Windows NT FAQWhat's NewOne months of additions are listed here. Monday 7 June
Thursday 3 June
Wednesday 2 June
Tuesday 1 June
Monday 31 May
Contents
Core
Registry
Service Packs and Hotfixes
Windows 2000 (NT 5.0)
File Systems
Distributed File System
Network
Active Directory
Domains
Terminal Server
RAS
TCP/IP
DHCP
DNS
WINS
Exchange/Windows Messaging
Internet Information Server
Proxy Server 2.0
Internet Explorer 4.0/5.0
Installation
License
Windows 95/98 as a client
MS-SQL Server
NetWare
Macintosh
RAID
Performance
System Information
MultiMedia
User Configuration
Environment - Desktop
Environment - Command Prompt
System Configuration
System Policy
Security
Backups
Recovery
Problem Solving
Printing
SupportTrainingUtilities
Compatibility
Hardware
Windows Scripting Host
Batch Files
Various
ImpressumQ. What are the differences between NT Workstation and NT Server? A. See table Below
A. NT actually stands for Northern Telecom but
Microsoft licensed it and in the Windows sense stands for New Technology.
Its also interesting to note its heritage Q. What is the NT Boot Process? A. Firstly the files required for NT to boot are
The common Boot sequence files are
The boot sequence is as follows
A. Virtual Memory makes up for the lack of RAM in computers by using space on the hard disk as memory, Virtual Memory. When the actual RAM fills up (actually its before the RAM fills) then virtual memory is created on the hard disk. When physical memory runs out, the Virtual Memory Manager chooses sections of memory that have not been recently used and are of low priority and writes them to the swap file. This process is hidden from applications, and applications views both virtual and actual memory as the same. Each application that runs under Windows NT is given its own virtual address space of 4GB (2GB for the application, 2GB for the operating system). The problem with Virtual Memory is that as it writes and reads to the hard disk, this is much slower than actual RAM. This is why if an NT system does not have enough memory it will run very slowly. A. In the late 1980's the Windows environment was created to run on the Microsoft DOS operating system. Microsoft and IBM joined forces to create a DOS replacement that would run on the Intel platform that led to the creation of OS/2, and at the same time Microsoft was working on a more powerful operating system that would run on other processor platforms. The idea was that the new OS would be written in a high level language (such as C) so it would be more portable. Microsoft hired Dave Cutler (who also designed Digital's VMS) to head the team for the New Technology Operating System (NT :-) ). Originally the new OS was to be called OS/2 NT. In the early 1990's Microsoft released version 3.0 of its windows OS which gained a large user base, and it was at this point that Microsoft and IBM's split started as the two companies disagreed on the future of their OS's. IBM viewed Windows as a stepping stone to the superior OS/2, where as Microsoft wanted to expand Windows to compete with OS/2, so they split, IBM kept OS/2 and Microsoft change OS/2 NT to Windows NT. Nt was once called OS/3, and OS/2 V3, I am informed by a alpha tester for IBM & MS, he had a set of 5.25 diskettes from Microsoft, and that's how he got them. The first version of Windows NT (3.1) was released in 1993 and had the same GUI as the normal Windows Operating System, however it was a pure 32 bit OS, but provided the ability to also run older DOS and Windows apps, as well as character mode OS/2 1.3 programs. For a detailed history have a look at http://windowsnt.miningco.com Q. How do I install the SYMBOL files? A. Symbol files are produced by the linker when a program is built, and are used to resolve global variables and function names in an executable.
For more information see Microsoft Knowledge Base article Q148659 A. Windows NT (both the Workstation and Server) is a 32-bit Operating System. It is a preemptive, multi-tasking Operating System, which means that the Operating System controls allocation of CPU time, not the applications, stopping one application from hanging the OS. NT supports multiple CPU's giving true Multi-tasking, using symmetrical multiprocessing, meaning the processors share all tasks, as opposed to asymmetrical multiprocessing, where the OS uses one CPU and the applications another. NT is also a Fault Tolerant Operating System, with each 32bit application operating in its own Virtual Memory address space (4 GigaBytes) which means one application cannot interfere with another's memory space. Unlike earlier version of Windows (such as Windows for Workgroups and Windows 95), NT is a complete Operating System, and not an addition to DOS. NT supports different CPU's: Intel x86, IBM PowerPC (Not to be supported for NT5.0) and DEC Alpha. NT's other main plus is its Security with a special NT file system (NTFS) that allows permissions to be set on a file and directory basis. A. Originally there were .ini files in Windows, however the problem with .ini files are many, e.g. size limitations, no standard layout, slow access, no network support etc. Windows 3.1 (yes Windows not Windows NT) had a registry which was stored in reg.dat and could be viewed using regedit.exe and was used for DDE, OLE and File Manager integration. In Windows NT the Registry is at the heart of NT and is where nearly all information is stored, and is split into a number of subtrees, each starting with HKEY_ to indicate that it is a handle that can be used by a program.
