Windows Admin Interview
Windows Admin Interview
2) Explain in windows DNS server what is Primary, Secondary and Stub zone?
Primary Zone: In this, the file is saved as normal text file with filename (.dns).
Secondary Zone: It maintains a read-only copy of zone database on another DNS
server. Also, it acts as a back-up server to the primary server by providing fault
tolerance and load balancing
Stub Zone: It consists of a copy of name server and SOA records which is used for
reducing the DNS search orders.
3) Explain what does IntelliMirror do?
IntelliMirror helps to reconcile desktop settings, applications and stored files for users
especially for those users who move between workstations or those who works offline
4) In the case when MSI file is not available, how you can install an app?
To add the application using the Software Installer.ZAP text file can be used rather than the
windows installer
5) Explain how you can set up remote installation procedure without giving access to user?
“ Tattooing” the registry means user can modify and view user preference that are not
stored in the maintained portions of the Registry. Even if the group policy is changed or
removed, the user preference will still persist in the registry.
Iterative Query
Recursive Query
Primary function of the domain controller is to validate users to the networks, it also provide
a catalog of Active Directory Objects.
9) What information is required when TCP/IP is configured on Window Server?
To configure a TCP/PI client for an IPv4 client, you have to provide the IP address and the
subnet mask.
The caching only DNS server provides information related to queries based on the data it
contains in its DNS cache.
11) Explain what is the way to configure the DHCP server such that it allocates the same IP
address to certain devices each time the address is removed?
To configure the DHCP server, you can create a reservation for the device. To create a
reservation, you must know the MAC hardware address of the device. To determine the
MAC address for a network device you can use the ipconfig or nbs tat command line
utilities.
To look up for the information from the server, e-mail and another program follows or uses
the internet protocol. This protocol is referred as LDAP or Lightweight Directory Access
Protocol.
It is a set of files and folders that is stored on the local hard disk of each domain controller in
a domain and are replicated by the FRS ( File Replication Service). These files contain
group or user policy information.
Thread: A thread is a several executable program that work together as a single process.
For instance, one thread might send an error message to the user; another might handle
error signals while the third thread might be executing the original action.
INODE holds the metadata of files; INODE is a pointer to a block on the disk, and it is
unique.
A local DNS server provides the local mapping of fully qualified domain names to IP
addresses. To resolve remote requests related to the domains names on your network,
local DNS servers can provide record information to remote DNS servers.
18) To check TCP/IP configurations and IP connectivity, what are the two command line
utilities that can be used?
Ipconfig: To check the computer’s IP configuration, command ipconfig can be used and
also it can be used to renew the client’s IP address if it is provided by a DHCP server.
Ping: To check the connection between the local computer and any of the other computer
device on the network Ping command is used
19) Explain if it is possible to connect Active Directory to other 3 rd party Directory services?
Yes, you can connect other vendors directory services with Microsoft version. By using
dirXML or LDAP to connect to other directories.
ntds.dit
edb.log
res1.log
res2.log
edn.chk
21) Explain what is the major difference between NTFS ( New Technology File System) or
FAT (File Allocation Table) on a local server?
For local users FAT (File Allocation Table) and FAT32 provides security, while NTFS ( New
Technology File System) provides security for domain users as well as local users. NTFS
provides file level security which is not possible through FAT32.
22) Mention what windows server 2008 service is used to install client operating system over
the network?
WDE ( Windows Deployment Services ) allows you to install client and server operating
systems over the network to any computer with a PXE enabled network interface
System Administrator
- Who work 24/7 in administrating both wintel & VMware technical Support.
Active Directory is a centralized and standardized system, stores information about objects
in a network and makes this information available to users and network administrators.
Domain Controller
In an Active Directory forest, the domain controller is a server that contains a writable copy
of the Active Directory database, participates in Active Directory replication, and controls
access to network resources.
A global catalog server is a domain controller that stores information about all objects in the
forest. Like all domain controllers, a global catalog server stores full, writable replicas of the
schema and configuration directory partitions and a full, writable replica of the domain
directory partition for the domain that it is hosting. In addition, a global catalog server
stores a partial, read-only replica of every other domain in the forest. Partial replicas are
stored on Global Catalog servers so that searches of the entire directory can be achieved
without requiring referrals from one domain controller to another.
