Write About Global Catalog. How To View Replication Properties For AD Properties
Write About Global Catalog. How To View Replication Properties For AD Properties
Write About Global Catalog. How To View Replication Properties For AD Properties
Forest-wide searches
User logon
Universal group membership caching
Exchange address book lookups
The Replmon graphical user interface (GUI) tool is included when you install Windows Server 2003 Support Tools from the product
CD or from the Microsoft Download Center
The Replmon graphical user interface tool was removed from Windows Server 2008 and later. Repadmin is still available for
troubleshooting replication.
Repadmin.exe: Replication Diagnostics Tool
This command-line tool assists administrators in diagnosing replication problems between Windows domain controllers.
Administrators can use Repadmin to view the replication topology as seen from the perspective of each domain controller. In
addition, Repadmin can be used to manually create the replication topology, to force replication events between domain controllers,
and to view both the replication metadata and up-to-date vectors.
Repadmin.exe can also be used for monitoring the relative health of an Active Directory forest. The
operations replsummary, showrepl, showrepl /csv, and showvector /latency can be used to check for replication problems.
Application directory partitions provide the ability to control the scope of replication and allow
the placement of replicas in a manner more suitable for dynamic data. As a result, the
application directory partition provides the capability of hosting dynamic data in the Active
Directory Server, thus allowing ADSI/LDAP access to it, without significantly impacting network
performance.
LDAP was initially created by Tim Howes of the University of Michigan, Steve Kille of
Isode Limited and Wengyik Yeong of Performance Systems International, circa 1993. It
is based on the X.500 standard, but is simple and easily adapts to meet custom needs
whose specifications are defined in the Requests for Comments (RFCs).
LDAP is also cross-platform and standards-based. Thus, the applications are not
concerned about the server type hosting the directory. The LDAP servers are easy to
install, maintain and optimize. The LDAP server process queries and updates the LDAP
information directory.
LDAP servers are capable of replicating data either through push or pull methods. The
technology related to replication is easily configured and built-in. LDAP permits secured
delegate read and modification authority based on needs using Microsoft Access control
lists. No security checks are performed at the user application level. This is all done
directly through the LDAP directory. LDAP does not define how programs work on the
client server side, but does define the language used by client programs to talk to
servers. LDAP servers range from small servers for workgroups to large organizational
and public servers.
LDAP directory servers stores data hierarchically. One of the techniques to partition the
directory is to use LDAP referrals, which enable users to refer LDAP requests to a
different server.
The central concept of LDAP is the information model, which deals with the kind of
information stored in directories and the structuring of information. The information
model revolves around an entry, which is a collection of attributes with type and value.
Entries are organized in a tree-like structure called the directory information tree. The
entries are composed around real world concepts, organization, people and objects.
Attribute types are associated with syntax defining allowed information. A single
attribute can enclose multiple values within it. The distinguished names in LDAP are
read from bottom to top. The left part is called the relative distinguished name and the
right part is the base distinguished name.
Many vendors of server products and directory clients support LDAP. Companies with
LDAP intentions include IBM, AT&T, Sun and Novell. Eudora and Netscape
communicator also support LDAP. Government agencies and large universities also use
LDAP servers for storing and organizing information.
By default, computer Group Policy is updated in the background every 90 minutes. Also Group Policy for the computer is always
updated when the system starts. This policy (the one which we are going to modify) specifies a background update rate only for
Group Policies in the Computer Configuration folder.
Q81.NTFS vs FAT
FAT stands for File Allocation Table and FAT32 is an extension which means that data
is stored in chunks of 32 bits. These is an older type of file system that isn’t commonly
used these days.
DID YOU KNOW: Fat32 isn't that widely used in today's time and it found its
replacement in the exFAT (Extended File Allocation Table) file system. In fact, many
operating systems and storage devices use it more than NTFS.
NTFS stands for New Technology File System and this took over from FAT as the
primary file system being used in the Windows system. This NTFS file system is not
only secure but also supports larger file sizes and hard drives.
Indeed, before making a choice you need to know about their capabilities. The table
below will give you
a rough idea of the
features and
respective support.
Windows Server 2012 provides greater support for the capabilities of public and private
clouds through virtualization-safe technologies and the rapid deployment of virtual
domain controllers through cloning.
Simplified deployment and upgrade preparation
The upgrade and preparation processes (dcpromo and adprep) have been replaced with a
new streamlined domain controller promotion wizard that is integrated with Server
Manager and built on Windows PowerShell. It validates prerequisites, automates forest and
domain preparation, requires only a single set of logon credentials, and it can remotely
install AD DS on a target server.