Each of the subtrees has a number of keys, which in turn have a number of subkeys. Each key/subkey can have a number of values which has 3 parts
To edit the registry there are two tools available, regedt32.exe and regedit.exe.Regedit.exe has better search facilities, but does not support all of the Windows NT registry value types. If you want to just have a look around the Registry:
Q. What files make up the registry, and where are they? A. The files that make up the registry are stored in %systemroot%/system32/config directory and consist of
There are also other files with different extensions for some of them
Q. How do I restrict access to the registry editor? A. Using the registry editor (regedt32.exe)
Q. What is the maximum registry size? A. The maximum size is 102MB, however it is slightly more complicated than this. The registry entry that controls the maximum size of the registry is HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\RegistrySizeLimit. By default this entry will not exist so it will need to be created:
The minimum size is 4MB, and if anything less than this is entered in the registry then it will be forced up to 4MB. The maximum is 80% of the paged pool (which has a maximum size of 128MB, hence 102MB which is 80% of 128MB). If no entry is entered then the maximum size is 25% of the paged pool. The paged pool is an area of physical memory used for system data that can be written to disk when not in use. An important point to note is that the RegistrySizeLimit is a maximum, not an allocation, and so setting a high value will not reserve the space, and it does not guarantee the space will be available. This can also be configured using the System Control Panel applet, click on the Performance tab and the maximum registry size can be set there. You would then need to reboot. For more information see Knowledge Base Article Q124594 There is another complication, during early boot, NTLDR loads some code, allocates working memory, and reads in parts of the registry. All of this has to fit in the first 16MB of memory regardless of how much memory is physically installed. The entire system file is read; enough memory is required to contain the whole file as stored on disk without regard to how much of it is useful. Some problems
A number of ways to get rid of the excess space:
To turn this off use REGEDT32 to add the value "ReportBootOk:REG_SZ:0" [zero] to HKEY_Local_Machine\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon This will prevent creation of the LastKnownGood ControlSet. If a boot fails because the 16 MB limit with NTLDR is exceeded, no dump can be produced and MS will not solve the problem. This 16 MB problem will not be changed in NT 5. Q. Should I use REGEDIT.EXE or REGEDT32.EXE? A. You can use either for NT. REGEDIT does have a few limitations, the largest is that it does not support the full regedit data types such as REG_MULTI_SZ, so if you edit this type of data with REGEDIT it will change its type. REGEDIT.EXE is based on the Windows95 version and has features that REGEDT32.EXE lacks (such as search). In general REGEDIT.EXE is nicer to work with. REGEDIT.EXE also shows your current position in the registry at the bottom of the window. Q. How do I restrict access to a remote registry? A. Access to a remote registry is controlled by the ACL on the key winreg.
It is possible to set up certain keys to be accessible even if the user does not have access by editing the value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg\AllowedPaths\Machine (use regedt32). You can add paths to this list. Q. How can I tell what changes are made to the registry? A. Using the regedit.exe program it is possible to export portions of the registry. This feature can be used as follows:
Q. How can I delete a registry value/key from the command line? A. Using the Windows NT Resource Kit Supplement 2 utility REG.EXE you can delete a registry value from the command line or batch file, e.g. reg delete HKLM\Software\test Would delete the HKEY_LOCAL_MACHINE\Software\test value. When you enter the command you will be prompted if you really want to delete, enter Y. To avoid the confirmation add /f to the command, e.g. reg delete HKLM\Software\test /f A full list of the codes to be used with REG DELETE are as follows:
To delete a entry on a remote machine add the name of the machine, \\<machine name>, e.g. reg delete HKLM\Software\test \\johnpc Q. How can I audit changes to the registry? A. Using the regedt32.exe utility it is possible to set auditing on certain parts of the registry. I should note that any type of auditing is very sensitive lately and you may want to add some sort of warning letting people know that their changes are being audited.
