lunes, 31 de agosto de 2009

SQL Server 2008 Migration White Papers




Hola a todos,
aquí os dejo un enlace a varios White Papers de Microsoft que ofrecen ayuda y recursos para migrar desde diferentes gestores de Bases de Datos de terceros a Microsoft SQL Server 2008. Algunos de estois gestores son:

- MySQL
- Oracle
- Informix
- Sybase ASA
- Sybase ASE

Espero os sea de utilidad.

SQL Server 2008 Migration White Papers
Brief Description
Read white papers for guidance on how to migrate to Microsoft SQL Server 2008 from other database products.

Overview
SQL Server 2008 delivers exceptional value in database management and business intelligence causing many customers to choose SQL Server over other database solutions. The white papers available here will help you find the resources needed to migrate your data to SQL Server 2008.
Guide to Migrating from MySQL to SQL Server 2008
In this migration guide you will learn the differences between the MySQL and SQL Server 2008 database platforms, and the steps necessary to convert a MySQL database to SQL Server.
Guide to Migrating from Oracle to SQL Server 2008
This white paper explores challenges that arise when you migrate from an Oracle 7.3 database or later to SQL Server 2008. It describes the implementation differences of database objects, SQL dialects, and procedural code between the two platforms. The entire migration process using SQL Server Migration Assistant (SSMA) 2008 for Oracle is explained in depth, with a special focus on converting database objects and PL/SQL code.
Guide to Migrating from Informix to SQL Server 2008
This white paper explores challenges that arise when you migrate from an Informix 11 database to SQL Server 2008. It describes the implementation differences of database objects and procedural code between the two platforms. Emulation of system functions is also discussed.
Guide to Migrating from Sybase ASA to SQL Server 2008
This white paper explores challenges that arise when you migrate from a Sybase Adaptive Server Anywhere (ASA) database of version 9 or later to SQL Server 2008. It describes the implementation differences of database objects, SQL dialects, and procedural code between the two platforms.
Guide to Migrating from Sybase ASE to SQL Server 2008
This white paper covers known issues for migrating Sybase Adaptive Server Enterprise database to SQL Server 2008. Instructions for handling the differences between the two platforms are included. The paper describes how SQL Server Migration Assistant, the best tool for this type of migration, can help resolve various migration issues.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=c7933d3e-b7b9-43a6-ade3-f8e37c8cb046

lunes, 24 de agosto de 2009

Windows 2008: Read Only Domain Controllers (RODCs)



Aquí os dejo unos breves apuntes sobre Read-Only Domain Controllers en Windows 2008, un video de como instalarlo y enlaces oficiales de Microsoft, que incluyen:

- Whitepaper: Planning and Deploying Read-Only Domain Controllers
- TechNet: Deploying RODCs in the Perimeter Network
- TechNet: Administering RODCs in Branch Offices


Using Read-Only Domain Controllers
----------------------------------------------------
The RODC is designed to address the branch office scenario.
An RODC is a DC that maintains a copy of all objects in the domain and all Attributes except confidential attributes (secrets) such as password-related properties. When a user in the branch office logs on, the RODC receives the
request and forwards it to a DC in the hub site for authentication.

You are able to configure a password replication policy (PRP) for the RODC that specifies user accounts the RODC is allowed to cache. If the user logging on is included in the PRP,the RODC caches that user’s credentials so that the next time the user requests authentication, the RODC can perform the task locally. As users who are included in the PRP log on, the RODC builds its cache of credentials so that it can perform authentication locally for those users.

Deploying an RODC
----------------------------------
The high-level steps to install an RODC are as follows:

1. Ensure that the forest functional level is Windows Server 2003 or higher.
2. If the forest has any domain controllers running Microsoft Windows Server 2003, run
adprep /rodcprep
3. Ensure that at least one writable domain controller is running Windows Server 2008
4. Install the RODC.

If you are upgrading an existing forest to include DCs running W2008, you must run the command adprep /rodcprep.

This command configures permissions so that RODCs are able to replicate DNS application directory partitions. If you are creating a new Active Directory forest that contains only DCs running W2008, you do not need to run adprep /rodcprep.

You can find the adprep command in the cdrom\Sources\Adprep folder of the Windows Server 2008 installation DVD.

An RODC must replicate domain updates from a writable DC running W2008, and the RODC must be able to establish a replication connection with the writable W2008 DC.
Ideally, the writable W2008 DC should be in the closest site—the hub site. If you want the RODC to act as a DNS server, the writable W2008 DC must also host the DNS domain zone.

