viernes, 11 de diciembre de 2009

SQL Server: Recovering from Disasters Using Backups

Extraido integramente del artículo original de Paul S. Randal publicado en TechNet Magazine, os incluimos este valioso artículo de recuperación de desastres de SQL Server:

http://technet.microsoft.com/en-gb/magazine/ee677581.aspx

SQL Server Disaster Recovery

There isn't much point taking SQL Server backups unless you know how to restore them. If you have anything more complicated than just a full database backup, you're going to need to know some RESTORE options to be able to successfully restore your database to the desired point in time.

This is even more the case if you have a complicated database layout or a complex backup strategy and you want to be able to restore, for example, a single file or filegroup, or take advantage of partial database availability.
As long as you have an effective backup strategy and your backups are valid, you should be able to recover from a disaster within your Recovery Time Objective (RTO) and to your Recovery Point Objective (RPO). In the first article in this three-part series, I discussed the various types of backups and how to formulate a backup strategy (see "Understanding SQL Server Backups" in the July 2009 issue).

In this article, I'll explain how restore works and how to perform some of the more common restore operations. It will be helpful if you've read the backup article, and the background material I mentioned in that article's introduction. I'm also going to explain a few more tricky operations, such as doing a point-in-time restore and an online piecemeal restore with partial database availability.

Just as in the previous article on BACKUP, I'm not going to explain how the RESTORE syntax works or go through the specific steps of all restore operations. SQL Server Books Online does an excellent job of that. See "RESTORE (Transact-SQL)" for more info, especially the examples spread throughout the topic. There are actually so many options to RESTORE that it's a whole other topic to explain them! "Backing Up and Restoring How-to Topics (SQL Server Management Studio)" explains how to use the tools to perform restores.

The Four Phases of Restore

Let's start with how restore actually works. A restore operation has up to four phases:

  1. File creation and initialization
  2. Data and/or transaction log copy
  3. REDO phase of recovery
  4. UNDO phase of recovery

One of the primary goals of disaster recovery is to bring the database online as quickly as possible. If your disaster-recovery plan involves restoring backups (instead of, say, failing over to a database mirror), you're going to want the restore process to be as fast as possible. With each of the four restore steps in mind, is there anything you can do to speed them up?

The first step can be essentially skipped if the data and log files already exist. This means that if you're going to overwrite an existing database, don't drop the database before doing the restore. Instead, use the WITH REPLACE option on the first restore operation to tell SQL Server to use the existing files. If the files don't exist, they will be created and then initialized. Creating the files is very fast, but the process of zero-initializing them can be very slow.

For security reasons, and by default, all database files are zero-initialized. You can enable instant file initialization for the SQL Server instance, which skips the zeroing process for data file create and grow operations, including those required during a restore -- possibly saving hours of downtime, even if the data files are only gigabytes in size. Transaction log files are always zero-initialized because of the circular nature of the transaction log itself.

You can read more about all of this, with references to Books Online, in my "Instant Initialization" blog post category.

You may be wondering about the second phase -- why does the item say "and/or transaction log"? If you read the previous article, you'll remember that all full and differential backups also include some transaction log records, to enable the database to be restored to a transactionally consistent point in time. Phase two is a pure copy operation -- no processing of the data is performed -- so the main way to speed this up is to have a better-performing I/O subsystem. This is one of the few times when it's acceptable to "throw hardware at the problem."

The other way to speed up the copy phase is to use some kind of backup compression technology, either native to SQL Server 2008 or through one of the various third-party solutions. The two parts of the copy phase are reading from the backup media and writing out to the data and/or log files. If you can do fewer reads (using compressed backup media), you can speed up the overall process, at the expense of a small amount of CPU resources.

Phases three and four are about running recovery on the transaction log to bring the database to a transactionally consistent point in time. I explained the details of recovery in the February 2009 article "Understanding Logging and Recovery in SQL Server". Note that phase four is optional, as I'll explain later.

Suffice it to say that the more transaction log that needs to be recovered during a restore, the longer the restore will take. This means that if, for instance, you have a full database backup from a week ago and hourly transaction log backups since then, the restore process will essentially replay all the transactions from the last week before completing. I discussed a solution for this in the previous article -- adding differential backups into a full-plus-log backup strategy.

A differential database backup contains all the datafile pages that have changed since the last full database backup, and can be used in a restore operation to avoid having to replay all the transactions that occurred in the period between the full database backup and the differential database backup. This can vastly reduce the time it takes to restore the database, but at the expense of a slightly more complicated backup strategy.

You can find more information in the Books Online topic "Optimizing Backup and Restore Performance in SQL Server".

What Do You Need to Restore?

When disaster strikes, the first thing you need to do is work out what has been damaged, as this is going to dictate the actions you must take to recover from the disaster. For storage media failure, the possibilities include:

  • Damage to the entire database (for instance, whatever was storing the database was destroyed, or the database was a single data file and it was damaged).
  • Damage to a single filegroup of a multi-filegroup database.
  • Damage to a single file of a multi-file filegroup.
  • Damage to a single page in the database.
  • Damage spread through the database.

You can ascertain the damage by looking through the SQL Server error log for notifications that file(s) are inaccessible, that page-read errors occurred (for instance, page checksum failures or a torn-page detection error), or that general corruption was encountered. If damage occurred, it is usual practice to run the DBCC CHECKDB consistency-checking operation to get an idea of how pervasive the damage is.

An explanation of consistency checking is beyond the scope of this article, but you can watch a video of a presentation I made at the Tech-Ed IT Forum in November 2008 titled "Corruption Survival Techniques", and listen to a TechNet Radio interview from earlier this year where I discuss database corruption (direct download links are here).

Disasters are not limited to I/O subsystem or server failures -- there's also human error to consider. Database tables (or data from them) are often accidentally deleted by poorly programmed applications or careless Transact-SQL statements (the "I didn't realize I was on the production server" scenario). In such cases, it can be very difficult to figure out what needs to be restored and from what point in time, especially if no one owns up to making the mistake. You might get lucky using standard reports from the default trace where the DDL operation is still available or the DELETE statement was caught by your own logging -- but often there's no record of who did what to the database. I'll discuss recovering from this situation in more detail later. Regardless of who performed the accidental data deletion or when it happened, the longer you wait to recover -- or the more time that passes before you are made aware of the problem -- the more complex it can be to recover.

So, as a first step if the database is running in the FULL recovery model and the transaction log is undamaged, perform a tail-of-the-log backup to ensure that all transactions up to the point of the disaster are backed up. This "final" transaction log backup will have everything up until the time of the disaster and can be used to bring the database being restored as far as possible, possibly up-to-the-minute.

In a nutshell, you need to work out what you have to restore. Then it becomes a question of what you are able to restore.

What Are You Able to Restore?

The aim of any restore operation is to restore the fewest possible backups, so the restore operation is as fast as possible and completes within your RTO, while also allowing you to meet your RPO.

The main question to ask here is "What backups do I have?" If the only backup you have is a full database backup from a week ago and the whole database has been lost, there's only one restore option -- to a point in time a week ago, losing all work since then. Simply put, your backup strategy should always ensure that you are able to restore what you need to in the event of a disaster, as I discussed in the previous article.

So how can you determine what backups you have available? First, you can query that various backup history tables in the msdb database. These tables contain a record of all backups that have been taken in the SQL Server instance since the last time the backup history tables were cleared out.

As far as the backups themselves are concerned, it is a best practice to name backup files to include the database, type of backup, date and time so that the backup can be identified at a glance. If you haven't done this, you can find out what a backup file contains using the RESTORE HEADERONLY command. This will display the contents of the backup file's header, essentially the metadata that describes the backup itself. You can read more in the Books Online topic "Viewing Information About Backups".

Using either method, you are trying to work out the restore sequence to use to restore the damaged or deleted data. A restore sequence is a set of backups that must be restored and the appropriate order in which to restore them. The restore sequence may be as simple as just one full backup (of a database, filegroup or file), or a complicated set of full, differential and transaction log backups.

For instance, imagine a scenario where the backup strategy involves full database, differential database and transaction log backups. If a system crash occurs and the data files are damaged, what is the restore sequence? Figure 1 illustrates this example.

In this case, the shortest and fastest restore sequence is the most recent full database backup (F), the most recent differential database backup (D2), and then all subsequent transaction log backups, up to and including the tail-of-the-log backup (L7 and L8).

