...USEFULL LINKS « How to publish a website with both Anonymous and Forms Based Authentication in ISA 2006 How to configure ISA 2006 with FBA for OWA and NTLM for Outlook Anywhere and Autodiscover in Exchange 2007 » How to place FSMO and Global Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator...
Words: 10360 - Pages: 42
...AD FSMO Role Management: Alternate Methods Dear Junior Admin. Well it seems you have a complicated decision on your mind “what tool for the job?” I have decided its best for you to decide on your own which tools you prefer to work with, although I can ease the pain of the decision by providing insight on each of the tools you have at your fingertips. DCDIAG – is a command line tool that analyzes the state of domain controllers in a forest and shows any problems to help with trouble shooting. There are many useful commands with this tool, much too many to include in this simple letter, but there are plenty of locations on line that provide the commands with descriptions for use. NTDSUTIL – is another command line tool that manages facilities for Active Directory Domain Services (AD DS) and the lightweight version (AD LDS). This tool can be used for database maintenance of AD DS, control and manage single master operations, and remove metadata left by domain controllers that had been improperly uninstalled. This tool has many commands that would cause this letter to become undesirably long so Google is your best bet to find them with descriptions. MMC Snap-ins – is a graphical interface that hosts administrative tools for managing your networks, special tools can be created here for administrative tasks. It basically allows you to build your own tools with the standard user interface. This tool will probably be your best bet to begin with, but don’t shy...
Words: 956 - Pages: 4
...aspects of today’s networked computing environments is ensuring that all network services are functioning optimally. The Accudata Systems Network Health Checks proactively examine your network resources to determine the health of your environment and that all resources are readily available and performing as expected. Why should you perform a Microsoft® Active Directory® Health Check? A directory service is the main switchboard of a network operating system. It manages the identities and brokers the relationships between distributed resources so that they can work together. Further, a directory service is a place to store information about corporate and organizational assets such as applications, files, printers, and users. It provides a consistent method for naming, describing, locating, accessing, managing, and securing information about the resources. Microsoft Active Directory was designed to be feature-rich, flexible, and scalable. Active Directory requires a considerable investment of time during the initial planning and design stages as well as throughout the life of the network. As the networking environment changes, it is critical to ensure that Active Directory continues to function as required. Some of the areas of Active Directory that often require attention include: Schema or Global Catalog replications do not occur optimally, causing intermittent directory problems FSMO roles and Global Catalogs are not distributed effectively, causing unnecessary...
Words: 708 - Pages: 3
...1. Benefits of directory services (AD DS) Without getting too technical and wordy, but being able to help the client understand more about what active directory does, the following can be explained: - AD shows a better representation of the network by a process known as centralization. Centralization is the process of managing users regardless of the size of the network in one location. - Utilizes organizational units to improve scalability. If an organization is large, OUs can help simplify the task by grouping resources (such as users and computers) that have similar rights. - Replication makes it easier because any changes that are made are replicated to other domain controllers so that the network can run more efficiently. http://www.techrepublic.com/article/the-benefits-of-moving-clients-to-an-active-directory-environment/ Active Directory Domain Services (AD DS) benefits: Redundancy Fault Tolerance Serves as a domain controller that authenticates users when logging on to a network. Participates in storing, modifying, and maintaining the AD database (Textbook) Page 3 for major benefits of AD DS Mark is concerned about ensuring the network so that it has little to no downtime at all. AD DS can help ease this issue because of the system providing fault tolerance. It continues to provide services even if 1 or more servers experience hardware failure or loss of connectivity. How does it do this? It does this through its multimaster...
Words: 625 - Pages: 3
... directory serviceC. Directory InfrastructureD. NT directory Ans: B Qus 2 : A __________ is defined as one or more IP subnets that are connected by fastlinks.A. domainB. network C. siteD. forestAns: C Qus 3 : What contains the rules and definitions that are used for creating and modifyingobject classes and attributes within Active Directory?A. Configuration NCB. Schema NCC. Domain NCD. DC NCAns : B Qus 4 : What shared folder exists on all domain controllers and is used to store GroupPolicy objects, login scripts, and other files that are replicated domain-wide?A. SYSVOLB. ADC. C$D. VOLMGR Ans: A Qus 5 : What new Windows Server 2008 feature is a special installation option thatcreates a minimal environment for running only specific services and roles?A. Minimal Installation OptionB. Server CoreC. Server Standard D. Minimal Server Environment (MSE) Ans: B Qus 6 : What is the minimum amount of storage space required for the Active Directoryinstallation files?A. 100 MBB. 150 MBC. 200 MBD. 250 MBAns: C Qus 7 : When modifying the schema, Microsoft recommends adding administrators towhat group only for the duration of the task?A. Schema AdminsB. Enterprise AdminsC. Global AdminsD. Forest AdminsAns: A Qus 8 : When you install the forest root domain controller in an Active Directory forest,the Active Directory Installation Wizard creates a single site named __________.A. Default-SiteB. Site-DefaultC. Default-Site-NameD. Default-First-Site-NameAns: D Qus 9 : What command-line...
Words: 850 - Pages: 4
...determine the available Active Directory Domain Services (AD DS) domain or forest capabilities. They also determine which Windows Server operating systems you can run on domain controllers in the domain or forest. However, functional levels do not affect which operating systems you can run on workstations and member servers that are joined to the domain or forest. What are the DNS requirements to install active directory? When you install Active Directory on a member server, the member server is promoted to a domain controller. Active Directory uses DNS as the location mechanism for domain controllers, enabling computers on the network to obtain IP addresses of domain controllers. During the installation of Active Directory, the service (SRV) and address (A) resource records are dynamically registered in DNS, which are necessary for the successful functionality of the domain controller locator (Locator) mechanism. What are trust relationships and how are they used? In the Windows NT domain model, domains had to be bound together through trust relationships simply because the SAM databases used in those domains could not be joined. What this meant was that where a domain trusted another Windows NT domain, the members of the domain could access network resources located in the other domain. Defining trust relationships between domains eliminates the need for an Administrator to configure user accounts in multiple domains. What are the FSMO role defaults, how many there are and how...
Words: 2607 - Pages: 11
...1. Know the acronym associated with an email client program/ 2. Know wha a fully Qualified domain name entails 3. Know the diff versions of email protocols 4. Know diff Exchange server roles and what it allows you to access -=n B 5. Know the fsmo roles and which ones must be present together 6. Know the order in which GPO’s are applied 7. Know whether or not it is a good idea to install the Exchange role on multifunction servers 8. Know the amount of ram required on an exchange server based on server roles 9. For installation of Exchange, know then diff between unattended and graphical mode 10. Know what the diff exchange administrative roles are and that you can do under B 11. Which exchange server role does not allow you to communicate directly with AD 12. Know that connectors are used for in exchange server. 13. Which user group is represented in both AD and exchange mailbox 14. Know the purpose of a mail enabled group 15. Know what auto discover and availability services are used for 16. Know why you would use public folder referrals 17. Know the diff protocols for email and what they are used for. 18. Know the TCp ports associates with pop3 and imap 19. Know the diff viruses that are spread via email and how they work, 20. Know the diff ways network based firewall can restrict traffic. 21. Know what the vss is used for. 22. Know the diff groups and what they can be used for regarding mailbox...
Words: 300 - Pages: 2
...server role available in Exchange Server 2007- Anti Spam ADAM to periodically obtain AD- EdgeSync Connect to your Exchange Servers- RPC over HTTP Roles enables users working at another computer on the company network or on the internet- Terminal Services Root directory of the default Web- C:\inetpub\wwwroot IIS7 generates a 404 error- detailed; custom Web applications use a three-tiered architecture- Database Server To relay email within your organization- Connectors The two forest-wide FSMO roles- Schema Master Database of all object names in the forest – Global catalog Test connectivity to SMTP,POP3, and IMAP4- Telnet Two basic types of computers- Clients and Servers Isolate Web applications in separate address spaces called- Application Pools The process of confirming a users identity- Authentication Original default filename for the Web- index.html What is an MMC- Server Manager Stripped down version of windows 2008- Windows Server Core Servers that hose the _____role- Edge Single Public folder database by default- Public Folder Referrals Assign them to ____rather than to individual users- groups How many hub role servers- One for each Email server for a particular domain to which email should be forwarded- MX Outlook 2007 and Entourage 2008 MAPI- Auto Discover/Availability Services User group represents users within an organization that have both a user account in AD- Mailbox User Group Digital Certificates are issued by internal or external- Certification...