Simplified management
AD DS Platform Changes
Active Directory and AD DS has been at the center of IT infrastructure for over 10 years, and its
features, adoption, and business-value have grown release over release. Today, the majority of
that Active Directory infrastructure remains on the premises, but there is an emerging trend
toward cloud computing. The adoption of cloud computing, however, will not occur overnight,
and migrating suitable on-premises workloads or applications is an incremental and long-term
exercise. New hybrid infrastructures will emerge, and it is essential that AD DS support the needs
of these new and unique deployment models that include services hosted entirely in the cloud,
services that comprise cloud and on-premises components, and services that remain exclusively
on the premises. These hybrid models will increase the importance, visibility, and emphasis
around security and compliance, and they will compound the already complex and time-
consuming exercise of ensuring that access to corporate data and services is appropriately
audited and accurately expresses the business intent.
83. Discriminate Organisational Units and Group Policy. Also define
Empty root domain.
Groups
Active Directory groups are used to assign permissions to company resources.
As a best practice, you place users into groups and then apply the groups to an
access control list (ACL).
It’s quite typical to have your AD groups mirror your company hierarchy (e.g., a
group for Finance, Marketing, Legal, etc.).
Organizational Units
Organizational Units are useful when you want to deploy group policy settingsto a
subset of users, groups, and computers within your domain.
For example, a domain may have 2 sub-organizations (e.g., consumer and
enterprise) with 2 separate IT teams managing them. Creating 2 OUs lets each IT
team administer their own policies that affect only the users, computers, etc. that fall
within their unit.
What kind of common administrative tasks can you delegate via OUs?
Operating System
Windows 2016
Windows 2012
Hard Drive
1 GB minimum of hard disk space for installing the software.
256 MB of free disk space is required for job result directory.
256 MB of free disk space is required for log directory.
Processor
All Windows-compatible processors are supported.
Miscellaneous
Services
It is recommended that your Active Directory server has DNS services configured.
The File System Agent is installed automatically during the installation of this software component (if
it is not installed already). To review the system requirements of the File System Agent, see System
Requirements - Microsoft Windows File System Agent.
.NET Framework
.NET Framework 4.0 is automatically installed. Note that .NET Framework 4.0 can co-exist with other
versions of this software.
---------------------------------------------
After the installation of Active Directory, each DNS database file will contain
SRV resource records, which are pointers to DNS hosts running Active
Directory services. You should verify that the SRV resource records have
been created for the domain controller after promotion. There are two ways to
do this:
1. If you are using a server running the DNS Server service, you can use DNS in
Microsoft Management Console (MMC).
2. If you are using a DNS service that does not support dynamic updates, you
will need to manually register the SRV resource records.
You will see the Lightweight Directory Access Protocol (LDAP) SRV record in
the form:
_ldap._tcp. Active_Directory_domain_name IN SRV 0 100
389 domain_controller_name
If you install the DNS Server service during Active Directory installation, you
must manually create a reverse lookup zone and set the zone attribute to
Allow dynamic updates after installation.
Verify SRV resource record registration
After Active Directory is installed, you can also use the Nslookup command-
line utility to verify that the domain controller registered its SRV resource
records in the DNS database. To verify that SRV resource records[1] were
properly registered by using Nslookup, perform the following steps:
You should note that time-outs will be reported when you first run Nslookup if
you do not have a reverse lookup zone configured.
Nslookup generates a reverse lookup to determine the host name of the DNS
server based on its IP address.
Default
Domain Domain Controllers contain the first domain controller, and
Controllers other domain controllers as they are added to the domain.
OU
[1] SRV resource records: Used in a DNS zone to register and locate well
known TCP/IP services
85. Briefly describe Active directory schema with the help of an
example.
The Active Directory schema is a component of Active Directory which contains rules for object creation
within an Active Directory forest. The Active Directory schema is a list of definitions about Active
Directory objects and information about those objects that are stored in Active Directory.
The schema is the blueprint of Active Directory and schema defines what kinds of objects can exist in the
Active Directory database and attributes of those objects.
The information in the Active Directory is represented as Objects, and there is an object for each user,
computer, printer etc. Object of the same type belong to same class.
Example: All user objects belong to class "user", all computer objects belong to class “computer” and all
printer objects belong to class "printQueue".
The information in an object is stored as Attributes (Properties), which the corresponding class supports.
Attributes define various information that a class can contain.
The process of creating an object from a class is called instantiation, and an object created from a class is
called an instance of that class.
Example: You have created a user called jerome.h in the Active Directory. The user object jerome.h is an
instance of the Active Directory class "user".
• Abstract classes: Abstract classes provide attributes that flow through the hierarchy, but they cannot be
used to instantiate an object. Abstract classes can inherit from other classes and can have attributes defined
on them directly, but you cannot create (instantiate) and object of an abstract class.
