Saturday, August 22, 2015

                         Wintel/AD Questions & Answers Part-2

Q. Daily Monitoring Tasks: 

Tasks
Verify that all domain controllers are communicating with the central monitoring console or collector.
View and examine all new alerts on each domain controller, resolving them in a timely fashion.
Resolve alerts indicating the following services are not running: FRS, Net Logon, KDC, W32Time, ISMSERV. MOM reports these as Active Directory Essential Services.
Resolve alerts indicating SYSVOL is not shared.
Resolve alerts indicating that the domain controller is not advertising itself.
Resolve alerts indicating time synchronization problems.
Resolve all other alerts in order of severity. If alerts are given error, warning, and information status similar to the event log, resolve alerts marked error first.

Importance


Communication failure between the domain controller and the monitoring infrastructure prevents you from receiving alerts so you can examine and resolve them.
This precaution helps you avoid service outages.
Active Directory depends on these services. They must be running on every domain controller.
Active Directory cannot apply Group Policy unless SYSVOL is shared.
Domain controllers must register DNS records to be able to respond to LDAP and other service requests.
The Kerberos authentication protocol requires that time be synchronized between all domain controllers and clients that use it.
The highest priority alerts indicate the most serious risk to your service level..

Q.    How to check AD performance/Health of server?

AD performance check-
We can use few tools to check server performance like perfmon, poolmon, process explorer, treesize etc.

 Q.     How to check and perform task to free space in C drive?

(a)    Treesize software to check space in C drive consumed by any specific folder. We will not install any program in C drive except OS.
(b)   Delete unknown user from user profile in system properties. Unknown user account which is deleted from AD is known as Phantom account.
(c)    Virus definition update file older than 15 days should be deleted from C drive.
(d)   Microsoft Windows patches should be moved from C drive to any other drive which is older than 1 Month.
(e)    Extend the drive if still free space is not sufficient to run server smoothly by using DISKPART.
Note: C drive cannot be extended if it has stored page file. In this situation, we need to move page file to different location and then extend the C drive. We can move back the page file after extending the C drive.

Q.      How to identify and check which process is utilizing Memory/CPU high?

(a)    Check scheduled scan of Anti-Virus program.
(b)   Check scheduled backup of server.
(c)    Check windows update.
(d)   Check Database/Application log file backup.
(e)    Check scheduled task for any other tasks configured in specified time.
(f)    Check file version of specific program/application by right click on application/program then properties, Version tab.
(g)   Check driver version for Hardware devices by right click on device. Properties and driver version.
(h)   Run process explorer to check any EXE.

Q.      How to create share folder for users and assign permissions?

 open the users profile in ADUC, you will see that there is a field called "Home Folder". You can use the "Connect to" option to map a drive to the share on the file and print server eg \\fileserver\users\%UserName%
On the fileserver, create a folder called users and share it. Change the permissions as follows:
1) Turn off inheritance on the folder and copy the permissions. You do this by:
a. Click the Advanced button found on the Security tab.
b. Clear Allow inheritable permissions to propagate to this object check box in the Advanced Security Settings dialog box.
c. Click Copy when prompted by the Security dialog box.
2) Click OK to return to the Security tab. Ensure we have the following permissions set:
Administrators: Full Control
System: Full Control
Creator Owner: Full Control
Authenticated Users: Read & Execute, List Folder Contents, Read
3) Change permissions for Authenticated Users so they cannot access other users’ folders. You do this by:
a. Click Advanced on the Security tab.
b. Click Authenticated Users, and then click Edit.
c. On the Permissions Entry for users dialog box, drop down the Apply onto and select This folder only.
d. Click OK twice.

Q.      How to perform update and upgrade of firmware on HP servers?



Q.      What is page file?

RAM is a limited resource, whereas for most practical purposes, virtual memory is unlimited. There can be many processes, and each process has its own 2 GB of private virtual address space. When the memory being used by all the existing processes exceeds the available RAM, the operating system moves pages (4-KB pieces) of one or more virtual address spaces to the computer’s hard disk. This frees that RAM frame for other uses. In Windows systems, these “paged out” pages are stored in one or more files (Pagefile.sys files) in the root of a partition. There can be one such file in each disk partition. The location and size of the page file is configured in System Properties (click Advanced, clickPerformance, and then click the Settings button).


Users frequently ask "how big should I make the pagefile?" There is no single answer to this question because it depends on the amount of installed RAM and on how much virtual memory that workload requires. If there is no other information available, the typical recommendation of 1.5 times the installed RAM is a good starting point. On server systems, you typically want to have sufficient RAM so that there is never a shortage and so that the pagefile is basically not used. On these systems, it may serve no useful purpose to maintain a really large pagefile. On the other hand, if disk space is plentiful, maintaining a large pagefile (for example, 1.5 times the installed RAM) does not cause a problem, and this also eliminates the need to worry over how large to make it.





Q.      What is memory leakage and how will you check If memory leakage is happening or not ?

A memory leak is caused by an application or by a process that allocates memory for use but that does not free the memory when the application or process finishes. Therefore, available memory is completely used over time. Frequently, this condition causes the system to stop functioning correctly. 

Or,

Memory leakage is a gradual loss of available computer memory. When a program repeatedly fails to returns memory that it has obtained for temporary use, a result the available memory for that application or that part of the operating system become exhausted and program can no longer function. A memory leak is result of a program bug. POOLMON is a tool which is used to check whether memory leakage is happening or not. There are event Ids for memory leakage, if we got event ID 2019 and 2020 in event viewer then memory leakage is happening otherwise no memory leakage is going on.

Event ID 2019- The server was unable to allocate from the system non-paged pool because the pool was empty.

Event ID 2020- The server was unable to allocate from the system paged pool because the pool was empty.

Source- SRV


Q.     How to check server if it is not reachable after ping?

We can check Server by using HP ILO remote tool by using web based console or standalone remote tool

Q.      How to Reset HP ILO?

Login to HP ILO web based console, go to diagnostic and then click on Reset. It will take 30 seconds to reset the ILO.

Q.  How to create print queue and add printers over the network and assign static IP?



                          

No comments: