jueves, 7 de octubre de 2010

Microsoft SQL Server 2008 Service Pack 2 (SP2) is now available





Microsoft SQL Server 2008 Service Pack 2 (SP2) is now available for download. These packages may be used to upgrade any edition of SQL Server 2008. We remain committed to providing our customers with essential changes via Service packs. Service Pack 2 contains updates for SQL Server Utility, Data-Tier Application (DAC), as well as integration capability for Microsoft Reporting Services with the Microsoft SharePoint 2010 Technologies. Service Pack 2 introduces support for a maximum of 15,000 partitions in a database, and includes SQL Server 2008 SP1 Cumulative Update 1 to 8. While keeping product changes contained, we have made significant investments to ease deployment and management of Service Packs. Microsoft SQL Server 2008 Service Pack 1 is not a prerequisite for installing SQL Server 2008 Service Pack 2.

For more information about SQL Server 2008 Service Pack 2, please visit our Release Notes.


Download:

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=8fbfc1de-d25e-4790-88b5-7dda1f1d4e17&displaylang=en

miércoles, 29 de septiembre de 2010

Restore Mailbox Scenarios

Restore Mailbox Scenarios
In this tip we will examine the different restore mailbox scenarios E12 will support.


General Assumptions on Restore-Mailbox Scenarios:

Servers are in a highly connected network.
Servers are part of a Single Forest or Resource Forests: Mailbox content can only be exported to mailboxes within the same forest. The NT accounts associated with the mailbox can be in an external forest (as in a Resource Forest Scenario), but mailbox content will not be able to be exported to servers in different forests.
These are the supported Source Servers:
1. Exchange 2000 SP3 (or later)
2. Exchange 2003 SP2 (or later)
3. Exchange 2007
These are the supported Target Servers:
1. Exchange 2007
Recipient Admin rights are required
Restore-Mailbox can only use disconnected mailboxes as source of content and connected mailboxes as the target

Recovering old mailbox of an existing employee

Customer Setting:

Restore-Mailbox can also recover data of users that have an active mailbox in the Exchange Organization. The way to do this is to recover the backup to the RSG database, and from there restore the user’s mailbox (or part of it using filtering) by simply specifying the ID for the mailbox to be restored. In this case, source and target should be the same so there is no need to use RSGMailbox.


Customer Goal:
Ability to restore mailbox content from RSG to the active mailbox that has the same ID, individually and in bulk.


Parameters
covered by use
cases:
-Identity, -TargetFolder, -RSGDatabase, -RSGMailbox

Additional tasks
covered by use
cases:
Get-mailboxstatistics


Scenario 1: Restore mailbox content to active mailbox based on User ID
An administrator wants to restore email content from the RSG into a currently active mailbox:


MONAD Syntax – restore all RSG content of mailbox testE12mbx1 to the currently used testE12mbx1 mailbox:
MSH> restore-mailbox -id testE12mbx1 -RSGDatabase 'Recovery Storage Group\Mailbox Database'

Scenario 2: Restore mailbox content to active mailbox based on User ID and date rangeAn administrator wants to restore email content sent between 02/02/05 and 02/05/05 from a RSG mailbox into a currently active mailbox:


MONAD Syntax – restore all RSG content sent between 02/02/05 and 02/05/05 of mailbox testE12mbx1 to the currently used testE12mbx1 mailbox:
MSH> restore-mailbox -id testE12mbx1 -RSGDatabase 'Recovery Storage Group\Mailbox Database' -StartDate ‘02/02/05’ –EndDate ‘02/05/05’


Scenario 3: Restore mailbox content from all mailboxes in a Database to active mailboxes
An administrator wants to restore email content from all mailboxes in the RSG to their currently active mailbox counterparts:


MONAD Syntax – restore all RSG mailboxes to their currently active mailbox counterparts:

MSH> get-mailboxstatistics -database 'recovery storage group\mailbox database' | restore-mailbox


Scenario 4: Restore mailbox content to folder based on active User ID
An administrator wants to restore email content from a RSG mailbox into a folder inside a currently active mailbox:


MONAD Syntax – restore all RSG content of mailbox testE12mbx1 to a folder called Backup inside the currently used testE12mbx2 mailbox:

MSH> restore-mailbox -RSGMailbox 'testE12mbx1' -RSGDatabase 'Recovery Storage Group\Mailbox Database' -id 'testE12mbx2' -TargetFolder ‘Backup’

Scenario 5: Restore mailbox content to folder based on active User ID and date range
An administrator wants to restore email content sent between 02/02/05 and 02/05/05 from a RSG mailbox into a folder inside a currently active mailbox:


MONAD Syntax – restore all RSG content of mailbox testE12mbx1 to a folder called Backup inside the currently used testE12mbx2 mailbox:
MSH> restore-mailbox -RSGMailbox 'testE12mbx1' -RSGDatabase 'Recovery Storage Group\Mailbox Database' -id 'testE12mbx2' -TargetFolder ‘Backup’ -StartDate ‘02/02/05’ –EndDate ‘02/05/05’

Customer Setting:

After an employee leaves a company, even though his active mailbox might be disabled or deleted, admins can still recover data from previous backups through the RSG. The way to do this is to recover the backup to the RSG database, and from there restore the user’s mailbox (or part of it using filtering) by specifying the RSGMailbox (points to ex-employee’s mailbox) and a target folder in an admin mailbox.


Customer Goal:
Ability to recover data from RSG mailboxes that do not have an active mailbox counterpart. Data is to be recovered to a folder inside another user’s active mailbox.

