Sometimes when you open an Active Directory tool, you might get hit with the “Active Directory Naming Information Could Not Be Located” error message. The error does not provide more information as to what “Naming Information” the tool is referring to. And also, there’s nothing in the event logs to let you know more about the error so you can troubleshoot the issue. What you may not know is, there is a process which active directory tools or utility have to follow to contact a domain controller to get the naming information for an active directory domain. I’ll explain this process in this blog post.
Windows Server 2012 provides NIC Teaming support for Host and Virtual Machines running on Hyper-V.
The Part 2 of Hyper-V Networking and Configuration article has been updated here:
I have written the 2nd part of the Hyper-V Networking and Configuration.
The big difference that we see between Scenario 1 and Scenario 2 is the communication to the External LAN (e.g. VM1 through VM3 talking to Server1 through Server3 on LAN). The moment you see the requirement for External communication you’ll think of using an External Virtual Switch.
To achieve the requirements of this second scenario, you can use any of the configuration methods as discussed earlier but the most suitable methods to use are:
- Using another Physical NIC Method (applies when External networking is configured).
- Using Hyper-V Virtual Switch and VLAN Tagging Method.
And the scenario looks like below:
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. They have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential reference for any Systems Administrator, whether you have years of experience or are just starting out.
Articles included in the Handbook:
- Message Hygiene in Exchange Server 2007
- Using Exchange 2007 for Resource Booking
- Microsoft Exchange Server 2007: Controlling Email Messages using Exchange’s Transport Rules
- Exchange Database Technologies
- Message Classifications in Exchange 2007
- Deploying Exchange 2007 on Windows Server 2008
- Reporting on Mobile Device Activity Using Exchange 2007 ActiveSync Logs
- Online Exchange Backups
- Optimizing Exchange Server 2007
- Exchange Recovery Storage Groups
- Exchange Email Addresses and the Outlook Address Cache
- Goodbye Exchange ExMerge, Hello Export-Mailbox
- Determining MS Exchange Disk Performance
- Message Tracking in Exchange 2007
- Emulating the Exchange 2003 RUS for Out-of-Band Mailbox Provisioning in Exchange 2007
- Using Exchange 2007 Transport Rules to Protect the First Entry in the Address Book
- An Introduction to Messaging Records Management
- Restricting Outlook Client Versions in Exchange 2007
- Exchange Backups on Windows Server 2008
- Monitoring and Scheduling Exchange 2007 Database Online Maintenance
- Exchange 2010 High Availability
- Implementing Cluster Continuous Replication: Part 1
- The Active Directory Recycle Bin in Windows Server 2008 R2
- Using Group Policy to Restrict the Use of PST Files
- Introduction to Exchange Server 2010
- Implementing Windows Server 2008 File System Quotas
- Implementing Cluster Continuous Replication: Part 2
- Active Directory Management with PowerShell in Windows Server 2008 R2
- Upgrade Exchange 2003 to Exchange 2010: Part 1
- Customizing the Outlook Address Book
- Virtual Exchange Servers
- Virtualizing Exchange: Points for Discussion
- Build Your Own Virtualized Test Lab
- A Beginner’s Guide to Virtualizing Exchange Server: Part 1
- Windows Server Virtualisation: Introduction to Hyper-V
- Windows Server Virtualisation: Installing Hyper-V and Beyond
- A Beginner’s Guide to Virtualizing Exchange Server: Part 2
- Increasing the Availability of Virtualized Applications and Services
Most of the article talks about Hyper-V Networking. It doesn’t really elaborate on basics of Networking. Instead the article focuses more on the Hyper-V Networking and VLAN Tagging with examples.
The first article in this series explains the following topics:
- Virtual Networking Overview
- Hyper-V Virtual Network Switch Overview
- Microsoft Hyper-V Virtual Network Switch Types
- Microsoft Hyper-V Virtual Network Maximum configuration
- What happens when you create a Virtual Network Switch?
Continue reading here.
The 2nd part of this article series will be posted soon.
This article explains how you can disable the Initial Configuration Task List at logon.
This article explains the key port requirement for Client computers and Domain Controllers communicating with each other.
This article explains how you can tell if PDC Emulator in an Active Directory Domain is working.
This article explains the tips you can use to troubleshoot the problem for a user who can’t log on to the domain.
This article explains how you can use the NSLOOKUP tool to verify the SRV records of a domain controller.
This article shows how you can browse the NTDS.DIT (Active Directory database file) offline by using the DSAMIN command in Windows Server 2008.