One of the tricky problems when planning a restore sequence is finding the earliest required transaction log backup to restore (sometimes called finding the "minimum-LSN," or "minimum-Log Sequence Number"). In the example in Figure 1, only transaction log backups L7 and L8 are required, because the differential database backup D2 brings the database to a more recent point in time than all the previous transaction log backups.

Figure 1: Example Restore Sequence

SQL Server will allow previous, unneeded transaction log backups to be restored, but they will not be used and essentially just waste disaster-recovery time.Continuing my example, what would happen if the differential database backup D2 was damaged or missing? Figure 2 shows this case.

Figure 2: Restore Sequence with a Damage Differential Database BackUp

In this scenario, the shortest and fastest restore sequence is the most recent full database backup (F), the next most recent differential database backup (D1), and then all subsequent transaction log backups (L4, L5, L6, L7 and L8). This is possible only as long as backups D1, L4, L5 and L6 are still available. It is important that you do not delete backups too soon; otherwise you could run into problems during a disaster.

For instance, if the full database backup F is damaged, unless the previous full database backup is still available, the database will not be recoverable. If the differential database backup D1 is deleted as soon as D2 completes, then the scenario in Figure 2 will not be possible, and the restore sequence will involve all transaction log backups since the full database backup -- a potentially very long restore sequence.

This raises the question of "When should you delete your previous backups?" The answer is definitely "It depends!" If you don't have a legal obligation to keep your backups around for a certain length of time, then it's up to you, and depends on the backup strategy you have and how much disk space is required. Regardless, don't immediately delete previous backups as soon as a new one is taken; it's best to keep at least one or two complete cycles of backups before getting rid of older backups. Ideally, you should test your backups before removing older ones.

For transaction log backups, in general you must have all of them since the last full database backup was taken, as that is the final fall-back restore sequence. If a single transaction log backup from the transaction log backup "chain" is missing or damaged, the restore operation can't proceed past the gap. As I mentioned in the previous article, verifying the integrity of your backups is a key part of being able to restore successfully.

You can find more details on figuring out what you're able to restore in the comprehensive Books Online topic "Working with Restore Sequences for SQL Server Databases".

Example Restore Scenarios

The most common restore scenario involves a full database backup and then one or more transaction log backups to bring the database forward in time. You can do this through SQL Server Management Studio (SSMS) or through Transact-SQL, although there is something you need to be aware of if you're going to use RESTORE commands directly.

When a backup is restored, there are three options for how the restore operation completes and they all relate to the UNDO phase of recovery. As each successive backup in the restore sequence is restored, the REDO phase of recovery is always performed, but the UNDO phase cannot be performed until the very last backup in the transaction log backup chain has been restored. This is because as soon as recovery is completed, no further transaction log backups can be applied, so all restores in the restore sequence must specify not to run the UNDO phase of recovery.

The default, unfortunately, is to run the UNDO phase of recovery -- the equivalent of using the WITH RECOVERY option on the RESTORE statement. When restoring multiple backups, you must be careful that each one specifies WITH NORECOVERY. In fact, the safest way is to use the WITH NORECOVERY option on all restores in the restore sequence, and then manually complete recovery afterward. Here is some example Transact-SQL code to restore a full database backup and two transaction log backups, and then manually complete recovery to bring the database online:

RESTORE DATABASE DBMaint2008 FROM
DISK = 'C:\SQLskills\DBMaint2008_Full_051709_0000.bak'
WITH REPLACE, CHECKSUM, NORECOVERY;
GO

RESTORE LOG DBMaint2008 FROM
DISK = 'C:\SQLskills\DBMaint2008_Log_051709_0100.bak'
WITH NORECOVERY;
GO

RESTORE LOG DBMaint2008 FROM
DISK = 'C:\SQLskills\DBMaint2008_Log_051709_0200.bak'
WITH NORECOVERY;
GO

RESTORE DATABASE DBMaint2008 WITH RECOVERY;
GO

Notice that I also used the CHECKSUM option on the restore of the full database backup to ensure that any page checksums present in the database being restored are verified as they are restored.

If WITH NORECOVERY was not specified on the first RESTORE statement, the following error is returned:

Msg 3117, Level 16, State 1, Line 1
The log or differential backup cannot be restored because no files are ready to rollforward.
Msg 3013, Level 16, State 1, Line 1
RESTORE LOG is terminating abnormally.

You must be very careful to use the right option, otherwise you risk having to start a long restore sequence again -- there's no way to undo recovery once it's completed.

There is, however, an interesting option which kind of does that -- the WITH STANDBY option. This is the last of three options I mentioned earlier. It works by running the UNDO phase of recovery, but it keeps a note of what it did (in an "undo" file whose name and path you specify) and then allows read-only access to the database. The database is transactionally consistent, but you have the ability to continue with the restore sequence. If you decide to continue, the UNDO is reversed (using the contents of the undo file) and then the next transaction log file is restored. This is useful in two scenarios: for allowing read-only access to a log-shipping secondary database and for looking at the contents of the database during the restore sequence.

If the disaster you're recovering from involves accidental deletion of a table, for instance, you may want to do a point-in-time restore. There are several ways to do this, but the most common is where you want to restore the database but ensure that recovery does not proceed past a certain time. In that case you can use the WITH STOPAT option to prevent transaction log restore from going past the time you know the table was deleted. For instance, using the Transact-SQL example above, if I wanted to prevent the database from being restored past 1:45 a.m., I could use the following syntax on the second RESTORE LOG statement:

RESTORE LOG DBMaint2008 FROM
DISK = 'C:\SQLskills\DBMaint2008_Log_051709_0200.bak'
WITH NORECOVERY, STOPAT = '2009-05-17 01:45:00.000';
GO

I could even combine STOPAT and STANDBY to see whether that was the correct point in time and then, if not, restore the same transaction log backup with a time a few seconds later and so on. This kind of operation becomes very tedious, but it may be the only solution if you don't know what time an operation took place.

A comprehensive discussion of these and other options for the RESTORE statement can be found in the Books Online topic "RESTORE Arguments (Transact-SQL)".

One of the coolest new features introduced in SQL Server 2005 Enterprise Edition was partial database availability. This feature allows a multi-filegroup database to be online and available as long as at least the primary filegroup is online. Obviously, data in any offline filegroups can't be accessed, but this feature allows a very large database to be split into separate filegroups for easier and faster recoverability. Another Enterprise-only feature that was added is the ability to perform piecemeal restores (for instance, a single filegroup from a multi-filegroup database) online, while the rest of the database is being used for processing.

These two features combined enable some quite sophisticated and efficient restore scenarios, as long as the database has been architected that way and the correct backups exist.

You'll find an excellent, in-depth SQL Server Technical Article titled "Microsoft SQL Server 2005 Partial Database Availability" with some extensive examples available at tinyurl.com/mbpa65. There's also a 75-minute recording of Kimberly L. Tripp delivering a Tech-Ed EMEA session titled "SQL Server 2005 VLDB Availability and Recovery Strategies" that is well worth watching.

Considerations When Restoring to a Different Location

The simplest restore scenario is when the database is being restored on the same SQL Server instance to which it is usually attached, and with the same name. As you move further away from that scenario, the aftermath of the restore operation becomes more complicated.

If the database is being restored on the same instance, but with a different name, you may need to make changes to elements like DTS/SSIS packages, database maintenance plans, application strings and anything that relies on a database name.

If the database is being restored on a different instance on the same server, things get a lot more complicated:

  • The SQL Server logins will be different or may not exist.
  • SQL Agent jobs and DTS/SSIS packages will be different or may not exist.
  • The master database is different, so any user-defined stored procedures may be missing.
  • The SQL Server instance name will be different, so there may be client connectivity issues.
  • If the database is being restored on an instance on a different server, everything listed applies, but there may be added security issues as Windows accounts may be different, and they may be in a different Windows domain.
  • One other consideration is the edition of SQL Server the database is being restored on. There are some features that, if used in the database, make the database "Enterprise-only" -- it cannot be restored on a Standard Edition (or lower) SQL Server instance.
  • In SQL Server 2000 and earlier, this is not an issue. In SQL Server 2005, if table or index partitioning is used, the database is "Enterprise-only." In SQL Server 2008, the feature list is:
  • Change data capture
  • Transparent data encryption
  • Data compression
  • Partitioning

All of these require sysadmin privileges to enable except data compression, which can be enabled by a table owner, thus potentially breaking a disaster-recovery plan involving restoring to a Standard Edition instance. You can tell whether any of these features are being used in the database using the DMV sys.dm_db_persisted_sku_features and adjust your disaster-recovery plan accordingly.

Dig Deeper

Just as with the first article in the series on backups, there are lots of facets of restore operations that I didn't have space to cover. Now that you know the basics, however, you can dive into some of the Books Online and blog links for deeper information. The best place to start in Books Online is the topic "Restore and Recovery Overview (SQL Server)". You can also find a lot of information on my blog, starting with the Backup/Restore category.

The main takeaway I'd like you to gain from this article is that to successfully recover a database using backups, you need to practice to make sure you know what to do. You don't want to be learning the syntax for the RESTORE command during a high-pressure disaster-recovery situation. You may also find that your backup strategy does not allow you to recover within your business requirements. Maybe the backups take too long to restore, maybe your log backups are accidentally overwriting each other, or maybe you forgot to back up the server certificate used to enable transparent database encryption in SQL Server 2008.

By far the best way to prepare for disaster is to have a restore plan that lists the steps to go through, and to have a set of scripts that will help identify what backups exist and the order in which to restore them. I always like to say that this should be written by the most senior DBA on the team and tested by the most junior DBA -- to ensure that everyone can follow the steps safely. However, if you're an involuntary DBA, you're going to need to put a plan together yourself and make sure you can follow it.

Poster de Características y Componentes de Windows 2008 y Windows 2008 R2



Brief Description
Windows Server 2008 y Windows Server 2008 R2 Component Posters, originally printed in the July 2007 issue of TechNet Magazine.

Overview
These two posters, originally published in the July 2007 issue of TechNet Magazine, provide a strong visual tool to aide in the understanding of various features and components of Windows Server 2008. One poster focuses exclusively on powerful new Active Directory technologies, while the other provides a technical look at a variety of new features available in Windows Server 2008 (such as Server Core, Network Access Protection, and more).

http://www.microsoft.com/downloads/details.aspx?FamilyID=C2B9E44E-0BBD-47CB-BC09-B3D48BE7F867&displayLang=en

http://www.microsoft.com/downloads/details.aspx?FamilyID=64a5cc28-f8a1-4b30-a4a2-455c65bda8d7&displaylang=en

jueves, 10 de diciembre de 2009

Boletines de seguridad de Diciembre 2009



Este pasado martes Microsoft ha publicado seis boletines de seguridad (del MS09-069 y MS09-074) correspondientes a su ciclo habitual de actualizaciones, que corrigen un total de doce vulnerabilidades. Según la propia clasificación de Microsoft tres de los boletines presentan un nivel de gravedad "crítico", mientras que los tres restantes son "importantes".

Los boletines "críticos" son:

* MS09-071: Actualización destinada a corregir dos vulnerabilidades en el Servicio de autenticación de Internet al tratar los intentos de autenticación PEAP. Sólo están afectados los servidores con el Servicio de Autenticación de Internet cuando usan PEAP con la autenticación MS-CHAP v2. Estos problemas que afectan a Windows 2000, XP, Vista, Server 2003 y Server 2008, podrían permitir la ejecución remota de código.

* MS09-072: Actualización acumulativa para Microsoft Internet Explorer que además soluciona cinco nuevas vulnerabilidades que podrían permitir la ejecución remota de código arbitrario. Afecta a Internet Explorer 5.01, 6, 7 y 8.

* MS09-074: Actualización de seguridad para evitar una vulnerabilidad Microsoft Office Project, que podría permitir la ejecución remota de código si un usuario abre un archivo de Project especialmente creado. Afecta a Project 2000, 2002 y Office Project 2003.

Los boletines clasificados como "importantes" son:

* MS09-069: Actualización destinada a corregir una vulnerabilidad de denegación de servicio, si en un sistema afectado un usuario remoto autenticado envía mediante protocolo IPSEC un mensaje ISAKMP especialmente diseñado al Servicio LSASS (Subsistema de Autenticación de la Autoridad de Seguridad Local).

* MS09-070: Actualización que soluciona dos vulnerabilidades en Servicios de federación de Active Directory (ADFS, Active Directory Federation Services). Un usuario remoto autenticado podría lograr la ejecución remota de código si envía una petición http especialmente diseñada a un servidor web habilitado para ADFS.

* MS09-073: Actualización que soluciona una vulnerabilidad en Microsoft WordPad y Office Word, que podría permitir la ejecución remota de código si un usuario abre un archivo Word 97 específicamente manipulado.

Las actualizaciones publicadas pueden descargarse a través de Windows Update o consultando los boletines de Microsoft donde se incluyen las direcciones de descarga directa de cada parche. Dada la gravedad de las vulnerabilidades se recomienda la actualización de los sistemas con la mayor brevedad posible


Más Información:

Boletín de seguridad de Microsoft MS09-071 - Crítico
Vulnerabilidades en el Servicio de autenticación de Internet podría permitir la ejecución remota de código (974318)
http://www.microsoft.com/spain/technet/security/Bulletin/ms09-071.mspx

Boletín de seguridad de Microsoft MS09-072 - Crítico
Actualización de seguridad acumulativa para Internet Explorer (976325)
http://www.microsoft.com/spain/technet/security/Bulletin/ms09-072.mspx

Boletín de seguridad de Microsoft MS09-074 - Crítico
Una vulnerabilidad en Microsoft Office Project podría permitir la ejecución remota de código (967183)
http://www.microsoft.com/spain/technet/security/Bulletin/ms09-074.mspx

Boletín de seguridad de Microsoft MS09-069 - Importante
Una vulnerabilidad en el servicio del subsistema de autoridad de seguridad local podría permitir la denegación de servicio (974392)
http://www.microsoft.com/spain/technet/security/Bulletin/ms09-069.mspx

Boletín de seguridad de Microsoft MS09-070 - Importante
Vulnerabilidades en Servicios de federación de Active Directory podrían permitir la ejecución remota de código (971726)
http://www.microsoft.com/spain/technet/security/Bulletin/ms09-070.mspx

Boletín de seguridad de Microsoft MS09-073 - Importante
Una vulnerabilidad en los convertidores de texto de WordPad y Office podría permitir la ejecución remota de código (975539)
http://www.microsoft.com/spain/technet/security/Bulletin/ms09-073.mspx

miércoles, 9 de diciembre de 2009

December 2009 Security Release ISO Image

Esta ISO contiene los security updates de Windows que publicados en Windows Update el 8 de Diciembre de 2009. Este DVD está orientado a administradores que necesitan descargar diferentes lenguajes de las actualizaciones para diferentes versiones de Sistema Operativo y no usan soluciones tipo WSUS, SMS o System Center Configuration manager.

Importante:
Asegurate de chequear cadea uno de los updates desde http://www.microsoft.com/technet/security antes de implementarlos.

http://www.microsoft.com/downloads/details.aspx?FamilyID=015876AE-2335-48E3-8B60-0E7D7D7EAAB2&displaylang=en

Overview
This DVD5 ISO image file contains the security updates for Windows released on Windows Update on December 8th, 2009. The image does not contain security updates for other Microsoft products. This DVD5 ISO image is intended for administrators that need to download multiple individual language versions of each security update and that do not use an automated solution such as Windows Server Update Services (WSUS). You can use this ISO image to download multiple updates in all languages at the same time.

