Chapter 15 Troubleshooting and Maintaining Windows Chapter 15 Objectives

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 15 Troubleshooting and Maintaining Windows Chapter 15 Objectives A+ Certification Guide Chapter 15 Troubleshooting and Maintaining Windows Chapter 15 Objectives . STOP (Blue Screen of Death) Errors: – Discover what a BSOD is, typical causes, how to diagnose . Boot Failures: – Learn what causes boot failures and how to restore an unbootable system back to operation. Other Windows Problems: – Windows tools and features to use to find the cause and solve problems . Windows Diagnostic and Repair Tools: – System File Checker, Defrag, Registry Editor, Recovery Console, Windows Recovery Environment, and so on . Maintaining Windows: – Scheduling and performing Windows “best practices” STOP (Blue Screen of Death) Errors . Causes and Solutions – Incompatible or defective hardware or software: • Start the system in Safe Mode, and uninstall the last hardware or software installed. • Acquire updates before you reinstall the hardware or software. • Exchange or test memory. • Run SFC /scannow to check for problems with system files. – Registry problems: • Select Last Known Good Configuration as described later in this chapter to see if the system will start. – Viruses: • Scan for viruses and remove them if discovered. – Miscellaneous causes: • Check the Windows Event Viewer, and check the System log Windows Boot Issues: Vista / 7 . Bootmgr—Windows Boot Manager. – The Windows loader program. – Replaces NTLDR in earlier versions of Windows. – Determines which operating system to start. BCD (Boot Configuration Data). – Located in \boot\bcd. It furnishes the Windows Boot Manager with information about the operating system(s) to be booted. – Successor to boot.ini and the Windows kernel – Completes the boot process . Hal.dll (Hardware Abstraction Layer). – A software translator between Windows and system hardware. SYSTEM key. – Key in the Registry that determines the system configuration. Device drivers. – Loaded according to the information stored in the Registry. Recovering an Operating System If Windows will not start properly: – Use the Last Known Good Configuration option • Gets things working again after an unsuccessful change. – Use Safe Mode or other advanced boot options to help diagnose the problem. – If Windows will not boot: • Windows Recovery Environment (WinRE) for Windows Vista. • Recovery Console for Windows XP/2000. – If Windows will not boot and needs to be restored: • Complete PC Backup (Vista). • ASR System Restore (XP). • Emergency Repair Disk (2000). Windows Vista /7 Advanced Boot Options Menu . Safe Mode: – Starts system with a minimal set of drivers; can be used to start System Restore or to load Windows GUI for diagnostics . Safe Mode with Networking: – Starts system with minimal set of drivers and enables network support . Safe Mode with Command Prompt: – Starts system with a minimal set of drivers but loads command prompt . Enable Boot Logging: – Creates a ntbtlog.txt file . Enable Low-Resolution Video (640 x 480): – Uses standard VGA driver , but uses all other drivers as normal – Called Enable VGA Mode in Windows XP . Last Known Good Configuration: – Starts system with the last configuration known to work – Can solve problems caused by newly installed hardware or software Advanced Boot Options Windows Vista Advanced Boot Options Menu . Directory Services Restore Mode: – Used to restore a domain controller’s active directory (Windows Server). It is not used in Windows Vista/XP/2000. Debugging Mode: – An advanced diagnostics tool that enables the use of a debug program to examine the system kernel for troubleshooting. Disable Automatic Restart on System Failure (Vista Only): – Prevents Windows from automatically restarting if an error causes failure. – Choose this only if Windows fails, attempts to restart, and fails again. Disable Driver Signature Enforcement (Vista Only): – Allows drivers containing improper signatures to be installed. Start Windows Normally: – Used to boot to regular Windows in case a user inadvertently presses F8, but does not want any of the Advanced Boot Options. Windows XP Boot Errors/Fixes . NTDETECT failed: – This message is displayed if the NTDETECT.COM file is missing or corrupted. – Copy d:\i386\ntldr c:\ (if d: is the drive of the windows cd-rom) . NTLDR is missing: – This message is displayed if the NTLDR file is missing or corrupted. – d:\i386\ntdetect.com c:\ . Invalid boot.ini: – Displayed if the boot.ini file is missing or corrupted. The system might boot anyway, particularly if there is only disk partition on the first hard disk. – Recopy file. – In recovery console, use command Bootcfg /rebuild. Ntoskrnl.exe is missing: – This message is displayed if Windows cannot find the file. If the boot.ini file is invalid, fixing it could fix this problem as well. – Reinstall from