Windows Server 2008 Directory Services Lab Manual
Windows Server 2008 Directory Services Lab Manual
Lab Manual
Terms of Use
Microsoft Confidential - For Internal Use Only
© 2008 Microsoft Corporation. All rights reserved.
This content is proprietary and is intended only for use as described in the content provided in this
document. No part of the text or software included in this training package may be reproduced or
transmitted in any form or by any electronic or mechanical means, including photocopying,
recording, or copying to any information storage and retrieval system, without express written
permission from Microsoft.
For more information about use of licensed and copyrighted materials, please visit the Use of
Microsoft Copyrighted Content Web page at http://www.microsoft.com/about/legal/permissions/.
Trademarks
Microsoft®, Internet Explorer, and Windows® are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their
respective owners.
12/04/2008
Windows Server 2008 Directory Services
Lab Manual
Terms of Use
Microsoft Confidential - For Internal Use Only
© 2008 Microsoft Corporation. All rights reserved.
This content is proprietary and is intended only for use as described in the content provided in this
document. No part of the text or software included in this training package may be reproduced or
transmitted in any form or by any electronic or mechanical means, including photocopying,
recording, or copying to any information storage and retrieval system, without express written
permission from Microsoft.
For more information about use of licensed and copyrighted materials, please visit the Use of
Microsoft Copyrighted Content Web page at http://www.microsoft.com/about/legal/permissions/.
Trademarks
Microsoft®, Internet Explorer, and Windows® are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their
respective owners.
12/04/2008
Lab 1
Lab 1:
Implementing Windows Server
2008
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. These
materials are intended for distribution to and use only by Microsoft Premier Customers. Use or distribution of
these materials by any other persons is prohibited without the express written permission of Microsoft
Corporation. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Version 1.0
During this lab, you will prepare the forest and domain for the introduction of
Windows Server 2008 domain controllers. You will be introduced to Server
Manager and some of the functions that can be performed using this tool.
■ Use Server Manager to perform tasks related to add roles and features.
Lab Environment
To complete this lab, you will need the following Virtual Machines:
■ 2008-01
Important
You must log on as an administrative user in order to perform all of the tasks in
this lab.
□ Username: Contoso\Administrator
□ Password: P@ssw0rd1
□ Domain: Contoso
1
Exercise 1: Introduction to Server Manager
Scenario
Use the Initial Configuration Tasks console and Server Manager to perform common
tasks.
Tasks
In the following steps, we will examine some of the different types of tasks and
information that can be accessed through Server Manager. We will first examine the
IP address of the network adapter, and then we will enable Remote Desktop through
the Initial Configuration Tasks console. Following that, we will use Server Manager
to add the Terminal Services Role and then the Windows Server Backup Feature.
Lastly, we will view Diagnostics information provided under Server Manager.
Note
If Initial Configuration Tasks has been closed you can run oobe.exe to open it again.
2
3) Read the Firewall exception warning message, click OK, and then
click OK in System Properties.
2) Click Add Features in right pane. This will launch the Add
Features Wizard.
From the Pop-up message, what additional feature is required for Windows
Server Backup to be installed?
____________________________________________________________________________________________1
From the Pop-up message, what additional feature is required for Command-line
Tools?
____________________________________________________________________________________________2
3.
3
Lab 2
Lab 2:
Installing Active Directory
Domain Services
1
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. These
materials are intended for distribution to and use only by Microsoft Premier Customers. Use or distribution of
these materials by any other persons is prohibited without the express written permission of Microsoft
Corporation. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Version 1.0
1
During this lab, you will promote a Windows Server 2008 machine that is in a
workgroup, to a Domain Controller in a Windows Server 2003 domain.
Lab Environment
To complete this lab, you will need the following Virtual Machines:
□ 2003-01
□ 2008-01
Important
You must log on as an administrative user in order to perform all of the tasks in
this lab.
□ Username: Administrator
□ Password: P@ssw0rd1
□ Domain: Contoso
2
Exercise 1: Prepare domain and forest for the
introduction of a Windows Server 2008 domain
controller
Scenario
You are the administrator of Contoso.com, a Windows 2003 domain. You are given the
task of introducing a Windows Server 2008 domain controller into your environment.
Pre-Tasks
■ Start the 2003-DC1 Virtual Machine
Tasks
First, prepare the forest by running adprep /forestprep on 2003-DC1. Then raise the
domain functional level to Windows Server 2003 mode. Finally, prepare the domain
by running domainprep and gpprep.
1. On 2003-01, at the “Welcome to the Windows Setup Wizard” screen, click Next
At the “License Agreement” screen, check the “I accept this agreement” radio button, click
Next
C:\Sources\ADPrep
3
c. At the command prompt, type the following and then press ENTER
adprep /forestprep
d. You will be prompted with an ADPREP WARNING message requesting
confirmation that all Windows 2000 Active Directory Domain Controllers
in the forest are upgraded to Windows 2000 SP4 or later.
a. Type C and then press ENTER. When the process finishes you will
receive a message that Adprep successfully updated the forest-
wide information.
