Saturday, August 22, 2015

                               Wintel/AD L2 support Q & A

1Q. What is your daily task being a Windows Admin?
Daily tasks:

[]
Perform scheduled backups (if configured).
[]
Check usage levels.
[]
Check for runaway processes.

[]
Check disk space.
[]
Check mail functionality, connections.
[]
Check printer status with lpstat -t.
[]
Check auditing output, if activated.
[]
Check UUCP communications links, if active.
[]
Check for unattended login sessions.

2Q. What is PDC emulator?

PDC Emulator is one of the Domain wide FSMO role. It is also one of the most important role. Here is the task list managed by PDC:
(a)    Backward compatibility with NT 4.0
(b)   It synchronizes time with the help of NTP (Network Time Protocol, Port No. 123) with DC. As per Microsoft we cannot accept more than 22 seconds delay between DC and client machines.
(c)    Account related information like Account lockout, Password Expired, password Changes etc. are managed by PDC.
(d)   Group policy is managed by PDC. SYSVOL folder contains Domain wide group policy that is shared between DCs.
(e)    All login scripts is managed by PDC.

3Q. What is GPO?

It is a set of rules which is used to manage Domain Environment like User and Computer configuration.
There are two types of policy Local computer policy and Domain policy.
Creation of policy- Local computers, Site, Domain, OU (LSDOU)
Applicable policy- OU, Domain, Site, Local computer (OUDSL)

4Q. What is SYSVOL?

SYSVOL folder contains Domain wide group policy that is shared between DCs. It requires NTFS partition and it replicates with other DCs with the help of File Replication service in windows 2003 server. In windows server 2008,  DFSR is responsible to replicate SYSVOL folder and SYSVOL folder is known as SYSVOL_DFSR.

5Q. What is command to see cluster log?

(a) Use the cluster /log /g command at the command prompt. This command generates the cluster logs to the \windows\cluster\reports directory on each WSFC node. The advantage of this method is that you can specify the level of detail in the generated logs by using the /level option. The disadvantage is that you cannot specify the destination directory for the generated cluster logs
 (b) Use the Get-ClusterLog PowerShell cmdlet. The advantage of this method is that you can generate the cluster log from all nodes to one destination directory on the node that you run the cmdlet. The disadvantage is that you cannot specify the level of detail in the generated logs

6Q. How to demote a server without running DCPROMO?

If DCPROMO fails to demote DC then we can do metadata cleanup.
There are three ways to perform Metadata cleanup:

7Q. How to map shared drive for users from server?

We can use Group Policy to map shared drive for users. We can create a new OU and move all users those wants access for that shared drive and assign group policy User Configuration\Preferences\Windows settings\Drive Maps and follow the wizard to provide shared folder path and put a check mark show this drive. Run gpupdate /force to apply this policy and user will be able to access without any error after reboot/log off.

8Q. What is Home Folders?

A home folder is a private network location where users can store personal files. It is stored in a shared folder on a network server. When you create the home folder on a network server, users can access it from any computer on the network.

Assign a home folder to a domain user

Note: To specify a network path for the home folder, you must first create the network share and set permissions that permit the user access. You can do this with Shared Folders in Computer Management on the server computer. 

To assign a home folder to a domain user:

1.     Click Start, point to Programs, point to Administrative Tools, and then click Active Directory Users and Computers.
2.     In the console tree, click Users.
3.     In the Details pane, right-click the user account, and then click Properties.
4.     In the Properties dialog box, click Profile.
5.     Under the Home folder, type the folder information. To do this, follow these steps:
a.     To assign a home folder on a network server, click Connect, and then specify a drive letter.
b.    In the To box, type a path. This path can be any one of the following types:
·         Network path, for example:
\\server\users\tester
·         You can substitute username for the last subfolder in the path, for example:
\\server\users\username
6.     Note In these examples, server is the name of the file server housing the home folders, and users is the shared folder.
7.     Click OK.

9Q. What are different types of groups? What is Group scope and what are the different types of group scopes?

There are two types of groups- Security Groups and Distribution Groups
               Security Groups: Security groups are used to group domain users into a single administrative unit. Security groups can be assigned permissions and can also be used as e-mail distribution lists. Users placed into a group inherit the permissions assigned to the group for as long as they remain members of that group. Windows itself uses only security groups.

Distribution groups: These are used to nonsecurity purposes by applications other than Windows. One of the primary uses is within an e-mail.
As with user accounts, there are both local and domain-level groups. Local groups are stored in a local computer’s security database and are intended to control resources access on that computer. Domain groups are stored in Active Directory and let you gather users and control resources access in a domain and on domain controllers.

