What is the difference betweena single-master and a multi-master domain replication model?
Multi-master replication is a method of database replication which allows data to be stored by a group of computers, and updated by any member of the group.
The multi-master replication system is responsible for propagating the data modifications made by each member to the rest of the group, and resolving any conflicts that might arise between concurrent changes made by different members.
Multi-master replication can be contrasted with master-slave replication, in which a single member of the group is designated as the "master" for a given piece of data and is the only node allowed to modify that data item. Other members wishing to modify the data item must first contact the master node. Allowing only a single master makes it easier to achieve consistency among the members of the group, but is less flexible than multi-master replication
Flexible Single Master of Operation or just single master operation or operations master, is a feature of Microsoft's Active Directory (AD).
FSMOs are specialized domain controller tasks, used where standard data transfer and update methods are inadequate. AD normally relies on multiple peer DCs, each with a copy of the AD database, being synchronized by multi-master replication. The tasks which are not suited to multi-master replication, and are viable only with a single-master database, are the FSMOs.
Once per domain they only replicate to all
The Relative ID Master allocates security RIDs to DCs to assign to new AD security principals (users, groups or computer objects). It also manages objects moving between domains.
The Infrastructure Master maintains security identifiers, GUIDs, and DN for objects referenced across domains. Most commonly it updates user and group links.This is another domain-specific role and its purpose is to ensure that cross-domain object references are correctly handled. For example, if you add a user from one domain to a security group from a different domain, the Infrastructure Master makes sure this is done properly. As you can guess however, if your Active Directory deployment has only a single domain, then the Infrastructure Master role does no work at all, and even in a multi-domain environment it is rarely used except when complex user administration tasks are performed. Because of this, the hardware requirements for machines holding this role are relatively small.
The PDC Emulator operations master role processes all password changes in the domain. Failed authentication attempts due to a bad password at other domain controllers are forwarded to the PDC Emulator before rejection. This ensures that a user can immediately login following a password change from any domain controller, without having to wait several minutes for the change to be replicated. The PDC Emulator Operations Master role must be carefully sited in a location to best handle all password reset and failed-authentication forwarding traffic for the domain. The PDC emulator role holder retains the following functions:
1.Password changes performed by other DCs in the domain are replicated preferentially to the PDC emulator.
2.Authentication failures that occur at a given DC in a domain because of an incorrect password are forwarded to the PDC emulator before a bad password failure message is reported to the user.
3.Account lockout is processed on the PDC emulator.
4.backward compatibility,The PDC emulator performs all of the functionality that a Microsoft Windows NT 4.0 Server-based PDC or earlier PDC performs for Windows NT 4.0-based or earlier clients.
Once per forest
The Schema Master maintains all modifications to the schema of the forest. The schema determines the types of objects permitted in the forest and the attributes of those objects.
The Domain Naming Master tracks the names of all domains in the forest and is required to add new domains to the forest or delete existing domains from the forest. It is also responsible for group membership.
Who created a user account in Active Directory?
In domain the adminstrator/ admin group/enterprise admin has rights to create user.
What policy setting is set to audit successes in the Default Domain Controllers GPO?
account management events
What is the command to add a user in SAMBA Server?
smbpasswd -a username & put password
Amit Tripath
Annik SAT
Do you build your website first or your domain name first?
It's really your choice, but I would recommend not buying the domain name first, if you don't want to pay for it for no reason until you get your site up. On the other hand, getting the domain name is a good way to reserve it. I know some guys who just "collect" domain names. Hope I helped!
What is group policy management?
The GPMC is one of Microsoft's best new features in all of Windows Server 2003. Within the GPMC is a rich variety of tools for creating, editing, observing, modeling and reporting on all aspects of Group Policy.
The GPMC unifies Group Policy management across your Active Directory forest. Before the GPMC, administrators needed multiple tools to manage Group Policy; the Microsoft Active Directory Users and Computers, the Delegation Wizard, and the ACL Editor. Not only does the GPMC integrate the existing Group Policy tools, but also it brings the following exciting new capabilities:
In Server 2003 domian security policy helps you to set Password Protection..
1)Password length
2)Password Complexity
3)Password Age (min age & max age)
In Server 2003 domian security policy helps you to set Password Protection..
1)Password length
2)Password Complexity
3)Password Age (min age & max age)
Default and Recommended Password Policy Settings
===============================================
Policy Default Recommended Comments
Enforce password history
24 passwords remembered
(No change)
Prevents users from reusing passwords.
Maximum password age
42 days
(No change)
N/A
Minimum password age
1 day
(No change)
Prevents users from cycling through their password history to reuse passwords.
Minimum password length
7 characters
(No change)
Sets minimum password length.
Password must meet complexity requirements
Enabled
(No change)
For the definition of a complex password, see "Creating a Strong Administrator Password" in the Establishing Secure Domain Controller Build Practices section.
Store password using reversible encryption
Disabled
(No change)
N/A
Default and Recommended Account Lockout Policy Settings
======================================================
Policy Default Recommended Reason
Account lockout duration
Not defined
0 minutes
The value 0 means that after account lockout an Administrator is required to reenable the account before account lockout reset has expired.
Account lockout threshold
0 invalid logon attempts
20 invalid logon attempts
The value 0 means that failed password tries never cause account lockout.
Because an account lockout duration of 0 minutes (administrator reset) is recommended, a small number for this setting can result in frequent administrator interventions.
Reset account lockout counter after
Not defined
30 minutes
This setting protects against a sustained dictionary attack by imposing a nontrivial delay after 20 unsuccessful attempts.
