Rescued Document
Rescued Document
What type or permissions do you need in order to install the first Exchange server in a forest? In a domain?
How would you verify that the schema was in fact updated?
What type of memory optimization changes could you do for Exchange 2003?
How would you check your Exchange configuration settings to see if they're right?
What are the Exchange management tools? How and where can you install them?
What types of permissions are configurable for Exchange?
How can you grant access for an administrator to access all mailboxes on a specific server?
What is the Send As permission?
What other management tools are used to manage and control Exchange 2003? Name the tools you'd use.
What are Exchange Recipient types? Name 5.
You created a mailbox for a user, yet the mailbox does not appear in ESM. Why?
You wanted to change mailbox access permissions for a mailbox, yet you see the SELF permission alone on the
permissions list. Why?
What are Query Based Distribution groups?
What type of groups would you use when configuring distribution groups in a multiple domain forest?
Name a few configuration options for Exchange recipients.
What's the difference between Exchange 2003 Std. and Ent. editions when related to storage options and size?
Name a few configuration options related to mailbox stores.
What are System Public Folders? Where would you find them?
How would you plan and configure Public Folder redundancy?
How can you immediately stop PF replication?
How can you prevent PF referral across slow WAN links?
What types of PF management tools might you use?
What are the differences between administrative permissions and client permissions in PF?
How can you configure PF replication from the command prompt in Exchange 2003?
What are the message hygiene options you can use natively in Exchange 2003?
What are the configuration options in IMF?
What are virtual servers? When would you use more than one?
Name some of the SMTP Virtual Server configuration options.
What is a Mail Relay? Name a few known mail relay software or hardware options.
What is a Smart Host? Where would you configure it?
What are Routing Groups? When would you use them?
What are the types of Connectors you can use in Exchange?
What is the cost option in Exchange connectors?
What is the Link State Table? How would you view it?
How would you configure mail transfer security between 2 routing groups?
What is the Routing Group Master? Who holds that role?
Explain the configuration steps required to allow Exchange 2003 to send and receive email from the Internet
(consider a one-site multiple server scenario).
What is DS2MB?
What is Forms Based Authentication?
How would you configure OWA's settings on an Exchange server?
What is DSACCESS?
What are Recipient Policies?
How would you work with multiple recipient policies?
What is the "issue" with trying to remove email addresses added by recipient policies? How would you fix that?
What is the RUS?
When would you need to manually create additional RUS?
What are Address Lists?
How would you modify the filter properties of one of the default address lists?
How can you create multiple GALs and allow the users to only see the one related to them?
What is a Front End server? In what scenarios would you use one?
What type of authentication is used on the front end servers?
When would you use NLB?
How would you achieve incoming mail redundancy?
What are the 4 types of Exchange backups?
What is the Dial-Tone server scenario?
When would you use offline backup?
How do you re-install Exchange on a server that has crashed but with AD intact?
What is the dumpster?
What are the e00xxxxx.log files?
What is the e00.chk file?
What is circular logging? When would you use it?
What's the difference between online and offline defrag?
How would you know if it is time to perform an offline defrag of your Exchange stores?
How would you plan for, and perform the offline defrag?
What is the eseutil command?
What is the isinteg command?
How would you monitor Exchange's services and performance? Name 2 or 3 options.
Name all the client connection options in Exchange 2003.
What is Direct Push? What are the requirements to run it?
How would you remote wipe a PPC?
What are the issues with connecting Outlook from a remote computer to your mailbox?
How would you solve those issues? Name 2 or 3 methods
What is RPC over HTTP? What are the requirements to run it?
What is Cached Mode in OL2003/2007?
What are the benefits and "issues" when using cached mode? How would you tackle those issues?
What is S/MIME? What are the usage scenarios for S/MIME?
What are the IPSec usage scenarios for Exchange 2003?
How do you enable SSL on OWA?
What are the considerations for obtaining a digital certificate for SSL on Exchange?
Name a few 3rd-party CAs.
What do you need to consider when using a client-type AV software on an Exchange server?
What are the different clustering options in Exchange 2003? Which one would you choose and why.
A NIC
Properly configured TCP/IP (IP address, subnet mask and - optional - default gateway)
The Windows 2000 or Windows Server 2003 CD media (or at least the i386 folder)
An NTFS Partition
To successfully install AD you must have at least one NTFS formatted partition, preferably the
partition Windows is installed on (This is NOT true when you have performance issues on your
mind. You will then install the AD db on another different fast physical disk, but that's another
topic). To convert a partition (C:) to NTFS type the following command in the command
prompt window:
convert c:/fs:ntfs
The NTFS partition is required for the SYSVOL folder.
IP Configuration
You need a dedicated IP address to install Active Directory. If you do not use a dedicated IP
address, DNS registrations may not work and Active Directory functionality may be lost. If the
computer is a multi-homed computer, the network adapter that is not connected to the
Internet can host the dedicated IP address.
The Active Directory domain controller should point to its own IP address in the DNS server list
to prevent possible DNS connectivity issues.
To configure your IP configuration, use the following steps:
1. Right-click My Network Places, and then click Properties.
2. Right-click Local Area Connection, and then click Properties.
3. Click Internet Protocol (TCP/IP), and then click Properties.Make sure you have a static
and dedicated IP address. If you don't need Internet connectivity through this specific
NIC you can use a Private IP range such as 192.168.0.0 with a Subnet Mask of
255.255.255.0.
4. Click Advanced, and then click the DNS tab. The DNS information should be configured
as follows:
5. Configure the DNS server addresses to point to the DNS server. This should be the
computer's own IP address if it is the first server or if you are not going to configure a
dedicated DNS server.
6. If the Append these DNS suffixes (in order) option is selected for the resolution of
unqualified names, the Active Directory DNS domain name should be listed first, at the
top of the list.
7. Verify that the information in the DNS Suffix for this connection box is the same as the
Active Directory domain name.
Make sure that the Register this connection's addresses in DNS check box is selected.
This is really not a requirement for AD, but if you later want to install and configure Exchange
2000 or other Internet-aware applications or services you'll need an Internet connection.
DNS Configuration
A DNS server that supports Active Directory DNS entries (SRV records) must be present for
Active Directory to function properly. You need to keep in mind the following DNS configuration
issues when you install Active Directory on a home network: Root Zone entries and DNS
Forwarders.
External DNS queries to the Internet do not work if a root zone entry exists on the DNS server.
To resolve this issue, remove the root zone entry. This entry is identified with a dot (.) in the
DNS Manager forward lookup zones. To check for the existence of the root zone entry, open
the forward lookup zones in the DNS Management console. You should see the entry for the
domain. If the "dot" zone exists, delete it. For additional information about the root zone entry
If you plan to have full Internet connectivity then DNS forwarders are necessary to ensure that
all DNS entries are correctly sent to your Internet service provider's DNS server and that
computers on your network will be able to resole Internet addresses correctly. You can only
configure DNS forwarders if no root zone entry is present.
To configure forwarders on the DNS server:
1. Start the DNS Management console.
2. Right-click the name of the server, and then click Properties.
3. On the Forwarders tab, click to select the Enable Forwarders check box.
4. Type the appropriate IP addresses for the DNS servers that may be accepting
forwarded requests from this DNS server. The list reads top-down in order, so place a
preferred DNS server at the top of the list.
5. It is recommended that you have all the Root Hints (Top Level DNS server) listed in the
Root Hints tab
Client Connections
When you have a scenario in which clients on the LAN connect directly to the Internet and not
through a NAT device, the clients should connect to the Active Directory domain controller
using an internal network on a second network adapter. This prevents any issues that may
arise if clients obtain an IP address from your Internet service provider (ISP). You can achieve
this configuration with a second network adapter on the server connected to a hub. You can
use NAT or ICS to isolate the clients on the local network. The clients should point to the
domain's DNS server to ensure proper DNS connectivity. The DNS server's forwarder will then
allow the clients to access DNS addresses on the Internet.
3. Un-check the File and Print Sharing for Microsoft Networks check box.
4. Click TCP/IP and then Properties.
5. Click Advanced and go to the WINS tab.
6. Select the Disable NetBIOS Over TCP/IP radio box.
You can use ADMT to migrate users, groups, and computers from one domain to another, and
analyze the migration affect before and after the actual migration process.
Note: This article assumes that the source domain is a Windows 2000-based domain, and that
the target domain is a Windows Server 2003-based domain in Windows 2000 Native mode or
later.
The computer on which you install ADMTv2 must be a member of either the source or the
target domain.
Intraforest Migration
Intraforest migration does not require any special domain configuration. The account you use
to run ADMT must have enough permissions to perform the actions that are requested by
ADMT. For example, the account must have the right to delete accounts in the source domain,
and to create accounts in the target domain.
Intraforest migration is a move operation instead of a copy operation. These migrations are
said to be destructive because after the move, the migrated objects no longer exist in the
source domain. Because the object is moved instead of copied, some actions that are optional
in interforest migrations occur automatically. Specifically, the sIDHistory and password are
automatically migrated during all intraforest migrations.
Interforest Migration
ADMT requires the following permissions to run properly:
Before you migrate a Windows 2000-based domain to a Windows Server 2003-based domain,
you must make some domain and security configurations. Computer migration and security
translation do not require any special domain configuration. However, each computer you want
to migrate must have the administrative shares, C$ and ADMIN$.
The account you use to run ADMT must have enough permissions to complete the required
tasks. The account must have permission to create computer accounts in the target domain
and organizational unit, and must be a member of the local Administrators group on each
computer to be migrated.
1. Create a new local group in the source domain that is named %sourcedomain%$$$.
There must be no members in this group.
2. Turn on auditing for the success and failure of Audit account management on both
domains in the Default Domain Controllers policy.
3. Configure the source domain to allow RPC access to the SAM by configuring the
following registry entry on the PDC Emulator in the source domain with a DWORD value
of 1:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\
Control\LSA\TcpipClientSupport
You must restart the PDC Emulator after you make this change.
Note: For Windows 2000 domains, the account you use to run ADMTv2 must have domain
administrator permissions in both the source and target domains. For Windows Server 2003
target domains, the 'Migrate sIDHistory' may be delegated. For more information, see
Windows Server 2003 Help & Support.
You can turn on interforest password migration by installing a DLL that runs in the context of
LSA. By running in this protected context, passwords are shielded from being viewed in
cleartext, even by the operating system. The installation of the DLL is protected by a secret
key that is created by ADMTv2, and must be installed by an administrator.
To install the password migration DLL:
1. Log on as an administrator or equivalent to the computer on which ADMTv2 is installed.
The changed data is replicated between domain controllers, not the database, so there is no
guarantee that the files are going to be the same size across all domain controllers.
Windows 2000 and Windows Server 2003 servers running Directory Services (DS) perform a
directory online defragmentation every 12 hours by default as part of the garbage-collection
process. This defragmentation only moves data around the database file (NTDS.DIT) and
doesnt reduce the files size - the database file cannot be compacted while Active Directory is
mounted.
Active Directory routinely performs online database defragmentation, but this is limited to the
disposal of tombstoned objects. The database file cannot be compacted while Active Directory
is mounted (or online).
An NTDS.DIT file that has been defragmented offline (compacted), can be much smaller than
the NTDS.DIT file on its peers.
However, defragmenting the NTDS.DIT file isnt something you should really need to do.
Normally, the database self-tunes and automatically tombstoning the records then sweeping
them away when the tombstone lifetime has passed to make that space available for additional
records.
Defragging the NTDS.DIT file probably wont help your AD queries go any faster in the long
run.
So why defrag it in the first place?
One reason you might want to defrag your NTDS.DIT file is to save space, for example if you
deleted a large number of records at one time.
To create a new, smaller NTDS.DIT file and to enable offline defragmentation, perform the
following steps:
1. Back up Active Directory (AD).
2. Reboot the server, select the OS option, and press F8 for advanced options.
3. Select the Directory Services Restore Mode option, and press Enter. Press
4. Enter again to start the OS.
5. W2K will start in safe mode, with no DS running.
6. Use the local SAMs administrator account and password to log on.
7. Youll see a dialog box that says youre in safe mode. Click OK.
8. From the Start menu, select Run and type cmd.exe
9. In the command window, youll see the following text. (Enter the commands in bold.)
C:\> ntdsutil
ntdsutil: files
file maintenance:info
....
file maintenance:compact to c:\temp
10. Youll see the defragmentation process. If the process was successful, enter quit to
return to the command prompt.