This article explains a registry hack you can use to allow System State to be backed up to a critical volume in Windows Server 2008.
This article shows the steps included when resolving a name in DNS Server running on Windows Server 2008.
This article explains how you can use the Windows NTbackup tool to restore the previous backups on a computer running Windows Server 2008.
This article explains how you can use Process Explorer, a tool from Sysinternals (now subsidiary of Microsoft), to kill the lock on files and folders.
This article explains how you can change the Backup Interval of DHCP using a registry entry.
This article explains a registry entry for Terminal Services to disable/enable advertising.
This articles explains a registry entry you can modify to change the default RDP Port No. for Terminal Services.
This article explains the improvements to the Group Policy in Windows Server 2008.
This article explains the DC Options which are not supported by a RODC.
This article explains the new functionality offered by auditing in Windows Server 2008.
This article lists some facts about the FGPP.
This article explains the new feature added to the Windows Boot process in Windows Server 2008.
This article list of new features added to the Windows Server Backup tool in Windows Server 2008.
This article explains the conflict which arises when multiple PSOs are applied to a user.
This article explains a quick tip to check whether a newly created GPO replicated to all the Domain Controllers for that domain or not.
This article explains how you can use a registry entry to display a warning message if a Naming Partition is not backed up for many days.
This article explains how you can configure time service for an active directory environment.
This article explains how you can control a domain controller contacting a PDC which is out of the site.
This article explains a small tip or syntax of a command you can use to check the network and DNS settings before deploying a child domain or additional domain controller in an existing forest.
This article explains the mechanism Bridgehead Servers use to process the replication changes.
This article explains some notes related to the FRS and SYSVOL replication.
This article explains a quick tip which you can use to prevent users from accessing the Computer Tab on My Computer property.
This article explains how you can use ADPlus.vbs to create a User Mode Process dump file when a process terminates unexpectedly.
This article explains log files which are used by Server Manager in Full installation and Server Core. This article applies to Windows Server 2008 only.
This article explains a registry entry you can configure to disable Server Manager from opening at Windows Logon. This article applied to Windows Server 2008 only.
This article explains how you can manually turn the Internet Enhanced Security Off in Windows Server 2008.
This article explains the registry key you can use to change the OEM XML File Path which is used by the ICT and Server Manager.
This article explains the commands you can use to operate Windows Firewall in Server Core
This article explains how you can create a Kernel Memory dump file for diagnostic purpose.
Please check all the tips at WindowsNetworking.com:
This article explains a registry heck which can be used to strict FRS Replication to a specific port.
This article explains a registry entry which can be used to strict the AD Replication traffic to a specific port.
This article explains a registry heck which can be used to allow DSRM User Account to log on normally in Windows Server 2008. This applies to Windows Server 2008 only.
This article explains a registry entry which can be used to place the authenticating domain controller on top of the DFS Referral list.
This article explains how you can change the default behavior of GlobalNameZone zone.
This article explains the registry key which contains the list of RODC Administrators. This article applies only to Windows Server 2008 RODC.
This article explains the use of White Space Logging and how you enable it on the domain controllers.
This article shows how you can see the backup status of each Naming Context in Active Directory using command line tool.
This article explains DsQuery commands which you can use to find all the domain controllers.
This article explains a simple command you can use to modify the “Log On Locally” rights on all the server remotely.
This article shows a quick command you can use to find the security updates on server core.
This article explains a quick tip you can use to get the list of Security Groups a user or users belong/s to.
This article explains a command which you can use to get the members of security group or security groups mentioned in a text file.
ISTG has invalid on all Domain Controller on the network after you demote a DC and trasfer roles and then rebuild it.
If demoted Domain Controller is the first DC in site – If yes then this DC holds the role – ISTG Server.
Initially the first server in the site becomes the ISTG owner and this this role is communicated by normal AD replication.
Moreover, this role is not changed automatically. Server holding ISTG role notifies other domain controllers about its presence by writing the *InterSiteTopologyGenerator* attribute in Configuration Naming Context at a specified interval.
Another fact is that another DC as an ISTG server doesn’t take over unless it knows that DC hold ISTG server has failed.
To correct this issue:
You can edit the following registry value to modify this behaviour:
Value Name: KCC site generator renewal interval (minutes)
Value Data: Number of minutes between updates to Active Directory
Value Name: KCC site generator fail-over (minutes)
Value Data: Time that must elapse before a new ISTG is selected, in minutes.