Parameters
covered by use
cases:
-Identity, -TargetFolder, -RSGDatabase, -RSGMailbox

Additional tasks
covered by use
cases:
Get-mailboxstatistics


Scenario 6: Restore mailbox content to folder inside an active mailbox based on RSG User ID
An administrator wants to restore email content from a RSG mailbox into a folder inside a currently active mailbox:


MONAD Syntax – restore all RSG content of mailbox testE12mbx1 to a folder called Backup inside the currently used testE12mbx2 mailbox:

MSH> restore-mailbox -RSGMailbox 'testE12mbx1' -RSGDatabase 'Recovery Storage Group\Mailbox Database' -id 'testE12mbx2' -TargetFolder ‘Backup’

Scenario 7: Restore mailbox content to folder inside an active mailbox based on RSG User ID and date range
An administrator wants to restore email content sent between 02/02/05 and 02/05/05from a RSG mailbox into a folder inside a currently active mailbox:


MONAD Syntax – restore all RSG content sent between 02/02/05 and 02/05/05 of mailbox testE12mbx1 to a folder called Backup inside the currently used testE12mbx2 mailbox
MSH> restore-mailbox -RSGMailbox 'testE12mbx1' -RSGDatabase 'Recovery Storage Group\Mailbox Database' -id 'testE12mbx2' -TargetFolder ‘Backup’ -StartDate ‘02/02/05’ –EndDate ‘02/05/05’

Scenario 8: Restore mailbox content from all mailboxes in a Database to a folder inside an active mailbox
An administrator wants to restore email content from all mailboxes in the RSG to a folder inside an active mailbox:

MONAD Syntax – restore all RSG mailboxes to a folder called DatabaseBackup inside mailbox testE12mbx2:


MSH> get-mailboxstatistics -database 'recovery storage group\mailbox database' | restore-mailbox -id 'testE12mbx2' -TargetFolder ‘DatabaseBackup’

Customer Setting:

Hardware malfunction resulted in corrupt databases which cannot be brought online in their current state. End users rely on timely email communication for business continuity. Need to enable email functionality ASAP.
If the current server and disk is available and functioning properly, Exchange administrator can enable dial tone services to all the users by moving the corrupt files to a different location and mounting an empty database online in its original location.
While the dial tone is in production, admin will recover original database from backup in a separate location. After this is complete, the production server switches to the backup database and the dial tone database is copied to the RSG. Then, the dial tone content is merged back into the new production database by using restore-mailbox so users do not lose any content.


Customer Goal:
Ability to restore mailbox content from RSG to the active mailbox that has the same ID, individually and in bulk.


Parameters
covered by use
cases:
-Identity, -TargetFolder, -RSGDatabase, -RSGMailbox

Additional tasks
covered by use
cases:
Get-mailboxstatistics


Scenario 9: Restore mailbox content to active mailbox based on User ID
An administrator wants to restore email content from the RSG into a currently active mailbox:


MONAD Syntax – restore all RSG content of mailbox testE12mbx1 to the currently used testE12mbx1 mailbox:

MSH> restore-mailbox -id testE12mbx1 -RSGDatabase 'Recovery Storage Group\Mailbox Database'


Scenario 10: Restore mailbox content from all mailboxes in a Database to active mailboxes
An administrator wants to restore email content from all mailboxes in the RSG to their currently active mailbox counterparts:


MONAD Syntax – restore all RSG mailboxes to their currently active mailbox counterparts:

MSH> get-mailboxstatistics -database 'recovery storage group\mailbox database' | restore-mailbox


Customer Setting:

Hardware failures or some corruption resulted in Exchange server not functioning properly. While OS/Exchange Administrators investigate the issue, end users need access to email.
Exchange does not allow moving mailboxes to a different server if the original server is not available since move is associated with moving a mailbox with its associated full content. In order to provide dial tone functionality in this case, Admin would use a clean database in a separate server, and use the move-mailbox configuration only option to change the AD settings so the mailboxes would point to this new database. While the dial tone is in production, admin will recover original database from backup in a separate location (if the original server was fixed, that can be used as the location for the backup). After this is complete, the production server switches to the backup database and the dial tone database is copied to the RSG. Then, the dial tone content is merged back into the new production database by using restore-mailbox so users do not lose any content.


Customer Goal:
Ability to restore mailbox content from RSG to the active mailbox that has the same ID, individually and in bulk.


Parameters
covered by use
cases:
-Identity, -TargetFolder, -RSGDatabase, -RSGMailbox

Additional tasks
covered by use
cases:
Get-mailboxstatistics


Scenario 11: Restore mailbox content to active mailbox based on User ID
An administrator wants to restore email content from the RSG into a currently active mailbox:


MONAD Syntax – restore all RSG content of mailbox testE12mbx1 to the currently used testE12mbx1 mailbox:

MSH> restore-mailbox -id testE12mbx1 -RSGDatabase 'Recovery Storage Group\Mailbox Database'


Scenario 12: Restore mailbox content from all mailboxes in a Database to active mailboxes
An administrator wants to restore email content from all mailboxes in the RSG to their currently active mailbox counterparts:


MONAD Syntax – restore all RSG mailboxes to their currently active mailbox counterparts:

MSH> get-mailboxstatistics -database 'recovery storage group\mailbox database' | restore-mailbox

jueves, 23 de septiembre de 2010

Prueba el nuevo Internet Explorer 9

Internet Explorer 9 Beta is here, and it's fast. Web sites and applications look and perform as if they were native to your PC, and you'll notice a clean look and increased viewing area that makes Web sites shine. Taking full advantage of your PC's hardware through Windows, Internet Explorer 9 Beta delivers graphically rich and immersive experiences.

http://windows.microsoft.com/en-US/internet-explorer/products/ie-9/home?os=win7&arch=a&browser=ie

Nuevo White Paper: Plan, Implement, and Support SQL Server Virtualization

Ahora es posible virtualizar pesados servidores SQL Server y mover máquinas virtuales Hyper-V dentro de un failover cluster sin tiempo de parada.

