Tuesday, December 28, 2010

Opalis Architecture

 

Following description of the components Opalis Integration Server 6.3

Datastore - The Datastore is the SQL database where you stored the configuration information, policies, logs, etc..

Server Management - The Management Server is the main point of management to customers, Action Servers, policies, etc.It is responsible for distributing the packages to customers and integration policies in the Action Servers.Servers fuction as a bridge for communication between customers, Action Servers and Datastore.

Action Server - This component is responsible for performing the same policies.O connects with the Datastore therefore does not require a Management Server.

Opals Client - Used to create, modify and distribute policies.

Operator Console - A console for visualization of ongoing policies, alerts, etc..

Testing Policy Console - Console used to perform tests on the policies before they are distributed.

Opalis

 

Posted on 15/12/2010 by Sandro Zamboni| Leave a comment

1 Voto

Here's a link of the documentation of Opalis, fantastic tool for automating IT processes

http://technet.microsoft.com/en-us/library/ff630946.aspx

Copy Database Layout Design

 

Here's a link referring to the official copy of database design Exchange Server 2010 (DAG):

http://technet.microsoft.com/en-us/library/ff973944.aspx

Multiple Server Configurations Role in Capacity Planning for Exchange Server 2010

Guys,

Here's a link on the capacity planning for Exchange Server 2010:

http://technet.microsoft.com/en-us/library/dd298121.aspx

Example Asset Intelligence Non-Microsoft License Import File

 

Guys,

Here's a link to sample License File to be imported into SCCM (Asset Intelligence) to control the licensing of products which can not import from MVLS.

http://technet.microsoft.com/en-us/library/cc872793.aspx

Follow link for import licenses to the catalog in Asset Intelligence:

http://technet.microsoft.com/en-us/library/cc431362.aspx

I hope it's useful!

List of Log Files in Configuration Manager 2007

 

Here's a link for the list of logs Configuration Manager 2007, both for the server and its functions as related to clients.

http://technet.microsoft.com/en-us/library/bb892800.aspx

Installing SCCM 2007 R2

 

In this article I describe the installation of System Center Configuration Manager 2007 R2 (R2 SCCM2007).

The first step for installation is to meet all the prerequisites for official mesma.Segue links below regarding these requirements:

Supported configurations:

http://technet.microsoft.com/en-us/library/bb680717.aspx

Preparation for the installation of SQL:

http://technet.microsoft.com/en-us/library/bb632649.aspx

Extending Active Directory Schema:

http://technet.microsoft.com/en-us/library/bb633121.aspx

Installation checklist:

http://technet.microsoft.com/pt-br/library/bb680951 (en-us). aspx

Ports used by Configuration Manager

http://technet.microsoft.com/en-us/library/bb632618.aspx

Required settings in firewalls (local or not):

http://technet.microsoft.com/en-us/library/bb694088.aspx

Requirements for Windows Server 2008:

http://technet.microsoft.com/pt-br/library/cc431377 (en-us). aspx

After setting the requirements, we must run the installation DVD Splash.hta SCCM 2007 SP1.Na window appears, we can validate the requirements with the option "Prepare \ Run the prerequisite checker." After the validation of requirements, we will select the option "Install \ Configuration Manager 2007 SP1," as shown in the image below:

At the beginning of the installation, must choose between installing a Site Server installation or the console administração.Iremos choose the installation of Site Server and click Next.

After accepting the license agreement (which is compulsory acceptance for product installation), the next screen we select the options instalação.Temos single option (already pre-determined) and custom (recommended) where we manually configure our parametros.Iremos choose the custom option (as shown in the picture below, and click Next

We must choose between installing a Primary Site (site containing a database, required if the first site of a structure SCCM) or Secondary Site (only possible if there is already a primary). How we are performing a new deployment, choose the option to install a Site Primário.Clique Next.