11. Then, replace the old NTDS.DIT file with the new, compressed version. (Enter the
commands in bold.)
If you want to check something in NTDSUTIL that is allowed only in Directory Restore mode,
you can "trick" the program by typing the following statement at a command prompt:
set SAFEBOOT_OPTION=DSREPAIR
Lamer Note: Type the above command into a different CMD window, NOT the one that NTDSUTIL is running in.
Don't use this approach on a live or important machine because it could result in system
damage if you try to perform system modifications when the system isn't in Directory Restore
mode.
By default, the Windows 2000 Active Directory searches 10,000 objects at a time. This policy
affects all browse displays associated with AD, the Microsoft Management Console (MMC) Active
Directory Users and Computers snap-in, and the dialog boxes you use to set permissions for user or
group objects in AD. As your organization grows, you might need to change the number of objects
to search.
To set the number for a group policy object:
1. Start the MMC Active Directory Users and Computers snap-in.
2. Right-click the container, and select Properties.
3. Select the Group Policy tab.
4. Select the Group Policy Object, and select Edit.
5. Select the User Configuration branch, and expand Administrative Templates > Desktop
> Active Directory.
6. Double-click Maximum size of Active Directory searches.
7. Select Enabled, and set the number (e.g., 20000).
8. Click Apply.
9. Click OK.
10. Close the Group Policy Editor.
To edit the registry to set the number for a user:
1. Start regedit.
2. Go to the
HKEY_CURRENT_USER\Softw are\Policies\Microsoft
registry entry.
3. From the Edit menu, select New > Key.
4. Enter
Window s
5. Select the new Windows key, and from the Edit menu, select New, Key.
6. Enter
Directory UI
7. Go to the Directory UI key, and from the Edit menu, select New, DWORD Value.
8. Enter
QueryLimit
In addition, the Sizer tool provides approximate estimates for the following:
The list of information to be gathered per domain to accurately size the domain controllers
includes:
Average number of groups a user belongs to. The number of groups a user belongs to
can affect the time to process a logon request. The logon request evaluates user access
by looking at the access granted to each group the user belongs to.
Average logon rate per second during peak hours (interactive, batch and network).
Interactive logon type is intended for users who will be interactively using the machine,
such as a user being logged on using Terminal Services, a remote shell, or similar
process. Batch logon type is intended for batch servers, where processes may be
executing on behalf of a user without their direct intervention; or for higher
performance servers that process many clear-text authentication attempts at a time,
such as mail or Web servers. Network logon type is intended for high performance
servers to authenticate clear text passwords. This type is used to access other network
resources, such as remote servers or printers.
Number of other objects published in this domain. Other objects are any objects other
than users and computers that will be included in Active Directory. For example, user
groups, organizational units, contacts, printers or shares would be consider "other
objects".
Administration. This section allows an administrator to specify the administratorgenerated workload for object addition, deletion, or modification to Active Directory.
The planned average number of objects added, deleted, or modified on a daily, weekly,
or yearly interval should be entered.
Microsoft Exchange 2000. Microsoft Exchange 2000 Server uses Active Directory for
directory services, transport and name resolution. If planning to install Exchange 2000,
enter the average number of messages per user/per day and the average number of
recipients for each message.
DNS related issues. This section allows an administrator to specify whether Active
Directory-integrated DNS zones will be used, the number of dial-in connections (per
day) that will be made by computers joined to the domain, the duration of DHCP
leases, and the behavior of the DNS Server aging and scavenging feature.
Other Active Directory-enabled application issues. This section covers other Active
Directory-enabled applications that are not specifically known by the tool. Changes
introduced by Active Directory Connector (ADC) or other directory synchronization
programs (such as Microsoft Directory Synchronization Services) should be estimated in
operations per second for searching, adding, deleting, and modifying objects.
Note: These estimates were planned on old Dell POWEREDGE 6300 servers. With today's
hardware available you'd expect Microsoft to produce more up-to-date templates for this
useful tool - but they haven't.
_ldap._tcp.<DNSDomainName>
_ldap._tcp.<SiteName>._sites.<DNSDomainName>
Enables a client to find a W2K domain controller in the domain and site specified (e.g.,
_ldap._tcp.lab._sites.dpetri.net for a domain controller in the Lab site of dpetri.net).
_ldap._tcp.pdc._ms-dcs.<DNSDomainName>
Enables a client to find the PDC flexible single master object (FSMO) role holder of a mixedmode domain. Only the PDC of the domain registers this record.
_ldap._tcp.gc._msdcs.<DNSTreeName>
Enables a client to find a Global Catalog (GC) server. Only domain controllers serving as GC
servers for the tree will register this name. If a server ceases to be a GC server, the server will
deregister the record.
_ldap._tcp. ._sites.gc._msdcs.<DNSTreeName>
_ldap._tcp.<DomainGuid>.domains._msdcs.<DNSTreeName>
Enables a client to find a domain controller in a domain based on the domain controllers
globally unique ID. A GUID is a 128-bit (8 byte) number that generates automatically for
referencing Active Directory objects.
<DNSDomainName>
The CD comes with AVI movies that can be played through the Camtasia player supplied on the CD
or Windows Media player but first the Camtasia codec must be installed. I prefer Windows Media
player due to the video time played display. Makes it easier to restart at a point after stopping or
bookmarking an area of interest.
This instructional CD comes with several videos. The first to look at is Concepts. This covers the terms used in
Windows 2003 Server, what they mean and how they apply to the O/S. Each concept is explained fully with some cross
covering of the explained terms during the introduction to the new one. I found this very useful as the repetition of the
explanations assisted with the absorption of the new information or old (forgotten) material revisited. These concept
explanations provide a good grounding for what is to come.
The next video in the list covers the new features in Active Directory in Windows 2003. Once again these features are
explained in an easy to understand fashion with examples given. Important features are noted and talked about in
greater detail or even cross covered with an interlocking feature. I especially liked the Drag & Drop feature in AD
along with the ability to now disable the built-in Administrator account.
Although listed as Lab 1 on the CD, I am going to refer to it as Video 1 to avoid confusion with the various individual
Train Signal Labs.
Video 1 starts with a run through of the steps that will take place during the installation of AD and DNS. It is gone into
in sufficient depth but it is done in such a way that they make it easy for the complete novice to understand. What
surprised me was that during installation of AD, a DNS error occurred. Instead of stopping the video, fixing the error
and re-recording that segment, Scott (the instructor) found out what caused the problem and then proceeded to show
what was wrong and how to fix it, leaving that valuable information in the video. This added to the video by inserting a
diagnostic segment into the video. Absolutely brilliant and a case of Train Signal providing more bang for your buck.
Nothing seems too small to be included. Even the simple operation of converting a FAT32 partition to the necessary
NTFS one that is required for the AD database is included.
Video 2 is an interesting, informative and in depth look into AD Organizational Units (OU) and Group Policy Objects
(GPO). (Windows 2000 had around 500 policies, 2003 has around 1000.) Correct design of OUs makes applying GPOs
extremely efficient. This video gives, once again, easy to understand and follow instructions and examples. This
particular video made me realize just how damn good this Train Signal training course is. I have installed Windows
2003 Server several dozen times, read bible sized books about it but never caught on to the multitude of Right Click
options that are available in AD. The information in this video is very detailed and this video alone is worth purchasing
the product.
Video 3 looked more deeply into Active Directory features that allow you to manage policy, software, desktop
restrictions, security settings and more from one centralized interface. Sounds a lot, well it is a lot! I made over a page
of notes on this video alone when preparing this review. Not only is the video chock full of goodies but it also goes over
related information from videos 1 and 2. For me this helped drive home the message on some of the fundamentals that
just have to be known. Details are not just glassed over with the hope they will be remembered. The repartition may get
annoying when you replay the videos several times, but hey, you dont forget it. GPO Editor is given a good workout
and you come away with a good understanding of it and how to apply a GPO. I loved the part of making sure a GPO is
not applied to the Admins. After some practice in my lab I cant wait to apply the new knowledge and apply it on a live
network. The Losers arent going to know what hit them.
Video 4 is about AD from the AD users perspective and publishing resources so they can be searched for in AD. Again
nothing is too small to be included. You are shown how to create a SHARE, publish it in AD so you can search for that
share in AD. The difference between object permission and the actual share permission is explained and how to apply
keywords to a share to make searching for it easier. It means users dont have to remember the share name anymore,
just the keyword or keywords. Sweet!!! The Saved Query tutorial included in the video showed that this is also a pretty
useful tool to have.
These instructional videos are professionally made. I was impressed that each video was made in one hit until I noticed
the time on the Taskbar in the various videos. Some of the segments were hours apart but have been made to appear
seamless. You just dont notice that the instructor has finished, gone home, slept and come back and finished it the next
day. I also found myself asking a question at one stage because it felt like I was sitting in the same room as Scott. It is
just like having a personal tutor. I was also pleased to discover that Scott and I have the same make of malfunctioning
keyboard. Mine also has trouble spelling many of the same words.
I found this CD to be extremely useful. I wish I had found Train Signal before I forked out $850 on 2003 books. It also
convinced me I need more Train Signal Labs. I would also like to point out that I am in no way affiliated with Train
Signal nor was I paid to write this review. This is just an excellent product that demystifies a complex operating system.
Adding items to the Schema, also called "extending the Schema", or even modifying existing objects can be a tricky
business, and if done without proper knowledge, can be very destructive to your existing Active Directory
infrastructure. This is because the Schema is a forest-wide setting, and any additions or changes to the Schema will be
immediately replicated to each and every Domain Controller in each and every domain in your AD Forest. You cannot
make any changes to the Schema and yet keep it within your domain's boundaries. Furthermore, changing existing
attributes (such as configuring an attribute to replicate itself to the Global Catalog) will cause a forest-wide replication
of all the attributes and objects, even if your change was just made on one attribute. Note that this behavior was
changed in Windows Server 2003, but even so, you might unintentionally cause a major network load and a lot of
overhead by simply clicking one one small checkbox on one small attribute.
Many articles talk about adding items and extending the Schema. However on this article I wish to show you a simple
method of adding attributes to the Schema, and by using these examples you can modify them and use them for your
own purposes.
Requirements
Warning! First, let me stress the fact that the Schema is not a child's play. If you don't know what you're doing - stop
now. Go read a good book about AD, consult a knowledgeable friend, go play with traffic. Don't blame me if you mess
up your corporate network because you've made careless changes to the schema. Read my lips: I will not be held
responsible for any of your actions, and for any of the results that follow these actions.
regsvr32 schmmgmt.dll
2.
3.
4.
Click Add, then, in the Add Standalone Snap-in window, select the Active Directory Schema snap-in from the
list. Next click Add again.
5.
Click Ok.
2.
In the MC window from the previous procedure, under the Console Root, double-click on the Active Directory
Schema snap-in and let it load (you'll know when it has loaded when you will see 2 nodes under the root Classes and Attributes)
Right-click Active Directory Schema (your domain controller name) and
regsvr32 schmmgmt.dll
If the account was already disabled, then an option to enable it appears when you right-click that user account in
DSA.MSC.
However, if that administrator wanted to just unlock the user account, not enable it, then he or she would need to select
the user account in DSA.MSC, right-click it and choose Properties, then go to the Account tab, and un-check the
Account is Locked Out option. This process is considerably longer than the one required when enabling a disabled
account.To make the life of the administrator easier (thus leaving him or her more time to play online games) we can
add a small addition to the Active Directory onfiguration partition, and then have the ability to unlock a user account by
simply right-clicking on that account (as you would do
One method of viewing additional information about user accounts is by using the Acctinfo.dll addin for Active Directory Users and Computers
Another method is by adding some right-click (context menu) options to the user account objects. By right-clicking a
user object you will be able to view some more information about any user account you want, information that includes
the last logon time, the user's logon script, the last time the user has changed his or her password and so on.
One method for an administrator to add such extensions to the GPO is by adding new settings to the Administrative
Templates sections. This can be done by adding .ADM files to the existing Administrative Templates section in GPO.
1. Open the Group Policy Management Console (or GPMC) from the Administrative Tools folder in the Stat
menu, or by typing gpmc.msc in the Run command.
Note: GPMC is not a built-in part of Windows 2000/XP/2003, and needs to be separately installed. You can download
GPMC from the following link (Download GPMC), yet remember it can only be used effectively on Windows Server
2003-based Active Directory.
If you do not have GPMC or cannot install it then you'll need to edit the GPO via the regular means, i.e. from Active
Directory Users and Computers management tool (dsa.msc).
2. Right-click an existing GPO (or create an new GPO, then right-click on it) and select Edit.
3. Expand either the Computer settings or Users settings sections of the GPO. Go to the appropriate
Administrative Templates section and right-click it. Select Add/Remove Templates.
5.
Browse to the location of the required .ADM file and click Open.
6. In the Add/Remove Templates window notice that the new .ADM file is listed, then click Close.
Now re-open the Administrative Templates section and browse to the new settings location.
After completing the above procedure, browse to the newly added Administrative Template section.
Note that the section is indeed listed, however in the right-pane is empty.
2. Right-click an empty spot in the right pane and select View > Filtering.
3. In the Filtering window click to un-mark the "Only show policy settings that can be fully managed" option.
Then click Ok.
4.
Notice how the available options are now displayed in the right pane.
Well, luckily for us, in most cases there are no additional configuration steps involved. When adding the new .ADM file
it is automatically uploaded to the following location on the DC that was used to edit the GPO (usually - the PDC
Emulator, read more in the Understanding FSMO Roles in Active Directory article):
%SystemRoot%\SYSVOL\sysvol\domain name\Policies\{GPO GUID}\Adm
as seen clearly in the following screenshot:
Because all of the SYSVOL folder is shared and automatically replicated all over the domain, the uploaded .ADM file
will automatically replicated to all the GPO instances on all DCs in the domain.
However this might cause a problem when using too many templates and too many GPOs, especially on slow WAN
links.
In Windows Server 2003, the size of the Administrative Templates has grown when compared to the same .ADM files
in Windows 2000. As a result, the entire set of Administrative Templates has grown to almost 1.75MB. When you
multiply this size by each Policy that SYSVOL contains, you can see that much space is devoted to these templates.
For example, for a large corporation with 1200 GPOs in place, the entire SYSVOL folder (where the GPOs are located
on each DC) can take up more than 1GB of hard disk space. Replicating such a folder over the WAN (especially when
promoting a new DC) can be very problematic. Here is where the following article - Install DC from Media in
Windows Server 2003 - comes in very handy.
How to remotely administer computers that are running Windows 2000 Server family
products or Windows Server 2003 family products from Windows Server 2003 and
Windows XP-based clients that are using the Release to Manufacturing (RTM) version of
the Adminpak.msi file from the Windows Server 2003 media.
How to download the RTM version of the Windows Server 2003 Administration Tools
Pack from the Microsoft Web site.
Known issues that may occur when you use Administration tools from the Windows
Server 2003 Adminpak.msi file to manage Windows 2000-based and Windows Server
2003-based computers.
Compatibility issues that occur when Windows 2000 Professional-based computers that
have Windows 2000 Administration tools installed are upgraded to Windows XP.
Compatibility issues that occur when Windows 2000 domain controllers are upgraded to
Windows Server 2003 domain controllers
Note: You might also want to read Download Windows 2003 Adminpak, Administer Exchange
2003 from Windows XP SP1, Administer Exchange 2000 from Windows XP SP1 and Extract
Specific Tools from Adminpak.msi.
With the RTM version of the Windows Server 2003 Administration Tools Pack, you can manage
the following operating systems:
The Adminpak.msi (Adminpak) file is a self-extracting file that contains commonly used
administrative tools. The Adminpak.msi file is located in the \I386 folder on the Windows
Server 2003 CD-ROM or as a separate Web download package.
If you want to remotely administer Windows 2000 Server or Windows Server 2003 family
member-based computers and domain controllers from Windows XP Professional or Windows
Server 2003 family-based clients, note the following issues:
You must completely remove previous beta versions of the Windows Server 2003
Administration Tools package before you install the final release version.
Note In some limited cases, servers must be administered from clients that are running
the same operating system version. For example, some remote administration
operations against Windows 2000-based servers can be accomplished only from
Windows 2000-based clients. Similarly, some operations against Windows Server 2003based computers can be accomplished only from Windows XP-based or Windows Server
2003 clients. This article documents these limitations or restrictions for each tool that is
included in the Administration Tools package.
The administration tools from the Windows 2000 Adminpak.msi file that are installed on
Windows 2000-based computers that are later upgraded to Windows XP Professional do
not start or operate correctly. The Winnt32.exe upgrade process warns you to remove
the Windows 2000 version of Adminpak.msi. Either remove the Windows 2000
Adminpak.msi file before the upgrade or reinstall the Windows Server 2003
Administration Tools Pack after the upgrade. You can use the Winnt32.exe
/checkupgradeonly flag to determine if the Windows 2000 Adminpak is installed before
you upgrade any computer.
You cannot install the Windows 2000 Adminpak.msi file on Windows XP-based clients or
on Windows Server 2003 family-based computers. These tools no longer work on these
platforms and are not supported. Please use the Windows Server 2003 version of the
Administration Tools pack.
The Windows Server 2003 RTM version of Adminpak.msi can only be installed on
computers that are running the Windows Server 2003 family, Windows XP Professional
with SP1 or later, and Windows XP Professional build 2600 with QFE Q329357.
If you are using Windows XP Professional with QFE Q329357 and the Windows
Server2003 Administration Tools pack, you cannot administer Cluster servers. However,
if you are using Windows XP Professional with SP1 and the Windows Server 2003
Administration Tools Pack, you can manage Cluster servers.
Windows XP Professional does not include the Windows Server 2003 Adminpak.msi file
because these tools are part of the Windows Server 2003 product and are shipped
when that product is released
The majority of the Windows Server 2003 Administration tools work the same as the
Windows 2000 counterparts. In some cases, the Windows Server 2003 Administration
tools offer enhanced functionality over their Windows 2000 counterparts. In rare cases,
Windows Server 2003 tools are incompatible and unsupported for managing Windows
2000 Server-based computers. Similarly, in rare cases, Windows 2000 tools are
incompatible with Windows Server 2003-based family computers.
Enhanced functionality in Windows Server 2003 Administration tools may not be turned
on or supported when you administer Windows 2000-based computers. For example,
the new drag-and-drop feature of the Windows Server 2003 Users and Computers
snap-in is fully functional against Windows 2000-based domain controllers.
required attributes. In most cases, these advanced features are not visible or are not
turned on when Administration tools are used against Windows 2000-based computers.
Windows 2000 and the Windows Server 2003 Administration Tools Package
The Windows Server 2003 Administration Tools package cannot be installed or run on Windows
2000-based computers. If you try to install the Windows Server 2003 Administration Tools
package on a Windows 2000-based computer, you receive the following error message:
Windows Server2003 Administration Tools Pack can only be installed on Windows XP
Professional with QFE Q329357 applied, or on Windows XP Professional SP1 or later, or on
computers running Windows Server 2003 operating systems.
Service pack level mismatch. Please obtain the Administration Tools Pack that matches the
service pack level of your operating system.
Similarly, the command-line utilities from the Windows Server 2003 Administration Tools
package are designed to run on Windows XP and the Windows Server 2003 family only.
Command-line utilities in the Windows Server 2003 Administration Tools package do not run if
there is a DLL mismatch or an entry point error (if you copy the utilities to a Windows 2000based computer). If you try to install Windows 2000 Administration Tools package on a
Windows Server 2003-based computer, you receive the following error message:
By default, anonymous LDAP operations, except rootDSE searches and binds, are not permitted on Windows
domain controllers. This means that when trying to perform unauthenticated search in Active Directory, you c
for attributes of the RootDSE object only any other query will result in domain controller requesting authent
to LDAP and refusing to your query.
Actually this is new behavior compared to Windows 2000 domain controllers which allowed anonymous opera
the query results were based only on the permissions of the objects.
"So what is it good for?" you might ask yourself. Well, one of the reasons is minimizing the impact of potentia
service (DoS) attacks against AD. Consider a malicious application performing an anonymous LDAP query aga
domain controller. Theoretically, by crafting a very complicated LDAP filter with a "Sub" scope, an attacker co
overload the LDAP server which would result in significant degradation in domain controller performance and
denial of service.
Why you might want to enable anonymous binds? Usually this is desired when you need to provide an easy a
subset of information stored in AD to 3rd party applications that are not capable of authenticating to AD or th
information is intended to be in public domain from the beginning and you are storing it in AD. The scenarios
infinite, but before enabling anonymous operations make sure that you truly understand the implications of th
the change (though reversible) does increase the security risks to your environment.
Let's have a look at what are we allowed to see when we are trying to perform an anonymous lookup against
domain controller.
The query below is performed from a Linux machine just to eliminate the query tools attempts on Windows to
GSSAPI authentication in the background.
-h
descartes.antid0t.net
-b ''
-x
-LLL
-s base
'objectClass=*'
Not much, right? Just enough to be able to negotiate the correct authentication dialect, learn about LDAP pro
versions supported, enumerate the partitions and acquire some more details about the LDAP semantics suppo
the server.
Notice that I had to use "base" scope query. Trying to perform "Subtree" or "OneLevel" query would yield the
requiring authenticated bind:
Where <forestRoot> is the root domain of your forest (in my case this is DC=antid0t,DC=net)
2. Right click the "CN=Directory Services" container, choose "Properties" from the context menu and scro
the dsHeuristics attribute
3. If the attribute is not set (has no value), fill in "0000002" in the value field.
The last (seventh) character is the one that controls the way you can bind to LDAP service. "0" or no s
character means that anonymous LDAP operations are disabled. Setting the seventh character to "2" p
anonymous operations (you are still subject to Access Control Lists of the objects in AD)
Warning: if the attribute already contains a value, make sure you are changing only the seventh character fro
this is the only character that needs to be changed in order to enable anonymous binds. So for example if t
value is "0010000", you will need to change it to "0010002".
If the current value is less than 7 characters, you will need to put zeros in the places not used: "001" will bec
"0010002"
4. Make yourself a cup of coffee and wait till the change is replicated to all you DCs in the forest. The new
be picked up without any need for server reboots or service restarts. Meanwhile you can get a bit mor
about the process from MS KB article 326690.
As you can see, now we are allowed a little more: we are allowed to perform "Sub" queries against all the AD
Though this step allows unauthenticated operations against AD, only a very small subset of attributes are bei
exposed. The step can be compared to opening the lobby door of an apartment building you can travel arou
the doors to the apartments are closed.
This step involves granting NT AUTHORITY\ANONYMOUS LOGON (well know security principal) access to ob
want to be able to be located by the means of anonymous lookups. This can be compared to opening some d
apartments inside the building.
Let's give it a try and expose some details about one of my computers to the public:
6. In the ACL you will notice that now " ANONYMOUS LOGON" has access to some property sets of the co
object (you can actually grant more granular access permissions to the object, but this is beyond the s
this article).
Hey! This didn't work! Well, apparently there is a good reason for that: you need to grant at least "List Conte
permission to the "ANONYMOUS LOGON" on the OU the object, you are querying for, resides in.
How do you do that?
1. In Active Directory Users and Computers, right-click the OU the object is located in and choose Proper
2. Click the Security tab and click advanced.
3. Click the Add button and in the dialog that opens type in "ANONYMOUS LOGON".
4. Acknowledge the dialog. This will open a new dialog window.
5. In the "Apply to" drop-down box choose "This object only" and tick the "List Contents" checkbox as sh
picture:
ADSI Concepts
It is necessary to understand some terminology before delving into ADSI programming.
Component Object Model (COM) A technology that allows the creation of binary compatible software components. This
simply means that a COM component is a chunk of software that may be accessed anywhere a COM system is available.
This is regardless of location, language or even operating system. It helps to think of this in a similar fashion to the Java
system. Java may run wherever a Java Virtual Machine (JVM) is available. COM is accessible wherever a COM subsystem is
available. But do not confuse the purposes of COM and Java. They are two very different technologies with different
purposes.
Interface A set of functions that are packaged and grouped together according to purpose. COM components provide a
number of Interfaces that are available for use in applications. For example later in this article I will demonstrate using the
IADsContainer interface (the leading I designates this as an interface) to access an LDAP directory.
Provider A provider is the software that services requests to some external resource. The resource may be the Active
Directory, an LDAP director or an application such as Internet Information Services.
Binding Binding is the process of connecting a provider to a physical instance of a resource. Simply put, if I want to
manipulate objects in my AD domain called Johnson, I would first bind to the Johnson domain. Then I could create, modify,
update, search for or delete objects in the Johnson AD at will.
