Admin-Tools Für Windows-Netzwerke - Das Praxisbuch

Total Page:16

File Type:pdf, Size:1020Kb

Admin-Tools Für Windows-Netzwerke - Das Praxisbuch Thomas Joos Admin-Tools für Windows-Netzwerke - Das Praxisbuch Microsoft Inhaltsverzeichnis Vorwort 15 1 Tools für Windows Server 2003 17 Standard-Tools und Bordmittel 18 Bordmittel - Standard-Tools 18 Windows Support-Tools 18 Windows Server 2003 Resource Kit 20 Tools für Sicherheit, Reporting, Diagnose und Überwachung 30 WSUS aufräumen und nicht mehr benötigte Updatedateien löschen - Das WSUS Server Diagnostic Tool 30 Microsoft Product Support's Reporting Tools (MPSReports) 31 Microsoft Baseline Security Analyzer (MBSA) 32 RPC-Ping 34 Server Performance Advisor 36 Port Reporter und Port Reporter Parser 38 Datei-Serververwaltung in Windows Server 2003 R2 42 Ressourcen-Manager für Dateiserver 44 Kontingentverwaltung mit dem FSRM 44 Dateiprüfungsverwaltung in FSRM 46 Speicherberichteverwaltung in FSRM 46 Dateiserver-Migrationstoolkit 47 Verwenden von Schattenkopien und des Schattenkopieclients 50 Der Schattenkopieclient 52 Anzeigen und Verwalten aller Freigaben auf Servern und Arbeitsstationen 53 Anzeigen der geöffneten Dateien in der Befehlszeile - openfiles.exe 53 Cipher.exe - Verschlüsseln von Dateien in der Befehlszeile 55 Robocopy - Robust File Copy Utility 55 Befehlszeilenreferenz von Robocopy 55 Anmerkungen zum Umgang mit Robocopy 58 Grafische Oberflächen für Robocopy - CopyRite XP und Robocopy GUI 59 Verwenden von XCOPY.EXE 61 Die Print Management Console (PMC) und der Microsoft Print Migrator (MPM) ... 62 Drucker migrieren mit dem Microsoft Print Migrator 3.1 62 Tools für Internet Information Services (IIS) 64 Internet Information Services (IIS) Resource Kit Tools 64 IIS Diagnostics Toolkit 67 Internet Information Services (IIS) 6.0 Manager für Windows XP 71 Web Application Stress Tool 71 XML-Notepad 72 6 Inhaltsverzeichnis Tools für Terminalserver 73 Change Logon - Anmeldungen aktivieren oder deaktivieren 74 Query - Prozessinformationen auf Terminalservern 74 Reset - Terminalsitzungen zurücksetzen 75 TSCON und TSDISCON - Abmelden und Anmelden von Terminalsitzungen 75 TSCON 75 TSDISCON 75 TSKILL - Prozesse auf Terminalservern beenden 76 TSSHUTDN - Herunterfahren von Terminalservern 77 Überprüfen eines Lizenzservers auf dem Terminalserver 78 Terminal Server License Tool 79 Remotedesktopverbindung (RDC) - Client 79 RDP-Verbindungsaufbau zur Konsole 80 Terminal Services - Web Client 80 Weitere nützliche Bordmittel-Tools 81 Herunterfahren von Servern und Arbeitsstationen mit Shutdown.exe 81 Manuelles Erstellen von IP-Routen - route.exe 82 Security Configuration Wizard (SCW) und scwcmd.exe 83 SCW mit Exchange Server 2007 oder ISA Server 2006 84 Erstellen einer Sicherheitsrichtlinie 85 Verwenden von scwcmd.exe 91 Windows Rights Management Services (Windows-Rechteverwaltung) 92 Windows System Resource Manager (WSRM) 94 Virtual Server 2005 Migration Toolkit (VSMT) 94 Windows Deployment Services (WDS) und Automated Deployment Services (ADS) 96 Installation der WDS 98 Konfigurieren und Verwalten der WDS 100 Installieren von Test-PCs für WDS mit Virtual PC 2007 102 2 Tools für die Verwaltung von Active Directory 107 Active Directory-Diagnose mit den Windows Support Tools 108 Verwenden von dcdiag.exe 109 Netzwerkdiagnose - netdiag.exe 111 Überprüfen der Domänencontroller-Liste mit nltest.exe 113 Domänenkonto der Domänencontroller überprüfen mit net account 114 Wiederherstellen der DNS-Einträge von Active Directory mit netdiag.exe 114 Probleme von Kerberos mit dcdiag.exe und netdom.exe beheben 116 Active Directory Performance Testing Tool (ADTest.exe) 118 File Replication Service Diagnostics Tool (FRSDiag.exe) 119 Sonar.exe: File Replication Service (FRS) Status Viewer 121 Ultrasound - Monitoring and Troubleshooting Tool for File Replication Service (FRS) 121 Active Directory mit der Befehlszeile verwalten 122 Einleitung: Aufbau des eindeutigen Namens im Active Directory 122 DSADD - Erstellen und Verwalten eines neuen Benutzerkontos oder einer neuen Gruppe 124 dsadd Computer 125 dsadd contact 126 Inhaltsverzeichnis ' dsadd group 126 dsadd ou 126 dsadd user 126 DSMOD - Ändern von Objekten 128 dsmod Server 129 DSRM - Löschen von Objekten 130 Dsquery - Active Directory von der Befehlszeile abfragen 130 dsquery Computer 131 dsquery Server 132 Dsmove - Verschieben von Objekten in Active Directory 133 Dsget - Abrufen einzelner Objekte aus dem Active Directory 134 LDP, LDIFDE, CSVDE - Daten aus Active Directory exportieren 136 Mit LDIFDE exportieren 136 Verwalten von Vertrauensstellungen mit netdom.exe 139 Fehler bei der Active Directory-Replikation beheben - repadmin.exe und replmon.exe und Co 142 Replikationsprobleme mit repadmin finden 142 Der Active Directory Replication Monitor 143 Anzeigen von Replikationsfehlern in einer Domäne mit dem Active Directory Replication Monitor 145 Fehlersuche mit dem Zusatztool Port Query 147 Fehlerquellen bei der Active Directory-Replikation über Firewalls 148 DSASTAT - Abgleichen von Domänencontrollern 149 Befehlszeilen-Tools für DNS 150 Nslookup.exe zur Fehlerbehebung und Diagnose von DNS 151 Diagnose der Namensauflösung über DNS mit nslookup an einem Beispiel für fortgeschrittene Benutzer 153 Nslookup.exe zur Auflösung von Internetdomänen verwenden 154 Ausführlichere Informationen mit nslookup abfragen 154 Nslookup zur Auflösung von ganzen Domänen verwenden 155 Mit Nslookup SRV-Records oder MX-Records anzeigen 156 Komplette Zonen mit nslookup übertragen 156 Mit nslookup die SRV-Records von Active Directory überprüfen 158 IPconfig für DNS-Diagnose verwenden 158 Ipconfig /flushdns zum Löschen des lokalen DNS-Caches 159 Ipconfig /registerdns 159 DNScmd.exe zur Verwaltung eines DNS-Servers in der Befehlszeile 161 MX-Abfragen über Firewalls per DNS funktionieren nicht 161 Active Directory-integrierte DNS-Zone in Textdatei exportieren 162 Probleme bei der Replikation durch fehlerhafte DNS-Konfiguration - DNSLint.exe 163 Active Directory-Datensicherung mit ntbackup.exe und ntdsutil.exe 167 Einrichtung der Active Directory-Sicherung mit ntbackup.exe 167 Empfehlungen zur Datensicherung 170 Wiederherstellen von Daten aus der Datensicherung mit ntbackup.exe und ntdsutil.exe 170 Bereinigung von Active Directory mit ntdsutil.exe 172 Inhaltsverzeichnis Vorbereitungen beim Entfernen eines Domänencontrollers 172 Bereinigen der Daten mit ntdsutil.exe 173 Nacharbeiten der Bereinigung 175 Abschließen der Bereinigung über ADSI Edit 175 Verwalten der FSMO-Rollen mit DSQuery.exe, netdom.exe und ntdsutil.exe 177 Überprüfen des RID-Pools eines Domänencontrollers mit dcdiag.exe 179 Empfohlene Verteilung der FSMO-Rollen 180 Verschieben der FSMO-Rollen mit ntdsutil.exe 181 Übertragen der Rollen, wenn der FSMO-Master noch aktiv ist 182 Anpassen des Kennwortes für die Wiederherstellung mit ntdsutil.exe 183 Verschieben und Verwalten der Datenbank von Active Directory mit ntdsutil.exe .... 