Monday, February 28, 2011

DHCP relay agent concept

DHCP relay agent is configured to provide ipaddress to different segments of network.

Ex: we have 2 segments and different network IDS.

One connecting to and another card connecting to network. When a client sends a broadcast for ipaddress the relay agent sends it to the DHCP server.

Open RRAS and ip routing, add new protocol, add dhcp relay agent
Add in the dhcp servers ipaddress

To view the DHCP server in a domain and which are authorized

Open command prompt:

netsh dhcp show server

Saturday, February 26, 2011

After 20 years..

If you would like to know how you would look after 20 or 30 years. awesome great.
please download the link below:

To check the directory partitions we have in a forest

Domain management
Domain management :Connections
Server connections: connect to server server01
Domain management: list
Now we will receive list of domain partitions.

What is round robin in DNS?

Round robin: enables us to set multiple records of a given host name. and distributes the ip address in order. 

Create a host name in dns as www. with ipaddress as
Create the same hostname with
Create the same with

When we try to ping the

Reply's as,,

Again ping,,

Again ping,

So the order keeps on changing.

Monday, February 21, 2011

How to view the cached look ups in DNS 2003?

Open the DNS console ---click on view --- select advanced.

Once we select advanced, we will find another entry as cached look ups

Sunday, February 20, 2011

Configuring UNIX DNS client:

Make sure your logged in as ROOT

Bash-2.03$  su
Password: xxxxxxx

Now use a text editor
# vi /etc/resolve.c
Now enter the domain and then name server


We can also use search instead of domain, here we have an option to enter in till 6 domains and sub domains.


Now save the etc/resolve.conf file


How the DNS request process works?

When a DNS client sends a request to a DNS server, the DNS server checks to see if it is authoritative for the zone (domain) in the request or the request has been cached and if so, returns the response

When a DNS server is not authoritative for the specified zone it begins the recursion process.

When the local DNS server cannot server the client DNS request, it sends the request to ROOT server on top, ex: .COM, the root retrieves number .COM domains. From that we chose and are forwarded to recursion server.

           Once the recursion process is finished, the info is cached in local DNS server.

Thursday, February 17, 2011

How to go into recovery console windows 2003?

Run prompt :
\i386\winnt32 /cmdcons

How to resolve Compatibility issues with legacy applications

When a user try's to run old files, they may receive error messages as compatibility issues..

To resolve this:

Right click on the setup.exe file\compatibility\run on xp, 2000, 95 etc

you can chose different OS and try running the file. 
Else you can use Quick Fix Utility Qfixapp.exe, its Application Compatibility toolkit for windows XP. You can download it for free. 

What is NAP?

NAP: network access protection, users must meet the security requirements to log on to the domain, ex: they need have anti-virus up-to date, etc. else the client will be quarantined. untill the computer has these requirements , the user can't log in to the domain.

What is NAC?

NAC—network admission control; NEED only Cisco switches, only application based. Highly secure no virus attached till now.

Windows 2003 File Server Features

Monday, February 14, 2011

Monitoring ESX with HP:

Download the clients file from, according to the hardware model we have.
HP proliant DL 380 g3 server

After downloading we need to , we need to move these files to ESX server, using putty and pscp.

Platespin power converter:
Power convert will take an image of the old servers and puts it on to a new server and modifies the drivers and upgradation is done behind the scenes.

Lost and found folder in AD users and computers:

Suppose we have a 2 domain controllers, if an admin makes changes to one object and if another admin also makes changes to the same object at same time, these changes are stored in the LOST and Found folder.

3 ways to access a shared resource:

1. Run promt: \\srv1\research

2. My networking places

Offline files : suppose if a server containing the share is offline, the client machine should have offline permissions set already, in XP and windows 2000 prof the offline settings are already ther, goto tools, folder peopertiesàoffline settings

3. We can also use the map network drive and the type in the servers, \\srv1\research
On the server right click on the files in the shared folder make it shared folder.

Administrative shared created by default are:


When we create a share we need to provide it with a $ sign, ex: we share a document named as group policy grouppolicy$, so this folder becomes a hidden share, to access this folder go to run prompt and type grouppolicy$

Friday, February 11, 2011

IIS creating web site video download

Easy steps in creating web site using IIS:

Scom 2007 monitors types

Monitor types:

Ø      Unit: monitors a specific item, such as single event or performance counter. These can be used as a basis for roll up monitors.
Ø      Aggregate rollup: monitors a group of monitors with the rollup state being either best or worst of reflection.
Ø      Dependency rolls up: a roll up of other monitors on which the parent monitor is dependent. Example, AD is dependent on DNS , you could alert that AD is having a problem is DNS is not available.
Ø      Static threshold: monitors that watch for specific values and compare the result to predefined values
Ø      Self tuning thresh hold: A mini – AI that watches performance counters in an effort to glean what a normal value should be. Thresh holds are created based on ascertained normal values.

