Nothing Special   »   [go: up one dir, main page]

System Center Configuration Manager

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

System Center Configuration Manager

From Wikipedia, the free encyclopedia System Center Configuration Manager (ConfigMgr or Configuration Manager), formerly Systems Management Server (SMS), is a systems management software product by Microsoft for managing large groups of Windows-based computer systems. Configuration Manager provides remote control, patch management, software distribution, operating system deployment, network access protection, and hardware and software inventory. There have been three major iterations of SMS. The 1.x versions of the product defined the scope of control of the management server (the site) in terms of the NT domain that was being managed. Since the 2.x versions, that site paradigm has switched to a group of subnets that will be managed together. Since SMS 2003, the site could also be defined as one or more Active Directory sites. The most frequently used feature is inventory management, which provides both hardware and software inventory across a business enterprise. The major difference between the 2.x product and SMS 2003 is the introduction of the Advanced Client. The Advanced Client communicates with a more scalable management infrastructure, namely the Management Point. A Management Point (MP) can manage up to 25000 Advanced Clients. The Advanced Client was introduced to provide a solution to the problem that a managed laptop might connect to a corporate network from multiple locations and should not always download content from the same place within the enterprise (though it should always receive policy from its own site). When an Advanced Client is within another location (SMS Site), it may use a local distribution point to download or run a program which can conserve bandwidth across a WAN. The current generation of the product, System Center Configuration Manager 2007, was initially released in November 2007.[1] Systems management refers to enterprise-wide administration of distributed systems including (and commonly in practice) computer systems.[citation needed] Systems management is strongly influenced by network management initiatives in telecommunications. Centralized management has a time and effort trade-off that is related to the size of the company, the expertise of the IT staff, and the amount of technology being used:
y y y

For a small business startup with ten computers, automated centralized processes may take more time to learn how to use and implement than just doing the management work manually on each computer. A very large business with thousands of similar employee computers may clearly be able to save time and money, by having IT staff learn to do systems management automation. A small branch office of a large corporation may have access to a central IT staff, with the experience to set up automated management of the systems in the branch office, without need for local staff in the branch office to do the work.

System management may involve one or more of the following tasks:


y y y y y

Hardware inventories. Server availability monitoring and metrics. Software inventory and installation. Anti-virus and anti-malware management. User's activities monitoring.

y y y y y

Capacity monitoring. Security management. Storage management. Network capacity and utilization monitoring. Anti-manipulation management

Functions
Functional groups are provided according to International Telecommunication Union Telecommunication Standardization Sector (ITU-T) Common management information protocol (X.700) standard. This framework is also known as Fault, Configuration, Accounting, Performance, Security (FCAPS).
Fault management
y

Troubleshooting, error logging and data recovery

Configuration management
y y y y y y y

Hardware and software inventory As we begin the process of automating the management of our technology, what equipment and resources do we have already? How can this inventorying information be gathered and updated automatically, without direct hands-on examination of each device, and without hand-documenting with a pen and notepad? What do we need to upgrade or repair? What can we consolidate to reduce complexity or reduce energy use? What resources would be better reused somewhere else? What commercial software are we using that is improperly licensed, and either needs to be removed or more licenses purchased? Provisioning What software will we need to use in the future? What training will need to be provided to use the software effectively? Software deployment What steps are necessary to install it on perhaps hundreds or thousands of computers? Package management How do we maintain and update the software we are using, possibly through automated update mechanisms?

y y y y y y y

Accounting management
y

Billing and statistics gathering

Performance management
y

Software metering

y y y

Who is using the software and how often? If the license says only so many copies may be in use at any one time but may be installed in many more places than licensed, then track usage of those licenses. If the licensed user limit is reached, either prevent more people from using it, or allow overflow and notify accounting that more licenses need to be purchased. Event and metric monitoring How reliable are the computers and software? What errors or software bugs are preventing staff from doing their job? What trends are we seeing for hardware failure and life expectancy?

y y y y

Security management
y y

Identity management Policy management

However this standard should not be treated as comprehensive, there are obvious omissions. Some are recently emerging sectors, some are implied and some are just not listed. The primary ones are:
y y y y y

Business Impact functions (also known as Business Systems Management) Capacity management Real-time Application Relationship Discovery (which supports Configuration Management) Security Information and Event Management functions (SIEM) Workload scheduling

Performance management functions can also be split into end-to-end performance measuring and infrastructure component measuring functions. Another recently emerging sector is operational intelligence (OI) which focuses on real-time monitoring of business events that relate to business processes, not unlike business activity monitoring (BAM).

