What is the difference between a site link's schedule and interval?
Schedule enables you to list weekdays or hours when the site link is available for replication to happen in the give interval. Interval is the re occurrence of the inter site replication in given minutes. It ranges from 15 - 10,080 mins. The default interval is 180 mins.
Comparison of LDAP implementations on active directory and edirectory and openldap?
kasih tau ngak ya
What are the requirements for installing AD on a new server?
· An NTFS partition with enough free space (250MB minimum) · An Administrator's username and password · The correct operating system version · A NIC · Properly configured TCP/IP (IP address, subnet mask and - optional - default gateway) · A network connection (to a hub or to another computer via a crossover cable) · An operational DNS server (which can be installed on the DC itself) · A Domain name that you want to use · The Windows 2000 or Windows Server 2003 CD media (or at least the i386 folder) From the Petri IT Knowledge base. For more info, follow this link: http://www.petri.co.il/active_directory_installation_requirements.htm
DNS
8 Days
Can you disable balloon tips for all users using Group Policy?
Yes, for Windows XP and Windows 2003, but not for Windows 2000.
The answer lies within Administrative Templates | Start Menu and Taskbar | Remove Balloon Tips on Start Menu items.
How do you access different features to the active directory?
The Active Directory administrative tools can only be used from a computer with access to a domain. The following Active Directory administrative tools are available on the Administrative Tools menu:
Active Directory Users and Computers (dsa.msc)
Active Directory Domains and Trusts (domain.msc)
Active Directory Sites and Services (dssite.msc)
What will happen if you install a DHCP server on a network without Active Directory?
Without Active Directory the DHCP server cannot be authorized, and could therefore be considered a "rogue".
What A.D do for a DHCP Server that it authorised to DHCP server to give an Ip add. to clients and authorised for update the DNS PTR records.
and when we won't authorised DHCP with Active Directory it won't be update the the PTR records and won't be update the IP add. in DNS records.
Why does the clock pengulin stop working?
In order to work, a pendulum requires a form of energy. In a clock weights are attached to chains. As gravity pulls on the weights, the chains move the clockwork. The pendulum swings through the arc of a cycloid measuring the ratio of length, gravity, and time. When the weight on the end of the chain reaches the bottom, it stops providing energy to the clock, and the clock stops. The weights and chains must be repositioned so they can again provide energy to the pendulum.
Like all machines, the clockwork eventually wears out and must be repaired or replaced.
Which commands can be used to configure active directory permissions from the command line?
The following command-line tools can be used to manage Active Directory
CSVDE
Import and export Active Directory data using comma-separated format.
Dsadd
Add users, groups, computers, contacts, and organizational units to Active Directory.
Dsmod
Modify an existing object of a specific type in the directory. The types of objects that can be modified are: users, groups, computers, servers, contacts, and organizational units.
Dsrm
Remove objects of the specified type from Active Directory.
Dsmove
Rename an object without moving it in the directory tree, or move an object from its current location in the directory to a new location within a single domain controller. (For cross-domain moves, use the Movetree command-line tool.)
Dsquery
Query and find a list of objects in the directory using specified search criteria. Use in a generic mode to query for any type of object or in a specialized mode to query for for selected object types. The specific types of objects that can be queried through this command are: computers, contacts, subnets, groups, organizational units, sites, servers and users.
Dsget
Display selected attributes of specific object types in Active Directory. Attributes of the following object types can be viewed: computers, contacts, subnets, groups, organizational units, servers, sites, and users.
LDIFDE
Ceate, modify, and delete directory objects. This tool can also be used to extend the schema, export Active Directory user and group information to other applications or services, and populate Active Directory with data from other directory services.
Ntdsutil
General purpose Active Directory management tool. Use Ntdsutil to perform database maintenance of Active Directory, to manage single master operations, and remove metadata left behind by domain controllers that were removed from the network without being properly uninstalled.
How do you delete account from active directory?
dsrmObjectDN to remove user account
dsrm computerComputerDN to remove computer account
Which command can be used on a PC to determine which TCP IP ports are in use?
Open command prompt and type netstat
This will show all ports in use and all ingoing\outgoing connections along with the connection type. TCP, UDP
If the same attribute is modified on two domain controllers at the same time, Active Directory will use the version ID as the first tie-breaker to determine which value to keep and which one to discard.
This command-line tool analyzes the state of one or all domain controllers in a forest and reports any problems to assist in troubleshooting. DCDiag.exe consists of a variety of tests that can be run individually or as part of a suite to verify domain controller health.
Tool locationThe DCDiag command-line tool is included when you install Windows Server 2003 Support Tools from the product CD or from the Microsoft Download Center(http://go.microsoft.com/fwlink/?LinkId=100114). For more information about how to install Windows Support Tools, see Install Windows Support Tools(http://go.microsoft.com/fwlink/?LinkId=62270).
Tool requirementsCheck this :
https://ccrma.stanford.edu/~jos/sasp/img2442.png
Where is active directory database held what other folders are related to Active directory?
The Active Directory Database is Stored in %SYSTEM ROOT%\NDTS folder.
the active directory uses the sysvol folder as well
The file is called as ntds.dit. Along with this file there are other files also present in this folder. The files are created when you run dcpromo. The list of files and use of those files are listed below
1. ntds.dit : This is the main database file for active directory.
2. edb.log : When a transaction performed to ad database, like writing some data first the data will be stored to this file. And after that it will be sent to database. So the system performance will be depends on how this data from edb.log file will be written to ntds.dit
3. res1.log : Used as reserve space in the case when drive had low space. It is basically 10MB in size and creted when we run dcpromo.
4. res2.log : Same as res1.log. It is also 10MB in size and the purspose also same.
5. edb.chk : This file records the transactions committed to ad database. During shutdown, shutdown statement is written to this file. If it is not found when the system rebooted, the ad database tries to check with edb.log for the updated information.
Edb corruption or Edb active directory corruption is really serious. However you can get this repaired by using edb repair tool.
The Active Directory Database is Stored in %SYSTEM ROOT%\NDTS folder.
the active directory uses the sysvol folder as well
(IP SECurity) A security protocol from the IETF that provides authentication and encryption over the Internet. Unlike SSL, which provides services at layer 4 and secures two applications, IPsec works at layer 3 and secures everything in the network. Also unlike SSL, which is typically built into the Web browser, IPsec requires a client installation. IPsec can access both Web and non-Web applications, whereas SSL requires workarounds for non-Web access such as file sharing and backup. IPsec is supported by IPv6. Since IPsec was designed for the IP protocol, it has wide industry support and is expected to become the standard for virtual private networks (VPNs) on the Internet.
Interactive
You should be try other internet explorer as mozilla firefox or other.
If RID master fails what happens?
The RID master will allocate the pool of RIDs to the DC, So we can create the objects without RID master. When this RID pool exhausted we can't create object.