Server Resource Kit.
To use Netdom to view the FSMO role holders, open a command prompt window and type:
netdom query fsmo and press enter. You will see a list of the FSMO role servers:
5. Active Directory Relication Monitor
Another tool that comes with the Support Tools is the Active Directory Relication Monitor. Open this utility
from Start, Programs, Windows 2000 Support Tools. Once open, click Edit, Add Monitored Server and add the
name of a Domain Controller. Once added, right click the Server name and choose properties. Click the FSMO
Roles tab to view the servers holding the 5 FSMO roles (below). You cannot change roles using Replication
Monitor, but this tool has many other useful purposes in regard to Active Directory information. It is
something you should check out if you haven't already.
Finally, you can use the Ntdsutil.exe utility to gather information about and change servers for FSMO roles.
Ntdsutil.exe, a command line utility that is installed with Windows 2000 server, is rather complicated and
beyond the scope of this document.
6. DUMPFSMOS
Command-line tool to query for the current FSMO role holders
Part of the Microsoft Windows 2000 Server Resource Kit
Downloadable from http://www.microsoft.com/windows2000
/techinfo/reskit/default.asp
Prints to the screen, the current FSMO holders
Calls NTDSUTIL to get this information
7. NLTEST
Command-line tool to perform common network administrative tasks
Type “nltest /?” for syntax and switches
Common uses
Get a list of all DCs in the domain
Get the name of the PDC emulator
Query or reset the secure channel for a server
Call DsGetDCName to query for an available domain controller
• Ntds.dit. This is the main AD database. NTDS stands for NT Directory Services. The
DIT stands for Directory Information Tree. The Ntds.dit file on a particular domain
controller contains all naming contexts hosted by that domain controller, including the
Configuration and Schema naming contexts. A Global Catalog server stores the
partial naming context replicas in the Ntds.dit right along with the full Domain
naming context for its domain.
• Edb.log. This is a transaction log. Any changes made to objects in Active Directory
are first saved to a transaction log. During lulls in CPU activity, the database engine
commits the transactions into the main Ntds.dit database. This ensures that the
database can be recovered in the event of a system crash. Entries that have not been
committed to Ntds.dit are kept in memory to improve performance. Transaction log
files used by the ESE engine are always 10MB.
• Edbxxxxx.log. These are auxiliary transaction logs used to store changes if the main
Edb.log file gets full before it can be flushed to Ntds.dit. The xxxxx stands for a
sequential number in hex. When the Edb.log file fills up, an Edbtemp.log file is
opened. The original Edb.log file is renamed to Edb00001.log, and Edbtemp.log is
renamed to Edb.log file, and the process starts over again. ESENT uses circular
logging. Excess log files are deleted after they have been committed. You may see
more than one Edbxxxxx.log file if a busy domain controller has many updates
pending.
• Edb.chk. This is a checkpoint file. It is used by the transaction logging system to
mark the point at which updates are transferred from the log files to Ntds.dit. As
transactions are committed, the checkpoint moves forward in the Edb.chk file. If the
system terminates abnormally, the pointer tells the system how far along a given set
of commits had progressed before the termination.
• Res1.log and Res2.log. These are reserve log files. If the hard drive fills to capacity
just as the system is attempting to create an Edbxxxxx.log file, the space reserved by
the Res log files is used. The system then puts a dire warning on the screen prompting
you to take action to free up disk space quickly before Active Directory gets
corrupted. You should never let a volume containing Active Directory files get even
close to being full. File fragmentation is a big performance thief, and fragmentation
increases exponentially as free space diminishes. Also, you may run into problems as
you run out of drive space with online database defragmentation (compaction). This
can cause Active Directory to stop working if the indexes cannot be rebuilt.
• Temp.edb. This is a scratch pad used to store information about in-progress
transactions and to hold pages pulled out of Ntds.dit during compaction.
• Schema.ini. This file is used to initialize the Ntds.dit during the initial promotion of a
domain controller. It is not used after that has been accomplished.
Active Directory Replication
As mentioned in an earlier section, the Active Directory database is replicated between domain
controllers. The data replicated between controllers called "data" are also called "naming
context". Only the changes are replicated, once a domain controller has been established.
Active Directory uses a multimaster model which means changes can be made on any
controller and the changes are sent to all other controllers. The replication path in Active
Directory forms a ring which adds reliability to the replication.
How Replication is Tracked
• USN - Each object has an Update Sequence Number (USN), and if the object is
modified, the USN is incremented. This number is different on each domain controller.
• Stamps - Each object has a stamp with the version number, timestamp, and the GUID of
the domain controller where the change was made
Domain controllers each contain a "replica" which is a copy of the domain directory. The
"directory update type" indicates how the data is replicated. The two types are:
• Origination update - A change made by an administrator at the local domain controller.
• Replicated update - A change made to the replica because of a replication from a
replication partner.
Replication Sequence
Terms:
• Latency - The required time for all updates to be completed throughout all comain
controllers on the network domain or forest.
• Convergence - The state at which all domain controllers have the same replica contents
of the Active directory database.
• Loose consistency - The state at which all changes to the database are not yet replicated
throughout all controllers in the database (not converged).
A change is made to the Active Directory database on a domain controller. The attribute of
the object and the new USN is written to the database. The entire object is NOT
replicated. This is called an atomic operation because both changes are done, or neither
change is done. This is an origination update. There are four types:
• Add - An object is added to the database.
