+ All Categories
Home > Documents > Windows administrator Q&A

Windows administrator Q&A

Date post: 05-Nov-2015
Category:
Upload: study-iit
View: 14 times
Download: 0 times
Share this document with a friend
Description:
windows administrators interview Q7A
26
 I n t e rview q u e sti o n s a n d a n sw e rs------- - up d a t in g 1) w h a t are th e d isk typ e s u se d in a t w o n od e cl ust e r ?  S in g l e q u o rum d ev ice cl u st e r, a lso ca ll e d a st a nd a rd q u o r u m cluster •  S i ng l e Quorum D evi ce C luster •  T h e m o st w i d e l y u se d cl u st e r t yp e i s t h e si n g l e q u o r u m d ev i ce cl u st e r, a l so ca l l e d t h e • sta n d a r d q u o r u m cl u st e r. I n t h is t yp e o f cl u st e r t h ere ar e m u l t i p l e no d e s w i t h o n e o r m ore cl u st e r d isk a rra ys , a l so ca ll e d t h e cl uster st o r a g e, a n d a co n n e ct i o n d e vi ce , t h a t is, a b u s. E a ch d i sk in the ar r ay i s o w ne d an d m an ag e d by on l y o n e se r ver at a time. T hedi sk a rr ay also co ntains t h e q u o r u mr e so u r ce . T he foll ow i n g g ure ill u str a t e s a sin g le q u or u m d evicecl u st e r w i t h o n e clu st er d i sk a rra y.  S i ng l e Q uorum D evi ce C l uster •  вЂў 2 ) wh e re are the q u o r u minform a t i o n st o r e d in a cl u st e r ? A quo rumi s t he cluster s con gur ati on d at aba se. † T he da t ab aser esi de s i n a l e nam ed \ M S C S \ qu ol og . l og . T he qu orum i s so m et i m es al so r ef er r ed to as t he qu or um l og . If th e e rr o r me ssa ge o ccu r s a f ter yo u rest o re t he syst e mstate on a co m p u t e r t h a t h as l o st t he q uo r um l og , th e q uo rum i n f o r m ationi s cop ied t o %S yst e mR o ot % \ C l us ter \ Clus t er ba cku p. Y o u can use t h e C l u sr e st.exet o o l f r o mt h e R e so u r ce K i t t o r e store t h i s i n f o r m a t i o n to t h e q uor u m d i sk . A l t h o u g h t h e q u o r u mi s j u st a co n g ur a t i o n d a t a b a se, i t h as t w o ve ry i m p o r t a n t j o b s. F ir st o f a l l , it t e lls t h e cl u ster w h ich n o d e sh o ul d be a ct i ve . T he q u o ru m t e lls t h e clu st er w h ich n o d e is curr e n tl y a cti ve an d which n o d e o r n o d e s a re in sta n d b y . I n Win do w s S erv er 20 03 , M i cr os of t intr o du ce d a newtyp e o f qu orum ca l l e d t he M a j ori t y N od e S et Q uorum ( M N S ) . T hethi ng t h at r e al l y se t s a M N S qu or u m ap art fr om a s t an da r d q u or um i s t h e f ac t that e ach n od e h as it s o w n , l o ca ll y st o r e d co py o f t h e q uor u m d a ta b a se . A l t h ou g h M N S qu orums o e r so m e int er esti ng po ssi bili t ies, t he y a lso ha ve so m e seri ou s l i m i t a t i o n s t h at yo u n e e d t o b e a w are o f . T h e k ey to un d e rst a n d i n g M N S i s t o kn owt h at everyt h i n g w or ks b as ed onm a joriti es . O ne exa m pl e of t hi s is t ha t w he n t he q uor um da t ab as e i s up dated, ea ch copy o f t he d at ab ase nee ds t o be up da ted. T he u pd ate i sn t consideredto †h ave ac tuall y b ee n m ad e u ntil ove r h alf of thedat ab as es h ave be e n u pd ated ( ( nu m be r of nodes / 2 ) + 1 ) . F o r exa m p l e , i f a c l u st e r h a s ve n o d es, t h e n t h ree n o d es w o u l d b e co n si d e r e d t h e m ajori t y. I f a n up d ate t o t h e qu o r u m w as be ingma de , t h e u pd at e w ou l d not be co ns i de r ed val i d u nti l t hr eeno de s h ad be en up d at ed . O t he r w i se i f tw o or f ew e r no d es ha d b ee n up da t e d, t he n t he m a j o ri t y o f t h e n o d e s w o u l d s till h av e t h e o l d q u o r u min f o r m a t i o n a n d t h e r e for e , t h e o l d q u o ru m co n g ur a t i o n w o u l d still b e in e e ct. 3 ) I s t h e re a ny 3 no d e cl uster av a i l a b l e, i f so w h i ch o n e t h a t ? M ajori t y N od e set w he re we can have q uo r um on t hr ee no de s.
Transcript

Interview questions and answers-------- updating1)what are the disk types used in a two node cluster? Single quorum device cluster, also called a standard quorum cluster Single Quorum Device Cluster The most widely used cluster type is the single quorum device cluster, also called the standard quorum cluster. In this type of cluster there are multiple nodes with one or more cluster disk arrays, also called the cluster storage, and a connection device, that is, a bus. Each disk in the array is owned and managed by only one server at a time. The disk array also contains the quorum resource. The following figure illustrates a single quorum device cluster with one cluster disk array. Single Quorum Device Cluster 2) where are the quorum information stored in a cluster?A quorum is the clusters configuration database.The database resides in a file named \MSCS\quolog.log. The quorum is sometimes also referred to as the quorum log.If the error message occurs after you restore the system state on a computer that has lost the quorum log, the quorum information is copied to %SystemRoot%\Cluster\Cluster_backup. You can use the Clusrest.exe tool from the Resource Kit to restore this information to the quorum disk.Although the quorum is just a configuration database, it has two very important jobs. First of all, it tells the cluster which node should be active.The quorum tells the cluster which node is currently active and which node or nodes are in stand by.In Windows Server 2003, Microsoft introduced a new type of quorum called the Majority Node Set Quorum (MNS).The thing that really sets a MNS quorum apart from a standard quorum is the fact that each node has its own, locally stored copy of the quorum database.Although MNS quorums offer some interesting possibilities, they also have some serious limitations that you need to be aware of. The key to understanding MNS is to know that everything works based on majorities. One example of this is that when the quorum database is updated, each copy of the database needs to be updated. The update isnt considered to have actually been made until over half of the databases have been updated ((number of nodes / 2) +1). For example, if a cluster has five nodes, then three nodes would be considered the majority. If an update to the quorum was being made, the update would not be considered valid until three nodes had been updated. Otherwise if two or fewer nodes had been updated, then the majority of the nodes would still have the old quorum information and therefore, the old quorum configuration would still be in effect.3)Is there any 3 node cluster available, if so which one that?Majority Node set where we can have quorum on three nodes.