• Structural classes: Structural classes can be instantiated into objects and can contain additional attributes
that are not inherited from the other class types. The user and group classes are the examples of structural
classes.
• Auxiliary classes. Auxiliary classes provide attributes that extend a structural class, but they cannot be used
to form a structural class by themselves or instantiate an object.
86.Where is the AD database held? What other folders are
related to AD?
The Active Directory Database is Stored in %SYSTEM ROOT%\NDTS folder. Main database file for
active directory is ntds.dit. Along with this file there are other files also present in this folder. These files
are created when you run dcpromo. These are the main files controlling the AD structure
File Transfer Protocol TCP 20/21 FTP is one of the most commonly used file transfer protocols
Secure Shell (SSH) TCP 22 SSH is the primary method used to manage network devices
connections.
Simple Mail Transfer TCP 25 SMTP is used for two primary functions, it is used to transfer
Protocol (SMTP) mail (email) from source to destination between mail servers
Domain Name System TCP/UDP 53 The DNS is used widely on the public internet and on private
Dynamic Host UDP 67/68 DHCP is used on networks that do not use static IP address
Configuration Protocol assignment (almost all of them). A DHCP server can be set
requested and the lease expires the address will be put back
Trivial File Transfer UDP 69 TFTP offers a method of file transfer without the session
Hypertext Transfer TCP 80 HTTP is one of the most commonly used protocols on most
Protocol (HTTP) networks. HTTP is the main protocol that is used by web
browsers and is thus used by any client that uses files located
(RFC 2616)
on these servers.
Post Office Protocol TCP 110 POP version 3 is one of the two main protocols used to
(POP) version 3 retrieve mail from a server. POP was designed to be very
server.
Network Time Protocol UDP 123 One of the most overlooked protocols is NTP. NTP is used to
accurate.
NetBIOS TCP/UDP 137/138/139 NetBIOS itself is not a protocol but is typically used in
Internet Message Access TCP 143 IMAP version3 is the second of the main protocols used to
Protocol (IMAP) retrieve mail from a server. While POP has wider support,
stating that an event has occurred and that the device should
Border Gateway Protocol TCP 179 BGP version 4 is widely used on the public internet and by
public Internet.
Lightweight Directory TCP/UDP 389 LDAP provides a mechanism of accessing and maintaining
Hypertext Transfer TCP 443 HTTPS is used in conjunction with HTTP to provide the
Protocol over SSL/TLS same services but doing it using a secure connection which is
(RFC 2818)
Lightweight Directory TCP/UDP 636 Just like HTTPS, LDAPS provides the same function as
Access Protocol over LDAP but over a secure connection which is provided by
(RFC 4513)
FTP over TLS/SSL TCP 989/990 Again, just like the previous two entries, FTP over TLS/SSL
uses the FTP protocol which is then secured using either SSL
(RFC 4217)
or TLS.
General Steps:
=============
1. Verify the new server's TCP/IP configuration has been pointed to the current DNS server.
2. Make the new server become a member server of the current Windows Server 2003 domain first.
3. Upgrade the Windows Server 2003 forest schema to Windows Server 2008 schema with the "adprep
/forestprep" command on old server.
Please run the "adprep.exe /forestprep" command from the Windows Server 2008 installation disk on the
schema master. To do this, insert the Windows Server 2008 installation disk, and then type the following
command:
Drive:\sources\ADPREP\adprep.exe /forestprep
4. Upgrade the Windows 2003 domain schema with the "adprep /domainprep" command on old server.
Please run the "adprep.exe /domainprep" command from the Windows Server 2008 installation disk on
the infrastructure master. To do this, insert the Windows Server 2008 installation disk, and then type the
following command:
6. Run "dcpromo" on new server to promote it as an additional domain controller in existing Windows
2003 domain, afterwards you may verify the installation of Active Directory.
7. Verify the new server's TCP/IP configuration has been pointed to current DNS server.
8. Enable Global Catalog on new server and manually Check Replication Topology and afterwards
manually trigger replication (Replicate Now) to synchronize Active Directory database between 2 replicas.
Please note: It will some time to replicate GC between DC, please wait some time with patience.
10. Transfer all the FSMO roles from the old DC to the new DC.
11. Verify that the old DNS Server Zone type is Active Directory-Integrated. If not, please refer to:
Note: Active Directory Integrated-Zone is available only if DNS server is a domain controller.
12. Install DNS component on new server and configure it as a new DNS Server (Active Directory
Integrated-Zone is preferred). All the DNS configuration should be replicated to the new DNS server with
Active Directory Replication.
13. Make all the clients change TCP/IP configuration to point to new server as DNS.
14. You may configure TCP/IP on all the clients, or adjust DHCP scope settings to make them use the
new DNS server.