WSV401 Deconstructing an nltest /dsgetdc output C:\>nltest /dsgetdc: DC: \\PDC-01.corp.contoso.com Address: \\172.31.79.145 Dom Guid: ca21b03b-6dd3-11d1-8a7d-b8dfb156871f Dom Name: corp.contoso.com Forest Name: corp.contoso.com Dc Site Name: PDC-Site Our Site Name:

Download Report

Transcript WSV401 Deconstructing an nltest /dsgetdc output C:\>nltest /dsgetdc: DC: \\PDC-01.corp.contoso.com Address: \\172.31.79.145 Dom Guid: ca21b03b-6dd3-11d1-8a7d-b8dfb156871f Dom Name: corp.contoso.com Forest Name: corp.contoso.com Dc Site Name: PDC-Site Our Site Name:

WSV401
Deconstructing an nltest /dsgetdc output
C:\>nltest /dsgetdc:
DC: \\PDC-01.corp.contoso.com
Address: \\172.31.79.145
Dom Guid: ca21b03b-6dd3-11d1-8a7d-b8dfb156871f
Dom Name: corp.contoso.com
Forest Name: corp.contoso.com
Dc Site Name: PDC-Site
Our Site Name: Client-Site
Flags: GC DS LDAP KDC TIMESERV WRITABLE DNS_DC DNS_DOMAIN
DNS_FOREST FULL_SECRET WS
The command completed successfully
C:\>nltest /dsgetdc:contoso.nonexisting
Getting DC name failed: Status = 1355 0x54b ERROR_NO_SUCH_DOMAIN
C:\>



 
 
 




Q:
A:
 