What is Client/Server?

Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.

Users are called clients and communication generally takes the form of a request message fro client to server asking for some work to do the server then dones the work and sends reply usually their are many number of clients for small no of server s

How to work TCP/IP?

TCP/IP is just a protocol that allows different nodes on the network/Internet to share resources..and without TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL, different nodes wont understand each other. To configure it you will just right click on your LAN CONNECTION and click properties.make sure tcp/ip is ticked then click on it then properties....then from there you can assign each computer with an ip address or allow DHCP to do that for you.

TCP/IP is a type of protocols , it used assign a uniqu address to a pc, which allow the user to share its resource in the network, means it connect the pc to another pc to share data and resources.
What is an email client? What is difference between email client and web mail?

the e-mail client is client end software which is to be present in the client systems for the mail to be downloaded where the webmail is a web page access which does nto read any client-end software. 2. the e-mail clients can store the mails recieved on the client PC where as the mails in the webmail can only be viewed ann cannot be downloaded into the system.
What are the two types of OLTP?

OLTP types: MOLAP(Multi dimensional..) ROLAP (Relational)

It is Online Analytical Processing which is used to analyze the large and complex data. Three types of OLAP 1.Multidimensional OLAP 2.Relational OLAP 3.Hybrid OLAP(combination Of MOLAP and ROLAP)

What are Distributed Object Management Systems (DOMS)?

DOMS provide a way of pulling diverse components together and managing their communications. They are aimed at addressing the following:<br><br> * A single interface to manage the complexities of a heterogeneous environment<br> * A uniform framework, based on standards and extensibility, to build, integrate, and deploy open distributed-computing applications<br> * A method for creating location independence for client applications.<br>
How many server connecting to lan server connection?

You can connect as many as you can.But the thing is number of server should be increased and should be strong by using linux,unix
What is Cooperative Processing?

Answers: Cooperative processing is computing which requires two or more distinct processors to complete a single transaction. Cooperative processing is related to both distributed and client/server processing. It is a form of distributed computing where two or more distinct processes are required to complete a single business transaction. Usually, these programs interact and execute concurrently on different processors. Cooperative processing can also be considered to be a style of client/server processing if communication between processors is performed through a message passing architecture.<br> Cooperative processing is related to both distributed and client/server processing.Usually, these programs interact and execute concurrently on different processors. Cooperative processing can also be considered to be a style of client/server,
What is meant by transparency of location servers?

Answers: Distributed Computing Environment provides a comprehensive foundation that allows applications and data to be distributed transparently across networks, systems, and organizations, so that operating in the network omputing environment is almost as simple as working on a single system. The DCE framework extends several benefits to distributed computing. One of which is : Transparency The network is perceived as a single system, not a collection of independent components. This characteristic is referred to as transparency. There are two distinct kinds of transparency - Application transparency - Location transparency:

Application transparency : Client/server applications can access local and remote services and data in an identical manner. Location transparency : Users and client/server applications can access resources by referring to their logical names, without knowing their location. DCE directory services provide dynamic server identification and location within the network. Resources can be moved or reconfigured as required without affecting programs or the people who use those resources.

Location transparency : Users and client/server applications can access resources by referring to their logical names, without knowing their location. DCE directory services provide dynamic server identification and location within the network. Resources can be moved or reconfigured as required without affecting programs or the people who use those resources.
What is the router?How it works?

Router is a layer 3 device. it route the packet from one lan to different lan.to avoid broadcast we use router .

Router are used to connect 2 different networks by which they can communicate.
Router is the device that is used to link or communicate between to different networks Router provide best path from source to destination in the network Router provide best path from source to destination in the network Router is a layer3 device which is used to do routing. It is an intelligence device which used the best optimal path to send packets to different networks.

Router is a layer 3 device. it route the packet from one lan to different lan.to avoid broadcast we use router . Router are used to connect 2 different networks by which they can communicate. Router is the device that is used to link or communicate between to different networks Router provide best path from source to destination in the network A router acts as a junction between two or more networks to buffer and transfer data packets between them. Router is a layer3 device which is used to do routing. It is an intelligence device which used the best optimal path to send packets to different networks.

Router is a device,which communicates two or more different LAN networks by using desired gateway IP address.

