Documente Academic
Documente Profesional
Documente Cultură
2. RODC one new domain controller introduced in it. (Read Only Domain Controller).
3. WDS (Windows Deployment Service) instead of RIS in 2003 server.
4. Shadow copy for each and every folders.
5. Boot sequence is changed.
6. Installation is 32 bit where as 2003 it is 16 and 32, thats why installation of 2008 is
faster.
7. Services are known as role in it.
8. Group policy editor is a separate option in ads.
9. The main difference between 2003 and 2008 is Virtualization and Management.
10. 2008 has more inbuilt components and updated third party drivers Microsoft introduced
new feature Hyper-V, Windows 2008 introduces Hyper-V, but only on 64bit versions.
11. In windows Server 2008 version, Microsoft introducing new features and technologies,
some of which were not available in windows server 2003 with service pack 1 (SP1),
that will help to reduce the power consumption of server and client operating systems,
minimize environmental byproducts, and increase server efficiency.
12. Microsoft windows server 2008 has been designed with energy efficiency in mind, to
provide customers with ready and convenient access to a number of new power saving
features.
13. Many features are updated - - - as security, IIS and RODC. IN security it is enable
outbound firewall as well as inbound, IIS 7 release, Read Only Domain Controllers.
14. Virtualization.
15. Server Core provides the minimum installation required to carry out a specific role, such
as for a DHCP, DNS, or Print server.
16. Better Security.
17. Enhanced terminal services.
18. Network Access Protection.
19. Power Shell.
20. Bitlocker.
Windows Server 2008 Standard Edition (Microsoft Windows NT 6.0.6002 Service Pack 2)
Windows Server 2008 Enterprise Edition (Microsoft Windows NT 6.0.6001 Service Pack
1)
Windows Small Business Server 2008 (codenamed "Cougar") for small businesses
Standard Edition for smaller server applications that don't require clustering (up to 4
processors)
Enterprise Edition for larger server applications, and clustering (up to 8 processors)
Monitor the server heath using support tools (DC diag, Net diag).
DC diag --This command-line tool analyzes the state of domain controllers in a forest or
enterprise and reports any problems to assist in troubleshooting. As an end-user reporting
program, Dcdiag encapsulates detailed knowledge of how to identify abnormal behavior in
the system. Dcdiag displays command output at the command line.
Dcdiag consists of a framework for executing tests and a series of tests to verify different
functional areas of the system. This framework selects which domain controllers are tested
according to scope directives from the user, such as enterprise, site, or single server.
Net diag: This command-line diagnostic tool helps to isolate networking and connectivity
problems by performing a series of tests to determine the state of your network client.
These tests and the key network status information they expose give network administrators
and suppor
t personnel a more direct means of identifying and isolating network problems. Moreover,
because this tool does not require parameters or switches to be specified, support personnel
and network administrators can focus on analyzing the output rather than on training users
how to use the tool.
Group Policies (Diff Between Group Policies in 2003 & 2008) ADM
template in 2003 & ADMX Templete in 2008
Group Policy is a feature of the Microsoft Windows NT family of operating systems that control the working
environment of user accounts and computer accounts. Group Policy provides the centralized management and
configuration of operating systems, applications, and users' settings in an Active Directory environment.
http://dani3lr.wordpress.com/2009/06/22/restore-deleted-objects-in-active-directory-databaseusing-tombstone-reanimation-ldp-exe/
What is SYSVOL?
The sysVOL folder stores the server's copy of the domain's public files. The
contents such as group policy, users etc of the sysvol folder are replicated to
all domain controllers in the domain. The sysvol folder must be located on an
NTFS volume.
(Or)
All active directory data base security related information store in SYSVOL
folder and its only created on NTFS partition.
What is GPO?
How GP will apply (GP Hierarchy)?
LSDO (local Site Domain OU Level)
What is Robo Copy ?
Ans: ROBO Copy
Drive to Drive
robocopy D:\ E:\ /e /sec /r:1 /w:1 /log:c:\temp\ExchDatabase.log /eta
robocopy L:\ M:\ /e /sec /r:1 /w:1 /log:c:\temp\Exchlog.log /eta
What is DNS?
What is DHCP?
How to Configure DHCP?
Windows:
Server Unexpected reboot
Trouble shooting steps for Server Unexpected reboot
Dump File Configuration
Analyzing Dump Error
Steps to Build new server and yet to implement ADC in this server
What is RAID?