Partial information of other domains. Partial information nothing but classes and attributes
(first name and last name and phones and addresses) attribute level security improvement
in 2003….
OU:
Domain:
Windows Domain is a logical grouping of computers that share common security and user
account information.
Forest
A Windows forest is a group of one or more trusted Windows trees. The trees do not need to
have contiguous DNS names. A forest shares a schema and global catalog servers. A single
tree can also be called a forest.
Tree:
A Windows tree is a group of one or more trusted Windows domains with contiguous DNS
domains. “Trusted” means that an authenticated account from one domain isn’t rejected by
another domain. “Contiguous DNS domains” means that they all have the same root DNS
name.
Site:
Sites are manually defined groupings of subnets. Objects in a site share the same global catalog servers,
and can have a common set of group policies applied to them.
Schema:
The schema defines what attributes, objects, classes, and rules are available in the Active Directory.
Group Policy
A GPO is a collection of Group Policy settings, stored at the domain level as a virtual object
consisting of a Group Policy container (GPC) and a Group Policy template (GPT).
Password history will store
Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy
Group Policy Container (GPC)
The Group Policy container (GPC) is an Active Directory container that contains GPO
properties, such as version information, GPO status, plus a list of other component settings.
Intrasite Replication
Replication that happens between controllers inside one site. All of the subnets inside the
site should be connected by high speed network wires.
Intersite Replication
USE:
When Microsoft Exchange Server is deployed in an organization, Exchange Server uses
Active Directory as a data store and it extends the Windows 2000 Active Directory schema
to enable it to store objects specific to Exchange Server. The ldapDisplayName of the
attribute schema ms-Exch-Assistant-Name, ms-Exch-LabeledURI, and ms-Exch-House-
Identifier defined by Exchange Server conflicts with the iNetOrgPerson schema that Active
Directory uses in Windows Server 2003. When Windows Server 2003 Service Pack 1 is
installed, Adprep.exe will be able to detect the presence of the schema conflict and block
the upgrade of the schema until the issue has been resolved.
GUID:
When a new domain user or group account is created, Active Directory stores the account's
SID in the Object-SID (objectSID) property of a User or Group object. It also assigns the
new object a globally unique identifier (GUID), which is a 128-bit value that is unique not
only in the enterprise but also across the world. GUIDs are assigned to every object created
by Active Directory, not just User and Group objects. Each object's GUID is stored in its
Object-GUID (objectGUID) property.
Active Directory uses GUIDs internally to identify objects.
SID:
A security identifier (SID) is a data structure in binary format that contains a variable
number of values. When a DC creates a security principal object such as a user or group, it
attaches a unique Security ID (SID) to the object. This SID consists of a domain SID (the
same for all SIDs created in a domain), and a relative ID (RID) that is unique for each
security Principal SID created in a domain.
Lingering objects
When a domain controller is disconnected for a period that is longer than the TSL, one or
more objects that are deleted from Active Directory on all other domain controllers may
remain on the disconnected domain controller. Such objects are called lingering objects.
Because the domain controller is offline during the time that the tombstone is alive, the
domain controller never receives replication of the tombstone
Sysvol
Sysvol is a shared directory that stores the server copy of the domain’s public files, which
are replicated among all domain controllers in the domain. The Sysvol contains the data in a
GPO: the GPT, which includes Administrative Template-based Group Policy settings, security
settings, script files, and information regarding applications that are available for software
installation. It is replicated using the File Replication Service (FRS).
File Replication Service (FRS)
In Windows 2000, the SYSVOL share is used to authenticate users. The SYSVOL share
includes group policy information which is replicated to all local domain controllers. File
replication service (FRS) is used to replicate the SYSVOL share. The "Active Directory Users
and Computers" tool is used to change the file replication service schedule.
Win logon
A component of the Windows operating system that provides interactive logon support,
Winlogon is the service in which the Group Policy engine runs.
It defines how clients and servers exchange information about a directory. LDAP version 2
and version 3 are used by Windows 2000 Server's Active Directory.