Installing an RODC
--------------------------------------
After you complete the preparatory steps, you can install an RODC on either a full or Server Core installation of W2008. On a full installation of W2008, you can use the Active Directory Domain Services Installation Wizard to create an RODC.
You select Read-Only Domain Controller (RODC) on the Additional Domain Controller Options page of the wizard

Alternatively, you can use the dcpromo command with the /unattend switch to create the RODC.
On a Server Core installation of W2008, you must use the dcpromo /unattend command.

Your answer file would be similar to the following:

[DCInstall]
Username=Pepe_Perez
Password=P@ssw0rd
UserDomain=windowsmeconfunde.internal
InstallDns=yes
ConfirmGC=yes
ReplicaOrNewDomain=ReadOnlyReplica
ReplicaDomainDNSName=windowsmeconfunde.internal
Sitename=MyBranch
databasePath="e:\ntds"
logPath="e:\ntdslogs"
sysvolpath:"f:\sysvol"
SafeModeAdminPassword:P@ssw0rd
RebootOnCompletion:yes


Password Replication Policy
----------------------------------------
PRP determines which users’ credentials can be cached on a specific RODC. If PRP allows an RODC to cache a user’s credentials, that user’s authentication and service ticket activities can be processed by the RODC. If a user’s credentials cannot be cached on an RODC, authentication and service ticket activities are referred to a writable domain controller by the RODC.

An RODC PRP is determined by two multivalued attributes of the RODC computer account.
These attributes are known as:

- Allowed List
-----------------
If a user’s account is on the Allowed List, the user’s credentials are cached. You can include groups on the Allowed List, in which case, all users who belong to the group can have their credentials cached on the RODC.

- Denied List
------------
If a user’s account is on the Denied List, the user’s credentials are not cached. You can include groups on the Denied List, in which case, all users who belong to the group can not have their credentials cached on the RODC.

If a user is on both the Allowed List and the Denied List, that user’s credentials will not be cached—the Denied List takes precedence

Configuring Domain-Wide Password Replication Policy
-----------------------------------------------------------
To facilitate the management of PRP, W2008 creates two domain local security groups in the Users container of AD DS.

- Allowed RODC Password Replication Group
-------------------------------------------
Is added to the Allowed List of each new RODC. By default, the group has no members.
Therefore, by default, a new RODC will not cache any user’s credentials. If there are users whose credentials you want all domain RODCs to cache, add those users to the Allowed RODC Password Replication Group.

- Denied RODC Password Replication Group
------------------------------------------
It is added to the Denied List of each new RODC. If there are users whose credentials you want to ensure domain RODCs never cache, add those users to the Denied RODC Password Replication Group. By default, this group contains security-sensitive accounts that are members of groups such as Domain Admins, Enterprise Admins, and Group Policy Creator Owners.

Configuring an RODC-Specific Password Replication Policy
---------------------------------------------------------------
The Allowed RODC Password Replication Group and Denied RODC Password Replication
Group provide a method of managing PRP on all RODCs. However, you typically need to
allow the RODC in each branch office to cache user and computer credentials for that specific location. Therefore, you must configure the Allowed List and the Denied List of each RODC.
To configure an RODC PRP, open the properties of the RODC computer account in the
Domain Controllers OU. On the Password Replication Policy tab, you can view the current PRP settings and add or remove users or groups from the PRP.

Administering Credentials Caching on an RODC
-----------------------------------------------------
When you click the Advanced button on the Password Replication Policy tab,the Advanced Password Replication Policy dialog box appears.

The drop-down list at the top of the Policy Usage tab enables you to select one of the following RODC reports:

- Accounts Whose Passwords Are Stored On This Read-Only Domain Controller--------------------------------------------------------------------------
This report displays the list of user and computer credentials currently cached on the RODC. You can use this list to determine whether credentials are being cached that you do not want to be cached on the RODC and modify the PRP accordingly.

- Accounts That Have Been Authenticated To This Read-Only Domain Controller
-----------------------------------------------------------------------------
This report displays the list of user and computer credentials that have been referred to a writable domain controller for authentication or service ticket processing. You can use this list to identify users or computers that are attempting to authenticate with the RODC. If any of these accounts are not being cached and you want them to be, add them to the PRP.

The Resultant Policy tab of the Advanced Password Replication Policy dialog box enables
you to evaluate the effective caching policy for an individual user or computer.
Click Add to select a user or computer account for evaluation.