Default and Recommended Kerberos Policy Settings
================================================
Policy Default Recommended Comments
Enforce user logon restrictions
Enabled
(No change)
N/A
Maximum lifetime for service ticket
600 minutes
(No change)
N/A
Maximum lifetime for user ticket
10 hours
(No change)
N/A
Maximum lifetime for user ticket renewal
7 days
(No change)
N/A
Maximum tolerance for computer clock synchronization
5 minutes
(No change)
Maximum tolerance between the client's and server's clocks.
Open an existing Document.
What is a DNS server used for?
The DNS server is used to translate an alphanumeric address into an IP address that a computer can understand. As such, the computer will know which domain name to contact.
Windows Embedded CE resolves host names into IPv6 addresses via queries to a DNS or WINS server, or via IPv6 link local multicast. Queries sent to DNS servers are performed over IPv6 and IPv4. Queries sent to WINS servers are performed over IPv4 even though they may return IPv6 addresses.
To use a host name as an alias for an IPv6 address, you must ensure that the name is unique and that it resolves to the correct IPv6 address. For IPv6 name-to-address entries, the IPv6 address is written by using standard colon-hexadecimal format. For more information, see IPv6 Addresses.
When using the getaddrinfo function, dual stack name resolution occurs. Domain names are resolved by sending DNS name queries to a configured DNS server. This is a computer that either stores domain name-to-IPv6 address mapping records or has records of other DNS servers. The DNS name resolution may yield both IPv4 and IPv6 addresses.
The DNS server resolves the queried domain name to an IPv4 or IPv6 address and returns the results. When configured for DHCP, the DHCP server provides IPv4 addresses of DNS and WINS servers used for both A and AAAA searches.
The DNS client in Windows CE .NET 4.1 and later also supports the processing of AAAA (quad-A) resource records. The Internet Protocol (TCP/IP)must be configured with the IPv4 address of a DNS server.
The Host name is resolved to an address by a DNS, WINS, or Link Local Multicast Name Resolution (LLMNR) resolver
APIPA avoids the problem of IP hosts being unable to communicate if a DHCP server is unavailable,which stands for Automatic Private IP Addressing. APIPA is a Windows feature that allows a computer to determine IP configuration information without DHCP. It is only useful on a small workgroup and not a large network.
How many Domain Controllers can you have when using Microsoft SBS?
One, you may join other member servers but you may only have one domain controller.
What zones are stored in active directory?
Primary zone: This is the only zone type that can be edited or updated because the data in the zone is the original source of the data for all domains in the zone. Updates made to the primary zone are made by the DNS server that is authoritative for the specific primary zone. You can also back up data from a primary zone to a secondary zone.
Secondary zone: A secondary zone is a read-only copy of the zone that was copied from the master server during zone transfer.
Active Directory-integrated zone: An Active Directory-integrated zone is a zone that stores its zone data in Active Directory. DNS zone files are not needed. This type of zone is an authoritative primary zone. Zone data of an Active Directory-integrated zone is replicated during the Active Directory replication process. Active Directory-integrated zones also enjoy the security features of Active Directory.
Stub zone: A stub zone is a new Windows Server 2003 feature. Stub zones only contain those resource records necessary to identify the authoritative DNS servers for the master zone.
as well underscore zone _msdcs
Roll Back Driver
DHCP stands for Dynamic host configuration protocol. DHCP is a piece of the TCP/IP protocol suite that handles the automatic assignment of IP addresses to clients.
Can Domains have many primary domain controllers?
No the reason it's called a primary Domain Controller is because it's the one controller that has all the domain names and address for that Domain.
How many types of exchange server?
two types of exchange server:-
exchange server standerd
exchange server enterprise
when a print job is processed over the internet or an intranet
How do Active directory sites affect replication?
Active directory site replication occurs by using a KCC, Which is in avery site and creates a repliation topolgy to replicate the data from one domain to other domain and it uses RPC protocol to replicate data.
Thanks
Santosh Rawat
What factors account the success and popularity of TCP IP?
This last point is, perhaps ironically, arguably the most important. Not only is TCP/IP the "underlying language of the Internet", it is also used in most private networks today. Even former "competitors" to TCP/IP such as NetWare now use TCP/IP to carry traffic. The Internet continues to grow, and so do the capabilities and functions of TCP/IP. Preparation for the future continues, with the move to the new IP version 6 protocol in its early stages. It is likely that TCP/IP will remain a big part of internetworking for the foreseeable future.
What is the difference between a host and a workstation?
host or server is same. the server provide the service to the end user or client.
like engineered programming.
How many driver signing options does windows server 2003 support?
How many different driver signing options does windows server 2003 support? 1. Ignore 2. Warn 3. Block Answer: Microsoft uses digital signatures for device drivers to let users know that drivers are compatible with Microsoft Windows XP, Windows Server 2003, Windows 2000, and Windows Me. A driver's digital signature indicates that the driver was tested with Windows for compatibility and has not been altered since testing. Microsoft requires digital signatures for all devices provided in systems that carry the "Designed for Windows" logo. For Windows XP, certain limited application files can also receive digital signatures.
There are three different options for driver signing. The option you select will tell Windows what to do when it detects an unsigned driver (this is a driver that has not been tested with Windows). You can configure the driver signing options from the System Properties dialog box. The different options include: Ignore- Install the software anyway and don't ask for my approval. Selecting this option means that any unsigned drivers will be installed on your computer and could cause instability.
Warn - Prompt me each time to choose an action. If this option is selected, Windows will present a warning when you attempt to install an unsigned driver. Block - Never install unsigned driver software. By selecting this option, no unsigned drivers will be installed on the computer.