Words: 468 - Pages: 2
...Server question Ques 1 :-Which of the following is not a benefit of DHCP? 1. centralized administration of IP configuration 2. dynamic host configuration 3. seamless IP host configuration 4. portability of workstations ques 2:- Which of the following is not a component of DNS? 1. DNS namespace 2. DNS zones 3. DNS resource records 4. DNS relay agent Ques 3:- A starting address of 192.0.0.0 and an ending address of 223.255.255.255 is a member of which network class? 1. Class a 2. Class b 3. Class c 4. Class d Ques 4:- Which of the following is not a function of DHCP? 1. transmitting data from one network to another 2. bootstrapping diskless workstations 3. automating the assigning, tracking, and reassigning of IP addresses 4. dynamically allocating an IP address from a pool of addresses ques 5:- If a system will be a DHCP server, what type of address should you set? 1. automatic private IP address 2. fixed IP address 3. static IP address 4. none of the above ques 6:- What is the minimum number of physical computers required to allow you to use a KMS key? 1. 20 Vista and ten Windows Server 2008 computers 2. 20 Vista and five Windows Server 2008 computers 3. 15 Vista and ten Windows Server 2008 computers 4. 25 Vista and five Windows Server 2008 computers Ques 7:- A striped volume uses which type of striping to interleave data across...
Words: 4583 - Pages: 19
...Cards Term ______ replication takes place within a single well connected location. Definition Intrasite Term ______ replication allows AD to replicate over WAN links to remote locations. Definition Intersite Term T/F Active Directory sites are the means by which Administrators can control traffic. Definition True Term By default, _____ replication occurs every 15 minutes. Definition Intersite Term How often does intrasite replication take place? Definition Almost immediately following a change in AD. Term T/F All types of replication traffic is compressed. Definition False; Intrasite replication is not compressed and intrasite replication is. Term ADs logical structure can be viewed through ADUC, and its physical structure can be viewed in AD ______ Definition Sites and Services Term Sites are defined by well-connected ____ _____ Definition IP subnets Term What purpose do sites serve? Definition They organize the replication process by defining the servers that will replicate with eachother by using either intersite or intrasite replication. Term [Fact] When logging on, hosts will query DNS servers for site information in order to know what DC they will authenticating to. Definition [Fact] AD sites are independant of the logical structure of AD meaning that a single site can contain multiple domains and a domain can span multiple sites Term [Tip] Define sites prior to promoting Domain Controllers. Definition This will...
Words: 1180 - Pages: 5
...1. The process of obtaining an IP address for a computer name is called ____. 2. The routing service included with windows server 2008 is better suited for ____. 3. Network Address Protection was introduced with which operating system? 4. A starting address of 192.0.0.0 and an ending address 223.255.255.255 is a member of which network class? 5. IPv4 addresses are commonly represented by using what type of notation? 6. Which feature is an integral part of IPv6, whereas it was an optional feature under IPv4? 7. Each host on a TCP/IP network should be configured with a number of mandatory optional configuration items except for which of the following? 8. If a system will be a DHCP server, what type of address should you set? 9. What is made up of free space from multiple physical disks? 10. Which partition style is recommended for disks larger than 2tb or for disks that are used in Itanium computers? 11. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option? 12. Which of the following is not a key benefit provided by DHCP for those managing and maintaining a TCP/IP network? 13. Sent by clients via broadcast to locate a DHCP server per RFC 2131, which message may include options that suggest values for the network address lease duration? 14. What type of zone might a DNS server host? 15. Which of the following is not a forward or reverse lookup...