Note
The domain must be in at least Windows 2000 native mode before you can run adprep
/domainprep.
b. At the command prompt, type the following and then press ENTER
adprep /rodcprep
4
4. Prepare the domain by running domainprep and gpprep on 2003-DC.
a. At the command prompt, type the following and then press ENTER
5
Exercise 2: Promote a Windows Server 2008 machine
to a Domain Controller in an existing Windows Server
2003 domain.
Scenario
You are an administrator for your domain and would like to introduce a Window
Server 2008 domain controller in your existing Windows Server 2003 domain.
Tasks
1. Promote 2008-01 as a replica domain controller in the Contoso domain by
adding the Active Directory Domain Services role via Server Manager. Then
from a command prompt run DCPromo.exe to start the domain controller
promotion. Use the advanced mode installation option to make the domain
controller a DNS server as well as a Global Catalog. Lastly, export these
dcpromo settings to a text file to be used later in the promotion of another
domain controller. Name the text file 2008-answer.txt and place it in C:\.
3) Select Roles and click on Add Roles in the right pane. The Add
Roles Wizard will start.
6
8) When the Installation Results are displayed, verify that the
installation succeeded.
Note
You can now launch DCPROMO directly from the Installation Results page. There is a link in
blue that states – Close this wizard and launch the Active Directory Domain Services Installation Wizard
(dcpromo.exe). You decide to start either with a. or with b. – since b. includes a. automatically.
9) Click Close.
Note
Please note that Active Directory snap-ins was not installed when the role was added. Adding
the role installs the AD DS binaries only and does not automatically start the dcpromo process.
Note
Since Terminal Services was installed on this computer during the previous lab the ACTIVE
DIRECTORY DOMAIN SERVICES INSTALLATION WIZARD displays a message requesting confirmation
for changes in security policy on this computer that allows only Administrator to log on to the
computer with Terminal Server.
7
3) On the Choose a Deployment Configuration page, select Existing
forest, and Add a domain controller to an existing domain then
click Next.
b) Password: P@ssw0rd1
6) Click Next
8) In the Select a Site dialog check Use the site that corresponds to
the IP address of this computer.
Note
The Windows Server 2008 Active Directory Domain Services Installation Wizard has a new
dialog for Additional Domain Controller Options. The options available are:
■ DNS Server
■ Global Catalog
■ Read-only domain controller (RODC)
10) Read the warning message about delegation for this DNS Server
and click Yes.
8
Note
The informational message that is displayed indicates that a delegation for this DNS server
cannot be created because the authoritative parent zone cannot be found or it does not run Windows
DNS Server…
In our case, this occurs since contoso.com is our top-level domain and .com cannot be found because
it does not exist. The goal of this informational message is to help ensure IT professionals correctly
configure their DNS settings during the DCPROMO process.
11) On the Install from Media screen ensure the first option Replicate
data over the network from an existing domain controller is
selected and then click Next.
Note
The second new dialog page added to the Windows Server 2008 Active Directory Domain
Services Installation Wizard provides the option to select a source domain controller. Note that the
source domain controller must be writable.
12) On the Source Domain Controller screen, select Let the wizard
choose an appropriate domain controller option and then click
Next.
13) On the Location for Database, Log Files, and Sysvol leave the
default settings and click Next.
9
2. Confirm the domain controller is functioning properly.
1) Logon as Contoso\administrator after the reboot completes.
5) From a command prompt type: Net share and confirm that both
sysvol and netlogon are shared out.
(1) _LDAP._TCP.Contoso.com
(2) _Kerberos._TCP.Contoso.com
(3) _Kpasswd._TCP.Contoso.com
10
(4) _GC._TCP.Contoso.com
Tip
It may take several minutes for the sysvol to share out and for the above events to appear. If
you cannot verify these steps after five minutes stop and start the NTFRS service to resolve this issue.
2. View dcpromo.log and note the day, month and year this machine was
promoted to be a domain controller.
b. Note that the log now records day, month and year under the first
column
1) Example:
©2008 Microsoft Corporation Microsoft Confidential
11
10/01/2007 11:03:20 [INFO] Promotion request…
Note
The DCPROMO.LOG in Windows Server 2008 now displays the year in addition to day and
month that the domain controller was promoted.
12
Lab 3
Lab 3:
Windows Server 2008 DNS
1
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. These
materials are intended for distribution to and use only by Microsoft Premier Customers. Use or distribution of
these materials by any other persons is prohibited without the express written permission of Microsoft
Corporation. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Version 1.0
2
During this lab, you will configure and Troubleshoot DNS
Lab Environment
To complete this lab, you will need the following Virtual Machines:
■ 2003-01
■ 2008-01
Important
You must log on as an administrative user in order to perform all of the tasks in
this lab.