At this stage of installation, we should enable or disable the CEIP to send information to Microsoft (useful for product improvement) and enter the key produto.Após these definitions, we can then choose the path to the installation of SCCM.Após, click Next.

One of the most important steps of the installation is the choice of Site Code and Site Name for this choice is directly related to the design solução.Por this reason, we should always consider a standard and intuitive names that meets the requirements of growth ambiente.Lembrando that the site code and can not be modified or reused.

In the Site window mode, we must establish the operating mode of our estrutura.Devemos choose native mode when we do not have a coexistence of SCCM with SMS 2003, noting that the native mode is required PKI (public key infrastructure) for issuing certificates digitais.Devemos choose the mixed mode when we have a coexistence with SMS 2003, whether the level and server or client, or when we have a public key infrastructure.

After choosing the mode of operation, we select the features that are enabled in instalação.Lembrando that these resources can be enabled after instalação.Após selecting features, click Next.

Enter information regarding the database, SQL server, instance, database ... click Next.

In the window "SMS Provider Settings", we will establish that the SMS PROVIDER will be responsible for reading and writing in the database SCCM.Clique Next. More information about SMS PROVIDER (http://technet.microsoft.com/en -us/library/bb680613.aspx )

We have this step of the installation to add the role of Management Point to our server or we can choose to add this function later by console.Caso decide to add the function, must enter the FQDN of the server as image abaixo.CliqueNext again.

In the Port Settings window, configure the ports for communication between client / servidor.Por standard HTTP port used is port 80, but we can set up another door qualquer.Clique Next.

In the next window, the Setup installer will download the prerequisites atualizados.Podemos download the components or can indicate the directory where the components were stored préviamente.Recomendo create directories on the first level and no space in name (eg c: \ SCCM) as shown below, Next.

Enter the directory path where the components will be armasenados.CliqueNext.

This displays a summary of the settings and start the installation process.

After finishing the installation process for SCCM 2007 SP1 (recommended restarting the server!), We will start the installation of SCCM 2007 R2.From the installation media, we run the Splash.hta and in the window, select the" Install \ Configuration Manager 2007 R2. "

To start the installation process, click Next in the window "Welcome" and in the "Installation".

Click Finish to end the installation.

After installation of SCCM 2007 R2, it would be interesting to test the operation of the console, create the install directories, verification services, installation logs, etc..

Error when upgrading, installing and uninstalling or SCCM 2007

 

In some cases you may find the following records (below) inConfigmgrSetup.log when installing, upgrading and uninstalling or SCCM.

<11-22-2010 11:40:41> failed with 1300 AdjustTokenPrivileges
<11-22-2010 11:40:41> Could not verify an open MMC instance due to the error.
<11-22-2010 11:40:41> Exiting THREAD_Deinstall.

... Such a problem occurs due to lack of administrative law of the user running the setup, more specifically the right to "Debug programs" on the server.

To assign the right to run secpol.msc and navigate to Local Policies \ User Rights Assignment on the option DEBUG PROGRAMS add the user running the setup.

I hope this is helpful!

Saturday, November 20, 2010

VHD for study of SCCM 2007 R2

 

Here's a link to download the virtual machine with SCCM 2007 R2 VHD to study this originally serves for Virtual PC and virtual Server … originally! RSS ...

http://www.microsoft.com/downloads/en/details.aspx?familyid=e0fadab7-0620-481d-a8b6-070001727c56&displaylang=en

Microsoft certification – where to start?

 

I'm starting with this article, a series of articles concerning Percebí that Microsoft certifications. many professionals mainly beginners, has many doubts regarding the path should follow and what to do to move forward in their careers. one of these paths is the specialization in technologies that chose to act and the main way of proving this specialization is through certification.

The first step is to decide which branch you want to act, whether in infrastructure, database, development, etc… and once chosen this "branch", we need to decide what "inside" of each we specialize. Example: assuming you chose infrastructure, covering below we do it.this (Exchange. OCS, etc.), security (firewalls, etc), platform (operating system, etc.), hardware, connectivity, directory services, etc…

Just opting for a specific product or area and often by a personal inclination or even accidentally (through some activity imposed at work or project, etc).