• Delete - An object is deleted from the database.
• Modify - An object in the database has its attributes modified.
• Modify DN - An object is renamed or moved to another domain.
The controller the change was made on (after five minutes of stablilty), notifies its
replication partners that a change was made. It sends a change notification to these
partners, but only notifies one partner every 30 seconds so it is not overwhelmed with
update requests. Each controller, in turn, when it is updated, sends a change notice to its
respective replication partners.
The replication partners each send an update request with a USN to the domain controller
that the change was made on. The USN identifies the current state of the domain
controller making the change. Each change has a unique USN. This way the domain
controller that has the change knows the state of the domain controller requesting the
changes and only the changes are required to be sent. The time on each controller,
therefore, does not need to be synchronized exactly although timestamps are used to
If no changes have been performed in six hours, replication procedures are performed to be
sure no information has been missed.
Information sent during an update includes:
• Updated object
• The GUID and USN of the domain server with the originating update.
• A local USN of the update on the updated object.
Replication Path
The replication path that domain controller Active Directory replicated data travels through
an enterprise is called the replication topology. Connection objects are used to define the
replication paths between domain controllers. Active Directory, by default, sets up a two way
ring replication path. The data can travel in both directions around the ring which provides
redundancy and reliability. Two types of replication occur in the path:
• Direct replication - When replication is done from a primary source of data.
• Transitive replication - When replication is done from a secondhand or replicated
source of data.
The Knowledge Consistency Checker (KCC) (running on all domain controllers) generates
the replication topology by specifying what domain controllers will replicate to which other
domain controllers in the site. The KCC maintains a list of connections, called a replication
topology, to other domain controllers in the site. The KCC ensures that changes to any object
are replicated to all site domain controllers and updates go through no more than three
connections. Also an administrator can configure connection objects.
The KCC uses information provided by the administrator about sites and subnets to
automatically build the Active Directory replication topology.
Propagation Dampening
Terms:
• Propagation dampening is used to prevent unnecessary replication by preventing
updates from being sent to servers that are already updated. Each domain controller
keeps a list of other known domain controllers and the last USN received from each
controller. Two up-to-date vector numbers support this:
• Replica GUID
• Update Sequence Number (USN) - Mentioned earlier it is incremented
anytime an origination or replicated update is received. The USN stored is
from the originating server. It is stored as metadata with:
• An attribute indicating "added" or "changed" for the object being
updated.
• The GUID (above).
• A local USN for the object attribute changed.
• The changed data.
The up-to-date vector numbers are incremented when replication occurs with
the originating server. Each domain controller has its own different USN
(They may not start at the same number). The highest USN from each domain
controller that is stored in other domain controllers is called the high
watermark for that domain controller.
• Propagation delay describes the amount of time required for a change to be replicated
to domain controllers throughout the domain.
• Ring Topology - The Active Directory replication process uses a ring topology where
the replication partners form a ring. This adds reliability to the process and also helps
decrease propagation delay.
The information sent in an update request includes the high water mark entry for the
originating server for the last change received. If the highwater mark received from the server
that sent the update request is the same as the highwatermark for the originating server on the
server receiving the request, the receiving server will not send the replicated information.
The usnChanged parameter is the highest USN number for any object.
Replication Partitions
Types of Active Directory data storage categories which are called partitions:
• Schema partition - Defines rules for object creation and modification for all objects in
the forest. Replicated to all domain controllers in the forest. Replicated to all domain
controllers in the forest, it is known as an enterprise partition.
• Configuration partition - Information about the forest directory structure is defined
including trees, domains, domain trust relationships, and sites (TCP/IP subnet group).
Replicated to all domain controllers in the forest, it is known as an enterprise
partition.
• Domain partition - Has complete information about all domain objects (Objects that
are part of the domain including OUs, groups, users and others). Replicated only to
domain controllers in the same domain.
• Partial domain directory partition - Has a list of all objects in the directory
with a partial list of attributes for each object.
These partitions are all replicated between domain controllers by Active directory. Different
partitions may be replicated between different replication partners.
Replication Conflict
Replication conflict occurs when changes are made to the same object and attribute before the
changes can be replicated throughout all domain controller's copies of the database.
Additional data (metadata) stored for each object attribute includes (not related to USN):
• Time stamp of the last change.
• Attribute version number - For each object's attributes, this value is the same on all
domain controllers.
When an Active Directory database update is received on a domain controller, one of the
following happens:
• If the update attribute version number is higher than the current version number on the
controller, the new value of the attribute is stored and the version number is updated.
• If the update attribute version number and stored attribute version number are the
same, timestamps are used to resolve the conflict.
• If the both version numbers and both timestamps are the same, the update from the
controller with the highest GUID is used.
File Replication Service
In Windows 2000, the SYSVOL share is used to to authenticate users. The SYSVOL share
includes group policy information which is replicated to all local domain controllers. File
replication service (FRS) is used to replicate the SYSVOL share. The "Active Directory
Users and Computers" tool is used to change the file replication service schedule.
Intrasite Replication
Replication that happens between controllers inside one site. All of the subnets inside the site
should be connected by high speed network wires. Replication between two sites may need to
be sent over a slower WAN link or leased line. Intrasite replication data is sent
uncompressed.
Site replication is done using Remote Procedure Call (RPC). If a change is made,
replication occurs within five minutes, and replication is done every six hours if no changes
were made. Domain controllers that receive updates replicate that information to other
domain controllers on their route list. All changes are therefore completed within a site within
15 minutes since there can only be three hops.