You will need to make sure that Auditing for File and Object access is enabled (use User Manager - Polices - Audit). To view the information use Event Viewer and look at the Security information. Q. How can I clean up/remove invalid entries from the registry? A. Microsoft have released a utility called RegClean which will go through your machines registry and delete any unused/unnecessary keys. The current version is 4.1a and can be downloaded from http://support.microsoft.com/download/support/mslfiles/RegClean.exe . Once downloaded just click on the Executable and it will check your registry, once the check is completed you will be given an option to fix errors "Fix Errors" button. You can click the Exit button to exit. RegClean creates an uninstall file in the directory the image is located in, of the name "Undo <machine name> <yyyymmdd> <hhmmss>.reg" To undo the changes just double click (or single depending on your config ;-) ) this file. See http://support.microsoft.com/support/kb/articles/q147/7/69.asp for more information. Q. I make changes to HKEY_LOCAL_MACHINE\HARDWARE but they are lost on reboot. A. This is because HKEY_LOCAL_MACHINE\HARDWARE is recreated by the system at boot time and this means any settings such as ACL's are lost. The rest of HKLM (SOFTWARE, SYSTEM, SAM, SECURITY) is stored on disk, and is not recreated during system boot. Q. What data types are available in the registry? A. Below is a table of data types supported by Regedt32.exe, regedit.exe does not support REG_EXPAND_SZ or REG_MULTI_SZ
Q. How can I automate updates to the registry? A. There are 2 main methods you can use to create scripts that can be run to automate the updates. The first is to create a .reg file which can then be run using regedit /s <reg file> The format of the file is REGEDIT4 for example REGEDIT4 [HKEY_USERS\.DEFAULT\Control Panel\Desktop] [HKEY_USERS\.DEFAULT\Control Panel\Colors] Would set the default background and color before anyone logs on. The second method is to user a Windows 95 style .inf file. These are run using the command rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 <inf file> The format of the file is as follows [Version] [Strings] [DefaultInstall] [AddReg] Below are the keys to be used
The file below is an .inf file which performs the same as the .reg file described earlier [Version] [DefaultInstall] [AddReg] INF files can be generated automatically using the SYSDIFF utility if you have a difference file (sysdiff /inf <name of difference file> <dir to create to>) Q. How do I apply a .reg file without the success message? A. To apply a .reg file (a registry information file) the normal method from the command prompt is to enter C:\> regedit <registry file>.reg This applies the change and gives a confirmation message: "Information is <filename>.reg has been successfully entered into the registry" If you would like to avoid this confirmation message and apply the change silently use the /s switch, e.g. C:\> regedit /s <registry file>.reg Q. How can I remotely modify the maximum registry size? A. The maximum registry size is usually defined using the System properties control panel applet, Performance tab. When you change this value all it actually does is to update the registry entry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\RegistrySizeLimit You could therefore modify this from the command line using a registry script. For example REGEDIT4 [HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control] Run using C:\> regedit /s <reg name> You could add this to a login script. Alternatively run remotely by submitting with the AT command. The change
will not take effect until the machine reboots. If you wanted the reboot to
occur you could add a reboot using the Resource Kit SHUTDOWN.EXE utility (as
explained in Q. I can't update DWORD values using REG.EXE. A. There is a bug in REG.EXE supplied with the NT 4.0 resource kit. Download a fixed version from ftp://ftp.microsoft.com/bussys/winnt/winnt-public/reskit/nt40/i386/reg_x86.exe Q. How can I install a .inf file from the command line? A. The normal method to install a .inf file is to right click on it and select Install from the context menu however it is also possible to install from the command line. The syntax is: C:\> rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 .\<file>.inf Q. How can I compress the registry? A. The following procedure can be used to compact the registry files, but also to restore the 'repair disk data' when you messed up the registry: 1) As always, make sure you have a backup of you're system, including the registry 2) Run Start: "RDISK /S-". This automatically updates the repair info located under %systemroot%\repair. The registry data are reorganized and compressed. 3) Next step is to expand these files to a temporary location. EXPAND %systemroot%\REPAIR\DEFAULT._ %temp%\DEFAULT 4) Check your %temp% folder and %systemroot%\system32\config to find the difference in size between the different files that make up the registry. Probably the SOFTWARE hive will have a remarkable difference. In my case it shrinked from over 10Mb to 3.5Mb. 5) The registry files in %systemroot%\system32\config should be replaced by the reorganized ones in your %temp% folder. You can do this by:
When I performed these steps I notices a serious performance gain during system startup. Q. What service packs and fixes are available? A. See table below. All directories are off of ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40. Just click on the file name for a direct FTP link For people in Europe ftp.sunet.se/pub3/vendor/microsoft/bussys/winnt/winnt-public/fixes may provide faster access. There are also Microsoft BBS numbers where Service Packs can be downloaded from, e.g. for the UK it is 44 1734 270065, however the fixes tend to be a few days later than on the FTP site.