Choice made, the next step is to map the way forward for specialization in technology concerned; We can get this study finding out what is the maximum level of specialization in product and/or technology that can be obtained, then we should start hitting their prerequisites!

Regards certifications, we must remember that it serves as a kind of proof that the manufacturer of its specialization in some product or technology; no certification or course (official or not) replaces the experience in real situations. However experience without technique also is not indicated, because if "harvesting" much to perform procedures and often creating "Addictions" not knowing the best practices and concepts for the tools. therefore, we must seek a balance between the study and practice!

As a Microsoft trainer, I am always asked for which the student must follow path for certification …. What proof should I do first? I specialize in client or server? I have to take the certification of your old product and migrate to certification of new or already begin at new? … The answers to such questions may vary according to the profile and or the day to day professional. If a professional working in a company where has the same has a career plan and the company has an old product deployed in large scale in the environment, I believe that the best immediate career and need professional is currently specialise in the product you are working and then migrate to the new. Already for a professional consultancy believe to be more interesting to invest in new products, since consultants often are searched based on their knowledge in the novelties of the market there are professionals who want to specialize in support, so we specialize in systems customers … others want to be network administrators then specialize in server systems … etc.

I have an article on the Microsoft careers might help:

http://zambonis.wordpress.com/2010/02/11/provas-necessarias-para-cada-certificacao-microsoft/

Any doubt, sit in the provision for help! I think would be more cool post doubt shaped comment, because your questions may also be questions from other people.

I hope it is useful!

Techniques for troubleshooting

 

During all these years, which I am directly involved with environments and technology professionals, either within a classroom or in day to day work I realize some confusion on the part of analysts infrastructure for troubleshooting problems. don't believe a master in the matter concerned, despite being one of the bases of my work as a consultant; but realize that this deficiency is related to lack of vision on troubleshooting flow …. i.e. the analyst does not know where to begin and for this reason often ignores critical steps in the process of troubleshooting, logging procedures aimlessly and without needs, often causing other problems beyond those already mapped.

The resolution of problems in production environments is critical for the downtime of the service and or resources (such as applications, asset management, users, etc.), directly impacting on business. for this reason, the analyst should solve a problem more quickly and effectively, preventing a considerable impact on the productivity of users ' activities. Nowadays many companies invest in monitoring products, methodologies, processes, specialized training of professionals, as well as other various devices so that this impact is reduced and or non-existent.

A vital concept for troubleshooting is the concept of incident and problem, so commonly ITIL discussed and other methodologies. this concept consists primarily define incident as an isolated fact, something not widespread and or recurring (ex: A user has opened a call for a configuration problem on your Outlook) and problem relates to something widespread and or applicant (ex: Multiple users open called for the same problem in their Outlook's or a user always the same error reporting). So let's get straight to the point! …

1. Investigating the occurrence. is paramount raising information concerning problem, classic questions as: what time the problem occurred? what has changed on your computer and or the environment just before this period that could have caused the error (an installation and software update, or change any configuration of system or network, etc.)? … Anyway, gather as much information as possible; When we are "by interrogating" a user, it is essential to communicate with the same with terms that are understood by him, because technical terms will only confuse the user stopping us from getting the information you need.

2. Checking the breadth of the error. at this point we can verify that this is an incident or a problem, if customer is an error, network or server must check if the error occurs with a single user, if it occurs with a set of users (if it occurs with more than one user, check out what these resources has in common … is an application, VLAN group or switches, OR in ad, etc) or is referring to an application or service specific network So we can evaluate. on that point and how we will act to resolve the error.