Groups Scope: Group scopes determine where in the Active Directory forest a group is accessible and what objects can be placed into the group.
There are three different group scopes; domain local, global and universal. The scope decides who can be member of the group and where the group can be used. These are the three group scopes and a "Can Contain Matrix" for each:
1. Domain Local Groups: These groups are only visible in their own domain. For that reason, domain Local Security groups can be used to grant rights and permissions only on resources that reside in the same domain where the domain local group is located. Domain local groups can contain domain local groups only from the same domain, but users, computers and all other group-types from the same domain and trusted domains (all domains in the forest). Use domain local groups for assigning permissions to resources in their home domain.
CAN CONTAIN: Domain Local Groups from the own domain, Global Groups from trusted domains and any domain in the forest, Universal groups from trusted domains and any domain in the forest.
2. Global Groups: These groups are visible through-out the forest, but can only contain accounts and global groups from the same domain. The group itself can be a member of universal and domain local groups in any domain, and global groups of its own domain. The groups should be used to organize users who share the same job tasks or department etc. You should not assign permissions directly to global groups – domain local groups are more appropriate for that.
CAN CONTAIN: Global Groups from the OWN domain.
3. Universal groups: These groups are visible through-out the forest and can contain accounts, global groups and other universal groups from any domain in the forest (they cannot contain domain local groups). Universal groups should be used to nest global groups. By doing that, the group can assign permissions to resources in multiple domains.
CAN CONTAIN: Global Groups from any domain in the forest, Universal Groups from any domain in the forest.
Q.  What is cost?
Site link cost can be used to determine which domain controller is contacted by clients located in one site if the domain controller for the specified domain does not exist at that site. The client contacts the domain controller by using the site link that has the lowest cost assigned to it.

It is recommended that the cost value be defined on a site-wide basis. Cost is usually based not only on the total bandwidth of the link but also on the availability, latency, and monetary cost of the link. https://technet.microsoft.com/en-us/library/cc782827(v=ws.10).aspx

  
1Q. Why do we need to authorize DHCP?

If the DHCP server is not authorized, it will not lease IP addresses to DHCP clients. When configured correctly and authorized for use on a network, Dynamic Host Configuration Protocol (DHCP) servers provide a useful administrative service. However, a misconfigured or unauthorized DHCP server can cause problems. For example, if an unauthorized DHCP server starts, it might begin either leasing incorrect IP addresses to clients or negatively acknowledging DHCP clients that attempt to renew current address leases. To resolve these issues, DHCP servers are verified as authorized in Active Directory Domain Services before they can service clients and unauthorized, or rogue, servers are detected. This prevents most of the accidental damage caused by either misconfigured DHCP servers or correctly configured DHCP servers running on the wrong network. To authorize a DHCP server in AD DS

1.     Click Start, point to Administrative Tools and then click DHCP
2.     In the console tree, click DHCP
3.     On the Action menu, click Manage authorized servers.The Manage Authorized Servers dialog box appears.
4.     Click Authorize.
5.     When prompted, type the name or IP address of the DHCP server to be authorized, and then click OK.


1Q. What is command for replication? Give some example.


Repadmin /kcc - Forces the Knowledge Consistency Checker (KCC) on each targeted domain controller to immediately recalculate the inbound replication topology.

Repadmin /prp - Lists and modifies the Password Replication Policy (PRP) for read-only domain controllers (RODCs).

Repadmin /queue - Displays inbound replication requests that the domain controller has to issue to become consistent with its source replication partners.
Growth in the number of items in the queue of an online domain controller can be caused by any of the following factors:
  • Too many concurrent replication partners
  • High change rates to objects in Active Directory Domain Services (AD DS)
  • Insufficient CPU or network bandwidth for the amount of data that the domain controller is replicating

Repadmin /replicate - Triggers the immediate replication of the specified directory partition to a destination domain controller from a source domain controller.

Repadmin /replsingleobj - Replicates a single object between any two domain controllers that have common directory partitions.
The two domain controllers do not have a replication agreement. That is, neither domain controller has an inbound connection object for the other domain controller.
You can use the repadmin /showrepl or the repadmin /showconn command to show replication agreements.

Repadmin /replsummary - Identifies domain controllers that are failing inbound replication or outbound replication, and summarizes the results in a report.