Service Pack 1 Hotfixes /hotfixes-postsp1/
Service Pack 2 Hotfixes /hotfixes-postsp2/
Service Pack 3 Hotfixes /hotfixes-postsp3/ A number of post Service Pack 3 hotfixes have been replaced by newer fixes and are not listed above, they can be found at ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-postSP3/archive . These include
Service Pack 4 Hotfixes /hotfixes-postsp4/ A post Service Pack 4 hotfix rollup has been released and can be downloaded
from: Individual hotfixes are:
Service Pack 5 Hotfixes /hotfixes-Postsp5/
The file names above are for the Intel platform (hence the ending I), but they may also be available for Alpha and PPC, just substitute the I for a A(Alpha) or P(PPC). I should note a health warning, "If it ain't broke, don't fix it" and I would tend to agree with this, so unless you have a problem, or require a new feature of a Service Pack think if you really want it. Also if you are going to apply it to a live system, try and test it first, as sometimes a Service Pack will introduce new problems. Q. What are the Q numbers and how do I look them up? A. The Q numbers relate to Microsoft Knowledge Base articles and can be viewed at http://support.microsoft.com/support/ Q. How do I install the Service Packs? A. If you receive the Service Pack by downloading from a Microsoft FTP site, then copy the file to a temporary directory and then just enter the file name (e.g. Sp2_400i.exe). The file will be expanded and among the files created a file called UPDATE.EXE will be created. Just run this file. If there is no UPDATE.EXE, just .sym files you have downloaded the symbols version which is used for debugging NT, download the normal version (see above). If you receive Service Packs via CD, if you just insert the CD (for SP2 and later) and an Internet Explorer page will be shown and you can just click on install for the Service Pack. Q. How do I install the Hot fix? A. Again copy the file to a temporary directory and run the file name. A few files will be created, one called HOTFIX.EXE. Run "HOTFIX /install" which will install the Hot Fix. The newer Hot fixes (Java fix for Service Pack 3 onwards) you just double click on the downloaded file. A. Use the command Hotfix /remove to remove a hotfix. Before you can do this you will need to expand the original hotfix file using the <hotfix> /x command. To force the remove using the registry editor (regedt32) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\HOTFIX and delete the entry for the HOTFIX. Then use explorer to goto %SystemRoot%\HOTFIX\HF00?? and copy the backed up files back to their original location. Q. How do I install Service Pack 3? A. Before you install Service Pack 3 you must remove Internet Explorer 4.0 preview if installed:
Also before installing SP3 make sure you have an up to date Repair Disk (RDISK /S). To install Service Pack 3 download Nt4sp3_i.exe and follow the instructions below
Q. Emergency Repair Disk issues after installation of Service Pack 3. A. Due to changes in Service Pack 3 the Emergency Repair Disk process has changed. The file setupdd.sys that is on the 2nd NT installation disk has been superseded by the one supplied with service pack 3. To extract the file from the Service Pack 3 executable, follow the instructions below:
This is discussed in the Service Pack 3 readme file, and also in knowledge base article Q146887. Q. How do I remove the Java Hotfix for Service Pack 3? A. Manually unpack the hotfix This method may become the new standard for hot fixes. Q. How do I install multiple Hotfixes at the same time? A. When you extract the files in a hotfix, generally the following will be extracted
The hotfix.exe is the same executable for all the hotfixes, and the hotfix.inf is basically the same, the only difference is the files that are to be copied, e.g. tcpip.sys, and a description of the hotfix. To install multiple hotfixes at the same time all that is needed is to decompress the hotfix files and update the hotfix.inf with the information on which files to copy.
The reason we copied the .inf files is that you can just cut and paste the hotfix specific information to the common hotfix.inf. When you decompressed a hotfix you will see which files were created, you could then search the .inf file for the file name and it would be in two places, the directory it belongs in and the [SourceDisksFiles] section. You could then go to the bottom of the file and cut and paste the HOTFIX_NUMBER and COMMENT and add to the end of HOTFIX.INF. This is very hard to explain and an example is probably the best way to demonstrate this. Suppose you want to install
The procedure would be as follows
To install just type hotfix from the directory created (i.e. hotfix), you will see a dialog copying the files (the ones you have specified in the hotfix.inf file :-) ), and the system will reboot. To see what hotfixes are installed:
Q. How do I install Hotfixes the same time as I install Service Pack 3 onwards? A. Update.exe that ships with Service Pack 3 checks for the existance of a hotfix subdirectory, and if in that directory the files hotfix.exe and hotfix.inf are present you are asked when running update.exe if you also want to install the hotfixes.