Using ADSI
In order to manipulate anything in a namespace with ADSI, you must first bind to it. After binding, you may perform any
operations on objects in the namespace you wish.
A typical ADSI application follows this format. Note that this is not real code and is for illustration purposes only:
1.
2.
3.
4.
Notice how the process of binding returns an object that is stored in a variable. The object returned is actually an interface
variable. This interface variable is used as the tool to do the actual manipulation of the bound resource. Thats about all there
is to it. If you can understand this simple example, you are well on your way to using ADSI.
ADSI Examples
LDAP Example
This is an example of connecting to a Sun One Directory Server and enumerating the users in a branch of the directory:
1.
2.
3.
4.
5.
6.
7.
option explicit
dim Container ' as IADsContainer
dim Entry 'as IADs
dim Where 'as String
dim Filter 'as Variant
Where = "/ou=People"
set Container = GetObject ("LDAP://192.168.1.105:59822/DC=NET/DC=COMCAST/DC=IL/DC=HSD1" &
Where)
8. for each entry in Container
9. wscript.echo entry.name
10. wscript.echo entry.get("mail")
11. next
Line 1 turns on explicit variable declaration. This makes it easier to catch typos in variable names.
Lines 2-5 declare variables for use within the script. This script is written using VBScript (vbs) and therefore does not use
typed variables. Every variable is a variant (can hold a value of any type). However, I show the variable type as a comment
for documentation purposes. It is also useful when moving a script between vbs and its big brother Visual Basic.
Line 6 sets the Where variable to the location in the directory where enumeration will begin.
Line 7 is where the interesting stuff begins. Here is where the provider is bound to my test directory. Notice that the ldap port
use is 59822 instead of 389. Also the contents of the Where variable is concatenated to the connection string to form the full
LDAP URL. The GetObject function returns object of type IADsContainer, which is a collection of directory entries.
Lines 8 and 11 form a loop around two console output statements that print the desired directory information.
Line 9 is an example of a property of the interface variable. Each directory entry interface object has a name property that
corresponds to the name of the entry in the ldap directory.
Line 10 is an example of a property on the directory entry itself, not the interface variable. These types of properties must be
accessed via the get method on the interface variable. This example gets the mail property which is typically an rfc822 email
address.
Executing this script against my test LDAP server produces the following output:
C:\scripts>SunOneDirServerUserDump
uid=KJohnson
[email protected]
uid=RJohnson
[email protected]
uid=tadmin
C:\scripts\SunOneDirServerUserDump.vbs(12, 2) Ac
Notice the error message on the last lines. This is because the mail field is undefined for the tadmin user.
Active Directory Example 1
This example shows how to enumerate objects in the Active Directory. This script takes up to two arguments. The first
argument is a starting location in the directory to use for enumeration. The second is a filter to limit the returned results to a
particular object type. To run this script, simply type the name of the script into a command prompt. adexa1.vbs
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
adexa1.vbs
option explicit 'Always use explicit variable declaration!!!
dim RootDSE 'as IAD
dim Container 'as IADsContainer
dim Entry 'as IADs
dim Location 'as String
dim Filter 'as string
if(WScript.Arguments.Count > 0) then
Location = WScript.Arguments(0)
end if
if(WScript.Arguments.Count > 1) then
Filter = WScript.Arguments(1)
end if
set RootDSE = GetObject("LDAP://RootDSE")
set Container = GetObject("LDAP://"& Location & "," & RootDSE.get("DefaultNamingContext"))
if(Filter <> "") then
Container.Filter = Array(Filter)
18.
19.
20.
21.
22.
end if
For Each Entry in Container
wscript.echo Entry.Name
Next
Wscript.Quit
Windows NT Example
Yes thats right, Windows NT. I know you still remember it. This is just to show you that it did work in Windows NT. Not
that any NT 4 boxes still exist to actually test this out
1.
2.
3.
4.
5.
6.
NewUser.SetInfo
Closing Remarks
There is one more thing worth mentioning for budding ADSI scripters, the EzAD Scriptomatic. This is a little tool available
from Microsoft that allows you to select operations from a couple of drop down text lists and then generate a corresponding
script. This is pretty cool if you are just learning ADSI scripting and want to see how to do a few common ADSI scripting
tasks. This tool is available from the Microsoft Technet script center.
ADSI scripting is very powerful, and this article shows a small sampling of what can be accomplished with ADSI scripting.
Use the links below to find out more about ADSI technology.
Featured Product
Windows Key by LostPassword.com - Use this easy tool to reset any
Windows local or domain controller password in a minute. Money-back
guarantee. Download FREE version now!
The Administrator password that you use when you start Recovery Console or when you press
F8 to start Directory Service Restore Mode is stored in the registry-based Security Accounts
Manager (SAM) on the local computer. The SAM is located in the %SystemRoot
%\System32\Config folder. The SAM-based account and password are computer specific and
they are not replicated to other domain controllers in the domain.
For ease of administration of domain controllers or for additional security measures, you can
change the Administrator password for the local SAM. To change the local Administrator
password that you use when you start Recovery Console or when you start Directory Service
Restore Mode, use one of the following methods:
Method #1
If Windows 2000 Service Pack 2 or later is installed on your computer, you can use the
Setpwd.exe utility to change the SAM-based Administrator password. To do this:
1. At a command prompt, change to the %SystemRoot%\System32 folder.
2. To change the local SAM-based Administrator password, type
setpw d
and then press ENTER, where servername is the name of the remote domain controller.
1. When you are prompted to type the password for the Directory Service Restore Mode
Administrator account, type the new password that you want to use.
Note: If you make a mistake, repeat these steps to run setpwd again.
Method #2
On Windows 2000, if you do know the Directory Service Restore Mode Administrator password you can
easily change it to something else by using the following method:
1. Shut down the domain controller on which you want to change the password.
2. Restart the computer. When the selection menu screen is displayed during the restart
process, press F8 to view advanced startup options.
3. Select the Directory Service Restore Mode option.
4. After you successfully log on, use one of the following methods to change the local
Administrator password:
At a command prompt, type the following command:
or
Use the Local User and Groups snap-in (Lusrmgr.msc) to change the Administrator password.
5. Shut down and restart the computer.
You can now use the Administrator account to log on to Recovery Console or Directory Services
Restore Mode using the new password.
Method #3
On Windows 2000, if you do not know the Directory Service Restore Mode Administrator password you
can easily change it to something else by using the following method:
1. At a command prompt, type the following command:
net user administrator 123456
Method #4
On Windows Server 2003, the setpwd or NET USER trick won't work. Here, if you want to change the Directory
Service Restore Mode Administrator password you'll need to use the following method:
1.
ntdsutil
2.
3.
To reset the password on the server on which you are working, type
reset passw ord on server null
The null variable assumes that the DSRM password is being reset on the local computer. Type the new password when
you are prompted. Note that no characters appear while you type the password.
or
To reset the password for another server, type
reset passw ord on server <servername>
where <servername> is the DNS name for the server on which you are resetting the DSRM password. Type the new
password when you are prompted. Note that no characters appear while you type the password.
4.
5.
You can now use the Administrator account to log on to Recovery Console or Directory Services
Restore Mode using the new password.
By default, the Active Directory tombstone lifetime is sixty days. This value can be changed if necessary. To change this
value, the tombstoneLifetime attribute of the CN=Directory Service object in the configuration partition must be modified.
This object is located here:
cn=Directory Service,cn=Window s NT,cn=Services,cn=Configuration,dc
Note: Longer tombstone lifetime decreases the chance that a deleted object remains in the local directory of a disconnected
DC beyond the time when the object is permanently deleted from online DCs. The tombstone lifetime is not changed
automatically when you upgrade to Windows Server 2003 with SP1, but you can change the tombstone lifetime manually
after the upgrade. New forests that are installed with Windows Server 2003 with SP1 have a default tombstone lifetime of
180 days.
You can check your tombstone lifetime attribute by using the following command:
dsquery * " cn=Directory Service,cn=Window s NT,cn=Services,cn=Conf
There are several ways of modifying this attributes value, the easiest is using ADSIEdit.
On the Start menu, point to Run and then type ADSIEdit.msc and press Enter.
2. Navigate to:
Where "ForestRootDN" is the Distinguished Name of your Active Directory Forest Root domain. For example, if
your domain's name is kuku.co.il, then the DN for it would be:
DC=kuku,DC=co,DC=il
3.
4. In the resultant properties dialog, scroll down to tombstoneLifetime, select this attribute and choose Edit.
5.
6.
When you view properties on cn=Directory Service,cn=Windows NT, cn=Services,cn=Configuration,dc=, if no value is set it
means that the default value is in effect. Any value that you type in the Edit Attribute box replaces the default value when you
click Set .
The default value for these two attributes applies if the attribute is not set (the initial state of the system).
Note: Don't forget the "-" on the last line, at the end.
Where is the Distinguished Name of your Active Directory Forest Root domain. For example, if your domain's name is
kuku.co.il, then the DN for it would be:
DC=kuku,DC=co,DC=il
Because full searches involve querying the whole domain tree rather than the GC, grouping the
enterprise into one tree will improve your searches. Thus, you can search for items not in the
GC.
By default, the first DC in the First Domain in the First Tree in the AD Forest (the root domain)
will be configured as the GC.
You can configure another DC to become the GC, or even add it as another GC while keeping
the first default one.
Reasons for such an action might be the need to place a GC in each AD Site.
To configure a Windows 2000/2003 Domain Controller as a GC server, perform the following
steps:
1. Start the Microsoft Management Console (MMC) Active Directory Sites and Services
Manager. (From the Start menu, select Programs, Administrative Tools, Active Directory
Sites and Services Manager).
2. Select the Sites branch.
3. Select the site that owns the server, and expand the Servers branch.
4. Select the server you want to configure.
5. Right-click NTDS Settings, and select Properties.
6. Select or clear the Global Catalog Server checkbox, which the Screen shows.
Active Directory intrasite replication for naming context data doesnt occur until 5 minutes
after a change.
When you make a change to the naming context (i.e., domain) data, the DCs local copy of
Active Directory (AD) records the change, then the DC waits 5 minutes (by default) before
notifying its replication partners of the change. You can continue to make changes during this
time period. The delay exists so that all changes transmit at once. If no changes occur during
a particular time period (which you can configure in the intrasite connection object schedule),
a replication sequence initiates to ensure no changes were missed.
This delay lets all changes transmit at once. You can change this 5-minute delay by using the
registry editor:
Warning!
This document contains instructions for editing the registry. If you make any error while editing the
registry, you can potentially cause Windows to fail or be unable to boot, requiring you to reinstall
Windows. Edit the registry at your own risk. Always back up the registry before making any
changes. If you do not feel comfortable editing the registry, do not attempt these instructions.
Instead, seek the help of a trained computer specialist.
1. Start Regedit.exe.
2. Go to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSe
\Services\NTDS\Parameters
This delay lets all changes transmit at once. You can change this 5-minute delay by using the
registry editor:
Warning!
This document contains instructions for editing the registry. If you make any error while editing the
registry, you can potentially cause Windows to fail or be unable to boot, requiring you to reinstall
Windows. Edit the registry at your own risk. Always back up the registry before making any
changes. If you do not feel comfortable editing the registry, do not attempt these instructions.
Instead, seek the help of a trained computer specialist.
1. Start Regedit.exe.
2. Go to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSe
\Services\NTDS\Parameters
Note: The default value data for the "Replicator notify pause between DSAs (secs)" DWORD
value is 0x1e, which in hexadecimal format is 30 decimal (30 seconds).
Note: This is only an example, you should use your own OU structure, based upon management and GPO functionality
considerations.
3.
4.
In the Add Standalone Snap-in window, click on Active Directory Users and Computers and then click on the
Add button.
5.
Back in the MMC window, click to expand the AD domain, and browse t the required OU (in this case Corp >
Sales). Right-click on the OU and select New Taskpad view.
6.
7.
In the New Taskpad wizard page customize the view you want to retain. You can select a various sizes for the
display, and other options related to the button captions and so on. When done, click Next.
8.
In the Taskpad Target window leave the default setting and click Next.
9.
In the Name and Description window type any name and description you want to appear in the Taskpad view.
Click Next.
10. In the Completing wizard page make sure that the Start New Task Wizard checkbox is selected and click Next.
11. In the Command Type window leave the Menu Command selection and click Next.
12. In the Shortcut Menu Command window notice how each right-click action associated with a user object is
available for selection in the right-hand side window. Note that you do NOT need to select a specific user
account on the left-hand side window, but in order for the right-click option to be available, you do need to
select any one of the available user accounts. I usually build one or two fake user accounts just for this
purpose, and when I'm done with the Taskpad creation, I delete those accounts.
