answersLogoWhite

0

Windows Server 2003

Also known as the Win2K3, Windows Server 2003 is a server OS (operating system) from the American software company Microsoft. This OS has the capability to share printers and files, provide email services, authenticate users, and host message queues.

1,215 Questions

What is the difference between a site link's schedule and interval?

Schedule enables you to list weekdays or hours when the site link is available for replication to happen in the give interval. Interval is the re occurrence of the inter site replication in given minutes. It ranges from 15 - 10,080 mins. The default interval is 180 mins.

What are the requirements for installing AD on a new server?

· An NTFS partition with enough free space (250MB minimum) · An Administrator's username and password · The correct operating system version · A NIC · Properly configured TCP/IP (IP address, subnet mask and - optional - default gateway) · A network connection (to a hub or to another computer via a crossover cable) · An operational DNS server (which can be installed on the DC itself) · A Domain name that you want to use · The Windows 2000 or Windows Server 2003 CD media (or at least the i386 folder) From the Petri IT Knowledge base. For more info, follow this link: http://www.petri.co.il/active_directory_installation_requirements.htm

Can you disable balloon tips for all users using Group Policy?

Yes, for Windows XP and Windows 2003, but not for Windows 2000.

The answer lies within Administrative Templates | Start Menu and Taskbar | Remove Balloon Tips on Start Menu items.

How do you access different features to the active directory?

The Active Directory administrative tools can only be used from a computer with access to a domain. The following Active Directory administrative tools are available on the Administrative Tools menu:

Active Directory Users and Computers (dsa.msc)

Active Directory Domains and Trusts (domain.msc)

Active Directory Sites and Services (dssite.msc)

What will happen if you install a DHCP server on a network without Active Directory?

Without Active Directory the DHCP server cannot be authorized, and could therefore be considered a "rogue".

What A.D do for a DHCP Server that it authorised to DHCP server to give an Ip add. to clients and authorised for update the DNS PTR records.

and when we won't authorised DHCP with Active Directory it won't be update the the PTR records and won't be update the IP add. in DNS records.

Why does the clock pengulin stop working?

In order to work, a pendulum requires a form of energy. In a clock weights are attached to chains. As gravity pulls on the weights, the chains move the clockwork. The pendulum swings through the arc of a cycloid measuring the ratio of length, gravity, and time. When the weight on the end of the chain reaches the bottom, it stops providing energy to the clock, and the clock stops. The weights and chains must be repositioned so they can again provide energy to the pendulum.

Like all machines, the clockwork eventually wears out and must be repaired or replaced.

Which commands can be used to configure active directory permissions from the command line?

The following command-line tools can be used to manage Active Directory

CSVDE

Import and export Active Directory data using comma-separated format.

Dsadd

Add users, groups, computers, contacts, and organizational units to Active Directory.

Dsmod

Modify an existing object of a specific type in the directory. The types of objects that can be modified are: users, groups, computers, servers, contacts, and organizational units.

Dsrm

Remove objects of the specified type from Active Directory.

Dsmove

Rename an object without moving it in the directory tree, or move an object from its current location in the directory to a new location within a single domain controller. (For cross-domain moves, use the Movetree command-line tool.)

Dsquery

Query and find a list of objects in the directory using specified search criteria. Use in a generic mode to query for any type of object or in a specialized mode to query for for selected object types. The specific types of objects that can be queried through this command are: computers, contacts, subnets, groups, organizational units, sites, servers and users.

Dsget

Display selected attributes of specific object types in Active Directory. Attributes of the following object types can be viewed: computers, contacts, subnets, groups, organizational units, servers, sites, and users.

LDIFDE

Ceate, modify, and delete directory objects. This tool can also be used to extend the schema, export Active Directory user and group information to other applications or services, and populate Active Directory with data from other directory services.

Ntdsutil

General purpose Active Directory management tool. Use Ntdsutil to perform database maintenance of Active Directory, to manage single master operations, and remove metadata left behind by domain controllers that were removed from the network without being properly uninstalled.

How do you delete account from active directory?

dsrmObjectDN to remove user account

dsrm computerComputerDN to remove computer account

Which command can be used on a PC to determine which TCP IP ports are in use?

Open command prompt and type netstat

This will show all ports in use and all ingoing\outgoing connections along with the connection type. TCP, UDP

When active directory detects a replication conflict in which two objects have been modified nearly simultaneously the first attribute that active directory will use as a tie breaker is the?

If the same attribute is modified on two domain controllers at the same time, Active Directory will use the version ID as the first tie-breaker to determine which value to keep and which one to discard.

What is Dcdiag?

This command-line tool analyzes the state of one or all domain controllers in a forest and reports any problems to assist in troubleshooting. DCDiag.exe consists of a variety of tests that can be run individually or as part of a suite to verify domain controller health.

Tool location

The DCDiag command-line tool is included when you install Windows Server 2003 Support Tools from the product CD or from the Microsoft Download Center(http://go.microsoft.com/fwlink/?LinkId=100114). For more information about how to install Windows Support Tools, see Install Windows Support Tools(http://go.microsoft.com/fwlink/?LinkId=62270).

Tool requirements
  • Except as noted below, all commands in DCDiag can be run on Windows XP Professional and Windows Server 2003 family (member servers and domain controllers).
  • The new DCDIAG /TEST:DNS command can validate DNS health of Windows 2000 Server (SP3 or later) or Windows Server 2003 family domain controllers when run from the console of Windows XP or Windows Server 2003 member computers or Windows Server 2003 domain controllers.

Where is active directory database held what other folders are related to Active directory?

The Active Directory Database is Stored in %SYSTEM ROOT%\NDTS folder.

the active directory uses the sysvol folder as well

The file is called as ntds.dit. Along with this file there are other files also present in this folder. The files are created when you run dcpromo. The list of files and use of those files are listed below

1. ntds.dit : This is the main database file for active directory.

2. edb.log : When a transaction performed to ad database, like writing some data first the data will be stored to this file. And after that it will be sent to database. So the system performance will be depends on how this data from edb.log file will be written to ntds.dit

3. res1.log : Used as reserve space in the case when drive had low space. It is basically 10MB in size and creted when we run dcpromo.

4. res2.log : Same as res1.log. It is also 10MB in size and the purspose also same.

5. edb.chk : This file records the transactions committed to ad database. During shutdown, shutdown statement is written to this file. If it is not found when the system rebooted, the ad database tries to check with edb.log for the updated information.

Edb corruption or Edb active directory corruption is really serious. However you can get this repaired by using edb repair tool.

The Active Directory Database is Stored in %SYSTEM ROOT%\NDTS folder.

the active directory uses the sysvol folder as well

What is ipsec?

(IP SECurity) A security protocol from the IETF that provides authentication and encryption over the Internet. Unlike SSL, which provides services at layer 4 and secures two applications, IPsec works at layer 3 and secures everything in the network. Also unlike SSL, which is typically built into the Web browser, IPsec requires a client installation. IPsec can access both Web and non-Web applications, whereas SSL requires workarounds for non-Web access such as file sharing and backup. IPsec is supported by IPv6. Since IPsec was designed for the IP protocol, it has wide industry support and is expected to become the standard for virtual private networks (VPNs) on the Internet.

If RID master fails what happens?

The RID master will allocate the pool of RIDs to the DC, So we can create the objects without RID master. When this RID pool exhausted we can't create object.