Important: Be sure to check the individual security bulletins at http://www.microsoft.com/technet/security prior to deployment of these updates to ensure that the files have not been updated at a later date.


http://www.microsoft.com/downloads/details.aspx?FamilyID=015876AE-2335-48E3-8B60-0E7D7D7EAAB2&displaylang=en

This DVD5 image contains the following updates:
KB951748 / (MS08-037)
Windows 2000 - 24 languages
KB972187 / (MS08-076)
Windows XP - 24 languages
KB974392 / (MS09-069)
Windows 2000 - 24 languages
Windows Server 2003 - 18 languages
Windows Server 2003 x64 Edition - 11 languages
Windows Server 2003 for Itanium-based Systems - 4 languages
Windows XP - 24 languages
Windows XP x64 Edition - 2 languages
KB971726 / (MS09-070)
Windows Server 2003 - 18 languages
Windows Server 2003 x64 Edition - 11 languages
Windows Server 2008 - 19 languages
Windows Server 2008 x64 Edition - 19 languages
KB974318 / (MS09-071)
Windows 2000 - 24 languages
Windows Server 2003 - 18 languages
Windows Server 2003 x64 Edition - 11 languages
Windows Server 2003 for Itanium-based Systems - 4 languages
Windows XP - 24 languages
Windows XP x64 Edition - 2 languages
Windows Vista - 36 languages
Windows Vista for x64-based Systems - 36 languages
Windows Server 2008 - 19 languages
Windows Server 2008 x64 Edition - 19 languages
Windows Server 2008 for Itanium-based Systems - 4 languages
KB976325 / (MS09-072)
Windows 2000 - 24 languages
Windows Server 2003 - 18 languages
Windows Server 2003 x64 Edition - 11 languages
Windows Server 2003 for Itanium-based Systems - 4 languages
Windows XP - 24 languages
Windows XP x64 Edition - 2 languages
Windows Vista - 36 languages
Windows Vista for x64-based Systems - 36 languages
Windows Server 2008 - 19 languages
Windows Server 2008 x64 Edition - 19 languages
Windows Server 2008 for Itanium-based Systems - 4 languages
Windows 7 - 36 languages
Windows 7 for x64-based Systems - 36 languages
Windows Server 2008 R2 x64 Edition - 19 languages
Windows Server 2008 R2 for Itanium-based Systems - 4 languages
KB973904 / (MS09-073)
Windows 2000 - 24 languages
Windows Server 2003 - 18 languages
Windows Server 2003 x64 Edition - 11 languages
Windows Server 2003 for Itanium-based Systems - 4 languages
Windows XP - 24 languages
Windows XP x64 Edition - 2 languages

Fin de Soporte para SQL Server 2005 Service Pack 2 y SQL Server 2008 RTM

Recordaros a todos que el soporte para SQL Server 2005 Service Pack 2 (SP2) termina el 12 de Enero de 2010 y el soporte para SQL Server 2008 RTM terminará el 13 de Abril de 2010. Microsoft termina el soporte para estos productos como parte de su política de soporte para Service packs que podeis consultar en el siguiente enlace:

http://support.microsoft.com/lifecycle.


Ambos productos no recibirán asistencia ni actualizaciones por parte de Microsoft en las fechas de fin de soporte.
La auto ayuda online seguirá estando disponible un mínimo de 12 meses después de la finalización del ciclo de vida. Las opciones de autoayuda incluyen:

- Public knowledge base articles
- FAQs
- Troubleshooting tools disponibles desde http://support.microsoft.com y Microsoft Download Center.

Más información desde el enlace:

http://blogs.msdn.com/sqlreleaseservices/archive/2009/10/08/end-of-service-pack-support-for-sql-server-2005-sp2-and-sql-server-2008-rtm.aspx

jueves, 3 de diciembre de 2009

Windows Catalog

En este artículo se describe cómo descargar actualizaciones desde el Catálogo de Windows Update.

http://catalog.update.microsoft.com

El Catálogo de Windows Update ofrece actualizaciones para todos los sistemas operativos que se admiten actualmente. Entre estas actualizaciones se incluyen las siguientes:

- Controladores de dispositivo
- Revisiones
- Archivos de sistema actualizados
- Service Pack
- Nuevas características de Windows
Le guiaremos por los diferentes pasos para buscar el Catálogo de Windows Update y encontrar las actualizaciones que desea. Después, puede descargar las actualizaciones para instalarlas en su red doméstica o corporativa de los equipos basados en Microsoft Windows.

También trataremos cómo los profesionales de TI pueden utilizar Software Update Services, como Windows Update y Actualizaciones automáticas.

Importante: este contenido está pensado para usuarios avanzados de equipos informáticos. Se recomienda que sólo los usuarios avanzados y los administradores descarguen actualizaciones del Catálogo de Windows Update. Si no es un usuario avanzado ni un administrador, visite el siguiente sitio web de Microsoft para descargar directamente las actualizaciones:

http://windowsupdate.microsoft.com



Para descargar actualizaciones desde el Catálogo de Windows Update, siga estos pasos:


Paso 1: obtener acceso al Catálogo de Windows Update
Para obtener acceso al Catálogo de Windows Update, visite el siguiente sitio web de Microsoft:
http://catalog.update.microsoft.com/v7/site/Home.aspx (http://go.microsoft.com/fwlink/?LinkId=8973)
Para ver una lista de las preguntas más frecuentes sobre el Catálogo de Windows Update, visite el siguiente sitio web de Microsoft:
http://catalog.update.microsoft.com/v7/site/Faq.aspx (http://catalog.update.microsoft.com/v7/site/Faq.aspx)


Paso 2: buscar actualizaciones en el Catálogo de Windows Update

Para buscar actualizaciones en el Catálogo de Windows Update, siga estos pasos:
En el cuadro de texto Buscar, escriba los términos de búsqueda. Por ejemplo, podría escribir Seguridad de Windows Vista.
Haga clic en Buscar o presione ENTRAR.
Explore la lista que se muestra para seleccionar las actualizaciones que desea descargar.
Haga clic en Agregar en cada selección para agregarla a la cesta de descarga.
Para buscar actualizaciones adicionales para descargarlas, repita los pasos de 2a
a 2d.


Paso 3: descargar actualizaciones

Para descargar actualizaciones en el Catálogo de Windows Update, siga estos pasos:
Haga clic en Ver cesta en el cuadro Buscar para ver la cesta de descarga.
Compruebe la lista de actualizaciones y, a continuación, haga clic en Descargar.

Nota: si se le pide, haga clic en Aceptar para aceptar el contrato de licencia.
Seleccione la ubicación donde desea guardar las actualizaciones. Puede escribir la ruta completa de la carpeta o bien hacer clic en Examinar para buscarla.
Haga clic en Continuar para iniciar la descarga.
Una vez finalizada la descarga, haga clic en Cerrar para cerrar la ventana de descarga.
Cierre la ventana del Catálogo de Windows Update.
Encuentre la ubicación especificada en el paso 3c.
Nota: si ha descargado controladores de dispositivos para su instalación, vaya a "Instalar controladores".
Haga doble clic en cada actualización y, a continuación, siga las instrucciones para instalar la actualización. Si las actualizaciones están destinadas a otro equipo, copie las actualizaciones en dicho equipo y, a continuación, haga doble clic en las actualizaciones para instalarlas.
Si todos los elementos que ha agregado a la cesta de descarga están instalados correctamente, ya ha terminado.

Si desea obtener información sobre servicios de actualizaciones adicionales, consulte la sección "Software Update Services para profesionales de TI".
Instalar controladores
Abra un símbolo del sistema desde el menú Inicio.
Para extraer los archivos del controlador, escriba el comando siguiente en el símbolo del sistema y presione ENTRAR:

expand -F:*

Para preparar el controlador para una instalación plug and play o para el Asistente para agregar impresoras, utilice PnPutil tal como se describe en el siguiente artículo de Microsoft Knowledge Base:

937793 (http://support.microsoft.com/kb/937793/ ) Preparación e instalación de paquetes de controlador con la utilidad PnP (pnputil.exe) en Windows Vista

Nota: para instalar un controlador de impresora para múltiples arquitecturas, debe haber instalado el controlador de arquitectura local, y todavía necesitará la copia para múltiples arquitecturas de Ntprint.inf de otro sistema. Para obtener más información, haga clic en el número de artículo siguiente para verlo en Microsoft Knowledge Base:

952065 (http://support.microsoft.com/kb/952065/ ) No puede instalar controladores de impresora de terceros para múltiples arquitecturas en Windows Vista o Windows Server 2008

martes, 17 de noviembre de 2009

How To: Export local Group Policy settings made in gpedit.msc

This is a good solution on how you can “export” the Group Policy and Security settings you made in on a machine with the Local Group Policy Editor (gpedit.msc) to other machines pretty easy:

Normal settings can be copied like this:

1.) Open %systemroot%\system32\grouppolicy\

Within this folder, there are two folders - “machine” and “user”. Copy these to folders to the “%systemroot%\system32\grouppolicy - folder on the target machine. All it needs now is a reboot or a “gpupdate /force”.

Note: If you cannot see the “grouppolicy” folder on either the source or the target machine, be sure to have your explorer folder options set to “Show hidden files and folders”…

For security settings:

1.) Open MMC and add the Snapin “Security Templates”.

2.) Create your own customized template and save it as an “*inf” file.

