answersLogoWhite

0

Windows Server 2003

Also known as the Win2K3, Windows Server 2003 is a server OS (operating system) from the American software company Microsoft. This OS has the capability to share printers and files, provide email services, authenticate users, and host message queues.

1,215 Questions

A is a group of one or more domain trees is called?

A is forest which consists of domain trees.The trree is defined in the following format

Trees are collections of one or more domains that allow global resource sharing. A tree may consist of a single domain or multiple domains in a contiguous namespace. Adding a domain to a tree becomes a child of the tree root domain. Domain will be called as parent domain to which child domain is attached. A child domain can also have its multiple child domains. Child domain uses the name followed by parent domain name and gets a unique Domain Name System (DNS).

For example, if tech.com is the root domain, you can create one or more Child domains to tech.com such as north.tech.com and or south.tech.com. These "children" may also have child domains created under them, such as sales.north.tech.com.

The domains in a tree have two-way, Kerberos transitive trust relationships. A Kerberos transitive trust simply means that if Domain A trusts Domain B and Domain B trusts Domain C, then Domain A trusts Domain C. Therefore, a domain joining a tree immediately has trust relationships established with every domain in the tree.

What is schema theory?

Schemata influence our attention, as we are more likely to notice things that fit into our schema. If something contradicts our schema, it may be encoded or interpreted as an exception or as unique. Thus, schemata are prone to distortion. They influence what we look for in a situation. They have a tendency to remain unchanged, even in the face of contradictory information. We are inclined to place people who do not fit our schema in a "special" or "different" category, rather than to consider the possibility that our schema may be faulty. As a result of schemata, we might act in such a way that actually causes our expectations to come true.

Which is the command used to remove active directory from a domain controller?

follow this link.

http://support.microsoft.com/kb/216498

you can type dcpromo and follows instcution on screen to remove AD

What is ldp what is replmon what is adsiedit what is netdom what?

The Lightweight Directory Access Protocol, or LDAP is an application protocol for querying and modifying directory services running over TCP/IP.[1] A directory is a set of objects with attributes organized in a logical and hierarchical manner. The most common example is the telephone directory, which consists of a series of names (either of persons or organizations) organized alphabetically, with each name having an address and phone number attached. An LDAP directory tree often reflects various political, geographic, and/or organizational boundaries, depending on the model chosen. LDAP deployments today tend to use Domain name system (DNS) names for structuring the topmost levels of the hierarchy. Deeper inside the directory might appear entries representing people, organizational units, printers, documents, groups of people or anything else that represents a given tree entry (or multiple entries). Its current version is LDAPv3, which is specified in a series of Internet Engineering Task Force (IETF) Standard Track Requests for comments (RFCs) as detailed in RFC 4510. LDAP means Light-Weight Directory Access Protocol. It determines how an object in an Active directory should be named. LDAP (Lightweight Directory Access Protocol) is a proposed open standard for accessing global or local directory services over a network and/or the Internet. A directory, in this sense, is very much like a phone book. LDAP can handle other information, but at present it is typically used to associate names with phone numbers and email addresses. LDAP directories are designed to support a high volume of queries, but the data stored in the directory does not change very often. It works on port no. 389. LDAP is sometimes known as X.500 Lite. X.500 is an international standard for directories and full-featured, but it is also complex, requiring a lot of computing resources and the full OSI stack. LDAP, in contrast, can run easily on a PC and over TCP/IP. LDAP can access X.500 directories but does not support every capability of X.500

What is REPLMON?

A: Replmon is the first tool you should use when troubleshooting Active Directory replication issues. As it is a graphical tool, replication issues are easy to see and somewhat easier to diagnose than using its command line counterparts. The purpose of this document is to guide you in how to use it, list some common replication errors and show some examples of when replication issues can stop other network installation actions. for more go to http://www.techtutorials.net/articles/replmon_howto_a.html

What is ADSIEDIT?

A: ADSIEdit is a Microsoft Management Console (MMC) snap-in that acts as a low-level editor for Active Directory. It is a Graphical User Interface (GUI) tool. Network administrators can use it for common administrative tasks such as adding, deleting, and moving objects with a directory service. The attributes for each object can be edited or deleted by using this tool. ADSIEdit uses the ADSI application programming interfaces (APIs) to access Active Directory. The following are the required files for using this tool:

· ADSIEDIT.DLL ·

ADSIEDIT.MSC

Regarding system requirements, a connection to an Active Directory environment and Microsoft Management Console (MMC) is necessary

What is NETDOM?

A: NETDOM is a command-line tool that allows management of Windows domains and trust relationships. It is used for batch management of trusts, joining computers to domains, verifying trusts, and secure channels

A: Enables administrators to manage Active Directory domains and trust relationships from the command prompt. Netdom is a command-line tool that is built into Windows Server 2008. It is available if you have the Active Directory Domain Services (AD DS) server role installed. To use netdom, you must run the netdom command from an elevated command prompt. To open an elevated command prompt, click Start, right-click Command Prompt, and then click Run as administrator. You can use netdom to: Join a computer that runs Windows XP Professional or Windows Vista to a Windows Server 2008 or Windows Server 2003 or Windows 2000 or Windows NT 4.0 domain. Provide an option to specify the organizational unit (OU) for the computer account. Generate a random computer password for an initial Join operation. Manage computer accounts for domain member workstations and member servers. Management operations include: Add, Remove, Query. An option to specify the OU for the computer account. An option to move an existing computer account for a member workstation from one domain to another while maintaining the security descriptor on the computer account. Establish one-way or two-way trust relationships between domains, including the following kinds of trust relationships: From a Windows 2000 or Windows Server 2003 or Windows Server 2008 domain to a Windows NT 4.0 domain. From a Windows 2000 or Windows Server 2003 or Windows Server 2008 domain to a Windows 2000 or Windows Server 2003 or Windows Server 2008 domain in another enterprise. Between two Windows 2000 or Windows Server 2003 or Windows Server 2008 domains in an enterprise (a shortcut trust). The Windows Server 2008 or Windows Server 2003 or Windows 2000 Server half of an interoperable Kerberos protocol realm. Verify or reset the secure channel for the following configurations: Member workstations and servers. Backup domain controllers (BDCs) in a Windows NT 4.0 domain. Specific Windows Server 2008 or Windows Server 2003 or Windows 2000 replicas. Manage trust relationships between domains, including the following operations: Enumerate trust relationships (direct and indirect). View and change some attributes on a trust.

