• Troubleshooting the Active Directory DIT database file using NTDSutil

    While we seldom manually do it, there may be time where one needs to do some fixes during troubleshoots of AD database file - The C:\Windows\NTDS\ntds.dit. DIT stands for Directory Information Tree. Here are some scenarios that one may see:

    1. How do you perform an offline defragmentation of the AD database file? net stop ntds, activate instance ntds (This is provided that you are on a Windows Server version that has restartable AD, else if you are on an earlier version of Windows Server that doesn't support restartable AD such as Windows 2000 Server, reboot it into Directory Service Restore Mode, then goto ntdsutil, File, you will be prompted to File Maintenance prompt, type help and you will notice there are a different sets of commands available in here. Notice that there is a command that says compact to %s where %s refers to the new path of your compacted (defragmented) copy of the ntds.dit. So type compact to k:\ntds, where k:\ntds is the new location you will place the compacted (defragmented) copy of the ntds.dit after defragmentation. You will see a bar showing the defragmentation status until completion. This is a brief process. Then it will prompt you to copy the defragmented copy of the ntds.dit to its existing location, and you need to delete all log files at its existing location. Note that online defrag takes place every 12 hourly depends on Windows Servers versions and releases. Offline defrag, however, can free up space. You need to stop your AD service before doing this or boot into the Directory Service Restore Mode on earlier version of Windows Server running as a DC. 
    2. How do you perform integrity check of your ntds.dit? Assuming in a restartable AD DC, follow the above steps, type ntdsutil, File, integrity, you will see the integrity scan process until completion, after which the tool will prompt you to perform a semantic database analysis. You can follow it.
    3. This leads us to how do you perform a semantic database analysis of the AD database file? Answer: Go to ntdsutil, type semantic database analysis. If this is too long for typing, note that all commands and sub-commands in ntdsutil tool can be typed as abbreviated commands, i.e. semantic database analysis can be typed as sem data analy as long as the command is recognized as un-ambiguous. At the Semantic database analysis prompt, type go or go fixup. It will say Opening DIT database ...done. Summary is written into a log file dsdit.dmp. IDs scanned and records scanned are displayed.
    4. How do you seize the FSMO (Flexible Single Master Operation) roles of your domain when a safe transfers of these roles doesn't work due to permanently shutdown / unavailability of DC holding these roles? Go to ntdsutil, type role. Type help so that you can see a list of specific commands associated with the role prompt. Note that before you can seize a particular FSMO role, you need to make connection to the remaining online DC that you intend to make it the FSMO role holder. In this case, for example, you would typically make connection back to the local machine/DC itself, therefore, type connection, then at the Server connect prompt, type connect to server <DCName in FQDN> i.e. connect to DC2.hello.com this is because all communications between DCs take place via FQDN (Fully Qualified Domain Name) instead f NetBIOS name. Note that for transferring of FSMO roles, you need to make connection. And to make connection, you need to make sure that the DC that you are going to make it the new FSMO role holder has its ADDS service started. Otherwise you will fail in making connection. Assuming that you have your ADDS started (unlike the above ntdsutil, File scenarios), type connection, type connect to server <FQDN>, then a message will pop up saying that you are connected to the target DC with the locally logged on credential. Then type q to quit back to prior prompt, namely FSMO maintenance prompt, type seize <FSMOName> i.e. Seize Infrastructure master, seize naming master (refers to Domain Naming Master), seize PDC (for PDC Emulator), seize RID master, seize schema master, for all the respective FSMO roles that you want to seize. Note that a Role Seizure Confirmation Dialog will appear, confirm it. You will see that it will attempt a safe transfer before seizure. If the transfer is successful, it's done otherwise a seizure will ensue.
    5. How do you reset your DSRM (Directory Service Restore Mode) Administrator password? This is the password we typically assign during the DC promotion process. It is the password logon credential to be used in the event that your AD domain is shutdown, and you need a local credential to logon to the local machine, namely the DC, for troubleshooting purposes, for example, one that is using the NTDSutil tool. To do this, you don't need your ADDS service shutdown. Therefore just type ntdsutil, followed by set dsrm password, then type reset password on server localhost (Note that ocalhost is accepted). It will put you at the password reset prompt now. Type your desired password. Note that you will need to comply with the existing password policy requirements in your domain, namely the password complexity policy. Let say you type Pa$$w0rd and it is accepted, the tool will note that you with a password successfully set message.
    6. How do you create installation media for writable and read-only domain controllers that run Windows Server 2008? Answer: Type ntdsutil, activate instance ntds, then type ifm. At the ifm prompt, you will have options to create IFM media for full AD DC or AD/LDS instance with or without defragmenting; you can also create IFM media for RODC (Read-only domain controller). At the same time, you can create IFM media with Sysvol for full AD DC with or without defragmenting into a folder.
    7. How do you cleanup server metadata? On a DC, type ntdsutil, type metadata cleanup. The couple of options that you have are: Remove AD DS objects for selected domain, Remove objects for selected naming context, Remove objects for selected servers. You can choose to select operation target in here. Metadata cleanup removes data from Active Directory that identifies a domain controller to the replication system. This procedure is required only for Active Directory domain controllers that were not successfully demoted using Dcpromo. On a DC that is running Windows Server 2003 with SP1, metadata cleanup also removes File replication service (FRS) connections and attempts to transfer or seize any operations master roles that the retired domain controller holds.
    8. Other configurable options in the NTDSutil tool on Windows Server 2012 are:
    • Authoritative restore of the DIT database
    • Change of AD DS/LDS Service Accounts
    • Configurable settings management
    • AD DS/LDS behavior
    • Group membership evaluation
    • Evaluating SIDs in token for a given user or group
    • LDAP protocol policies
    • Configuration of LDAP Port for an AD LDS instance
    • Local RODC role management
    • Directory partitions management
    • Security account management - Duplicate SID cleanup
    • Snapshot management
    • SSL Port configuration for a AD LDS instance