Username: Administrator
Password: P@ssw0rd1
Domain: Contoso
3
3. What is your logon server? __________________________1
4. Resolve the IP Address of your logon server using NSLOOKUP. Type the
following statement and press enter:
NSLOOKUP 2008-01
5. What are the IP Addresses?__________________________________2
NSLOOKUP
2. Type the following command and press enter:
set type=all
3. Type the following command and press enter:
_ldap._tcp.dc._msdcs.Contoso.com
4. You should see the result in Figure 2:
4
Figure 2: LDAP Servers for Contoso
Task 2: Verify whether you are using a domain controller in your site
using NLTEST and test the next closest site Group Policy Setting
1. On 2008-01, enable next closest site lookups for domain controllers:
2. Use the following statement to call and test the DSGetDCName function of the
DClocator service from command line. This will show the enumerated or cached
DC.
NLTEST /DSGETDC:Contoso.com
More info: http://msdn2.microsoft.com/en-us/library/ms675983.aspx
3. Use the following statement to call and test the DSGetDCOpen function of the
DClocator service from command line. This will show you a list of DC’s in a
pseudo-random order taking into consideration priorities and weights.
5
NLTEST /DNSGETDC:Contoso.com
More info: http://msdn2.microsoft.com/en-us/library/ms675985.aspx
__________________________________________________________________________________4
4. Use the following statement to locate a writable DC within a set of DCs in the
next closest AD site from the client's perspective that could authenticate the
client:
Note
Since both DC’s are in the same site, you will not actually see a next closest site resolution, but
during the RODC labs you can test this command to see a populate response. This command would be
useful during a support call to show you where DCLocator will look for the next closest DC based on
ISTG topology data.
5. Use the following statement to force a rediscovery of DCs and clear the cached
DC and site. This command is useful if a DC goes down in the client’s site and
forces the client to use a DC in another site. The sticky behavior of the DClocator
will cause the client to continue to use the remote DC until it becomes
unavailable or the client is restarted. However, in Windows Server 2008 and
Vista, whenever DsGetDcName retrieves a domain controller name from its
cache, it checks to see if this cached entry has expired and if so, discards that
domain controller name and tries to rediscover a domain controller name.
Exercise 3: GlobalNameZones
Enable the GlobalNames Zone functionality
6
3. Type the following, and then press Enter:
2. In the console tree, right-click a DNS server, and then click New Zone to open
the New Zone Wizard.
4. Choose an appropriate storage method and replication scope for the zone
Note We recommend that you store the zone in AD DS and replicate it to all
domain controllers that are DNS servers in the Forest. This will create a new
AD DS-integrated zone called GlobalNames which is stored in the forest-wide
DNS application partition.
2. Type NSLOOKUP
7
5. Type test and see the result
8
1 LOGONSERVER=\2008-01
2 172.24.1.2
3 DC:\\2008-01.contoso.com
4 2003-dc1.contoso.com, 2008-01.contoso.com
9
Lab 4
Lab 4:
Implementing RODC
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. These
materials are intended for distribution to and use only by Microsoft Premier Customers. Use or distribution of
these materials by any other persons is prohibited without the express written permission of Microsoft
Corporation. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Version 1.0
0
Version 1.0
During this lab, you will prepare the forest and domain for the introduction of
Windows Server 2008 Read Only Domain Controllers. You will also install the RODC
and understand its features.
Lab Environment
To complete this lab, you will need the following Virtual Machines:
■ 2003-01
■ 2008-01
■ 2008-02
■ Vista-01
Important
You must log on as an administrative user in order to perform some of the tasks
in this lab.
□ Username: Administrator
□ Password: P@ssw0rd1
□ Domain: Contoso
1
Exercise 1: Prepare Windows Server 2003 domain for
the installation of a Read Only Domain Controller
Scenario
You are the administrator of Contoso.com domain and have branch offices where
physical security cannot be guaranteed. You have decided to install a Read Only
Domain Controller (RODC) in your branch office.
Tasks
1. Prepare the contoso.com domain (Windows 2003 domain) for the RODC
installation.
Tasks
1. Configure network settings on 2008-02 and Vista-01 to place them in the
10.1.2.x subnet that maps to the West site, then join Vista-01 to the
Contoso.com domain.
2
User: Administrator
Password: P@ssw0rd1
2) Expand HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon
3. Pre-create a Read Only Domain Controller account using Active Directory Users
and computers on 2008-01.
e. Select the check box for Use advanced mode installation and click
Next.
j. On the Specify the Password Replication Policy page notice only the
Allowed RODC Password Replication Group is set to Allow under
Settings. Click Add.
3
k. On the Add Groups, Users and Computers dialog choose Allow
passwords for the account to replicate to this RODC and click OK.
1) Add user Don Hall and computer Vista-01 and click OK. Ensure
Don Hall and Vista-01 has been added with the setting of Allow.
Click Next.
a. Log onto 2008-01 and reset password for Susan Burk to P@ssw0rd1
c. Launch Server Manager and select Roles. Click Add Roles in the right
pane. The Add Role Wizard starts. On the Before You Begin page click
Next.