DC-04.Corp.Contoso.com
New up-level machine
 
DC-04.Corp.Contoso.com
New up-level machine
 
DC-04.Corp.Contoso.com
New up-level machine
 
DC-04.Corp.Contoso.com
New up-level machine
 
DC-04.Corp.Contoso.com
New up-level machine
 
DC-04.Corp.Contoso.com
New up-level machine
Sync from domain account %s
Authentication type
Thread context
LocalSystem
Kerberos
LocalService
NetworkService
LocalSystem
NTLM
LocalService
NetworkService
Credential
Authenticated as
NULL
Machine account
$MachineName
Machine account
NULL
Anonymous
$MachineName
Anonymous
NULL
Machine account
$MachineName
Machine account
NULL
Anonymous
$MachineName
Machine account
NULL
Anonymous
$MachineName
Anonymous
NULL
Machine account
$MachineName
Machine account
0
1
Owned (managed by) by the KCC
1
2
Reciprocal replication
2
4
Override notify defaults (typically indicates compression)
3
8
Change notification
4
16
Disable compression
5
32
User-defined schedule
6
64
RODC topology
Transport
Application
Port
Interface
Computer join
TCP
UDP
Kerb.
LDAP
SMB
RPC
88
389
445
-
-
LsaRpc
NetLogonR
SamR
EPM
DRSUAPI
NetLogonR
-
x
x
x
x
x
x
x
x
x
135
Static (0xE000)
SMB
C-LDAP
DNS
NbtNs
445
389
53
137
-
-
-
x
x
x
x
x
x
x
DFS
DC Locator
Logon after join
x
x
x
x
x
x
x
Transport
Application
Port
Interface
TCP
DNS
EPM
Kerb
LDAP
53
135
88
389
135
Static
-
-
-
-
EPM
FrsRpc
UDP
RPC
AD Replication
x
x
Authentication
x
x
Static (0xE000)
DRSUAPI
NetLogonR
DRSUAPI LsaRpc
NetLogonR
x
-
SMB
C-LDAP
DNS
NTP
445
389
53
123
-
-
-
DFS
NbtSS
x
x
x
GPO refresh at RODC
x
Time syncronization
Reboot after Join
File Replication
(NTFRS)
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Blue Section
http://www.microsoft.com/cloud/
http://www.microsoft.com/privatecloud/
http://www.microsoft.com/windowsserver/
http://www.microsoft.com/windowsazure/
http://www.microsoft.com/systemcenter/
http://www.microsoft.com/forefront/
http://northamerica.msteched.com
www.microsoft.com/teched
www.microsoft.com/learning
http://microsoft.com/technet
http://microsoft.com/msdn
Active Directory across a decade
Windows 2000
Windows 2003
Windows Server 2008
Windows Server 2008 R2
What is DC Locator? (continued)
What’s with the LDAP ping limit?
Deconstructing an nltest /dsgetdc output
C:\>nltest /dsgetdc:
DC: \\PDC-01.corp.contoso.com
Address: \\172.31.79.145
Dom Guid: ca21b03b-6dd3-11d1-8a7d-b8dfb156871f
Dom Name: corp.contoso.com
Forest Name: corp.contoso.com
Dc Site Name: PDC-Site
Our Site Name: Client-Site
Flags: GC DS LDAP KDC TIMESERV WRITABLE DNS_DC DNS_DOMAIN
DNS_FOREST FULL_SECRET WS
The command completed successfully
C:\>nltest /dsgetdc:contoso.nonexisting
Getting DC name failed: Status = 1355 0x54b ERROR_NO_SUCH_DOMAIN
C:\>
What else does DC Locator provide?
Next closest site filtering based on RODC
Key settings and administration commands
Time Service on a virtual DC
Machine
Ethernet
1. DHCP server discovery
00-12-3F-5B-9E-3D
ARP / RARP /
DHCP
Network
DHCP broadcast
Machine
TCP/IP
DNS server: 10.10.0.1
Address: 10.10.0.21
Ethernet
00-12-3F-5B-9E-3D
DHCP
1. DHCP server discovery
DHCP broadcast
2. Request of IP information (host, DNS, gateway, …)
DHCP (UDP 67/68)
DHCP Server
Machine
Netlogon
(DC Locator)
DCs: 10.10.0.1, 10.10.10.2,
10.20.1.3
TCP/IP
DNS server: 10.10.0.1
Address: 10.10.0.21
Ethernet
00-12-3F-5B-9E-3D
DNS lookup
1. DHCP server discovery
DHCP broadcast
2. Request of IP information (host, DNS, gateway, …)
DHCP (UDP 67/68)
3. DC lookup: IP addresses for domain Contoso.com
DNS (UDP/TCP 53)
DNS Server
Machine
Netlogon
(DC Locator)
DCs: 10.10.0.1, 10.10.10.2,
10.20.1.3
TCP/IP
DNS server: 10.10.0.1
Address: 10.10.0.21
Ethernet
00-12-3F-5B-9E-3D
c-LDAP
1. DHCP server discovery
DHCP broadcast
2. Request of IP information (host, DNS, gateway, …)
DHCP (UDP 67/68)
3. DC lookup: IP addresses for domain Contoso.com
DNS (UDP/TCP 53)
4. DC Locator pings the DCs and one is chosen
LDAP (UDP 389)
Directory
Machine
Netlogon
(DC Locator)
DCs: 10.10.0.1, 10.10.10.2,
10.20.1.3
TCP/IP
DNS server: 10.10.0.1
Address: 10.10.0.21
Ethernet
00-12-3F-5B-9E-3D
SMB
1. DHCP server discovery
DHCP broadcast
2. Request of IP information (host, DNS, gateway, …)
DHCP (UDP 67/68)
3. DC lookup: IP addresses for domain Contoso.com
DNS (UDP/TCP 53)
4. DC Locator pings the DCs and one is chosen
LDAP (UDP 389)