Words: 921 - Pages: 4
...Exchange Server proprietary role name which allows multimedia audio or images - voice mail , fax etc from MAPI clients, including telephones ? UM - unified Messaging 5. IN addition to the forest wide Active Directory FSMO role called Domain Naming Master , what is the other forest wide role name which accompanies it on a single DC? Schema Master 6. Not including any local machine policy which is applied first , is the correct order site, domain, parent OU, child OU for applying GPOs ? yes it is site, domain, parent ou and child ou. 7. Is it good practice or a poor practice to install exchange server on a multifunction server? It is a poor practice to do so. 8. If Edge , Hub, CAS and mailbox are on the same machine, how much minimum RAM should exist according to MS> 8GB RAM , 5mb for each mailbox. 9. Is setup.com the equivalent of the command line version setup.exe ? Yes it is - this works in unattended mode. 10. What type of administrator user can grant full permissions to AD for objexts and other info and is it for a specific server or type of organization ? EOA - This is the Exchange Organization Administrator 11. Does the edge role communicate directly with Active Directory ? No, the edge role cannot communicate directly with AD 12. For Edge and Hub, are microsoft connectors required to for e-mail relay? yes they are. a send (SMTP) and...
Words: 699 - Pages: 3
...Cover Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information. Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used for all aspects of the solution. The topics include: -Active Directory: What forest/domain model should Shiv LLC implement? What is the domain name? Where should the domain controllers be place? Should RODC be part of the consideration? FSMO Roles placement Plan for AD backup and recovery -Group Policy: Is Group Policy needed? What settings might be considered via Group Policy? -DNS: What namespace should Shiv LLC implement? What types of zones needed? -File Services: How will the shares be secured? Will quotas be used? FSRM be configured? Will DFS be implemented? -Remote Services: What technology will be implemented to provide secure remote access for users? Who should have remote access? -WSUS: How...
Words: 547 - Pages: 3
...particular domain to which e-mail should be forwarded. The GC (global catalog) is a database of all object names in the forest and aids in locating objects in the AD. Virtual Directory enable you to use a Web site to publish files located anywhere on the network? Server Manager is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools. ESMTP is and improved version of the standard e-mail protocol that provides greater support for embedded graphics and attachments in e-mail. The Add Roles Wizard provides roles that fall into three basic categories: Directory Services, Application Services, and Infrastructure Services? All applications that you add to the Default Web Site on the server use Default App Pool. Although mailbox users connect to a single public folder database by default, they will be able to see and access all of the public folders within the Exchange organization using Public Folder Referrals. The client must use the prefix https:// in its URL to connect to an IIS7 server using SSL. Digital certificates are issued by internal or external resources called? Certification Authority Domain names that contain the name of the host computer are called Fully Qualified Domain Name. Edge role servers must use ADAM to periodically obtain AD and Exchange information using the Edge-Sync protocol from a server that hosts the Hub role. Email is typically created and sent using an email client program...
Words: 1108 - Pages: 5
...Page19 and 20 Fill in the blank: Complete the following sentences by writing the correct word or words in the blanks provided. 1.The Active Directory database is stored on each domain controller in a file called _____ ntds.dit ____. 2.The Active Directory __ forest ____ is considered the security boundary for an Active Directory environment. 3.To provide fault tolerance, Active Directory utilizes a _ multimaster _ replication model. 4.To create a trust relationship with an NT4 domain, you will configure a(n) __ external trust __. 5.The _ Domain _ naming context is replicated across the domain. 6.The OID of an active directory object identifies its location within the directory structure 7. A(n) __ cross-forest trust __ provides a two-way transitive trust relationship between all domains within two forests. 8.Each domain in an Active Directory forest has a(n) ___ two-way transitive ___ trust relationship with every other domain in a forest. 9.___ Universal group caching ___ allows a user at a remote site to be able to log into Active Directory without needing to contact aglobal catalog server. 10.Active Directory clients rely on ___ SRV records ___ in DNS to locate Active Directory resources such as domain controllers andglobal catalog servers. Multiple Choice Circle the correct choice. 1) B - user 2) c - window server 2008 3) a - Delegation of control 4) c - srv reccord support 5) c - cn=amy,ou=sales,dc=central,dc=cohowinery...
Words: 635 - Pages: 3