One of the most important things to know about MNS is that you must have at least three nodes in the cluster.Remember that a majority of nodes must be running at all times. If a cluster only has two nodes, then the majority is calculated to be 2 ((2 nodes / 2) +1)-2. Therefore, if one node were to fail, the entire cluster would go down because it would not have quorum.4)how can we add group policy to a group of 100 users in a domain?Apply group policy to a group other than using OU? he is telling like we can do that practically ---- no ideaNormally we will assign it through OU.We will put these users in that specific OU and apply policy to that OU.

In order to apply Group Polices to specific users or computers, you add users (or groups) and computers to container objects. Anything in the container object will then get the policies linked to that container. Sites, Domains and OUs are considered container objects.

Computer and User Active Directory objects do not have to put in the same container object. For example, Sally the user is an object in Active Directory. Sally's Windows 2000 Pro PC is also an object in Active Directory. Sally the user object can be in one OU, while her computer object can be another OU. It all depends on how you organize your Active Directory structure and what Group Policies you want applied to what objects.Reference:http://www.svrops.co...s/gpolicies.htm5)we have a domain set with 10 dcs and all are initially windows mixed mode.i have the system state backup and finally I raised the functional level to 2003.suddenly one of my dc goes down how can I restore the dc from that backup?

What I have answered is no need to use the backup. We have to reinstall a new dc with same name and connect with the existing setup as after replication data will get update to each otherIf any problem with that then need cleanup the device info from the AD database and do the same as all dcs are peers.6)what are the different types of cluster available?three different types of server clusters: Single quorum device cluster, also called a standard quorum cluster Majority node set cluster Local quorum cluster, also called a single node cluster Single Quorum Device Cluster The most widely used cluster type is the single quorum device cluster, also called the standard quorum cluster. In this type of cluster there are multiple nodes with one or more cluster disk arrays, also called the cluster storage, and a connection device, that is, a bus. Each disk in the array is owned and managed by only one server at a time. The disk array also contains the quorum resource. The following figure illustrates a single quorum device cluster with one cluster disk array. Single Quorum Device Cluster Because single quorum device clusters are the most widely used cluster, this Technical Reference focuses on this type of cluster. Majority Node Set Cluster Windows Server 2003 supports another type of cluster, the majority node set cluster. In a majority node set cluster, each node maintains its own copy of the cluster configuration data. The quorum resource keeps configuration data consistent across the nodes. For this reason, majority node set clusters can be used for geographically dispersed clusters. Another advantage of majority node set clusters is that a quorum disk can be taken offline for maintenance and the cluster as a whole will continue to operate. The major difference between majority node set clusters and single quorum device clusters is that single quorum device clusters can operate with just one node, but majority node set clusters need to have a majority of the cluster nodes available for the server cluster to operate. The following figure illustrates a majority node set cluster. For the cluster in the figure to continue to operate, two of the three cluster nodes (a majority) must be available. Majority Node Set Cluster This Technical Reference focuses on the single quorum device cluster. Local Quorum Cluster A local quorum cluster, also called a single node cluster, has a single node and is often used for testing. The following figure illustrates a local quorum cluster. Local Quorum Cluster

7)how many ips are required for 3 node cluster? What are they?Scenario supporting above questionsIn a hypothetical scenerio:

I want 4 node, active/active/active/active cluster.There are 4 sql instances installed on each node, with name SQLInstance1....SQLInstance4

My questions:

1) Can I use just one virtual name, for example SQLVirtualServer and clientscan access sql instances in format SQLVirtualServer\InstnaceName? Or Do Ineed to create separate pair or virtual name/IP for each sql instance?

How many total IP addresses/hostnames I will need in 4 nodes/instancescluster?

2) Each instance will be active on one node and other three nodes will instand by mode for that instance? Or there can be only on node in stand by foreach instance?

3) if there can be multiple nodes stand by, how it is determined which nodewill take over in case of a failure?

Ans: Each instance must be installed in a unique virtual server.

Virtual names must be unique and instance names must be unique.

You will need 9 names and IP addresses;One for each node (4)One for each instance(4)and one for the cluster itself(1)

Instances and nodes are independent entities. You can spread instancesacross all the nodes or stack them together. Note that instances do nothave to consume an entire node.

Clustering chooses the least loaded node to failover to or you can set apreferred failover order per instance.