An LDAP URL names the server holding Active Directory services and the Attributed Name of the object. For
example:
LDAP://SomeServer.Myco.Com/CN=jamessmith,CN=Sys,CN=Product,CN
=Division,DC=myco,DC=domain-controller
USN
Each object has an Update Sequence Number (USN), and if the object is modified, the USN
is incremented. This number is different on each domain controller. USN provides the key to
multimaster replication.
A list of security protections that applies to an object. (An object can be a file, process, event, or anything
else having a security descriptor.)
ACE contains a set of access rights and a security identifier (SID) that identifies a trustee for whom the
rights are allowed, denied, or audited.
MultiMaster Operation:
In Windows 2000 & 2003, every domain controller can receive changes, and the changes
are replicated to all other domain controllers. The day-to-day operations that are associated
with managing users, groups, and computers are typically multimaster operations.
There is a set of Flexible Single Master Operations (FSMO) which can only be done on a
single controller. An administrator determines which operations must be done on the master
controller. These operations are all set up on the master controller by default and can be
transferred later. FSMO operations types include:
Schema Master: The schema master domain controller controls all updates and
modifications to the schema. There can be only one schema master in the whole forest.
Domain naming master: The domain naming master domain controller controls the
addition or removal of domains in the forest and responsibility of ensuring that domain
names are unique in the forest. There can be only one domain naming master in the whole
forest.
Infrastructure Master:
The infrastructure is responsible for updating references from objects in its domain to
objects in other domains. At any one time, there can be only one domain controller acting
as the infrastructure master in each domain.
This works when we are renaming any group member ship object this role takes care.
Note: The Infrastructure Master (IM) role should be held by a domain controller that is not a
Global Catalog server (GC). If the Infrastructure Master runs on a Global Catalog server it
will stop updating object information because it does not contain any references to objects
that it does not hold. This is because a Global Catalog server holds a partial replica of every
object in the forest. As a result, cross-domain object references in that domain will not be
updated and a warning to that effect will be logged on that DC's event log. If all the domain
controllers in a domain also host the global catalog, all the domain controllers have the
current data, and it is not important which domain controller holds the infrastructure master
role.
Relative ID (RID) Master:
It assigns RID and SID to the newly created object like Users and computers. If RID master
is down (u can create security objects up to RID pools are available in DCs) else u can’t
create any object one itSDs down
When a DC creates a security principal object such as a user or group, it attaches a unique
Security ID (SID) to the object. This SID consists of a domain SID (the same for all SIDs
created in a domain), and a relative ID (RID) that is unique for each security principal SID
created in a domain.
PDC Emulator - When Active Directory is in mixed mode, the computer Active Directory is
on acts as a Windows NT PDC. The first server that becomes a Windows 2000 domain
controller takes the role of PDC emulator by default.
Functions performed by the PDC emulator:
User account changes and password changes.
SAM directory replication requests.
Domain master browser requests
Authentication requests.
GPO
Time synchronization
To raise the domain functional level, you go to the properties of your domain in Active
Directory Domains and Trusts. To raise the forest functional level you go to the properties of
Active Directory Domains and Trusts at the root. Of course, if your domains are not at the
correct level, you won’t be able to raise the forest functional level.
Directory partition
A directory partition, or naming context, is a contiguous Active Directory sub tree replicated
on one, or more, Windows 2000 domain controllers in a forest. By default, each domain
controller has a replica of three partitions: the schema partition the Configuration partition
and a Domain partition.
Schema partition
It contains all class and attributes definitions for the forest. There is one schema
directory partition per forest.
Configuration partition
It contains replication configuration information (and other information) for the forest. There
is one configuration directory partition per forest.
Domain partition
It contains all objects that are stored by one domain. There is one domain directory
partition for each domain in the forest.
o Computer
o Group
RPC:
Active Directory uses RPC over IP to transfer both intersite and intrasite replication between
domain controllers. To keep data secure while in transit, RPC over IP replication uses both
the Kerberos authentication protocol and data encryption.
