Before you install SMS you need to extent the active directory schema. to extend it you can follow the steps below 1. user should have the active directory schema rights if not add the user in “SCHEMA admin Group” in DSA.MSC 2. browse the SMS setup CD %cd drive %\smssetup \bin\i386\extadsc.exe from the command prompt and hit enter. your active directory schema will...
Labels
Active Directory
(59)
Apache
(7)
Backup
(6)
Citrix VDI in box
(9)
Cloud Computing
(5)
Clustering
(23)
DAS
(5)
Data Center
(6)
Devops
(2)
DFS
(2)
DNS
(5)
DRBD (Distributed Replicated Block Device)
(1)
Exchange
(5)
file services
(2)
flow charts
(9)
Hardware
(15)
Hyper-V
(2)
IIS
(11)
Jboss
(2)
Linux
(145)
MangoDB
(4)
Migrations
(1)
MYSQL
(30)
Netscalar
(3)
Networking
(4)
Oracle
(8)
Performance Engineering
(2)
PostgreSQL
(12)
Powershell
(8)
Project Management
(11)
Puppet
(2)
PVS
(1)
SALT
(1)
SAN
(15)
Scripting
(13)
SendMail
(2)
Sharepoint
(6)
SMS
(1)
SQL
(16)
SSL
(5)
Symantec AntiVirus
(7)
tomcat
(13)
Tools
(17)
VBscripting
(5)
Vmware
(30)
Windows
(199)
windows 10
(4)
XENAPP
(85)
XENDESKTOP
(17)
XENSERVER
(2)
What is Permissions:- Permissions define the type of access granted to a user, group, or computer to access resources. Permission can be applied to resources such as files, folders, and printers. - Like: Privilege to read a file, delete a file, or to create a new file in folder. Types of Permissions:- Security Level Permissions Share Level Permissions1.Security Level Permissions:- Can be...
What is Tree:- Tress is a set of one or more domains with contiguous names. If more than one domain exists, you can combine the multiple domains into hierarchical tree structures. The first domain created is the root domain of the first tree. Other domains in the same domain tree are child domains. A domain immediately above another domain in the same...
Flexible Single Master Operation Roles(FSMO Roles):- Names Master Schema Msater RID Master PDC Emulator Infrastructure Master1.Naming Master:- Check the Maintains the Uniqueness off the Domain Names in the Whole Forest. It is Responsible for adding. Removing and renaming the domain names in the whole Forest. 2.Schema Master:- Schema is a set of rules which is used to define the structure if AD. Schema...
What is Group Policy:- Group policy is a collection of settings which can be applied on computers and users. With group policy administrator can centrally manage the computers and users. Eases administration using group policy. Group policy is applied in three levels, There are - Site GPO - Domain GPO - O.U GPO Organizational Unit:- It a logical container which contains Active Directory...
What is Trust:- Secure communication path the allow objects in one domain to be authenticated and accepted in other domains. Some trusts are automatically created. - Parent-child domain trust each other - Tree root domain trust forest root domain Other trusts are manually created Forest-to-Forest transitive trust relationships can be created in Windows Server 2003 and Windows Server 2008 forests onlyTrust Relationships:- Type...
What is DHCP:- It gives Addresses automatically to the client who is requesting for an IP address Centralized IP Address management DHCP prevent IP address conflict and help conserve the use of client IP Address on the on the network DHCP reduces the complexity and amount of administrator work by assigning TCP/IP configuration automatically to the clients. Types of IP Addresses:- Static IP...
What is DNS:- Domain Name Service/Domain Name System Provides resolution of name to IP addressing and resolution of IP addresses to names Define a hierarchical namespace where level of the namespace is separated by a “.” Computer running DNS Service can be:- DNS Namespace:- How DNS Queries Work:- Authoritative & Non-authoritative DNS Server:- Return the request IP address Return an authoritative “NO”An Non-authoritative...
INTERNET INFORMATION SERVICES(IIS):- IIS is a service which is used to host the information over internet. It provides integrated, reliable, scalable and manageable web server capabilities over an intranet/internetVersions of IIS:- IIS 2.0 in windows NT 4.0 Operating System IIS 5.0 in windows 2000 Operating System IIS 6.0 in windows 2003 Operating System IIS 7.0 in windows 2008 Operating SystemFeatures Of IIS 7.0:-...
ROUTER It is device to communicate between two different networks.ROUTING It is process of sending the data packets through the best path to reach the destination.DEFAULT GATEWAY It gives exit point (or) entry point to reach the destination.Types of Routing:-1. Static Routing Routes should be added manually on the router by the administrator.2. Dynamic Routing Routes will be added automatically by the router...
How Dial-Up Network Access Work:- Dial-up client make a temporary connection to a remote access server by using. Components of a Dial-Up Connection:- How a VPN Connection Work:- A virtual private network (VPN) extends a private network across a public network, such as the internet. Components of a VPN Connection:- How Dial-Up Network Access Work:- Dial-up client make a temporary connection...
Modes of Terminal Services:-1. Remote Administrator Mode Specially designed for remote management of server. Only two connections are Supported License is not required.2. Application Server Mode Specially designed to use multiple application from terminal server. Unlimited connection supported. License should be purchased.Terminal Services Sessions:-Disconnect Session If the Session is disconnected all the programs will continue to run in the background & the user...
WINDOWS DEPLOYMENT SERVICES (WDS):- Windows Deployment Services enables you to deploy Windows operating systems, particularly Windows Seven and Windows Server 2008. You can use it to set up new computers by using a network-based installation. This means that you do not have to be physically present at each computer and you do not have to install each operating system directly from a CD...
What is Server Core? :- Only the core components of Operating system and a subnet of the executable files will be installed GUI interface will not be installed Windows Explorer, Internet Explorer etc will not be installed Can be managed with remote toolsServer Core Features:- Reduced software maintenance Low attack surface Reduced Management Less disk space required Basic Configuration Commands:- To view the...
Distributed File System:- Distributed file system (DFS) allows Administrators to make it easier for users to access and manage file that are physically distributed across a network. With DFS, you can access make file distributed across multiple servers. It may appear for user that files actually reside in one place (computer) on the network. Distributed File System:- Distributed file system (DFS) allows Administrators...
New Names in Active Directory 2008:- Lightweight Directory Services (AD-LDS):- AD LDS Provides an LDAP accessible directory services that supports identity managements scenarios Removes all other AD DS features - No Kerberos authentication - No forests, domain, DC, GC, sites, group polocies - No dependency on DNS Each AD LDS server can host multiple directory stores (i.e. instances) Within each instance - Schema...