I suggest building a virtual guest cluster and playing with clustering toget the concepts down before you try and design a production system.8)what is the difference between 2003 and 2008 dns?Top 10 new features in Windows Server 20081. The self-healing NTFS file system2. Parallel session creation3. Clean service shutdown4. Kernel Transaction Manager5. SMB2 network file system6. Address Space Load Randomization (ASLR)7. Windows Hardware Error Architecture (WHEA)8. Windows Server Virtualization9. PowerShell10. Server Core^ Windows Server 2008 R2 supports DNSSEC, however dynamic DNS is not supported for DNSSEC-signed zones. For earlier versions including Windows Server 2003, DNSSEC functionality must be manually activated in the registry. In these versions, the DNSSEC support is sufficient to act as a slave/secondary server for a signed zone, but not sufficient to create a signed zone (lack of key generation and signing utilities).^ IPv6 functionality in the Microsoft DNS server is only available on Windows Server 2003 and newer.Prior to Windows Server 2003 and Microsoft Windows 2000 Service Pack 3, the most common problem encountered with Microsoft's DNS server was cache pollution. Although Microsoft's DNS Server had a mechanism for properly dealing with cache pollution, the mechanism was turned off by defaultIn 2004, a common problem involved the feature of the Windows Server 2003 version of Microsoft's DNS server to use EDNS0, which a large number of firewalls could not cope with. [3]What's New in DNS in Windows Server 2008Windows Server 2008 provides a number of enhancements to the DNS Server service that improve how DNS performs.Overview of the Improvements in DNSThe DNS Server role in Windows Server 2008 contains four new or enhanced features that improve the performance of the DNS Server service or give it new abilities: Background zone loading: DNS servers that host large DNS zones that are stored in Active Directory Domain Services (AD DS) are able to respond to client queries more quickly when they restart because zone data is now loaded in the background. IP version 6 (IPv6) support: The DNS Server service now fully supports the longer addresses of the IPv6 specification. Support for read-only domain controllers (RODCs): The DNS Server role in Windows Server 2008 provides primary read-only zones on RODCs. Global single names: The GlobalNames zone provides single-label name resolution for large enterprise networks that do not deploy Windows Internet Name Service (WINS). The GlobalNames zone is useful when using DNS name suffixes to provide single-label name resolution is not practical. Global query block list: Clients of such protocols as the Web Proxy Auto-Discovery Protocol (WPAD) and the Intra-site Automatic Tunnel Addressing Protocol (ISATAP) that rely on DNS name resolution to resolve well-known host names are vulnerable to malicious users who use dynamic update to register host computers that pose as legitimate servers. The DNS Server role in Windows Server 2008 provides a global query block list that can help reduce this vulnerability.What are the major changes in dns for windows 2008 R2?Support for Domain Name System Security Extensions (DNSSEC) is introduced in Windows Server 2008 R2 and Windows 7. With Windows Server 2008 R2 DNS server, you can now sign and host DNSSEC-signed zones to provide security for your DNS infrastructure.The following changes are available in DNS server in Windows Server 2008 R2: Ability to sign a zone and host signed zones. Support for changes to the DNSSEC protocol. Support for DNSKEY, RRSIG, NSEC, and DS resource records.The following changes are available in DNS client in Windows 7: Ability to indicate knowledge of DNSSEC in queries. Ability to process the DNSKEY, RRSIG, NSEC, and DS resource records. Ability to check whether the DNS server with which it communicated has performed validation on the clients behalf.The DNS clients behavior with respect to DNSSEC is controlled through the Name Resolution Policy Table (NRPT), which stores settings that define the DNS clients behavior. The NRPT is typically managed through Group Policy.What does DNSSEC do?DNSSEC is a suite of extensions that add security to the DNS protocol. The core DNSSEC extensions are specified in RFCs 4033, 4034, and 4035 and add origin authority, data integrity, and authenticated denial of existence to DNS. In addition to several new concepts and operations for both the DNS server and the DNS client, DNSSEC introduces four new resource records (DNSKEY, RRSIG, NSEC, and DS) to DNS.In short, DNSSEC allows for a DNS zone and all the records in the zone to be cryptographically signed. When a DNS server hosting a signed zone receives a query, it returns the digital signatures in addition to the records queried for. A resolver or another server can obtain the public key of the public/private key pair and validate that the responses are authentic and have not been tampered with. In order to do so, the resolver or server must be configured with a trust anchor for the signed zone, or for a parent of the signed zone.DNS DevolutionPublished: October 21, 2009Devolution is a behavior in Active Directory environments that allows client computers that are members of a child namespace to access resources in the parent namespace without the need to explicitly provide the fully qualified domain name (FQDN) of the resource.With devolution, the DNS resolver creates new FQDNs by appending the single-label, unqualified domain name with the parent suffix of the primary DNS suffix name, and the parent of that suffix, and so on, stopping if the name is successfully resolved or at a level determined by devolution settings.For example, if the primary DNS suffix is central.contoso.com and devolution is enabled with a devolution level of two, an application attempting to query the host name emailsrv7 will attempt to resolve emailsrv7.central.contoso.com and emailsrv7.contoso.com. If the devolution level is three, an attempt will be made to resolve emailsrv7.central.contoso.com, but not emailsrv7.contoso.com.Devolution is not enabled in Active Directory domains when the following conditions are true:1. A global suffix search list is configured using Group Policy.2. The Append parent suffixes of the primary DNS suffix check box is selected on the DNS tab in the Advanced TCP/IP Settings for IPv4 or IPv6 Internet Protocol (TCP/IP) Properties of a client computers network connection.9)what is AD DS and ADLDS WHERE WE ARE USING IN WINDOWS 2008?AD DS is the active directory domain servicesActive Directory Application Mode (ADAM) is a light-weight implementation of Active Directory. ADAM is capable of running as a service, on computers running Microsoft Windows Server 2003 or Windows XP Professional. ADAM shares the code base with Active Directory and provides the same functionality as Active Directory, including an identical API, but does not require the creation of domains or domain controllers.Like Active Directory, ADAM provides a Data Store, which is a hierarchical datastore for storage of directory data, a Directory Service with an LDAP Directory Service Interface. Unlike Active Directory, however, multiple ADAM instances can be run on the same server, with each instance having its own and required by applications making use of the ADAM directory service.In Windows Server 2008, ADAM has been renamed AD LDS (Lightweight Directory Services).[15]Active Directory Lightweight Directory ServicesActive Directory Lightweight Directory Services (AD LDS) provides directory services for directory-enabled applications. AD LDS does not require or rely on Active Directory domains or forests. AD LDS was previously known as Active Directory Application Mode (ADAM).10)HOW WE WILL ADD unique wall paper for set of users/If you run a company, you might want to set your company logo or any particular wallpaper on all of your users' desktops. On the other hand, if you use a single system you might still want to have your desired wallpaper on Desktop and it really annoys when someone changes the wallpaper.So if you are tired from people changing the wallpaper and want to prevent users from changing it everyday, then this tutorial will help you.In this tutorial, you'll learn a way to set your desired wallpaper on Desktop and no one will be able to change it neither from Desktop Properties nor by right-clicking on an image and select "Set as Desktop Background".So here we start our tutorial:1. Type regedit in RUN dialog box or Startmenu Search box and press Enter. It'll open registry Editor.2. Now go to following key:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies3. Under "Policies" key, create a new key "System". It might already exist in some systems.4. Now select "System" key and in right-side pane, create a new STRING value Wallpaper and set its value to the exact path of your desired wallpaper. You can use .JPG and .BMP files in this method.e.g. if your wallpaper exists in "E:\Wallpapers\Wall1.JPG", then set the same path as value of "Wallpaper".5. You can also set the wallpaper style e.g. Centered, Tiled or Stretched. Create a new STRING value WallpaperStyle and set its value to as following: 0 (Centered) 1 (Tiled) 2 (Stretched)

6. That's it. Now restart or log off your system and no one will be able to change the wallpaper.PS: If you also want to disable the "Desktop" tab in Desktop Properties, then you can visit following tutorial:We can also enable the group policy options like enable desktop wall paper and enable active desktop in group policyIn case if this is not properly working for the OU where we apply this also try with the following registry keyBased on our test, it seems the Registry key [HKEY_CURRENT_USER\Control Panel\Desktop\WallPaper] is missing and caused this problem. To work around this issue, please create a String Value [HKEY_CURRENT_USER\Control Panel\Desktop\WallPaper] on client and try to set wallpaper.