Anexo este nuevo documento de Microsoft con toda la información relativa

http://click.email.microsoftemail.com/?qs=8ee6f7c96b13bffa62f7d5631267724ce6516102206ab66324ce454229ee339801d418fbc2fde05a

lunes, 8 de febrero de 2010

Active Directory Backup and Restore in Windows Server 2008

Extraído del siguiente enlace os dejo este magnifico artículo del TechNet que explica las nuevas funcionalidades del bakup de Windows 2008 con respecto a Active Directory.

http://technet.microsoft.com/en-us/magazine/2008.05.adbackup.aspx?pr=blog

Installing Windows Server Backup

Windows Server Backup is a "feature" in Windows Server 2008 and is not installed by default. Before you can perform a backup with Windows Server Backup, you have to install the feature, using either Server Manager, or the SERVERMANAGERCMD command-line utility:

C:\> servermanagercmd -install Backup-Features

Windows Server Backup is composed of two sub-features, Windows Server Backup and Command-line Tools. Note that Command-line Tools refers to a set of Windows PowerShellTM cmdlets—not the WBADMIN .EXE command-line tool. Thus, if you choose to install both sub-features, you must install the Windows PowerShell feature.
After installing Windows Server Backup, you can find the Microsoft Management Console (MMC) snap-in under the Storage node in Server Manager and on the Administrative Tools menu. If you are installing Windows Server Backup on a Windows Server 2008 Server Core installation, use the OCSETUP command (it's important to note that the OCSETUP command is case-sensitive):

C:\> ocsetup WindowsServerBackup

A complete description of the installation process is available at go.microsoft.com/fwlink/?LinkId=113146.
Note that Windows Server Backup can't restore images created with NTBACKUP. For this unlikely scenario, Microsoft has made available a downloadable version of NTBACKUP for Windows Server 2008 (see go.microsoft.com/fwlink/?LinkId=113147).


The Windows Server Backup Components

The way in which the Windows Server Backup application is architected represents a significant change. This new backup solution consists of four components:

•MMC user interface (WBADMIN.MCS)
•Command-line interface (WBADMIN.EXE)
•Backup service (WBENGINE.EXE)
•Set of Windows PowerShell cmdlets

Splitting the application into a client and a service has several advantages, the most important being increased reliability. Whether you start a backup from either the MMC client or the command-line interface, the WBENGINE service is doing the heavy lifting. The client programs just report the status of the backup. Thus, terminating the client will not result in a half-baked backup. The client will stop and the service will continue to completion. Of course, if you really want to stop the backup, you can, but you must do so explicitly.

The other advantage of this split architecture is that you can use the client to manage backups on remote machines. This is particularly nice when you have to back up Windows Server 2008 Core machines.

Windows Server Backup supports bare-metal restores using the Windows Recovery Environment, or WinRE, which comes on the Windows Server 2008 installation media. WinRE simplifies the process of recovering a server from scratch. I will discuss performing a bare-metal restore later in this article. It's worth mentioning that Windows Server Backup supports several Group Policy settings for managing backups—these are outlined in the "Group Policy Settings" sidebar.

Volume Shadow Copy Service

Windows Server Backup uses Volume Shadow Copy Service in three different ways. When you start a full backup on Windows Server 2008, the first thing that the application does is make a shadow copy of all of the source volumes. Doing this provides a consistent view of the file system for the backup software to work with. (This is similar to what NTBACKUP did.) Windows Server Backup then copies blocks from the source volume—block by block—to the backup target, building a VHD image for each backed-up volume in the process.

Unless you specify otherwise, Windows Server Backup also creates a snapshot of the source volume so that Volume Shadow Copy Service will keep track of all changed blocks on the volume. This enables Windows Server Backup to create block-level incremental backups that only require reading the changed blocks of the source volume. Rather than reading and writing an entire file because one bit was changed in the file, Windows Server Backup can read and write only the block that has changed.

This makes for very efficient incremental backups, but at the expense of extra disk I/O for write operations on the source volume. If you are backing up a particularly busy or performance-critical volume, you should disable the Volume Shadow Copy Service snapshot on the source volume by selecting the Configure Performance Settings link and then disabling incremental backups on that volume (as shown in Figure 1).




Figure 1 Disable incremental backups on busy volumes (Click the image for a larger view)

When the backup is complete, Windows Server Backup takes a snapshot of the target volume (assuming you are backing up to a locally attached hard disk). During the next backup, the target VHD files are overwritten. But since Volume Shadow Copy Service is maintaining shadow copies of the target volume, there are, in effect, multiple versions of each VHD file corresponding to each of the full backups. You essentially get multiple full backups for the cost of one full backup and the changed blocks.


Backing Up to Network Shares

Backing up to a network share is just as easy as backing up to a local volume. The significant difference is that it can't create a Volume Shadow Copy Service snapshot of the remote volume. Therefore, each full backup will overwrite the previous, leaving you with just the latest full backup image of each server on a network share. Due to this limitation, you can't use the Windows Server Backup scheduler to schedule backups to a network share. You can, however, use the Windows Task Scheduler to run the WBADMIN command-line program to perform full backups to a network share. If you elect to schedule full backups to a network share this way, change the target folder for each backup to avoid overwriting previous backups.


Backing Up to Recordable DVDs

Windows Server Backup also supports backing up to optical media, such as writable DVDs. And you can create backup sets that span multiple volumes, as well. Windows Server Backup always compresses backups to DVDs, which means that you can only perform full system or full volume restores from DVD. Windows Server Backup doesn't support system state or file level backups and restores when using DVDs. And you can't schedule backups to DVD.


System State Backups and Restores

System state backups, which include only select files and some application databases (rather than entire volumes) is handy and often essential. But early builds of Windows Server 2008 didn't support system state backups and restores. Instead, the backup tool just backed up critical system volumes (meaning any volumes necessary for recovering and rebooting the OS and key applications). These critical system volumes were the volume-oriented equivalent of a system state backup.

Acknowledging feedback from customers, Microsoft added system state backup and restore capabilities to Windows Server Backup. The application creates multiple VHD files, one for each volume that hosts the system state data, but it only copies the necessary files and databases to the VHDs. Another issue is that when you perform a system state backup, Windows Server Backup does not create a snapshot of the target volume as it does in the normal backup process. Instead, each system state backup generates an entirely new set of VHD files, which means you don't get the space efficiencies you find with the snapshot-based volume backups.