In this step I've chosen the Properties task, but you can choose your own tasks.
Note that although all right-click tasks are available for you to choose from, creating a task in this stage will not give
the user that's supposed o use this Taskpad any additional permissions on the objects. I.e. if I choose New > Group from
the available tasks and the user that's going to use this tool does NOT have the permission to create a new group in the
Sales OU, he or she will NOT see the task button, although I've specifically added it to the task buttons.
When done click Next.
12. In the Name and Description window type or modify the needed info and click Next.
13. In the Task Icon window browse to find the most appropriate icon (or add your own) and click Next.
14. In the Completing the task wizard page select the Run this wizard again checkbox and click Finish.
15. You will now have the option to re-run the wizard. Follow steps 10-12 and select the next task to add to the
Taskpad.
This time I chose Delete.
Reset Password:
Disable Account:
16. In order to add the Enable Account option we will first need to manually disable one of the available user
accounts, then the Enable Account option will be available to choose:
Enable Account:
17. For other options, such as Find and Refresh, we will first need to configure the Command Source as Tree Item
Task. Then the Find and Refresh options will become available.
Find:
Refresh:
18. You can also follow the same steps as before, but this time choose Shell Command in the Command Type
window.
19. Here you can add any command or batch file you want. For example, here is a command that will cause a Ping
window to appear, pinging your DC:
21. And a command that will cause your DC to replicate with other DCs (this can be easily accomplished by using
the REPADMIN command in a batch file).
22. When finished adding all the required tasks and buttons, click Finish and look at what we've done:
Notice how the original tree display is still visible. We will fix this right away.
23. Click on the View menu, then select Customize.
24. In the Customize View window clear all checkboxes. Click Ok. Notice how all menus and the tree display
have vanished.
25. Now, we need to customize the tool's icon and settings before we save it. On the File menu click Options.
26. In the Options menu give the Taskpad a good descriptive name and change the icon if you want. Also, in the
Console Mode list, select User Mode - Limited Access, Single Window. Next, select the Do Not Save Changes
checkbox, and clear the Allow the User to Customize Views checkbox. Click Ok.
27. Next, save the Taskpad to anywhere you want. You can also send the Taskpad (which in fact is an .MSC file)
by mail to the user responsible for the management of the OU. However remember that this user must also
have the AD Users & Computers snap-in installed on his or her computer. See Extract Specific Tools from
Adminpak.msi for more info.
2.
You will notice how the list of users is found on the right, and the list of available tasks is on the left. See how
the available tasks and buttons change as you click on various objects. For example, when you click on a
disabled user account, the Enable button will appear:
and when you click on User, a new user dialog box appears:
In conclusion, the Taskpad views are powerful add-ons to the administrator's arsenal, and can be used in various
scenarios. Remember that the Taskpad view is not just limited to the AD Users & Computers snap-in, but can be used in
virtually and available snap-in. Also, as a security measure, do NOT rely on the Taskpad's available buttons to prevent a
user from doing harm. Use good permission strategy to protect your resources, and only use the Taskpad as a method of
easing your administrative
"The server is a single-domain solution, which is not intended to be integrated with other Windows domains. You are not
permitted to establish explicit trusts to other Microsoft Windows NT nor to Active Directory domains. Also, Small Business
Server 2000 does not enable you to create child domains."
Note that the SBS EULA mentions the following:
"1.e Reservation of Rights: Microsoft reserves all rights not expressly granted to you in this EULA".
In most cases an administrator can keep the FSMO role holders (all 5 of them) in the same spot (or actually, on the
same DC) as has been configured by the Active Directory installation process. However, there are scenarios where an
administrator would want to move one or more of the FSMO roles from the default holder DC to a different DC. The
transferring method is described in the Transferring FSMO Roles article, while seizing the roles from a non-operational
DC to a different DC is described in the Seizing FSMO Roles article.
With Microsoft Exchange, Microsoft currently recommends that administrators turn this feature off,
or never turn it on in the first place (unless the server is used as a Front end server). In Windows
2000/2003, this is not the case.
There is no documented or supported way to disable this feature in Windows 2000/2003.
Because of the redundancy built into Active Directory with multiple domain controllers within a
given organization and domain, Windows 2000/2003 has been optimized to use circular
logging. Administrators should be able to successfully recover a domain controller with a solid
backup strategy and at least one replica domain controller per domain in the organization.
When Windows 2000/2003 performs a database write operation, it records the transaction in a
log file and shortly thereafter writes the transaction to memory. When the system has time or
at system shutdown, the transactions are written to the database file.
Windows 2000/2003 records the transaction in the current log file (Edb.log), which is 10
megabytes (MB) in size. When it fills the current file, it creates a new log file (for example,
Edb00001.log). The log files continue to be incremented, but circular logging purges the oldest
file when the transactions within the log have been committed to the database. There are also
two reserve log file named Res1.log and Res2.log. These files are used as placeholders in the
event that the system runs out of disk space. Each file is also 10 MB in size.
Windows 2000/2003 also maintains a checkpoint file (Edb.chk) that records which transactions
within the log have been committed to the database. If the computer stops responding
(hangs), Extensible Storage Engine (ESE) can detect an improper shutdown by checking the
last log recorded. If the last record is not a "shutdown" record, it replays the logs from the
checkpoint. This event occurs at the first reboot after the system is shut down improperly. If
the checkpoint file is missing for any reason, every transaction within the log file is replayed.
In some occasions, such as testing, lab-building, classes and so on, you might want to disable this built-in requirement.
Security Warning: Bare in mind that this setting can only be enabled/disabled at the domain level, and NOT on an OU
level. Disabling the password requirement for an entire domain will lower your security configuration, and should only
be done when absolutely necessary.
In order to disable this requirement you need to edit the Default Domain Policy for your domain.
1.
2.
Note: If for any reason you don't see that icon you can still edit the Default Domain Group Policy from the AD Users
and Computers snap-in, or from a GPMC window (if you have GPMC installed - Download GPMC).
3.
4.
5.
6.
Keep the V on the Define Setting selected! Do not remove the V from that check-box. Removing the V will
cause the GPO to revert to the default setting, which is what we are trying to remove in the first place.
Enter 0 (zero) for the number of minimum characters required in a password.
7.
Now double-click on the Passwords Must Meet Complexity Requirements option in the right pane.
8.
Again, do not remove the V from that check-box. Instead, select Disabled.
9.
Click OK all the way out and close the GPO window.
In order to refresh the policy type the following command in a CMD window and click ENTER:
gpupdate /force
Keep in mind that this is a generic guideline though. The recommendations change depending on the size and topology of
your network. For example, in large organizations with lots of Exchange mailboxes, it is possible for a Global Catalog server
to become overwhelmed. To keep that from happening, Microsoft recommends having one Global Catalog Server for every
four mailbox servers. Therefore, if a site contained eight mailbox servers, then you would want to place at least two global
catalog servers in that site.
Of course not every network is large enough to have multiple sites. If you have a single site, single domain network, then it is
safe to go ahead and designate all of your domain controllers to act as Global Catalog servers. In this type of environment, all
of the domain controllers contain full copies of the Active Directory anyway, so the additional resource consumption caused
by having multiple Global Catalog servers will be minimal.
You can not configure the Event Log to override events as needed (if the log reaches it's maximal size)
The log file can grow to a rather large size (the default is 512KB, but if you retain logs you have probably
changed that)
One of the things that can help you in this situation is automating the process of opening a new
security log file when the maximum size limit is reached.
Below you will find an Administrative Template (.ADM file) that does exactly that: the moment the file size limit is
reached, the server archives the security log and opens a fresh one.
I'll quote:
Using this entry causes the Event Log service to automatically clear a full event log and to back-up the log file. On
computers with the "CrashOnAuditFail" policy turned on, the computer continues to log events (instead of hanging
because of an audit failure) if the current log file can be backed up automatically. By default, event logs are stored in
the %SystemRoot%\System32\Config folder. If you enable this setting, a full log file is automatically backed up in the
%SystemRoot%\System32\Config folder, the log file is cleared, and event logging resumes.
If you are still wondering what I am talking about, lets have a look at the following example:
1.
2.
3.
You configure the maximum security log size to rather large number (maximum is 4GB), but still this is not
enough to accommodate 60 days of events (and if you are not aware, if you hit the max size limit and your
server is not configured to override the events as needed, the server will enter the "Crash" mode - it will stop
providing services).
4.
Working with very large logs is very painful - the Event Viewer will just crawl.
So what do you do? You configure the maximum log size to rather reasonable number (lets say 128MB) and use the
Administrative Template attached below to configure the server to open a new log when it hits the 128MB limit. The
even log will be saved in %SystemRoot%\System32\Config folder with timestamp suffix and a new log will be opened.
You can later collect those files to a central location or configure a job to prune files older than 60 days.
Add the new Administrative Template to a new or to an existing GPO, then look for the settings under Computer
Configuration > Administrative Templates > System > Event Viewer. The new settings are quite self explanatory.
Follow the steps outlined in the Adding New Administrative Templates to a GPO article on general instructions on how
to add or remove an .ADM file from the Administrative Templates section in GPO.
Note: As with many custom Administrative Templates, you will need to remove the requirement to show policy settings
that can be fully managed in the GPO editor.
Needless to say, as with any GPO setting, this option will only work on Windows 2000 operating systems and higher, and
requires you to have an Active Directory in place.
2. Click Add Value on the Edit menu, and then add the following registry value:
Value name: NT4Emulator
1. Click Add Value on the Edit menu, and then add the following registry value:
Value name: NeutralizeNT4Emulator
Data type: REG_DWORD
Radix: Hex
Value data: 0x1
2. Quit Registry Editor.
Use Dcpromo.exe to upgrade, and then apply the latest service pack.
Caution: The administrator should also check that replication has occurred since the demotion
before manually removing the NTDS Settings object for any server. Using the NTDSUTIL utility
improperly can result in partial or complete loss of Active Directory functionality.
Procedure
1. Click Start, point to Programs, point to Accessories, and then click Command Prompt.
At the command prompt, type
ntdsutil
and then press ENTER.
2. Type
metadata cleanup
and then press ENTER. Based on the options given, the administrator can perform the
removal, but additional configuration parameters need to be specified before the removal can
occur.
3. Type
connections
and press ENTER. This menu is used to connect to the specific server on which the changes
occur. If the currently logged on user does not have administrative permissions, alternate
credentials can be supplied by specifying the credentials to use before making the connection.
To do so, type
set creds domain nameusernamepassword
and press ENTER. For a null password, type null for the password parameter.
4. Type
connect to server servername
and then press ENTER. You should receive confirmation that the connection is successfully
established. If an error occurs, verify that the domain controller being used in the connection
is available and the credentials you supplied have administrative permissions on the server.
Note: If you try to connect to the same server that you want to delete, when you try to delete
the server that step 15 refers to, you may receive the following error message:
Error 2094. The DSA Object cannot be deleted0x2094
Note: Windows Server 2003 Service Pack 1 eliminates the need for steps 3 and 4.
5. Type
quit
and then press ENTER. The Metadata Cleanup menu appears.
6. Type
select operation target
and press ENTER.
7. Type
list domains
and press ENTER. A list of domains in the forest is displayed, each with an associated number.
8. Type
select domain number
and press ENTER, where number is the number associated with the domain to which the
server you are removing is a member. The domain you select is used to determine if the server
being removed is the last domain controller of that domain.
9. Type
list sites
and press ENTER. A list of sites, each with an associated number, is displayed.
10. Type
select site number
and press ENTER, where number is the number associated with the site to which the server
you are removing is a member. You should receive a confirmation listing the site and domain
you chose.
11. Type
list servers in site
and press ENTER. A list of servers in the site, each with an associated number, is displayed.
12. Type
select server number
where number is the number associated with the server you want to remove. You receive a
confirmation listing the selected server, its Domain Name Server (DNS) host name, and the
location of the server's computer account you want to remove.
13. Type
quit
and press ENTER. The Metadata Cleanup menu appears.
14. Type
remove selected server
and press ENTER. You should receive confirmation that the removal completed successfully. If
you receive the following error message:
Dcpromo cannot complete because there is a name resolution, authentication, replication engine, or AD object
dependency that you cannot resolve.