We can use Group Policy Preference->Registry to deploy this Registry key or use user logon script to deploy this Registry key.

11)how we will enable auditing for a set of users login to domain and where we will do that?

Windows & Active Directory AuditingIf you are like most administrators, you want to know who is logging on, to which computer, and accessing resources on your servers. For your Windows computers and Active Directory environment, you have options to help you determine what you want to know.

If you fall into the category of a highly-secure environment, where you need to track access to some or all of the resources on the network, you also have options to help you track the access to the resources. The feature in Windows that provides this tracking and logging of who is accessing which resource from computers on the network is called auditing. There are numerous auditing options and configurations that you can choose from. We will take a look at each option and go over what each option can provide for you.

Your Auditing Buffet OptionsWhen you set out to configure auditing for computers on your network, you will find that there are numerous options for you to choose from. This granularity helps in many ways. First, it allows you to target specific activities, instead of taking a wider sweep of all activity on a computer. Second, with a narrower scope of what you are auditing, will result in smaller logs which make reviewing the logged information more efficient. Finally, reducing the auditing options to just what you need will reduce the load on the computer, allowing it to provide more resources to other activities.The list of auditing options can be seen in Figure 1.

Figure 1: There are a total of nine auditing settings that you can configure on every Windows computerAudit account logon events This will audit each time a user is logging on or off from another computer in which the computer performing the auditing is used to validate the account. The best example of this is when a user logs on to their Windows XP Professional computer, but is authenticated by the domain controller. Since the domain controller is validating the user, the event would be generated on the domain controller. This setting is not enabled for any operating system, except for Windows Server 2003 domain controllers, which is configured to audit success of these events. It is common and a best practice to have all domain controllers and servers audit these events. I also find that in many environments clients are also configured to audit these events.Audit account management This will audit each event that is related to a user managing an account (user, group, or computer) in the user database on the computer where the auditing is configured. Examples of these events include: Creating a user account Adding a user to a group Renaming a user account Changing a password for a user accountFor domain controllers, this will audit changes to domain accounts, as described in the following article named Auditing Users and Groups with the Windows Security Log. For a server or client, it will audit the local Security Accounts Manager and the accounts that reside there. This setting is not enabled for any operating system, except for Windows Server 2003 domain controllers, which is configured to audit success of these events. It is common and a best practice to have all domain controllers and servers audit these events. For auditing of the user accounts that the security logs and audit settings cant capture, refer to the article named Auditing User Accounts.Audit directory service access This will audit each event that is related to a user accessing an Active Directory object which has been configured to track user access through the System Access Control List (SACL) of the object, as shown in Figure 2.

Figure 2: Each Active Directory object has a SACLThe SACL of an Active Directory object specifies three things: The account (typically user or group) that will be tracked The type of access that will be tracked, such as read, create, modify, etc Success or failure access to the objectSince each object has its own unique SACL, the level of control over which Active Directory object will be tracked can be very precise. This setting is not enabled for any operating system, except for Windows Server 2003 domain controllers, which is configured to audit success of these events. It is a best practice to enable both success and failure auditing of directory service access for all domain controllers.Audit logon events This will audit each event that is related to a user logging on to, logging off from, or making a network connection to the computer configured to audit logon events. A good example of when these events are logged is when a user logs on interactively to their workstation using a domain user account. This will generate an event on the workstation, but not on the domain controller that performed the authentication. In essence, logon events are tracked where the logon attempt occurs, not where the user account resides. This setting is not enabled for any operating system, except for Windows Server 2003 domain controllers, which is configured to audit success of these events. It is common and best practice to log these events on all computers on the network.Audit object access This will audit each event when a user accesses an object. Objects include files, folders, printers, Registry keys, and Active Directory objects. In reality, any object that has an SACL will be included in this form of auditing. Like the Auditing of directory access, each object has its own unique SACL, allowing for targeted auditing of individual objects. There are no objects configured to be audited by default, which means that enabling this setting will not produce any logged information. Once this setting is established and a SACL for an object is configured, entries will start to show up in the logs on access attempts to the object. It is not common to configure this level of auditing until there is a specific need to track access to resources. In highly secure environments, this level of auditing is usually enabled and numerous resources are configured to audit access.Audit policy change This will audit each event that is related to a change to one of the three policy areas on a computer. These policy areas include: User Rights Assignment Audit Policies Trust relationshipsThis setting is not enabled for any operating system, except for Windows Server 2003 domain controllers, which is configured to audit success of these events. It is common and best practice to configure this level of auditing for all computers on the network.Audit privilege use This will audit each event that is related to a user performing a task that is controlled by a user right. The list of user rights is rather extensive, as shown in Figure 3.