Thursday, February 10, 2011

Scom 2007 monitors and there functions

Monitors: determines health information and make sure items are working within specifications. Raise an alert if not.

Monitor can have up-to 3 status:
1. Success
2. Warning
3. Error

Types of monitors:
Roll up monitors
Aggregate rollup monitors, dependency rollup monitors.

Unit monitors:
SNMP, WMI PERFORMANCE, Log files, windows events, windows services, windows performance counters, scripting, WMI events.

Managing monitors:
Monitor types:

Ø      Unit: monitors a specific item, such as single event or performance counter. These can be used as a basis for roll up monitors.
Ø      Aggregate roll-up: monitors a group of monitors with the roll-up state being either best or worst of reflection.

Sunday, February 6, 2011

IIS virtual directory creation video

Management pack components

Object discovery: management packs contains items necessary to discover managed objects. Discovery can be accomplished with registry , WMI, scripting, OLE DB, LDAP or custom code. If too much is discovered use override to limit the object discovery,

Monitors: which determine health information and make sure items are working within specifications. Raise an alert if no. only state change events are stored in the data warehouse for future reporting.

n      Roll up monitors: aggregate rollup monitors, dependency roll up monitors.
n      Unit monitors: SNMP, WMI performance, log files, windows events, windows services, windows performance counters, scripting, WMI events

Aggregate rollup monitors

is a collection of several other monitors, state can be monitored on either a best – case or worst             case basis.

  • Best case – if any one of the child monitors is healthy, the overall aggregate monitor will show up healthy.
  • Worst case – if any one of the child monitors is not healthy, the overall aggregate monitor will not be healthy.
Dependency roll up monitor: very similar to roll up monitor but more flexible and granular
Example: Will raise an alert if 5 or 8 DNS servers are down.

Rules: a rule is capable of raising an alert to an operator, but the objects included in the rule cannot be monitored for health.

Tasks: like the name implies, an MP task is a method that performs some action based on rules that are defined. Among other actions a task can run a program or script or reset a failed service.

Views: customized look at items that might be unique to a particular management pack.

Knowledge: what caused a particular alert? How was it addressed?

Run as profile: discovering objects, running scripts and gathering information requires credentials that can access the appropriate resource. 
Windows credentials
SNMP community string
Basic authentication
Digest authentication
Binary authentication
Action account

Overrides: is a way by which an operator can customize a sealed management pack.

Saturday, February 5, 2011

HP ILO (Integrated Lights Out)

ILO STANDS for Integrated Lights Out, it comes with almost every HP server. its an interface on back of your HP server, that allows you to connect an Ethernet connection to it and connect it to your network, once its connect you can remotely connect to the server, you had disk or blue screen or anything, but we can still connect to the server with ILO, WE can also power off and power on the server remotely, you can remotely build a server, you can install a new server, with cd rom on your desktop from home are where.

So in practical scenario, we connect one end of network cable to a switch and other end to ilp port behind the HP server

Thursday, February 3, 2011

SCOM 2007 Agentless Monitoring

Monitoring a system without installing agents.. example : we install an agent on a SQL server and that agent will also monitor other system.. this is called proxy agent.

We need to have only 10 agentless managed computers per management server

When we need to make a computer run as proxy agent..

Operations manager console --- administration --- device management --- right click on agent and select properties --- chose security tab and select agent proxy

SCOM 2007 Agent installation

When we can either install agents by discovery wizard or go manually to each computer with the agent setup file and install. If we install manually we can any one having this setup can install it on any system. This would be a security concern. In order to avoid this situation. SCOM admin needs to approve the request of installation.

Once we have installed the agent on server or client machine, it will be in a pending status until approved by admin.

Practice: operations manager console ---- administration --- device management --- pending management. We can see the pending agent install.We need to right click on the computers and select approve.

Wednesday, February 2, 2011

Post installation recommendations SCOM 2007

1. After installing operations manager 2007, wait for a day before doing any other activities

2. Run the operations manager console from another system other then root management server

3. Verify the health of operations manager management group and related components