A DC has not replicated incoming Active Directory changes in Tombstone Lifetime (Default Tombstone Lifetime is
60 days for Windows 2000 and Windows Server 2003 DCs, and 180 days for Windows Server 2003 SP1 and R2
DCs) number of days for one or more naming contexts.
If you run Dcpromo on an existing DC to demote it and it fails because of one of the above scenarios the best thing you
should do is to try to resolve the problem and then restart Dcpromo. However, if Dcpromo still fails you can still demote the
DC by running Dcpromo with the /forceremoval switch, which tells the process to ignore errors. Note that the /forceremoval
demotion causes the loss of any locally held changes and should be considered a last resort that you should use and only
when absolutely necessary.
With /forceremoval, an administrator can forcibly remove Active Directory and roll back the system without having to
contact or replicate any locally held changes to another DC in the forest.
Note: The /forceremoval switch is only supported on Windows 2000 Servers that either have SP2 with Q332199 hotfix
installed on them, or with SP4, and on Windows Server 2003 servers.
Windows Server 2003 SP1 enhances the /forceremoval process. When it is run it checks to determine whether the DC hosts
an operations master role (FSMO role read my Understanding FSMO Roles in Active Directory article), is a Domain
Name System (DNS) server, or is a global catalog server. For each of these roles, the administrator receives a popup warning
that advises the administrator to take appropriate action.
RID Master warning:
When you force the demotion of a DC, you return the operating system to a state that is the same as the successful demotion
of the last domain controller in a domain (service start values, installed services, use of a registry based SAM for the account
database, computer is a member of a workgroup).
Note: In Windows 2000, the System event log identifies forcibly demoted DCs and instances of the /forceremoval operation
by event ID 29234. In Windows Server 2003 the System event log identifies forcibly demoted DCs by event ID 29239.
1.
Click Start, click Run, and then type the following command:
dcpromo /forceremoval
Click Ok.
2.
At the Welcome to the Active Directory Installation Wizard page, click Next.
3.
4.
In Administrator Password, type the password and confirmed password that you want to assign to the Administrator
account of the local SAM database, and then click Next.
5.
6.
Watch as the process runs. Do not disturb it. Go drink some coffee. It should take no longer than a few minutes.
7.
8.
After you use the dcpromo /forceremoval command, all the remaining metadata for the demoted DC is not deleted on the
surviving domain controllers, and therefore you must manually remove it by using the NTDSUTIL command. For more
information please read my Delete Failed DCs from Active Directory article (insert link).
Links
Domain controllers do not demote gracefully when you use the Active Directory Installation Wizard to force demotion in
Windows Server 2003 and in Windows 2000 Server - 332199
To ensure your ability to actually use this backup, you must be aware of the tombstone lifetime. By default, the tombstone is
60 days (for Windows 2000/2003 DCs), or 180 days (for Active Directory based upon Windows Server 2003 SP1 DCs).
Note: Longer tombstone lifetime decreases the chance that a deleted object remains in the local directory of a disconnected
DC beyond the time when the object is permanently deleted from online DCs. The tombstone lifetime is not changed
automatically when you upgrade to Windows Server 2003 with SP1, but you can change the tombstone lifetime manually
after the upgrade. New forests that are installed with Windows Server 2003 with SP1 have a default tombstone lifetime of
180 days. Read my "Changing the Tombstone Lifetime Attribute in Active Directory" article for more info on that.
Any backup older than 60/180 days is not a good backup and cannot be used to restore any DC. You do not need to backup
all your DCs' System States, usually backing up the first DC in the Forest + the first DCs in each domain is enough for most
scenarios.
Restore Active Directory data that becomes lost. By using an authoritative restore process, you can restore
individual objects or sets of objects (containers or directory partitions) from their deleted state. Read my
"Recovering Deleted Items in Active Directory" article for more info on that.
Recover a DC that cannot start up or operate normally because of software failure or hardware failure.
Install Active Directory from backup media (using the dcpromo /adv command). Read my "Install DC from Media
in Windows Server 2003" article for more info on that.
Perform a forest recovery if forest-wide failure occurs.
All these are reasons to have good working and reliable backups.
Note: One of the Active Directory features that was introduced in Windows Server 2003 with Service Pack 1 was the
Directory Service Backup Reminders. With this reminder, a new event message, event ID 2089, provides the backup status of
each directory partition that a domain controller stores. This includes application directory partitions and Active Directory
Application Mode (ADAM) partitions. If halfway through the tombstone lifetime a partition has not been backed up, this
event is logged in the Directory Service event log and continues daily until the partition is backed up.
Note: You can only back up the System State data on a local computer. You cannot back up the System State data on a remote
computer.
Open NTBACKUP by either going to Run, then NTBACKUP and pressing Enter or by going to Start ->
Accessories -> System Tools.
2.
If you are prompted by the Backup or Restore Wizard, I suggest you un-check the "Always Start in Wizard Mode"
checkbox, and click on the Advanced Mode link.
3.
4.
Click to select the System State checkbox. Note you cannot manually select components of the System State
backup. It's all or nothing.
5.
Enter a backup path for the BKF file. If you're using a tape device, make sure NTBACKUP is aware and properly
configured to use it.
6.
7.
The Backup Job Information pops out, allowing you to configure a scheduled backup job and other settings. For the
System State backup, do not change any of the other settings except the schedule, if so desired. When done, press
Start Backup.
8.
After a few moments of configuration tasks, NTBACKUP will begin the backup job.
9.
When the backup is complete, review the output and close NTBACKUP.
Next, you need to properly label and secure the backup file/tape and if possible, store a copy of it on a remote and
secure location.
A NIC
Properly configured TCP/IP (IP address, subnet mask and - optional - default gateway)
This article assumes that all of the above requirements are fulfilled.
3.
Set the computer's NetBIOS name. On a W2K server this cannot be changed after the computer has been
promoted to Domain Controller.
Click More.
4.
5. In the Primary DNS suffix of this computer box enter the would-be domain name. We will use dpetri.net for
this example, you should use your own domain name. Make sure you got it right. No spelling mistakes, no
"oh, I thought I did it right..." because on W2K this cannot be changed after the computer has been promoted
to Domain Controller and if you got it wrong the Dcpromo process might fail.
6.
7.
Click Ok.
You'll get a warning window.
8.
9.
Click Ok.
Check your settings. See if they're correct.
5. Assign this server a static IP address, subnet mask, and gateway address. Enter the
server's IP address in the Preferred DNS server box.
6. Click Advanced.
7. Click the DNS Tab.
8. Select "Append primary and connection specific DNS suffixes"
9. Check "Append parent suffixes of the primary DNS suffix"
10. Check "Register this connection's addresses in DNS". If this Windows 2000-based DNS
server is on an intranet, it should only point to its own IP address for DNS; do not enter
IP addresses for other DNS servers here. If this server needs to resolve names on the
Internet, it should have a forwarder configured.
2.
3.
4.
5.
6. Enter the full DNS name of the new domain, for example - dpetri.net - this must be the same as the DNS zone
you've created in step 3, and the same as the computer name suffix you've created in step 1. Click Next.
This step might take some time because the computer is searching for the DNS server and checking to see if any
naming conflicts exist.
7. Accept the the down-level NetBIOS domain name, in this case it's DPETRI. Click Next
8. Accept the Database and Log file location dialog box (unless you want to change them of course). The
location of the files is by default %systemroot%\NTDS, and you should not change it unless you have
performance issues in mind. Click Next.
9. Accept the Sysvol folder location dialog box (unless you want to change it of course). The location of the files
is by default %systemroot%\SYSVOL, and you should not change it unless you have performance issues in
mind. This folder must be on an NTFS v5.0 partition. This folder will hold all the GPO and scripts you'll
create, and will be replicated to all other Domain Controllers. Click Next.
10. If your DNS server, zone and/or computer name suffix were not configured correctly you will get the
following warning:
This means the Dcpromo wizard could not contact the DNS server, or it did contact it but could not find a zone with the
name of the future domain. You should check your settings. Go back to steps 1, 2 and 3. Click Ok.
11. You do have an option to let Dcpromo do the configuration for you. If you want, Dcpromo can install the DNS
service, create the appropriate zone, configure it to accept dynamic updates, and configure the TCP/IP settings
for the DNS server IP address. Click Next.
Accept the default choice or, if you want, quit Dcpromo and check steps 1-3.
12. Accept the Pre-Windows 2000 compatible permissions.
13. Enter the Restore Mode administrator's password. You can leave it blank (in Windows Server 2003 you must
enter a password) but whatever you do - remember it! Without it you'll have a hard time restoring the AD if
you ever need to do so. Click Next.
14. Review your settings and if you like what you see - Click Next.
15. See the wizard going through the various stages of installing AD. Whatever you do - NEVER click Cancel!!!
You'll wreck your computer if you do. If you see you made a mistake and want to undo it, you'd better let the
wizard finish and then run it again to undo the AD.
16. If all went well you'll see the final confirmation window. Click Finish.
17. You must reboot in order for the AD to function properly. Click Restart now.
First, see that the Administrative Tools folder has all the AD management tools installed.
2. Run Active Directory Users and Computers (or type "dsa.msc" from the Run command). See that all OUs and
Containers are there.
3.
Run Active Directory Sites and Services. See that you have a site named Default-First-Site-Name, and that in
it your server is listed.
4.
Open the DNS console. See that you have a zone with the same name as your AD domain (the one you've just
created, remember? Duh...). See that within it you have the 4 SRV record folders. They must exist.
= Good
If they don't (like in the following screenshot), your AD functions will be broken (a good sign of that is the long time it
took you to log on. The "Preparing Network Connections" windows will sit on the screen for many moments, and even
when you do log on many AD operations will give you errors when trying to perform them).
= Bad
This might happen if you did not manually configure your DNS server and let the DCPROMO process do it for you.
Another reason for the lack of SRV records (and of all other records for that matter) is the fact that you DID configure
the DNS server manually, but you made a mistake, either with the computer suffix name or with the IP address of the
DNS server (see steps 1 through 3).
To try and fix the problems first see if the zone is configured to accept dynamic updates.
1. In DNS Manager, expand the DNS Server object.
2. Expand the Forward Lookup Zones folder.
3. Right-click the zone you created, and then click Properties.
4. On the General tab, click to select the Allow Dynamic Update check box, and then click
OK to accept the change.
5.
You should now restart the NETLOGON service to force the SRV registration.
From the command prompt type "net stop netlogon", and after it finishes, type "net start netlogon".
Let it finish, go back to the DNS console, click your zone and refresh it (F5). If all is ok you'll now see the 4 SRV
record folders.
If the 4 SRV records are still not present double check the spelling of the zone in the DNS server. It should be exactly
the same as the AD Domain name. Also check the computer's suffix (see step 1). You won't be able to change the
computer's suffix after the AD is installed, but if you have a spelling mistake you'd be better off by removing the AD
now, before you have any users, groups and other objects in place, and then after repairing the mistake - re-running
DCPROMO.
5.
Check the NTDS folder for the presence of the required files.
6.
Check the SYSVOL folder for the presence of the required subfolders.
7.
Check to see if you have the SYSVOL and NETLOGON shares, and their location.
If all of the above is ok, I think it's safe to say that your AD is properly installed.
A NIC
Properly configured TCP/IP (IP address, subnet mask and - optional - default gateway)
This article assumes that all of the above requirements are fulfilled.
3.
4.
Set the computer's NetBIOS name. On a W2K server this cannot be changed after the computer has been
promoted to Domain Controller.
Click More.
5. In the Primary DNS suffix of this computer box enter the would-be domain name. We will use dpetri.net for
this example, you should use your own domain name. Make sure you got it right. No spelling mistakes, no
"oh, I thought I did it right..." because on W2K this cannot be changed after the computer has been promoted
to Domain Controller and if you got it wrong the Dcpromo process might fail.
6.
7.
Click Ok.
You'll get a warning window.
8.
9.
Click Ok.
Check your settings. See if they're correct.
5. Assign this server a static IP address, subnet mask, and gateway address. Enter the
server's IP address in the Preferred DNS server box.
6. Click Advanced.
7. Click the DNS Tab.
8. Select "Append primary and connection specific DNS suffixes"
9. Check "Append parent suffixes of the primary DNS suffix"
10. Check "Register this connection's addresses in DNS". If this Windows 2000-based DNS
server is on an intranet, it should only point to its own IP address for DNS; do not enter
IP addresses for other DNS servers here. If this server needs to resolve names on the
Internet, it should have a forwarder configured.