Figure 3: List of User Rights for a Windows computerThis level of auditing is not configured to track events for any operating system by default. It is common and a best practice to configure this level of auditing for all computers on the network.Audit process tracking This will audit each event that is related to processes on the computer. Examples would include program activation, process exit, handle duplication, and indirect object access. This level of auditing produces an excessive number of events and is typically not configured unless an application is being tracked for troubleshooting purposes.Audit system events This will even audit an event that is related to a computer restarting or being shut down. Events that are related to the system security and security log will also be tracked when this auditing is enabled. This is a required audit configuration for a computer that needs to track not only when events occur that need to be logged, but when the log itself is cleaned. This setting is not enabled for any operating system, except for Windows Server 2003 domain controllers, which is configured to audit success of these events. It is a best practice to configure this level of auditing for all computers on the network.Success or Failure Auditing?Each of these options provide two configuration settings: Success and/or Failure. These options are essential to help you track the required information that is generated from a user performing a task. Tasks are typically related to one of the following: Permissions configured on the Access Control List of a resource User Rights configured for a specific computer Administrative privileges, typically granted through group membershipIf the user attempts to perform a task which they have not been granted permission for will result in a failure to perform the task. For example, if a user attempts to change the time on their laptop, but they are not in the local Administrators group, this will generate a failed attempt to Change the System Time, which is a User Right granted directly to users or groups of users, including the Administrators group.The flip side of this is also true, where if a user attempts to perform a task which they have been granted the appropriate permission, they will generate a success trigger for that task. A good example here might be a user that has been delegated permissions to modify the membership of a group located in Active Directory.As you can see, depending on what you want to track, success or failure, will need to be setup when you enable the specific auditing setting.ConclusionWith so many options for tracking events in a Windows environment, it is important to understand what each option provides through the security log of the event viewer. It is also important to know and recognize the default settings, which are not always set to properly track events for your important member servers. Finally, you were provided with some best practice recommendations for these settings, which you should decide if your environment should accept the same settings.12)how the policy are applied in ADthe levels?GPO PrioritiesLocal GPOs are applied in the following order, with later policies overriding conflicting settings in earlier policies:1. local computer policy;2. administrators and non-administrators policies;3. user-specific policies.For example, if you set the desktop to blue in the local computer policy but set it to red in the administrators policy, it will appear red when an administrator logs on. If you set the desktop to green in the user-specific policy, that setting would override all other local GPOs.

If the computer is a member of an Active Directory domain, domain GPOs always override conflicting settings in local GPOs. If you want to completely disable local GPOs, enable the following setting in a domain GPO:

computer configuration\administrative templates\system\group policy\turn off local group policy objects processingWith Group Policy objects, you can change hundreds of default settings in Microsoft Windows from color schemes to desktop security and create a complex hierarchy of GPOs to configure settings based on the user and the computers location, organization and purpose in Active Directory environments.Heres how to define, edit and prioritize multiple local GPOs.First, not all computers can join a domain. For example, public computers (such as a kiosk in a library) are frequently attacked and could put the entire domain at risk. Windows XP and earlier versions of Windows had a single local GPO that applied settings to the client computer and all users that logged on to the computer. Therefore, if you needed to lock down the desktop environment to prevent guests from opening the Start menu, you also made it impossible to manage the computer when logged on as an administrator.Windows Vista now supports multiple local Group Policy objects (MLGPOs) so that you can apply different settings to administrators, non-administrators and specific users.MLGPO TypesWindows Vista supports the following local GPOs: Local Computer Policy: Just like earlier versions of Windows, Vista supports local computer policy that always applies, regardless of which user is logged on. This policy contains both the Computer Configuration and User Configuration nodes. All other local GPOs contain only the User Configuration node. Administrators Policy: Settings configured in this policy apply only to users who are members of the local Administrators group. Non-administrators Policy: Settings apply to all users who are not members of the local Administrators group. User-Specific Policies: You can configure GPOs that apply to only a specific user account.Any user who logs on will have, at most, three local GPOs: the local computer policy, a user-specific policy, and either the administrators or non-administrators policy. Oddly, you cannot create local GPOs that apply to local groups, such as backup operators or guests.Troubleshooting Local GPOsYou can troubleshoot problems with local GPOs using most of the same tools you use for Active Directory GPOs, including: Resultant Set of Policy: A Microsoft Management Console snap-in that analyzes all Group Policy settings, displays the effective settings, and allows you to isolate the Group Policy objects that define any setting. GPResult: A command-line tool that provides a list of active GPOs, including both domain and local GPOs, among other useful information. Event Viewer: Vista adds an event to the System Event Log when policies are applied, and stores detailed processing information in the applications and service logs\microsoft\windows\group policy\operational event log. The Operational Event Log replaces the userenv.log file used in earlier versions of Windows. Group Policy Log View: A tool that exports Group Policy event data into a text file. You can download GPLogView at go.microsoft.com/fwlink/?LinkId=75004.13)what are the difference between windows 2003 and windows 2008?2008 is combination of vista and windows 2003r2. Some new services are introduced in it1. RODC one new domain controller introduced in it[Read-only Domain controllers.]2. WDS (windows deployment services) instead of RIS in 2003 server3. shadow copy for each and every folders4.boot sequence is changed5.installation is 32 bit where as 2003 it is 16 as well as 32 bit, thats why installation of 2008 is faster6.services are known as role in it7. Group policy editor is a separate option in ads

2) The main difference between 2003 and 2008 is Virtualization, management.2008 has more inbuilt components and updated third party drivers Microsoft introduces new feature with 2k8 that is Hyper-V Windows Server 2008 introduces Hyper-V (V for Virtualization) but only on 64bit versions. More and more companies are seeing this as a way of reducing hardware costs by running several 'virtual' servers on one physical machine. If you like this exciting technology, make sure that you buy an edition of Windows Server 2008 that includes Hyper-V, then launch the Server Manger, add Roles.

3) In Windows Server 2008, Microsoft is introducing new features and technologies, some of which were not available in Windows Server 2003 with Service Pack 1 (SP1), that will help to reduce the power consumption of server and client operating systems, minimize environmental byproducts, and increase server efficiency.Microsoft Windows Server 2008 has been designed with energy efficiency in mind, to provide customers with ready and convenient access to a number of new power-saving features. It includes updated support for Advanced Configuration and Power Interface (ACPI) processor power management (PPM) features, including support for processor performance states (P-states) and processor idle sleep states on multiprocessor systems. These features simplify power management in Windows Server 2008 (WS08) and can be managed easily across servers and clients using Group Policies.

