answersLogoWhite

0

Windows Server 2008

Released in February 2008, Windows Server 2008 is a Microsoft operating system that shares the same code as Windows Vista. Ask questions about its features and system requirements here.

313 Questions

How can you downgrade a computer running Windows Server 2008 to Windows Server 2003 R2?

Hi, You cannot downgrade an operating system. You will have to nuke the hard drive and reload from the beginning. This is a tough one to do because you have to back-up everything you want to keep and make sure you have all the drivers for everything in your computer. Let me know if you have any questions. -Nitin Answer: Answer:

1: What you will receive: One copy of the applicable Windows Server downgrade software and associated product key. 2: The Downgrade Media Kit is not a new license for Windows Server. It may only be run under a valid license per the terms of those license terms. For example, a copy of Windows Server 2003 R2 Enterprise Edition may be run under a Windows Server 2008 license as permitted by the Downgrade rights described in that license. Check the applicable license terms for specific information regarding the rights for the license. 3: Transfer rights apply to the original license you purchased. 4: Only 1 downgrade media kit per license. 5: The terms of this offer may be changed at any time without notice including, without limitation, the expiration date. 6: There is a fee for this upgrade to cover materials, shipping, handling, and fulfillment overhead. The fee will vary depending on your location. The amount will be presented to you prior to final submission of your order. At that time, you will have the opportunity to opt out before final order submission. The fee is non-refundable. 7: OEM Customers: If you acquired your license with a new server from a server manufacturer, the downgrade software acquired through this program may not be supported by your OEM. Contact your server manufacturer for its support policy for running downgrade software on their server hardware.

Why is dns a requirement for active directory to work?

DNS is extremely important to all aspects of proper Active Directory operation. Any time a client makes a request for a domain service, it must find a domain controller to service that request, which is where DNS comes in to play.

There are two types of DNS queries: recursive and iterative.

When a DNS client requests DNS information, it uses a recursive query to do so.

In a recursive query, the DNS client sends its query to the first DNS server that it has been configured for in its TCP/IP configuration. It then sits and waits for the server to return an answer. If the server returns a positive response, the client will then go to the IP address returned by the server.

Why does Windows Server 2008 come in different versions?

Just as with consumer-oriented versions of Windows, Windows Server comes in several different varieties to accommodate features useful to different types of users. Large businesses are willing to pay dearly for operating systems that support dozens of processors and thousands of users, but a small business would be loathe to pay the same price when all they want is to run a small volume web server. By creating multiple versions with different feature sets, Microsoft is able to maximize their profits by gaining both types of customers.

What is the server used to run PHP in Windows?

One of the Windows Server operating systems.

PHP can be installed with Microsoft's IIS web server as an ISAPI filter, or you can install the WAMP server under Windows that contains the Apache web server, the PHP interpreter, and mySQL.

There are others as well, such as the Xitami web server, etc., that work equally well with PHP under windows.

Talk about all the AD-related roles in Windows Server 2008 R2?

Windows Server 2008 has five Active directory related roles. below are the list

1. Active Directory Domain Services (Identity): AD DS it provides the functionality of an identity and access (IDA) solution for enterprise networks. It also provides the mechanisms to support, manage, and configure resources in distribution network environments.

2. Active Directory Lightweight Directory Services (Applications): AD LDS formerly known as Active directory application mode (ADAM), provides support for directory-enabled applications.

3. Active Directory Certificate Services (Trust): AD CS to set up a certificate authority for issuing digital certificates as a part of a public key infrastructure (PKI) that binds the identity of a person, device or service to corresponding private key. Certificates can be used to authenticate users and computers, provide web-based authentication, support smart card authentication, and support application, including secure wireless n/w, vpn, Ipsec, EFS, and more.

4. Active Directory Rights management Services (Integrity): AD RMS is an information-protection technology that enables you to implement persistent usage policy templates (for documents) that define allowed and unauthorized use whether online, offline, inside, or outside the firewall.

5. Active Directory Federation Services (Partnership): AD FS enable an organization to extend IDA across multiple platforms, including both window and non-windows environments, and to project identity and access rights across security boundaries to trusted partners.

What are the differences between power user and administrator on Windows XP Pro?

