Active Directory Naming Information Could Not Be Located Because

Sometimes when you open an Active Directory tool, you might get hit with the “Active Directory Naming Information Could Not Be Located” error message. The error does not provide more information as to what “Naming Information” the tool is referring to. And also, there’s nothing in the event logs to let you know more about the error so you can troubleshoot the issue. What you may not know is, there is a process which active directory tools or utility have to follow to contact a domain controller to get the naming information for an active directory domain. I’ll explain this process in this blog post.

Please read here : https://www.simple-talk.com/blogs/2013/04/29/active-directory-naming-information-could-not-be-located-because/

Hyper-V Networking and VLAN Configuration Scenario

I have written the 2nd part of the Hyper-V Networking and Configuration.

The big difference that we see between Scenario 1 and Scenario 2 is the communication to the External LAN (e.g. VM1 through VM3 talking to Server1 through Server3 on LAN). The moment you see the requirement for External communication you’ll think of using an External Virtual Switch.

To achieve the requirements of this second scenario, you can use any of the configuration methods as discussed earlier but the most suitable methods to use are:

  • Using another Physical NIC Method (applies when External networking is configured).
  • Using Hyper-V Virtual Switch and VLAN Tagging Method.

And the scenario looks like below:

More explained at http://www.simple-talk.com/sysadmin/virtualization/microsoft-hyper-v-networking-and-configuration—part-2/

Nirmal.

The SysAdmin Handbook – The Best of SimpleTalk

Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. They have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential reference for any Systems Administrator, whether you have years of experience or are just starting out.

Articles included in the Handbook:

  • Message Hygiene in Exchange Server 2007
  • Using Exchange 2007 for Resource Booking
  • Microsoft Exchange Server 2007: Controlling Email Messages using Exchange’s Transport Rules
  • Exchange Database Technologies
  • Message Classifications in Exchange 2007
  • Deploying Exchange 2007 on Windows Server 2008
  • Reporting on Mobile Device Activity Using Exchange 2007 ActiveSync Logs
  • Online Exchange Backups
  • Optimizing Exchange Server 2007
  • Exchange Recovery Storage Groups
  • Exchange Email Addresses and the Outlook Address Cache
  • Goodbye Exchange ExMerge, Hello Export-Mailbox
  • Determining MS Exchange Disk Performance
  • Message Tracking in Exchange 2007
  • Emulating the Exchange 2003 RUS for Out-of-Band Mailbox Provisioning in Exchange 2007
  • Using Exchange 2007 Transport Rules to Protect the First Entry in the Address Book
  • An Introduction to Messaging Records Management
  • Restricting Outlook Client Versions in Exchange 2007
  • Exchange Backups on Windows Server 2008
  • Monitoring and Scheduling Exchange 2007 Database Online Maintenance
  • Exchange 2010 High Availability
  • Implementing Cluster Continuous Replication: Part 1
  • The Active Directory Recycle Bin in Windows Server 2008 R2
  • Using Group Policy to Restrict the Use of PST Files
  • Introduction to Exchange Server 2010
  • Implementing Windows Server 2008 File System Quotas
  • Implementing Cluster Continuous Replication: Part 2
  • Active Directory Management with PowerShell in Windows Server 2008 R2
  • Upgrade Exchange 2003 to Exchange 2010: Part 1
  • Customizing the Outlook Address Book
  • Virtual Exchange Servers
  • Virtualizing Exchange: Points for Discussion
  • Build Your Own Virtualized Test Lab
  • A Beginner’s Guide to Virtualizing Exchange Server: Part 1
  • Windows Server Virtualisation: Introduction to Hyper-V
  • Windows Server Virtualisation: Installing Hyper-V and Beyond
  • A Beginner’s Guide to Virtualizing Exchange Server: Part 2
  • Increasing the Availability of Virtualized Applications and Services

http://www.red-gate.com/community/books/sysadmin-handbook

Nirmal.

Microsoft Hyper-V Networking and Configuration Part 1

Most of the article talks about Hyper-V Networking. It doesn’t really elaborate on basics of Networking. Instead the article focuses more on the Hyper-V Networking and VLAN Tagging with examples.

