Powered by Blogger.

Windows Server 2012 R2 Compelling new features

In the first week of June, Windows Server and Microsoft has released the final version of Windows 8 release preview around his brother. In those days, he began to use this version, I spent some time to carefully study the characteristics of the 2012 version. Here a small preview was not found particularly convincing.

Here are those mentioned in my Beta version of hyper-v Windows Server 2012-Multimachine, numerous enhancements, improved security, and much more in my previous report. It should be noted, also, the user interface still intends to modify the software, click on the "release" to manufacturing (RTM) stage, so I reserve my final decision. At this point, I still think that the MTRC is a professional server administrator's operating system errors.

Dynamic Access Control:

Dynamic access controls Windows Server 2012 (DAC) are a set of functions and utilities that work together to improve since the time of NT file system which is part of Windows security. He teamed with the classification, implementation of policies and audit as an alternative means to protect all types of access to unauthorized handling of encryption data.

Let's look at it from several different types of policies.


The existing power first of all, the policy, form an existing add-ins for access control list (ACL), we know already and that NT file system security. These riding ACL policies and add an extra layer of access document and permission object. They belong to all the servers in your organization, it is very widely used, and will affect all cases.

They also are more granular than specific file or folder ACLs and better translate to some of the business requirements you're likely to face. These policies take into account the identity of the user, what type of device the person is using for the access attempt and what kind of data is being accessed. It's more than just the yes-or-no choice that ACLs force you to make.


For example, a company can create information base to restrict access to certain files or folders, as data can be in the wild in the United States on the HIPAA policy. This explains the overall compliance of the organization with Government and industry regulations.

In addition, you can also create a basis for restricting access to (rather than security group explicit, should be updated regularly), the current departmental policies assigned to a user. Finally, you can create a situation in some sectors of an organization can access their work, are common in the information on financial institutions.

Political work central access and central audit policies, access policy mainly backup to demonstrate compliance is the strategic position of the organization. When you take any Government or industry regulations and compliance for this task and enter the condition included in the audit strategy, the report can then be retrieved in real time in order to prove that you applied and maintained a policy of, the spirit of the rules accumulate.

You can also see cases of inappropriate access granted, and where, in order to perfect your policy assignment, to prevent a recurrence of these holes. Users or groups can be seen in the scene trying to access the information (and failures to him)-what is useful from a security point of view, because it shows that the user has continued training needs or the consequences.

Classification of political access and audit work, which was introduced in the Windows Server 2008 R2 and reinforced in this latest version of the infrastructure. By category, you apply the tag, indicating that this property. Tag can be used for regulations applicable to the data, the time limit for the data type, data type, data privacy restrictions may be effective expiration date, and so on.

Active Directory FSMO Roles and Details

Flexable Single Master Operation Roles (FSMO):


Active Directory has five special role, for ads as a normal functioning of the primary system. Advertising has to be adopted by all of the domain controllers can be dictatorial master refers to certain features. These roles are installed automatically, usually little reason to move them, but if you eliminate commissions DC and DCPROMO failed to work properly or a catastrophic failure of a domain controller, you will need to know this to restore or transfer the role to another domain controller.

Large forest roles must appear once per forest, extensive field roles must appear only once in each domain.

The Roles:

There are five FSMO roles, two per forest, three in every Domain. A brief summary of the role is below.

Schema Master:

The structure of each tree and is distributed between domains in a forest, and it must be consistent across all objects. The schema master controls all updates and modifications to the schema.
Domain Naming:

When adding a new domain with the name of forest must be unique within the forest. When you add or remove a domain in the forest, the domain naming master must be available.

Domain Wide Roles:
RID Master:

Allocate Rid Dc in the domain. When the object that is created by the notice (for example, user, group, or computer to a SID. SID contains a domain SID (that is the same for all SIDs created in the domain) and the RID, is unique in the domain.

Moving objects between domains, you must be the current ownership of the object of the domain's RID master DC start exercising. When you add a new domain name for the forest and must be unique within the forest. When you add or remove a domain in the forest, the domain naming master must be available.

PDC Emulator:

Regression in the PDC emulator acts as a PDC Windows NT (PDC) for the compaitbility, it is capable of handling a BDC for update.

It is also responsible for the time domain syncronising.

It is also the word for a password field (for lack of a better). Any change of password is replicated to the PDC emulator as soon as possible. If it is not due to a requests Login Login password to the PDC emulator before polling the Deny logon requests, please check your password.

Infrastructure Master:

The infrastructure master is responsible for updating references from objects in its domain to objects in other domains. A global catalog, it gets all objects in all domains in the compare data is updated regularly.

Infrastructure refers to the upgrade wizard, any changes the user group. For example, if you rename or move the group members and the Group temporarily appear not to members of the group to another domain.

Dynamic Disk Types and Details

A dynamic disk is a disk type, widely used in the server field. Created by the different from a basic disk to a dynamic disk volume is not a primary partition, but the dynamic volume. There is a big difference of dynamic disks and basic disks. Effectively manage the server for each user using a dynamic disk to a dynamic disk and method of the Profile Wizard to create various types of dynamic volumes dynamic disk.

5 types of synamic disks:

Basic includes only primary partitions and logical partitions, although there are 5 types of dynamic volumes include simple, spanned volumes, striped volumes, mirrored volumes, and RAID-5 volumes. Characteristics of different volumes have different dynamically.


Simple volume:

Simple is the most simple dynamic volumes, and there is no big difference between basic partitioning, dynamic simple volumes. However, we can create any number of simple volumes, as long as disk space allows. In addition, dynamic disk can break the limit of disk space, that is using disk space to extend the simple volume you want.

Spanned volume:

Between the dynamic volumes spanned volumes can be used on most 32 disk space to create the volume, enabling full utilization of resources on the disk. This is sad, this can improve the performance and fault tolerance.

Striped volume:

Striped volumes can instructions to speed up access to data of dynamic volumes. , When we write data, the data is partitioned into 64 KB data block, then to the striped volume disk writes data at the same time. However, this dynamic volume did not feature tolerance mistakes, either.

Mirrored volume:

Users who are familiar with RAID disk know that RAID 1 has a very high level of security, because you can make mirror backups, stored data. As a RAID 1 mirrored volume is a dynamic volume. When we store data, mirrored volumes will generate a complete transcription of it and save it on another drive. Therefore, mirrored volumes require 2 discs.

RAID-5 volume:

Rectify the deficiency does not provide fault tolerance, RAID 5 digits added. RAID 5 is also called volume cross-functional tolerance and contain at least 3 disks and a maximum of 32 disks. When a disk fails during operation, when the other disk information can be manipulated and disk data recovery failed at the same time. Thus, RAID 5 has a relatively high proportion of all dynamic volumes.