14)how the change management is done in our work?Change ManagementChange Management aims to ensure that standardised methods and procedures are used for efficient handling of all changes,Main article: Change Management (ITSM)A change is an event that results in a new status of one or more configuration items (CI's)[citation needed] approved by management, cost effective, enhances business process changes (fixes) - with a minimum risk to IT infrastructure.The main aims of Change Management include: Minimal disruption of services Reduction in back-out activities Economic utilization of resources involved in the change[edit] Change Management Terminology Change: the addition, modification or removal of CIs Change Request (CR): form used to record details of a request for a change and is sent as an input to Change Management by the Change Requestor Forward Schedule of Changes (FSC): schedule that contains details of all forthcoming Changes..Management details with practical detailsThe Service DeskPractical CaseAs an essential step in implementing the ITIL methodology in the company, the management of "Cater Matters" decided to set up a service desk centralising all the IT organisation's contacts with customers and suppliers.To do so, the following decisions were made: A manager was appointed to be in charge of the Service Desk. After a careful analysis of the needs of the organisation and users, the main functions of the service desk were defined:o Managing the first line of support for Incident Management.o Monitoring the quality of service offered with respect to the SLAs.o Providing sales-related information about the services offered.o Conducting regular surveys on the level of customer satisfaction.o Drawing up periodic reports with the information gathered. Running a small promotion to present the new services to existing and potential customers. Setting web space so as to channel user interaction through the web as much as possible, by means of:o Forms for queries and reporting incidents.o Remote querying (by means of the associated web services) of the state of active incidents, incident history and compliance with SLAs.o Up-to-date FAQs allowing users to run their own queries on the services provided, known errors, etc. Drawing up a "Customer Care Manual" describing the different protocols for interaction with users, depending on the situation in question. Choosing a software tool to help record and manage all the Service Desk's information flows. Giving specific training:o To staff responsible for dealing directly with users and customers on applying the "Customer Care Manual".o On the software tools used. Creating a detailed plan for the progressive implementation of the Service DeskIncident ManagementPractical CaseThe "Cater Matters" Service Desk has just received a call from the person in charge of supplies at one of its customer's canteens.He says that although he had ordered a new batch of ice-creams a few days ago over the web, they had not yet arrived and the stock in the fridge was running low.The Service Desk operator looks in the orders database and confirms that the order was made several days ago, but he also notices that it was incorrectly stored.He tries to repeat the order on his computer, but the system continues to malfunction.Following the established protocols, the operator then takes the following decisions: He evaluates its priority: although the impact is low, the incident is urgent as the customer needs the delivery urgently. He logs the details of the incident. He consults the Knowledge Base to investigate whether the incident is the result of a known error, and if there are any possible work-arounds. A temporary solution is proposed to the customer: he is pointed in the direction of a reserved area of the website where he can place "urgent" orders by email. He contacts the systems department to warn that the incident may be repeated throughout the morning. Using the application that monitors warehouse stock, he checks the availability of the ice-creams ordered. He reassures the customer that he will receive the ice-creams before midday via the company's express service.Meanwhile, the systems department: Runs a series of tests and confirms that, in general, the system is functioning correctly. Are unable to identify the cause of the incident. They contact Service Desk and suggest that the problem be forwarded to Problem Management with a preliminary classification of low priority.Service Desk receives the information and decides that: Given the low impact of the incident and the fact that the customer has been given a satisfactory work-around, it does not need to be escalated. They log the work-around for the incident together with the information provided by the systems department. The incident is closed.Problem ManagementPractical CaseThe Service Desk of "Cater Matters" has informed Problem Management about an incident which could not be associated with a known error and which caused a low impact interruption to service.Problem Management decided to analyse the problem following the established protocol, which is based on the Kepner-Tregoe method: Identifying the problem. Classifying of the problem. Establishing the possible causes. Checking the most likely cause. Confirming the actual cause.Identification: In the case with which we are concerned, the problem is easy to define: The online orders application produces unpredictable errors when recording certain orders. There is no apparent relationship between the error and other hardware/software components.Classification: The problem may be classified according to the following parameters: Identification: Problems recording orders. Source: Online orders module. Frequency: the problem is not recurrent, this is the first time it has been detected. Impact: slight. The incident was resolved without a serious interruption to service.Possible causes: The most likely causes include: Errors in programming on the client side of the application. Errors in the web server recording modules. Database configuration errors.The analysts decide that the most likely origin of the problem is in the application's recording modules.Checking the most likely cause: with the help of the information recorded by Incident Management: Problem management tries to reproduce the problem. They find that the error is only reproduced with a particular brand of ice-cream. They notice that the brand of ice-cream has an apostrophe in its name and that if this is removed the order is recorded without problems.Verification: A test environment is set up reproducing the module of interest on the live environment. The necessary programming changes are made. They confirm that the order is recorded correctly.The problem has been converted into a known error. It is now the task of Error Control to: Raise an RFC with the proposed solution. Carry out the post-implementation review if Change Management considers it appropriate to implement the RFC.Configuration ManagementPractical CaseAlthough configuration management is vitally important, it can easily turn into a devourer of resources if excessively ambitious criteria are laid down. Therefore, the management of "Cater Matters" initially decided to limit the scope of the configuration database to the systems it felt to be critical: LAN servers. Internet servers. Service Centre computing infrastructure. SLAsTo simplify management yet further, they decided to harmonise their configurations in a series of "reference configurations" applicable to the CIs described above.Although this was a significant initial investment, it was felt that its had clear advantages: Medium-to-long term reduction in the associated costs. Improving the consistency of the services delivered. Simplification of all the processes associated with service support: Incidents, problems, changes, versions, etc.Opting for a series of standard configurations allows a high level of detail to be achieved without the effort involved's being excessive. The following items were therefore entered on the database: Software configurations:o Operating Systems:o Installed applications.o Interdependencies: parent-child relationships, owners, etc.o Associated documentation. Hardware configurations:o Servers and work stations.o Sub-components, with their interrelations: parent-child relationships, interdependencies, etc.o Associated documentation and controllers. Associated SLAs and monitoring reports.At the same time, management tools were installed to allow all these configurations to be monitored remotely and periodic automatic audits to be carried out.Change ManagementPractical CaseThe customers and suppliers of "Cater Matters" are making increasing use of the company's online services to manage ordering and the supply chain.Although it basically meets the needs of the business, the currently implemented system was not designed to support a high level of activity. Both Availability Management and Capacity Management have reported inadequacies in the process and the risk of future bottlenecks if the current rate of growth continues.Moreover, the company's management has decided to bolster its online presence and offer customers higher levels of service in order to build its market share.This all requires a substantial change in both the hardware and software driving the company's online services, and the connection with the organisation's internal management software (ERP).The