You can only perform a system state backup using the WBADMIN.EXE command-line program—the MMC snap-in doesn't provide this option. To perform a system state backup, you use this command:

C:\> wbadmin start systemstatebackup –backuptarget:e:

WBADMIN will then back up the critical system files and application databases to the target volume, in a folder reserved for system state backups. The system state backup on a 32-bit Windows Server 2008 domain controller (DC) with a default directory information tree (DIT) runs a little more than 6GB—this is more than 5GB larger than on Windows Server 2003 due in part to the fact that Windows Server Backup is capturing core OS files that NTBACKUP didn't.
The time required to back up the system state is also greater, as you would expect. These initial numbers, of course, are based on a pre-release version of the OS. You'll certainly need to test this in your own environment, but it's likely that you'll need to plan for larger system state backups (and longer backup times) when you move your domain controllers to Windows Server 2008.


Backing Up a Server with the MMC

When you run the Windows Server Backup MMC (see Figure 2), you have the option of either setting up a backup schedule or immediately running an ad hoc backup. In this case, I select Backup once to perform an immediate backup.



Figure 2 Windows Server Backup MMC (Click the image for a larger view)
As you can see in Figure 3, I can choose whether to back up all the volumes on the server or back up just the specific volumes that I choose. If I select Full server, Windows Server Backup will back up all mounted volumes, but I won't have the option of backing up to a mounted hard drive—instead, I will have to back up to a recordable DVD or to a network share.



Figure 3 Using the backup configuration dialog to specify all or select volumes (Click the image for a larger view)
In this example, I want to back up to a local hard drive, so I select the Custom option.
A dialog then lets me select the volumes to back up (see Figure 4).

By default, Windows Server Backup checks the Enable system recovery box, which causes Windows Server Backup to select the boot volume, the OS volume, and any other volumes with critical system files and application databases. On a DC, this includes the volumes hosting SYSVOL, the Active Directory DIT, and Active Directory logs. This is the equivalent of a system state backup but it backs up all the critical volumes, not just the critical files on those volumes.
In fact, I even have the ability to perform a system state recovery from a system recovery backup set.




Figure 4 Selecting specific volumes to back up (Click the image for a larger view)

After I select the destination type (local drive or network share) and specify the destination, Windows Server Backup prompts me to select either a "VSS copy" backup or a "VSS full" backup. The terminology is a little confusing, as both options will back up the selected volumes in their entirety. The difference lies in the way Windows Server Backup handles the source files after they've been backed up. If you select the copy option, Windows Server Backup will leave the backed up files alone. If you choose the full option, Windows Server Backup will then reset the archive.


Backing Up a Server from the Command Line

If you want to script the backup process, or if you are backing up a server on a Server Core installation, you can use the WBADMIN.EXE command-line program. WBADMIN provides a complete set of options that perform essentially the same functions as the MMC snap-in, including managing backup schedules.

Suppose I want to start the WBENGINE service, which will in turn perform the backup process. All I do is enter this command:

C:\> wbadmin start backup –include:c:,d: –backuptarget:e:

Or to back up all critical system volumes, I can enter this command:

C:\> wbadmin start backup -allcritical –backuptarget:e:

After starting the backup, WBADMIN continues to run and show the progress of the backup. If I terminate WBADMIN, the backup will continue in the background. I can then reconnect WBADMIN to a running backup using this command:

C:\> wbadmin get status

And if I want to terminate a running backup, I just enter this:

C:\> wbadmin stop job

Scheduling Backups with the MMC

The backup scheduler that is integrated with the Windows Server Backup is really designed to do one thing: simplify scheduling of daily full-system backups to a local disk volume. You can use the built-in scheduler to automatically rotate backups among multiple target volumes.
If you have easily removable hard drives (or you are using USB-attached hard drives), you can use this feature to set up a rotation scheme where you remove the backup disk and store it off-site and return the oldest backup disk to the server for the next scheduled backup.

The Windows Server Backup scheduler only lets you schedule backups that always occur daily. There is no way to schedule backups for, say, Mondays, Wednesdays, and Fridays. So if you don't want to run your scheduled backups daily, you'll have to work directly with the Windows Task Scheduler.

When you set up a scheduled backup to a local disk, Windows Server Backup takes responsibility of the disk, formatting it, setting up a specific folder structure, and making the target disk invisible to Windows Explorer. The target disk must be a basic volume—Windows Server Backup cannot backup to disks configured as dynamic volumes.

Scheduling backups through the MMC snap-in is very easy. In this example, I first select the Backup Schedule link, specify the type of backup and the volumes to back up, and then Windows Server Backup shows the "Specify backup time" dialog (see Figure 5).



Figure 5 Specifying when daily backups should occur (Click the image for a larger view)

After selecting the times at which I want the backup to occur, I can select the volume (or volumes) to which I want to back up. In this case, I select the backup volume E:, as shown in Figure 6.

Windows Server Backup tries to select an appropriate target volume for you, but if it happens that the disk you want to back up to doesn't appear, you can use the Show All Available Disks button to view all attached disk devices. After going through a couple of "confirm" dialogs, Windows Server Backup formats the target volume(s) and schedules the backup task using the Windows Task Scheduler.



Figure 6 Specifying the destination disk for a scheduled backup (Click the image for a larger view)

Each time a scheduled backup is completed, Windows Server Backup takes a snapshot of the target volume. And every seven days, it creates a new base image. Activity is logged in the Microsoft/Backup/Operational log. You can check there to see if your backups completed successfully; you can also associate a task, such as sending an e-mail message, with the success and failure events so you will always know the status of your scheduled backups.

Scheduling Backups from the Command Line

If you are scheduling backups on a Server Core installation or you just want to script the process, you can manage the backup schedule using the WBADMIN command-line. To add a scheduled backup, you use the WBADMIN ENABLE BACKUP command, specifying the target, source, and scheduled time, like so:

C:\> wbadmin enable backup –addtarget:e: -include:c:,d: -schedule:06:00,12:00,18:00

This command would back up the C: and D: drives to the E: drive three times a day, at 6:00 A.M., 12:00 P.M., and 6:00 P.M. (note that all times are specified using a 24-hour clock). To back up all critical system volumes (from which you can perform a bare metal restore or a system state restore), replace the –include switch with –allcritical.