3.) Copy the file to the target machine and import it via command line tool “secedit”:

secedit /configure /db %temp%\temp.sdb /cfg yourcreated.inf

Further information on secedit can be found here: http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/secedit_cmds.mspx?mfr=true

If you’re building custom installations, you can pretty easy script the “overwriting” of the “machine”/”user”-folders or the import via secedit by copying these file to a share and copy and execute them with a script.

viernes, 13 de noviembre de 2009

Presentaciones de Windows 2008 R2 y Windows 7

Estimados todos,
a continuación os dejo diferentes presentaciones sobre Windows 2008 R2 y Windows 7 que espero que sean de vuestro agrado.

Licensing Your Windows Server 2008 and Windows Vista Deployments - TechEd 2009 Presentation

http://download.microsoft.com/download/8/C/2/8C21BAFE-3432-48D1-962A-F7A9DD54A2AC/Licensing%20Your%20Windows%20Server%202008%20and%20Windows%20Vista%20Deployments.pptx

Windows 7 and Windows Server 2008 R2 Kernel Changes - TechEd 2009 Presentation

http://download.microsoft.com/download/8/C/2/8C21BAFE-3432-48D1-962A-F7A9DD54A2AC/Windows%207%20and%20Windows%20Server%202008%20R2%20Kernel%20Changes.pptx

Windows Server 2008 R2 - A Technical Overview - TechEd 2009 Presentation

http://download.microsoft.com/download/8/C/2/8C21BAFE-3432-48D1-962A-F7A9DD54A2AC/Windows%20Server%202008%20R2%20-%20A%20Technical%20Overview.pptx

Microsoft Exchange Server 2007 Service Pack 2 Help

Brief Description
This download contains a standalone version of Microsoft Exchange Server 2007 SP2 Help.

Overview
The Exchange Server 2007 SP2 Help can help you in the day-to-day administration of Exchange. Use this information to guide you through Exchange Server 2007 SP2 features, tasks, and administration procedures.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=85c5ef71-6a1f-4eb0-9ff3-3feee6057e96

Microsoft Baseline Security Analyzer 2.1.1 (for IT Professionals)

Brief Description
The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing security updates and common security misconfigurations. MBSA 2.1.1 is a minor upgrade to add support for Windows 7 and Windows Server 2008 R2.

Overview

To easily assess the security state of Windows machines, Microsoft offers the free Microsoft Baseline Security Analyzer (MBSA) scan tool. MBSA includes a graphical and command line interface that can perform local or remote scans of Microsoft Windows systems.

MBSA 2.1.1 builds on previous versions by adding support for Windows 7 and Windows Server 2008 R2. As with the previous MBSA 2.1 release, MBSA includes 64-bit installation, security update and vulnerability assessment (VA) checks, improved SQL Server 2005 checks, and support for the latest Windows Update Agent (WUA) and Microsoft Update technologies. More information on the capabilities of MBSA 2.1 and 2.1.1 is available on the MBSA Web site.

MBSA 2.1.1 runs on Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP and Windows 2000 systems and will scan for missing security updates, rollups and service packs using Microsoft Update technologies. MBSA will also scan for common security misconfigurations (also called Vulnerability Assessment checks) using a known list of less secure settings and configurations for all versions of Windows, Internet Information Server (IIS) 5.0, 6.0 and 6.1, SQL Server 2000 and 2005, Internet Explorer (IE) 5.01 and later, and Office 2000, 2002 and 2003 only.

To assess missing security updates, MBSA will only scan for missing security updates, update rollups and service packs available from Microsoft Update. MBSA will not scan or report missing non-security updates, tools or drivers.
Choose the appropriate download below for English (EN), German (DE), French (FR) and Japanese (JA) for x86 (32-bit) or x64 (64-bit) platforms.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=b1e76bbe-71df-41e8-8b52-c871d012ba78

Consideración importante para clusteres de Windows Server 2008

Extraído integramente del Blog de David Cervigón os pongo el enlace y resumo este grave problema que ha descubierto Microsoft en Clusteres de Windows 2008.

http://blogs.technet.com/davidcervigon/archive/2009/11/12/consideraci-n-importante-para-clusteres-de-windows-server-2008.aspx

--------------------------------------------------------------------------

Se están dando algunos casos de clústeres de Windows Server 2008 en los que los procesos RSH (Resource Monitor Host) se caen o entran en estados de “deadlock”, lo que en los casos más graves puede acabar produciendo fallos en los recursos existentes en cada uno de los grupos. En otras circunstancias los procesos se reinician y el problema puede llegar a pasar desapercibido.

En el par de casos que me ha tocado vivir, los afectados principales han sido los recursos de disco y el propio nombre del cluster. Esto produce la caída de cualquier cosa que dependa de esos discos, con el agravante de que al no estar disponible el network name el uso de la consola de gestión se hace complicada, sobre todo en remoto. Y a mayor número de nodos, mayor probabilidad de encontrarnos el problema, y mayor complicación a la hora de resolverlo.

Una vez experimentados estos síntomas, cuando nos ponemos a rascar, nos encontramos este tipo de información en el visor de sucesos y en el log del cluster:

•Event ID: 1146 - The cluster resource host subsystem (RHS) stopped unexpectedly. An attempt will be made to restart it. This is usually due to a problem in a resource DLL. Please determine which resource DLL is causing the issue and report the problem to the resource vendor
•Cluster.log: Múltiples ocurrencias de ERROR_RESOURCE_CALL_TIMED_OUT(5910)
En los casos en los que el sistema es capaz de recuperarse solo, hay otra manera de detectar el problema, también bastante sutil. Cuando falla el monitor de un recurso, el sistema lo marca para que se ejecute en un proceso diferente, lo que dispara el numero de procesos RSH.exe que podemos ver en el task manager. Si ejecutamos este comando, podemos ver en que recursos tenemos esa casilla marcada (SeparateMonitor = 0x1), y si no lo hemos hecho a propósito puede que haya estada afectada por el problema:

•cluster res /prop |findstr SeparateMonitor


La solución

Paradójicamente, la solución al problema está oculta detrás de un paquete de recomendaciones que se viene aplicando a problemas de lentitud de red en Windows Vista y en Windows Server 2008, curiosamente debido a las optimizaciones de red incluidas en estos sistemas operativos (TCP Offload, Receive-side scaling (RSS), TCP Window Scaling Auto Tunning, etc.).

Así es que para prevenir/resolver este problema hay que seguir estos pasos en todos los nodos del cluster

•Aplicar el fix mencionado en http://support.microsoft.com/default.aspx?scid=kb;EN-US;967224, para asegurarnos de que los cambios que hagamos en el paso siguiente tengan el resultado esperado.
•Ejecutar:
◦Netsh int tcp set global RSS=Disabled
◦Netsh int tcp set global chimney=Disabled
◦Netsh int tcp set global autotuninglevel=Disabled
◦Netsh int tcp set global congestionprovider=None
◦Netsh int tcp set global ecncapability=Disabled
◦Netsh int ip set global taskoffload=disabled
◦Netsh int tcp set global timestamps=Disabled
•Adicionalmente, y dado que no vamos a usar esas opciones a nivel de sistema operativo, pueden deshabilitarse también a nivel de opciones avanzadas del driver de la tarjeta de red:





Una vez aplicados los cambios en todos los nodos, los reiniciamos ordenadamente para que estos apliquen, y comprobamos que todos los servicios que corran encima lo estén haciendo correctamente. Es posible que queramos volver a poner los valores “SeparateMonitor” a cero, como era el defecto. Lo podemos hacer con el comando cluster.exe, o bien por la interfaz gráfica (última casilla de la imagen , marcada es 1 y desmarcada es 0):



Espero que esto os pueda ahorrar algún disgusto, acompañado de unas cuantas horas de agobio en clústeres que estén corriendo algún tipo de servicio crítico en vuestra organización.

martes, 15 de septiembre de 2009

Group Policy Settings References for Windows and Windows Server



Estimados todos,
aquí os dejo un enlace donde podréis descargar todos los settings de políticas de grupo para Windows y Windows Server.

Group Policy Settings References for Windows and Windows Server
Brief Description
These spreadsheets list the policy settings for computer and user configurations included in the Administrative template files delivered with the Windows operating systems specified. You can configure these policy settings when you edit Group Policy objects (GPOs).