4
c. On the Network Credentials page, provide Contoso.com as the domain
name and click Set… Provide SBurk as the user name and password of
P@ssw0rd1 click OK and Next.
f. On the Install from Media page ensure Replicate data over the
network from an existing domain controller is selected and click
Next.
g. On the Source Domain Controller page ensure Let the wizard choose
an appropriate domain controller is selected and click Next.
h. On the Location for Database, Log Files, and SYSVOL page leave the
default entries and click Next.
b. Logon as Contoso\SBurk
d. What happens if you attempt to add the user accounts for Susan Burk
and Don Hall to the Domain Admins group? Why?
__________________________________________________________________________________________
__________________________________________________________________________________________1
5
6. For the purpose of this lab confirm successful replication of 2008-02
Note: You may get an error when trying to log onto 2008-02 for first
time due to trust account not being valid. If so, force inbound replication
on 2008-02 before trying again.
Tasks
1. View the following attributes that have been added to the Active Directory
schema to expedite the functionality that is required for RODC caching
operations
msDS-Reveal-OnDemandGroup
msDS-NeverRevealGroup
msDS-RevealedList
msDS-AuthenticatedToAccountList
6
c. Navigate to Roles, Active Directory Domain Services, Active
Directory Users and Computers, Contoso.com and then select
Domain Controllers OU
i. Now under Attributes list, you will see following attributes listed:
Scenario
During the installation of RODC you set a policy for the password of Vista-01
machine account and user Don Hall to be cached on the RODC. You now want Don
Hall, user in branch office, to log on to Vista-01. After the user and machine
successfully authenticates, you expect their passwords to be stored on RODC.
Tasks
1. Pause the 2003-01 Virtual Machine from within the Virtual Server
Administration website or Virtual PC settings. Since Windows Server 2003 does
not recognize the Windows Server 2008 RODC as a domain controller, the 2003
server will register DNS service records in the West site. We pause the 2003
Domain controller to prevent it from accepting authentication request from our
Vista-01 client.
2. Log onto 2008-01 and reset password for Don Hall to P@ssw0rd1
7
4. Log on to 2008-02 as contoso\SBurk. View current credentials that are
cached on the RODC. Ensure Don Hall and Vista-01 is cached. Review whose
accounts have been authenticated to an RODC.
g. Click on Advanced.
h. From the drop-down list, select Accounts whose passwords are stored
on this Read-only Domain Controller and ensure Don Hall and Vista-
01 are cached.
Scenario
Don Hall, a user in the branch office wants to log on to his machine, Vista-01.
However, the WAN connection is down and the branch office which belongs to site,
West, only contains an RODC. You understand that the RODC will be able to
authenticate Don Hall and Vista-01 because their credentials are successfully cached
on the RODC.
Tasks
1. Pause the 2008-01 to simulate a broken WAN link.
8
3. Resume virtual machine 2008-01 and 2003-01
9
Exercise 4: Administrator Role Separation
Scenario
You are the administrator of the Contoso domain and would like to create a local
administrator role for the RODC and add a user to that role
Tasks
1. Configure Administrator Role Separation for an RODC
b. Launch command prompt and type dsmgmt and then press ENTER
c. At the DSMGMT prompt, type local roles and then press ENTER
Tasks
1. Use DSQuery and NLTest to discover the RODCs on the domain.
10
Exercise 6: Reset the credentials cached on the stolen
RODC and delete the RODC
Scenario
You are the administrator of the Contoso domain. You just found out that the RODC
in your branch office has been stolen. You are concerned that some of your user’s
passwords are cached on the RODC. You are going to take appropriate steps to reset
the current credentials cached on the RODC.
Tasks
1. Reset the current credentials that are cached on the RODC
○ Reset all passwords for user accounts that were cached on this
Read-only Domain Controller
○ Uncheck Export the list of accounts that were cached on this Read-
only Domain Controller to this file
h. Click Cancel. Do NOT click on Delete! The RODC is needed for a later
lab.
1 The options are grayed out and the user is unable to make changes.
©2008 Microsoft Corporation Microsoft Confidential
11
Lab 5
Lab 5:
Server Core
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. These
materials are intended for distribution to and use only by Microsoft Premier Customers. Use or distribution of
these materials by any other persons is prohibited without the express written permission of Microsoft
Corporation. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Version 1.0
During this lab, you will promote a Windows Server 2008 server core machine into
the contoso.com domain. You will also learn how to perform basic administrative
tasks from the command line.
Lab Environment
To complete this lab, you will need the following Virtual Machines:
■ 2008-core-01
■ 2008-01
■ 2003-01
You must log on as an administrative user in order to perform some of the tasks in
this lab.
□ Username: Administrator
□ Password: P@ssw0rd1
1
Exercise 1: Configure the IP Address with Netsh
Scenario
You have a fresh install of Windows Server 2008 Core. You are tasked with setting
the IP address in a manner that is consistent with corporate guidelines.