Q. I have installed Service Pack 3, now I cannot run Java programs. A. Download the updated Java Virtual Machine from Microsoft at http://www.microsoft.com/java/download/dl_vmsp2.htm . Download build 1518 which works with IE3.01, IE 3.02 and IE 4.0 platform preview 1, do NOT install on IE 4.0 PP2 or the release version. There is also a hotfix for Service Pack 3 available from Microsoft ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-postSP3/java-fix/JAVAFIXI.EXE Q. I have installed Service Pack 3, however the Policy Editor has not been updated. A. This is caused by a mistake in the Service Pack 3 update.inf file. The entry for poledit.exe (the executable for the policy editor) is specified in the [MustReplace.system32.files] section whereas the file should actually be in the [SystemRoot.files]. To install the new Policy Editor perform the following
Alternatively you can update the update.inf fiile and move the location of poledit.exe from [MustReplace.system32.files] to [SystemRoot.files]. Q. How can I tell if I have the 128 bit version of Service Pack 3 installed? A. The easiest way to tell this is to examine the secure channel dynamic link library (SCHANNEL.DLL):
Q. How do I install a service pack during a unattended installation? A. There are various options, however all of them require for the service pack to be extracted to a directory, using NT4SP3_I /x and you then enter the directory where you want to extract to. You could extract to a directory under the $OEM$ installation directory which would then be copied locally during the installation and you could add the line ".\UPDATE.EXE -U -Z" to CMDLINES.TXT. This will increase the time of the text portion of the installation as the contents have to be copied over the network. With Service Pack 4 you could just add and not need to expand the service pack first. [Commands] Simply create a folder called sp4 under $OEM$ and copy sp4i386.exe to it. If using the above you should ensure you have the following in unattended.txt [Unattended] An alternate method is to install from a network drive, this requires a bit more work:
Q. What order should I apply the Hot fixes? A. There is no specific order to apply post Service Pack 4 and Service Pack 5 hotfixes. The Service Pack 3 hotfixes are, for the most part, cumulative. This means that the latest binary also includes fixes previously made to the same binary. For example, the 01/09/98 version of Tcpip.sys (teardrop2-fix) also includes previous fixes to Tcpip.sys (such as land-fix, icmp-fix, and oob-fix). When you apply multiple fixes, please install them in the following order to ensure a newer fix is not replaced by an older one.
For the Microsoft version of the list please see ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-postSP3/postsp3.txt Q. I get an error message when I try to re-apply a hotfix after installing a service pack? A. If when you try and reinstall a hotfix (after re-applying a service pack etc.) you get the error Hotfix: The fix is already installed. you need to remove the hotfix before trying to reinstall. To remove a hotfix you would usually use hotfix /r or hotfix -y (depending on the version, to check how use /? on the hotfix for the syntax) however there are situations where it will refuse to remove the hotfix: Hotfix: Fix <name of hotfix> was not removed. All the hotfix actually does when you install one is to check a registry entry so see if it already there, so to get round this problem we can go into the registry and remove the hotfixes corresponding entry.
The fix is still installed on the system, all you have done is removed NT's knowledge of its installation so you will now be able to re-install the hotfix in the normal way. Q. When will Service Pack 4 be released and what's in it? A. Service Pack 4 has now been released. The contents of Service Pack 4 are here in the readme.txt file. An extra file, Y2K, is available which is around 70MB and this contains updates to other components to make them Year 2000 compliant such as IE 4.0 Service Pack 1. Bugs fixed in Service Pack 4 are as follows: Service Pack 4Q109993 Winsock Application Causes 0x0000000A Blue Screen STOP Message Q112547 Dial-Up Networking Hangs After Failed Multilink Attempt Q123597 WinNT Err Msg: Error 614 Out of Buffers When Using RAS Script Q125020 NetBIOS SEND WAIT Call Returns Before RECEIVE is Sent Q129047 Synchronizing DNS Information in Registry with Boot Files Q129457 Anonymous Connections May Be Able to Obtain the Password Policy Q137565 System Error 53 When Connecting to a FQDN Q138791 