The topology used here is the ring topology talked about earlier and this replication is
automatically set up by Active Directory, but may be modified by an administrator.
DNS Replication
The DNS IP address and computer name is stored in Active Directory for Active Directory
integrated DNS zones and replicated to all local domain controllers. DNS information is not
replicated to domain controllers outside the domain.
Intersite Replication
Intrasite replication is replication between sites and must be set up by an administrator.
Replication Management
The administrative tool, "Active Directory Sites and Services", is used to manage Active
Directory replication. Replication data is compressed before being sent to minimze
bandwidth use. There are two protocols used to replicate AD:
• Normally Remote Procedure Call (RPC) is used to replicate data and is always used
for intrasite replication since it is required to support the FRS. RPC depends on IP
(internet protocol) for transport.
• Simple Mail Transfer Protocol (SMTP) may be used for replication between sites.
SMTP can't replicate the domain partition, however. Therefore the remote site would need to
be in another domain to be able to effectively use SMTP for carrying replication data.
Bridgehead server - A domain controller that is used to send replication information to one or
more other sites.
Flexible Single Master Operations (FSMO) (discussed in an earlier section) can be
transferred manually to various domain controllers. Roles and tools used to transfer are:
• Schema Master - Use "Active Directory Domains and Trusts". Makes changes to the
database schema. Applications may remotely connect to the schema master.
• Domain Naming Master - Use the MMC "Active Directory Schema Snap-in". Adds or
removes domains to or from the forest.
• Primary Domain Controller (PDC) Emulator - Use the "Active Directory Users and
Computers" administrative tool. When Active Directory is in mixed mode, the
computer Active Directory is on acts as a Windows NT PDC. Mixed mode occurs
when Active Directory interfaces with NT 4.0 BDCs or ones without Windows 2000
Directory Service client software. In mixed mode, computers without Windows 2000
client software must contact the PDC emulator to change user account information.
• Relative ID Master (RID Master) - Use the "Active Directory Users and Computers"
administrative tool. All objects have a Security Identifier (SID) and a domain SID.
The RID assigns relative IDs to each domain controller.
• Infrastructure Master - Use the "Active Directory Users and Computers"
administrative tool. Updates group membership information when users from other
domains are moved or renamed.
Any master role can be transferred by using the command line program, ntdsutil.exe. When a
server performing a master role fails and goes offline, you can perform "seizing master
operations" to have another server perform that role. Only the ntdsutil.exe program can
perform this function. Commands include:
• connections - A connections prompt appears:
• connect to server "FQDN of server to connect to"
• quit
• sieze "name of role to transfer". Role names are:
• PDC
• RID master
• schema master
• domain naming master
• infastructure master
Example: "sieze RID master"
Replication Associated Performance Monitor Counters
• DRA Inbound Bytes Not Compressed - Replicated uncompressed bytes that are
probably from a Directory Services Agent (another controller sending data) in the
same site.
• DRA Inbound Bytes Compressed (Before Compression) - Replicated bytes received
(as though in uncompressed form).
• DRA Inbound Bytes Not Compressed (After Compression) - Replicated bytes
received (as in compressed form).
• DRA Inbound Bytes Total The sum of the DRA Inbound Bytes Not Compressed plus
the DRA Inbound Bytes Not Compressed (After Compression).
• DRA Outbound Bytes Not Compressed - Replicated uncompressed bytes that are
being sent to another domain controller in the same site.
Schema Cache
A schema cache which is a copy of the schema in memory can be used to speed up schema
queries but should be used sparingly due to the high memory requirements. If the
schemaUpdateNow attribute is added to the RootDSE a schema cache update is done
immediately. Normally the schema cache is stored in memory when the system boots and
updated every five minutes.
Active Directory Sites
A site is a grouping of machines based on a subnet of TCP/IP addresses. An administrator
determines what a site is. Sites may contain multiple subnets. There can be several domains in a
site.
Active Directory replication to various sites is performed using Active Directory Sites and
Services. (Make section explaining how to use this). Sites and subnets are not related to the
structure of the domain.
The following may be created:
• Sites - One or more IP subnets. Generally this refers to a physical site such as a portion
of the organization in particular city or part of a city which is linked by leased lines or
other media to other parts of the organization.
• Subnets - Subnets must be created in each site object before it is really active. A
network address and subnet mask is used to define the subnet.
• Site links - It is a list of two or more connected sites. Whether the link will use RPC or
SMTP for passing data must be determined before creating the link since it cannot be
changed. Selection IP means selection RPC over IP. Site link information includes:
• Replication schedule - Specify the times the sites can replicate and how often
they attempt replication.
• Link cost - High for a low bandwidth link. A high cost link gets lower priority.
A lower priority link is normally used if there are more than one link to the same
location.
• Member sites - Lists sites that are connected using the site link.
• Transport Mechanism - RPC or SMTP (Mail) is specified.
• SMTP (Mail) - It cannon be used for replication inside the same site and
is a form of asynchronous replication.
• RPC - Requires more bandwidth than SMTP.
Bridgehead server - A domain controller that is used to send replication information to
one or more other sites across a site link.
• Site link bridges - Allows one site in a string of sites to replicate through one or two
sites to a second or third site. These are only used for fine control of how replication
will occur across WAN links. This is actually done automatically by AD, without fine
control. To use this feature, automatic bridging of site links must be turned off. You
must have three sites to create a site link bridge since it takes three sites and two site
links to make a string of sites.