You can also use WBADMIN to disable all scheduled backups, like this:

C:\> wbadmin disable backup

This command will delete all the scheduled backup jobs created by the Windows Server Backup scheduler and release all the backup target volumes for normal use. Note that you can always use the WBADMIN MMC snap-in to remotely manage the backup and restore activities of Server Core servers.


Bare-Metal Recovery of a Domain Controller

One of the most exciting improvements for backup and recovery is how the WinRE has been incorporated into the installation process. When you boot Windows Server 2008 from the installation media, you can choose the Repair your computer option, as shown in Figure 7. I point this out because it is easy to miss if you're not looking for it.



Figure 7 The Repair your computer option is available on the installation screen (Click the image for a larger view)
After I select the repair option on the installation screen, Windows lets me select a recovery option, as shown in Figure 8. In this case, I select Windows Complete PC Restore, which invokes the Windows Recovery Environment.



Figure 8 Specifying system recovery options (Click the image for a larger view)

After you select the operating system you want to repair (there is typically only one choice), WinRE allows you to select the backup from which you want to restore. By default, WinRE selects the most recent complete system backup, but you can specify other backups stored on local disks or search the network for backups that are stored on file shares on other servers.

In my example, I select the most recent complete system backup. The next dialog lets me format and repartition all the disks before they are restored. This is an appropriate option if the problem you are recovering from was caused by some sort of disk failure or if you've replaced one or more disk drives in the server.

After a couple of confirming dialogs, WinRE starts the restore process and the server reboots. This is a pretty painless way to perform a bare-metal recovery on a server.

System State Recovery of a Domain Controller

If you need to recover from some sort of Active Directory-related problem—such as recovering a deleted OU from backup—you should restore the Active Directory Domain Services (ADDS) database to an earlier state, rather than restore the entire system. Even though you can stop ADDS like a service in Windows Server 2008, you still need to boot the server into Directory Services Restore Mode (DSRM) to perform a system state restore on a domain controller.

Changing the boot options to make Windows Server 2008 boot into DSRM is not quite as easy as it used to be. The entire Windows boot environment has been re-engineered to support the new Extensible Firmware Interface (EFI) and the old school boot.ini file no longer exists. Instead, Windows Server 2008 uses Boot Configuration Data (BCD) to control the boot process.

The simplest way to manage the BCD is to use the BCDEDIT command line program. A discussion covering all the BCDEDIT commands and options would require its own article, so I'll just show you some useful examples here.
To reboot a Windows Server 2008 DC into DSRM, use the following command:

C:\> bcdedit /set safeboot dsrepair

This will set the safeboot option for the default boot loader entry. In a fresh Windows Server 2008 installation, there is only one boot loader entry, WINLOAD.EXE. To remove the safeboot option and reboot in normal mode, use this command:

C:\> bcdedit /deletevalue safeboot

To make things a little easier for yourself, you can configure two bootloader entries on your DCs—one for a normal boot and one for a DSRM boot. This way, you can change the boot options using the Startup and Recovery settings dialog available under System Settings. To add a new bootloader entry, use this command:

C:\> bcdedit /copy {default} /d "Directory Service Repair Mode"

This action will create a new bootloader entry by copying the default bootloader entry. BCDEDIT will display something like this: Copy Code The entry was successfully copied to {c50d4710-a1f0-11dc-9580-0003ff402ae9}.
The GUID identifies the new entry. Then use this command to set the safeboot option for the new bootloader entry in the BCD:

C:\> bcdedit /set {} safeboot dsrepair

You can now switch from normal boot mode to DSRM boot mode using the Startup and Recovery settings (see Figure 9).



Figure 9 Disable incremental backups on busy volumes

Before you use WBADMIN to start a system state restore, you must identify the backup from which you want to restore. WBADMIN can perform a system state restore from either a full system backup, a backup that contains just the critical system volumes, or a system state backup.

In any of these cases, you have to specify the version of the backup you want to use. The easiest way to identify the backup versions that are available is to use the following WBADMIN command:

C:\> wbadmin get versions

WBADMIN will then display the backup versions in a form similar to the info shown in Figure 10. Note that each backup has a backup time, backup target, a version identifier (which, by the way, is the time and date the backup was started in Universal Mean Time), and a list of the types of recovery operations the backup can support.


Figure 10 Identify backups available for recovery

wbadmin 1.0 - Backup command-line tool
(C) Copyright 2004 Microsoft Corp.
Backup time: 11/30/2007 3:47 PM
Backup target: Fixed Disk labeled E:
Version identifier: 11/30/2007-22:47
Can Recover: Application(s), System State
Backup time: 12/1/2007 10:46 PM
Backup target: Fixed Disk labeled Backup(E:)
Version identifier: 12/02/2007-05:46
Can Recover: Volume(s), File(s), Application(s), Bare Metal Recovery, System State
Backup time: 12/2/2007 5:58 PM
Backup target: Fixed Disk labeled Backup(E:)
Version identifier: 12/03/2007-00:58
Can Recover: Volume(s), File(s), Application(s), Bare Metal Recovery, System State
Backup time: 12/3/2007 11:25 AM
Backup target: Fixed Disk labeled E:
Version identifier: 12/03/2007-18:25
Can Recover: Application(s), System State


In this case, I select the most recent backup and start the system state restore with this WBADMIN command:

C:\> wbadmin start systemstaterecovery –version:12/03/2007-18:25

This will perform a non-authoritative restore. If you want to perform an authoritative restore of the SYSVOL, you can just mark the restored SYSVOL replica as being authoritative by adding the authsysvol option to the WBADMIN command. For more information on this process, see go.microsoft.com/fwlink/?LinkId=113152.