SCSI Printing Devices Requiring Wide SCSI May Fail Q141496 DHCP Client Comment Disappears When Obtaining IP Address Q141708 Printing to LPD Printer Is Slow or Fails with Windows NT Q142026 Err: "Hidden Console of WOW VDM" Running 16-bit or MS-DOS App Q142047 Bad Network Packet May Cause Access Violation (AV) on DNS Server Q142615 Event Log Service Fails to Check Access to Security Log File Q142635 Cannot Change the Drive Letter of Removable Drives Q143160 Enterprise Server Stops During Print Spooling Q143478 Stop 0A in Tcpip.sys When Receiving Out Of Band (OOB) Data Q143484 IIS Services Stop with Large Client Requests Q146095 STOP: 0x0000000A or STOP: 0x0000001E in Tcpip.sys Q146965 GetAdmin Utility Grants Users Administrative Rights Q147222 Group of Hotfixes for Exchange 5.5 and IIS 4.0 Q147706 How to Disable LM Authentication on Windows NT Q149658 TCP/IP Printing Causes File Cache to Grow Q150953 Nwuser.exe Send Function Truncates Messages to 38 Characters Q151677 NWLink SPX Ignores Allocation Number Sent By Peer Q151778 Huge Downlevel Print Job Causes File Cache to Grow Q151860 STOP 0x0A While Writing to the Middle of a Cached File Q152079 SNMP Traps Contain Invalid Agent ID Field Q152764 Garbled Characters Appear in Windows NT Print Queue Q152993 Raster Fonts Print Different on Windows NT 4.0 Than on 3.51 Q153161 WinNT Systems Running RAS May Exhaust Available DHCP Leases Q153296 Write Cache on IDE/ATAPI Disks Is Not Flushed on Shut Down Q154087 Access Violation in LSASS.EXE Due to Incorrect Buffer Size Q154094 Using Iomega ATAPI Zip Drives with Windows NT Q154162 Memory Leak in Perfmon.exe Occurs Monitoring WINS Counters Q154174 Invalid ICMP Datagram Fragments Hang Windows NT, Windows 95 Q154387 TAPISRV.EXE Thread Uses Excessive CPU Time Q154398 BDC Secure Channel May Fail if More Than 250 Computer Accounts Q154460 Denial of Service Attack Against WinNT Simple TCP/IP Services Q154475 Add Printer Wizard Printer Browse List Not in Alphabetical Order Q154552 NETSTAT Causes Memory Leak Q154694 New Policy Available to Hide Go To on Tools Menu Q154791 MS-DOS-based Applications May Not Find All Files Q154984 DNS Server May Not Recursively Resolve Some Names Q154985 DNS Registry Key Not Updated When Changing Zone Type Q154990 SETPASS May Change Password of Wrong User Q155495 Reference Counter Overflow in Security Descriptor Causes STOP Q155701 Invalid UDP Frames May Cause WINS to Terminate Q156655 Memory Leak and STOP Screens Using Intermediate NDIS Drivers Q157032 Services for Macintosh May Cause STOP 0x0A During High Load Q157123 Communicating with SNA Hosts May Cause STOP 0x0A in DLC.SYS Q157182 FPNW Causes STOP 0x50 When Connection Is Closed Twice Q157911 Deadlock in Service Control Manager During System Shut Down Q157913 Services Set to Interact With Desktop May Fail to Start Q158396 Explorer Hangs When Creating a New Folder On a MAC Volume Q158516 Access Violation in RPCRT4.DLL When Pickling Buffered RPC Data Q158548 Sysdiff Changes Dates on Files It Applies to Windows NT Q158581 Icon Position Not Stored When Using Roaming Profiles Q158682 Shortcuts Created Under Windows NT 4.0 Resolve to UNC Paths Q158706 Netmon Performance Counters Support a Maximum of Eight Adapters Q159310 Updated Version of Dns.exe Fixes Several Problems Q159595 Missing Uppercase "A" Character in the 1257 Font Q159599 WINS Consistency Checking May Not Start at Scheduled Time Q159839 Sysdiff Does Not Add Empty Directories Q159909 STOP 0x0000000A May Occur on Multiprocessor Systems Q160517 RRAS May Decrement Local Static Route Metric Q161968 NetBT Tears Down TCP Session with Many Concurrent File Transfers Q161969 LPR Printing Device Reports an Error If Printer Not Available Q162230 Fragmentation and Performance Issues with PPTP Connections Q163055 DHCP Client May Fail with WinNT 4.0 SP2 Multinetted DHCP Server Q163251 STOP 0xA Due to Buffer Overflow in NDISWAN.SYS Q163662 Running Multiple Instances of an Application Causes STOP x50 Q163852 Invalid Operand with Locked CMPXCHG8B Instruction Q163855 STOP 0x0000001e May Occur in Srv.sys w/ Down Level Client Q164023 Fix for Gethostbyname() IP Address Order on Local Multihomed Mac Q164253 WinNT Err. Msg: Event ID 2018 When Srv.sys Is out of Memory Q164314 WinNT Err Msg: STOP 0x0000001E in Win32k.sys When Moving Mouse Q164438 FPNW Print Jobs Do Not Print or Errors Occur in FPNW Interface Q165005 Windows NT Slows Down Because of Land Attack Q165181 EISA Configuration Boot Code Is Replaced on Mirror Drives Q165387 Sharing Violation When Deleting a Folder Q165404 NTVDM AV on Servers