• Global catalog servers - The global catalog is a searchable master index with data about
all objects in a forest. The global catalog server maintains this catalog. It:
• Helps Active Directory resources be located by users.
• During logon, it provides group membership information.
There is one in each domain by default, and the first domain controller in the domain is
originally the global catalog server. It is worthwhile to have a global catalog server on
each side of a WAN connection if the domain is spread out across a WAN.
13. What is DNS ?
Ans: Domain Name System) - The Internet naming scheme which consists of a hierarchical
sequence of names, from the most specific to the most general (left to right), separated by
dots,
And it is the system which translates the internet domain name into IP address and vice-
versa.
The Server, which translates such types of request, is DNS server.
14. What is stub zone?
Stub zone is new in Windows 2003 Server. It contains read-only resource record which it
obtains from other name servers. But it contains only three types of resource record
I. A copy of SOA record for the servers
II. Copies of NS records for all name servers authoritative for the zone.
III. Copies of A records for all name servers authoritative for the zone
It does not contain CNAME records, MX records, SRV records, or A records for other hosts in
the zone. The most important benefit for stub zone is to reduce the network traffic over
WAN link connection and time to resolve the resource records queries.
If several domain controllers are placed on the network, and later the network is
broken into sites, appropriate servers must be manually moved to the appropriate site
that they are on. If the domain controller is created after the site is created, the server
is placed automatically in the correct site (based on IP address).
16. How do you check DNS is working or how do you check the service record of DNS is
working?
Ans: nslookup command is used to check the DNS server.
Go to command prompt
After you have setup your DNS Server, it’s very important to check that the entries which are
populated to the Internet are correct. You can use the following checklist using nslookup.
Start nslookup for the desired DNS Server
nslookup
> server 193.247.121.196
Default Server: rabbit.akadia.ch
Address: 193.247.121.196
akadia.com
origin = rabbit.akadia.com
mail addr = postmaster.akadia.com
serial = 2000061501
refresh = 10800 (3H)
retry = 3600 (1H)
expire = 604800 (1W)
minimum ttl = 86400 (1D)
akadia.com nameserver = rabbit.akadia.com
akadia.com nameserver = lila.thenet.ch
rabbit.akadia.com internet address = 193.247.121.196
lila.thenet.ch internet address = 193.135.252.2
Check the Nameservers (NS)
• set q=NS
> akadia.com
Server: rabbit.akadia.ch
Address: 193.247.121.196
• set q=MX
> akadia.com
Server: rabbit.akadia.ch
Address: 193.247.121.196
• set q=any
> akadia.com
Server: rabbit.akadia.ch
Address: 193.247.121.196
17. What is WINS? And what is the difference between WINS and DNS.
Windows Internet Name Server, it translates the NetBIOS name to IP address.
DNS translate the FQDN name to IP address. FQDN Name consists of zone name, domain
name and host name and these are separated by dots. And it resolves this address into IP
address.
WINS does not translate from FQDN name to IP address.
.
20. How may types of backup and advantage and disadvantage?
Types of Backup
There are different kinds of backups, the following lists some of them:
Full Backup
Full backup is the starting point for all other backups, and contains all the data in the folders
and files that are selected to be backed up. Because full backup stores all files and folders,
frequent full backups result in faster and simpler restore operations. Remember that when
you choose other backup types, restore jobs may take longer.
Differential Backup
A differential backup copies files created or changed since the last normal or incremental
backup. It does not mark files as having been backed up (in other words, the archive attribute
is not cleared). If you are performing a combination of normal and differential backups,
restoring files and folders requires that you have the last normal as well as the last differential
backup.
Advantages Restore is faster than restoring from incremental backup
Backing up is faster than a full backup
The storage space requirements are lower than for full
backup
Disadvantages Restore is slower than restoring from full backup
Backing up is slower than incremental backup
The storage space requirements are higher than for
incremental backup
22. How the Secondary DNS servers get the updates from Primary DNS server? Tell me the
process
The actual data transfer process is started by the client on client server mechanism.
With every new record entry, edit or update in the primary server, the serial number
increases and it makes two changes one to the record and other to the zone serial
number
TCP:
1. It provides a reliable-connection oriented packet delivery service
2. Guarantees delivery of IP datagram.
3. Perform segmentation and reassembly of large block of data sent by programs.
4. Ensures proper sequencing and ordered delivery of segmented data.
5. Perform check on the integrity of transmitted data by using checksum calculation
6. Sends acknowledgement of the received data.
IP:
IP is a connectionless, unreliable datagram protocol.
Primarily responsible for addressing and routing packets
between hosts
IP does not attempt to recover from these types of error..
The global catalog contains a partial replica of every Windows 2000 domain in the directory. The GC
lets users and applications find objects in an Active Directory domain tree given one or more attributes
of the target object. It also contains the schema and configuration of directory partitions. This means
the global catalog holds a replica of every object in the Active Directory, but with only a small number
of their attributes
Step 1. A client (or “resolver”) passes its request to its local name server. For example, the URL term
www.idgbooks.com typed into Internet Explorer is passed to the DNS server identified in the client
TCP/IP configuration. This DNS server is known as the local name server.
Step 2. If, as often happens, the local name server is unable to resolve the request, other name
servers are queried so that the resolver may be satisfied.
