Professional Documents
Culture Documents
Part 1
Part 1
zone transfers
The slave server receives a copy of the zone database
from the master server using a zone transfer. Zone
transfers are requested by the slave servers at regular
intervals. Those intervals are defined in the soa record.
A stub zone contains the list of authoritative DNS servers for a
zone (domain) and host records that contain their IP addresses
(known as glue records). It also contains the IP address of at
least one master server for the zone.
What is difference between forwarder and conditional
forwarder?
Conditional forwarders are DNS servers that only forward
queries for specific domain names. Instead of forwarding all
queries it cannot resolve locally to a forwarder, a conditional
forwarder is configured to forward a query to specific
Root hints are DNS data stored in a DNS server. ... Root hints
are used to prepare servers authoritative for non-root zones so
that they can learn and discover authoritative servers that
manage domains located at a higher level or in other sub trees
of the DNS domain namespace
• Thin image
• Contains only the operating system and possibly a few
agents, such as Configuration Manager 2012 agent
• Thick image
• Contains every application required by an end-user
• Hybrid image
• Contains some of the applications required by most
users
Overview of images
Boot image
• Windows PE
• On install media, boot.wim
• 32-bit and 64-bit platform support
• Used to capture and deploy operating systems
Install image
• The operating system
• On install media, install.wim
• Generally based on a captured reference
computer
Overview of image-based installation tools
A GPO is:
• A container for one or more policy settings
• Managed with the GPMC
• Stored in the GPOs container
• Edited with Group Policy Management Editor
• Applied to a specific level in the AD DS hierarchy
Overview of GPO scope
• Policy
settings in the Computer Configuration
node apply at system startup and every 90–120
minutes thereafter
• Policy
settings in the User Configuration node
apply at sign-in and every 90–120 minutes
thereafter
Lesson 2: Implementing and administering GPOs
15 minutes
Importing security templates