    Common question (Which doesn't need NTDSutil tool): How do you undefined the AD domain password policy i.e. Maximum password length, Minimum password age, Enforce password history? Set the threshold to 0 for each of these i.e. Maximum password length, Minimum password age, Enforce password history undefines them.

    Ken Sim, Technical Evangelist, Microsoft Corporation, MCT

  • Hyper-V Basics: Getting Started with Microsoft Virtualization solutions

    It’s IT Time and in this Blain Barton exclusive, we’re going over the basics of Hyper-V and showing how you can get started with Microsoft Virtualization solutions. Tune in as he previews his “Fab 14 for Hyper-V” screencast series, a short step-by-step video series filled with tips and tricks for the virtualization newbie.

    Click here to watch the “Fab14 for Hyper-V” screencast series.

    Virtual Labs

    Additional resources

     

     

  • Windows Server 2012's Hyper-V's Competitive Advantages in its Virtualization Compete Approaches

    The Virtualization scenarios are getting more and more excited everyday as more hypervisor enthusiasts are joining the conversation. That said, Microsoft System Center 2012's capability of supporting 3rd party hypervisors in terms of Virtualization platform definitely gives System Center 2012 a thumbs-up.

    In this context, Microsoft has done a couple of great and strong improvements in its latest Hyper-V release in Windows Server 2012:

    Hyper-V in Windows Server 2012 supports Live Storage Migration, where it allows the moving of just the virtual hard disk (VHDX being the new file format introduced) itself during migration and this could happen in the live scenarios.

    Hyper-V over SMB. SMB 3 is in there in Windows Server 2012. The first step to enable Hyper-V over SMB is to enable delegation on the computer account of the Hyper-V server and then reboot the computer. The Hyper-V computer accounts must be given permission to shares, and this is made easier by adding them to a group. A file share which is normally set up as a scale out file server share for holding server data such as Hyper-V virtual machines. The Hyper-V-Servers group has full control, which is a requirement for Hyper-V over SMB. In Windows Server 2012's Hyper-V, you can create new virtual machines from a VHD running on an SMB file share, and this share can even be clustered. This is what makes Hyper-V in its 2012 release a strong edge overs its counterparts.

    Moving onto disaster recovery, Microsoft has made Windows Server 2012's Hyper-V readily supporting Hyper-V replica. To support this, the Hyper-V hosts need to be replication-enabled. The replication can take place via LAN and WAN, using HTTP as well as HTTPS authentication. WAN replication would use alternate settings such as certificate authentication and perhaps sending the initial replica via media (This is just a few minutes process given on a typical WAN speed).

    You can configure an alternate IP to be injected into the replica VM. IP address injection allows you to replicate a VM to a separate subnet or site and pre-configure the replica server to start under a different IP address, local to that subnet or site. This is done using IP Address Virtualization in Windows Server 2012. Hyper-V replica supports both planned failover as well as unplanned failover. Note that the replica direction is reversed after it has taken place. An unplanned failover allows you to start the replica server from the last replication point.

    In terms if storage and migration, what impossible in existing Virtualization world is made possible through the use of Shared Nothing Live Migration. Prior to this, we need a shared infrastructure in between 2 hosts in order to perform live migration. This shared infrastructure can be costly on a typical SAN storage. Through the use of Windows Server 2012's new SMB share and storage technology, we can live migrate VMs without any dedicated shared infrastructure in between, eliminating the use of expensive SAN hardware and storage, making the live migration a much less expensive and more financially feasible over more supported scenarios.

