Wintel/AD Questions & Answers Part-2
Q. Daily Monitoring Tasks:
Tasks
|
|
Verify that all domain
controllers are communicating with the central monitoring console or
collector.
|
|
View and examine all new
alerts on each domain controller, resolving them in a timely fashion.
|
|
Resolve alerts indicating
the following services are not running: FRS, Net Logon, KDC, W32Time,
ISMSERV. MOM reports these as Active Directory Essential Services.
|
|
Resolve alerts indicating
SYSVOL is not shared.
|
|
Resolve alerts indicating
that the domain controller is not advertising itself.
|
|
Resolve alerts indicating
time synchronization problems.
|
|
Resolve all other alerts
in order of severity. If alerts are given error, warning, and information
status similar to the event log, resolve alerts marked error first.
|
Importance
Communication failure
between the domain controller and the monitoring infrastructure prevents you
from receiving alerts so you can examine and resolve them.
|
This precaution helps you avoid service outages.
|
Active Directory depends on these services. They must be running
on every domain controller.
|
Active Directory cannot apply Group Policy unless SYSVOL is
shared.
|
Domain controllers must register DNS records to be able to
respond to LDAP and other service requests.
|
The Kerberos authentication protocol requires that time be
synchronized between all domain controllers and clients that use it.
|
The highest priority alerts indicate the most serious risk to
your service level..
|
Q. How to check AD performance/Health of server?
AD
performance check-
- run dcdiag on all DCs .More about
dcdiag.exe: http://technet.microsoft.com/en-us/library/cc776854(WS.10).aspx
- run repadmin /syncall and check if there any
reported issues. If an error was detected then there should be something
wrong
- Check logs
in event viewer
- Run DNSLint to perform diagnosis about common DNS
name resolution problems. See that: http://support.microsoft.com/kb/321045
We
can use few tools to check server performance like perfmon, poolmon, process
explorer, treesize etc.
(a)
Treesize software to check space in C drive consumed by
any specific folder. We will not install any program in C drive except OS.
(b)
Delete unknown user from user profile in system
properties. Unknown user account which is deleted from AD is known as Phantom
account.
(c)
Virus definition update file older than 15 days should
be deleted from C drive.
(d)
Microsoft Windows patches should be moved from C drive
to any other drive which is older than 1 Month.
(e)
Extend the drive if still free space is not sufficient
to run server smoothly by using DISKPART.
Note: C drive cannot be extended if it has stored page file. In this
situation, we need to move page file to different location and then extend the
C drive. We can move back the page file after extending the C drive.
Q. How to identify and check which process is utilizing
Memory/CPU high?
(a)
Check scheduled scan of Anti-Virus program.
(b)
Check scheduled backup of server.
(c)
Check windows update.
(d)
Check Database/Application log file backup.
(e)
Check scheduled task for any other tasks configured in
specified time.
(f)
Check file version of specific program/application by
right click on application/program then properties, Version tab.
(g)
Check driver version for Hardware devices by right
click on device. Properties and driver version.
(h)
Run process explorer to check any EXE.
Q. How to create share folder for users and assign
permissions?
open
the users profile in ADUC, you will see that there is a field called "Home
Folder". You can use the "Connect to" option to map a drive to
the share on the file and print server eg \\fileserver\users\%UserName%
On
the fileserver, create a folder called users and share it. Change the permissions
as follows:
1)
Turn off inheritance on the folder and copy the permissions. You do this by:
a.
Click the Advanced button found on the Security tab.
b.
Clear Allow inheritable permissions to propagate to this object check box in
the Advanced Security Settings dialog box.
c.
Click Copy when prompted by the Security dialog box.
2)
Click OK to return to the Security tab. Ensure we have the following
permissions set:
Administrators:
Full Control
System:
Full Control
Creator
Owner: Full Control
Authenticated
Users: Read & Execute, List Folder Contents, Read
3)
Change permissions for Authenticated Users so they cannot access other users’
folders. You do this by:
a.
Click Advanced on the Security tab.
b.
Click Authenticated Users, and then click Edit.
c.
On the Permissions Entry for users dialog box, drop down the Apply onto and
select This folder only.
d.
Click OK twice.
Q. How to perform update and upgrade of firmware on HP
servers?
Q. What is page file?
RAM is a limited resource, whereas for most
practical purposes, virtual memory is unlimited. There can be many processes,
and each process has its own 2 GB of private virtual address space. When the
memory being used by all the existing processes exceeds the available RAM, the
operating system moves pages (4-KB pieces) of one or more virtual address
spaces to the computer’s hard disk. This frees that RAM frame for other uses.
In Windows systems, these “paged out” pages are stored in one or more files
(Pagefile.sys files) in the root of a partition. There can be one such file in
each disk partition. The location and size of the page file is configured in System
Properties (click Advanced, clickPerformance,
and then click the Settings button).
Users frequently ask "how big should I make
the pagefile?" There is no single answer to this question because it
depends on the amount of installed RAM and on how much virtual memory that
workload requires. If there is no other information available, the typical
recommendation of 1.5 times the installed RAM is a good starting point. On
server systems, you typically want to have sufficient RAM so that there is
never a shortage and so that the pagefile is basically not used. On these
systems, it may serve no useful purpose to maintain a really large pagefile. On
the other hand, if disk space is plentiful, maintaining a large pagefile (for
example, 1.5 times the installed RAM) does not cause a problem, and this also
eliminates the need to worry over how large to make it.
Q. What is memory leakage and how will you check If memory
leakage is happening or not ?
A memory leak is caused by an application or by a
process that allocates memory for use but that does not free the memory when
the application or process finishes. Therefore, available memory is completely
used over time. Frequently, this condition causes the system to stop
functioning correctly.
Or,
Memory leakage is a gradual loss of available computer memory. When a program
repeatedly fails to returns memory that it has obtained for temporary use, a
result the available memory for that application or that part of the operating
system become exhausted and program can no longer function. A memory leak is
result of a program bug. POOLMON is a tool which is used to check whether
memory leakage is happening or not. There are event Ids for memory leakage, if
we got event ID 2019 and 2020 in event viewer then memory leakage is happening
otherwise no memory leakage is going on.
Event ID 2019- The server was unable to allocate from the system non-paged
pool because the pool was empty.
Event ID 2020- The server was unable to allocate from the system paged
pool because the pool was empty.
Source- SRV
Q. How to check server if it is not reachable after ping?
We can check Server by using HP ILO remote tool by using web based
console or standalone remote tool
Q. How to Reset HP ILO?
Login to HP ILO web based console, go to diagnostic and then click on
Reset. It will take 30 seconds to reset the ILO.
Q. How
to create print queue and add printers over the network and assign static IP?
No comments:
Post a Comment