Members of the Administrator group have total control over the computer and everything on it. The user named Administratoris the default account within this group. The domain account of each faculty or staff member with a Windows 2000 computer is part of the Administrator group on his or her computer. == * Create, modify, and access local user accounts * Install new hardware and software * Upgrade the operating system * Back up the system and files * Claim ownership of files that have become damaged * Do anything a Power User can ---- The Power User class can perform any task except for those reserved for Administators. They are allowed to carry out functions that will not directly affect the operating system or risk security. All domain accounts are part of the Power Users group on public Windows 2000 computers. == * Create local user accounts * Modify user accounts which they have created * Change user permissions on users, power users, and guests * Install and run applications that do not affect the operating system * Customize settings and resources on the Control Panel, such as Printers, Date/Time, and Power Options * Do anything a User can == * Access other users' data without permission * Delete or modify user accounts they did not create Members of the Administrator group have total control over the computer and everything on it. The user named Administrator is the default account within this group. The domain account of each faculty or staff member with a Windows 2000 computer is part of the Administrator group on his or her computer. == * Create, modify, and access local user accounts * Install new hardware and software * Upgrade the operating system * Back up the system and files * Claim ownership of files that have become damaged * Do anything a Power User can ---- The Power User class can perform any task except for those reserved for Administators. They are allowed to carry out functions that will not directly affect the operating system or risk security. All domain accounts are part of the Power Users group on public Windows 2000 computers. == * Create local user accounts * Modify user accounts which they have created * Change user permissions on users, power users, and guests * Install and run applications that do not affect the operating system * Customize settings and resources on the Control Panel, such as Printers, Date/Time, and Power Options * Do anything a User can == * Access other users' data without permission * Delete or modify user accounts they did not create

What is the active directory clients rely on in dns to locate active directory resources such as domain controllers and global catalog servers?

SRV Resource Records

When a Windows 2000-based domain controller starts up, the Net Logon service uses dynamic updates to register SRV resource records in the DNS database, as described in "A DNS RR for specifying the location of services (DNS SRV)

The SRV record is used to map the name of a service (in this case, the LDAP service) to the DNS computer name of a server that offers that service. In a Windows 2000 network, an LDAP resource record locates a domain controller.

A workstation that is logging on to a Windows 2000 domain queries DNS for SRV records in the general form:

_Service ._ Protocol . DnsDomainName

Active Directory servers offer the LDAP service over the TCP protocol; therefore, clients find an LDAP server by querying DNS for a record of the form:

_ldap._tcp. DnsDomainName

_msdcs Subdomain

There are possible implementations of LDAP servers other than Windows 2000-based domain controllers. There are also possible implementations of LDAP directory services that employ Global Catalog servers but are not servers that are running Windows 2000. To facilitate locating Windows 2000-based domain controllers, in addition to the standard _ Service ._ Protocol . DnsDomainName format, the Net Logon service registers SRV records that identify the well-known server-type pseudonyms "dc" (domain controller), "gc" (Global Catalog), "pdc" (primary domain controller, and "domains" (globally unique identifier, or GUID) as prefixes in the _msdcs subdomain. This Microsoft-specific subdomain allows location of domain controllers that have Windows 2000-specific roles in the domain or forest, as well as the location by GUID when a domain has been renamed. To accommodate locating domain controllers by server type or by GUID (abbreviated "dctype"), Windows 2000-based domain controllers register SRV records in the following form:

_ Service ._ Protocol . DcType ._msdcs. DnsDomainName

The addition of the _msdcs subdomain means that two sets of DNS names can be used to find an LDAP server: DnsDomainName is used to find an LDAP server or Kerberos server that is running TCP (or, in the case of a Kerberos server, either TCP or the User Datagram Protocol [UDP]), and the subdomain _msdcs. DnsDomainName is used to find an LDAP server that is running TCP and also functioning in a particular Windows 2000 role. The name "_msdcs" is reserved for locating domain controllers. The single keyword "_msdcs" was chosen to avoid cluttering the DNS namespace unnecessarily. Other constant, well-known names (pdc, dc, and gc) were kept short to avoid exceeding the maximum length of DnsDomainName.

Why are the modifications necessary to DNS for accommodating Read Only Domain Controllers?

"Because the DNS server that runs on an RODC cannot directly register client updates, it has to refer the client to a DNS server that hosts a primary or Active Directory-integrated copy of the zone file. This server is sometimes referred to as a "writable DNS server." When a client presents a Find Authoritative Query, which is the precursor to an update request, the DNS server on the RODC uses the domain controller Locator to find domain controllers in the closest site.

The RODC then compares the list of domain controllers that is returned with the list of name server (NS) resource records that it has. The RODC returns to the client the NS resource record of a writable DNS server that the client can use to perform the update. The client can then perform its update.

If no domain controller in the closest site matches an entry in the list of NS records for the zone, the RODC attempts to discover any domain controller in the forest that matches an entry in the list.

Suppose that a new client is introduced to a site that has a DNS server running only on an RODC. In this case, the RODC DNS server tries to replicate the DNS record that the client has tried to update on the writable DNS server. This occurs approximately five minutes after the RODC provides a response to the original Find Authoritative Query.

If the DNS client on the RODC attempts a DNS update, a writable domain controller running Windows Server 2008 is returned so that the RODC can perform the update."

thamilselvan@hp.com

AD DS: Read-Only Domain Controllers

A read-only domain controller (RODC) is a new type of domain controller in the Windows Server® 2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read-only partitions of the Active Directory® Domain Services (AD DS) database.

Before the release of Windows Server 2008, if users had to authenticate with a domain controller over a wide area network (WAN), there was no real alternative. In many cases, this was not an efficient solution. Branch offices often cannot provide the adequate physical security that is required for a writable domain controller. Furthermore, branch offices often have poor network bandwidth when they are connected to a hub site. This can increase the amount of time that is required to log on. It can also hamper access to network resources.

Beginning with Windows Server 2008, an organization can deploy an RODC to address these problems. As a result, users in this situation can receive the following benefits:

* Improved security

* Faster logon times

* More efficient access to resources on the network

What does an RODC do?

Inadequate physical security is the most common reason to consider deploying an RODC. An RODC provides a way to deploy a domain controller more securely in locations that require fast and reliable authentication services but cannot ensure physical security for a writable domain controller.

However, your organization may also choose to deploy an RODC for special administrative requirements. For example, a line-of-business (LOB) application may run successfully only if it is installed on a domain controller. Or, the domain controller might be the only server in the branch office, and it may have to host server applications.

In such cases, the LOB application owner must often log on to the domain controller interactively or use Terminal Services to configure and manage the application. This situation creates a security risk that may be unacceptable on a writable domain controller.

An RODC provides a more secure mechanism for deploying a domain controller in this scenario. You can grant a nonadministrative domain user the right to log on to an RODC while minimizing the security risk to the Active Directory forest.

You might also deploy an RODC in other scenarios where local storage of all domain user passwords is a primary threat, for example, in an extranet or application-facing role.

Who will be interested in this feature?

RODC is designed primarily to be deployed in remote or branch office environments. Branch offices typically have the following characteristics:

* Relatively few users

* Poor physical security

* Relatively poor network bandwidth to a hub site

* Little knowledge of information technology (IT)

You should review this section, and the additional supporting documentation about RODC, if you are in any of the following groups:

* IT planners and analysts who are technically evaluating the product

* Enterprise IT planners and designers for organizations

* Those responsible for IT security

* AD DS administrators who deal with small branch offices

Are there any special considerations?

To deploy an RODC, at least one writable domain controller in the domain must be running Windows Server 2008. In addition, the functional level for the domain and forest must be Windows Server 2003 or higher.

For more information about prerequisites for deploying an RODC,

What new functionality does this feature provide?

RODC addresses some of the problems that are commonly found in branch offices. These locations might not have a domain controller. Or, they might have a writable domain controller but not the physical security, network bandwidth, or local expertise to support it. The following RODC functionality mitigates these problems:

* Read-only AD DS database

* Unidirectional replication

* Credential caching

* Administrator role separation

* Read-only Domain Name System (DNS)

Read-only AD DS database

Except for account passwords, an RODC holds all the Active Directory objects and attributes that a writable domain controller holds. However, changes cannot be made to the database that is stored on the RODC. Changes must be made on a writable domain controller and then replicated back to the RODC.

Local applications that request Read access to the directory can obtain access. Lightweight Directory Application Protocol (LDAP) applications that request Write access receive an LDAP referral response. This response directs them to a writable domain controller, normally in a hub site.

RODC filtered attribute set

Some applications that use AD DS as a data store might have credential-like data (such as passwords, credentials, or encryption keys) that you do not want to be stored on an RODC in case the RODC is compromised.

For these types of applications, you can dynamically configure a set of attributes in the schema for domain objects that will not replicate to an RODC. This set of attributes is called the RODC filtered attribute set. Attributes that are defined in the RODC filtered attribute set are not allowed to replicate to any RODCs in the forest.

A malicious user who compromises an RODC can attempt to configure it in such a way that it tries to replicate attributes that are defined in the RODC filtered attribute set. If the RODC tries to replicate those attributes from a domain controller that is running Windows Server 2008, the replication request is denied. However, if the RODC tries to replicate those attributes from a domain controller that is running Windows Server 2003, the replication request can succeed.

Therefore, as a security precaution, ensure that forest functional level is Windows Server 2008 if you plan to configure the RODC filtered attribute set. When the forest functional level is Windows Server 2008, an RODC that is compromised cannot be exploited in this manner because domain controllers that are running Windows Server 2003 are not allowed in the forest.

You cannot add system-critical attributes to the RODC filtered attribute set. An attribute is system-critical if it is required for AD DS; Local Security Authority (LSA); Security Accounts Manager (SAM; and Microsoft-specific Security Service Provider Interfaces (SSPIs), such as Kerberos; to function properly. A system-critical attribute has a schemaFlagsEx attribute value equal to 1 (schemaFlagsEx attribute value & 0x1 = TRUE).

The RODC filtered attribute set is configured on the server that holds the schema operations master role. If you try to add a system-critical attribute to the RODC filtered set while the schema master is running Windows Server 2008, the server returns an "unwillingToPerform" LDAP error. If you try to add a system-critical attribute to the RODC filtered attribute set on a Windows Server 2003 schema master, the operation appears to succeed but the attribute is not actually added. Therefore, it is recommended that the schema master be a Windows Server 2008 domain controller when you add attributes to RODC filtered attribute set. This ensures that system-critical attributes are not included in the RODC filtered attribute set.

Unidirectional replication

Because no changes are written directly to the RODC, no changes originate at the RODC. Accordingly, writable domain controllers that are replication partners do not have to pull changes from the RODC. This means that any changes or corruption that a malicious user might make at branch locations cannot replicate from the RODC to the rest of the forest. This also reduces the workload of bridgehead servers in the hub and the effort required to monitor replication.

RODC unidirectional replication applies to both AD DS and Distributed File System (DFS) Replication of SYSVOL. The RODC performs normal inbound replication for AD DS and SYSVOL changes.

noteNote

Any other shares on an RODC that you configure to replicate using DFS Replication would be bidirectional.

RODCs also perform automatic load balancing of inbound replication connection objects across a set of bridgehead servers in a hub site.

Credential caching

Credential caching is the storage of user or computer credentials. Credentials consist of a small set of approximately 10 passwords that are associated with security principals. By default, an RODC does not store user or computer credentials. The exceptions are the computer account of the RODC and a special krbtgt account that each RODC has. You must explicitly allow any other credential caching on an RODC.

The RODC is advertised as the Key Distribution Center (KDC) for the branch office. The RODC uses a different krbtgt account and password than the KDC on a writable domain controller uses when it signs or encrypts ticket-granting ticket (TGT) requests.

After an account is successfully authenticated, the RODC attempts to contact a writable domain controller at the hub site and requests a copy of the appropriate credentials. The writable domain controller recognizes that the request is coming from an RODC and consults the Password Replication Policy in effect for that RODC.

The Password Replication Policy determines if a user's credentials or a computer's credentials can be replicated from the writable domain controller to the RODC. If the Password Replication Policy allows it, the writable domain controller replicates the credentials to the RODC, and the RODC caches them.

After the credentials are cached on the RODC, the RODC can directly service that user's logon requests until the credentials change. (When a TGT is signed with the krbtgt account of the RODC, the RODC recognizes that it has a cached copy of the credentials. If another domain controller signs the TGT, the RODC forwards requests to a writable domain controller.)

By limiting credential caching only to users who have authenticated to the RODC, the potential exposure of credentials by a compromise of the RODC is also limited. Typically, only a small subset of domain users has credentials cached on any given RODC. Therefore, in the event that the RODC is stolen, only those credentials that are cached can potentially be cracked.

Leaving credential caching disabled might further limit exposure, but it results in all authentication requests being forwarded to a writable domain controller. An administrator can modify the default Password Replication Policy to allow users' credentials to be cached at the RODC.

Administrator role separation

You can delegate local administrative permissions for an RODC to any domain user without granting that user any user rights for the domain or other domain controllers. This permits a local branch user to log on to an RODC and perform maintenance work on the server, such as upgrading a driver. However, the branch user cannot log on to any other domain controller or perform any other administrative task in the domain. In this way, the branch user can be delegated the ability to effectively manage the RODC in the branch office without compromising the security of the rest of the domain.

Read-only DNS

You can install the DNS Server service on an RODC. An RODC is able to replicate all application directory partitions that DNS uses, including ForestDNSZones and DomainDNSZones. If the DNS server is installed on an RODC, clients can query it for name resolution as they query any other DNS server.

However, the DNS server on an RODC is read-only and therefore does not support client updates directly. For more information about how DNS client updates are processed by a DNS server on an RODC,

What settings have been added or changed?

To support the RODC Password Replication Policy, Windows Server 2008 AD DS includes new attributes. The Password Replication Policy is the mechanism for determining whether a user's credentials or a computer's credentials are allowed to replicate from a writable domain controller to an RODC. The Password Replication Policy is always set on a writable domain controller running Windows Server 2008.

AD DS attributes that are added in the Windows Server 2008 Active Directory schema to support RODCs include the following:

* msDS-Reveal-OnDemandGroup

* msDS-NeverRevealGroup

* msDS-RevealedList

* msDS-AuthenticatedToAccountList

For more information about these attributes, see the RODC Planning and Deployment Guide (http://go.microsoft.com/fwlink/?LinkID=135993).

How should I prepare to deploy this feature?

The prerequisites for deploying an RODC are as follows:

* The RODC must forward authentication requests to a writable domain controller running Windows Server 2008. The Password Replication Policy is set on this domain controller to determine if credentials are replicated to the branch location for a forwarded request from the RODC.

* The domain functional level must be Windows Server 2003 or higher so that Kerberos constrained delegation is available. Constrained delegation is used for security calls that must be impersonated under the context of the caller.

* The forest functional level must be Windows Server 2003 or higher so that linked-value replication is available. This provides a higher level of replication consistency.

* You must run adprep /rodcprep once in the forest to update the permissions on all the DNS application directory partitions in the forest. This way, all RODCs that are also DNS servers can replicate the permissions successfully.
AD DS: Read-Only Domain Controllers

A read-only domain controller (RODC) is a new type of domain controller in the Windows Server® 2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read-only partitions of the Active Directory® Domain Services (AD DS) database.

Before the release of Windows Server 2008, if users had to authenticate with a domain controller over a wide area network (WAN), there was no real alternative. In many cases, this was not an efficient solution. Branch offices often cannot provide the adequate physical security that is required for a writable domain controller. Furthermore, branch offices often have poor network bandwidth when they are connected to a hub site. This can increase the amount of time that is required to log on. It can also hamper access to network resources.

Beginning with Windows Server 2008, an organization can deploy an RODC to address these problems. As a result, users in this situation can receive the following benefits:

* Improved security

* Faster logon times

* More efficient access to resources on the network

What does an RODC do?

Inadequate physical security is the most common reason to consider deploying an RODC. An RODC provides a way to deploy a domain controller more securely in locations that require fast and reliable authentication services but cannot ensure physical security for a writable domain controller.

However, your organization may also choose to deploy an RODC for special administrative requirements. For example, a line-of-business (LOB) application may run successfully only if it is installed on a domain controller. Or, the domain controller might be the only server in the branch office, and it may have to host server applications.

In such cases, the LOB application owner must often log on to the domain controller interactively or use Terminal Services to configure and manage the application. This situation creates a security risk that may be unacceptable on a writable domain controller.

An RODC provides a more secure mechanism for deploying a domain controller in this scenario. You can grant a nonadministrative domain user the right to log on to an RODC while minimizing the security risk to the Active Directory forest.

You might also deploy an RODC in other scenarios where local storage of all domain user passwords is a primary threat, for example, in an extranet or application-facing role.

Who will be interested in this feature?

RODC is designed primarily to be deployed in remote or branch office environments. Branch offices typically have the following characteristics:

* Relatively few users

* Poor physical security

* Relatively poor network bandwidth to a hub site

* Little knowledge of information technology (IT)

You should review this section, and the additional supporting documentation about RODC, if you are in any of the following groups:

* IT planners and analysts who are technically evaluating the product

* Enterprise IT planners and designers for organizations

* Those responsible for IT security

* AD DS administrators who deal with small branch offices

Are there any special considerations?

To deploy an RODC, at least one writable domain controller in the domain must be running Windows Server 2008. In addition, the functional level for the domain and forest must be Windows Server 2003 or higher.

For more information about prerequisites for deploying an RODC,

What new functionality does this feature provide?

RODC addresses some of the problems that are commonly found in branch offices. These locations might not have a domain controller. Or, they might have a writable domain controller but not the physical security, network bandwidth, or local expertise to support it. The following RODC functionality mitigates these problems:

* Read-only AD DS database

* Unidirectional replication

* Credential caching

* Administrator role separation

* Read-only Domain Name System (DNS)

Read-only AD DS database

Except for account passwords, an RODC holds all the Active Directory objects and attributes that a writable domain controller holds. However, changes cannot be made to the database that is stored on the RODC. Changes must be made on a writable domain controller and then replicated back to the RODC.

Local applications that request Read access to the directory can obtain access. Lightweight Directory Application Protocol (LDAP) applications that request Write access receive an LDAP referral response. This response directs them to a writable domain controller, normally in a hub site.

RODC filtered attribute set

Some applications that use AD DS as a data store might have credential-like data (such as passwords, credentials, or encryption keys) that you do not want to be stored on an RODC in case the RODC is compromised.

For these types of applications, you can dynamically configure a set of attributes in the schema for domain objects that will not replicate to an RODC. This set of attributes is called the RODC filtered attribute set. Attributes that are defined in the RODC filtered attribute set are not allowed to replicate to any RODCs in the forest.

A malicious user who compromises an RODC can attempt to configure it in such a way that it tries to replicate attributes that are defined in the RODC filtered attribute set. If the RODC tries to replicate those attributes from a domain controller that is running Windows Server 2008, the replication request is denied. However, if the RODC tries to replicate those attributes from a domain controller that is running Windows Server 2003, the replication request can succeed.

Therefore, as a security precaution, ensure that forest functional level is Windows Server 2008 if you plan to configure the RODC filtered attribute set. When the forest functional level is Windows Server 2008, an RODC that is compromised cannot be exploited in this manner because domain controllers that are running Windows Server 2003 are not allowed in the forest.

You cannot add system-critical attributes to the RODC filtered attribute set. An attribute is system-critical if it is required for AD DS; Local Security Authority (LSA); Security Accounts Manager (SAM; and Microsoft-specific Security Service Provider Interfaces (SSPIs), such as Kerberos; to function properly. A system-critical attribute has a schemaFlagsEx attribute value equal to 1 (schemaFlagsEx attribute value & 0x1 = TRUE).