Overview
Using column filters, you can filter the information in these spreadsheets by operating system, component, or computer or user configuration. You can also search for information by using text or keywords.
These spreadsheets include the following categories of security policy settings: Account Policies (Password Policy, Account Lockout Policy, and Kerberos Policy), Local Policies (Audit Policy, User Rights Assignment, and Security Options), Event Log, Restricted Groups, System Services, Registry, and File System policy settings. These spreadsheets do not include security settings that exist outside of the Security Settings extension (scecli.dll), such as Wireless Network extension, Public Key Policies, or Software Restriction Policies.

Group Policy Settings Reference for Windows Server 2008 R2 and Windows 7: This spreadsheet lists the policy settings for computer and user configurations included in the Administrative template files (.admx/.adml) delivered with Windows Server 2008 R2 and Windows 7. The policy settings included in this spreadsheet cover Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows Vista with SP1, Windows Server 2003 with SP2 and earlier service packs, Windows XP Professional with SP2 and earlier service packs, and Windows 2000 with SP4 and earlier service packs.
Group Policy Settings Reference for Windows Server 2008 and Windows Vista Service Pack 1: This spreadsheet lists the policy settings for computer and user configurations included in the Administrative template files (.admx/.adml) delivered with Windows Server 2008 and Windows Vista with Service Pack 1 (SP1). The policy settings included in this spreadsheet cover Windows Server 2008, Windows Vista with SP1, Windows Server 2003, Windows XP Professional with SP2 or earlier service packs, and Windows 2000 with SP4 or earlier service packs.
Group Policy Settings Reference for Windows Vista: This spreadsheet lists the policy settings for computer and user configurations included in the Administrative template files (.admx/.adml) delivered with Windows Vista with no service packs installed. The policy settings included in this spreadsheet cover Windows Vista, Microsoft Windows Server 2003, Windows XP Professional with SP2 or earlier service packs, and Windows 2000 with SP4 or earlier service packs.
Group Policy Settings Reference for Windows Server 2003 Service Pack 2: This spreadsheet lists the policy settings for computer and user configurations included in the Administrative template (.adm) files and Security Settings that shipped with Windows Server 2003 with SP2. The policy settings included in this spreadsheet cover Microsoft Windows Server 2003 with SP2 or earlier service packs, Windows XP Professional with SP3 or earlier service packs, and Microsoft Windows 2000 with SP4 or earlier service packs.
This spreadsheet includes separate worksheets for each of the .adm files and the security policy settings that shipped in Windows XP SP3, a consolidated worksheet for easy searching, and an Update History worksheet that lists policy settings that have been added since the Windows Server 2003 operating systems were released.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=18c90c80-8b0a-4906-a4f5-ff24cc2030fb

Windows 7 y Windows 2008 R2 Upgrade Paths




Hola a todos,
os dejo dos documentos que explican los posibles pasos de actualización desde diferentes sistemas operativos a Windows 7 y Windows 2008 R2.

Windows 7 Upgrade Paths
Brief Description
Outlines supported and unsupported upgrade paths for Windows 7 SKUs.

Overview
This document outlines supported and unsupported upgrade paths for Windows® 7 SKUs.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=e170eba1-5bab-401f-bbf5-00f0ee7fe0fb

Windows Server 2008 R2 Upgrade Paths
Brief Description
Outlines supported and unsupported upgrade paths for Windows Server 2008 R2 SKUs.

Overview
This document outlines supported and unsupported upgrade paths for Windows Server® 2008 R2 SKUs.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=f2d08680-0875-44d3-bb5f-c5b05ac7201b

viernes, 4 de septiembre de 2009

Downloadable Technical Library in Compiled Help format

Estimados todos,
hoy os dejo unos enlaces que seguro os van a ser de utilidad. Cuantas veces necesitais consultar el TechNet Online de algún producto y pensais que os gustaría descargarlo completamente a vuestro PC para futuras consultas. Hoy os traigo los enlaces para bajar en formato CHM algunas guías. Según sigan saliendo las iremos incorporando.


Microsoft Search Server 2008 Technical Library in Compiled Help format

Brief Description

Downloadable CHM version of Search Server 2008 content on TechNet.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=6cf0f7b6-c0a7-48f8-977e-9bc76b97ff98

Office SharePoint Server 2007 Technical Library in Compiled Help format

Brief Description

Downloadable CHM version of SharePoint Server content on TechNet.
On This Page

http://www.microsoft.com/downloads/details.aspx?familyid=ba006584-711d-4ce7-9e1f-181aedf6434a&displaylang=en

Windows SharePoint Services 3.0 Technical Library in Compiled Help format

Brief Description

Downloadable CHM version of Windows SharePoint Services 3.0 content on TechNet.

http://www.microsoft.com/downloads/details.aspx?FamilyID=c9d6c8c5-8a62-4961-8c1b-df08b667b1c4&displaylang=en

Microsoft SQL Server 2008 Technical Library in Compiled Help format (July 2009)

Brief Description

Download the documentation and tutorials for Microsoft SQL Server 2008.

http://www.microsoft.com/downloads/details.aspx?familyid=765433F7-0983-4D7A-B628-0A98145BCB97&displaylang=en

Office Project Server 2007 Technical Library in Compiled Help format

Brief Description

Downloadable CHM version of Project Server content on TechNet.

http://www.microsoft.com/downloads/details.aspx?familyid=7D243A2C-90B7-425D-B586-C48A0C3BEBBB&displaylang=en

lunes, 31 de agosto de 2009

SQL Server 2008 Migration White Papers




Hola a todos,
aquí os dejo un enlace a varios White Papers de Microsoft que ofrecen ayuda y recursos para migrar desde diferentes gestores de Bases de Datos de terceros a Microsoft SQL Server 2008. Algunos de estois gestores son:

- MySQL
- Oracle
- Informix
- Sybase ASA
- Sybase ASE

Espero os sea de utilidad.

SQL Server 2008 Migration White Papers
Brief Description
Read white papers for guidance on how to migrate to Microsoft SQL Server 2008 from other database products.

Overview
SQL Server 2008 delivers exceptional value in database management and business intelligence causing many customers to choose SQL Server over other database solutions. The white papers available here will help you find the resources needed to migrate your data to SQL Server 2008.
Guide to Migrating from MySQL to SQL Server 2008
In this migration guide you will learn the differences between the MySQL and SQL Server 2008 database platforms, and the steps necessary to convert a MySQL database to SQL Server.
Guide to Migrating from Oracle to SQL Server 2008
This white paper explores challenges that arise when you migrate from an Oracle 7.3 database or later to SQL Server 2008. It describes the implementation differences of database objects, SQL dialects, and procedural code between the two platforms. The entire migration process using SQL Server Migration Assistant (SSMA) 2008 for Oracle is explained in depth, with a special focus on converting database objects and PL/SQL code.
Guide to Migrating from Informix to SQL Server 2008
This white paper explores challenges that arise when you migrate from an Informix 11 database to SQL Server 2008. It describes the implementation differences of database objects and procedural code between the two platforms. Emulation of system functions is also discussed.
Guide to Migrating from Sybase ASA to SQL Server 2008
This white paper explores challenges that arise when you migrate from a Sybase Adaptive Server Anywhere (ASA) database of version 9 or later to SQL Server 2008. It describes the implementation differences of database objects, SQL dialects, and procedural code between the two platforms.
Guide to Migrating from Sybase ASE to SQL Server 2008
This white paper covers known issues for migrating Sybase Adaptive Server Enterprise database to SQL Server 2008. Instructions for handling the differences between the two platforms are included. The paper describes how SQL Server Migration Assistant, the best tool for this type of migration, can help resolve various migration issues.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=c7933d3e-b7b9-43a6-ade3-f8e37c8cb046

lunes, 24 de agosto de 2009

Windows 2008: Read Only Domain Controllers (RODCs)



Aquí os dejo unos breves apuntes sobre Read-Only Domain Controllers en Windows 2008, un video de como instalarlo y enlaces oficiales de Microsoft, que incluyen:

- Whitepaper: Planning and Deploying Read-Only Domain Controllers
- TechNet: Deploying RODCs in the Perimeter Network
- TechNet: Administering RODCs in Branch Offices


Using Read-Only Domain Controllers
----------------------------------------------------
The RODC is designed to address the branch office scenario.
An RODC is a DC that maintains a copy of all objects in the domain and all Attributes except confidential attributes (secrets) such as password-related properties. When a user in the branch office logs on, the RODC receives the
request and forwards it to a DC in the hub site for authentication.