183 Offline-Defragmentation der Active Directory-Datenbank 185 Reparieren der Active Directory-Datenbank 186 Domain Rename Tools 187 Sicherung der aktuellen Gesamtstruktur 191 Erstellen des neuen Aufbaus der Gesamtstruktur 192 Erstellen der Skripts für die Umstrukturierung 194 Verteilen der Änderungen auf die Domänencontroller der Gesamtstruktur 195 Überprüfen der Active Directory-Datenbank für die Umstrukturierung 195 Durchführung der Umstrukturierung 196 Troubleshooting der Umbenennung 198 Domänen mit Exchange Server 2003 umbenennen 198 Erstellen des LDF-Skripts für die Anpassung von Exchange Server 2003 an die Umbenennung 199 Überprüfen der Anpassung 200 Notwendige Nacharbeiten der Umstrukturierung von Domänen 202 Anpassen der Gruppenrichtlinien 203 Neustarten aller Mitgliedsserver und Arbeitsstationen 204 Bereinigen von Active Directory 205 Umbenennen der Domänencontroller 205 Exchange Server nach der Umbenennung von Domänencontrollern konfigurieren 208 Tools für die Benutzer-, Computer- und Profilverwaltung im Active Directory 208 Installieren aller Verwaltungsprogramme und Delegieren von Aufgaben - adminpak.msi 208 Erstellen einer angepassten Managementkonsole (MMC) 209 ADModify.NET - mehrere Benutzerkonten anpassen 210 Acctinfo.dll - Active Directory-Benutzer und -Computer erweitern 212 User Profile Deletion Utility (Delprof.exe) 213 User Profile Hive Cleanup Service (UPH-Clean) 214 Remote Control Add-On für Active Directory-Benutzer und -Computer 215 Verwalten von Gruppenrichtlinien: Die Gruppenrichtlinienverwaltungskonsole und andere Tools 215 Konfiguration der GPMC 216 Erstellen von neuen Gruppenrichtlinien mit der GPMC 217 Gruppenrichtlinien erzwingen und Priorität erhöhen 221 Vererbung für Gruppenrichtlinien deaktivieren 223 Inhaltsverzeichnis | •mmmimmi^i Datensicherung von Gruppenrichtlinien in der GPMC 224 Kopieren von Gruppenrichtlinien 226 Importieren von Gruppenrichtlinien in eine neue Gruppenrichtlinie 227 Gruppenrichtlinienmodellierung mit der GPMC 228 Fehlerbehebung und Tools für den Einsatz von Gruppenrichtlinien 229 Group Policy Verification Tool - gpotool.exe 230 Group Policy Inventory 231 Migration von Active Directory zu Windows Server 2003 R2 232 Mögliche Vorgehensweise bei der Migration zu Windows Server 2003 (SPl oder R2) . 232 Migration mit dem Active Directory Migration Tool (ADMT) 3.0 234 Paralleler Aufbau eines neuen Active Directory 235 Namensauflösung zwischen den Domänen sicherstellen 235 Vertrauensstellungen zwischen beteiligten Domänen einrichten 236 ADMT 3 - Installation und Einführung 240 Migration von Benutzerkonten mit ADMT 242 Migrieren von Kennwörtern mit ADMT 3.0 248 Kennwortrichtlinien deaktivieren für die Migration 248 Notwendige Gruppenrichtlinien für die Übernahme der Kennwörter aus der Quelldomäne
Recommended publications
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • What Is Active Directory
    What is Active Directory Originally created in the year 1996, Active Directory, also referred as an AD, was first used with Windows 2000 Server as a directory service for Windows domain networks. Active Directory is a special purpose database, which serves as a central location for authenticating and authorizing all the users and computers within a network. Active Directory uses the Lightweight Directory Access Protocol (LDAP), an application protocol used for accessing and maintaining directory information services distributed over an IP network. What is Active Directory? The basic internal structure of the Active Directory consists of a hierarchical arrangement of Objects which can be categorized broadly into resources and security principles. Some of the examples of Active Directory objects are users, computers, groups, sites, services, printers, etc. Every Object is considered as a single entity with some specific set of attributes. The attributes of Objects along with the kind of objects that can be stored in the AD are defined by a Schema. The intrinsic framework of Active Directory is divided into a number of levels on the basis of visibility of objects. An AD network