The RODC filtered attribute set is configured on the server that holds the schema operations master role. If you try to add a system-critical attribute to the RODC filtered set while the schema master is running Windows Server 2008, the server returns an "unwillingToPerform" LDAP error. If you try to add a system-critical attribute to the RODC filtered attribute set on a Windows Server 2003 schema master, the operation appears to succeed but the attribute is not actually added. Therefore, it is recommended that the schema master be a Windows Server 2008 domain controller when you add attributes to RODC filtered attribute set. This ensures that system-critical attributes are not included in the RODC filtered attribute set.

Unidirectional replication

Because no changes are written directly to the RODC, no changes originate at the RODC. Accordingly, writable domain controllers that are replication partners do not have to pull changes from the RODC. This means that any changes or corruption that a malicious user might make at branch locations cannot replicate from the RODC to the rest of the forest. This also reduces the workload of bridgehead servers in the hub and the effort required to monitor replication.

RODC unidirectional replication applies to both AD DS and Distributed File System (DFS) Replication of SYSVOL. The RODC performs normal inbound replication for AD DS and SYSVOL changes.

noteNote

Any other shares on an RODC that you configure to replicate using DFS Replication would be bidirectional.

RODCs also perform automatic load balancing of inbound replication connection objects across a set of bridgehead servers in a hub site.

Credential caching

Credential caching is the storage of user or computer credentials. Credentials consist of a small set of approximately 10 passwords that are associated with security principals. By default, an RODC does not store user or computer credentials. The exceptions are the computer account of the RODC and a special krbtgt account that each RODC has. You must explicitly allow any other credential caching on an RODC.

The RODC is advertised as the Key Distribution Center (KDC) for the branch office. The RODC uses a different krbtgt account and password than the KDC on a writable domain controller uses when it signs or encrypts ticket-granting ticket (TGT) requests.

After an account is successfully authenticated, the RODC attempts to contact a writable domain controller at the hub site and requests a copy of the appropriate credentials. The writable domain controller recognizes that the request is coming from an RODC and consults the Password Replication Policy in effect for that RODC.

The Password Replication Policy determines if a user's credentials or a computer's credentials can be replicated from the writable domain controller to the RODC. If the Password Replication Policy allows it, the writable domain controller replicates the credentials to the RODC, and the RODC caches them.

After the credentials are cached on the RODC, the RODC can directly service that user's logon requests until the credentials change. (When a TGT is signed with the krbtgt account of the RODC, the RODC recognizes that it has a cached copy of the credentials. If another domain controller signs the TGT, the RODC forwards requests to a writable domain controller.)

By limiting credential caching only to users who have authenticated to the RODC, the potential exposure of credentials by a compromise of the RODC is also limited. Typically, only a small subset of domain users has credentials cached on any given RODC. Therefore, in the event that the RODC is stolen, only those credentials that are cached can potentially be cracked.

Leaving credential caching disabled might further limit exposure, but it results in all authentication requests being forwarded to a writable domain controller. An administrator can modify the default Password Replication Policy to allow users' credentials to be cached at the RODC.

Administrator role separation

You can delegate local administrative permissions for an RODC to any domain user without granting that user any user rights for the domain or other domain controllers. This permits a local branch user to log on to an RODC and perform maintenance work on the server, such as upgrading a driver. However, the branch user cannot log on to any other domain controller or perform any other administrative task in the domain. In this way, the branch user can be delegated the ability to effectively manage the RODC in the branch office without compromising the security of the rest of the domain.

Read-only DNS

You can install the DNS Server service on an RODC. An RODC is able to replicate all application directory partitions that DNS uses, including ForestDNSZones and DomainDNSZones. If the DNS server is installed on an RODC, clients can query it for name resolution as they query any other DNS server.

However, the DNS server on an RODC is read-only and therefore does not support client updates directly. For more information about how DNS client updates are processed by a DNS server on an RODC,

What settings have been added or changed?

To support the RODC Password Replication Policy, Windows Server 2008 AD DS includes new attributes. The Password Replication Policy is the mechanism for determining whether a user's credentials or a computer's credentials are allowed to replicate from a writable domain controller to an RODC. The Password Replication Policy is always set on a writable domain controller running Windows Server 2008.

AD DS attributes that are added in the Windows Server 2008 Active Directory schema to support RODCs include the following:

* msDS-Reveal-OnDemandGroup

* msDS-NeverRevealGroup

* msDS-RevealedList

* msDS-AuthenticatedToAccountList

For more information about these attributes, see the RODC Planning and Deployment Guide (http://go.microsoft.com/fwlink/?LinkID=135993).

How should I prepare to deploy this feature?

The prerequisites for deploying an RODC are as follows:

* The RODC must forward authentication requests to a writable domain controller running Windows Server 2008. The Password Replication Policy is set on this domain controller to determine if credentials are replicated to the branch location for a forwarded request from the RODC.

* The domain functional level must be Windows Server 2003 or higher so that Kerberos constrained delegation is available. Constrained delegation is used for security calls that must be impersonated under the context of the caller.

* The forest functional level must be Windows Server 2003 or higher so that linked-value replication is available. This provides a higher level of replication consistency.