Taking Active Directory Snapshots

One of the most exciting changes in terms of backup for Active Directory has nothing at all to do with Windows Server Backup. In Windows Server 2008, you can take advantage of the fact that Active Directory can provide Volume Shadow Copy Service snapshots. These snapshots are very lightweight, point-in-time backups of the running Active Directory service. And even better, they take only a few seconds of your time to create! You can then mount these snapshots and access them using normal LDAP-based utilities, such as the LDP tool.

You take snapshots of ADDS or Active Directory Lightweight Directory Services (ADLDS) using the NTDSUTIL command, as shown here:

ntdsutil: snapshot
snapshot: activate instance ntds
Active instance set to "ntds".
snapshot: create
Creating snapshot...
Snapshot set {42c44414-c099-4f1e-8bd8-4453ef2534a4} generated successfully.
snapshot: quit
ntdsutil: quit


This sequence of NTDSUTIL commands creates a Volume Shadow Copy Service snapshot of the volumes that contain the Active Directory DIT, logs, and SYSVOL.
Even though Active Directory is still being updated, Volume Shadow Copy Service uses a copy-on-write strategy to make sure that the snapshots you've taken are properly maintained. Note that the snapshots are not a complete copy of the DIT.
They are really just a collection of disk blocks in the DIT that have been modified since the snapshot was taken. By combining these blocks with the current copy of the DIT, VSS can present the Active Directory DIT just as it appeared at the time of the snapshot. Figure 11 shows how to delete old or unneeded snapshots.

Figure 11 Delete unneeded snapshots

C:\> ntdsutil
ntdsutil: snapshot
snapshot: list all
1: 2007/12/03:23:18 {42c44414-c099-4f1e-8bd8-4453ef2534a4}
2: C: {c0dd71ba-5bcd-4daf-9fbb-5cfbdd168022}
3: D: {2bbd739f-905a-431b-9449-11fba01f9931}
snapshot: delete 1
Snapshot {c0dd71ba-5bcd-4daf-9fbb-5cfbdd168022} mounted as C:\$SNAP_200712032318_VOLUMEC$\
Snapshot {2bbd739f-905a-431b-9449-11fba01f9931} mounted as C:\$SNAP_200712032318_VOLUMED$\
snapshot: quit
ntdsutil: quit
C:\>


Mounting Active Directory Snapshots

In order to use one of these snapshots, you must first instruct Volume Shadow Copy Service to make the snapshot available to the file system. You do this using the ntdsutil command to list the available snapshots and then mount the snapshot you are interested in (see Figure 12).

Figure 12 Using ntdsutil to mount a snapshot

C:\> ntdsutil
ntdsutil: snapshot
snapshot: list all
1: 2007/12/03:23:18 {42c44414-c099-4f1e-8bd8-4453ef2534a4}
2: C: {c0dd71ba-5bcd-4daf-9fbb-5cfbdd168022}
3: D: {2bbd739f-905a-431b-9449-11fba01f9931}
snapshot: mount 1
Snapshot {c0dd71ba-5bcd-4daf-9fbb-5cfbdd168022} mounted as C:\$SNAP_200712032318_VOLUMEC$\
Snapshot {2bbd739f-905a-431b-9449-11fba01f9931} mounted as C:\$SNAP_200712032318_VOLUMED$\
snapshot: quit
ntdsutil: quit
C:\>


The "list all" command lists all the available Active Directory snapshots that are currently being maintained by Volume Shadow Copy Service. The "mount 1" command mounts the selected snapshots of the Active Directory DIT and log volumes and makes them available in the file system. They are located at C:\$SNAP_200712032318_VOLUMEC$\ and C:\$SNAP_200712032318_VOLUMED$\.
If you look in these folders, you'll see the entire contents of those volumes as they were when the snapshot was taken. Note, however, that the mounted snapshots are read-only—meaning you can't modify any of the files in the mounted snapshot.

Recovering Data from Active Directory Snapshots

The task of mounting the snapshots of the volumes that contain Active Directory seems a bit like magic. How can you get to the Active Directory data contained in those snapshots? The secret is the DSAMAIN command. This is the executable that runs ADLDS. It is essentially a standalone LDAP server that shares almost all of its code with ADDS. You can use DSAMAIN to make the mounted snapshots look like a read-only LDAP server containing the Active Directory data as it was at the time the snapshot was taken.
Consider this command:

C:\> dsamain –dbpath c:\$snap_200712032318_volumed$\ntds\dit\ntds.dit -ldapport 10000

This mounts the ntds.dit file located in the c:\$snap_200712032318_volumed$\ntds\dit folder and makes it available to LDAP operations on TCP port 10000 (or whatever open port you specify). DSAMAIN will open the LDAPS port (the port used for LDAP over Secure Sockets Layer) on the port you specified plus one (in this case, 10001), the GC port (the port used for global catalog connections) on the port you specified plus two (10002), and the GCS (Global Catalog over Secure Sockets Layer) port on the port you specified plus three (10003).

You can use any LDAP program (such as LDP) to access the mounted DIT on the specified port. But in Windows Server 2008, Active Directory Users and Computers (ADUC), Sites and Services, and Domains and Trusts, as well as ADSIEDIT, have all been modified to allow you to connect them to a DIT mounted using DSAMAIN. If you right-click on the top-level node in the navigation pane of any ADUC and select Change Domain Controller, you will see the dialog box shown in Figure 13. If you simply type the name or IP address of the server hosting the mounted snapshot, along with the port (in my example, localhost:10000), ADUC will connect to the mounted snapshot, allowing you to browse the contents of the directory as it existed at the time of the snapshot. Pretty amazing, isn't it?



Figure 13 Connecting Active Directory users and computers to a mounted snapshot (Click the image for a larger view)
Being able to access directory data in this way makes many kinds of data recovery tasks much easier than they used to be. For instance, to recover a deleted object from a backup formerly required that you perform a non-authoritative restore of the backup on an existing DC and then perform an authoritative restore of the deleted object. And if the backup you restored didn't have the correct data, you had to start all over again with a different backup. Now, using tombstone reanimation and snapshots, you can quickly find and recover deleted data, and you don't even have to take the domain controller offline to do it.

