Why error is displayed while creating new users in active directory users and computers?
The error could be due to folwloing
The network is down.
The domain controller is not reachable(PDC is not available need to check, RID stack is not full and RID master is not down)
The account used does not have permission to add user/computer etc
Check the event log to find the event id and search at tech net
Active Directory Users and Computers is a snap-in. A snap-in cannot be started from a command line or from "Start" "run" it has to be started from an MMC (Microsoft Management Console).
I will walk you through those steps.
you can use dsa.msc
What is the RID Master role? The RID Master is one of the operations master roles that exist in each domain in a forest. It controls the sequence number for the domain controllers within a domain. It provides a unique sequence of RIDs to each domain controller in a domain. When a domain controller creates a new object, the object is assigned a unique security ID consisting of a combination of a domain SID and a RID. The domain SID is a constant ID, whereas the RID is assigned to each object by the domain controller. The domain controller receives the RIDs from the RID Master. When the domain controller has used all the RIDs provided by the RID Master, it requests the RID Master to issue more RIDs for creating additional objects in the domain. When a domain controller exhausts its pool of RIDs, and the RID Master is unavailable, any new object in the domain cannot be created
How do you add new user to domain with active directory?
Go to start->programs->administrative tools->active directory users and computers->right click on users folder and create it
What Kind of information active directory holds?
Active Dirctory stores information about all the objects, resources on the network, policies applied on them and permissons on the resources
What are the resultant Group Policy settings for a user in the organizational unit?
the answer is :
Windows Update appears on the user's Start Menu, and Favourites does not appear on the user's Start Menu.
Check for the Security rights of the user on the GPO that is applied.
In some cases, user is denied permission to that particular group policy.
Deny box is checked for the user in the group policy permission.
"Octavo" comes from Latin, meaning "eighth" (a reference to the format of some books). Now "Octavo Editions" is the name of an enterprise that deals with printing books and other products (alike, such as CD-roms and other types of things regarding information and/or re-printing), basically thru the Web.
Can you install exchange 2007 on Ad server?
Yes, We require Active directory it is the basic requirement for exchange server to function.
Schemes of defining the logical structure of a directory?
The logical structure of active directory include forest, domains, tree, OUs and global catalogs.
Domain : a group of computer and other resources that are part of a windows server2003 network and share a common directory database.
Global catalog : Global catalog used to catch information about all object in a forest , the global catalog enables users and applications to find object in an active directory domain tree if the user or application knows one or more attributes of the target object.
Tree : Tree as is collection of Active directory Domain, that means the trust relationship can be used by all other domain in the forest as a means to access the domain.
Organization Unit - Organization Unit is a Active directory container into which object can be grouped for per mission management.
Forest : Active directory forest as due to represents the external boundary of the directory service.
These are two types of active directory forest :-
I) Single Forest
2) Multiple forest
What best describes clustering?
a number of things of the same kind, growing or heldtogether; a bunch:
a cluster of grapes.
What does an active directory client use to locate objects in another domain?
The Global Catalog
Source:
Windows Server 2008 Administrator MOAC 70-646
Chapter 3, Planning an Active Directory Deployment
pg. 98
What are the Active directory Support Tools Why do you need them?
Support Tools are the tools that are used for performing the complicated tasks easily. These can also be the third party tools. Some of the Support tools include DebugViewer, DependencyViewer, RegistryMonitor, etc.
-edit by Casquehead
I believe this question is reffering to the Windows Server 2003 Support Tools, which are included with Microsoft Windows Server 2003 Service Pack 2. They are also available for download here:
http://www.Microsoft.com/downloads/details.aspx?familyid=96A35011-FD83-419D-939B-9A772EA2DF90&displaylang=en
You need them because you cannot properly manage an Active Directory network without them.
Here they are, it would do you well to familiarize yourself with all of them.