Video: How install a RODC
--------------------------------------------



More Inf:
-----------------

Planning and Deploying Read-Only Domain Controllers

A read-only domain controller (RODC) is a new type of domain controller in the Windows Server® 2008 operating system. This guide explains what RODCs are and how they function. See the Overview below for links to other guides about how to deploy them in various scenarios.

http://www.microsoft.com/downloads/details.aspx?familyid=AE33A129-FF41-4BEC-B2B7-6DDCD4998828&displaylang=en

Deploying RODCs in the Perimeter Network

This topic describes how to deploy a read only domain controller (RODC) in a perimeter network, thereby extending the corporate forest into the perimeter network.

http://technet.microsoft.com/en-us/library/dd728035(WS.10).aspx

Administering RODCs in Branch Offices

This topic provides guidelines for common administrative tasks for read-only domain controllers (RODCs) in branch offices:

-Using Remote Desktop to administer RODCs in branch offices
-Reestablishing replication for an RODC
-Checking the lastLogonTimeStamp attribute on an RODC to discover stale accounts in a branch office
-Resolving an account lockout problem in a branch office with an RODC
-Performing backups of an RODC

http://technet.microsoft.com/en-us/library/dd736126(WS.10).aspx

viernes, 21 de agosto de 2009

Windows Server 2008 R2 Evaluation for Intel-Based, Itanium, Virtual Hard Drive for Hyper-V, and Remote Server Administration Tools for Windows® 7







Windows Server 2008 R2 Evaluation for Itanium-Based Systems (180 days)
Brief Description
Windows Server 2008 R2 builds on the award-winning foundation of Windows Server 2008, expanding existing technology and adding new features to enable organizations to increase the reliability and flexibility of their server infrastructures.

Overview
This software is for evaluation and testing purposes. The evaluation is available in ISO format. Evaluating any version of Windows Server 2008 R2 software does not require entering a product key, however will require activation within 10 days. Failing to activate the evaluation will cause the licensing service to shut the machine down every hour (The 10 day activation period can be reset five (5) times by using the rearm command. See below for further information on activation rearm). Once activated, the evaluation will run for 180 days. After this time, you will need to uninstall the software or upgrade to a fully-licensed version of Windows Server 2008 R2 for Itanium-Based Systems.
This download is also available through our new Download Manager. This will ensure 100% completion rate, and accelerate download times on slower links.
To start this download via the Download Manager, please click here.

http://www.microsoft.com/downloads/en/results.aspx?displaylang=en&period=30&nr=50&sortCriteria=Date&sortOrder=Ascending&stype=s_adv

Windows Server 2008 R2 Evaluation (180 days)
Brief Description
Windows Server 2008 R2 builds on the award-winning foundation of Windows Server 2008, expanding existing technology and adding new features to enable organizations to increase the reliability and flexibility of their server infrastructures.

Overview
This software is for evaluation and testing purposes. The evaluation is available in ISO format. Web, Standard, Enterprise and Datacenter editions are available via the same download. You will be prompted for edition installation at setup. Evaluating any version of Windows Server 2008 R2 software does not require entering a product key, however will require activation within 10 days. Failing to activate the evaluation will cause the licensing service to shut the machine down every hour (The 10 day activation period can be reset five (5) times by using the rearm command. See below for further information on activation rearm). Once activated, the evaluation will run for 180 days. After this time, you will need to uninstall the software or upgrade to a fully-licensed version of Windows Server 2008 R2.
This download is also available through our new Download Manager. This will ensure 100% completion rate, and accelerate download times on slower links.
To start this download via the Download Manager, please click here.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=96a3a4b4-9453-4d30-97aa-c977560a0da4

Windows Server 2008 R2 Evaluation Virtual Hard Drive Images for Hyper-V (180 Days)
Brief Description
Windows Server 2008 R2 Evaluation Enterprise Edition and Server Core Virtual Hard Drive Images for Hyper-V

Overview
The Microsoft VHD format is the common virtualization file format for Hyper-V that provides a uniform product support system, and provides more seamless manageability, security, reliability and cost-efficiency for customers.
This VHD release is available in English only and is for evaluation and testing purposes. Evaluating any version of Windows Server 2008 R2 software does not require entering a product key, however will require activation within 10 days. Failing to activate the evaluation will cause the licensing service to shut the machine down every hour (The 10 day activation period can be reset four (4) times by using the rearm command. See below for further information on activation rearm). Once activated, the evaluation will run for 180 days. After this time, you will need to uninstall the software or upgrade to a fully-licensed version of Windows Server 2008 R2.
As this installation requires Hyper-V, you will need to have a base install of Windows Server 2008 (64-bit edition) or Windows Server 2008 R2, running Hyper-V. For more information on obtaining and installing the latest version of Hyper-V, please visit the Hyper-V Homepage.
Both virtual machines available here are running Windows Server 2008 R2 Enterprise Edition Evaluation. One is the default full installation, and the other has been configured as a default Core installation. For more information on the difference between full and core installation please see the Windows Server 2008 Editions Overview pages. For download options please see the IMAGE SELECTION section in the instructions below.
As both virtual machines do not have anti-virus installed, they should not be connected to any network until it has anti-virus installed.