company's management therefore raised an RFC and submitted it to Change Management. The objectives of the RFC were: To increase the capacity of the company's web servers in order to enhance connectivity and response capacity. To develop a series of WebServices permitting:o Direct integration of the online ordering system with the company's ERP system.o Tracking of the whole ordering process.o Management of the whole supply chain remotely in conjunction with suppliers. To redesign the website to enhance usability and optimise it for search engine indexing.After recording the RFC: The request is given the "accepted" status and provisionally assigned normal priority and high impact. A meeting of the CAB is called, and the people in charge of e-commerce and web programming are asked to attend. A preliminary evaluation of the project is requested from the outside consultant who supervised the whole implementation process for the current system.Prior to the CAB's meeting the Change Manager, in close coordination with Capacity, Availability, Financial and Service Level Management, and top management and project management, prepares: An initial evaluation of the costs and necessary resources. An evaluation of the impact of the changes on the IT infrastructure. A preliminary Gantt chart of the process. A survey so that the Service Desk can sound out customers' opinions about the possible changes.After weighing up the documentation submitted and the organisation's business strategy, the CAB approves the change, and: Finalises the schedule for the change. Assigns the internal and external resources needed. Develops a plan allowing for the temporary coexistence of both online systems to ensure continuity of service. This will involve:o Duplication of the whole web structure: new servers will be bought so that the old ones can continue providing continuous service and are immediately available for a possible back-out.o "Translation" applications will be developed so as to enable the old databases to be kept up-to-date in order to avoid the loss of data in the event of a back-out. Configuration Management is informed about all the CIs affected by the change. The same consultancy that implemented the current system is asked to perform an external audit on the whole process. All the information necessary for Version Management to be able to start the testing and implementation process is prepared.After the change is implemented, in conjunction with "Service Support" and "Service Delivery", Change Management: Confirms the change is successful:o The new system has sufficient capacity to provide the envisaged levels of service and availability.o The new system works without apparent errors.o Customers and suppliers perceive the change as an improvement in service delivery.o Productivity has improved. A check is made to ensure everything has been recorded in the CMDB correctly. The process is evaluated. The change is closed.Release ManagementPractical CaseChange Management has approved (see the practical case in the previous chapter) an RFC having as its main objectives: Increasing the capacity of the company's web servers in order to enhance connectivity and response capacity. Developing a series of WebServices permitting:o Direct integration of the online ordering system with the company's ERP system.o Tracking the ordering process from end to end.o Remotely managing the whole supply chain jointly with suppliers. Redesigning the website to enhance usability and optimise it for search engine indexing.Release Management is in charge of the process of developing, buying, testing and distributing the new versions of hardware and software concerned. For this purpose: The new hardware needs are assessed in collaboration with Capacity Management and Availability Management and the hardware is bought and configured. They contact their usual web development suppliers to define the specifications of the new software precisely and to draw up a schedule for development. The web structure is duplicated, i.e. new servers are bought so that the old ones can continue providing continuous service and are immediately available for a possible back-out. Translation scripts are written allowing the new data to be saved on the old version to avoid data being lost in the event of a back-out. A schedule is set for testing by real users so they can give their approval to the new service. A two-stage deployment is planned:I. The whole web structure, excluding the data, is incorporated directly onto the company's ERP.II. The process is completed with the integration of web orders using WebServices on the ERP. A user manual is written describing the new release and a FAQ page is created on the web that includes the queries users raised most frequently during the testing phase. Users are informed about the new release and warned of possible short interruptions to service during installation. The new release is installed. A master copy of all the software is stored in the DSL. The CMDB is updated.Service Level ManagementPractical CaseThe management of "Cater Matters" has decided to implement Service Level Management adapting the ITIL principles and recommendations to the needs of its organisation.To carry out this task as efficiently as possible, a series of initial actions have been defined. These are basically: Appointing someone to manage the process. Drawing up a catalogue of services. Developing a comprehensive service quality plan. Defining templates from which to create SLAs associated with the main services.Service Level ManagerThe management has appointed one of its more experienced executives accustomed to dealing with customer relations to take the role of Service Level Manager.His main function is to negotiate and agree on service delivery with customers, as the representative of "Cater Matters".His specific responsibilities include: Preparing and maintaining an up-to-date catalogue of the services offered by "Cater Matters". Determining the general structure of the SLAs, OLAs and UCs. Negotiating SLAs, OLAs and UCs with customers and suppliers Supervising fulfillment of the service delivery agreements with customers and suppliers. Keeping the top management and IT organisation informed about the performance of the process. Defining the service improvement plans resolving deficiencies in the quality of the services delivered and/or adapting these services to new customer needs and the latest technological advances. Interacting with other IT processes to ensure that they all receive and contribution the necessary information for the optimal functioning of the organisation.Drawing up the Service Catalogue"Cater Matters" decided to subdivide its service catalogue according to the different types of customer contracting its services. Private individuals. Small businesses. Large corporations and institutions and public bodies.The purpose of the catalogue is not just to publicise the various services but also to show (potential) customers clearly what the differences are between the options available on top of the basic service.To do this, an online catalogue is developed allowing different versions to be compared and giving an initial estimate of costs based on the different options selected.The description of each service includes additional information about: Delivery times. Availability of the service (holidays, night hours, etc.) Auxiliary services. Associated WebServices. Applicable legislation. Loyalty programmes. Online support.Service Quality PlanTo ensure the quality of the service a SQP is developed, which defines: The responsibility of each of the departments in the service delivery process. Contingency plans in the event of serious deterioration of the quality of service. Key indicators of performance and customer satisfaction. Methods of supervision and real-time monitoring of the processes involved in delivering the service, such as, for example, deliveries and supplying the goods. Protocols for the Service Desk's interaction with customers and users. The levels of security, availability, capacity and redundancy necessary to ensure the correct provision of the service in cooperation with the people in charge of these processes.Prototype SLAsIn order to avoid the task of preparing SLAs becoming too complex and tedious, templates are drawn up for different types of service and customer.Each prototype SLA includes: General, non-technical description of the services agreed. People responsible for the agreement on both the customer's and the supplier's side. Deadlines for delivery of the service. Duration of the agreement and conditions for its renewal and/or cancellation. Conditions of availability of the service. Support and maintenance work associated. Response times. Recovery times in the event of incidents. Contingency plans if applicable. Charging and collection methods. Criteria for evaluating the quality of the service.IT Service Financial ManagementPractical CaseThe "Cater Matters" IT organisation has for several years been providing essential services both for the organisation of the company and for external customers of its catering services.However, to date, IT spending has not been registered on the accounts and budgeted specifically, and with the data currently available, it is impossible to know what impact IT services have on the cost of each of the catering services provided.The management of "Cater Matters" wants to develop a