没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论

























Understand and Troubleshoot AD DS Simplified
Administration in Windows Server "8" Beta
Microsoft Corporation
Published: March 9, 2012
Abstract
This Understand and Troubleshoot Guide (UTG) enables you to learn technical concepts, functionality,
and troubleshooting methods for AD DS Simplified Administration in Windows Server “8” Beta. This UTG
provides you with:
� A technical overview and functional description of this feature.
� Technical concepts to help you successfully install, configure, and manage this feature.
� User Interface options and settings for configuration and management.
� Relevant architecture of this feature, with dependencies, and technical implementation.
� Primary troubleshooting tools and methods for this feature.

Copyright information
This document is provided “as-is”. Information and views expressed in this document, including URL and other
Internet Web site references, may change without notice.
Some examples depicted herein are provided for illustration only and are fictitious. No real association or
connection is intended or should be inferred.
This document does not provide you with any legal rights to any intellectual property in any Microsoft product.
You may copy and use this document for your internal, reference purposes.
© 2012 Microsoft. All rights reserved.
Active Directory, Hyper-V, Microsoft, MS-DOS, Visual Basic, Visual Studio, Windows, Windows NT, Windows
Server, and Windows Vista are trademarks of the Microsoft group of companies.
All other trademarks are property of their respective owners.

About the Author
Author:
Ned Pyle
Bio:
Ned Pyle is a Senior Support Escalation Engineer with Microsoft Commercial
Technical Support in Charlotte, North Carolina, USA. He specializes in Directory
Services troubleshooting and advisory services. He has authored and contributed
to TechNet whitepapers and Knowledgebase articles. Ned also has credits in
several Microsoft Press books. He teaches Microsoft employees new product
architecture, is a Microsoft Certified Master instructor, and is a Microsoft Certified
Trainer. He edits the official Microsoft Directory Services blog, AskDS.

Contents
Understand and Troubleshoot Guides .........................................................................................................1
About the Understand and Troubleshoot Guides .................................................................................................1
Introducing Virtualized Domain Controller ...............................................................................................................2
What Is Virtualized Domain Controller? ...........................................................................................................2
Purpose & Benefits ...........................................................................................................................................3
Technical Overview ...................................................................................................................................................5
Prerequisites .........................................................................................................................................................5
Functional Descriptions.........................................................................................................................................5
Virtual Domain Controller Cloning....................................................................................................................5
Virtual Domain Controller Safe Restore............................................................................................................6
Deploying Virtualized Domain Controller..................................................................................................................7
Installation Considerations ...................................................................................................................................7
Platform Requirements.........................................................................................................................................7
Critical Caveats......................................................................................................................................................8
Virtualized Domain Controller Cloning......................................................................................................................9
1. Validate the Hypervisor...................................................................................................................................11
2. Create XML......................................................................................................................................................11
Using a Blank DcCloneConfig.xml File .............................................................................................................11
Using Get-ADDCCloningExcludedApplicationList to Detect Compatibility Issues and Create
CustomDCCloneAllowList.xml.........................................................................................................................11
XML Details and Behaviors..............................................................................................................................14
Using an XML Editor........................................................................................................................................18
Adding XML to the Running Source DC...........................................................................................................29
3. Verify the PDCE FSMO role .............................................................................................................................32
Active Directory Users and Computers Method .............................................................................................32
Windows PowerShell Method ........................................................................................................................32
Validate PDCE Availability ...............................................................................................................................33
4. Authorize a Source DC.....................................................................................................................................34
Active Directory Administrative Center Method ............................................................................................34
Windows PowerShell Method ........................................................................................................................34
Rebuilding Default Permissions ......................................................................................................................35
5. Remove Incompatible applications or services (if not using CustomDCCloneAllowList.xml) .........................36
6. Take the Source Domain Controller Offline ....................................................................................................36