Router is a layer 3 switch. it used to communicate the two different network from differ areas. router are used to provide communication between networka. it works on physical,datalinklayer and network layer. it is a device which provide the communication between LAN and MAN. Routers are basically used as a key device for internet and WAN connection.it has a software which has ur source and destination address.it will send data in packets form .first it will determine where the data wants to go then it will send it to that address.it avoid the broadcasting.it is a layer 3 device. router is a device which is use to connect two or more ip addres together router work at layer 3 and controlling the routing packets from source to destination and providing the alternate path router is a layyer 3 diviec it used commmunication beetween diffrent network and lan and use short path A router is a three-layer device that routers packets based on their logical addresses, that is host-to-host addressing.A router normally connects LANs and WANs in the Internet and has a routing table that is used for making decisions about the route. Routing tables are updated using routing protocols. router is the electronic device which define the better route between source to destination.it increase the performance of internet.when we send message at long distance it may be lost due to weak single.To solve this problem we use router in path of source and destination.router regenerate the signal and send message to destination.there is no chance of loss f message. router are used to provide communication between networka. it works on physical,datalinklayer and network layer. it is a device which provide the communication between LAN and MAN. Router is a layer 3 device. it route the packet from one lan to different lan.to avoid broadcast we use router . Router are used to connect 2 different networks by which they can communicate.
Router is used to transfer the data packets from one station to another station.Routing also provides path for data transmission.There are two routing algorithms namely distance vector and linked state through which path between various stations are provided

What are the different client/server processing styles?

Answers: Gartner group came out with the five ways of describing the different c/s styles based on how they split the three components of any application: user interface, business or application logic, data management. The five styles are distributed presentation, remote presentation, distributed function, remote data management, and distributed data management.<br><br>(Note: This is an arbitrary classification and others may do it differently)<br>

Which of the following are recoverable CICS resources?

Data files and data bases, Intrapartition TDQs, Auxiliary TSQs CICS recoverable resources To ensure that your business data is updated in accordance with the ACID principles, define the resources in which the data is stored as recoverable resources. The following resources can be defined as recoverable: * Data files, which are defined in the File Definitions (FD) Recoverable attribute * Intrapartition transient data (logically recoverable), which are defined in the Transient Data Definitions (TDD) Queue type attribute * Auxiliary temporary storage queues, which are defined in the Temporary Storage Definitions (TSD) Recoverable attribute * Autoinstalled terminal definitions * EXEC CICS? START PROTECT requests During normal operation and shutdown, CICS and the recoverable servers with which it communicates record information that is required for restart. If a complete or partial error or a shutdown occurs, this information enables CICS to recover and restart the region. During automatic restart, CICS returns recoverable resources to their committed states. If a transaction terminates abnormally and the resources that are affected by the terminating task are recoverable, CICS automatically performs dynamic transaction backout. However, after dynamic transaction backout, CICS does not automatically restart the transaction. Unless the file is on a DB2? database, where all files are recoverable, you must define a resource as recoverable in order for CICS to back out changes.
What is Apple?s VITAL architecture?

VITAL provides a way of building information systems constructed from generalized modules that can be reused and shared. It specifies how to construct and provide interfaces for these modules. A cornerstone of Apple?s client/server architecture is Data Access Language (DAL). DAL consists of software components for the client and the server (Macintosh System 7 includes the client component, DOS and Windows clients are sold separately). DAL sits between the client and server components.<br><br>This approach allows varied clients to communicate with many different servers. With DAL, a change in the DBMS does not affect the front-end; it simply requires the appropriate DAL link.<br>
What is meant by Horizontal scaling and Vertical scaling

Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers. Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers
What are the five major technologies that can be used to create Client/Server applications

1.to access data to server2.dont install software and other file only install on server3.controll to all client on server4.server can be reduce the client space5.at a time to work one application in to server6.server can be added to all database

1.we can access the database from server. 2. We Can give permission (client) for timely work. 3. We can also crate a synchronize betwork client and Server. 4. We can also create a roming profile and we will take backup of roming profile from server. 5. we can mirroring of server to secure our company data
What are the characteristics of client/server architecture?

Answers: The basic characteristics of client/server architectures are:<br><br> 1. Combination of a client or frontend portion that interacts with the user, and a server or back-end portion that interacts with the shared resource. The client process contains solution-specific logic and provides the interface between the user and the rest of the application system. The server process acts as a software engine that manages shared resources such as databases, printers, modems, or high powered processors.<br> 2. The front-end task and back-end task have fundamentally different requirements for computing resources such as processor speeds, memory, disk speeds and capacities, and input/output devices.<br> 3. The environment is typically heterogeneous and multi-vendor. The hardware platform and operating system of client and server are not usually the same. Client and server processes communicate through a well-defined set of standard application program interfaces (API?s) and RPC?s.<br> 4. An important characteristic of client-server systems is scalability. They can be scaled horizontally or vertically. Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and faster server machine or multiservers.<br> The client?server characteristic describes the relationship of cooperating programs in an application. The server component provides a function or service to one or many clients, which initiate requests for such services.