Syntax

Netdom uses the following general

syntaxes: NetDom [] [{/d: | /domain:} ] []

NetDom help

Step to implement to active directory integrated dns?

Active directory must be installed .

Go to start->run->administrative tools->dns

select forward lookup zones right click select ZONE and click on next->then select active directory integrated complete the process

What information is provided on the green pages of ERG?

This section contains a table which lists, by ID number, TIH materials, including certain chemical warfare agents, and water-reactive materials which produce toxic gases upon contact with water. The table provides two different types of recommended safe distances which are "Initial isolation distances" and "Protective action distances."

When active directory detects a replication conflict?

version id is different in both the DCs. the version with higher value gets replicated.

repladmin and replmon are 2 tools which are used to check the errors in replications and monitoring is done with these tools.conflict resolution is done also.

What is the most basic unit of an Active Directory environment?

A user account. Without a user account object defined in the active directory a user cannot log on and gain access to network resources.

How do you allow inbound traffic for specific hosts on Windows 2003 NAT?

You can use the Windows Server 2003 implementation of IPSec to compensate for the limited protections provided by applications for network traffic, or as a network-layer foundation of a defense-in-depth strategy. Do not use IPSec as a replacement for other user and application security controls, because it cannot protect against attacks from within established and trusted communication paths. Your authentication strategy must be well defined and implemented for the potential security provided by IPSec to be realized, because authentication verifies the identity and trust of the computer at the other end of the connection.

Você pode usar o Windows Server 2003 implementação de IPSec para compensar a limitada proteção fornecida pelas aplicações para o tráfego de rede, ou como uma rede da camada de fundação de uma defesa em profundidade estratégia. Não utilizar o IPSec como um substituto para o outro usuário e aplicação controlos de segurança, porque pode não proteger contra OS ataques de dentro da estabilidade e de confiança comunicação caminhos. Sua estratégia autenticação devem ser bem definidas e implementadas para o potencial de segurança fornecido pelo IPSec para ser realizado, porque autenticação verifica a identidade ea confiança do computador na outra extremidade da ligação.

Who has the role of an ISTG by default?

Intersite Topology Generator (ISTG), which is responsible for the connections among the sites. By default Windows 2003 Forest level functionality has this role.

By Default the first Server has this role. If that server can no longer preform this role then the next server with the highest GUID then takes over the role of ISTG.

What is the purpose of filtering events in Event Viewer?

ANSWER: I can limit the display of what appears in the log to focus on the important events, by using the Filter.

What does this fatal error mean C000021a fatal error 0xc0000005 With Status 0x7c9106c3 0x00c8f36c and how do i fix it?

You need to check which file causes such error. Use Microsoft website if you want to locate errors by its number.

There are 3 step to repair 0xc0000005 error

If you got 0xc0000005 error then there is a 94% chance that your computer has registry problems. To repair 0xc0000005 error you need to follow the steps below:

* Step 1 - Download a 0xc0000005 error repair tool,install this error repair tool.

* Step 2 - Click the Repair All Button.It will scan you PC for Free.

* Step 3 - Then click the Repair All Button again and your done! It is very easy to repair 0xc0000005 error.

Here are the URL of 0xc0000005 error repair tool:

http://www.fixerroreasy.com/ttfix-0xc0000005_error-zz0005

How many ways to install the Active Directory?

There are two ways

1. By adding roles manually.

2. By using command prompt " DCPROMO "

What are several of the largest advantages of using active directory integrated zones as a type for a larger organization?

The main zone types used in Windows Server 2003 DNS environments are primary zones and Active Directory-integrated zones. Both primary zones and secondary zones are standard DNS zones that use zone files. The main difference between primary zones and secondary zones is that primary zones can be updated. Secondary zones contain read-only copies of zone data.

An Active Directory-integrated zone can be defined as an improved version of a primary DNS zone because it can use multi-master replication and the security features of Active Directory. The zone data of Active Directory-integrated zones are stored in Active Directory.

Active Directory-integrated zones are authoritative primary zones.

A few advantages that Active Directory-integrated zone implementations have over standard primary zone implementations are:

  • Active Directory replication is faster, which means that the time needed to transfer zone data between zones is far less.

  • The Active Directory replication topology is used for Active Directory replication, and for Active Directory-integrated zone replication. There is no longer a need for DNS replication when DNS and Active Directory are integrated.

  • Active Directory-integrated zones can enjoy the security features of Active Directory.

  • The need to manage your Active Directory domains and DNS namespaces as separate entities is eliminated. This in turn reduces administrative overhead.

  • When DNS and Active Directory are integrated; the Active Directory-integrated zones are replicated, and stored on any new domain controllers automatically. Synchronization takes place automatically when new domain controllers are deployed