The first article in this series explains the following topics:

  • Virtual Networking Overview
  • Hyper-V Virtual Network Switch Overview
  • Microsoft Hyper-V Virtual Network Switch Types
  • Microsoft Hyper-V Virtual Network Maximum configuration
  • What happens when you create a Virtual Network Switch?

Continue reading here.

The 2nd part of this article series will be posted soon.

Best, N

Tips – 4

A Quick Tip To Disable “Initial Configuration Tasks List”

This article explains how you can disable the Initial Configuration Task List at logon.

What All Ports Are Required By Domain Controllers And Client Computers?

This article explains the key port requirement for Client computers and Domain Controllers communicating with each other.

A Quick Tip To Check If PDC Emulator Is Working

This article explains how you can tell if PDC Emulator in an Active Directory Domain is working.

What To Check If A Single User Can’t Log On To Domain?

This article explains the tips you can use to troubleshoot the problem for a user who can’t log on to the domain.

A Quick Tip To Verify The SRV Records Of Domain Controllers

This article explains how you can use the NSLOOKUP tool to verify the SRV records of a domain controller.

How To Browse NTDS.DIT Offline

This article shows how you can browse the NTDS.DIT (Active Directory database file) offline by using the DSAMIN command in Windows Server 2008.

How To Allow System State Backups To Critical Volumes In Windows Server 2008?

This article explains a registry hack you can use to allow System State to be backed up to a critical volume in Windows Server 2008.

How Global Name Zones Work In Windows Server 2008?

This article shows the steps included when resolving a name in DNS Server running on Windows Server 2008.

How Do You Restore Previous Backups On A Windows Server 2008 Computer?

This article explains how you can use the Windows NTbackup tool to restore the previous backups on a computer running Windows Server 2008.

“Access Is Denied” Error Message When You Try To Delete A File/Folder

This article explains how you can use Process Explorer, a tool from Sysinternals (now subsidiary of Microsoft), to kill the lock on files and folders.

How To Change The Bakcup Interval Of DHCP Database

This article explains how you can change the Backup Interval of DHCP using a registry entry.

Terminal Services Advertising in Windows Server 2008

This article explains a registry entry for Terminal Services to disable/enable advertising.

How Do You Change The RDP Port No?

This articles explains a registry entry you can modify to change the default RDP Port No. for Terminal Services.

 

Tips – 3

Group Policy Offers New Functionality in Windows Server 2008

This article explains the improvements to the Group Policy in Windows Server 2008.

Domain Controller Options Not Supported By RODC

This article explains the DC Options which are not supported by a RODC.

DS Auditing in Windows Server 2008

This article explains the new functionality offered by auditing in Windows Server 2008.

Fine Grained Password Policies Facts

This article lists some facts about the FGPP.

BCD: Boot Configuration Database Notes

This article explains the new feature added to the Windows Boot process in Windows Server 2008.

Windows Server Backup and New Features In Windows Server 2008

This article list of new features added to the Windows Server Backup tool in Windows Server 2008.

Multiple PSOs To One User?

This article explains the conflict which arises when multiple PSOs are applied to a user.

How To Quickly Check If Newly Created GPO Replicated To All Domain Controllers?

This article explains a quick tip to check whether a newly created GPO replicated to all the Domain Controllers for that domain or not.

Backup Latency Threshold In Windows Server 2003 With SP1

This article explains how you can use a registry entry to display a warning message if a Naming Partition is not backed up for many days.

A Quick Tip To Configure Time Service In Active Directory Environment

This article explains how you can configure time service for an active directory environment.

AvoidPDCOnWan and PDC Emulator

This article explains how you can control a domain controller contacting a PDC which is out of the site.

Tip To Check Network and DNS Settings Before Deploying A DC or Domain

This article explains a small tip or syntax of a command you can use to check the network and DNS settings before deploying a child domain or additional domain controller in an existing forest.

What is Replication Queue and who manages the Queue?

This article explains the mechanism Bridgehead Servers use to process the replication changes.

SYSVOL Replication Notes

This article explains some notes related to the FRS and SYSVOL replication.