CD. ‘Missing Operating System’ error: – Recovery console , use ‘fixmbr’ command. Windows Recovery Environment (WinRE) . Used for Boot Problems . Access WinRE by – Booting to the Windows Vista DVD – Booting to a special drive partition with WinRE on it • Press F8 to bring up Advanced Options menu. – Look for Repair Your Computer. – If this option does not show, WinRE is not installed. • Subsequent options: » Startup Repair » System Restore » Complete PC Restore » Command Prompt Windows XP Diagnostic and Repair Tools . Recovery Console: – A limited command-line environment that can be run from the Windows XP CD or from the startup menu (if it were preinstalled or installed by the user). Fixboot and Fixmbr: – Available from the Windows XP Recovery Console for fixing boot problems . Automated System Recovery (ASR): – A backup routine used to restore an unbootable system. – User must then reinstall applications and restore data files to complete the recovery process. Windows Repair Discs XP Recovery Console . Command-line interface tool: – Used by XP/2000 –Start by: • Boot with Windows XP CD Recovery Console. – Press R. • Install Recovery Console using Windows XP CD- ROM while system is running. – You need to log in using an administrative access/password. Windows XP Recovery . Windows XP—Automated System Recovery (ASR): – Restore systems settings: • Includes user accounts, disk configuration, video settings, system boot, and hardware settings • Accessed with NTBackup: – Click Automated System Recovery Wizard. Other Windows Problems . Improper shutdowns . Device fails to start . Missing DLL message . Services fail to start . Compatibility error . Slow system performance . Boots to Safe Mode . File fails to open Windows Vista/7 Diagnostic and Repair Tools •Sfc: •Check system files; replace damaged/ invalid files with correct versions. •MSConfig: •System Configuration is used to display and configure boot options and as a convenient way to access other troubleshooting programs. •Defrag: •Defragments files to improve file access speed, especially on a drive that has frequent changes to its contents and doesn’t have a lot of unused space •REGSVR32: Registers or unregisters DLL files and ActiveX components •REGEDIT: Views and edits Windows Registry contents •Event Viewer: •Displays event logs for troubleshooting or management purposes •Safe Mode and other advanced boot options: •Special boot options that can be used when the system won’t boot normally •Device Manager: •Displays driver, resource, and version information for hardware devices Maintaining Windows : Performing Scheduled Backup and Restore . Task Scheduler: –Start All Programs Accessories System Tools Task Scheduler . Image Backup: – Only Windows Vista: • Backup Status and System Configuration. • Backs up the entire system partition: – Includes operating system, settings, and installed programs – Compressed • Also called “bare metal restore” and “disaster recovery.” . Windows XP: – Install NTBackup from XP-CD – Need to use third-party software. • Ghost, Acronis, Drive Image, and so on. NT Backup Utility Wizard Vista Backup and Restore . Creating a system image backup: – Start > All Programs > Accessories > System Tools > Backup Status and Configuration. – Click Complete PC Backup. – Select Create Backup Now and follow instructions. Restoring the system: – Insert the installation disc/system repair disc. – Boot from CD when prompted. – Click Repair Your Computer. – Select OS to repair. – Select Windows Complete PC Restore, and follow instructions. Windows 7 Backup and Restore . One of the options in Control Panel. Click Create a System Image. Select a destination. Start Backup. To restore system, use same process as with Vista. System Restore and Restore Points . Resets computer configuration to a specific point in time: – Settings are stored as a restore point. – Registry changes since that point can be reversed to enable system to run as it did on the date of the restore point. Windows Components System Files: XP . NTLDR—The Windows loader program. Boot.ini—Affects how Windows starts up. Ntdetect.com—Detects the hardware installed on your system. Ntoskrnl.exe: – The Windows kernel completes the boot process after being initialized by NTLDR. Hal.dll (Hardware Abstraction Layer). – Translates software commands between Windows and system hardware. SYSTEM key in the Registry – Determines the system configuration. Device drivers. – Loaded according to the information stored in the Registry. Windows Components: Registry . Important Registry file associations from C:\ System32 folder: – Default—Default settings from HKEY users – Security Accounts Manager (SAM). – Security log. – Software—Software settings in HKEY Local machine\software – System—Settings from HKEY LOCAL MACHINE\System . User files stored by system and Registry:
Recommended publications
  • Operating System Boot from Fully Encrypted Device