5. Machine connects to DC and secure channel is established
SMB (TCP 445) and
RPC
Directory
Machine
Kerberos
Kerberos ticket
Netlogon
(DC Locator)
DCs: 10.10.0.1, 10.10.10.2,
10.20.1.3
TCP/IP
DNS server: 10.10.0.1
Address: 10.10.0.21
Ethernet
00-12-3F-5B-9E-3D
LDAP +
Kerberos
1. DHCP server discovery
DHCP broadcast
2. Request of IP information (host, DNS, gateway, …)
DHCP (UDP 67/68)
3. DC lookup: IP addresses for domain Contoso.com
DNS (UDP/TCP 53)
4. DC Locator pings the DCs and one is chosen
LDAP (UDP 389)
5. Machine connects to DC and secure channel is established
SMB (TCP 445) and
RPC
6. Machine queries KDC (DC Locator), authenticates and ticket is
retrieved
Directory
Kerberos (TCP 88)
1. DHCP server discovery
DHCP broadcast
Policy objects
Scripts
2. Request of IP information (host, DNS, gateway, …)
DHCP (UDP 67/68)
3. DC lookup: IP addresses for domain Contoso.com
DNS (UDP/TCP 53)
Kerberos
Kerberos ticket
4. DC Locator pings the DCs and one is chosen
LDAP (UDP 389)
Netlogon
(DC Locator)
DCs: 10.10.0.1, 10.10.10.2,
10.20.1.3
5. Machine connects to DC and secure channel is established
SMB (TCP 445) and
RPC
TCP/IP
DNS server: 10.10.0.1
Address: 10.10.0.21
6. Machine queries KDC (DC Locator), authenticates and ticket is
retrieved
Kerberos (TCP 88)
Ethernet
00-12-3F-5B-9E-3D
7. Policy downloaded and executed: policy query (RPC + LDAP),
policy download (SMB)
RPC
LDAP (TCP 389)
SMB (TCP 445)
Machine
Group Policy
RPC + LDAP +
SMB
Directory
Transport
Application
Port
Interface
Computer join
TCP
UDP
Kerb.
LDAP
SMB
RPC
88
389
445
-
-
LsaRpc
NetLogonR
SamR
EPM
DRSUAPI
NetLogonR
-
x
x
x
x
x
x
x
x
x
135
Static (0xE000)
SMB
C-LDAP
DNS
NbtNs
445
389
53
137
-
-
-
x
x
x
x
x
x
x
DFS
DC Locator
Logon after join
x
x
x
x
x
x
x
Transport
Application
Port
Interface
TCP
DNS
EPM
Kerb
LDAP
RPC
53
135
88
389
135
Static
-
-
-
-
EPM
FrsRpc DRSUAPI NetLogonR DRSUAPI LsaRpc
AD Replication
x
x
Authentication
x
x
UDP
C-LDAP DNS
SMB
Static (0xE000)
445
NetLogonR
x
-
DFS
NbtSS
389
53
123
-
-
-
x
x
GPO refresh at RODC
x
Time syncronization
Reboot after Join
File Replication (NTFRS)
NTP
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
1
http://msdn2.microsoft.com/en-us/library/ms675656(VS.85).aspx
1: suppress First/Last ANR
2: suppress Last/First ANR
Attribute behavior – searchFlags
128
bit 7
64
bit 6
32
bit 5
Subtree index
(ADAM)
Confidential
attribute
16
bit 4
8
bit 3
4
bit 2
Copy attribute when user
account is copied
Tuple
index
Preserve upon
logical deletion
(tombstone)
2
bit 1
1
bit 0
Member of ANR
set
Containerized
index
Attribute
index
Display specifiers
User Shell
Administrative
tools
affects
Display
specifiers
(UK)
Display
specifiers
(US)
Display specifiers are
defined for each locale
Object
classes
Stored
Storedin
inlocale-specific
locale-specific
container
containerin
inthe
theconfiguration
configuration
NC
NC
(First word = GivenName AND Second Word = Surname)
… or
(First word = Surname AND Second Word = GivenName)
(&(ANR=Jairo Cadena)...)
Security descriptor is replaced
(including inheritance flags)
ACL
Members of administrative
group(s)
Member-object’s
ACL
ACL
cn=AdminSDHolder,cn=System,dc=<domain>…
Template ACL (a
container)
Enterprise Admins
Schema Admins
Domain Admins
Administrators
Account Operators
Server Operators
Print Operators
Backup Operators
Cert Publisher
Replicator (*)
Domain Controllers (*)
dsacls cn=adminsdholder,cn=system,dc=…. /G “Password Admins:CA;Change Password”
List Object mode
List Object mode
Tombstone reanimation (undelete)
Miscellaneous
Fundamentals
DC identification
Contoso.com forest configuration/schema NC
Contoso.com domain NC
Contoso.com
Connection Object
DC2
DC1
DC3
DC4
Contoso.com forest configuration/schema NC
Contoso.com domain NC
Corp.Contoso.com domain NC
Contoso.com
Connection Object
Corp.Contoso.com
DC5
DC2
DC1
DC6
DC3
DC4
Contoso.com forest configuration/schema NC
Contoso.com domain NC
Corp.Contoso.com domain NC
Contoso.com
Connection Object
Corp.Contoso.com
GC5
DC2
DC1
DC6
DC3
GC4
Intrasite
replication
Intersite
replication
Transport
RPC
RPC or SMTP
Topology
Ring
Spanning Tree
Schedule
Frequency
Schedule
Availability Schedule
Replication
Model
Notify & Pull
Pull / Store and
Forward
Compression
None
Configurable
Naming contexts (NCs)
Update Sequence Numbers (USNs)
DS1