There are some limitations, however. For instance, each active snapshot increases the disk I/O associated with write operations to the directory, so you probably shouldn't have more than one or two snapshots active at any point in time on a production DC. Also, the longer you keep snapshots active, the larger the Volume Shadow Copy Service delta store becomes—this can also affect performance. And, of course, simply recovering a deleted object is only the first part of the recovery problem. You will probably have to recover the object's linked attributes, such as group memberships, as well. But even in this case, the snapshot can help you identify all the groups the deleted object was a member of.


A Sound Backup and Recovery Strategy for Active Directory

Windows Server 2008 brings an entirely new backup and recovery system to the table. Some of the changes may at first cause weeping and gnashing of teeth. But once IT organizations have accepted these changes and incorporated the new backup technology into their day-to-day operations, they will wind up with a more effective backup and recovery implementation.
Even with all of the changes in the way you back up servers in Windows Server 2008, the basic strategy for backing up and recovering Active Directory doesn't really change that much. So when planning your strategy, be sure to keep these best practices in mind:

•Schedule periodic full system backups so you can recover a DC after a hardware failure. How frequently you schedule full backups of a DC depends on how frequently your data is updated, your tolerance for downtime and/or data loss, and the effort that may be required to rebuild the DC from scratch.

•Schedule frequent system state backups to back up changes in Active Directory. How frequently you perform system state backups depends on your tolerance for lost Active Directory data. But you should do this at least once a day. If you have the hardware, keep at least one or two system state backups on a local disk and copy older system state versions to a DVD or to a network share.

•Be sure to do system state backups on at least two DCs in each domain. This will provide some insurance in case one of the backups is bad or unavailable.
Be sure to back up DCs with application partition replicas if you have defined them. And consider creating a Windows Recovery Environment partition on your DCs so you can boot quickly into WinRE in case a critical system drive fails

domingo, 7 de febrero de 2010

Windows 2008 AD Recycle Bin

Para todos aquellos que están interesados en la carácteristica AD Recycle Bin de Windows Server 2008 R2, hemos recolectado los siguientes recursos para vosotros...

Active Directory Services Team Blog – Recycle Bin Post

Active Directory Recycle Bin Step-by-Step Guide

Joey Snow’s AD Recycle Bin Demo on TechNet EDGE

Cris e. avis article with answers to common AD recycle Bin questions…

jueves, 4 de febrero de 2010

Test de registros SRV con NSLOOKUP

Con estos test, se pueden comprobar con nslookup si DNS tiene las entradas correctas apuntando a los registros SRV de Directorio Activo GC, LDAP y KERBEROS donde
DOMINIO.ES es el nombre de la zona de busqueda directa.


TEST DE REGISTROS SRV EN LA RUTA _MSDCS.DOMINIO.ES

1) Teclea Start, click Run.
2) En Open, Teclea cmd.
3) Teclea nslookup, and then press ENTER.
4) Teclea set type=all, and then press ENTER.

Para Comprobar SRV Records de LDAP

Teclea:

_ldap._tcp.Nombre-predeterminado-primer-sitio._sites.dc._msdcs.dominio.es

then press ENTER.

Para Comprobar SRV Records de KERBEROS

Teclea:

_kerberos._tcp.Nombre-predeterminado-primer-sitio._sites.dc._msdcs.dominio.es

then press ENTER.

Para Comprobar SRV Records de CATALOGO GLOBAL

Teclea:

_gc._tcp.Nombre-predeterminado-primer-sitio._sites.dc._msdcs.dominio.es

then press ENTER.

TEST DE REGISTROS SRV EN LA RUTA _TCP.DOMINIO.ES

1) Teclea Start, click Run.
2) En Open, Teclea cmd.
3) Teclea nslookup, and then press ENTER.
4) Teclea set type=all, and then press ENTER.

Para Comprobar SRV Records de LDAP

Teclea:

_ldap._tcp.dominio.es

then press ENTER.

Para Comprobar SRV Records de KERBEROS

Teclea:

_kerberos._tcp.dominio.es

then press ENTER.

Para Comprobar SRV Records de CATALOGO GLOBAL

Teclea:

_gc._tcp.dominio.es

then press ENTER.

Habilitar / Deshabilitar réplicas de Directorio Activo

Turn on inbound replicationUpdated:

Applies To: Windows Server 2008, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

You can use this procedure to turn on inbound replication after it has been turned off manually.

Administrative credentials

To complete this procedure, you must be a member of the Domain Admins group in the domain of the domain controller whose replication you are enabling, or you must be a member of the Enterprise Admins group.

To turn on inbound replication
1.Open a Command Prompt.

2.Type the following command, and then press ENTER:

repadmin /options ServerName -DISABLE_INBOUND_REPL

where ServerName is the network basic input/output system (NetBIOS) name of the domain controller.

3.Verify that the option is set. The following message should appear:

Current DC options: DISABLE_INBOUND_REPL

New DC Options:

Current DC Options displays the conditions that were in effect at the time that you ran the command. New DC Options shows the effect of the command, which is that the option to disable replication is not set.


Turn off inbound replicationUpdated:

Applies To: Windows Server 2008, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

You can use this procedure to turn off inbound replication so that objects on a domain controller cannot be updated by replication from another domain controller.

Administrative credentials

To complete this procedure, you must be a member of the Domain Admins group in the domain of the domain controller whose replication you are disabling, or you must be a member of the Enterprise Admins group.

To turn off inbound replication
1.Open a Command Prompt.

2.Type the following command, and then press ENTER:

repadmin /options ServerName +DISABLE_INBOUND_REPL

where ServerName is the network basic input/output system (NetBIOS) name of the domain controller.

3.Verify that the option is set. The following message should appear:

New DC Options: DISABLE_INBOUND_REPL

Error 8457 The destination server is currently rejecting replication requests

Si tu ejecutas "repadmin /showreps" ves este error:

"Can't retrieve message string 8456 (0x2108), error 1815"

Additional Data
Error value:
8457 The destination server is currently rejecting replication requests.