3. technical survey of the error. In this step, we will search the messages and characteristics of the error in question (error POPUPS, log's application concerned, system logs, etc.), as well as the impact generated. This is important for "away scot-free" this information with information collected previously and in conjunction with data spanning problem. the product of this information is essential for a correct search incident resolution and or problem (e.g. Outlook user is presenting the XYZ error but this error may be due to a setting Outlook and failure or server in the Organization, etc…). We currently use diagnostic tools provided by the manufacturer and or third parties.

4. application of the solution. Good, we come to a crucial point for resolving a problem, the application of the solution before the resolution itself a problem and or incident, we verify some important points:

a. what impact the implementation of the solution. It is essential the mapping of the impact on the application of possible solutions to the problem or incident; some of them may entail on reboot a server backup, restore, rewriting some parameter of an application and or network service, change the permissions of a user, etc. the mapping is important for us to organise for when we will be able to apply the solution (ex: a solution that involves a boot server in production may result in their implementation outside of business hours). we must expect to correct an error, when the correction process impact at the moment is greater than the impact of the error.

b. which solution to implement. Depending on the issue in question, we can count on more than one solution (some of them definitive and other palliative). But there is always the best solution to be applied; Depending on your situation, we are forced to run a stopgap solution or simply a solution that is not the best. This must be assessed in light of the impact of each solution X urgency (SLA) for the resolution of the problem. However, if it is not possible to apply the best solution at the time, you should schedule the application to which a workaround does not become a definitive solution.

c. how to apply the solution. The process of implementing a solution is very important. implementation of the solution must be clean and without errors; the most suitable is searching for a step-by-step (preferably of manufacturer of the active application or solution with error) without errors at the time of the execution process. it would be interesting depending on the criticality of the environment, test the fix in an environment of approval before applying the same production. shouldn't be generalists in order to simplify the application (e.g. the documentation says that to solve a problem the user needs a specific permission on A FILE and to "simplify" you just assigning permission to ENTIRE FOLDER), with this we can significantly increase the impact caused by application of the fix, and cause problems related to security settings, best practices, etc.

5. verification of the results. After applying the fix, we should check the following points:

a. If symptoms of the problem or incident disappeared. We can verify the disappearance of the symptoms of the error by checking event logs (application, system, etc.), no incidence of error popups, resource utilization that before not worked, etc.

b. monitoring solution. Verify that there is a recurrence of error after applying the solution, check the performance of the application and solution, or service that was showing errors and feedback from users and analysts involved.

Described above some basic points that should be followed to resolve problems and incidents to be in our work and clients or course each situation can present quite particular and that solving contains several strands as disaster recovery, contingency, etc… but the development of these activities must be performed in an organized way, safe and aligned with a good technical background about the technologies involved.

Official Microsoft Team Blogs

Staff,
Here's a link to all Microsoft Team Blogs .... both infrastructure and dev.
There you guys ask me …. Zamboni, what do I do with it??? ….
…. Adds RSS in your Outlook that a day will save your life! rss
Here's a link:
http://blogs.technet.com/b/blogms/archive/2010/01/19/directory-of-microsoft-team-blogs.aspx

Checklist for installation of SCCM 2007/SP1

Below, link of items that are checked in the installation process of SCCM 2007/SP1:

http://technet.microsoft.com/pt-br/library/bb680951 (en-us) .aspx

Very useful!

Microsoft certification – Dumps

A save everyone!!!

In this article I discuss a subject at least controversial … dumps ...

The DUMPS are simulated that contains simply the same questions of proof! that's right!! I don't know how to make the "Pilantras" to copy the questions of evidence, but they do and post in files of various formats and sizes …

There are some DUMPS famous nowadays as the TESTKING, PASS4SURE, BRAINDUMPS, etc… some containing over 400 questions and all containing errors!!