Tasks
1. Use Netsh to configure TCP/IP properties
At the command prompt type the following and then press ENTER
Ipconfig /all
shutdown /r
©2008 Microsoft Corporation Microsoft Confidential
2
Exercise 2: Configure 2008-core-01 so that it can be
controlled remotely
Scenario
2008-core-01 will be in a remote location. Make sure it will be possible to connect
to the server using RDP.
b. Launch MSTSC
a. At the command prompt type the following and then press ENTER
Start /w ocsetup WindowsServerBackup
b. Once the process is completed, you will see command prompt again
©2008 Microsoft Corporation Microsoft Confidential
3
c. Confirm if the feature is added by typing the following command
Oclist
a. At the command prompt type the following and then press ENTER
Start /w ocsetup DNS-Server-Core-Role
Note: Using the /w switch prevents the command prompt from returning
until the installation completes. Without the /w switch there is no
indication that the installation completed.
b. Once the process is completed, you will see command prompt again
b. Launch DNSMGMT.msc
4
Exercise 5: Promote the Server Core box into the
contoso.com domain using the answer file that we
created in a previous lab.
Scenario
You are testing the use of server core Domain Controllers in your enterprise. Please
promote 2008-core-01 as a new Domain Controller DC in contoso.com using an
unattend file (the unattend file was created in a previous lab).
d. At the command prompt type the following and then press ENTER
dcpromo /unattend:2008-answer.txt
i. At the command prompt type the following and then press ENTER
Netsh firewall show state. Notice the firewall is enabled.
j. At the command prompt, type the following and then press ENTER
net share.
5
Lab 6
Lab 6:
Directory Services Auditing
Changes
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. These
materials are intended for distribution to and use only by Microsoft Premier Customers. Use or distribution of
these materials by any other persons is prohibited without the express written permission of Microsoft
Corporation. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Version 1.0
During this lab, you will perform hands on Windows Server 2008 Auditing.
Lab Environment
To complete this lab, you will need the following Virtual Machines:
■ 2008-01
You must log on as an administrative user in order to perform all of the tasks in this
lab.
□ Username: Administrator
□ Password: P@ssw0rd1
□ Domain: Contoso
1
Exercise 1: Review DS Auditing changes in Windows
Server 2008
Scenario
You are an administrator of Contoso domain and would like to view changes to Auditing in
Windows Server 2008.
Tasks
1. Review the Audit Policy settings under Default Domain Policy.
c. Expand Features
f. Expand Domains
g. Expand Contoso.com
2. Review the Audit Policy settings under Default Domain Controllers Policy. Ensure
the policy setting for directory service access audit policy is set to Success
2
c. In Group Policy Management Editor, Select Audit Policy under Computer
Configuration, Windows Settings, Security Settings, Local Policies
3. View the subcategories of DS Access via auditpol.cmd and ensure that Directory
Service Changes is set to Success
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
3
Tasks
1. Ensure audit policy is enabled (completed in exercise 1)
c. Expand Roles
f. Select Contoso.com
j. Confirm Advanced Features are enabled in the View menu in order for
you to view the Security tab.
k. Select Security tab, click on Advanced and select the Auditing tab.
l. Click on Add
m. Under Enter the object name to select, type Authenticated Users and
then click OK.
o. Under Access, select the Successful check box for Write all properties,
Create all child objects and Delete all child objects. It will check
successful audit for several other accesses.
p. Click on OK until you exit the property sheet for the OU or other object.
4
c. Click on Next
d. The log shows Directory Service Changes event 5137 indicating creation
of new directory service object:
Subject:
Security ID: CONTOSO\Administrator
Account Name: Administrator
Account Domain: CONTOSO
Logon ID: 0x18b1d
Directory Service:
Name: Contoso.com
Type: Active Directory Domain Services
Object:
DN: cn=AuditTest1,ou=AuditTest,DC=Contoso,DC=com
GUID: CN=AuditTest1,OU=AuditTest,DC=Contoso,DC=com
Class: user
Operation:
Correlation ID: {57586991-b6fd-49e8-b52b-6cdb19067268}
Application Correlation ID: -
5. Rename the user’s First Name to Test1000
5
b. Select user AuditTest1
e. Click on OK
d. The log shows two Directory Service Changes events 5136. The first one
shows Operation type: Value deleted for givenName AuditTest1 and the
second one shows Operation type: Value added for givenName with value
Test1000.
6
Operation:
Type: Value Deleted
Correlation ID: {b87e4c30-c6cd-44cf-947b-09ee52dd25e9}
Application Correlation ID: -
7
e. Click on Next
g. Click on Next
h. Click on Finish
d. Click on OK
The log shows Directory Service Changes event 5139 indicating successful move.
Please note that the event shows Old and New DN showing original and new location of
an object.