Posted by: jyothsna Contact jyothsna Contact jyothsna hi! i am noor siddiqui, i am gonna to tell you client server architecture... the client server acrchitecture can be basis of two point: 1. hardware server 2.software server 1:hardware server it is server that has high hardware configuration, i mean plenty of RAM, high speed processor scalablity and motherboard with high speed 2: software server software provides interface to configure the task will be carried out. softeware server includes oprating system such as windows server 2003 , sever 2008 in the client/server architecture, client is request maker and server is request accepter (supplier),

Posted by: noor siddiqui Contact noor siddiqui Contact noor siddiqui If you have the better answer, then send it to us. We will display your answer after the approval.

Rules to Post Answers in CoolInterview.com:There should not be any Spelling Mistakes. There should not be any Gramatical Errors. Answers must not contain any bad words. Answers should not be the repeat of same answer, already approved. Answer should be complete in itself. Name :* Email Id :* Answer :* Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code Process Verification Enter the above shown code:* Inform me about updated answers to this question
What is an ?Intranet??

Answers: The explosion of the World Wide Web is due to the world-wide acceptance of a common transport (TCP/IP), server standard (HTTP), and markup language (HTML). Many corporations have discovered that these same technologies can be used for internal client/server applications with the same ease that they are used on the Internet. Thus was born the concept of the ?Intranet?: the use of Internet technologies for implementing internal client/server applications.<br><br>One key advantage of Webbased intranets is that the problem of managing code on the client is greatly reduced. Assuming a standard browser on the desktop, all changes to user interface and functionality can be done by changing code on the HTTP server. Compare this with the cost of updating client code on 2,000 desktops.<br><br>A second advantage is that if the corporation is already using the Internet, no additional code needs to be licensed or installed on client desktops. To the user, the internal and external information servers appear integrated.<br><br>A rapidly-disappearing disadvantage is that there is limited ability to provide custom coding on the client. In the early days of the Web, there were limited ways of interacting with the client. The Web was essentially ?read-only?. With the release of code tools such as Java and JavaScript, this limitation is no longer a major issue.<br> The explosion of the World Wide Web is due to the world-wide acceptance of a common transport (TCP/IP), server standard (HTTP), and markup language (HTML). Many corporations have discovered that these same technologies can be used for internal client/server applications with the same ease that they are used on the Internet. Thus was born the concept of the ?Intranet?: the use of Internet technologies for implementing internal client/server applications.<br><br>One key advantage of Webbased intranets is that the problem of managing code on the client is greatly reduced. Assuming a standard browser on the desktop, all changes to user interface and functionality can be done by changing code on the HTTP server. Compare this with the cost of updating client code on 2,000 desktops.<br><br>A second advantage is that if the corporation is already using the Internet, no additional code needs to be licensed or installed on client desktops. To the user, the internal and external information servers appear integrated.<br><br>A rapidly-disappearing disadvantage is that there is limited ability to provide custom coding on the client. In the early days of the Web, there were limited ways of interacting with the client. The Web was essentially ?read-only?. With the release of code tools such as Java and JavaScript, this limitation is no longer a major issue.<br>

Posted by: anand sangitray

Contact anand sangitray Contact anand sangitray intranet means it is a privat network use to by the company.its range limited and provide the security to the network.

Posted by: vinod patle Contact vinod patle Contact vinod patle internat is a collection of all type network witch contain all type of information

Posted by: rupendra gola Contact rupendra gola Contact rupendra gola An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences.

Posted by: vijendra Contact vijendra Contact vijendra Intranet is a specified within area network and mentening security to that network.

Posted by: jitendra mishra Contact jitendra mishra Contact jitendra mishra intranet is an mechanism that is used in the small, middle and large organization to connect their system and communicate. By using like this the information of the organization will be more secure

Posted by: sairam Contact sairam Contact sairam If you have the better answer, then send it to us. We will display your answer after the approval. Rules to Post Answers in CoolInterview.com:There should not be any Spelling Mistakes. There should not be any Gramatical Errors. Answers must not contain any bad words. Answers should not be the repeat of same answer, already approved. Answer should be complete in itself. Name :*

Email Id :* Answer :* Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code Process Verification Enter the above shown code:* Inform me about updated answers to this question

What is Distributed Processing?