You are able to configure a password replication policy (PRP) for the RODC that specifies user accounts the RODC is allowed to cache. If the user logging on is included in the PRP,the RODC caches that user’s credentials so that the next time the user requests authentication, the RODC can perform the task locally. As users who are included in the PRP log on, the RODC builds its cache of credentials so that it can perform authentication locally for those users.

Deploying an RODC
----------------------------------
The high-level steps to install an RODC are as follows:

1. Ensure that the forest functional level is Windows Server 2003 or higher.
2. If the forest has any domain controllers running Microsoft Windows Server 2003, run
adprep /rodcprep
3. Ensure that at least one writable domain controller is running Windows Server 2008
4. Install the RODC.

If you are upgrading an existing forest to include DCs running W2008, you must run the command adprep /rodcprep.

This command configures permissions so that RODCs are able to replicate DNS application directory partitions. If you are creating a new Active Directory forest that contains only DCs running W2008, you do not need to run adprep /rodcprep.

You can find the adprep command in the cdrom\Sources\Adprep folder of the Windows Server 2008 installation DVD.

An RODC must replicate domain updates from a writable DC running W2008, and the RODC must be able to establish a replication connection with the writable W2008 DC.
Ideally, the writable W2008 DC should be in the closest site—the hub site. If you want the RODC to act as a DNS server, the writable W2008 DC must also host the DNS domain zone.

Installing an RODC
--------------------------------------
After you complete the preparatory steps, you can install an RODC on either a full or Server Core installation of W2008. On a full installation of W2008, you can use the Active Directory Domain Services Installation Wizard to create an RODC.
You select Read-Only Domain Controller (RODC) on the Additional Domain Controller Options page of the wizard

Alternatively, you can use the dcpromo command with the /unattend switch to create the RODC.
On a Server Core installation of W2008, you must use the dcpromo /unattend command.

Your answer file would be similar to the following:

[DCInstall]
Username=Pepe_Perez
Password=P@ssw0rd
UserDomain=windowsmeconfunde.internal
InstallDns=yes
ConfirmGC=yes
ReplicaOrNewDomain=ReadOnlyReplica
ReplicaDomainDNSName=windowsmeconfunde.internal
Sitename=MyBranch
databasePath="e:\ntds"
logPath="e:\ntdslogs"
sysvolpath:"f:\sysvol"
SafeModeAdminPassword:P@ssw0rd
RebootOnCompletion:yes


Password Replication Policy
----------------------------------------
PRP determines which users’ credentials can be cached on a specific RODC. If PRP allows an RODC to cache a user’s credentials, that user’s authentication and service ticket activities can be processed by the RODC. If a user’s credentials cannot be cached on an RODC, authentication and service ticket activities are referred to a writable domain controller by the RODC.

An RODC PRP is determined by two multivalued attributes of the RODC computer account.
These attributes are known as:

- Allowed List
-----------------
If a user’s account is on the Allowed List, the user’s credentials are cached. You can include groups on the Allowed List, in which case, all users who belong to the group can have their credentials cached on the RODC.

- Denied List
------------
If a user’s account is on the Denied List, the user’s credentials are not cached. You can include groups on the Denied List, in which case, all users who belong to the group can not have their credentials cached on the RODC.

If a user is on both the Allowed List and the Denied List, that user’s credentials will not be cached—the Denied List takes precedence

Configuring Domain-Wide Password Replication Policy
-----------------------------------------------------------
To facilitate the management of PRP, W2008 creates two domain local security groups in the Users container of AD DS.

- Allowed RODC Password Replication Group
-------------------------------------------
Is added to the Allowed List of each new RODC. By default, the group has no members.
Therefore, by default, a new RODC will not cache any user’s credentials. If there are users whose credentials you want all domain RODCs to cache, add those users to the Allowed RODC Password Replication Group.

- Denied RODC Password Replication Group
------------------------------------------
It is added to the Denied List of each new RODC. If there are users whose credentials you want to ensure domain RODCs never cache, add those users to the Denied RODC Password Replication Group. By default, this group contains security-sensitive accounts that are members of groups such as Domain Admins, Enterprise Admins, and Group Policy Creator Owners.

Configuring an RODC-Specific Password Replication Policy
---------------------------------------------------------------
The Allowed RODC Password Replication Group and Denied RODC Password Replication
Group provide a method of managing PRP on all RODCs. However, you typically need to
allow the RODC in each branch office to cache user and computer credentials for that specific location. Therefore, you must configure the Allowed List and the Denied List of each RODC.
To configure an RODC PRP, open the properties of the RODC computer account in the
Domain Controllers OU. On the Password Replication Policy tab, you can view the current PRP settings and add or remove users or groups from the PRP.

Administering Credentials Caching on an RODC
-----------------------------------------------------
When you click the Advanced button on the Password Replication Policy tab,the Advanced Password Replication Policy dialog box appears.

The drop-down list at the top of the Policy Usage tab enables you to select one of the following RODC reports:

- Accounts Whose Passwords Are Stored On This Read-Only Domain Controller--------------------------------------------------------------------------
This report displays the list of user and computer credentials currently cached on the RODC. You can use this list to determine whether credentials are being cached that you do not want to be cached on the RODC and modify the PRP accordingly.

- Accounts That Have Been Authenticated To This Read-Only Domain Controller
-----------------------------------------------------------------------------
This report displays the list of user and computer credentials that have been referred to a writable domain controller for authentication or service ticket processing. You can use this list to identify users or computers that are attempting to authenticate with the RODC. If any of these accounts are not being cached and you want them to be, add them to the PRP.

The Resultant Policy tab of the Advanced Password Replication Policy dialog box enables
you to evaluate the effective caching policy for an individual user or computer.
Click Add to select a user or computer account for evaluation.

Video: How install a RODC
--------------------------------------------



More Inf:
-----------------

Planning and Deploying Read-Only Domain Controllers

A read-only domain controller (RODC) is a new type of domain controller in the Windows Server® 2008 operating system. This guide explains what RODCs are and how they function. See the Overview below for links to other guides about how to deploy them in various scenarios.

http://www.microsoft.com/downloads/details.aspx?familyid=AE33A129-FF41-4BEC-B2B7-6DDCD4998828&displaylang=en

Deploying RODCs in the Perimeter Network

This topic describes how to deploy a read only domain controller (RODC) in a perimeter network, thereby extending the corporate forest into the perimeter network.

http://technet.microsoft.com/en-us/library/dd728035(WS.10).aspx

Administering RODCs in Branch Offices

This topic provides guidelines for common administrative tasks for read-only domain controllers (RODCs) in branch offices:

-Using Remote Desktop to administer RODCs in branch offices
-Reestablishing replication for an RODC
-Checking the lastLogonTimeStamp attribute on an RODC to discover stale accounts in a branch office
-Resolving an account lockout problem in a branch office with an RODC
-Performing backups of an RODC

http://technet.microsoft.com/en-us/library/dd736126(WS.10).aspx

viernes, 21 de agosto de 2009

Windows Server 2008 R2 Evaluation for Intel-Based, Itanium, Virtual Hard Drive for Hyper-V, and Remote Server Administration Tools for Windows® 7







Windows Server 2008 R2 Evaluation for Itanium-Based Systems (180 days)
Brief Description
Windows Server 2008 R2 builds on the award-winning foundation of Windows Server 2008, expanding existing technology and adding new features to enable organizations to increase the reliability and flexibility of their server infrastructures.

Overview
This software is for evaluation and testing purposes. The evaluation is available in ISO format. Evaluating any version of Windows Server 2008 R2 software does not require entering a product key, however will require activation within 10 days. Failing to activate the evaluation will cause the licensing service to shut the machine down every hour (The 10 day activation period can be reset five (5) times by using the rearm command. See below for further information on activation rearm). Once activated, the evaluation will run for 180 days. After this time, you will need to uninstall the software or upgrade to a fully-licensed version of Windows Server 2008 R2 for Itanium-Based Systems.
This download is also available through our new Download Manager. This will ensure 100% completion rate, and accelerate download times on slower links.
To start this download via the Download Manager, please click here.

http://www.microsoft.com/downloads/en/results.aspx?displaylang=en&period=30&nr=50&sortCriteria=Date&sortOrder=Ascending&stype=s_adv

Windows Server 2008 R2 Evaluation (180 days)
Brief Description
Windows Server 2008 R2 builds on the award-winning foundation of Windows Server 2008, expanding existing technology and adding new features to enable organizations to increase the reliability and flexibility of their server infrastructures.