It is a technique that combines multiple disk drives in to a logical unit set and
provides protection, performance, or both.
RAID Configuration RAID 0, RAID1 & RAID 5?
RAID 0: RAID 0 users data striping techniques, where data is striped across all the
disks with in a RAID set. Therefore it utilizes the full storage capacity of RAID
Set. To read data all the stripes are put back together by the controller. When the
number of drives in the RAID set increases, performance improves because more
data can be read or write simultaneously. RAID 0 is a good option for applications
that need high I/O throughput. However, these applications require high
availability during drive failures, RAID 0 does not provide protection and
availability.
RAID 1: RAID 1 is based on the mirroring technique. In this RAID configuration,
data is mirrored to provide fault tolerance. A RAID 1 set consists of two disk
drives and every write is written to both disks. The mirroring is transparent to the
host. During disk failure, the impact on data recovery in RAID 1 is the last among
all RAID implementations. This is because the RAID controller uses the mirror
drive for data recovery. RAID1 is suitable for applications that require high
availability and is no constraint.
RAID 5: RAID 5 is a versatile RAID implementation. It is similar to RAID 4
because it uses striping. The drives are also independently accessible. The
difference between RAID 4 and RAID 5 is parity location. In RAID 4 Parity is
written to a dedicated drive, create a write bottleneck for the parity disk. In RAID 5
parity is distributed across all disks to overcome the write bottleneck of a dedicated
parity disk.
What is ILO?
Definition - What does Integrated Lights-Out (iLO) mean?
Integrated Lights-Out (iLO) is a remote server management processor, embedded on the system
boards of HP ProLiant and Blade servers, that allows controlling and monitoring of HP servers from
a remote location. HP iLO management is a powerful tool that provides multiple ways to configure,
update, monitor, and run servers remotely.
The embedded iLO management card has its own network connection and IP address to which
server administrators can connect via Domain Name System (DNS)/Dynamic Host Configuration
Protocol (DHCP) or through a separate dedicated management network. iLO provides a remote
Web-based console, which can be used to administer the server remotely. The iLO port is an
Ethernet port, which can be enabled through the ROM-Based Setup Utility (RBSU).
Techopedia explains Integrated Lights-Out (iLO)
iLO comes preconfigured with proLiant servers of the 300 series and above. A default iLO user
account and password is included. iLO can be configured through several ways including:
Browser-based configuration.
iLO RBSU accessed using the F8 key during power-on self-test (POST).
The iLO management tool allows a user to perform the following actions on the server remotely:
Monitor the server, regardless of the state of the servers operating system.
Apply patches, firmware updates, and critical virus updates through virtual media and virtual
folders.
Access system event logs and the HP Integrated Management Log.
HP 100 series servers include the Lights-Out 100 Remote Management Option with limited features.
`HP iLO has now been replaced by Integrated Lights-Out Advanced (known as iLO2 and iLO3). The
latest releases of HP Integrated Lights-Out 2 (iLO2) and Lights-Out 3 (iLO3) have simplified the
server setup process and enabled remote power and thermal optimization. As of Aug 2011, the
current firmware versions of iLO 2 and iLO 3 are 2.07 and 1.26, respectively.
What are the different Group Scopes and different group types?
Group scopes are 3 types they are Domain local group scope, Global group
scope, and Universal group scope
Group types are two types they are security group, distribution group.
Domain Local Group scope: Use this group to grant permissions to domain
resources that are located in the same domain in which the domain local
group was created. Domain local groups can exist in all mixed, native and
interim functional level of domains and forests.
Global Group scope: Users with similar functions can be grouped under
global scope and can be given permission to access a resource available in
local or another domain in the same forest. Simply global groups can be use
to grant permissions to gain access to resources that are located in any
domain but in a single forest as their memberships are limited.
Universal group Scope: These groups are precisely used for email distribution
and can be granted access to resources in all trusted domain as these groups
can only be used as a security principal in a windows 2000 native or windows
server 2003 domain functional level domain. Universal group memberships
are not limited like global groups. All domain user accounts and groups can
be a member of universal group.
Distributed Groups: Distributed Groups are used for sending e-mail messages
to groups of users. Permissions cannot grant to security groups.