Subject:
Security ID: CONTOSO\Administrator
Account Name: Administrator
©2008 Microsoft Corporation Microsoft Confidential
8
Account Domain: CONTOSO
Logon ID: 0x18b1d
Directory Service:
Name: Contoso.com
Type: Active Directory Domain Services
Object:
Old DN: CN=AuditTest2,CN=Users,DC=Contoso,DC=com
New DN: CN=AuditTest2,OU=AuditTest,DC=Contoso,DC=com
GUID: CN=AuditTest2,OU=AuditTest,DC=Contoso,DC=com
Class: user
Operation:
Correlation ID: {2fe1228d-d0a4-45d1-bdfc-48d64d7802be}
Application Correlation ID: -
9
Lab 7
Lab 7:
DFSR and SYSVOL Migration
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. These
materials are intended for distribution to and use only by Microsoft Premier Customers. Use or distribution of
these materials by any other persons is prohibited without the express written permission of Microsoft
Corporation. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Version 1.0
During this lab, you will migrate SYSVOL from FRS to DFSR as the replication engine.
Lab Environment
To complete this lab, you will need the following Virtual Machines:
■ 2008-01
■ 2008-02
■ 2008-Core-01
You must log on as an administrative user in order to perform all of the tasks in this
lab.
□ Username: Administrator
□ Password: P@ssw0rd1
□ Domain: Contoso
1
Exercise 1: Migrate SYSVOL from using NTFRS to DFSR
Scenario
You are the administrator of Contoso.com domain. You understand that in your
current environment SYSVOL is using NTFRS as its replication engine. However, you
have read that DFSR provides substantial improvements over FRS and several key
new features. Therefore, you wish to perform a DFSR migration and you are ready
to demote any domain controller that is not running Windows Server 2008 to
perform this migration.
Tasks
1. Transfer all FSMO roles to from 2003-01 to 2008-01 and demote 2003-01.
Note: Dcrpromo will try to transfer roles automatically if not done before.
9. It will prompt you to confirm if you want to transfer the role to 2008-01
2
13. Type quit and press ENTER
14. At the command prompt, type netdom query fsmo and then press
ENTER
4. Reboot
b. Right click on the domain and select Raise Domain Functional Level.
c. At the command prompt, type the following and then press ENTER
net share
3
f. Launch Adsiedit.msc
j. Confirm that the right pane shows an NTFRS Subscriber object called
CN=Domain System Volume (SYSVOL share)
m. Confirm right pane contains NTFRS member objects for all the Domain
Controllers. NTFRS member object name is same as the domain controller
name.
n. Close Adsiedit.msc
p. Check the File Replication Service log and confirm that no errors or
warnings are reported for Sysvol.
5. Verify that the DFS Replication service is installed and is set to Automatic start
4
d. If the service is not installed:
5. Click on Install
d) Select CN=System
©2008 Microsoft Corporation Microsoft Confidential
5
e) Notice in details pane, CN=DFSR-GlobalSettings object of class
msDFSR-GlobalSettings is created under CN=System.
f) Click on Cancel
6. For NTFRS compatibility, the content set is set to filter out the
DO_NOT_REMOVE_NtFrs_PreInstall_Directory and
NtFrs_PreExisting___See_EventLog folders.
6
c) Confirm the value is set to
DO_NOT_REMOVE_NtFrs_PreInstall_Directory,
NtFrs_PreExisting___See_EventLog.
d) Click on Cancel.
c) Close Adsiedit.msc.
8. Sets GlobalState to 0.
1. It will report:
Current DFSR global state: Start
New DFSR global state: ‘Prepared’
7
1. Creates SYSVOL_DFSR, and its immediate subfolders, copying the ACLs
from the original SYSVOL.
c) Confirm ACLs are identical for Policies and Scripts folders under
%SystemRoot%\SYSVOL\Domain and
%SystemRoot%\SYSVOL_DFSR\Domain
a) Launch Adsiedit.msc.
d) Select CN=Topology.
©2008 Microsoft Corporation Microsoft Confidential
8
e) Details pane shows CN=2008-02 object of class msDFSR-Member.
h) Click on Cancel
b) Expand CN=2008-01.
a) Select CN=DFSR-LocalSettings.
e) Click on Cancel.
9
c) Right click CN=SYSVOL Subscription and select Properties.
e) Click on Cancel.
f) Close Adsiedit.msc.
a) Launch regedit.
b) Navigate to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services
\DFSR\Parameters\SysVols\Migrating SysVols
3. It will report:
Current DFSR global state: ‘Prepared’
Succeeded.
2. It will list Domain Controllers that are not in sync with Global State.
Example:
10
3. If any of the Domain Controllers are listed there, then force Active
Directory replication using following command:
Repadmin /syncall 2008-01 /AdeP
Repadmin /syncall 2008-02 /Ade
c. It will report:
Current DFSR global state: ‘Prepared’
©2008 Microsoft Corporation Microsoft Confidential
11
New DFSR global state: ‘Redirected’
Migration will proceed to ‘Redirected’ state. The SYSVOL share
will be changed to SYSVOL_DFSR folder.
If any changes have been made to the SYSVOL share during the
state transition from ‘Prepared’ to ‘Redirected’ please
robocopy the changes from SYSVOL to SYSVOL_DFSR on any
replicated RWDC.
Succeeded.