can be organized in four types of container structure namely, Forest, Domains, Organizational Units and Sites. y Forests: It is a collection of AD objects, their attributes and set of attribute syntax. y Domain: Domain is a collection of computers objects in the AD which share a common set of policies, a name and a database of their members. y Organizational Units: OUs are containers in which domains are grouped. They are used to create a hierarchy for the domain to resemble the structure of the Active Directory's company in organizational terms.
    [Show full text]
  • Cygwin User's Guide
    Cygwin User’s Guide i Cygwin User’s Guide Cygwin User’s Guide ii Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012 Red Hat, Inc. Permission is granted to make and distribute verbatim copies of this documentation provided the copyright notice and this per- mission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this documentation under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this documentation into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Cygwin User’s Guide iii Contents 1 Cygwin Overview 1 1.1 What is it? . .1 1.2 Quick Start Guide for those more experienced with Windows . .1 1.3 Quick Start Guide for those more experienced with UNIX . .1 1.4 Are the Cygwin tools free software? . .2 1.5 A brief history of the Cygwin project . .2 1.6 Highlights of Cygwin Functionality . .3 1.6.1 Introduction . .3 1.6.2 Permissions and Security . .3 1.6.3 File Access . .3 1.6.4 Text Mode vs. Binary Mode . .4 1.6.5 ANSI C Library . .5 1.6.6 Process Creation . .5 1.6.6.1 Problems with process creation . .5 1.6.7 Signals . .6 1.6.8 Sockets . .6 1.6.9 Select .
    [Show full text]
  • Netiq Securelogin Installation Guide 9 Installing, Configuring, and Deploying Desktop Automation Services 67 9.1 Installing Desktop Automation Services
    Installation Guide SecureLogin 8.0 October, 2013 www.netiq.com/documentation Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • Netwrix Active Directory Change Reporter Version 6 Freeware and Standard Editions Quick Start Guide
    NetWrix Active Directory Change Reporter Version 6 Freeware and Standard Editions Quick Start Guide _______________________ NetWrix Active Directory Change Reporter User Guide Contents 1. INTRODUCTION ........................................................................................................................................................ 3 1.1 KEY FEATURES .................................................................................................................................................................... 3 1.2 LICENSING .......................................................................................................................................................................... 4 1.3 HOW IT WORKS .................................................................................................................................................................. 5 2. GETTING STARTED .................................................................................................................................................... 7 2.1 SYSTEM REQUIREMENTS ....................................................................................................................................................... 7 2.2 CONFIGURING ACTIVE DIRECTORY CHANGES AUDITING USING AUDIT CONFIGURATION WIZARD ........................................................ 9 2.3 INSTALLATION ..................................................................................................................................................................