Repadmin /rodcpwdrepl - Triggers replication of passwords for the specified users from a writable Windows Server 2008 source domain controller to one or more read-only domain controllers (RODCs).
For each destination RODC, the source domain controller enforces the Password Replication Policy (PRP) before it performs the operation. If the PRP does not permit replicating the password to an RODC for a specified user, the operation for that user and RODC combination fails.

Repadmin /showattr - Although the repadmin /showobjmeta command displays the number of times that the attributes on an object have changed and which domain controller made those changes, the repadmin /showattr command displays the actual values for an object. The repadmin /showattr command can also display the values for objects that are returned by a command-line Lightweight Directory Access Protocol (LDAP) query.
An object can be referenced by its distinguished name or by its object globally unique identifier (GUID).
By default, repadmin /showattr uses Lightweight Directory Access Protocol (LDAP) port 389 to query writable directory partitions. However, repadmin /showattr can optionally use LDAP port 3268 to query the read-only partitions of a global catalog server.

Repadmin /showobjmeta - Displays the replication metadata for a specified object stored in Active Directory Domain Services (AD DS), such as the attribute ID, a version number, the originating and local Update Sequence Numbers (USNs), the globally unique identifier (GUID) of the originating server, and the date and time stamp. By comparing the replication metadata for the same object on different domain controllers, you can determine whether replication has occurred or which domain controller added, modified, or deleted an attribute or object. You can reference an object by its distinguished name path, object GUID, or security identifier (SID). If the distinguished name path includes a space, enclose it in quotation marks.

Repadmin /showrepl - Displays the replication status when the specified domain controller last attempted to perform inbound replication of Active Directory partitions.
The repadmin /showrepl command helps you understand the replication topology and replication failures. It reports status for each source domain controller from which the destination has an inbound connection object. The status report is categorized by directory partition.

Repadmin /showutdvec - Displays the highest committed Update Sequence Number (USN) that Active Directory Domain Services (AD DS) on the targeted domain controller shows as committed for itself and its transitive partners.
The up-to-dateness vector (UTDVEC) shows the highest USN that the destination domain controller has received by replication, in the form of changes it has received from its direct and transitive replication partners for the specified partition.

Repadmin /syncall - Synchronizes a specified domain controller with all of its replication partners.



1Q. What is Quorum and how it works?

A cluster quorum disk is the storage medium on which the configuration database is stored for a cluster computing network. The cluster configuration database, also called the quorum, tells the cluster which physical server(s) should be active at any given time. The quorum disk comprises a shared block device that allows concurrent read/write access by all nodes in a cluster.

When network problems occur, they can interfere with communication between cluster nodes. A small set of nodes might be able to communicate together across a functioning part of a network but not be able to communicate with a different set of nodes in another part of the network. This can cause serious issues. In this "split" situation, at least one of the sets of nodes must stop running as a cluster.
To prevent the issues that are caused by a split in the cluster, the cluster software requires that any set of nodes running as a cluster must use a voting algorithm to determine whether, at a given time, that set has quorum. Because a given cluster has a specific set of nodes and a specific quorum configuration, the cluster will know how many "votes" constitutes a majority (that is, a quorum). If the number drops below the majority, the cluster stops running. Nodes will still listen for the presence of other nodes, in case another node appears again on the network, but the nodes will not begin to function as a cluster until the quorum exists again.



1Q. What is Forwarders & conditional forwarders?

A forwarder is a Domain Name System (DNS) server on a network that forwards DNS queries for external DNS names to DNS servers outside that network.

Conditional forwarders are DNS servers that forward queries according to domain names. Rather than having a DNS server forward all queries it cannot resolve locally to a forwarder, you can configure DNS servers to forward queries to different forwarders according to the specific domain names that are contained in the queries. Forwarding according to domain names improves conventional forwarding by adding a name-based condition to the forwarding process.
The conditional forwarder setting for a DNS server consists of the following:
  • The domain names for which the DNS server will forward queries
  • One or more DNS server IP addresses for each domain name that is specified

1Q. How PDC emulator works with NT 4.0?

·   The PDC emulator performs all of the functionality that a Microsoft Windows NT 4.0 Server-based PDC or earlier PDC performs for Windows NT 4.0-based or earlier clients.

This part of the PDC emulator role becomes unnecessary when all workstations, member servers, and domain controllers that are running Windows NT 4.0 or earlier are all upgraded to Windows 2000. The PDC emulator still performs the other functions as described in a Windows 2000 environment. 

No comments: