How do you access different features to the active directory?
The Active Directory administrative tools can only be used from a computer with access to a domain. The following Active Directory administrative tools are available on the Administrative Tools menu:
Active Directory Users and Computers (dsa.msc)
Active Directory Domains and Trusts (domain.msc)
Active Directory Sites and Services (dssite.msc)
Can you disable balloon tips for all users using Group Policy?
Yes, for Windows XP and Windows 2003, but not for Windows 2000.
The answer lies within Administrative Templates | Start Menu and Taskbar | Remove Balloon Tips on Start Menu items.
What will happen if you install a DHCP server on a network without Active Directory?
Without Active Directory the DHCP server cannot be authorized, and could therefore be considered a "rogue".
What A.D do for a DHCP Server that it authorised to DHCP server to give an Ip add. to clients and authorised for update the DNS PTR records.
and when we won't authorised DHCP with Active Directory it won't be update the the PTR records and won't be update the IP add. in DNS records.
Which commands can be used to configure active directory permissions from the command line?
The following command-line tools can be used to manage Active Directory
CSVDE
Import and export Active Directory data using comma-separated format.
Dsadd
Add users, groups, computers, contacts, and organizational units to Active Directory.
Dsmod
Modify an existing object of a specific type in the directory. The types of objects that can be modified are: users, groups, computers, servers, contacts, and organizational units.
Dsrm
Remove objects of the specified type from Active Directory.
Dsmove
Rename an object without moving it in the directory tree, or move an object from its current location in the directory to a new location within a single domain controller. (For cross-domain moves, use the Movetree command-line tool.)
Dsquery
Query and find a list of objects in the directory using specified search criteria. Use in a generic mode to query for any type of object or in a specialized mode to query for for selected object types. The specific types of objects that can be queried through this command are: computers, contacts, subnets, groups, organizational units, sites, servers and users.
Dsget
Display selected attributes of specific object types in Active Directory. Attributes of the following object types can be viewed: computers, contacts, subnets, groups, organizational units, servers, sites, and users.
LDIFDE
Ceate, modify, and delete directory objects. This tool can also be used to extend the schema, export Active Directory user and group information to other applications or services, and populate Active Directory with data from other directory services.
Ntdsutil
General purpose Active Directory management tool. Use Ntdsutil to perform database maintenance of Active Directory, to manage single master operations, and remove metadata left behind by domain controllers that were removed from the network without being properly uninstalled.
Why does the clock pengulin stop working?
In order to work, a pendulum requires a form of energy. In a clock weights are attached to chains. As gravity pulls on the weights, the chains move the clockwork. The pendulum swings through the arc of a cycloid measuring the ratio of length, gravity, and time. When the weight on the end of the chain reaches the bottom, it stops providing energy to the clock, and the clock stops. The weights and chains must be repositioned so they can again provide energy to the pendulum.
Like all machines, the clockwork eventually wears out and must be repaired or replaced.
How do you delete account from active directory?
dsrmObjectDN to remove user account
dsrm computerComputerDN to remove computer account
Which command can be used on a PC to determine which TCP IP ports are in use?
Open command prompt and type netstat
This will show all ports in use and all ingoing\outgoing connections along with the connection type. TCP, UDP
If the same attribute is modified on two domain controllers at the same time, Active Directory will use the version ID as the first tie-breaker to determine which value to keep and which one to discard.
Check this :
https://ccrma.stanford.edu/~jos/sasp/img2442.png
This command-line tool analyzes the state of one or all domain controllers in a forest and reports any problems to assist in troubleshooting. DCDiag.exe consists of a variety of tests that can be run individually or as part of a suite to verify domain controller health.
Tool locationThe DCDiag command-line tool is included when you install Windows Server 2003 Support Tools from the product CD or from the Microsoft Download Center(http://go.microsoft.com/fwlink/?LinkId=100114). For more information about how to install Windows Support Tools, see Install Windows Support Tools(http://go.microsoft.com/fwlink/?LinkId=62270).
Tool requirementsWhere is active directory database held what other folders are related to Active directory?
The Active Directory Database is Stored in %SYSTEM ROOT%\NDTS folder.
the active directory uses the sysvol folder as well
The file is called as ntds.dit. Along with this file there are other files also present in this folder. The files are created when you run dcpromo. The list of files and use of those files are listed below
1. ntds.dit : This is the main database file for active directory.
2. edb.log : When a transaction performed to ad database, like writing some data first the data will be stored to this file. And after that it will be sent to database. So the system performance will be depends on how this data from edb.log file will be written to ntds.dit
3. res1.log : Used as reserve space in the case when drive had low space. It is basically 10MB in size and creted when we run dcpromo.
4. res2.log : Same as res1.log. It is also 10MB in size and the purspose also same.
5. edb.chk : This file records the transactions committed to ad database. During shutdown, shutdown statement is written to this file. If it is not found when the system rebooted, the ad database tries to check with edb.log for the updated information.
Edb corruption or Edb active directory corruption is really serious. However you can get this repaired by using edb repair tool.
The Active Directory Database is Stored in %SYSTEM ROOT%\NDTS folder.
the active directory uses the sysvol folder as well
(IP SECurity) A security protocol from the IETF that provides authentication and encryption over the Internet. Unlike SSL, which provides services at layer 4 and secures two applications, IPsec works at layer 3 and secures everything in the network. Also unlike SSL, which is typically built into the Web browser, IPsec requires a client installation. IPsec can access both Web and non-Web applications, whereas SSL requires workarounds for non-Web access such as file sharing and backup. IPsec is supported by IPv6. Since IPsec was designed for the IP protocol, it has wide industry support and is expected to become the standard for virtual private networks (VPNs) on the Internet.
Interactive
You should be try other internet explorer as mozilla firefox or other.
If RID master fails what happens?
The RID master will allocate the pool of RIDs to the DC, So we can create the objects without RID master. When this RID pool exhausted we can't create object.
What is the function of resource records in DNS?
used by the server to resolve names
The resource records are created to help dns work like zone ,ip to name vice versa. there are 23 types of resource record types defined for dns.
DNS Record TypesA full list of DNS Record Types may be obtained from IANA DNS Parameters. RRValueRFCDescriptionhttp://wiki.answers.com/../a.HTML1http://wiki.answers.com/../apd/rfc1035.txtIPv4 Address record. An IPv4 address for a host.http://wiki.answers.com/../aaaa.HTML28http://wiki.answers.com/../apd/rfc3596.txtIPv6 Address record. An IPv6 address for a host. Current IETF recommendation for IPv6 forward-mapped zones.http://wiki.answers.com/../a6.HTML38http://wiki.answers.com/../apd/rfc2874.txtExperimental. Forward mapping of IPv6 addresses. An IP address for a host within the zone.AFSDB18http://wiki.answers.com/../apd/rfc1183.txtLocation of AFS servers. Experimental - special apps only.http://wiki.answers.com/../cname.HTML5http://wiki.answers.com/../apd/rfc1035.txtCanonical Name. An alias name for a host.http://wiki.answers.com/../dname.HTML39http://wiki.answers.com/../apd/rfc2672.txtExperimental. Delegation of reverse addresses (primarily IPv6).http://wiki.answers.com/../dnskey.HTML48http://wiki.answers.com/../apd/rfc4034.txtDNSSEC.bis. DNS public key RR.http://wiki.answers.com/../ds.HTML43http://wiki.answers.com/../apd/rfc4034.txtDNSSEC.bis. Delegated Signer RR.http://wiki.answers.com/../hinfo.HTML13http://wiki.answers.com/../apd/rfc1035.txtHost Information - optional text data about a host.ISDN20http://wiki.answers.com/../apd/rfc1183.txtISDN address. Experimental = special applications only.http://wiki.answers.com/../key.HTML25http://wiki.answers.com/../apd/rfc2535.txtPublic key associated with a DNS name.LOC29http://wiki.answers.com/../apd/rfc1876.txtStores GPS data. Experimental - widely used.http://wiki.answers.com/../mx.HTML15http://wiki.answers.com/../apd/rfc1035.txtMail Exchanger. A preference value and the host name for a mail server/exchanger that will service this zone. RFC 974 defines valid names.http://wiki.answers.com/../naptr.HTML35http://wiki.answers.com/../apd/rfc3403.txtNaming Authority Pointer Record. Gross misnomer. General purpose definition of rule set to be used by applications e.g. VoIPhttp://wiki.answers.com/../ns.HTML2http://wiki.answers.com/../apd/rfc1035.txtName Server. Defines the authoritative name server(s) for the domain (defined by the SOA record) or the subdomain.http://wiki.answers.com/../nsec.HTML47http://wiki.answers.com/../apd/rfc4034.txtDNSSEC.bis. Next Secure record. Ssed to provide proof of non-existence of a name.http://wiki.answers.com/../nxt.HTML30
DNSSEC Next Domain record type. Obsolete use NSEC.http://wiki.answers.com/../ptr.HTML12http://wiki.answers.com/../apd/rfc1035.txtIP address (IPv4 or IPv6) to host. Used in http://wiki.answers.com/../ch3.RP17http://wiki.answers.com/../apd/rfc1183.txtInformation about responsible person. Experimental - special apps only.http://wiki.answers.com/../rrsig.HTML46http://wiki.answers.com/../apd/rfc4034.txtDNSSEC.bis. Signed RRset.RT21http://wiki.answers.com/../apd/rfc1183.txtThrough-route binding. Experimental - special apps only.http://wiki.answers.com/../sig.HTML24http://wiki.answers.com/../apd/rfc2931.txt/http://apd/rfc2535.txtDNSSEC. Obsolete use RRSIG. SIG(0) is used as a special meta RR in DDNS and zone transfer security.http://wiki.answers.com/../soa.HTML6http://wiki.answers.com/../apd/rfc1035.txtStart of Authority. Defines the zone name, an e-mail contact and various time and refresh values applicable to the zone.http://wiki.answers.com/../ch9/spf.HTML99http://wiki.answers.com/../apd/rfc4408.txtSender Policy Framework (v1). Defines the servers which are authorized to send mail for a domain. Its primary function is to prevent identity theft by spammers.http://wiki.answers.com/../srv.HTML33http://wiki.answers.com/../apd/rfc2782.txtDefines services available in the zone, for example, ldap, http etc..http://wiki.answers.com/../txt.HTML16http://wiki.answers.com/../apd/rfc1035.txtText information associated with a name. The http://wiki.answers.com/../ch9/spf.HTMLand may (as of April 2006) be defined using an SPF RR. DKIM (http://wiki.answers.com/../apd/rfc4871.txtalso makes use of the TXT RR for authenticaing email. http://wiki.answers.com/../ch9/dkim.HTML.WKS11http://wiki.answers.com/../apd/rfc1035.txtWell Known Services. Deprecated in favour of http://wiki.answers.com/../srv.HTML.X2519http://wiki.answers.com/../apd/rfc1183.txtX.25 address. Experimental - special apps only.
http://wiki.answers.com/../#directives
http://wiki.answers.com/../origin.HTML
http://wiki.answers.com/../include.HTML
http://wiki.answers.com/../apa/ttl.HTML
http://wiki.answers.com/../generate.HTML(non-standard BIND only)
Give each workbook a different name.
control panel->
go to computer management->
local users and groups->
groups->right click select new group and define the properties of the group and add members and click finish
in policy you can use the groups to apply policy