Windows Server 2003, and all domains in the forest must be at the
Windows 2003 Domain functional level before you can raise your forest
functional level to Windows Server 2003.
Windows Server 2008 supports three forest functional levels:
Windows 2000 Native -- Supports Windows 2000, Windows Server
are running Windows Server 2008 and all domains have been raised to the
Windows Server 2008 domain functional level.
Note:
To install Exchange Server 2010, the Active Directory forest functional level
MUST be Windows Server 2003 or higher.
Windows 2000 Native and Windows Server 2003 Interim modes are NOT
supported.
Domain Functional Levels
Windows Server 2003 supports four domain functional levels:
What is V-Motion?
VMware VMotion enables the live migration of running virtual machines from one
physical server to another with zero downtime, continuous service availability, and
complete transaction integrity. It is transparent to users.
File Name
Description
on
.log
<vmname>.log
or
vmware.log
.nvram
<vmname>.nvram
or
nvram
vmdk
<vmname>.vmdk
<diskname>-<###>.vmdk
<uuid>.vmem
<snapshot_name_and_n
umber>
.vmsd
<vmname>.vmsd
.vmsn
<vmname>-Snapshot.vmsn
<vmname>Snapshot<###>.vmsn
<vmname>.vmss
.vmem
.vmss
<vmname>.vmtm
.vmx
<vmname>.vmx
.vmxf
<vmname>.vmxf
This is a supplemental
configuration file for virtual
machines that are in a team. Note
that the .vmxf file remains if a
virtual machine is removed from
the team.
Best Answer: A utility program in Windows that looks for lost clusters on the hard disk. It also reports the
command line utility in Windows. Running Chkdsk with the /f parameter (chkdsk /f) reclaims the lost
clusters and turns them into .CHK files, which can generally be discarded. Running without the /f reports
the current condition of the disk without "f"ixing anything.
The dreaded blue screen of death is often a transitory event and is fixed by rebooting.
Sometimes though it can be more serious and can prevent the system rebooting. It is
not common for this error to cause data loss, but fixing the problem can sometimes
involve having to repair or reload the operating system. To prevent any loss of data,
this is the correct stage to ensure you have a valid backup of your data. The following
steps can be carried out. As it is normally only the system drive causing the problem
then this is the only one we will concentrate on. CnW Recovery software (download
here) will enable data to be recovered before the system is repaired, even from a very
damaged or corrupted disk.
Stage 1
Remove the system drive and set it up as a slave drive on a different PC. It is
often easiest to use a USB caddy to do this. If you are lucky the drive will
display as a logical drive, and all data files can be copied off and stored in a
safe location. If the drive does not display as a logical drive, or the operating
system suggests that it should be reformatted, the proceed with stage 2
Stage 2
As above, set the drive up as a slave drive, eg in a USB caddy, and load CnW
Recovery on to the host PC. Ensure that the host PC has adequate space for the
data to be recovered. Start CnW Recover and on the first screen select the
failed drive and then press the icon of the drive which will start initial analysis
of the drive. A Blue screen is not normally caused by major hardware failure so
one would expect the first physical test to work. The second test does some
basic verification of key sectors on the drive. If these pass, then it is worth
proceeding with the wizard to do a full recovery. However, if the disk is full
and only certain files are required, at this point it may be better to go to the
main program and do a manual recovery allowing for file selection. The file
filter can be used to select or skip certain files.
When recovering a system disk there will be a mix of application files and data
files. Although both types of files can be recovered it is often impossible to just
copy the applications back and expect them to work. This is due to registry
settings being required. Put simply, it is easiest to re-install applications, and
add back user data. The other reason not to recover application and systems
files is that one may be corrupted and could be reason for the blue screen of
death.
Stage 3
Once all user data has been recovered and stored safely it is time to try and take
care of the blue screen problem. Depending on operating system it may be
possible to reboot in SafeMode or use the Microsoft Recovery console. Further
options including doing a repair reload - retaining all data and settings. If this
fails, then a full reload will be necessary which will remove all logical paths to
existing data. At this point it is essential to know that all data is safely stored
elsewhere. NB, if this stage is done without recovering the data first, typically
CnW Recovery can still recover the user files
It provides no security if the user logs in locally. The file and folder level
security permission does not exist.
It is not very reliable since it does not support bad cluster mapping.
It provides security for both local and remote users. The security is
provided to the level of files and folders.