3. It will report
Current DFSR global state: Redirected
Succeeded.
e. Verify that SYSVOL and NETLOGON shares are now pointing to paths under
SYSVOL_DFSR.
1. At the command prompt, type net share and then press ENTER
2. It will list Domain Controllers that are not in sync with Global State.
12
a. Launch a Command prompt
c. It will report
Current DFSR global state: ‘Redirected’
New DFSR global state: ‘Eliminated’
Migration will proceed to ‘Eliminated’ state. It is not
possible to revert this step.
If any RODC is stuck in the ‘Eliminating’ state for too long
then run with option /DeleteRoNtfrsMembers.
Succeeded.
2. It will report
Current DFSR global state: Eliminated
Succeeded.
2. It will list Domain Controllers that are not in sync with Global State.
b) Expand CN=DFSR-LocalSettings,CN=2008-01,OU=Domain
Controllers DC=Contoso, DC=com.
13
c) Select CN=Domain System Volume.
i) Close Adsiedit.msc.
b) Navigate to %SystemRoot%.
g. Verify that SYSVOL and NETLOGON shares are pointing to paths under
SYSVOL_DFSR.
7. Close regedit.exe.
10. Review the DFS Replication Event log for DFSR SYSVOL migration events.
14
a. Click on Start, Programs, Administrative Tools and Event Viewer.
b. Check the DFS Replication log and examine the SYSVOL migration events.
15
Lab 8
Lab 8:
Fine Grained Password Policy
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. These
materials are intended for distribution to and use only by Microsoft Premier Customers. Use or distribution of
these materials by any other persons is prohibited without the express written permission of Microsoft
Corporation. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Version 1.0
During this lab, you will learn about Group Policy changes and FGPP.
Lab Environment
To complete this lab, you will need the following Virtual Machines:
■ 2008-01
■ 2003-DC1
You must log on as an administrative user in order to perform all of the tasks in this
lab.
□ Username: Administrator
□ Password: P@ssw0rd1
□ Domain: Contoso
1
Exercise 1:
Create a New Password Settings Object (PSO)
Scenario
You are the administrator of Contoso.com domain. You have been asked to set up a
password policy for your users in Managers group with password’s minimum length
to be of 10 characters.
Tasks
1. On 2008-01, verify the domain functional level is set to Windows Server 2008.
a. Log on to 2008-01 as Contoso\administrator
f. Click on Close
2. Create a new Password Settings Object and name it managers. Specify Password
Length to be of 10 characters.
a. Click on Start, Run, type Adsiedit.msc and click on OK.
c. Expand CN=System,DC=Contoso,DC=com
2
g. For different attributes, type the corresponding values from the
following list and click Next (the times are entered in d:hh:mm:ss
format):
Value
Attribute
cn Managers
msDS-PasswordSettingsPrecedence 10
msDS-PasswordReversibleEncryptionEnabled FALSE
msDS-PasswordHistoryLength 24
msDS-PasswordComplexityEnabled TRUE
msDS-MinimumPasswordLength 10
msDS-MinimumPasswordAge 0
msDS-MaximumPasswordAge 20:00:00:00 (20 days)
msDS-LockoutThreshold 0
msDS-LockoutObservationWindow 0:00:30:00
(30 minutes)
msDS-LockoutDuration 0:00:30:00
(30 minutes)
c. Click Edit.
3
h. Click OK.
i. Close Adsiedit.msc.
4. Test the password policy by resetting the password of Lisa Miller in Managers
group to seven characters from AD users and computers. It should fail. Test it by
setting to 10 or more characters.
d. Right click the Lisa Miller account and select Properties. Click on the
MemberOf tab and verify Lisa Miller is a member of the Managers group.
Click OK to close the user properties.
h. Click OK.
i. Right click on the user account again and select “Reset Password…”
l. Click OK.
4
Exercise 2:
How to determine which PSO is effective on a user
Tasks
1. On 2008-01, query the msDS-ResultantPSO attribute for the user in question.
This will indicate the distinguished name of the PSO that is ultimately applied to
that user.
b. Select the user account for which you would like to examine the effective
PSO.
e. Click Filter, confirm that Show attributes: Optional, and Show read-
only attributes: Constructed are checked.
g. If multiple PSO’s are applied to a user, which one will take effect? How
can you tell?
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
5
What does the output show?
6
Lab 9
Lab 9:
Group Policy Changes and
Enhancements
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. These
materials are intended for distribution to and use only by Microsoft Premier Customers. Use or distribution of
these materials by any other persons is prohibited without the express written permission of Microsoft
Corporation. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Version 1.0
During this lab, you will learn about Group Policy changes and FGPP.
Lab Environment
To complete this lab, you will need the following Virtual Machines:
■ 2008-01
You must log on as an administrative user in order to perform all of the tasks in this
lab.