Step 3. If all else fails, the request is passed to more and more, higher-level name servers until the
query resolution process starts with far-right term (for instance, com) or at the top of the DNS tree with
root name servers
Q4. Which are the major records in DNS?
1. Host or Address Records (A):- map the name of a machine to its numeric IP address. In clearer
terms, this record states the hostname and IP address of a certain machine. Have three fields: Host Name,
Domain, Host IP Address.
E.g.:- eric.foobarbaz.com. IN A 36.36.1.6
It is possible to map more than one IP address to a given hostname. This
often happens for people who run a firewall and have two Ethernet cards in
one machine. All you must do is add a second A record, with every column
the same save for the IP address.
1996111901 ; Serial
10800 ; Refresh
3600 ; Retry
3600000 ; Expire
86400 ) ; Minimum
The first column contains the domain for which this record begins authority for. The next
two entries should look familiar. The “draven.foobarbaz.com” entry is the primary name
server for the domain. The last entry on this row is actually an email address, if you
substituted a “@” for the first “.”. There should always be a viable contact address in the
SOA record.
The next entries are a little more unusual then what we have become used to. The serial
number is a record of how often this DNS entry has been updated. Every time a change
is made to the entry, the serial number must be incremented. Other name servers that
pull information for a zone from the primary only pull the zone if the serial number on
the primary name server’s entry is higher than the serial number on it’s entry. In this
way the name servers for a domain are able to update themselves. A recommended way
of using your serial number is the YYYYMMDDNN format shown above, where the NN is
the number of times that day the DNS has been changed.
Also, a note for Allegiance Internet customers who run their own name servers: even if
the serial number is incremented, you should still fill out the web form and use the
comment box when you make changes asking us to pull the new zones.
All the rest of the numbers in the record are measurements of time, in seconds. The
“refresh” number stands for how often secondary name servers should check the
primary for a change in the serial number. “Retry” is how long a secondary server should
wait before trying to reconnect to primary server if the connection was refused. “Expire”
is how long the secondary server should use its current entry if it is unable to perform a
refresh, and “minimum” is how long other name servers should cache, or save, this
entry.
There can only be one SOA record per domain. Like NS records, Allegiance
Internet sets up this record for you if you are not running your own name
server.
Quick Summary of the major records in DNS
AD-integrated zones store the zone data in Active Directory and use the same replication
process used to replicate other data between domain controllers. The one catch with AD-
integrated zones is that the DNS server must also be a domain controller. Overloading DNS
server responsibilities on your domain controllers may not be something you want to do if
you plan on supporting a large volume of DNS requests.
Q11. What does a stub zone consists of?
The start of authority (SOA) resource record, name server (NS) resource records, and the glue A
•
resource records for the delegated zone.
• The IP address of one or more master servers that can be used to update the stub zone.
Q14. What is Scavenging?
DNS scavenging is the process whereby resource records are automatically removed if they
are not updated after a period of time. Typically, this applies to only resource records that
were added via DDNS, but you can also scavenge manually added, also referred to as static,
records. DNS scavenging is a recommended practice so that your DNS zones are
automatically kept clean of stale resource records.
Q1.
Q5. How are Group Policies Applied?
Group Polices can be configured locally, at the Site level, the Domain level or at the Organizational Unit (OU)
level. Group Policies are applied in a Specific Order, LSDO - Local policies first, then Site based policies, then
Domain level policies, then OU polices, then nested OU polices (OUs within OUs). Group polices cannot be
linked to a specific user or group, only container objects.
In order to apply Group Polices to specific users or computers, you add users (or groups) and computers to
container objects. Anything in the container object will then get the policies linked to that container. Sites,
Domains and OUs are considered container objects.
Computer and User Active Directory objects do not have to put in the same container object. For example,
Sally the user is an object in Active Directory. Sally's Windows 2000 Pro PC is also an object in Active
Directory. Sally the user object can be in one OU, while her computer object can be another OU. It all depends
on how you organize your Active Directory structure and what Group Policies you want applied to what objects.
Q14. Which are the two types of default policies?
There are two default group policy objects that are created when a domain is created. The Default Domain
policy and the Default Domain Controllers policy.
Default Domain Policy - this GPO can be found under the group policy tab for that domain. It is the first
policy listed. The default domain policy is unique in that certain policies can only be applied at the domain
level.
If you double click this GPO and drill down to Computer Configuration, Windows Settings, Security Settings,
Account Policies, you will see three policies listed:
Password Policy
Acount Lockout Policy
Kerberos Policy
These 3 policies can only be set at the domain level. If you set these policies anywhere else- Site or OU, they
are ignored. However, setting these 3 policies at the OU level will have the effect of setting these policies for
users who log on locally to their PCs. Login to the domain you get the domain policy, login locally you get the
OU policy.
If you drill down to Computer Configuration, Windows Settings, Security Settings, Local Policies, Security
Options, there are 3 policies that are affected by Default Domain Policy:
The Default Domain Policy should be used only for the policies listed above. If you want to create additional
domain level policies, you should create additional domain level GPOs.
Do not delete the Default Domain Policy. You can disable it, but it is not recommended.
Default Domain Controllers Policy - This policy can be found by right clicking the Domain Controllers OU,
choosing Properties, then the Group Policy tab. This policy affects all Domain Controllers in the domain
regardless of where you put the domain controllers. That is, no matter where you put your domain controllers
in Active Directory (whatever OU you put them in), they will still process this policy.