* You must run adprep /rodcprep once in the forest to update the permissions on all the DNS application directory partitions in the forest. This way, all RODCs that are also DNS servers can replicate the permissions successfully.

Because the DNS server that runs on an RODC cannot directly register client updates, it has to refer the client to a DNS server that hosts a primary or Active Directory-integrated copy of the zone file. This server is sometimes referred to as a "writable DNS server." When a client presents a Find Authoritative Query, which is the precursor to an update request, the DNS server on the RODC uses the domain controller Locator to find domain controllers in the closest site.

The RODC then compares the list of domain controllers that is returned with the list of name server (NS) resource records that it has. The RODC returns to the client the NS resource record of a writable DNS server that the client can use to perform the update. The client can then perform its update.

If no domain controller in the closest site matches an entry in the list of NS records for the zone, the RODC attempts to discover any domain controller in the forest that matches an entry in the list.

Suppose that a new client is introduced to a site that has a DNS server running only on an RODC. In this case, the RODC DNS server tries to replicate the DNS record that the client has tried to update on the writable DNS server. This occurs approximately five minutes after the RODC provides a response to the original Find Authoritative Query.

If the DNS client on the RODC attempts a DNS update, a writable domain controller running Windows Server 2008 is returned so that the RODC can perform the update."

What is the main purpose of active directory?

An active directory is a directory structure used on Microsoft Windows based computers and servers to store information and data about networks and domains. It is primarily used for online information and was originally created in 1996 and first used with Windows 2000.

An active directory (sometimes referred to as an AD) does a variety of functions including the ability to provide information on objects, helps organize these objects for easy retrieval and access, allows access by end users and administrators and allows the administrator to set security up for the directory.

An active directory can be defined as a hierarchical structure and this structure is usually broken up into three main categories, the resources that might include hardware such as printers, services for end users such as web email servers and objects, which are the main functions of the domain and network.

It is interesting to note the framework for the objects. Remember that an object can be a piece of hardware such as a printer, end user or security settings set by the administrator. These objects can hold other objects within their file structure. All objects have an ID, usually an object name (folder name). In addition to these objects being able to hold other objects, every object has its own attributes, which allows it to be characterized by the information, which it contains. Most IT professionals call these setting or characterizations schemas.

Depending on the type of schema created for a folder, will ultimately determine how these objects are used. For instance, some objects with certain schemas can not be deleted, they can only be deactivated. Others types of schemas with certain attributes can be deleted entirely. For instance, a user object can be deleted, but the administrator object can not be deleted.

When understanding active directories, it is important to know the framework that objects can be viewed at. In fact, an active directory can be viewed at either one of three levels, these levels are called forests, trees or domains. The highest structure is called the forest because you can see all objects included within the active directory.

Within the Forest structure are trees, these structures usually hold one or more domains, going further down the structure of an active directory are single domains. To put the forest, trees and domains into perspective, consider the following example.

A large organization has many dozens of users and processes. The forest might be the entire network of end users and specific computers at a set location. Within this forest directory are now trees that hold information on specific objects such as domain controllers, program data, system, etc. Within these objects are even more objects which can then be controlled and categorized

What must at least one DNS server support when running Active Directory on your network?

,

basically it must support dynamic updates and SRV records. So it's possible to run the DNS server also on non-Microsoft implementations of DNS like BIND.

But when you use Microsoft DNS (built in Windows Server operating systems), you don't need to care whether it supports Active Directory - it simply does.

What object of active directory identifies its location within the directory structure?

Distinguished Name{DN)

A DN is a sequence of relative distinguished names (RDN) connected by commas.

An RDN is an attribute with an associated value in the form attribute=value; normally expressed in a UTF-8 string format

DC domainComponent

CN commonName

OU organizationalUnitName

O organizationName

STREET streetAddress

L localityName

ST stateOrProvinceName

C countryName

UID userid

examples of distinguished names.
Distinguished Name{DN)

A DN is a sequence of relative distinguished names (RDN) connected by commas.

An RDN is an attribute with an associated value in the form attribute=value; normally expressed in a UTF-8 string format

DC domainComponent

CN commonName

OU organizationalUnitName

O organizationName

STREET streetAddress

L localityName

ST stateOrProvinceName

C countryName

UID userid

examples of distinguished names.
Distinguished Name{DN)

A DN is a sequence of relative distinguished names (RDN) connected by commas.

An RDN is an attribute with an associated value in the form attribute=value; normally expressed in a UTF-8 string format

DC domainComponent

CN commonName

OU organizationalUnitName

O organizationName

STREET streetAddress

L localityName

ST stateOrProvinceName

C countryName

UID userid

examples of distinguished names.

What is the function of the active directory federation services?

Active Directory Federation Services(AD FS for short) is a software component developed by Microsoft that can be installed on Windows Server operating systems to provide users withSingle Sign-Onaccess to systems and applications located across organizational boundaries. It uses a claims-based access control authorization model to maintain application security and implementfederated identity.