Ejecuta estos comandos

repadmin /options dcname -disable_inbound_repl

repadmin /options dcname -disable_outbound_repl

Después ejecuta "repadmin /showreps" o abre el Replication Monitor

jueves, 21 de enero de 2010

Windows 7: Copy A Modified User Profile Over The Default Profile



Según el artículo de Microsoft que anexo, para personalizar un perfil de usuario de red predeterminado o un perfil de usuario obligatorio, es necesario personalizar en primer lugar el perfil de usuario local predeterminado. Una vez realizado, ya puedes copiar el perfil de usuario local predeterminado en el recurso compartido correspondiente para convertir ese perfil de usuario en el perfil predeterminado de red o en un perfil de usuario obligatorio.

Cuando el perfil predeterminado se personaliza de la forma descrita en este artículo, éste reconstruye el perfil de origen con un formato que permite que lo utilicen varios usuarios. Se trata del único método de personalización del perfil de usuario predeterminado para el sistema operativo Windows 7. Si intenta utilizar otros métodos para personalizar el perfil, puede provocar que se incluya información extraña en el nuevo perfil de usuario predeterminado. Dicha información podría causar graves problemas relacionados con la aplicación y la estabilidad del sistema operativo.

http://support.microsoft.com/kb/973289

Después de esto, aquí debajo describimos un Workaroun que puedes usar en entornos de testing para modificar el Default User Profile.Tener en cuenta que no está soportado por Microsoft con lo que usarlo bajo vuestra propia resposnsabilidad.
Espero que os sea de utilidad.

Windows 7: Copy A Modified User Profile Over The Default Profile

Below is the work around you can use to modify the Default profile by copying any profile you have previously modified over the Default profile. It is VERY much not supported by Microsoft, but for my limited tests seems to work.

The Steps: After setting up the profile for one user, lets call the account "Test", do the following:

0. Login as an admin user, but NOT Test (you don't want the files in the profile to be locked).

1. Go to c: drive in Explorer (or whatever your system drive is), hit the ALT key, go to the Tools Menu-> Folder Options and start unchecking "Hides" so Explorer sees all files (system, hidden and what not).

2. Go to Users\ and rename "Default" to "Default Back" (we want to keep the old one around in case things go south and we need to but the original Default profile back).

3. Make a copy of "Test", then rename the copy of "Test" (not the original!!!) to "Default".

4. Right click on "Default" and set the permissions so that the "Everyone" and "Users" groups have "Read & Execute", "List Folder Content" and "Read" NTFS permissions (this was the default already when I tested). At this point, you can use the Right click Computer -> "Properties"-> "Advanced System Settings"->"User Profiles" tool to delete the Adrian profile if you like.

5. Try to login as an account that does not already have a profile. If the new user's profile looks like the setting you did for "Test", all is good in the hood.

I have no idea what other problems may crop up later with this method, and keep in mind this is not the way Microsoft wants you to copy profiles. Use at your own risk, but so far these instructions have worked fine when I try to overwrite the Default user profile.

Security Advisory KB979352

Buenas tardes.Os informo de la próxima publicación de un nuevo boletín de seguridad considerado como Crítico y que afecta a todas las versiones de Internet Explorer, el cual será lanzado hoy 21 de Enero, fuera del ciclo mensual de boletines, debido a su alto impacto y criticidad.

Por este motivo, os recomiendo su revisión y la instalación de la actualización correspondiente.
A continuación os dejo los detalles técnicos de este boletín de seguridad.

--------------------------------------------------------

What is the purpose of this alert?

This is an advance notification of one out-of-band security bulletin that Microsoft is intending to release on January 21, 2010. The bulletin will be for Internet Explorer to address limited, targeted attacks against customers using Internet Explorer 6, as well as fixes for vulnerabilities rated Critical that are not currently under active attack.

The purpose of the notification is to assist customers with resource planning for this security bulletin release. The information offered in the notification is purposely general in nature to provide enough information for customers to plan for deployment without disclosing vulnerability details or other information that could put them at risk.

New Bulletin Summary
Bulletin Identifier Internet Explorer
Maximum Severity Rating Critical
Impact of Vulnerability Remote Code Execution
Restart Requirement The update will require a restart.
Affected Software All supported versions of Internet Explorer on Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008*, Windows 7, and Windows Server 2008 R2*.

* Where indicated in the Affected Software table on the Advance Notification Web Page, the vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2, when installed using the Server Core installation option. Please see the Advance Notification Web page at the link below for more details.

Although we do not anticipate any changes, the information provided in this summary is subject to change until the release.

The full version of the Microsoft Security Bulletin Advance Notification for this release can be found at http://www.microsoft.com/technet/security/bulletin/ms10-jan.mspx.

Public Bulletin Webcast

Microsoft will host a webcast to address customer questions on these bulletins:
Title: Information about Microsoft January (OOB) Security Bulletin (Level 200)
Date: Thursday, January 21, 2010, at 1:00 PM Pacific Time (U.S. & Canada).
URL: http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032440627
At this time no additional information on these bulletins, such as details regarding severity or details regarding the vulnerability, will be made available until the bulletin is published.

Resources related to this alert

1. Security Advisory 979352 – Vulnerability in Internet Explorer Could Allow Remote Code Execution: http://www.microsoft.com/technet/security/advisory/979352.mspx

2. Microsoft Knowledge Base Article 979352: http://support.microsoft.com/kb/979352

3. Issue Landing Page: http://www.microsoft.com/security/updates/ie.aspx

4. Microsoft Security Response Center (MSRC) Blog: http://blogs.technet.com/msrc/

5. Microsoft Security Research & Defense (SRD) Blog: http://blogs.technet.com/srd/

6. Microsoft Malware Protection Center (MMPC) Blog: http://blogs.technet.com/mmpc/

7. Microsoft Security Development Lifecycle (SDL) Blog: http://blogs.msdn.com/sdl/