The big problem is not open to disclosure of this garbage on the Internet, and yes the large-scale use of same by "professionals" of technology. what happens:

  1. Our friend "professional" technology, knowing the importance that certification has on a selection process on the market; Download the DUMPS, decorates all or most of the questions and goes to the evidence.
  2. Arriving at our "professional" is a 3-hour exam in 15 minutes and takes 1000 (maximum note) or close!! Wow!!! The kra is really fera!!! … So our friend manages several certifications in record time!
  3. Pleased with the great achievement, our "expert certificate" presents itself to the labour market with an enviable range of certifications and therefore even manages to cheat in some interviews, achieving a vague outline.
  4. But the smart forgets that his knowledge (attested by certificates) will be charged and the same thanks to show service! .... and here we??? A total fiasco!! The fantastic "sovereign of certifications" does not dominate nor most basic concepts of products and technologies which is certificate. Result: the professional falls into disrepute and along with it certification. with that professional profile being discredited by the employer, a professional who studied, courses, research, and has proven its effort and knowledge passing on evidence; will be viewed with distrust and disrepute.

I know many "professionals of TK (Testking)" some with dozens of certifications, mas na hora de a migration, a disaster recovery or is, at the time of "Let's see" cannot solve NOTHING! some of these professionals are ministering in classroom trainings (looks that danger!) and some even disseminating the dumps as something cool!!

Always I am asked by students about dumps … some attempt to justify the use of DUMPS for having the explanation regarding answers the question, by not exist exams serious free, etc. Good, dumps often contains the wrong answers and explanations; or If search-mos will find several best simulated serious, we have some even free on sites like the MCP Brazil and nobody is silly not to know that we have to download everything on the Internet.

Using DUMPS you are fooling themselves! Usually give my students an example of a man who simply puts a black belt at the waist and going to the gym … for all who see it is unquestionably a black belt, but and "time of shitload"? what grace having X certifications and don't know about what is Personal certificate? cease to cheat and study, invest in their careers with courses, internships, research, etc ... the important thing is to have a solid understanding and always get the same or, in the "time of shitload" you will make beautiful!!

Soon I'll post an article about some techniques to study the evidence.

Supported configurations for Operations Manager 2007 R2

Follows link concerning settings supported by SCOM 2007 R2 as:

  • Hardware requirements
  • Software requirements
  • Ports used
  • Firewall stack trace
  • Cluster
  • Performance
  • Other

http://technet.microsoft.com/en-us/library/bb309428.aspx

Videos SCOM

 

I'm posting link to downloads videos from master Cleber Marques for SCOM:
http://www.megaupload.com/?d=rgojubmm

Download Management Packs

Follows link Catalog Management Pack's Microsoft …

http://pinpoint.microsoft.com/en-us/systemcenter

Setup was unable to create unknown machines. 0×80070003

Guys,

I'm posting the solution (at least in my case! Rss) error of installation of SCCM 2007 R2 on a Windows Server 2008 with SQL 2005 SP2

The error displays the following message when installing R2:

"Setup was unable to create unknown machines. 0×80070003″

In my case, I found the solution to this problem was to manually create the directories "auth \ ddm.box" into the directory "imbox" as shown in the image below:

I hope it's useful!

Thursday, October 21, 2010

Limiting the size of pst file

Quantcast

A critical point in the administration of any network is the file used to archive e-mail messages from Microsoft Outlook clients, the famous ´ s pst files.

Something critical in administering these important files is the administration of the same size, since a very large PST in addition to causing slowness in searches of messages, the large size can (and probably will) cause corruption of the file.

For Microsoft Outlook 2003 and 2007 (not yet tested in 2010 … .. but I believe that works well) we limit the size of PST by changing registry keys on the workstations.

Here's a link:

http://support.microsoft.com

Monday, August 16, 2010

Friday, July 23, 2010

POP3 in Windows Server 2008

 

Staff,

Follows a link to a cool tutorial for installing the SMTP and POP3 services in Windows Server 2008.

http://jebass.blogspot.com/2009/02/making-pop3-smtp-server-work-with.html

Att.

