In this second phase of your Active Directory testing, it’s time to try out the utilities included in Windows 2000 to simplify your networking duties.
        
        AD Administrator’s Toolbelt
        In this second phase of your Active Directory testing, it’s time to try out the utilities included in Windows 2000 to simplify your networking duties.
        
        
			- By Michael Chacon
 - August 01, 2000
 
		
        Last month we 
        left the newly installed Active Directory Domain Controller 
        in pristine condition. With the installation of AD complete, 
        the next step is to verify that it’s properly working 
        on your test machines. You don’t want to discover problems 
        after the users have been added or it’s in production. 
        As with any Windows 2000 or Windows NT service the first 
        place to look for useful information in terms of functionality 
        is through the Event Viewer. 
      The Event Viewer, found under the Administrators menu, 
        has been expanded beyond the original three System, Application, 
        and Security logs to include service-specific logs for 
        ease of organization. These include Directory and DNS, 
        with other services added to the viewer as they’re installed 
        on the machine as shown in Figure 1. 
      
         
            | 
        
         
          | Figure 1. The Event Viewer shows 
            you what services have been installed on your server. | 
        
      
      The first place to look is under the Directory Service 
        log. The obvious things to look for are the red stop signs 
        that are evidence of a problem with Active Directory or 
        a supporting service. As with the previous Event Viewer 
        you can open up each of these entries to display more 
        detailed information, such as a description of the service 
        ("Microsoft Directory startup complete, version 5.00.2160.1"), 
        the type ("Information"), who’s listed as the 
        user ("Everyone"), and which computer it’s installed 
        on ("LUKE"). 
      You also should look in the DNS logs to make sure that 
        this critical service is functioning properly. Remember, 
        if you don’t have a DNS server, your clients won’t be 
        able to locate the AD domain controllers. If you’re not 
        using the Microsoft DNS, then you can use Nslookup instead 
        of the Event Viewer to see if the DNS server you’re relying 
        on is functioning properly. Nslookup emulates the resolver, 
        the client part of DNS name resolution, and is a commonly 
        used command-line tool for troubleshooting DNS problems. 
        While PING is useful for verifying that the server running 
        the DNS is up and available, it doesn’t give you enough 
        information to verify that the actual DNS service is functioning. 
      
      To verify communication with a DNS service, just run 
        Nslookup at the command prompt without a server name so 
        you’ll be in interactive mode. At the > prompt type: 
      SET DEBUG 
      You’ll get a verbose response to any query. Once the 
        > prompt returns, reflecting that debug was successfully 
        turned on, type in the command SERVER followed by the 
        name of the server that you want to query. Your response 
        will look something like Figure 2. 
      
         
            | 
        
         
          | Figure 2. NSLOOKUP can help you 
            troubleshoot DNS problems for a given server. | 
        
      
      The complete details of this response are beyond the 
        scope of this article, but the return of the information 
        above shows that this DNS server was successfully queried 
        and that its response was authoritative. An authoritative 
        response means the information was returned from the actual 
        resource records, not the cache. Under the Questions: 
        section you can see that the resource record for luke.newman.org 
        was returned. From this basic response we can verify that 
        this DNS is functioning properly. 
      If a DNS problem exists, you’ll probably receive a message 
        like Figure 3. 
      
         
            | 
        
         
          | Figure 3. What a malfunctioning 
            DNS server responds to Nslookup. | 
        
      
      Since you’ll eventually be translating your practice 
        sessions to an AD production environment, be forearmed: 
        This type of query should also be a part of your regular 
        monitoring duties. DNS problems are now AD problems. 
      Another test is the obvious one: Does it work from the 
        client as intended? If AD is properly configured, test 
        workstations and member servers should be able to join 
        a domain and query the database for resources. Since our 
        DNS is verified to be functioning properly, we should 
        be able to join the NEWMAN domain. This is similar to 
        the NT process with a few minor differences, mainly that 
        you must go to a different location to find the place 
        to make the appropriate change. First, right-click on 
        My Network Places and select properties. This brings up 
        the window in Figure 4. 
      Then select Advanced | Network Identification. This brings 
        up the screen in Figure 5, which looks similar to the 
        old screen for Network Identification. 
      
         
            | 
        
         
          | Figure 4. Once AD is configured, 
            workstations and member servers should be able to 
            join a domain and query AD for resources. This starts 
            through My Network Places... | 
        
      
       
      
         
            | 
        
         
          | Figure 5. ...and lands in Network 
            Identification, where you’ll start a wizard to handle 
            the process for joining a domain. | 
        
      
       