It is the distribution of applications and business logic across multiple processing platforms. Distributed processing implies that processing will occur on more than one processor in order for a transaction to be completed. In other words, processing is distributed across two or more machines and the processes are most likely not running at the same time, i.e. each process performs part of an application in a sequence. Often the data used in a distributed processing environment is also distributed across platforms.
What is Middleware?

Connectivity allows applications to transparently communicate with other programs or processes, regardless of their location. The key element of connectivity is the network operating system (NOS). NOS provide services such as routing, distribution, messaging, file and print, and network management services. NOS rely on communication protocols to provide specific services. The protocols are divided into three groups: media, transport and client-server protocols. Media protocols determine the type of physical connections used on a network (some examples of media protocols are Ethernet, Token Ring, and Fiber Distributed Data Interface (FDDI), coaxial and twisted-pair). A transport protocol provides the mechanism to move packets of data from client to server (some examples of transport protocols are Novell?s IPX/SPX, Apple?s AppleTalk, Transmission Control Protocol/ Internet Protocol (TCP/IP), Open Systems Interconnection (OSI) and Government Open Systems Interconnection Profile (GOSIP)). Once the physical connection has been established and transport protocols chosen, a client-server protocol is required before the user can access the network services.<br><br>A client-server protocol dictates the manner in which clients request information and services from a server and also how the server replies to that request (some examples of client-server protocols are NetBIOS, RPC, Advanced Program-to-Program Communication (APPC), Named Pipes, Sockets, Transport Level Interface (TLI) and Sequenced Packet Exchange (SPX)).<br> Middleware is a software that connects two otherwise separate applications For example, there are a number of middleware products that link a database system to a Web server This allows users to request data from the database using forms displayed on a Web browser and it enables the Web server to return dynamic Web pages based on the user's requests and profile.
What is Two-Tier Architecture?

Two-tier architecture is where a client talks directly to a server, with no intervening server. It is typically used in small environments (less than 50 users). A common error in client/server development is to prototype and application in a small, two-tier environment, and then scale up by simply adding more users to the server. This approach will usually result in an ineffective system, as the server becomes overwhelmed. To properly scale to hundreds or thousands of users, it is usually necessary to move to three-tier architecture. Two-tier architecture is same as client server architecture.where client send request and server solve this request by oue centralised database.
What is Distributed Processing?

Frequently asked questions about Windows 2000 DNS and Windows Server 2003 DNS SUMMARY

This article describes DNS functionality in Windows 2000 and Windows Server 2003, and provides answers to frequently asked questions about Windows 2000 and Windows Server 2003 DNS. MORE INFORMATION

DNS is the backbone of Active Directory and the primary name resolution mechanism of Windows 2000 and Windows Server 2003. Windows 2000 and Windows Server 2003 domain controllers dynamically register information about themselves and about Active Directory in DNS. Other Windows 2000 and Windows Server 2003 domain controllers, servers, and workstations that are part of the domain query DNS to find Active Directory-related information. If DNS is not set up correctly, domain-wide issues can occur such as replication between domain controllers. You may also be unable to log on to the domain or to join the domain from a workstation or server. Question: What are the common mistakes that are made when administrators set up DNS on network that contains a single Windows 2000 or Windows Server 2003 domain controller? Answer: The most common mistakes are:

The domain controller is not pointing to itself for DNS resolution on all network interfaces. The "." zone exists under forward lookup zones in DNS. Other computers on the local area network (LAN) do not point to the Windows 2000 or Windows Server 2003 DNS server for DNS. Question: Why do I have to point my domain controller to itself for DNS? Answer: The Netlogon service on the domain controller registers a number of records in DNS

that enable other domain controllers and computers to find Active Directory-related information. If the domain controller is pointing to the Internet service provider's (ISP) DNS server, Netlogon does not register the correct records for Active Directory, and errors are generated in Event Viewer. In Windows Server 2003, the recommended DNS configuration is to configure the DNS client settings on all DNS servers to use themselves as their own primary DNS server, and to use a different domain controller in the same domain as their alternative DNS server, preferably another domain controller in the same site. This process also works around the DNS "Island" problem in Windows 2000. You must always configure the DNS client settings on each domain controller's network interface to use the alternative DNS server addresses in addition to the primary DNS server address. For more information about the Windows 2000 DNS "Island" problem, see "Chapter 2 Structural Planning for Branch Office Environments" in the "Planning" section of the Windows 2000 Server Active Directory Branch Office Planning Guide at the following Microsoft Web site:

http://www.microsoft.com/windows2000/techinfo/planning/activedirectory/branchoffice/default .asp Question: What does a domain controller register in DNS? Answer: The Netlogon service registers all the SRV records for that domain controller. These

records are displayed as the _msdcs, _sites, _tcp, and _udp folders in the forward lookup zone that matches your domain name. Other computers look for these records to find Active Directory-related information. Question: Why can't I use WINS for name resolution like it is used in Microsoft Windows NT