    Masaryk University Faculty of Informatics Operating system boot from fully encrypted device Bachelor’s Thesis Daniel Chromik Brno, Fall 2016 Replace this page with a copy of the official signed thesis assignment and the copy of the Statement of an Author. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Daniel Chromik Advisor: ing. Milan Brož i Acknowledgement I would like to thank my advisor, Ing. Milan Brož, for his guidance and his patience of a saint. Another round of thanks I would like to send towards my family and friends for their support. ii Abstract The goal of this work is description of existing solutions for boot- ing Linux and Windows from fully encrypted devices with Secure Boot. Before that, though, early boot process and bootloaders are de- scribed. A simple Linux distribution is then set up to boot from a fully encrypted device. And lastly, existing Windows encryption solutions are described. iii Keywords boot process, Linux, Windows, disk encryption, GRUB 2, LUKS iv Contents 1 Introduction ............................1 1.1 Thesis goals ..........................1 1.2 Thesis structure ........................2 2 Boot Process Description ....................3 2.1 Early Boot Process ......................3 2.2 Firmware interfaces ......................4 2.2.1 BIOS – Basic Input/Output System . .4 2.2.2 UEFI – Unified Extended Firmware Interface .5 2.3 Partitioning tables ......................5 2.3.1 MBR – Master Boot Record .
    [Show full text]
  • Restoration Onto Different Hardware (PDF)
    Restoration onto different Hardware Quick and easy system restore with O&O DiskImage Table of contents System restoration using boot media ...................................................................................... 1 Restoration onto different hardware ....................................................................................... 2 Limitations when restoring onto different hardware ................................................................................................................. 3 Automatic update............................................................................................................................... ............................................. 3 Manual adaptation .......................................................................................................................................................................... 4 Enable automatic adaptation on changed hardware (M.I.R.) .................................................................................................... 4 Assistance when error messages occur during booting .......................................................... 7 I System restoration using boot media Disks where you save your private and business data can be quickly imaged and restored in the event of a crash or hardware damage. Creating an image of your entire computer or the system partition is also very easy. To restore an image of a Windows system, you’ll need to start O&O DiskImage directly from a bootable medium *. *Note You’ll need to
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • Server Support Interview Questions and Answers Guide
    Server Support Interview Questions And Answers Guide. Global Guideline. https://www.globalguideline.com/ Server Support Interview Questions And Answers Global Guideline . COM Server Support Job Interview Preparation Guide. Question # 1 Tell me where are cluster logs stored? Answer:- Please share your answers. Read More Answers. Question # 2 What are the Logical / Physical Structures of the AD Environment? Answer:- Active Directory Logical components are Forests, Trees, Domains, OUs and Objects. Active Directory Physical components are Domain Controllers, Sites and subnets. Read More Answers. Question # 3 What applications or services use AD application partitions? Name a couple? Answer:- Application partition contains the information of application data and other data related to application as well. But it does not contain any data related AD object such as USER, COMPUTER and GROUP. The saved data will be replicated to some of the particular DC not to all the DCs. Read More Answers. Question # 4 What are the types of hard disks used in servers? Answer:- Mostly we use scsi hardrive in server due few reason to it, high scalability & flexibility in raid array, faster from other type of hdd interface like-sata,ata,ide also it reliable & compatible with older scsi devices Read More Answers. Question # 5 What are some of the command-line tools available for managing a Windows 2003 Server/Active Directory environment? Answer:- Command Line Tools 1) GPupdate 2) Where 3) SystemInfo 4) CSVDE 5) LDIFDE 6) CMDCONS 7) Ipconfig 8) RoboCopy 9) CMDHere 10) PathPing Read More Answers. Question # 6 What if a FSMO server role fails? Answer:- FSMO roles are important role in server .