pricing policy for IT services that allows it to pass on its costs to end users of the company's catering service, in the same way that it passes on the cost of transport, raw materials, etc.A senior manager from the IT department and a member of the company's finance department have been appointed to manage this process.The work plan for the near term includes: In collaboration with Configuration Management, drawing up a list of all the CIs involved in providing direct services to customers. Evaluate the costs associated with their use, and sharing them out among the different services if necessary, on a pro rata basis: depreciation, maintenance, consumables, etc. Evaluating the cost of staff and operating costs. Estimating costs associated with IT services that are hidden or difficult to assign. Evaluating indirect costs: installations, administrative costs, etc. Establishing strict accounting criteria for the administration of IT costs. Establishing a cost+margin pricing policy.All these activities aim to define precisely the costs associated with the IT services already being delivered and to propose rates that can be passed on to customers, either directly or as a part of general items.However, the objectives of proactiveFinancial Management go further, and include the proper planning of future expenses and investments. For this purpose, in collaboration with Service Level Management, Capacity Management and Availability Management, the following points have been studied: Customer requirements and market trends. The impact on costs and Service Improvement Programmes (SIP). Forecasts and future IT capacity needs.The information compiled will be used as the basis for the preparation of the first "annual IT budgets" prepared by Financial Management.Capacity ManagementPractical CaseUp until now, Capacity Management at "Cater Matters" has been reactive, or in other words, capacity was increased or redistributed only when problems appeared.With the increasing importance of IT services, both for the internal organisation of "Cater Matters" and for its customers, the management has decided to implement ITIL best practice for Capacity Management.They have therefore appointed a Capacity Manager with the following main responsibilities: Monitoring the performance of the IT infrastructure, paying special attention to online services, as these are particularly important in providing a good service to customers. Analysing, in conjunction with Configuration Management, the impact of the various CIs on the system's capacity. Evaluating, in conjunction with Service Level Management, the process, storage and bandwidth loads the current and envisaged SLAs imply. Evaluating, in conjunction with Financial Management, the real cost of each service. Producing regular reports on the state of the relevant technology available for the services offered. Analysing trends and statistics on the use and load on the system.The results of this work should allow: The preparation of an annual Capacity Plan which will be reviewed quarterly against the real data obtained from monitoring of the system, together with the business forecasts. The Capacity Database (CDB) to be populated so that it contains all the information relating to capacity. Improvements to the service to be proposed.With the aim of: Minimising the number and impact of future incidents degrading the quality of service. Rationalising the use of IT infrastructure capacity. Reducing the cost of the IT infrastructure. Increasing productivity and customer satisfaction.IT Service Continuity ManagementPractical CaseThe IT organisation of "Cater Matters" currently lacks any IT Service Continuity Management worthy of the name.The management of "Cater Matters" is aware of the importance that IT services have today for its production and distribution and aims to rectify this situation.The company's management considers that the IT services associated with stock management, given that the stock consists of perishable products, and online ordering, are those of greatest strategic importance. In the first instance they therefore decide that the ITSCM should guarantee the continuity of these services within not more than 8 hours. Less ambitious targets are set for other services.A senior executive from the IT department is given the role of managing the process and charged with coordinating all the activities involved with Business Continuity Management.Business Continuity Management has signed cooperation agreements with other catering companies for emergency supplies to cover the company's most important customers: Catering services for schools and hospitals. Conferences and other large events.In these cases, coordination requires the development of special modules allowing order databases to be exported in standard data exchange formats so they can be processed by the other organisation.Additionally, an emergency stock management application has been developed to allow supplier orders to be handled and ensure the integrity of existing stock is maintained, according to its expiry information and the impact of the business interruption on the stock.The following are also established: A regular calendar of trials of the recovery plans. A calendar of training courses on action protocols in emergency situations.However, IT Service Continuity Management not only has to apply reactive measures to mitigate the impact of a possible interruption to service. Its obligations also include the drafting of prevention plans to avoid these situations arising.To avoid interruptions to its online services the ITSCM: Contracts collocation web hosting services with a provider that has connections through various operators to the Internet backbone and can ensure an uninterrupted power supply. Replicates critical systems at different geographical locations. Supervises the policy of back-ups of the data servers. Installs perimeter protection systems.Availability ManagementPractical CaseAvailability 12/7 is a feature on which the customers of "Cater Matters" place great importance.IT services play a small, although important, part in the services the organisation provides to its customers and availability problems usually arise from processes that are not directly technology related. However, an interruption to online services can represent a serious problem given the large volume of orders received via this channel (almost all orders), and its importance for managing stocks of raw materials.Availability Management, in collaboration with the people responsible for the other IT processes has been charged with drawing up new availability plans that take the rapid growth of the business into account, which may entail 24/7 availability being needed for certain business lines.Drawing up this new plan requires: Revision of the UCs in effect with Internet service providers. Definition of levels of availability for the new services. Design for 24/7 availability of the IT services offered. New management plans for maintenance requiring real interruptions to service.Moreover, the management of "Cater Matters" has decided to regularly inform customers about the levels of performance and availability of the various different services provided. To do so they have charged Availability Management with implementing the procedures necessary to measure: The time between incidents. The time the service is down. The time taken to respond to each incident. The delay in service delivery.This will be complemented by a module automatically performing statistical calculations and generating reports on compliance with the levels of availability agreed with each customer.In this way, "Cater Matters" hopes to build a relationship of trust with its customers and keep the IT organisation alert to any possible degradation of the level of quality of service.Security ManagementPractical CaseThe management of "Cater Matters" is aware that an approach to security based solely on the concept of "defending against attacks" does not meet the needs of the business.It is important that customers of "Cater Matters" have up-to-date information about their orders, outstanding payments, etc. and this requires interaction with the company's ERP.Clearly, this raises a number of additional security problems, as channels to the outside have to be opened up from within the organisation's IT core.The management of "Cater Matters" has decided to create a series of Web Services allowing access to this information while preserving its confidentiality and integrity. This requires a review of the Security Plan and the security sections of the SLAs in force.As basic security measures: The range of IPs which the service is able to access is limited. The service is only available from authorised customer IP addresses. Encryption protocols are implemented for the XML files exchanged. Authentication is required in order to access the service. Interaction with the application is monitored to detect possible outside attacks. A log is kept of when, how and by whom the service is used. A single input channel is authorised for the local services through the company's web servers.A periodic evaluation of the service is proposed in order to detect vulnerabilities and adopt corrective measures.The objective is to offer a quality service with high levels of security so as to build customer loyalty at a time or rapid development when the competition is just a click away.


Recommended