Tips – 2

A Quick Tip To Prevent Users From Accessing The Computer Tab

This article explains a quick tip which you can use to prevent users from accessing the Computer Tab on My Computer property.

A Quick Tip To Create A User Mode Process Dump File

This article explains how you can use ADPlus.vbs to create a User Mode Process dump file when a process terminates unexpectedly.

Log Files Of Server Manager

This article explains log files which are used by Server Manager in Full installation and Server Core. This article applies to Windows Server 2008 only.

How To Disable Server Manager At Windows Logon?

This article explains a registry entry you can configure to disable Server Manager from opening at Windows Logon. This article applied to Windows Server 2008 only.

How To Turn Internet Explorer Enhanced Security Off In Windows Server 2008?

This article explains how you can manually turn the Internet Enhanced Security Off in Windows Server 2008.

How To Change The XMLPath For Server Manager In Windows Server 2008?

This article explains the registry key you can use to change the OEM XML File Path which is used by the ICT and Server Manager.

How To: Firewall Commands In Server Core

This article explains the commands you can use to operate Windows Firewall in Server Core

A Quick Tip To Create A Kernel Memory Dump File Manually

This article explains how you can create a Kernel Memory dump file for diagnostic purpose.

 

Tips – 1

Please check all the tips at WindowsNetworking.com:

A Quick Tip To Strict FRS Replication To A Specific Port

This article explains a registry heck which can be used to strict FRS Replication to a specific port.

A Quick Tip To Strict AD Replication To A Specific Port

This article explains a registry entry which can be used to strict the AD Replication traffic to a specific port.

A Quick Tip To Allow DSRM Account To Log On Normally

This article explains a registry heck which can be used to allow DSRM User Account to log on normally in Windows Server 2008. This applies to Windows Server 2008 only.

A Quick Tip To Place Authenticating DC In DFS Referral List

This article explains a registry entry which can be used to place the authenticating domain controller on top of the DFS Referral list.

A Quick Tip To Alter Default Behaviour Of GlobalNameZones

This article explains how you can change the default behavior of GlobalNameZone zone.

A Quick Tip To Get List Of RODC Administrators

This article explains the registry key which contains the list of RODC Administrators. This article applies only to Windows Server 2008 RODC.

A Quick Tip To Enable White Space Logging

This article explains the use of White Space Logging and how you enable it on the domain controllers.

A Quick Tip To Check The Backup Status Of Each NC In Active Directory Forest

This article shows how you can see the backup status of each Naming Context in Active Directory using command line tool.

How To Use DsQuery To Find All The Domain Controllers In The Domain or Forest?

This article explains DsQuery commands which you can use to find all the domain controllers.

A Quick Tip To Modify Logon Rights On Multiple Computers

This article explains a simple command you can use to modify the “Log On Locally” rights on all the server remotely.

A Quick Tip To Find The Security Updates On Server Core

This article shows a quick command you can use to find the security updates on server core.

A Quick Tip To Get A List Of Security Groups A User Belongs To

This article explains a quick tip you can use to get the list of Security Groups a user or users belong/s to.

A Quick Tip To Get Members Of Security Groups

This article explains a command which you can use to get the members of security group or security groups mentioned in a text file.

 

Inter-Site Topology Generator Invalid

Scenario:

ISTG has invalid on all Domain Controller on the network after you demote a DC and trasfer roles and then rebuild it.

If demoted Domain Controller is the first DC in site – If yes then this DC holds the role – ISTG Server.

Initially the first server in the site becomes the ISTG owner and this this role is communicated by normal AD replication.

Moreover, this role is not changed automatically. Server holding ISTG role notifies other domain controllers about its presence by writing the *InterSiteTopologyGenerator* attribute in Configuration Naming Context at a specified interval.

Another fact is that another DC as an ISTG server doesn’t take over unless it knows that DC hold ISTG server has failed.

To correct this issue:

You can edit the following registry value to modify this behaviour:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters

Value Name: KCC site generator renewal interval (minutes)
Value Data: Number of minutes between updates to Active Directory

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters
Value Name: KCC site generator fail-over (minutes)
Value Data: Time that must elapse before a new ISTG is selected, in minutes.