2.
3.
4.
5.
6. Enter the full DNS name of the new domain, for example - dpetri.net - this must be the same as the DNS zone
you've created in step 3, and the same as the computer name suffix you've created in step 1. Click Next.
This step might take some time because the computer is searching for the DNS server and checking to see if any
naming conflicts exist.
7. Accept the the down-level NetBIOS domain name, in this case it's DPETRI. Click Next
8. Accept the Database and Log file location dialog box (unless you want to change them of course). The
location of the files is by default %systemroot%\NTDS, and you should not change it unless you have
performance issues in mind. Click Next.
9. Accept the Sysvol folder location dialog box (unless you want to change it of course). The location of the files
is by default %systemroot%\SYSVOL, and you should not change it unless you have performance issues in
mind. This folder must be on an NTFS v5.0 partition. This folder will hold all the GPO and scripts you'll
create, and will be replicated to all other Domain Controllers. Click Next.
10. If your DNS server, zone and/or computer name suffix were not configured correctly you will get the
following warning:
This means the Dcpromo wizard could not contact the DNS server, or it did contact it but could not find a zone with the
name of the future domain. You should check your settings. Go back to steps 1, 2 and 3. Click Ok.
11. You do have an option to let Dcpromo do the configuration for you. If you want, Dcpromo can install the DNS
service, create the appropriate zone, configure it to accept dynamic updates, and configure the TCP/IP settings
for the DNS server IP address. Click Next.
Accept the default choice or, if you want, quit Dcpromo and check steps 1-3.
12. Accept the Pre-Windows 2000 compatible permissions.
13. Enter the Restore Mode administrator's password. You can leave it blank (in Windows Server 2003 you must
enter a password) but whatever you do - remember it! Without it you'll have a hard time restoring the AD if
you ever need to do so. Click Next.
14. Review your settings and if you like what you see - Click Next.
15. See the wizard going through the various stages of installing AD. Whatever you do - NEVER click Cancel!!!
You'll wreck your computer if you do. If you see you made a mistake and want to undo it, you'd better let the
wizard finish and then run it again to undo the AD.
16. If all went well you'll see the final confirmation window. Click Finish.
17. You must reboot in order for the AD to function properly. Click Restart now.
First, see that the Administrative Tools folder has all the AD management tools installed.
2. Run Active Directory Users and Computers (or type "dsa.msc" from the Run command). See that all OUs and
Containers are there.
3.
Run Active Directory Sites and Services. See that you have a site named Default-First-Site-Name, and that in
it your server is listed.
4.
Open the DNS console. See that you have a zone with the same name as your AD domain (the one you've just
created, remember? Duh...). See that within it you have the 4 SRV record folders. They must exist.
= Good
If they don't (like in the following screenshot), your AD functions will be broken (a good sign of that is the long time it
took you to log on. The "Preparing Network Connections" windows will sit on the screen for many moments, and even
when you do log on many AD operations will give you errors when trying to perform them).
= Bad
This might happen if you did not manually configure your DNS server and let the DCPROMO process do it for you.
Another reason for the lack of SRV records (and of all other records for that matter) is the fact that you DID configure
the DNS server manually, but you made a mistake, either with the computer suffix name or with the IP address of the
DNS server (see steps 1 through 3).
To try and fix the problems first see if the zone is configured to accept dynamic updates.
1. In DNS Manager, expand the DNS Server object.
2. Expand the Forward Lookup Zones folder.
3. Right-click the zone you created, and then click Properties.
4. On the General tab, click to select the Allow Dynamic Update check box, and then click
OK to accept the change.
5.
You should now restart the NETLOGON service to force the SRV registration.
From the command prompt type "net stop netlogon", and after it finishes, type "net start netlogon".
Let it finish, go back to the DNS console, click your zone and refresh it (F5). If all is ok you'll now see the 4 SRV
record folders.
If the 4 SRV records are still not present double check the spelling of the zone in the DNS server. It should be exactly
the same as the AD Domain name. Also check the computer's suffix (see step 1). You won't be able to change the
computer's suffix after the AD is installed, but if you have a spelling mistake you'd be better off by removing the AD
now, before you have any users, groups and other objects in place, and then after repairing the mistake - re-running
DCPROMO.
5.
Check the NTDS folder for the presence of the required files.
6.
Check the SYSVOL folder for the presence of the required subfolders.
7. Check to see if you have the SYSVOL and NETLOGON shares, and their location.
If all of the above is ok, I think it's safe to say that your AD is properly installed.
acceptable in some cases, there are times when conflicts are just too difficult to resolve using the "last writer wins"
approach. In such cases, it is best to prevent the conflict from occurring rather than to try to resolve it after the fact.
For certain types of changes, Windows 2000/2003 incorporates methods to prevent conflicting Active Directory updates
from occurring.
allowed to assign to the security principals it creates. When a DC's allocated RID pool falls below a threshold, that DC
issues a request for additional RIDs to the domain's RID master. The domain RID master responds to the request by
retrieving RIDs from the domain's unallocated RID pool and assigns them to the pool of the requesting DC. At any one
time, there can be only one domain controller acting as the RID master in the domain.
PDC Emulator:
The PDC emulator is necessary to synchronize time in an enterprise. Windows 2000/2003 includes the W32Time
(Windows Time) time service that is required by the Kerberos authentication protocol. All Windows 2000/2003-based
computers within an enterprise use a common time. The purpose of the time service is to ensure that the Windows Time
service uses a hierarchical relationship that controls authority and does not permit loops to ensure appropriate common
time usage.
The PDC emulator of a domain is authoritative for the domain. The PDC emulator at the root of the forest becomes
authoritative for the enterprise, and should be configured to gather the time from an external source. All PDC FSMO
role holders follow the hierarchy of domains in the selection of their in-bound time partner.
In a Windows 2000/2003 domain, the PDC emulator role holder retains the following functions:
Password changes performed by other DCs in the domain are replicated preferentially to the PDC emulator.
Authentication failures that occur at a given DC in a domain because of an incorrect password are forwarded
to the PDC emulator before a bad password failure message is reported to the user.
Editing or creation of Group Policy Objects (GPO) is always done from the GPO copy found in the PDC
Emulator's SYSVOL share, unless configured not to do so by the administrator.
The PDC emulator performs all of the functionality that a Microsoft Windows NT 4.0 Server-based PDC or
earlier PDC performs for Windows NT 4.0-based or earlier clients.
This part of the PDC emulator role becomes unnecessary when all workstations, member servers, and domain
controllers that are running Windows NT 4.0 or earlier are all upgraded to Windows 2000/2003. The PDC emulator still
performs the other functions as described in a Windows 2000/2003 environment.
At any one time, there can be only one domain controller acting as the PDC emulator master in each domain in the
forest.
When a computer that is running Windows Server 2003 is installed and promoted to a domain controller, new Active
Directory features are activated by the Windows Server 2003 operating system over its Windows 2000 counterparts.
Additional Active Directory features are available when all domain controllers in a domain or forest are running
Windows Server 2003 and the administrator activates the corresponding functional level in the domain or forest.
To activate the new domain features, all domain controllers in the domain must be running Windows Server 2003. After
this requirement is met, the administrator can raise the domain functional level to Windows Server 2003 (read Raise
Domain Function Level in Windows Server 2003 Domains for more info).
To activate new forest-wide features, all domain controllers in the forest must be running Windows Server 2003, and
the current forest functional level must be at Windows 2000 native or Windows Server 2003 domain level. After this
requirement is met, the administrator can raise the domain functional level (read Raise Forest Function Level in
Windows Server 2003 Active Directory for more info).
Note: Network clients can authenticate or access resources in the domain or forest without being affected by the
Windows Server 2003 domain or forest functional levels. These levels only affect the way that domain controllers
interact with each other.
Important
Raising the domain and forest functional levels to Windows Server 2003 is a nonreversible
task and prohibits the addition of Windows NT 4.0based or Windows 2000based domain
controllers to the environment. Any existing Windows NT 4.0 or Windows 2000based
domain controllers in the environment will no longer function. Before raising functional levels
to take advantage of advanced Windows Server 2003 features, ensure that you will never need
to install domain controllers running Windows NT 4.0 or Windows 2000 in your environment.
When the first Windows Server 2003based domain controller is deployed in a domain or forest, a set of default Active
Directory features becomes available. The following table summarizes the Active Directory features that are available
by default on any domain controller running Windows Server 2003:
Feature
Functionality
Saved queries
InetOrgPerson class
When the first Windows Server 2003based domain controller is deployed in a domain or forest, the domain or forest
operates by default at the lowest functional level that is possible in that environment. This allows you to take advantage
of the default Active Directory features while running versions of Windows earlier than Windows Server 2003.
When you raise the functional level of a domain or forest, a set of advanced features becomes available. For example,
the Windows Server 2003 interim forest functional level supports more features than the Windows 2000 forest
functional level, but fewer features than the Windows Server 2003 forest functional level supports. Windows Server
2003 is the highest functional level that is available for a domain or forest. The Windows Server 2003 functional level
supports the most advanced Active Directory features; however, only Windows Server 2003 domain controllers can
operate in that domain or forest.
If you raise the domain functional level to Windows Server 2003, you cannot introduce any domain controllers that are
running versions of Windows earlier than Windows Server 2003 into that domain. This applies to the forest functional
level as well.
Supported domain controllers: Microsoft Windows NT 4.0, Windows 2000, Windows Server 2003
Activated features: local and global groups, global catalog support
Domains that are upgraded from Windows NT 4.0 or created by the promotion of a Windows Server 2003-based
computer operate at the Windows 2000 mixed functional level. Windows 2000 domains maintain their current domain
functional level when Windows 2000 domain controllers are upgraded to the Windows Server 2003 operating system.
You can raise the domain functional level to either Windows 2000 native or Windows Server 2003.
After the domain functional level is raised, domain controllers that are running earlier operating systems cannot be
introduced into the domain. For example, if you raise the domain functional level to Windows Server 2003, domain
controllers that are running Windows 2000 Server cannot be added to that domain.
The following describes the domain functional level and the domain-wide features that are activated for that level. Note
that with each successive level increase, the feature set of the previous level is included.
Supported domain controllers: Windows NT 4.0, Windows 2000, Windows Server 2003
New features: Partial list includes universal group caching, application partitions, install from media, quotas,
rapid global catalog demotion, Single Instance Store (SIS) for System Access Control Lists (SACL) in the Jet
Database Engine, Improved topology generation event logging. No global catalog full sync when attributes are
added to the PAS Windows Server 2003 domain controller assumes the Intersite Topology Generator (ISTG)
role.
Supported domain controllers: Windows NT 4.0, Windows Server 2003. See the "Upgrade from a Windows
NT 4.0 Domain" section of this article.
Activated features: Windows 2000 features plus Efficient Group Member Replication using Linked Value
Replication, Improved Replication Topology Generation. ISTG Aliveness no longer replicated. Attributes
added to the global catalog. ms-DS-Trust-Forest-Trust-Info. Trust-Direction, Trust-Attributes, Trust-Type,
Trust-Partner, Security-Identifier, ms-DS-Entry-Time-To-Die, Message Queuing-Secured-Source, Message
Queuing-Multicast-Address, Print-Memory, Print-Rate, Print-Rate-Unit
After the forest functional level is raised, domain controllers that are running earlier operating systems cannot be
introduced into the forest. For example, if you raise forest functional levels to Windows Server 2003, domain
controllers that are running Windows NT 4.0 or Windows 2000 Server cannot be added to the forest.
3.
Install applications
4.
5.
6.
In fact, you can configure any aspect of the computer behavior with it. Although it is a cool toy; working with it without
proper attention can cause unexpected behavior.
Terms
Here are some basic terms you need to be familiar with before drilling down into Group Policy:
Local policy - Refers to the policy that configures the local computer or server, and is not inherited from the domain.
You can set local policy by running gpedit.msc from the Run command, or you can add "Group Policy Object Editor"
snap-in to MMC. Local Policies also exist in the Active Directory environment, but have many fewer configuration
options that the full-fledged Group Policy in AD.
GPO - Group Policy Object - Refers to the policy that is configured at the Active Directory level and is inherited by
the domain member computers. You can configure a GPO Group Policy Object - at the site level, domain level or OU
level.
GPC Group Policy Container - The GPC is the store of the GPOs; The GPC is where the GPO stores all the ADrelated configuration. Any GPO that is created is not effective until it is linked to an OU, Domain or a Site. The GPOs
are replicated among the Domain Controllers of the Domain through replication of the Active Directory.