SMTP:
If you have a site that has no physical connection to the rest of your network, but that can
be reached using the Simple Mail Transfer Protocol (SMTP), that site has mail-based
connectivity only. SMTP replication is used only for replication between sites. You also
cannot use SMTP replication to replicate between domain controllers in the same domain—
only inter-domain replication is supported over SMTP (that is, SMTP can be used only for
inter-site, inter-domain replication). SMTP replication can be used only for schema,
configuration, and global catalog partial replica replication. SMTP replication observes the
automatically generated replication schedule.
Changing of ntds.dit file from one Drive to another
1.Boot the domain controller in Directory Services Restore mode and log on with the
Directory Services Restore mode administrator account and password (this is the
password you assigned during the Dcpromo process).
2.At a command prompt, type ntdsutil.exe. You receive the following prompt:
ntdsutil:
3.Type files to receive the following prompt:
file maintenance:
4.Type info. Note the path of the database and log files.
5.To move the database, type move db to %s (where %s is the target folder).
6.To move the log files, type move logs to %s (where %s is the target folder).
7.Type quit twice to return to the command prompt.
8.Reboot the computer normally.
DNS
Domain Name System (DNS) is a database system that translates a computer's fully
qualified domain name into an IP address.
Primary Zones - It Holds Read and Write copies of all resource records (A, NS, _SRV).
Secondary Zones- which hold read only copies of the Primary Zones.
Stub Zones
Conceptually, stub zones are like secondary zones in that they have a read only copy of a
primary zone. Stub zones are more efficient and create less replication traffic.
Stub Zones only have 3 records, the SOA for the primary zone, NS record and a Host (A)
record. The idea is that if a client queries a record in the Stub Zone, your DNS server can
refer that query to the correct Name Server because it knows its Host (A) record.
Queries
SOA (start of authority) record each zone has one SOA record that identifies which
DNS server is authoritative for domains and sub domains in the zone.
NS (name server) record An NS record contains the FQDN and IP address of a DNS
server authoritative for the zone. Each primary and secondary name server authoritative
in the domain should have an NS record.
A (address) record By far the most common type of resource record, an A record
is used to resolve the FQDN of a particular host into its associated IP address.
PTR (pointer) record the opposite of an A record, a PTR record is used to resolve the IP
address of a host into its FQDN.
SRV (service) record An SRV record is used by DNS clients to locate a server that
is running a particular service—for example, to find a domain controller so you can log on
to the network. SRV records are key to the operation of Active Directory.
Once DNS and replication are setup, it is generally a bad idea to change a servers IP
address (at least according to Microsoft). Just be sure that is what you really want to do
before starting the process. It is a bit kin to changing the Internal IPX number of A Novell
server, but it can be done.
5. Go to one of the other DCs and verify that its DNS is now pointing to the new IP
address of the server. If not, change the records manually and give it 15 minutes to
replicate the DNS changes out.
6. Run REPLMON and make sure that replication is working now. You may have to wait
a little while for things to straighten out. Give it an hour or two if necessary.
If a server shows that it isn’t replicating with one of its partners, there are
several issues to address:
A. Check to see that the servers can ping each other.
B. Make sure that both servers’ DNS entries for each other point to the proper IP
addresses
C. If server A says it replicated fine, but server B says it couldn’t contact Server A,
check the DNS setup on Server B. Chances are it has a record for Server A pointing to the
wrong place.
Trust Relationship
One way trust - When one domain allows access to users on another domain, but
the other domain does not allow access to users on the first domain.
Two way trust - When two domains allow access to users on the other domain.
Trusting domain - The domain that allows access to users on another domain.
Trusted domain - The domain that is trusted, whose users have access to the
trusting domain.
Transitive trust - A trust which can extend beyond two domains to other trusted
domains in the tree.
Intransitive trust - A one way trust that does not extend beyond two domains.
Explicit trust - A trust that an administrator creates. It is not transitive and is one
way only.
Cross-link trust - An explicit trust between domains in different trees or in the
same tree when a descendent/ancestor (child/parent) relationship does not exist
between the two domains.
Forest trust - When two forests have a functional level of Windows 2003, you can
use a forest trust to join the forests at the root.
Shortcut trust - When domains that authenticate users are logically distant from
one another, the process of logging on to the network can take a long time. You
can manually add a shortcut trust between two domains in the same forest to
speed authentication. Shortcut trusts are transitive and can either be one way or
two way.