Renaming a Windows Server Domain Controller 2008

In this document, we will discuss the proper steps for renaming a Microsoft Windows Server-based domain controller 2008, I know it's something unusual, but we will have to take it into account for when it is time, since there are several reasons that come to mind ;). We can run this wizard through GUI or via command line, I will choose this last option since it will be valid for Windows Server servers 2008 Core. We will take into account that if the server has the role of Certificate Authority or Certificate Authority (AC) We will not be able to change the name.

Resize System Disk in Windows 2008

Yes!!! ya por fín Microsoft nos deja redimensionar las particiones de nuestros discos duros, sean particiones del sistema o no. En estos breves pasos vemos cómo se podría realizar. Es algo bastante interesante ya que si queremos crear o redimensionar particiones o volúmenes, antes debíamos usar aplicaciones de terceros, especialmente es interesante, ya que para realizar copias de seguridad del estado del sistema de nuestro equipo, debemos realizarlo en otro disco duro o partición.

Cloning Windows Server 2008

In this document, describes how to clone a Windows server 2008, using the Sysprep utility, as NewSID development has been discontinued. First of all, I show the official links of the application: What is Sysprep: HTTP://technet.microsoft.com/en-us/library/cc721940.aspx How Sysprep Works: HTTP://technet.microsoft.com/en-us/library/cc766514.aspx Command-line parameters: HTTP://technet.microsoft.com/en-us/library/cc721973.aspx I think that today everyone knows what Sysprep is and that its use is mandatory whenever we are going to clone any machine, whether it's a server or a post, whether physical or virtual, all machines must have a different SID, this is what Sysprep does, prepare the machine with a different SID and give us the possibility to change the name.

Taking Active Directory Snapshots on Windows Server 2008

Well, the other day I saw this in an official Microsoft doc and it had to be tested. It refers to being able to take snapshots of our Active Directory, for the simple fact of taking it to another computer and performing some tests with LDAP tools for example, or to see how our Active Directory was doing at any given time, in case we have to do an authoritative AD restore and we don't know what an object or container is called (HTTP://www.bujarra.com/?p=1593), or to use with ADrestore to find out what a Tombstone is called (HTTP://www.bujarra.com/?p=1567)… In any case, it is not advisable to have many snapshots that are not going to be used due to loss of performance.

Doing an Authoritative Restore of Active Directory on Windows Server 2008

Well, ahora veremos una pequeña diferencia con el otro tipo de restauración, esta es una restauración autoritativa. Para realizar esta restauración es obligatorio haber realizado antes una restauración no autoritativa (HTTP://www.bujarra.com/?p=1582). Con esta restauración lo que realizamos es una replicación de los objetos que acabamos de restaurar a los otros controladores de dominio, indicando que ‘nuestroDirectorio Activo es el origen de la réplica. Para realizar está restauración, no debemos reiniciar el servidor DC tras la restauración no autoritativa.

Doing a non-authoritative restore of Active Directory on Windows Server 2008

GOOD, In this document we will see how we can restore our Active Directory backup in case we need it to recover from a catastrophe. To do this,, We will need a backup of the system state (HTTP://www.bujarra.com/?p=1574) or a full copy of the server. This is called performing a non-authoritative restore of Active Directory, since we will not indicate which objects we want it to forcibly replicate to the other domain controllers.

Using AdRestore to recover Tombstone items

What is a Tombstone? Well, when we delete an object in the Active Directory it is not deleted directly, if not, the attribute 'isDeleted' is checked’ as 'True’ and is hidden from the normal view of AD consoles in addition to moving to the 'Deleted Objets' container. Eye, almost all but the most important attributes like GUID and SID are deleted. These objects remain in the Active Directory as Tombstone's until after 90 days, once this time has elapsed they are eliminated by the 'Garbage collector'. What is the Garbage Collector? It is a process that runs the Active Directory by default every 12 hours, although this parameter is modifiable in the attribute 'garbageCollPeriod'’ in the configuration object (NTDS). This, apart from removing the Tombstone's, also defragments the Active Directory. All of this comes in handy when using the Sysinternals AdRestore tool, since this utility allows us to […]