    [Show full text]
  • Backing up and Recovering Virtual Machines
    4959_Ch07_CMP3 4/20/05 5:30 PM Page 223 CHAPTER 7 ■ ■ ■ Backing Up and Recovering Virtual Machines For virtual machines running in a production environment, backup and recovery is just as serious as for all the other servers on the network. When running servers inside VMs, you’ll be faced with several new challenges, as well as advantages, when planning and implementing a backup strategy. In this chapter, you’ll explore the process of planning for and administering backup and recovery operations on VMs and VM hosts. Along the way, you’ll see the different approaches you can take to secure VM data, which include the following: •Traditional agent-based backups •Non-agent-based backups •Flat-file backups Also, many organizations have embraced the idea of maintaining a warm standby VM server that can be brought online if a primary server fails. This approach, for many organiza- tions, may mean that data is unavailable for a few minutes following the loss of a server. If you can’t afford to cluster all your systems, or if some of your applications don’t support clustering, then you may find this approach to be a perfect fit. Since the focus of this chapter is purely on VM backup and recovery, we’ll walk you through the process of maintaining a standby VM server in Chapter 14. Optimizing your backup strategy often means much more than simply installing software and letting it do its magic. Oftentimes, custom scripting is required to get the backup results you desire. Because of the importance of getting your virtual infrastructure to work around your needs (instead of the other way around), we’ll also show you several scripting ideas to both enhance and automate the backup, recovery, and availability of your VMs.
    [Show full text]
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • Invalid Class String Error
    Tib4231 July, 2001 TECHNICAL INFORMATION BULLETIN Invalid Class String Error KODAK DC215, KODAK DC240, KODAK DC280, DC3400, and DC5000 Zoom Digital Cameras An Invalid Class String error may occur when you try to launch the camera software for the first time, or the Mounter or Camera Properties software may not operate properly.This error is caused when the program RegSvr32.exe is not located in the C:\Windows\System folder, preventing the DLL files from being registered. Use this document to help you properly locate the RegSvr32.exe program in your system, and if necessary, manually register the DLL files. The instructions in this document assume that you are familiar with copying and moving files in your computer, and installing software. Relocating RegSvr32.exe 1. Go to Start > Find > Files and Folders and search for regsvr32*.* Note the location of the program. 2. In WINDOWS Explorer or My Computer, copy RegSvr32.exe to the C:\Windows\System folder if it is not already there. When the file is in place, go on to Step 3. 3. Uninstall the KODAK software using the KODAK Uninstall application, or go to Start > Settings > Control Panel > Add / Remove Programs. 4. Close all background programs except Explorer and Systray by pressing Ctrl Alt Del, selecting each program one at a time, and clicking End Task after each. 5. Install the KODAK camera software. 6. Start the KODAK Camera Mounter and Camera Properties software for your camera. If the Invalid Class String error appears, manually register the DLL file using the procedure that follows for your camera.
    [Show full text]
  • Copyrighted Material
    2986IDX.qxd 9/6/01 12:12 AM Page 425 Index Note to the reader: Throughout this index boldfaced page numbers indicate pri- mary discussions of a topic. Italicized page numbers indicate illustrations. A for Local Users and Groups, 171 in Shared Folders, 333 abstracts, from Indexing Service, 140 Active Directory, 7–8 Accessibility, 2–6 for adding programs, 12 Internet Explorer options, 157 ActiveX controls, security settings for, 158 Magnifier, 176–177 Add Counters dialog, 257, 257–258 Narrator, 195–196 Add Excluded Files dialog On-Screen Keyboard, 234, 234–235 (Backup), 35 Options window, 2, 2–3 Add Hardware Wizard, 8–10, 350–351 Utility Manager, 385–386, 386 Add or Remove Programs, 10–13 Accessibility Options dialog, Keyboard address bar tab, 3, 3–4 in Explorer, 101–102, 102 Accessories, 6 in Internet Explorer, 149 Calculator, 37–38 Address Book, 13–25 Command Prompt, 46, 46–47 contact template, 20 Communications, 47 creating contacts, 16–17 Entertainment program group, 92 folders, 22–23 Program Compatibility Wizard, 288, 288–289 groups, 20–22 System Tools, 366. See also Backup identities for, 24–25 Character Map, 40 menus, 15–16 Disk Cleanup, 69–71, 71 retrieving e-mail addresses from, 241 Disk Defragmenter, 71–75 searching for people in, 325–326 File and Settings Transfer toolbar, 14, 15 Wizard, 112 window, 14 Scheduled Tasks, 316, 316–322 Address toolbar, 367 System Information, 361–363COPYRIGHTEDAdministrative Tools, MATERIAL 25–26. See also System Restore, 364, 364–365 Microsoft Management Console (MMC) snap-ins Windows Explorer, 97, 97–106 Active Directory, 7–8 Windows Movie Maker, 406–414, 407 for adding programs, 12 Action menu COM+ (Component Services), 45 for Device Manager, 59–63 Data Sources (ODBC), 51–55 425 2986IDX.qxd 9/6/01 12:12 AM Page 426 ADMINISTRATOR ACCOUNT Event Viewer, 93, 93–96, 94 attrib command, 291 Local Security Policy, 168, 168–170, AU files, 396 168–170 audio.