4.0? Answer: A Windows 2000 or Windows Server 2003 domain controller does not register Active

Directory-related information with a WINS server; it only registers this information with a DNS server that supports dynamic updates such as a Windows 2000 or Windows Server 2003 DNS server. Other Windows 2000-based and Windows Server 2003-based computers do not query WINS to find Active Directory-related information. Question: If I remove the ISP's DNS server settings from the domain controller, how does it resolve names such as Microsoft.com on the Internet? Answer: As long as the "." zone does not exist under forward lookup zones in DNS, the DNS service uses the root hint servers. The root hint servers are well-known servers on the Internet that help all DNS servers resolve name queries. Question: What is the "." zone in my forward lookup zone? Answer: This setting designates the Windows 2000 or Windows Server 2003 DNS server to be a root hint server and is usually deleted. If you do not delete this setting, you may not be able to perform external name resolution to the root hint servers on the Internet.

For more information, click the following article number to view the article in the Microsoft Knowledge Base: 229840 DNS server's root hints and forwarder pages are unavailable Question: Do I need to configure forwarders in DNS? Answer: No. By default, Windows 2000 DNS uses the root hint servers on the Internet;

however, you can configure forwarders to send DNS queries directly to your ISP's DNS server or other DNS servers. Most of the time, when you configure forwarders, DNS performance and efficiency increases, but this configuration can also introduce a point of failure if the forwarding DNS server is experiencing problems. The root hint server can provide a level of redundancy in exchange for slightly increased DNS traffic on your Internet connection. Windows Server 2003 DNS will query root hints servers if it cannot query the forwarders. Question: Should I point the other Windows 2000-based and Windows Server 2003-based

computers on my LAN to my ISP's DNS servers? Answer: No. If a Windows 2000-based or Windows Server 2003-based server or workstation

does not find the domain controller in DNS, you may experience issues joining the domain or logging on to the domain. A Windows 2000-based or Windows Server 2003-based computer's preferred DNS setting should point to the Windows 2000 or Windows Server 2003 domain controller running DNS. If you are using DHCP, make sure that you view scope option #15 for the correct DNS server settings for your LAN. Question: Do I need to point computers that are running Windows NT 4.0 or Microsoft Windows 95, Microsoft Windows 98, or Microsoft Windows 98 Second Edition to the Windows 2000 or Windows Server 2003 DNS server? Answer: Legacy operating systems continue to use NetBIOS for name resolution to find a domain controller; however it is recommended that you point all computers to the Windows 2000 or Windows Server 2003 DNS server for name resolution. Question: What if my Windows 2000 or Windows Server 2003 DNS server is behind a proxy server or firewall?

Answer: If you are able to query the ISP's DNS servers from behind the proxy server or firewall, Windows 2000 and Windows Server 2003 DNS server is able to query the root hint servers. UDP and TCP Port 53 should be open on the proxy server or firewall. Question: What should I do if the domain controller points to itself for DNS, but the SRV records still do not appear in the zone? Answer: Check for a disjointed namespace, and then run Netdiag.exe /fix. You must install Support Tools from the Windows 2000 Server or Windows Server 2003 CD-ROM to run Netdiag.exe.

For more information about how to check for a disjointed namespace, click the following article number to view the article in the Microsoft Knowledge Base: 257623 The DNS suffix of the computer name of a new domain controller may not match the name of the domain after you install upgrade a Windows NT 4.0 Primary domain controller to Windows 2000 Question: How do I set up DNS for a child domain? Answer: To set up DNS for a child domain, create a delegation record on the parent DNS server for the child DNS server. Create a secondary zone on the child DNS server that transfers the parent zone from the parent DNS server. Note Windows Server 2003 has additional types of zones, such as Stub Zones and forest-level integrated Active Directory zones, that may be a better fit for your environment.

Set the child domain controller to point to itself first. As soon as an additional domain controller is available, set the child domain controller to point to this domain controller in the

You might also like