Add new user on DS1


USN: 4710
4711
Object usnCreated = 4711
DS1 USN increases to 4711
DS1 object metadata below
Object usnChanged = 4711
Property
Value
USN
Version#
Timestamp
Originating GUID
Orig. USN
P1:
Value
4711
1
<time>
DS1
4711
P2:
Value
4711
1
<time>
DS1
4711
P3:
Value
4711
1
<time>
DS1
4711
P4:
Value
4711
1
<time>
DS1
4711
DS2
DS1

2052
USN: 2051
USN: 4711
Object usnCreated = 2052
User replicated to DS2


DS2 USN increases to 2052
DS2 object metadata below
Object usnChanged = 2052
Property
Value
USN
Version#
Timestamp
Originating GUID
Orig. USN
P1:
Value
2052
1
<time>
DS1
4711
P2:
Value
2052
1
<time>
DS1
4711
P3:
Value
2052
1
<time>
DS1
4711
P4:
Value
2052
1
<time>
DS1
4711
High watermark vector (HWV) table
DS1
USN: 4711
DC GUID
Highest known USN
DS1 GUID
DS3 GUID
4711
1217
DS4
DS2
USN: 3388
USN: 2052
 DS4’s high-watermark vector
 assumes that DS1 and DS3 are its
replication partners
DS3
USN: 1217
Up-to-dateness (UTD) vector table
DS1
USN: 4711
Invocation
ID
Highest
originating USN
Replication
timestamp
DS1 GUID
4691
12:02.31
DS2 GUID
2052
12:02.29
DS3 GUID
1216
12:02.36
DS4
DS2
USN: 3388
USN: 2052
 DS4’s up-to-dateness vector
 assumes that DS1, DS2 and DS3 have all
originated writes against the partition
DS3
USN: 1217
Conflict resolution
Conflict resolution
Conflict resolution
#Objects
Users
1
10
100
500
1,000
Global Groups
Universal Groups
Volumes
14,108
10,437
11,227
9,667
“13,019”
“11,309”
“11,145”
“10,277”
45,563
25,683
26,741
21,691
“47,037”
“26,902”
“26,823”
“22,848”
39,583
28,743
29,675
22,602
“386,148”
“187,754”
“185,606”
“149,736”
173,105
102,404
119,180
81,691
“1,914,087”
“905,015”
“906,079”
“715,577”
291,041
194,926
199,054
151,989
“3,818,256”
“1,815,170”
“1,803,090”
“1,436,085”
Intersite replication
“Intrasite replication”
Replication epochs
Replication notification intervals
Replication notification intervals
Intersite change notification
Reciprocal replication
Urgent replication
Password replication
PDC chaining
DC
User
PDC
Administrator
Lingering objects
Replication consistency
Replication consistency
Forest A
Cross Forest Trust
Forest B
LDAP connection specifics
LDAP authentication security
LDAP query requirements
LDAP query options
More LDAP query options
Connection specifics
Query specifics
Query filter specifics
http://msdn2.microsoft.com/en-us/library/aa746475.aspx
http://msdn2.microsoft.com/en-us/library/aa366108(VS.85).aspx
Query efficiency
VLV / Containerized index
Returned attributes
LDAP policies
LDAP policies
LDAP policies
LDAP policies
LDAP policies
Some interesting session options
Some interesting controls
Some interesting controls
RootDSE
Extended error messages
Basics
Basics
Schema master
Schema master
Domain Naming master
Domain Naming master
PDC
PDC
RID master
RID master
Infrastructure master
Infrastructure master
SYNTAX: <ordinal>,<display text>,<executable path>
SYNTAX: <ldapdisplayname>,<column header>,<default visibility>,<width>,<reserved/unused>