    [Show full text]
  • Rsview SE V4.0 CPR7+ Distributed System Design Considerations (Rev
    RSView SE V4.0 CPR7+ Distributed System Design Considerations (Rev. 4, Sep. 2007) This page left intentionally blank. RSView SE V4.0 (CPR7+) Distributed System Design Considerations Rev. 4, September, 2007, page 2 of 46 Table of Contents Introduction............................................................................................................................................................7 Prerequisite reading before application development........................................................................................7 Revision History ....................................................................................................................................................7 RSView SE Component Terminology...................................................................................................................8 FactoryTalk Directory™....................................................................................................................................8 RSView Studio ..................................................................................................................................................8 RSView SE Server.............................................................................................................................................8 Data Server.........................................................................................................................................................8 RSView SE Client..............................................................................................................................................8
    [Show full text]
  • Carbonite Availability for Windows User's Guide Version 8.2.1, Wednesday, October 17, 2018 If You Need Technical Assistance, You Can Contact Customercare
    Notices Carbonite Availability for Windows User's Guide Version 8.2.1, Wednesday, October 17, 2018 If you need technical assistance, you can contact CustomerCare. All basic configurations outlined in the online documentation will be supported through CustomerCare. Assistance and support for advanced configurations may be referred to a Pre-Sales Systems Engineer or to Professional Services. Man pages are installed and available on Carbonite Availability and Carbonite Migrate Linux servers. These documents are bound by the same Carbonite license agreement as the software installation. This documentation is subject to the following: (1) Change without notice; (2) Furnished pursuant to a license agreement; (3) Proprietary to the respective owner; (4) Not to be copied or reproduced unless authorized pursuant to the license agreement; (5) Provided without any expressed or implied warranties, (6) Does not entitle Licensee, End User or any other party to the source code or source code documentation of anything within the documentation or otherwise provided that is proprietary to Carbonite, Inc.; and (7) All Open Source and Third-Party Components (“OSTPC”) are provided “AS IS” pursuant to that OSTPC’s license agreement and disclaimers of warranties and liability. Carbonite, Inc. and/or its affiliates and subsidiaries in the United States and/or other countries own/hold rights to certain trademarks, registered trademarks, and logos. Hyper-V and Windows are registered trademarks of Microsoft Corporation in the United States and/or other countries. Linux is a registered trademark of Linus Torvalds. vSphere is a registered trademark of VMware. All other trademarks are the property of their respective companies.
    [Show full text]
  • Windows Server 2008 Network Infrastructure, Configuring
    Microsoft TS 70-642 Network Infrastructure 2008 2013-01-02 Number : 70-642 Passing Score : 700 Time Limit : 180 min File Version : 1.1 http://www.gratisexam.com/ EXAM:70-642 TS: Windows Server 2008 Network Infrastructure, Configuring CHANGE LOG: Removed all duplicated question (even if is very similar) Added a few new questions Added many technet links and explanations PS: plz comment at ==> www.examcollection.com/70-642.html It's important to learn the question! Don’t just memorize the answers!! ;) GOOD LUCK Sections 1. Exam A 2. Exam B 3. Exam C 4. Exam D 5. Exam E 6. Exam F 7. Exam G 8. Exam H 9. Exam I 10.Exam J 11.Exam K 12.Exam L 13.Exam M 14.Exam N Exam A QUESTION 1 Your network contains 100 servers that run Windows Server 2008 R2. A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network. You need to define the Custom Event Delivery Optimization settings on Server1. Which tool should you use? A. Event Viewer B. Task Scheduler C. Wecutil D. Wevtutil Correct Answer: C Section: Exam A Explanation Explanation/Reference: Explanation: Wecutil.exe is a Windows Event Collector utility that enables an administrator to create and manage subscriptions to events forwarded from remote event sources that support the WS-Management protocol. QUESTION 2 Your network contains a server that runs Windows Server 2008 R2. You plan to create a custom script. You need to ensure that each time the script runs, an entry is added to the Application event log.