with Exchange cc:Mail Connector Q165439 Parsing LMHOSTS with Invalid Entries Can Cause Stop 0x1E Q165664 RPC Encoding API "MesInqProcEncodingId" May Not Work Q165989 GetPeerName() Returns WSAENOTCONN After Select() Returns Success Q166571 Creating an SFM Volume on Large Partition Causes a Stop 0x24 Q166822 Remote Password Change Works Incorrectly to Down-Level Server Q166846 Cannot Reconnect to TN3270 Server with Close Listen Sockets Q167038 RAS Clients Run Winsock and RPC Applications Slowly Q167040 PPTP Performance Update for Windows NT 4.0 Release Notes Q167110 WinNT Err. Msg: Stop 0x1E in FPNWSRV.SYS Q167395 RIP Routes May Expire Early When Running Windows NT 4.0 RIP Q167629 Predictable Query IDs Pose Security Risks for DNS Servers Q167703 Canon Bubble Jet BJC-4300 Does Not Support Ledger Paper Q167708 BootP Client Names Disappear in DHCP Manager Q167871 Error When Connecting to a Share on WinNT 4.0 NTFS Partition Q167969 Under Windows NT, Win16 Applications Opening MS-DOS Devices Fail Q168076 WINS Fails to Converge Q168662 DLC May Fail When Connecting Through an IBM 2210 Router Q168748 Java Applets Cause IE 3.02 to Stop Responding w/ SP3 Q169020 32-bit Help Fails to Start When 16-bit Help Is Running Q169131 Print Setup Dialog Box May Take a Long Time to Display Q169274 TCP/IP Causes Time Wait States to Exceed Four Minutes Q169291 Using Scopes with Different Subnet Masks in a Superscope Q169404 NTFS Directory Corruption with Frequent File Creation Q169461 Access Violation in DNS.EXE Caused by Malicious Telnet Attack Q169608 Occasional File Corruption When Using Unbuffered I/O Q169822 DSMN RAS Dial-in Properties Deletes NetWare Compatibility Q169839 XFOR: Cannot Enable (Appletalk) MTA Service NT SP3 Q169847 SNMP SysUpTime Counter Resets After 49.7 Days Q169888 User-Define Path Dropped When User and System Paths Too Large Q170057 Dr. Watson Dialog Box Stops Responding Q170509 Memory Leak in SERVICES.EXE Causes Performance Degradation Q170510 Double-Clicking the Mouse Button Acts as a Single Click Q170517 Cannot Log on Using IPX After Installing SP3 on Windows NT 4.0 Q170518 DNS Admin Fails When Managing Large Number of Zones Q170534 Microsoft FTP Client Echoes Gateway Password on the Screen Q170566 Ntbackup.exe Log Has Additional Space at Beginning of Each Line Q170568 Seagate Tape Drive Light Stays Lit After Exiting NTBACKUP Q170572 Unable to Format a 1.44-MB Disk on an LS-120 After SP3 Q170626 DDEML: Memory Leak in Global Shared Memory Q170753 Window Focus Set to Invoke Wrong 16-bit Application Through DDE Q170817 Windows NT Causes APC Smart UPS Battery to Discharge Q170880 Diskdump.sys Common Buffer Size Is Changed Q170965 SFM Time and Date Stamp Change Copying Between Volumes Locally Q171180 Non-Paged Pool Memory Leak in IRP Pool Tag Q171181 Deadlock in TCP/IP on Multiprocessor Computers Q171213 Copy to Removable Drive in Explorer May Fail After Media Swap Q171295 Fault Tolerant Systems May Encounter Problems with WinNT SP3 Q171307 How to Disable SAP Broadcast for RPC Service Q171308 Explorer File Properties Dialog Version Tab Missing Q171386 Connectivity Delay with Multiple Redirectors Installed Q171458 Windows NT May Fail On Request to Open Large Files Q171564 TCP/IP Dead Gateway Detection Algorithm Updated for Windows NT Q171790 Time Incorrect After Restarting Multiprocessor System Q171940 MS-DOS Application I/O Operations Cause Floppy Drive Access Q171989 Windows NT Services for Macintosh May Not Start in Desired Zone Q171996 Winsock Function Calls Generate Non-Paged Pool Memory Leak Q171997 WINS Replication Does Not Start As Scheduled Q172003 Macintosh Change Password Fails on Down Trusted Domain PDC Q172030 WinNT Err Msg: Stop 0xA in TCPIP.SYS Q172122 Toshiba I586 Pro 230 MHz System and the National 307 Chip Q172147 Add Printer Wizard Hangs When Searching for Remote Printers Q172290 Routing and Remote Access "Out of Buffers" Event Logs Q172511 Stop 0x0000000A w/ Services for Macintosh & McAfee Anti-Virus Q172512 Routing and Remote Access Event ID 20100 Q172613 Errors Connecting Through RAS When Password Expires Q172705 Explorer Access Violates When Viewing a File's Properties Q172762 Continuous Bhnt.sys Load and Unload Causes STOP 0xA and 0x7F Q172885 NetWare Print Server Names With Periods Truncated in Explorer Q172930 Removing Bypass Traverse Checking Causes Copy to Drop Streams Q172982 16-bit ShellExecute Fails if Application Exists in Long Path Q173059 Security Events Are Not Logged During Audit Q173277 No Memory.dmp File Created with RAM Above 1.7 GB Q173322 How to Disable Autochk