Use the Default Domain Controllers Policy to set local policies for your domain controllers, e.g. Audit Policies,
Event Log settings, who can logon locally and so on.
Read full backup page for more details. Our backup software performs full backups.
Differential backup
A differential backup contains all files that have changed since the last FULL backup. The
advantage of a differential backup is that it shortens restore time compared to a full backup or
an incremental backup. However, if you perform the differential backup too many times, the
size of the differential backup might grow to be larger than the baseline full backup.
Read differential backup page for more details. Our backup software performs differential
backups.
Incremental backup
An incremental backup stores all files that have changed since the last FULL OR
DIFFERENTIAL backup. The advantage of an incremental backup is that it takes the least time
to complete. However, during a restore operation, each incremental backup must be processed,
which could result in a lengthy restore job.
Read incremental backup page for more details. Our backup software performs incremental
backups.
Mirror backup
A mirror backup is identical to a full backup, with the exception that the files are not
compressed in zip files and they can not be protected with a password. A mirror backup is most
frequently used to create an exact copy of the backup data. It has the benefit that the backup files
can also be readily accessed using tools like Windows Explorer.
DHCP leases are used to reduce DHCP network traffic by giving clients specific addresses
for set periods of time. The DHCP process stages can be remembered using the ROSA
acronym:
Request - A broadcast is sent by the client with the client MAC address. This is a DHCP
discover message with source IP address of 0.0.0.0 and destination address of
255.255.255.255. The client tries to get its last address. If it is not available, the DHCP server
will send a NACK signal. The client state is initialization during the request stage.
Offer - A DHCP offer message is sent from the DHCP server with some or all the optional
information as listed above. Information sent includes the IP address of the DHCP server that
sent the accepted offer. All offered IP addresses are marked unavailable by the DHCP server
when the DHCP server offers them until they are rejected. The client is in the selecting state
during this offer stage.
Selection (or acceptance) - The first offer received by the client is accepted. The client
broadcasts its selected choice using a DHCP request message which includes the IP address
of the DNS server that sent the accepted offer. The client is in the requesting state during this
selection stage.
Acknowledgement - The server acknowledges with a DHCP acknowledge indicating the
client can use the address or it will send a DHCP Nak instructing the client that the address
became unavailable. Other DHCP servers retract their offers and mark the offered address as
available and the accepted address as unavailable. Any offered IP addresses not selected are
freed to be used again. The client state is the binding state during this acknowledgement
stage.
When the client sends the lease request, it then waits one second for an offer. If a response is
not received, the request is repeated at 9, 13, and 16 second intervals with additional 0 to
1000 milliseconds of randomness. The attempt is repeated every 5 minutes thereafter. The
client uses port 67 and the server uses port 68.
Client systems that are Windows 98 or later attempt to tell if another client is already using
the address received from the DHCP server by pinging the address. The DHCP server can be
configured to pretest addresses by pinging them, but this will increase overhead and slow
server response time.
DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCP(N)ACK
DHCPDISCOVER
The DHCP client sends the DHCPDISCOVER message if the client has
never obtained a lease before, or if the client must obtain a new
lease because it was not able to renew a previous lease. The
message is broadcast to entire segment and all DHCP Server on the
segment will response to the DHCP client's DHCPDISCOVER message.
DHCPOFFER
All the DHCP Servers that received the message by the DHCP client
broadcast a DHCPOFFER message. After they all check to make sure
that they don't already have a lease for this client, they all
return an offer of an IP address to the DHCP client. The DHCP
client accepts the offer by the first DHCP server that responds
to the request. The remaining DHCP Servers withdraw their lease.
This is comparable to a desperate teenage boy that takes the
first offer he gets for a date to go to the prom. While there
might have been multiple offers, he accepts the first one and the
others withdraw their offers.
But, hey, wait a minute. How did the DHCP Server know who was
supposed to get the offer if the initial DCHPDISCOVER message was
a broadcast message? Well, there are all sorts of broadcasts. The
broadcast message in this case is an IP broadcast. The DHCP
Server knows who sent the request because the DHCP client
included in its request its MAC address, and the DHCP Server
includes the MAC address in its DCHPOFFER message.
DHCPREQUEST
DHCPACK/DHCPNACK
Using superscopes
A superscope is an administrative feature of DHCP servers running Windows Server 2003
that you can create and manage through the DHCP console. Using a superscope, you can
group multiple scopes as a single administrative entity. With this feature, a DHCP server can:
•Support DHCP clients on a single physical network segment (such as a single Ethernet LAN
segment) where multiple logical IP networks are used. When more than one logical IP
network is used on each physical subnet or network, such configurations are often called
multinets.
•Support remote DHCP clients located on the far side of DHCP and BOOTP relay agents
(where the network on the far side of the relay agent uses multinets).
In multinet configurations, you can use DHCP superscopes to group and activate individual
scope ranges of IP addresses used on your network. In this way, the DHCP server computer
can activate and provide leases from more than one scope to clients on a single physical
network.
Superscopes can resolve certain types of DHCP deployment issues for multinets, including
situations in which:
•The available address pool for a currently active scope is nearly depleted, and more
computers need to be added to the network. The original scope includes the full addressable
range for a single IP network of a specified address class. You need to use another IP
network range of addresses to extend the address space for the same physical network
segment.