    [Show full text]
  • How to Run Nesstar with IIS Socket Pooling
    Unlocking | data | creating | knowledge How to run Nesstar with IIS Socket Pooling November 2006 Nesstar Socket Pooling Contents 1 Introduction ......................................................................................................... 1 1.1 What is Socket Pooling? ............................................................................. 1 1.1.1 How to confirm this is the problem ...................................................... 1 2 Solving the Problem ............................................................................................ 1 1.1 Solving the Problem for IIS 5.0.................................................................... 1 2.2 Solving the Problem for IIS 6.0.................................................................... 2 Nesstar Socket Pooling 1 Introduction The Nesstar Service will not start under Win 2K or Win 2K3 Server when IIS 5/6 (Internet Information Server) is running. This is because of IIS Socket Pooling. The instructions below explain how to change IIS setting to enable the Nesstar Service to run. 1.1 What is Socket Pooling? Socket pooling is non-blocking socket usage, introduced in IIS 5.0 where more than one application can use any given socket. When IIS 5.0 and 6.0 start on 2000 or 2003 server, IIS binds to all IP addresses on the server and not just the IP addresses that are assigned to web sites. The HTTP service, for example, listens to port 80 on all unassigned IP addresses even if you specify a particular IP address for the default virtual server. The same is true for the FTP and SMTP services on port 21 and 25 respectively. 1.1.1 How to confirm this is the problem To check if IIS socket pooling is the cause of the problem: 1. Open a ‘Command Prompt’ by clicking Start > Run, and typing ‘cmd’. 2. Type “netstat –na” in the command prompt window.
    [Show full text]
  • Lab Setup Guide
    CS490 Windows Internals Software Setup for Labs & Exercises CS490 Windows Internals Lab Setup Guide The tools referenced in the labs are from the following sources: Windows Support Tools Windows Resource Kit Tools Windows Debugging Tools Kernrate (only needed for Unit 3) Freeware tools from www.sysinternals.com For a general description of these tool sources and their use for exploring Windows OS internals, see Windows Internals, 5th edition pp. 24-31. HARDWARE REQUIREMENTS: Any supported Windows 2000, Windows XP, or Windows Server 2003 system Disk space: at least 1GB free after installation ACCOUNT REQUIREMENTS: Some of the labs require local administrator rights: specifically, any lab using Windbg for performing local kernel debugging as well as labs using Filemon and Regmon from Sysinternals.com. INSTALLATION STEPS: 1. Install Windows Support Tools To install: run \support\tools\setup.exe from the Windows CD (make sure to install the Support Tools that matches the OS you are running on, e.g. XP Support Tools for XP, etc) 2. Install Windows Server 2003 Resource Kit Tools http://www.microsoft.com/downloads/details.aspx?FamilyID=9d467a69-57ff-4ae7-96ee- b18c4790cffd&DisplayLang=en © 2005-2010 David A. Solomon, Mark Russinovich and Kenny Zhu 1 CS490 Windows Internals Software Setup for Labs & Exercises 3. Install Debugging Tools for Windows http://www.microsoft.com/whdc/ddk/debugging You may need to install Microsoft .NET framework version 4.0 from http://www.microsoft.com/downloads/en/details.aspx?FamilyID=9cfb2d51-5ff4-4491-b0e5- b386f32c0992&displaylang=en before installing the debugging tools. Configure symbols (required for kernel debugging) as explained on the “Getting Started” page, available from the above web page.
    [Show full text]
  • Implementation Guide of R7.1.X
    This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the “Documentation”), is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]