Acldiag.exe
Adsiedit.msc
Bitsadmin.exe
Dcdiag.exe
Dfsutil.exe
Dnslint.exe
Dsacls.exe
Iadstools.dll
Ktpass.exe
Ldp.exe
Netdiag.exe
Netdom.exe
Ntfrsutl.exe
Portqry.exe
Repadmin.exe
Replmon.exe
Setspn.exe
Read more: http://wiki.answers.com/What_are_the_Support_Tools_Why_do_you_need_them#ixzz1GEDhEBWB
Which record is the first record created for a zone on a DNS Server?
Start of Authority (SOA) is the first record in the zone file. It contains the name of the primary DNS Server, which must correspond to an Name Server (NS) record in the file, the administrator's e-mail address and the length of time records can be cached before going back to the authoritative DNS server.
The Feature is know as Microsoft Meta directory service..
A metadirectory is a dedicated enterprise directory solution that joins (or merges) information between the various existing directory systems and programs used within an enterprise, and then provides access to the consolidated information for Lightweight Directory Access Protocol (LDAP) clients, Web browsers, and possibly other computers.
Microsoft Metadirectory Overview
In the MMS model, the enterprise metadirectory structure is comprised of one or more servers, management agents, and connected directories:
Management Agents
Management agents are responsible for importing connected directory information into the connector namespace, and where desired, merging it with entries in the metaverse. It keeps the directory information synchronized by allowing attributes to flow bi-directionally. There is one management agent for each connected directory.
Connected Directory
A connected directory is essentially any directory that you want to integrate into the metadirectory. The only requirement is that the directory contents must be organized into some minimal hierarchical structure, and that there a method for extracting the directory information in it exists. The information extracted from the connected directory is imported into the metadirectory. Optionally you may want to export information from the metadirectory into the connected directory.
Metadirectory Namespace
While the metadirectory contents can be presented as a single tree structure, it can also be thought of as consisting of two logical namespaces.
Connector Space
The area into which connected directory entries are first imported. This area links each connected namespace with the metadirectory.
Metaverse
That portion of the directory that presents the global view of the union of entries from multiple connected directories.
MMS Client Access
The MMS client access consists of four primary client access methods:
Compass Client
A stand-alone client with the most complete features and most efficient interface of the MMS clients. Can be used to manage the directory.
Active Compass Client
An ActiveX implementation of the Compass client that runs within any browser that supports ActiveX technology. Can be used to manage the directory. This client must be installed to run.
LDAP-Compliant User Agent
E-mail, programs.
Web Access
Windows Explorer, Netscape Navigator.
MMS Security
MMS security is comprised of three key features:
Login and Authentication
There are two kind of logins, anonymous and authenticated logins. Authenticated logins (or named logins), require a password. The password may be a "simple" password or a "strong" password.
Access Controls
Access controls are used to evaluate the level of access to entries in the directory.
MMS Distributed Directory
MMS has two methods to scale the product to your organization. The Distributed Directory is required for the following uses or conditions:
* Distant geographical locations.
* Load balancing and/or redundancy.
* Servers to manage connected directories.
* Other servers to service end users.
* Servers to support programs.
We have two ways to distribute the directory, referrals and replication:
Referrals
Used to set a pointer within the directory to point to another location on a different server. Note that not visible to the user. This is useful when there are space requirements that need to be distributed to other servers but the users still can obtain access one central location.
Who can always reset the permission of an object to allow himself access to the object?
administrators group member for the particular system
adminstrators group member of the domain
What is Group Policy Objects in AD?
A group policy object on Active Directory(AD)
is a object where you can restrict a user or a group to access a folder, Install an application and to deny a user to modify the system.
Provide an example of how one domain of development impacts the other two?
provide an example of how one domain of development impacts the other two.
The Netlogon subkey stores information for the Net Logon service.
The Net Logon service verifies logon requests, and it registers, authenticates, and locates domain controllers. Also, to maintain backward compatibility, Net Logon manages replication of the user account database to back up domain controllers running Windows NT 4.0 and earlier.
For Windows 2000, Net Logon manages replication only when replication involves servers running Windows NT 4.0 and earlier. Net Logon for Windows 2000 does not manage replication between two servers running Windows 2000.