GPT - Group Policy Templates - The GPT is where the GPO stores the actual settings. The GPT is located within the
Netlogon share on the DCs.
Netlogon share - A share located only on Domain Controllers and contains GPOs, scripts and .POL files for policy of
Windows NT/98. The Netlogon share replicates among all DCs in the Domain, and is accessible for read only for the
Everyone group, and Full Control for the Domain Admins group. The Netlogon's real location is:
C:\WINDOWS\SYSVOL\sysvol\domain.com\SCRIPTS
When a domain member computer boots up, it finds the DC and looks for the Netlogon share in it.
To see what DC the computer used when it booted, you can go to the Run command and type %logonserver
%\Netlogon. The content of the Netlogon share should be the same on all DCs in the domain.
GPO behavior
Group Policy is processed in the following order:
Local Policy > Site GPO > Domain GPO > OU GPO > Child OU GPO
and so on.
GPOs inherited from the Active Directory are always stronger than local policy. When you configure a Site policy it is
being overridden by Domain policy, and Domain policy is being overridden by OU policy. If there is an OU under the
previous OU, its GPO is stronger the previous one.
The rule is simple, as more you get closer to the object that is being configured, the GPO is stronger.
What does it mean "stronger"? If you configure a GPO and linke it to "Organization" OU, and in it you configure
Printer installation allowed and then at the "Dallas" OU you configured other GPO but do not allow printer
installation, then the Dallas GPO is more powerful and the computers in it will not allow installation of printers.
The example above is true when you have different GPOs that have similar configuration, configured with opposite
settings. When you apply couple of GPOs at different levels and every GPO has its own settings, all settings from all
GPOs are merged and inherited by the computers or users.
Computer configuration contains the settings that configure the computer prior to the user logon combo-box.
User configuration contains the settings that configure the user after the logon. You cannot choose to apply
the setting on a single user, all users, including administrator, are affected by the settings.
Software settings and Windows settings both of computer and user are settings that configure local DLL
files on the machine.
Administrative templates are settings that configure the local registry of the machine. You can add more
options to administrative templates by right clicking it and choose .ADM files. Many programs that are
installed on the computer add their .ADM files to %systemroot%\inf folder so you can add them to the
Administrative Templates.
You can download .ADM files for the Microsoft operating systems
1. Group Policy Object Editor snap-in in MMC - or - use gpedit.msc from the Run command.
2. Active Directory Users and Computers snap in - or dsa.msc to invoke the Group Policy tab on every OU or
on the Domain.
3. Active Directory Sites and Services - or dssite.msc to invoke the Group Policy tab on a site.
4. Group Policy Management Console - or gpmc.msc - this utility is NOT included in Windows 2003 server and
needs to be separately installed. You can download it from HERE
Note that if you'd like to use the GPMC tool on Windows XP, you need to install it on computers running Windows XP
SP2. Installing it on computers without SP2 will generate errors due to unsupported and newer .ADM files.
Linking a GPO
To link a GPO simply right click an OU and choose Link an existing GPO or you can create and link a GPO in the same
time. You can also drag and drop a GPO from the Group Policy Objects folder to the appropriate Site, Domain or OU.
When you right-click a link you can:
Edit a GPO - This will open the GPO window so you can configure settings.
Link/Unlink a GPO - This setting allows you to temporarily disable a link if you need to add settings to it or if you
will activate it later.
Block/Enforce inheritance
You can block policy inheritance to an OU if you dont want the settings from upper GPOs to configure your OU.
To block GPO inheritance, simply right click your OU and choose "Block Inheritance". Blocking inheritance will block
all upper GPOs.
In case you need one of the upper GPOs to configure all downstream OUs and overcome Block inheritance, use the
Enforce option of a link. Enforcing a GPO is a powerful option and rarely should be used.
You can see in this example that when you look at Computers OU, three different GPOs are inherited to it.
In this example you can see that choosing "Block inheritance" will reject all upper GPOs.
Now, if we configure the "Default domain policy" with the Enforce option, it will overcome the inheritance blocking.
Link order
When linking more than one GPO to an OU, there could be a problem when two or more GPOs have the same settings
but with opposite configuration, like, GPO1 have Allow printer installation among other settings but GPO2 is
configured to prevent printer installation among other settings. Because the two GPOs are at the same level, there is a
link order which can be changed.
The GPO with the lowest link order is processed last, and therefore has the highest precedence.
Security Filtering
Filtering let you choose the user, group or computer that the GPO will apply onto. If you configured "Computers" OU
with a GPO but you only want to configure Win XP stations with that GPO and exclude Win 2000 stations, you can
easily create a group of Win XP computers and apply the GPO only to that group.
This option save you from creating complicated OU tree with each type of computer in it.
A user or a group that you configure in the filtering field have by default the "Read" and "Apply" permission. By
default when you create a GPO link, you can see that "Authenticated users" are listed.
In the above example, Office 2K3 will be installed on all computers that are part of the two listed groups.
If we still were using Authenticated users, the installation of the Office suite could have followed the user to any
computer that he logs onto, like servers or other machines. Using filtering narrows the installation options.
If you want to configure these permissions with higher resolution, you can go to Delegation tab and see the
permissions. Going to the Advanced Tab will let you configure the ACL permission with the highest resolution.
3.
4.
Manually by using gpupdate command. You can add the /force switch to force all settings and not only the
delta.
Note: Windows 2000 doesn't support the Gpupdate command so you need run a different command instead:
Secedit /refreshpolicy machine_policy
In the example above example you can see the summary of applied or non applied GPOs both of computer and user
settings.
When looking at the Settings tab we can see what settings did applied on the computer and see which is the "Winning
GPO" that actually configured the computer with the particular setting.
With an existing DNS domain, you can delegate a sub-domain from the existing DNS server to
the Windows 2000 DNS server. For example, if your domain name is mycompany.com, you can
create a sub-domain with the name windows2000.mycompany.com. The Windows 2000 DNS
server has authority over that sub-domain.
To create the sub-domain, configure the DNS server to use one of the organization's main DNS
servers as a forwarder. A forwarder provides recursive lookups for any queries that the DNS
server receives that it cannot answer based on its local zones. After you set up the forwarder,
the Windows 2000 DNS server is responsible for resolving any queries for computers or
resources that are contained within its own local domain. Any queries beyond this range,
however, are forwarded directly to the organization's main DNS servers for resolution.
To Add the Organization's Main DNS Servers to the List of Forwarders on the Windows 2000
Server:
1. Click Start, point to Programs, point to Administrative Tools, and then click DNS to start
the DNS Management Console.
2. Right click the DNS Server object for your server in the left pane of the console, and
click Properties.
5. In the IP address box enter the IP address of the DNS servers you want to forward
queries to - typically the DNS server of your ISP. You can also move them up or down.
The one that is highest in the list gets the first try, and if it does not respond within a
given time limit - the query will be forwarded to the next server in the list.
6. Click OK.
5. In the IP address box enter the IP address of the DNS servers you want to forward
queries to - typically the DNS server of your ISP. You can also move them up or down.
The one that is highest in the list gets the first try, and if it does not respond within a
given time limit - the query will be forwarded to the next server in the list.
6. Click OK.
Featured Product
Windows Key by LostPassword.com - Use this easy tool to reset any
Windows local or domain controller password in a minute. Money-back
guarantee. Download FREE version now!
The Administrator password that you use when you start Recovery Console or when you press
F8 to start Directory Service Restore Mode is stored in the registry-based Security Accounts
Manager (SAM) on the local computer. The SAM is located in the %SystemRoot
%\System32\Config folder. The SAM-based account and password are computer specific and
they are not replicated to other domain controllers in the domain.
For ease of administration of domain controllers or for additional security measures, you can
change the Administrator password for the local SAM. To change the local Administrator
password that you use when you start Recovery Console or when you start Directory Service
Restore Mode, use one of the following methods:
Method #1
If Windows 2000 Service Pack 2 or later is installed on your computer, you can use the
Setpwd.exe utility to change the SAM-based Administrator password. To do this:
At a command prompt, change to the %SystemRoot%\System32 folder.
To change the local SAM-based Administrator password, type
setpwd
and then press ENTER.
To change the SAM-based Administrator password on a remote domain controller, type
setpwd /s: servername
and then press ENTER, where servername is the name of the remote domain controller.
When you are prompted to type the password for the Directory Service Restore Mode
Administrator account, type the new password that you want to use.
Note: If you make a mistake, repeat these steps to run setpwd again.
Method #2
Shut down the domain controller on which you want to change the password.
Restart the computer. When the selection menu screen is displayed during the restart process,
press F8 to view advanced startup options.
Select the Directory Service Restore Mode option.
After you successfully log on, use one of the following methods to change the local
Administrator password:
At a command prompt, type the following command:
net user administrator *
Use the Local User and Groups snap-in (Lusrmgr.msc) to change the Administrator password.
10. Open Boot.ini in Notepad, and remove the entry for the Recovery Console. It will look
similar to this:
C:\cmdcons\bootsect.dat="Microsoft Windows Recovery Console" /cmdcons
11. Save the file and close it.
Note that the "Repartition = No" line must exist or RIS will attempt to reformat the hard disk.
The [UserData] section must also exist or Setup will not succeed.
When the Welcome To Setup screen appears, either press F10 or R to repair, and then press C
for the Recovery
Note: Alternatively, you can use a UNC to install the Recovery Console from a network share
point.
The %SystemRoot% folder and the subfolders of the Windows installation that you are
currently logged on to.
Note: If you try to obtain access to other folders, you receive an "Access Denied" error
message. Also, while you are using the Windows Recovery Console, you cannot copy a file
from the local hard disk to a floppy disk. You can copy a file from a floppy disk or from a CDROM to a hard disk, and from one hard disk to another hard disk.
If you pre-install the Recovery Console on a computer, you should use Group Policy to enhance
the environment settings, adding power to the available file operations. To do so:
1. Click Start , click Run, type
gpedit.msc
2. Click Local Computer, click Finish , and then click Close to return to the Add/Remove
Snap-in dialog box.
3. Click OK to return to the Console window.
4. Expand the Local Computer Policy object to Computer Configuration\Windows
Settings\Security Settings\Local Policies\Security Options.
5. Select the Security Options object in the Console pane to display the security policies in
the Details pane.
6. In the Details pane, double-click the Recovery Console: Allow Floppy Copy And Access
To All Drives And Folders policy.
7. Click Enabled, and then click OK.
8. Quit the MMC.
After you have enabled this Group Policy, when you enter the Recovery Console you can
change the environment settings with the set command, by using the set variable = TRUE or
FALSE syntax.
Note: Be sure to use a space on each side of the equal sign. If you do not, the set command
generates a "syntax error" error message and does not work.
The following variables define the default environment. The variables, when set to TRUE,
enlarge the scope of the environment setting and have the following meanings:
AllowWildCards = TRUE - Enable wildcard support for some commands (such as the del
command).
AllowAllPaths = TRUE - Allows access to all files and folders on the computer.
After you start the Recovery Console you will have to choose which installation you want to log
on to (if you have a dual-boot or multiple-boot system) and you will have to log on with your
administrator password.
The console provides commands you can use to do simple operations such as changing to a
different directory or viewing a directory, and more powerful operations such as fixing the boot
sector. You can access Help for the commands in the Recovery Console by typing help at the
Recovery Console command prompt.
The following commands can be used with the Recovery Console:
Attrib - Changes the attributes of a file or directory.
Batch - Executes the commands specified in the text file.
Bootcfg - Boot file (boot.ini) configuration and recovery.
ChDir (Cd) - Displays the name of the current directory or changes the current directory.
Chkdsk - Checks a disk and displays a status report.
Cls - Clears the screen.
Copy - Copies a single file to another location.
Delete (Del) - Deletes one or more files.
Dir - Displays a list of files and subdirectories in a directory.
Disable - Disables a system service or a device driver.
Diskpart - Manages partitions on your hard drives.
Enable - Starts or enables a system service or a device driver.
Exit - Exits the Recovery Console and restarts your computer.
Expand - Extracts a file from a compressed file.
Fixboot - Writes a new partition boot sector onto the specified partition.
Fixmbr - Repairs the master boot record of the specified disk.
Format - Formats a disk.
Help - Displays a list of the commands you can use in the Recovery Console.
Listsvc - Lists the services and drivers available on the computer.