Claims based authentication is the process of authenticating a user based on a set of claims about its identity contained in a trusted token. Such a token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims based authentication.

Why does s shield icon appear next to the change date and time button?

The shield icon indicates that User Access Control is enabled for that button, requiring administrative access to change. This process is user also called 'process elevation', in reference to the need to 'elevate' user authority in order to complete the process.

Does windows 2008 web server support ASP.NET?

yes it does..

Windows Web Server 2008 R2 Edition was designed to be used as a single purpose internet facing web server that delivers rock solid foundation of infrastructure capabilities. It is integrated with the newly re-architected IIS 7.0, ASP.NET, and the Microsoft .NET Framework. Windows Web Server 2008 R2 enables your organization to rapidly deploy webpages, websites, web applications, and web services.

Web and Applications PlatformWindows Web Server 2008 R2 provides your organization with the ability to deliver rich web-based experiences efficiently and effectively, with improved administration and diagnostics, advanced development and application tools, and lower infrastructure costs. Enhancements
  • Greater technical capacity than the previous versions of Windows Server, and no limitation of Microsoft SQL Server installation.
  • Highly effective platform for ASP.NET based Internet web deployments, because it includes the newly re-architected Internet Information Services (IIS) 7.0, Microsoft ASP.NET, and the Microsoft .NET Framework.
  • Dedicated web-serving functionality and server roles that support four x64 sockets and 32 gigabytes (GB) of RAM.
  • Economical next-generation web server that is competitively priced for enterprise or hosting organizations needing to rapidly deploy webpages, websites, web applications, and web services.
BenefitsWindows Web Server 2008 R2 optimized specifically for Internet-facing web-serving environments and built on industry standards allowing organizations to easily build new, or integrate into existing, server infrastructure environments. Web developers can build webpages and services that can communicate with other platforms using standards-based interfaces like XML and SOAP. This level of cost-effective application development encourages business productivity and flexibility, and increases business solution opportunities. Manage with Ease

More efficient administration tools, including delegated administration and shared configuration.

Powerful Hosting of Applications and Services

Expanded application hosting for .NET, ASP, PHP web applications, and XML services; web server extensibility throughout.

Lower Infrastructure Costs

Improved scalability and enhanced security and reliability with automatic application sandboxing.

What are the security administrative issues addressed by a read only domain controller?

Each RODC will have an analagous group that will prevent users passwords from being stored only on a single DC. Members of the purpose group are not eligible to have their passwords stored on any RODC in the domain

Is Windows server 2008 better than Windows server 2003?

There are several differences between 2003 and 2008 servers. They look different and their tools are different.

For example Windows 2008 native IP-stack is ver6, which differs from Windows 2003.

Management tools are different in Win 2008; some are better.

Installation is easier, adding new roles to server is much easier. Many support both systems in their work and believe Windows 2008 is quite good and is an improvement to Windows 2003.

Windows 2008 needs more power from the system than Windows 2003, but most problems are caused by mixing different server platforms on DC. You can mix Windows 2000, 2003 and 2008 member servers, but not DCs. There is one exception: Don't consider SBS2008. You can't upgrade it to standard, SBS is for little environment. If you have to buy new CALs, they are much expensive than standards CALs. SBS2008 is also only 64bit and you have to load in compatibility mode in normal systems.

I would consider not to install 2k8 if you are supporting a network with NT legacy as 2k8 is not reverse compatible to NT.

Every Active Directory domain should have a minimum of domain controllers?

Its is recommended just because in case of one fails other server can take over the roles and the network does not crash down.

Trending Questions
Which naming context contains forest-wide data about the physical topology of an active directory? What is the term for configuring this setting will prevent a GPO's settings from being overwritten by another GPO that is applied later in the inheritance process? What is the Active Directory component that contains a reference to all objects within Active Directory called? What is the default tombstone lifetime of deleted objects in a Windows Server 2003 SP Active Directory domain? What is the authentication protocol used in 2008? What would you use to prevent GPOs linked to parent containers from affecting child containers? What does the sysvol folder stores in an active directory? What are some reliable Windows server backup solutions? What can CSA accomplish by using active directory? What command line utility do you use to manage product activation and licensing in Windows Server 2008? How many active directory schemas can you have in a single Microsoft Windows server 2003 forest? When running server core the date and time application and the regional and language options are disabled? What is windows deployment system? What is the length of time that a DNS service on windows 2008 will wait before failing a recursive lookup that has been retried? Which account type is configured on an active directory doman controller and can be used to grant access to resources on any domain joined computer? What is the practice of adding one group as a member of another group? What active directory domain services are not installed on a Windows server 2008 computer until you install AD DS role to the computer? What authentication protocol is used in Windows Server 2008? Which event logs contain events generated by the window server 2008 auditing policies? What is new GUI option in windows server 2008 and windows vista that allows you to launch a specific application using elevated privileges?