    [Show full text]
  • How Will You Troubleshoot the Issue? What Are the Steps to Followed? A
    1. A user in a corporate network contacts service desk saying he/she has lost network connectivity: How will you troubleshoot the issue? What are the steps to followed? A. First I will check the network cable is plugged in or not. Then check the network connections and the ip address is assigned or not. Then check connecting to website or not. IP conflict. 2. A User calls in and complains that her computer and network is running very slow. How would go about troubleshooting it? A. 3. How would you create an email account for a user already in AD? A. Open Microsoft Outlook if you are using office 2000, and click on "Tools" tab. Go to "Email Accounts". There you can find two option like Email and Directory. Click on "Add a new Account" and click next. If you are using Exchange Server then click over there, this depends on that particular Organization. According to the their setup you have to choose. And if you are using POP3 server then next popup will come along with your name, email address POP3 and SMTP IP address, Password etc. and after that click on Next and finish it..... 4. A PC did not receive an update from SMS. What steps would we take to resolve this? A. If SMS not updated in client system. 1. Need to check system getting IPaddress or not. 2. Need to check system in domain or not 3.Ensure that windows firewall should be off. 5. How do you set the IP address by using the command prompt A.
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • Don't Hyper-Ventilate Over Hyper-V Backup!
    Don’t Hyper-Ventilate over Hyper-V backup! A straightforward solution to Hyper-V backup Presented by Linus Chang, Lead Developer of BackupAssist The theme of today is... Hyper-V! Today’s agenda 1. The causes of discomfort and concern 2. Solving the difficulty problem 3. Solving the price problem 4. What else can BackupAssist do? The causes of discomfort and concern Quick recap of the causes of Hyper-V hyperventilation: 1 Difficulty = stress = nervous breakdown Traditional backup methods don’t hit the spot! Not straightforward to image guests: no USB pass through How to back up multiple machines? 2 Price gives your client a heart attack Install a license on each guest machine? Install an expensive “special version” or “agent” to allow unlimited guest backups? Solving the difficulty problem The difficulty problems The difficulty problems: Recovery scenarios with a normal server Recovery scenarios Installation – on host or guest or both? Recovery scenarios with a hyper-v server One-pass or two-pass backup? BackupAssist handles all recovery scenarios One pass – backup the physical host only VM #1 VM #2 VM #3 Backup device Physical Server Two pass – backup the physical host first, VM #1 then the virtual guests VM #2 VM #3 Backup device Physical Server Solving the difficulty problem The problems Recovery scenarios with a normal server: Recovery scenarios with a normal server Recover the entire server from bare metal Recovery scenarios Recover specific files and folders with a hyper-v server Recover a complete Exchange Server BackupAssist
    [Show full text]
  • Dell Feature and Functional Testing for Windows Server 2008
    Dell Feature and Functional Testing for Windows Server 2008 By Barun Chaudhary and Manjunath Narayanan April 2008 Windows Server® 2008 is Microsoft’s first major Server Operating System release in five years. Dell’s close partnership with Microsoft has allowed engagement with the testing and development of this operating system for more than 4 years. Some of the highlights of Dell’s testing efforts include compatibility tests on Dell™ PowerEdge™ server platforms, testing upgrade and migration scenarios, and testing compatibility of OpenManage™, the Dell systems management software. Whenever there were new features or technology included with the Milestone or Beta releases, Dell endeavored to ensure that as many of our platforms and OpenManage components were ready to support those features as possible. Based on the current status of testing, Dell is committed to supporting more than 40 currently shipping and legacy server platforms across 5 generations with Windows Server 2008. Supporting this number of servers has required significant development efforts to help ensure good customer experience. Dell has a set of internal tools to track various parameters like test results, defect tracking, total time spent, driver or firmware changes, etc. Dell estimates it has spent more than 1800 hours testing currently shipping and future Dell servers for compatibility with Windows Server 2008. An additional 1700+ hours were spent at Dell to help ensure OpenManage will be compatible with Windows Server 2008 on as many platforms as possible. To serve this purpose more than 30 different configurations were tested on different Dell platforms. In addition to these efforts, Dell has spent more than 750 hours testing various Windows Server 2008 features on the entire supported server line.
    [Show full text]