You are on page 1of 4

Colegio de San Juan de Letran Calamba

School of Computer Studies and Technology School Year 2011-2012

FREE ELECTIVE III

Submitted By:
Fortus, Marjorie Grace P. 3CS

Submitted To:
Mrs. Mary Grace Olivar

1. Can you raise the domain functional level to Windows Server 2008 when your Microsoft Exchange server is still running Windows Server 2003? 2. Can you raise the domain functional level of a domain to Windows Server 2008 when other domains contain domain controllers running Windows Server 2003? 3. If you have a site with 50 subnets, each with a subnet address of 10.0.x.0/24, and you have no other 10.0.x.0 subnets, what could you do to make it easier to identify the 50 subnets and associate them with a site?

4. Why is it important that all subnets are identified and associated with a site in a multisite enterprise? A subnet mask allows users to identify which part of an IP address is reserved for the network and which part is available for host use. By looking at the IP address alone, especially now with classless inter-domain routing, users cannot tell which part of the address is which. Adding the subnet mask or netmask gives users all the information needed to calculate network and host portions of the address with ease. In summary, knowing the subnet mask can allow users to easily calculate whether IP addresses are on the same subnet or not. 5. Describe the relationship between the records you viewed in ADSI Edit and the records you viewed in DNS Manager. DNS manager add, modify and remove DNS records for your domain name. You also have the option to add and manage DNS information for your additional domain names and domain name pointers and ADSI Edit (Adsiedit.msc) is an MMC snap-in. You can add the snap-in to any .msc file through the Add/Remove Snap-in menu option in MMC, or just open the Adsiedit.msc file from Windows Explorer. The following figure illustrates the ADSI Edit interface. In the console tree on the left, you can see the major partitions Domain, Configuration, and Schema. The figure shows the Built in container of the Contoso.com domain selected. In the details pane on the right, you can see the Built in groups of Active Directory. 6. In what other situations might it be useful to mount a snapshot of Active Directory? Windows Server 2008 has a new feature allowing administrators to create snapshots of the Active Directory database for offline use. With AD snapshots you can mount a backup of AD DS under a different set of ports and have read-only access to your backups through LDAP. There are quite a few scenarios for using AD snapshots. For example, if someone has changed properties of AD objects and you need to revert to their previous values, you can mount a copy of a previous snapshot to an alternate port and easily export the required attributes for every object that was changed. These values can then be imported into the running instance of AD DS. You can also restore deleted objects or simply view objects for diagnostic purposes. AD snapshots, when mounted and connected to, allow you to see how the AD Database looked like at the moment of the snapshot creation, what objects existed

and other type of information. It does not allow you to move or copy items or information from the snapshot to the live database. In order to do that you will need to manually export the relevant objects or attributes from the snapshot, and manually import them back to the live AD database. The process is listed out as 1. creating a snapshot, 2. mounting it, 3. connecting to it, 4. disconnecting, 5. unmounting and 6. deleting it. In any case it's a lot better than the alternative taking down the DC, rebooting into DSRM, restoring the System State from a backup, and then exporting the attributes. 7. In what situations do you currently use, or can you envision using, event subscriptions as a monitoring tool? The subscription specifies exactly which events will be collected and in which log they will be stored locally. Once a subscription is active and events are being collected, you can view and manipulate these forwarded events as you would any other locally stored events. Using the event collecting feature requires that you configure both the forwarding and the collecting computers. The functionality depends on the Windows Remote Management (WinRM) service and the Windows Event Collector (Wecsvc) service. Both of these services must be running on computers participating in the forwarding and collecting process. 8. To what events or performance counters would you consider attaching e-mail notifications or actions? Do you use notifications or actions currently in your enterprise monitoring? Enterprise Manager supports these various notification mechanisms via notification methods. A notification method is used to specify the particulars associated with a specific notification mechanism, for example, which SMTP gateway(s) to use for e-mail, which OS script to run to log trouble-tickets, and so on. Super Administrators perform a one-time setup of the various types of notification methods available for use. Once defined, other administrators can create notification rules that specify the set of criteria that determines when a notification should be sent and how it should be sent. The criteria defined in notification rules include the targets, metrics and severity states (clear, warning or critical) and the notification method that should be used when an alert occurs that matches the criteria. For example, you can define a notification rule that specifies e-mail should be sent to you when CPU Utilization on any host target is at critical severity, or another notification rule that creates a trouble-ticket when any database is down. Once a notification rule is defined, it can be made public for sharing across administrators. For example, administrators can subscribe to the same rule if they are interested in receiving alerts for the same criteria defined in the rule. Alternatively, an Enterprise Manager Super Administrator can assign notification rules to other administrators such that they receive notifications for alerts as defined in the rule. Notifications are not limited to alerting administrators. Notification methods can be extended to execute any custom OS script or PL/SQL procedure, and thus can

be used to automate any type of alert handling. For example, administrators can define notification methods that call into a trouble ticketing system, invoke thirdparty APIs to share alert information with other monitoring systems, or log a bug against a product. 9. What are the advantages of reducing the intersite replication interval? What are the disadvantages? Intersite replication occurs between replication partners in two different sites. Active Directory preserves bandwidth between sites by minimizing the frequency of replication and by allowing you to schedule the availability of site links for replication. By default, intersite replication across each site link occurs every 180 minutes that is 3 hours. You can modify this replication interval, and it can be brought down till 15 minutes. But its always recommended to keep the default interval because the intersite replication occurs between low speed WAN links, hence reducing the replication interval could cause high network traffic and latency. Replication offers many advantages. For instance, replication lets mail administrators manage the entire Exchange organization from one seat (if they have access permissions). Replication lets clients see each user's email address (and other information, such as phone numbers) in the Global Address List (GAL). And replication lets each server know about the objects on other servers so a server can use those remote resources (e.g., connectors). This capability doesn't come without a cost. Directory replication consumes network bandwidth, which can become an issue if you replicate large amounts of directory data or if replication occurs often.

You might also like