    You can also setup clustering without an expensive SAN hardware storage now, but instead, you can just use JBOD (Just-a-Bunch-of-Disks) to set up your SMB 3 cluster. This significantly lower down the expensive cluster SAN hardware storage costs and making clustering a much more financially feasible availability and deployment for more customers and businesses, ranging from SMB (Small Medium Business-es) to large business-es. In doing this, you would need to first, install the Failover Clustering on each cluster node followed by creating clusters on it.

    The cluster will have no local storage since all storage will be provided by scale-out File Servers.  This allows the creation of a cluster using only traditional Ethernet, and without SAN based shared storage, making clustering a financially feasible technology to more customers, supporting a wider range of storage users in this perspective. SMB clusters use file shares as the witness disk.  Setting a custom quorum to a file share provides the appropriate configuration for this cluster.  This can also be done in PowerShell as well as via the graphical UI (User interface). You can now move any running VMs which need to be clustered to an SMB share that is accessible by both cluster nodes. In Windows Server 2012, you can cluster any running VMs without needing to power off the VM, which is an improvement from its predecessor version. This enables running VMs to e joined to clusters, or moved between clusters for ease of management and maintenance.

    Last but not least, in terms of QoS (Quality of Service), Microsoft has also improved on its Hyper-V in the Windows Server 2012. You can define limits on the Bandwidth Management section in Hyper-V Manager in Windows Server 2012 by supplying a minimum guaranteed bandwidth and a maximum total bandwidth. During the transfer of any large file in this case, during live migration or live storage migration for examples, you can define your own bandwidth consumption in a VM which you can throttle with QoS. You can set the maximum bandwidth according to your bandwidth availability, and this can be done via graphical UI as well as PowerShell. With the availability of PowerShell, you can even build more robust automation scripts which can be used in conjunction with System Center 2012 Orchestrator for the most optimized bandwidth consumption in terms of QoS. With more bandwidth slowly becomes available, you can then throttle again to remove any bandwidth restriction.

    To try this live in action, you can look at the Hyper-V labs in here http://technet.microsoft.com/en-us/windowsserver/hh968267.aspx.

    For System Center 2012 labs, go to http://technet.microsoft.com/en-us/evalcenter/hh913622.aspx.

    For more self-guided learning resources, visit https://www.microsoftvirtualacademy.com/

    To download a Windows Server 2012 Evaluation, go to http://technet.microsoft.com/en-us/evalcenter/hh670538.aspx

    To download System Center 2012 SP1 Beta, goto http://www.microsoft.com/en-us/download/details.aspx?id=34607

    Related resources

    Ken Sim, Technical Evangelist, Microsoft Corporation - Windows Server 2012, System Center 2012 and Hyper-V

     

     

     

     

      

     

       

     

     

     

     

  • Configuring and Deploying a Private Cloud with System Center 2012

    With Microsoft System Center 2012, datacenter administrators can

    • Produce a high-level design that accounts for requirements for the private cloud environment.
    • Configure and deploy the application fabric.
    • Configure a PXE server, an update server, and a software update baseline
    • Configure Microsoft Server Application Virtualization (App-V) so that it can be used to sequence and deploy an application virtually.
    • Build the core components necessary for delivering services on the fabric.
    • Allocate resources to the private cloud and grant access to the private cloud.
    • Understand how to monitor the private cloud using Operations Manager.
    • Understand the tools necessary to extend and customize Operations Manager for a private cloud environment.
    • Set up, configure, and integrate the core components of Service Manager into the private cloud fabric.
    • Configure a service catalog, and then publish it to the Self-Service Portal.
    • Gain the knowledge necessary to deploy and configure DPM in a private cloud.
    • Deploy and configure Microsoft System Center 2012 - Orchestrator in a private cloud, and then integrate it with other System Center 2012 components.

    You can integrate features provided by Windows Deployment Services (WDS) and Windows Server Update Services (WSUS) to help extend and manage the VMM private cloud infrastructure resources. With this, you can integrate VMM with WDS and WSUS to provide PXE and Update server roles, deploy bare-metal Hyper-V host servers, maintain updates within the VMM infrastructure, configure the Update server role and finally, create and use a software update compliance baseline.

    You can use the Microsoft Web Deployment Tool and Server App-V to dynamically deploy applications in the private cloud. The process involves configuring the Server App-V Sequencer, configuring the Server App-V Agent, sequencing an application and finally, testing the Server App-V package deployment.

    In creating the Private Cloud building blocks, you need to prepare and deploy the underlying infrastructure components that are used as building blocks for delivering private cloud services. The process involves configuring a Guest operating system profile, configuring hardware profiles, configuring your SQL Server, configuring application profiles, configuring virtual machine templates and configuring the self-service user role.