      When you click on the Network ID button here, it starts 
        a wizard that takes you through the process of joining 
        a domain. After you complete the wizard and have joined 
        a domain, you can also further test the AD installation 
        by using the directory to locate a resource. 
      For example, if you click on the Start button and select 
        the Search option, you can look for files, folders, printers, 
        people, and other network objects. Figure 6 shows an example 
        of a search through the directory for a printer. When 
        the Directory is available, you can see the contents of 
        the directory and choose a starting location for the search. 
        Getting this far is a good indication that the directory 
        is available and functioning properly. 
      
         
            | 
        
         
          | Figure 6. After you’ve joined 
            a domain as a user, you can search for resources worldwide 
            as easily as those available locally. | 
        
      
      Rearranging the Services 
      Once you’ve verified that the AD installation is functioning 
        properly and that it can be located through the DNS, it’s 
        time to explore the various interfaces you’ll use to manage 
        the directory. Let’s look at some of the new tools that 
        have been added to the Administrative Tools menu. 
      Since you’ve probably got a strong Windows NT 4.x background, 
        you’ll no doubt be pleased that you get to relearn all 
        of the places you need to go when you want the right tool. 
        Your garage has been rearranged for you. Here are a few 
        tools worth tracking down: 
      Active Directory Users and Computers
        You’ll probably spend most of your on-going time within 
        this tool. ADUC is used to perform fundamental tasks such 
        as creating, modifying, moving, and deleting user and 
        computer accounts, organizing them with organizational 
        units (OUs). Essentially, this is where you add objects 
        to the directory. Once the objects are created, their 
        properties are accessible from this tool and it allows 
        you to publish network resources such as shared folders 
        and printers. 
      Active Directory Domains and Trusts 
        
        This presents a graphical view of the trusts created as 
        you add domains to the directory tree as shown in Figure 
        7. 
      
         
            | 
        
         
          | Figure 7. The AD Domains and 
            Trusts window gives a graphical view of trusts as 
            you add domains to the directory tree. | 
        
      
      By selecting a domain and right-clicking you can bring 
        up the Properties page (Figure 8) where you can verify 
        and manage the trust relationships.
      
         
            | 
        
         
          | Figure 8. Looking underneath 
            each domain you’ll find the means to manage the trust 
            relationships. | 
        
      
      The General tab is where you change the Domain mode from 
        mixed mode, which supports NT domains, over to native 
        mode—Win2K-only support. This is an important decision: 
        You can’t reverse it, except through reinstallation (sort 
        of like converting a file system to NTFS). The Trusts 
        tab displays the various trusts in relation to this particular 
        domain. 
      Active Directory Sites and Services 
        
        Sites are collections of well-connected subnets, which 
        are characterized as connected to each other at LAN speeds. 
        This tool allows you to manage the connections between 
        each site and the replication process that uses these 
        connections. The AD Sites and Services manager displays 
        a graphical representation of the site relationships as 
        shown in Figure 9. 
      
         
            | 
        
         
          | Figure 9. The AD Sites and Services 
            manager lets you manage the connections between sites 
            and the replication process across sites. | 
        
      
      In addition to the site replication control some of the 
        other things that are managed here are licensing, the 
        replication protocol to be used, and delegation of administrative 
        control over the various sites. 
      Computer Management 
        Another tool installed on the domain controller, which 
        will probably have more use than all the others, is the 
        Computer Management interface shown in Figure 10. 
      
         
            | 
        
         
          | Figure 10. The Computer Management 
            interface uses MMC to collect in one place all of 
            the miscellaneous tools that don’t fit elsewhere but 
            that will be essential to your day-to-day management 
            of the directory. | 
        
      
      This treasure trove of utilities is essential for the 
        day-to-day management of services that support the directory—and 
        all of the other services as well. The tools of Computer 
        Management brings almost all of the disparate utilities 
        available in NT under one roof through the Microsoft Management 
        Console. 
      This brief overview of the tools used in Active Directory 
        management just touches the edges of what you need to 
        know, but it’s a solid starting point to embark from. 
        If there’s any advice I’d offer you at this point in your 
        Win2K efforts, it’s this: You don’t need to rush this 
        product to production. Spend time with the tools you’ll 
        be using to manage the directory and supporting services. 
        Once the directory is installed, create some temporary 
        accounts and an organization to get a feel for the tools 
        and the relationships between the services and objects 
        that make up the directory. While many of the objects 
        can be torn down or rearranged fairly easily, there are 
        many that can’t be changed once they’ve been created—and 
        you don’t want to affect the work of users who rely upon 
        the system down the road when you determine that perhaps 
        a different approach would be more effective or scale 
        better. When you’re in the early stages of using Win2K, 
        don’t build something you can’t tear down; with the passing 
        of time, new and clearer ideas will move to the forefront.