•Clients must be migrated over time to a new scope (such as to renumber the current IP
network from an address range used in an existing active scope to a new scope that contains
another IP network range of addresses).
•You want to use two DHCP servers on the same physical network segment to manage
separate logical IP networks.
Superscopes
In NT 4.0 and beyond, the DHCP Manager lets you create superscopes on DHCP servers. (To
create a superscope, select the server from the DHCP Manager, then select Scopes,
Superscopes). This feature makes it possible for several child scopes (address ranges) to be
defined on one DHCP server and then be grouped under the umbrella of a superscope.
Superscopes may be useful in the following situations:
More computers must be added to a network and the total number of new network interfaces
exceeds the capacity of the current scope.
Several networks have been combined into one physical network — for example, two
departments, Marketing and Sales, are merged into one — and you want to have IP addresses
from both scopes available to all. Interestingly, there appears to be no way of keeping these
two scopes separate with a single DHCP server. For example, Marketing and Sales (on the
same subnetwork) can’t arrange to draw IP addresses only from their own original scopes
because the only option most clients have is to “Obtain an IP address from a DHCP server”;
there is no provision for defining which DHCP server to use or which scope to use.
When you have a superscope defined, the client automatically attempts to renew or request a
lease from any available DHCP server or scope. If it can’t renew its current lease from within
one child scope (within the superscope), it may try to obtain a lease from within another child
scope. Some non-Microsoft DHCP servers have a user-class option that lets clients request an
address from a specified DHCP server or within a specified scope, but this isn’t the case with
Microsoft DHCP.
DHCP Options
You can configure Microsoft DHCP to give a DHCP client more than an IP address. In fact, a
DHCP server can give a DHCP client a total of 68 parameters. Using DHCP to assign these
parameters can eliminate much of the repetitious administrative work of configuring the
clients manually. These parameters are called DHCP options.
In Microsoft DHCP, you have three categories of options to choose from — global, scope, or
default.
Global — Option configurations pertain to all scopes on a DHCP server unless otherwise
configured within the scope or configured manually from the client. Use Global options when
most of the scopes will have the same parameters.
Scope — Option configurations pertain to only one scope on the DHCP server. Scope
configuration overrides global configuration, but it is superceded by manual configuration.
Use scope options for any scopes that have parameters that differ from the global options.
Default — In the absence of conflicting options (global, scope, or manual), the default
options apply.
Within these categories, some options are available to Windows-based DHCP clients while
others are available only to third-party clients that support these options. According to the
Microsoft Windows NT Server Networking Guide (Microsoft Press,1996), the options
available to Windows clients include
DNS servers — lists the IP addresses for DNS name servers.
Domain name — specifies the DNS domain name that the client should use for DNS
resolution.
Lease time — provides the time of the lease in a read-only format. Lease time is configured
in the Scope Properties dialog box shown in Figure 8.1. Lease time is the time from the
address assignment until the address expires.
NetBIOS scope ID — specifies NetBIOS over TCP/IP (NBT) scope ID as a text string.
Rebinding time — shows the time from address assignment until the rebinding state in a
read-only format. Rebinding occurs after the client updates its configuration values after a
renewal state.
Renewal time — provides the renewal time in a read-only format. Renewal time is the time
from address assignment until the client enters the renewal state. The renewal state starts at
one half the time to live (time to live is the same as lease time).
Router — lists the IP addresses for routers on the subnetwork.
Subnet Mask — provides the subnetwork mask in a read-only format. The subnetwork mask
is actually added in the Create Scope dialog box or Scope Properties dialog box, as shown in
Figure 8.1.
WINS/NBNS servers — specifies IP addresses for WINS name servers.
WINS/NBT node type — assigns a node type to a client, where 1=B node, 2=P node, 4=M
node, 8=H node.
Database files:
DCHP.MDB - The main database
DHCP.TMP - Temporary DHCP storage.
JET*.LOG - Transaction logs used to recover data.
SYSTEM.MDB - USed to track the structure of the DHCP database
Use the 80/20 design rule for balancing scope distribution of addresses where multiple DHCP
servers are deployed to service the same scope.
Use superscopes for multiple DHCP servers on each subnet in a LAN environment.
Deactivate scopes only when removing a scope permanently from service.
Use server-side conflict detection on DHCP servers only when it is needed.
Reservations should be created on all DHCP servers that can potentially service the reserved
client.
For server performance, note that DHCP is disk-intensive and purchase hardware with
optimal disk performance characteristics.
Integrate DHCP with other services, such as WINS and DNS.
Use the manual backup and restore methods in the DHCP server console.
DHCP Database
DHCP has its own database. Stored in this DHCP.mdb are the addresses, scopes and leases
of the clients. Understanding this database will help you backing up and restore a DHCP
server.
Check out this folder: %systemroot%\system32\dhcp\dhcp.mdb
As time goes by the database will grow, and best practice dictates that you should consolidate
the database by freeing up space taken up by old leases.
The procedure for compacting the dhcp.mdb database is this.
1) Stop the DHCP service. Either right click the DHCP Server icon, select All tasks then
Stop. Alternatively, go to the command line and type: NET Stop DHCPServer. (For once
the command really is DHCPserver, NOT DHCPyourservername.)
2) At the command line, navigate to: %systemroot%\system32\dhcp\dhcp.mdb.
3) Jetpack dhcp.mdb temp.mdb. What this does is copies the existing database, compacts it,
then copies it back to the original location - clever.