□ Username: Administrator
□ Password: P@ssw0rd1
□ Domain: Contoso
1
Exercise 1: Enabling GPEDIT logging and Create a
Central Store
Task 1: Enable GPEDIT logging
1. Logon to 2008-01 as Contoso\Administrator
2. Run Regedit.exe
a. Debug Logging is provided for GPEDIT, and may be enabled via the
following Registry key.
2. To copy all the language-neutral and specific ADMX files from your Windows
Server 2008-01 system to the central store on your domain controller using the
xcopy command, type:
Xcopy /S %systemroot%\PolicyDefinitions\*
%logonserver%\sysvol\%userdnsdomain%\policies\PolicyDefinitions
3. When prompted for file or directory, enter D
4. To edit administrative template policy settings using ADMX files open the
Group Policy Management Console. Click Start, click Run, then type GPMC.msc.
2
6. Type a name for the GPO and click OK.
8. Right-click the name of the GPO you created and click Edit.
14. Review the log and notice the information stating Successfully wrote:
Software\Policies\Microsoft\Windows NT\Printers\DisableWebPrinting
Important
The Group Policy Object Editor automatically reads all ADMX files stored in the
central store. When there is no central store, the Group Policy Object Editor reads
the local versions of the ADMX files used by the local GPO on your Windows Vista™
administrative machine.
Task 1:
1. On 2008-01 create a new Starter GPO
3
c. Right click Starter GPOs and then click New.
d. In the New Starter GPO dialog box, type Contoso Base in the Name box
and click OK.
e. Right click Contoso Base and select Edit. Notice only Administrative
templates are available to manage in a Starter GPO. Change an
administrative template setting under User or Computer configuration;
then close the Group Policy Editor window.
a. Right Click Contoso Base and then click New GPO from Starter GPO.
b. In the New GPO dialog box, type Training Policy in the Name box and
click OK.
a. Right Click Network Shares and select New and Network Shares
4
1) Action : Create
5) Click OK
7. Re-login and open up a command prompt and type net share. You will see a
share by the name 2008TEST pointing to an existing folder, in this case to the C
drive on 2008-01.
a. Right Click Drive Maps and select New and Map Drives
1) Action : Create
2) Location: \\2008-01\c$
5
4) Drive Letter: Use first available starting at: E
7) Click New Item and select Security Group and click on Browse
9) Click OK
6. (Optional) Test via logging to Vista-01 as a Domain Admin and a non admin
and confirm if the drive is mapped.
3. Click on Drive letter in the right console to select the preference and click the
red circle with a slash on the toolbar to disable it
5. Re-login and open My Computer and view MyDrive is not available anymore
6
Lab 10
Lab 10:
Windows Server 2008 Backup
and Recovery
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or
should be inferred. Complying with all applicable copyright laws is the responsibility of the user. These
materials are intended for distribution to and use only by Microsoft Premier Customers. Use or distribution of
these materials by any other persons is prohibited without the express written permission of Microsoft
Corporation. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights
covering subject matter in this document. Except as expressly provided in any written license agreement from
Microsoft, the furnishing of this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
Version 1.0
During this lab, you will use the Windows Server 2008 Backup features to backup,
view, and restore Active Directory data.
■ Create a snapshot and mount the snapshot so that the backup directory
information can be viewed in an LDAP browser.
Lab Environment
To complete this lab, you will need the following Virtual Machines:
■ 2008-01
Important
You must log on as an administrative user in order to perform some of the tasks
in this lab.
□ Username: Administrator
□ Password: P@ssw0rd1
□ Domain: Contoso
1
Exercise 1: Use Windows Server Backup to backup and
restore System State data
Scenario
As an administrator of Active Directory in Contoso.com, you need to test the correct
Disaster Recovery procedures used for Active Directory in Windows Server 2008.
Tasks
1. Use Windows Server backup to backup the Windows System State.
Important
The backup target location must contain a drive letter and colon, followed by no
folder path (such as D: , F: , etc). The backup target cannot be the system drive, and
cannot be a mapped drive.
2
2) When prompted, enter C and press Enter, then enter Y and press
Enter.
Important
The backup could take up to 90 minutes to complete; depending on hardware resources.
4. Load the ntds.dit copy created in the snapshot and connect to the offline
directory using an ldap browser
1) Launch ldp.exe
3
3) Change the port to 5000 and click OK
Note
The above steps are necessary to un-mount the Windows Server 2008 ISO to prevent
accidently selecting “Boot from CD or DVD” during the reboot.
6. Use Windows Server backup to restore the Windows System State backup.
4
1) At the command prompt, type wbadmin start
systemstaterecovery –version:<datetime as found in previous
step>
2) Type Y when prompted at Do you want to start the system state
recovery operation.
3) Type Y when prompted at:
The replication engine used at backup time was `FRS`. You cannot
use System State Recovery if the replication engine for SYSVOL
changed from the backup time.
If the replication engine has changed, abort this recovery and contact
support.
Do you want to proceed?
[Y] Yes [N] No
Note
If you are going to perform a restore after a SYSVOL migration to DFSR has been performed,
you cannot use a system state backup taken while FRS was the replication engine for SYSVOL.