Wizard ´ s for creating records policy framework (SPF)

 

The SPF record is used as a form of control and authenticity of servers that are responsible for sending emails in a domain, so the SpamCheck ´ s …

To assist in creating these records in DNS, follows below two WIZARD ´ s:

http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wizard/

http://old.openspf.org/wizard.html

I hope it's useful!

Sunday, June 27, 2010

GPO Search

Ladies and gentlemen!

I've been googling and found a very cool application provided by our Windows Azure … it is a website where we can search GPO and registry settings!! Pretty cool, what's more we have provider for IE 7 and 8.

http://gps.cloudapp.net/

Quick video showing the Following uses of the site ...

 

RPC integrity checking for DNS requests in Windows Server 2008 R2

 

Staff, a new security feature of Windows Server 2008 R2 must take our attention, which is the RPC integrity checking for DNS requests. This feature is not supported on Windows 2000 DNS and Windows Server 2003.

Because of this verification, in a mixed environment and migration where we will have the coexistence of servers and workstations running legacy systems, it may be necessary for disable this feature because it can cause failure in the external name resolution in DNS clients running Windows Server 2003, 2000 and XP do not have problems on clients running Windows 7.

Unfortunately discovered feature in the worst way (during a migration process, experiencing the symptoms mentioned above) and not by study … so I'm posting it because it is a resource which we have a few references and believe to be useful! below is the command to disable the security feature:

Dnscmd.exe /Config /RpcAuthLevel 0

…. to activate the feature, just change-mos value from 0 to 1 … as shown.

Dnscmd.exe /Config /RpcAuthLevel 1

For us to verify the current status of the configuration, we can use the parameter /info:

Dnscmd.exe /info /RpcAuthLevel

I hope it's useful!

Monday, May 3, 2010

Configuring IMAP4 and POP3 in MS Outlook 2007, 2010 with Exchange Server 2007.2010 published with ISA Server 2004, 2006 and Forefront TMG

 

Personnel, after catching a little error messages as 0x800CCC80, 0x800CCC6a, event ID 4625, etc… decided to post the required settings for configuring Microsoft Outlook 2007, 2010 for IMAP4 and POP3 connection with default settings for Exchange Server 2007, 2010 published with ISA Server 2004, 2006 and Forefront TMG. Do the settings for an account using the IMAP4 Protocol, however all settings apply POP3 accounts, exeto by the number of ports.

The first step is to configure the user information, server and log on as the image below. Recalling that we can inform the IP servers.

image

After filling out the fields with the required information, we must configure the connection information as follows:

On the tab "Outgoing server" option "my outgoing server (SMTP) requires authentication" should be unchecked.

image

And "Advanced" tab in the IMAP server must meet in 147 port (default) and the type of TLS, encryption of the connection to the SMTP server using the default port (25) Protocol and no encryption type for the connection.

image

Ready! after these settings are only test.

Note:-settings can vary according to the settings made on the CAS Server as well as in the firewall.

Tuesday, March 23, 2010

Level 300:-DNS – Flow of DNS name resolution for Microsoft clients

 

In this article we will tackle the flow of DNS name resolution from equipment running Windows 2000 and later is very important to know-mos this flow, primarily involves troubleshooting.

In pre-Windows 2000 clients, we primarily NetBIOS name resolution that does not necessarily need to be used in Windows 2000 and later systems, which use DNS name resolution as a primary method.

DNS names are divided into two parts as shown below:

WWW. Z1BR.com

ZAMBONIS.Spaces.live.com

COMPUTER01.LOCAL WOODGROVEBANK.

This structure consists of host name (in yellow) and DNS suffix (in red).The host name is associated with a record in DNS that points to an IP address and the DNS suffix associated DNS zone where registry.

Now that we are reminded of how the structure of DNS names, let's look at how the flow of name resolution.