Overview
This software is for evaluation and testing purposes. The evaluation is available in ISO format. Web, Standard, Enterprise and Datacenter editions are available via the same download. You will be prompted for edition installation at setup. Evaluating any version of Windows Server 2008 R2 software does not require entering a product key, however will require activation within 10 days. Failing to activate the evaluation will cause the licensing service to shut the machine down every hour (The 10 day activation period can be reset five (5) times by using the rearm command. See below for further information on activation rearm). Once activated, the evaluation will run for 180 days. After this time, you will need to uninstall the software or upgrade to a fully-licensed version of Windows Server 2008 R2.
This download is also available through our new Download Manager. This will ensure 100% completion rate, and accelerate download times on slower links.
To start this download via the Download Manager, please click here.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=96a3a4b4-9453-4d30-97aa-c977560a0da4

Windows Server 2008 R2 Evaluation Virtual Hard Drive Images for Hyper-V (180 Days)
Brief Description
Windows Server 2008 R2 Evaluation Enterprise Edition and Server Core Virtual Hard Drive Images for Hyper-V

Overview
The Microsoft VHD format is the common virtualization file format for Hyper-V that provides a uniform product support system, and provides more seamless manageability, security, reliability and cost-efficiency for customers.
This VHD release is available in English only and is for evaluation and testing purposes. Evaluating any version of Windows Server 2008 R2 software does not require entering a product key, however will require activation within 10 days. Failing to activate the evaluation will cause the licensing service to shut the machine down every hour (The 10 day activation period can be reset four (4) times by using the rearm command. See below for further information on activation rearm). Once activated, the evaluation will run for 180 days. After this time, you will need to uninstall the software or upgrade to a fully-licensed version of Windows Server 2008 R2.
As this installation requires Hyper-V, you will need to have a base install of Windows Server 2008 (64-bit edition) or Windows Server 2008 R2, running Hyper-V. For more information on obtaining and installing the latest version of Hyper-V, please visit the Hyper-V Homepage.
Both virtual machines available here are running Windows Server 2008 R2 Enterprise Edition Evaluation. One is the default full installation, and the other has been configured as a default Core installation. For more information on the difference between full and core installation please see the Windows Server 2008 Editions Overview pages. For download options please see the IMAGE SELECTION section in the instructions below.
As both virtual machines do not have anti-virus installed, they should not be connected to any network until it has anti-virus installed.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=9040a4be-c3cf-44a5-9052-a70314452305

Remote Server Administration Tools for Windows 7
Brief Description
Remote Server Administration Tools for Windows® 7 enables IT administrators to manage roles and features that are installed on computers that are running Windows Server® 2008 R2, Windows Server® 2008, or Windows Server® 2003, from a remote computer that is running Windows 7.

Overview
Remote Server Administration Tools for Windows 7 enables IT administrators to manage roles and features that are installed on remote computers that are running Windows Server 2008 R2 (and, for some roles and features, Windows Server 2008 or Windows Server 2003) from a remote computer that is running Windows 7. It includes support for remote management of computers that are running either the Server Core or full installation options of Windows Server 2008 R2, and for some roles and features, Windows Server 2008. Some roles and features on Windows Server 2003 can be managed remotely by using Remote Server Administration Tools for Windows 7, although the Server Core installation option is not available with the Windows Server 2003 operating system.
This feature is comparable in functionality to the Windows Server 2003 Administrative Tools Pack and Remote Server Administration Tools for Windows Vista with Service Pack 1 (SP1).

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=7d2f6ad7-656b-4313-a005-4e344e43997d

lunes, 17 de agosto de 2009

TechNet Tour 2009: Lanzamiento Windows 7, Windows Server 2008 R2, Exchange server 2010



Otro año más Microsoft TechNet llega a tu ciudad con las novedades de los productos de Microsoft.
Este evento pretende dar conocimiento de las novedades en los nuevos productos de Microsoft, Windows 7, Windows Server 2008 R2, Exchange Server 2010, Forefront y System Center, en el evento se realizaran demostraciones de los productos.

Idiomas: Español.
Productos: Microsoft Exchange Server 2010, Microsoft Forefront Client Security, Microsoft Forefront Security for Exchange Server, Microsoft System Center Virtual Machine Manager, Microsoft System Center Virtual Machine Manager 2007, Microsoft Windows Small Business Server, Security, Windows 7, Windows Essential Business Server y Windows Server 2008 R2.
Audiencia(s): Generalista de IT y Gerente de IT.

Calendario

Ciudad Real - 16 de Septiembre de 2009
Madrid - 23 de Septiembre de 2009
Barcelona - 6 de Octubre de 2009
Murcia - 8 de Octubre de 2009
Valencia - 13 de Octubre de 2009
Málaga - 15 de Octubre de 2009
Sevilla - 20 de Octubre de 2009
Cáceres - 22 de Octubre de 2009
Valladolid - 29 de Octubre de 2009
A Coruña - 3 de Noviembre de 2009
Bilbao - 5 de Noviembre de 2009
Pamplona - 10 de Noviembre de 2009
Zaragoza - 12 de Noviembre de 2009
Palma de Mallorca - 17 de Noviembre de 2009
Logroño - 19 de Noviembre de 2009
Las Palmas - 24 de Noviembre de 2009
Tenerife - 26 de Noviembre de 2009

Más información y Registro

http://technet.microsoft.com/es-es/ee256076.aspx

jueves, 13 de agosto de 2009

Diagnosticos de Directorio Activo con Microsoft IT Environment Health Scanner



Microsoft IT Environment Health Scanner es una herramienta de diagnóstico diseñada para administradores de pequeñas o medianas empresas que necesitan comprobar la salud de sus servidores de directorio y de sus clientes.
Os añado la información original de Microsoft.

This tool identifies common problems that can prevent your network environment from functioning properly as well as problems that can interfere with infrastructure upgrades, deployments, and migration.

When run from a computer with the proper network access, the tool takes a few minutes to scan your IT environment, perform more than 100 separate checks, and collect and analyze information about the following:


- Configuration of sites and subnets in Active Directory
- Replication of Active Directory, the file system, and SYSVOL shared folders
- Name resolution by the Domain Name System (DNS)
- Configuration of the network adapters of all domain controllers, DNS servers, and e-mail servers running Microsoft Exchange Server
-Health of the domain controllers
- Configuration of the Network Time Protocol (NTP) for all domain controllers


If a problem is found, the tool describes the problem, indicates the severity, and links you to guidance at the Microsoft Web site (such as a Knowledge Base article) to help you resolve the problem. You can save or print a report for later review. The tool does not change anything on your computer or your network

System Requirements
Supported Operating Systems: Windows Server 2003 Service Pack 2; Windows Server 2008; Windows Vista Service Pack 1; Windows XP Service Pack 2

Note: make sure that you have installed the latest service packs and Windows operating system updates.

Required Software:

-.NET Framework 2.0
- Minimum Screen Resolution: 800 x 600

Descarga de la Herramienta:

http://www.microsoft.com/downloads/details.aspx?FamilyID=dd7a00df-1a5b-4fb6-a8a6-657a7968bd11&displaylang=en

Video de la Herramienta

miércoles, 22 de julio de 2009

Instalación de AD LDS (ADAM) en Windows 2008




Requirements for AD LDS Installation and Removal

AD LDS installation requirements include the following:

- A supported operating system such as W2008 Standard, Enterprise, or Datacenter
- An account with local administration access rights

To remove AD LDS from a W2008 server, you must log on to the server by using an account that has local administrator rights. You then do the following:

- Use Programs And Features in Control Panel to uninstall any instance of AD LDS youcreated after the role installation.

- Use Server Manager to remove the AD LDS role.

Take care to ensure that you remove all AD LDS instances from a server before you remove the role itself.

Remember that you need to remove all instances of AD LDS from a server before you can
remove the role from the server.

Installing AD LDS on Server Core

To install AD LDS on a Server Core installation of W2008, log on with local administrative
credentials to a W2008 member or standalone server running Server Core and enter the following
command:

start /w ocsetup DirectoryServices-ADAM-ServerCore

Note that this command is case-sensitive. Using the start /w command ensures that the command prompt does not return until the role installation is complete. You can verify that the role is installed and discover the role name (DirectoryServices-ADAM-ServerCore) by using the following command:

oclist | more