    You can monitor the private cloud infrastructure by using System Center 2012Operations Manager. The process involves deploying agents, deploying and configuring monitoring Management Packs (MP), configuring notifications, configuring VMM Integration and configuring DPM integration. You may consider upgrading from Operations Manager 2007 R2 to System Center 2012 Operations Manager so as to benefit from the various new capabilities in this new release. There are various notification options available in Operations Manager.

    When it comes to Extending and Customizing Monitoring of the Private Cloud Infrastructure, you can use Operations Manager templates to monitor various applications and implement distributed application monitoring in your environment. This involves creating custom monitoring, creating a distributed application, configuring Service Level management, creating views for Private Cloud infrastructure and configuring SharePoint integration.

    In terms of service management for the Private Cloud, you can integrate the core components of System Center 2012 Service Manager into your private cloud infrastructure. The process involves configuring Service Manager basic settings, configuring Service Manager connectors, configuring the Self-Service Portal and configuring Notifications. For existing Service Manager 2010 R2 users, you can consider upgrading to System Center 2012 Service Manager so as to benefit from the various upgraded capabilities in this new release.

    In the context of protecting your Private Cloud infrastructure, it is a process which consists of the following steps – Configuring the storage pool, deploying DPM protection agents, creating and configuring protection groups, configuring SQL Server self-service recovery, restoring data from a SQL Server protection group and performing self-service recovery to recover your SQL Server data.

    There is a video which showcases more details on Configuring and Deploying a Private Cloud with System Center 2012 in here http://technet.microsoft.com/en-us/video/Video/hh851735.

    Related resources

  • MCITP: Virtualization Administrator on Windows Server 2008 R2

    The MCITP: Virtualization Administrator on Windows Server 2008 R2 http://www.microsoft.com/learning/en/us/mcitp-certification.aspx certifies one's expertise on Microsoft Virtualization using Hyper-V R2 on Windows Server 2008 R2. It comprises 2 parts: The Desktop Virtualization and Server Virtualization exams as well as the expertise on administration of Virtualization solution using Microsoft Hypervisor technology.

    3 exams that make up this certification are:

    Exam 70-669 Windows Server 2008 R2, Desktop Virtualization, http://www.microsoft.com/learning/en/us/exam.aspx?ID=70-669, with the following skills being measured:

    • Deploying and Managing an Enterprise Desktop Virtualization Environment
    • Deploying and Managing a Presentation Virtualization Environment
    • Deploying and Managing an Application Virtualization (App-V) Environment
    • Managing a Virtual Desktop Infrastructure Environment

    Some good learning resources for this exam are MOC (Microsoft Official Curriculum) Course  10324A: Implementing and Managing Microsoft Desktop Virtualization (5 Days) and a Microsoft E-Learning Course 10324AE: Implementing and Managing Microsoft Desktop Virtualization (15 Hours)

    Exam 70-693 Windows Server 2008 R2, Virtualization Administrator, http://www.microsoft.com/learning/en/us/exam.aspx?ID=70-693, with the following skills being measured:

    • Designing a Virtualization Strategy
    • Designing the Physical and Virtual Infrastructure
    • Designing a Highly Available Virtual Environment
    • Designing a Deployment Strategy
    • Designing a Management Strategy

    Exam 70-659 Windows Server 2008 R2, Server Virtualization, http://www.microsoft.com/learning/en/us/exam.aspx?ID=70-659, with the following skills being measured:

    • Installing and Configuring Host and Parent Settings
    • Configuring Child Settings
    • Managing and Monitoring Virtual Environments
    • Ensuring High Availability and Recoverability
    • Performing Migration
    • Configuring Remote Desktop (RD) Role Services Infrastructure

    Official MOC learning and course topics for this exam is Course 10215A: Implementing and Managing Microsoft Server Virtualization (5 Days). There is also a Microsoft E-Learning course 10215AE: Implementing and Managing Microsoft Server Virtualization (15 Hours) on it.

    Alternately, candidate can take Exam 70-652 Windows Server Virtualization, Configuring in place of 70-659, which has the following skills to be  measured:

    • Installing Hyper-V
    • Configuring and Optimizing Hyper-V
    • Deploying Virtual Machines
    • Managing and Monitoring Virtual Machines

    There is a Microsoft E-Learning course for this exam named COurse 6319BE: Configuring Hyper-V in Windows Server 2008 (10 Hours), and MCTS Self-Paced Training Kit (Exam 70-652): Configuring Windows Server Virtualization is a good book for this exam.

    Additional resources:

    Ken Sim, Technical Evangelist, Microsoft Corporation

    Microsoft Virtualization, Private Cloud & Windows Server 2012

    MCT, MCITP (Enterprise Administrator), MCITP Virtualization Administrator, MCTS (Desktop Virtualization), MCTS (Server Virtualization), MCSE Private Cloud (System Center 2012), MCSE Server Infrastructure (Windows Server 2012), MCSE Desktop Infrastructure