Graphical Method ...........................................................................................................................................36
Windows PowerShell Method ........................................................................................................................37
7. Copy Disks .......................................................................................................................................................38
Manually Copying Disks ..................................................................................................................................39
Exporting the VM ............................................................................................................................................42
Adding XML to the Offline System Disk ..........................................................................................................43
8. Create the New Virtual Machine.....................................................................................................................47
Associating a New VM with Copied Disks .......................................................................................................47
Import VM.......................................................................................................................................................48
9. Clone the New Virtual Machine ......................................................................................................................53
Virtualized Domain Controller Safe Restore............................................................................................................55
Validate the Hypervisor.......................................................................................................................................55
Validate the Replication Topology ......................................................................................................................55
Writable Domain Controller Contact ..............................................................................................................55
Simultaneous Restore .....................................................................................................................................56
Post-Snapshot Replication ..............................................................................................................................56
Windows PowerShell Snapshot Cmdlets.............................................................................................................58
Further Recommendations .................................................................................................................................58
Troubleshooting ......................................................................................................................................................60
Introduction ........................................................................................................................................................60
Troubleshooting VDC Cloning .............................................................................................................................60
Tools for Troubleshooting...............................................................................................................................62
General Methodology for Troubleshooting Domain Controller Cloning ........................................................63
Troubleshooting Specific Problems.................................................................................................................65
Advanced Troubleshooting .............................................................................................................................86
Troubleshooting VDC Safe Restore ...................................................................................................................111
Tools for Troubleshooting.............................................................................................................................111
General Methodology for Troubleshooting Domain Controller Safe Restore ..............................................112
Troubleshooting Specific Problems...............................................................................................................113
Advanced Troubleshooting ...........................................................................................................................121
Appendices............................................................................................................................................................130
Terminology ......................................................................................................................................................130
VDC Cloning Architecture..................................................................................................................................131
Overview .......................................................................................................................................................132
剩余167页未读,继续阅读
资源评论


可爱豆豆乐
- 粉丝: 1
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 探索Ruby编程的魅力与实践
- 三维计算机视觉导论课程作业
- 【多智能体系统控制】基于强化学习的线性多智能体系统最优一致性控制研究:从无向到有向通信图的分布式算法设计与验证(论文复现含详细代码及解释)
- PclZip-282-PHP-ZIP压缩文件管理库-支持ZIP格式压缩解压-提供完整归档操作功能-包含文件添加删除列表提取-支持回调函数和字符串提取-兼容64位系统-移除eva.zip
- 【海洋能利用技术】基于全功率变流器的可变速潮汐发电系统建模与仿真:电力系统集成及优化设计(论文复现含详细代码及解释)
- 计算机视觉工程实践作业仓库
- 这篇文章详细介绍了基于强化学习的智能车辆路径跟踪变参数MPC多目标控制系统的开发与实现(论文复现含详细代码及解释)
- Flet框架实现的滑块按钮定时器切换图片自动轮播自定义组件模板
- 电力系统基于人工神经网络的光储并网系统控制策略研究:解决光伏波动与“弃光”问题的RBF神经网络自适应控制设计(论文复现含详细代码及解释)
- 【中医药研究】基于人工智能SGRN-Trans框架预测温胆汤成分-靶点相互作用:中医药现代化与复杂系统解析(论文复现含详细代码及解释)
- 【医学图像处理】基于弱监督学习的医学图像跨模态超分辨率重建方法研究:卷积稀疏编码与特征映射学习在医学图像中的应用(论文复现含详细代码及解释)
- 【医疗人工智能】基于三方演化博弈的智能诊疗服务推广研究:生成式AI背景下在线健康平台、用户和政府的互动模型构建与仿真(论文复现含详细代码及解释)
- 【矿山安全监测】基于三维激光扫描的巷道点云处理技术研究:配准、去噪与精简方法优化及工程应用(论文复现含详细代码及解释)
- 深入理解计算机系统课后练习代码仓库-包含异常控制流Shell实验和网络编程TinyWebServer实验-用于学习计算机系统底层原理和操作系统概念-涉及进程控制信号处理并发编程网络.zip
- 电气自动化技术在电气工程中的应用探究.docx
- 基于C#-Oracle的考勤管理系统的设计与开发-.doc
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制