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=9040a4be-c3cf-44a5-9052-a70314452305

Remote Server Administration Tools for Windows 7
Brief Description
Remote Server Administration Tools for Windows® 7 enables IT administrators to manage roles and features that are installed on computers that are running Windows Server® 2008 R2, Windows Server® 2008, or Windows Server® 2003, from a remote computer that is running Windows 7.

Overview
Remote Server Administration Tools for Windows 7 enables IT administrators to manage roles and features that are installed on remote computers that are running Windows Server 2008 R2 (and, for some roles and features, Windows Server 2008 or Windows Server 2003) from a remote computer that is running Windows 7. It includes support for remote management of computers that are running either the Server Core or full installation options of Windows Server 2008 R2, and for some roles and features, Windows Server 2008. Some roles and features on Windows Server 2003 can be managed remotely by using Remote Server Administration Tools for Windows 7, although the Server Core installation option is not available with the Windows Server 2003 operating system.
This feature is comparable in functionality to the Windows Server 2003 Administrative Tools Pack and Remote Server Administration Tools for Windows Vista with Service Pack 1 (SP1).

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=7d2f6ad7-656b-4313-a005-4e344e43997d

lunes, 17 de agosto de 2009

TechNet Tour 2009: Lanzamiento Windows 7, Windows Server 2008 R2, Exchange server 2010



Otro año más Microsoft TechNet llega a tu ciudad con las novedades de los productos de Microsoft.
Este evento pretende dar conocimiento de las novedades en los nuevos productos de Microsoft, Windows 7, Windows Server 2008 R2, Exchange Server 2010, Forefront y System Center, en el evento se realizaran demostraciones de los productos.

Idiomas: Español.
Productos: Microsoft Exchange Server 2010, Microsoft Forefront Client Security, Microsoft Forefront Security for Exchange Server, Microsoft System Center Virtual Machine Manager, Microsoft System Center Virtual Machine Manager 2007, Microsoft Windows Small Business Server, Security, Windows 7, Windows Essential Business Server y Windows Server 2008 R2.
Audiencia(s): Generalista de IT y Gerente de IT.

Calendario

Ciudad Real - 16 de Septiembre de 2009
Madrid - 23 de Septiembre de 2009
Barcelona - 6 de Octubre de 2009
Murcia - 8 de Octubre de 2009
Valencia - 13 de Octubre de 2009
Málaga - 15 de Octubre de 2009
Sevilla - 20 de Octubre de 2009
Cáceres - 22 de Octubre de 2009
Valladolid - 29 de Octubre de 2009
A Coruña - 3 de Noviembre de 2009
Bilbao - 5 de Noviembre de 2009
Pamplona - 10 de Noviembre de 2009
Zaragoza - 12 de Noviembre de 2009
Palma de Mallorca - 17 de Noviembre de 2009
Logroño - 19 de Noviembre de 2009
Las Palmas - 24 de Noviembre de 2009
Tenerife - 26 de Noviembre de 2009

Más información y Registro

http://technet.microsoft.com/es-es/ee256076.aspx

jueves, 13 de agosto de 2009

Diagnosticos de Directorio Activo con Microsoft IT Environment Health Scanner



Microsoft IT Environment Health Scanner es una herramienta de diagnóstico diseñada para administradores de pequeñas o medianas empresas que necesitan comprobar la salud de sus servidores de directorio y de sus clientes.
Os añado la información original de Microsoft.

This tool identifies common problems that can prevent your network environment from functioning properly as well as problems that can interfere with infrastructure upgrades, deployments, and migration.

When run from a computer with the proper network access, the tool takes a few minutes to scan your IT environment, perform more than 100 separate checks, and collect and analyze information about the following:


- Configuration of sites and subnets in Active Directory
- Replication of Active Directory, the file system, and SYSVOL shared folders
- Name resolution by the Domain Name System (DNS)
- Configuration of the network adapters of all domain controllers, DNS servers, and e-mail servers running Microsoft Exchange Server
-Health of the domain controllers
- Configuration of the Network Time Protocol (NTP) for all domain controllers


If a problem is found, the tool describes the problem, indicates the severity, and links you to guidance at the Microsoft Web site (such as a Knowledge Base article) to help you resolve the problem. You can save or print a report for later review. The tool does not change anything on your computer or your network

System Requirements
Supported Operating Systems: Windows Server 2003 Service Pack 2; Windows Server 2008; Windows Vista Service Pack 1; Windows XP Service Pack 2

Note: make sure that you have installed the latest service packs and Windows operating system updates.

Required Software:

-.NET Framework 2.0
- Minimum Screen Resolution: 800 x 600

Descarga de la Herramienta:

http://www.microsoft.com/downloads/details.aspx?FamilyID=dd7a00df-1a5b-4fb6-a8a6-657a7968bd11&displaylang=en

Video de la Herramienta