Let's take as an example of a user who wants to access a network share; the user enters \\ServerFS01\SharedFolder

The first step is to complete the requested host name with the DNS suffix of agreement as specified in the network connection properties, clicking on properties of TCP-IP (in both IPv4 and IPv6) version click on the button "Advanced" and the DNS tab as shown in the image:

image

Is selected by default, the option "Append parent suffixes of the primary DNS Suffix", this option will add the suffix father of MACHINE names requested which was not specified the FQDN, as in our example. Note that below this option we choose in choose a suffix list; in the case of having multiple domains for example (the suffixes are added to the list, in order, until you found the host), with this procedure we can expedite workstation, in a large forest. Another option we configure statically would add a DNS suffix for the connection (this setting will not be changed automatically).

With regard to the primary suffix of the machine, we can find it in the "Advanced properties of the system" in the "computer name" tab, as shown in the picture on below (note that the suffix is by default changed automatically when the machine is joined to a new domain);  for security reasons, some organizations desmarcam this checkbox, which can cause name resolution problems if the analyst update manually the primary suffix.

image

After completing the host name with the DNS suffix, the next system procedure is to check the machine's DNS CACHE function local DNS cache is to expedite the process of resolving names in addition to decrease network traffic; we can see this cache through ipconfig/displaydns command and erases it via ipconfig/flushdns command.

You can disable logging cache through the command net stop DNSCACHE or disabling the DNS Client service by service console (services.msc).

In the local DNS CACHE can be stored records positive responses resolved successfully by the DNS server) and negative records (answers resolved by the DNS server on which the DNS client cannot connect to the host, such as the status of "host not found" when we access a URL. by default, the storage time for a record in the DNS cache is 86,400 seconds (1 day) and a negative record of 900 seconds (15 minutes). However we modify this period by editing the registry:

  • To define the period of storage of positive and negative records, overwhelmed by the following key:

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNSCache\Parameters

    • For editing storage records POSITIVE we must create a new DWORD value with the name MaxCacheTtl (this value must be established in seconds; the default value is 86400).
    • For editing storage records NEGATIVE we must create a new DWORD value with the name MaxNegativeCacheTtl (this value must be established in seconds; the default value is 900).

If the requested name is not resolved by the DNS cache, the next step would be to consult the hosts file located in the directory%windir%\System32\drivers\etc\. The hosts file contains static entries and is typically used to expedite the process of resolving names, pre-population of DNS cache, for environments in "workgroup" as in a DMZ or still to block sites. We use cautiously the hosts file, because it is a way to decentralise the resolution of names; what can cause problems for a resolution, if there are changes in settings of TCP-IP hosts mapped. Below is the video where I show an example of editing the hosts file:

The next step is to forward the request to the preferred DNS server configured on the properties of TCP-IP of the network interface. If the preferred DNS server is offline, or for any reason the DNS client does not have server connectivity, name resolution request is forwarded to the secondary DNS server, if the same is also without communication with the client, the request is forwarded to another DNS server that is listed at the top of the list of DNS servers in the DNS tab of the advanced settings of TCP-IP. The list is checked from top to bottom, what makes recommended placing at the top of the list, the same site and servers, or servers of sites where the link to connect to the DNS client has the highest bandwidth available.

image

When the request arrives at the DNS server, the server performs the following procedures to try to resolve the host:

1-server's cache (this is not the same DNS cache commented previously, and yes the cache of DNS service);

2 – DNS zones (… search server hosting areas …)

3 – search in the WINS database (if configured …with this feature server searches the database of the WINS servers listed to verify the existence of the requested record.)

4 – conditional forwarders (requisitions routing rules for a given domain DNS)

5 – Forwarders (… forwarding for any request that the server does not resolve)

6 – Root Hints (… servers responsible for the root domain (".") on the Internet)

Note: these DNS server resources will be covered in detail in the next articles in the series

Friday, March 12, 2010

RAID

As promised to students 6430, follows the link to Wikipedia for RAID … actually link is pretty cool:

http://en.wikipedia.org/wiki/raid

I hope that is useful!