4) Remember to restart DHCP. Either use the GUI, or if you are at the command line, NET
Start DHCPServer
Warning: Do not 'mess' with any of the files that you find in the %systemroot
%\system32\dhcp folder, if you do, then DHCP will stop working and you will either have to
restore, or else re-install DHCP.
DHCP Relay Agent - Concept
DHCPDiscover packets, like all broadcasts, cannot pass across routers. In fact that was a lie,
if you have a modern Router which is RFC 1542 compliant, then you can forward the
DHCPDiscover packets to a DHCP server in a different subnet. In this instance, the Router
acts as a Relay Agent.
Relay Agent - Installation
It is rare for Microsoft to remove functionality, but while NT 4.0 Workstations could act as
DHCP Relay agents, XP and W2K Pro cannot. So you need to install the relay agent on a
Windows Server 2003.
What is not obvious is where you find the relay agent, the answer is in Routing and Remote
Access. When you think about it, the relay agent is a type of router, hence the RRAS
location to install and configure the DHCP Relay agent makes sense.
As I say once you find and install the Relay Agent, configuring is easy, all you need to do is
tell the router or DHCP relay agent the IP address of the real DHCP servers. Just right click
the DHCP Relay Agent, and then select properties from the shortcut menu.
Trap: you forget to add an interface. See that 'ISP' interface in the screen shot is Enabled.
TRUST RELATIONSHIPS
Windows 2003 supports six types of trusts (although the OS doesn't support all types for all
forest modes):
Regardless of the functional levels, many of the features are available immediately, such as:
There are two main features enabled at the Windows Server 2003 domain level:
• Two-stage DC rename
• Redirect default User and Computer creation
Note Another small feature enabled in Windows Server 2003 domain level is the
LastLogonTimeStamp attribute, which keeps the calculated last login time for a user in the
domain. This can be helpful since the current lastlogin attribute is per DC and is not
replicated to other DCs.
The following are enabled at the Windows Server 2003 forest level:
The following table describes the domain-wide features that are enabled for the
corresponding domain functional level:
Domain Feature Windows 2000 mixed Windows 2000 native Windows Server 2003
Domain controller Disabled Disabled Enabled
rename tool
Update logon Disabled Disabled Enabled
timestamp
Kerberos KDC key Disabled Disabled Enabled
version numbers
User password on Disabled Disabled Enabled
InetOrgPerson
object
Universal Groups Enabled for Enabled Enabled
distribution groups.
Allows both security Allows both security
Disabled for security and distribution and distribution
groups. groups. groups.
Group Nesting Enabled for Enabled Enabled
distribution groups.
Allows full group Allows full group
Disabled for security nesting. nesting.
groups, except for
domain local security
groups that can have
global groups as
members.
Converting Groups Disabled Enabled Enabled
.
1 GPO Controlling Block (GPO) Inheritance
Difference between GPO Bloking and Inheritance.
http://www.windowsecurity.com/articles/Controlling-Block-GPO-Inheritance-via-
Delegation.html
http://technet2.microsoft.com/windowsserver/en/library/212eb1fd-11f4-465f-b243-
73e542d06b2c1033.mspx?mfr=true
2.
What is difference between Basic and Dynamic Disks,
i.e Advantages/disadvantages of Basic and Dynamic disks.
3.
How to Security Patch management other than WSUS.
4.
Server Down, then how to aproch to solve the problem.
5.
IIS
6.
Clustering
7.
If u have a Domain in Hyd. Braches in Ban,Noida.
Need to install Domain Controllers in Ban and Noida.
How to do?
Install DC in Hyd and send to Ban as physical DC or any other method???
8.
What is the smart host in Exchange?
9.
How to recover mail box in Exchange?
10.
In your experience you feel critical problem respective of ads ?
Ans: Domain Crash, ie. Bootable Hard disk failed.
New hard disk installed and restored ADS from previous system state backup.
11.
What are the steps in authoritative Restore?
12.
Windows xp booting process??
13.
Explain PDC Emulator?
14.
Windows Xp Client just joined to Domain.
First Logon Process?
15.
Difference between TCP and UDP?
16.
DNS Records??
17.
Tell me one Critical Problem which is you faced respective of ADS?
18.
One user working on Windows xp client system.
You need to install software on the system
How do you install the software without disturbing his work?
19.
Tell me about your self? First question.
20.
What is your carrier plan in next 5 Years?
21.
How do you rate about your self in ADS?
22.
What is the DHCP client ip getting process?
23.
A client not getting ip from DHCP. What is the problem?
24.
What is 80-20 rule in DHCP?
25.
How many cluster nods can add in windows 2003 Enterprise server?
26.
What is KDC AND KCC IN Windows 2003
Ans:
Since Windows 2000 a Windows domain controller (DC) is able to act as Kerberos "Key
Distribution Center" (KDC).
27.
Dhcp console Two Options are there. What are those? Difference between them?
Ans.
Server sope option.
Scope option.
28.
ADS Loopback connection?
29.
If PDC Emulator down. Is user can login to DC?
30.
Domain local group can add in Global Group?
31.
33.
34.
If Global Catalog down in Exchange Environment.
I sent a mail to local user and internet user. Who can receive the mail?
35.
How do you change Administrator user name in Windows XP and 2003?
36.
Global Catalog and LDAP Port no?
3268 ,368
37.
Difference between Authoritative and non Authoritative Restores?
38.