Sunday, March 7, 2010

Windows Server 2008 R2 with Windows 7 theme

 

Ladies and gentlemen,

Just to relax a little, I am posting a video, where I show how to enable the theme of Windows 7 on Windows Server 2008 R2. This feature is used so that the terminal Service user, have an experience similar to the Windows environment 7 … requirements:

  • Windows Server 2008 R2 
  • Video card is configured with the correct driver.

Monday, February 15, 2010

Configuring NLB Cluster in Windows Server 2008

In this article, I show how to set up an NLB cluster in Windows Server 2008.

I will create a cluster with only 2 nodes that are configured as follows:

Node 1:

  • IP : 192.168.0.1
  • Mask : 255.255.255.0
  • Node 2:
  • IP: 192.168.0.2
  • Mask: 255.255.255.0

The cluster is with IP 192.168.0.3

The first step is to install a feature of Network Load Balancing (NLB) on both nodes of the cluster, click Start, Server Manager, Features and Add Features.As the figure below:

image

In the Add Features Wizard check the Network Load Balancing, click NEXT and the INSTALL button to install the feature

image

Click CLOSE after the installation completes.

image

Click START, Administrative Tools, and Network Load Balancing Manager

image

Click Right-click Network Load Balancing Cluster and select New Cluster

image

In New Cluster: Connect, type the ip or name of a node in the cluster and click the Connect button.After the interface is connected, click NEXT

image

In the Host Parameters, select the priority of the IP addresses of the nodes and the state of initial activity of the node to join the cluster. ... And click NEXT

image

Click ADD and add the cluster IP address (this is the IP address to be accessed by customers) ... after completing the settings, click OK and NEXT button.

image

Choose the operating mode of the cluster ... will choose the unicast mode (which will cause the MAC address of network interfaces of the servers (we) are equal to the virtual MAC address of the cluster). Click NEXT

image

In the Port Rules by clicking the ADD have the option to create rules for the cluster to meet requests only on certain ports.Leave the default option (from 0 to 65535). Clique em FINISH… Click FINISH ...

image

... Our NLB cluster is almost ready, lack now add the second node to the cluster. To do this, click the right-click the cluster and select Add Host to Cluster as shown in the figure below ...

image

In the Add Host to Cluster: Connect, type the name or IP of the server that will be another cluster node and click the Connect button. After the interface is connected, click NEXT

image

In the Host Parameters, select the priority of the IP address of another node and the state of the initial activity even when entering the cluster. ... And click NEXT

image

Set again the port rules to the other node and click FINISH

image

We have our NLB cluster running.

image

Now, to test, I run the PING command (from a client station) while the dedicated IP's of the two nodes (192.168.0.1 and 192.168.0.2) and the cluster's IP (192.168.0.3) ...

image

... I will now disable the network interface of one of us. The expected result is that it does not lose connectivity with the cluster (192.168.0.3).

imageI hope it's useful!

Documentation on Global Name Zone in Windows Server 2008

This goes for personal travel 6421 (31/08/2009) from BF.

Personally, as promised, follow the link to an official document of Microsoft about GLOBAL ZONE NAME Windows Server 2008.

http://download.microsoft.com/download/e/2/0/e2090852-3b7f-40a3-9883-07a427af1560/DNS-GlobalNames-Zone-Deployment.doc

.... soon will be posting articles on the subject!

A Abs to all!

Evidence required for each Microsoft Certification

Save gentlemen

Here's a link's containing the necessary evidence for the Microsoft certifications focused on infrastructure:

MCITP

MCTS

MCSE

MCSA

MCDST

MCM

MCA

I hope it's useful!

Interplanetary Internet !!!!!

Here is a link at least curious and very interesting Interplanetary Internet!

http://www.ipnsig.org

Sunday, January 31, 2010

Detection and Driver Update Online!

Personal

A student has a hint of a pretty cool site that scans and detects which drivers need to be updated and / or installed on the machine. ... FREE!
Here's a link:

http://www.ma-config.com


I hope it's useful!