During a Windows NT Reboot Q173385 System Policy Editor Will Not Allow More Than 255 Characters Q173523 IIS 3.0 Can Fail in Low Memory Conditions Q173525 WINS Client May Switch Primary and Secondary WINS Servers Q173526 "Serious Disk Error" When Saving Word 6.0 Document on Windows NT Q173533 WinNT Radius Client Sends Incomplete Accounting Information Q173676 Client Cannot Resolve MX Record via Microsoft DNS Server Q173753 Duplicate IP Addresses After Upgrading DHCP Clients to SP2 Q173817 Savedump.exe Now Provides More Security to Memory.dmp Q173881 STOP 0x0000000A in Netbt.sys on a Multiprocessor Computer Q173941 Windows NT DNR Does Not Cache Short Names Q173993 Dialog Message Not Sent Correctly from 32-bit to 16-bit App Q173994 GetTextExtentPoint32W May Fail with Unicode Characters > 0x Q173997 Drive Letter Not Displayed in Error Message Box Q173998 Middle East/Thai Windows NT May Print Incorrect Characters Q174020 STOP 0x0000001E During Forced Shutdown and Program Exit Q174058 Delayed Worker Threads Causes a STOP 7A Q174076 Invalid Password Message When Strong Passwords Are Required Q174187 WinNT Does Not Display IBM PS/2 TrackPoint as the Mouse Driver Q174205 LSASS May Use a Large Amount of Memory on a Domain Controller Q174233 KeInitSystem Function Returns Uninitialized Stack on Alpha Q174234 Computer Hangs with Intensive 16-bit Code Running in a VDM Q174266 "Print Screen" from MS-DOS Application May Print Twice Q174333 Installing Win95 Print Drivers on WinNT 4.0 Asks for Wrong Disk Q174465 Bad SAP Packet Causes 0x0000000A In Afd.sys Q174478 Minimizing or Maximizing Does Not Redraw Window Properly Q174502 Fault Tolerant Recovery Does Not Reoccur After Shut Down Q174509 Stop 0x0000000A in Ndiswan.sys with Digiboard ISDN Board Q174510 Print Job Corruption Printing on Fast Hardware Across Slow Link Q174531 DirectDraw Fails Surface Creation with Large Dimensions Q174534 BitBlt May Not Work When Raster Operation Mode Is NOTSRCCOPY Q174535 Access Violation When TCMAPP Exceeds 16 Users Q174540 Extra Page Printed on Epson Stylus Color Printers Q174541 Publisher 3.0/4.0 Does Not Print Brick or Vertical Line Patterns Q174543 Enabling the Shift Lock Feature on Windows NT 4.0 Q174555 STOP 0x0000001E When IIS Service Is Stopped Q174625 Environment Variables May Prevent Logging On Q174676 NetWare Authentication Failure When Logging On to NetWare Server Q174748 XADM: ESEUTIL /g Returns Error -1022 Q174764 Memory Leak in Ntfs.sys Q174830 NMI Error Message on Blue Screen May Be Garbled Q174840 Disabling Buttons in the Windows NT Security Dialog Box Q174844 Spooler Service Causing Access Violation Q174869 WINS Client Sends Refresh Requests to Secondary WINS Server Q174871 Printer Shares Lost after Changing Server Name Q174927 Error Message During Setup of Noncritical Changes Q174929 No Response to ARP Causes Duplicate IP Addresses on Network Q174932 STOP 0x0000000A with Halmps.dll When Restarting Q175035 Diskless Workstations Cannot Find BOOTP Server with DHCP Q175048 CACLS Quits on Access Denied Errors with /c Q175093 User Manager Does Not Recognize February 2000 As a Leap Year Q175225 Disabling Context Menus Does Not Disable Key Combinations Q175266 Creating Many Partitions Causes Double Drive Letters Q175321 SNA Client Sessions Hang Until SNA Server Is Restarted Q175468 Effects of Machine Account Replication on a Domain Q175637 Poor Print Quality with Epson Stylus Pro XL ESC/P 2 Q175641 LMCompatibilityLevel and Its Effects Q175643 CR Interpreted As CR/LF When Text Job Is Converted to PCL or PS Q175667 Error Message: Copy Profile Error Q175687 Win32k.sys Causes STOP 0x0000001e and 0x0000000a On SMP Q175738 Collate Feature May Not Work with PostScript Printing Q175745 Memory Leak When Using Win32 GetClipboardFormat API Q175877 CSNW Connection Leak When Running 16-bit Applications Q176081 Access Violation in Explorer.exe Removing a Share Q176082 RRAS Server Updates Link State Database but Not Route Table Q176087 LPRMON Status Strings Are No Longer Localized on German Version Q176209 RAS or RRAS Server Fails to Answer Incoming Calls Q176211 Console-mode Apps May Run Slowly on Multiprocessor Computers Q176319 Docfile Standard Marshalling Returns 0x800706f4 Q176322 The Far East GetTextExtent API Fails with Null LPNFit Q176502 RAS Authentication Rechallenge Resets Compression Flag Q176922 Multiple IP Addresses Cause Dynamic Packet Filter to Fail Q176973 Stop 0x0000000A in Netbt.sys on BDC When WINS Server Shuts Down Q176976 Wrong Return Value from MkParseDisplayName Q176977 STOP 0x00000023 FAT_FILE_SYSTEM with Corrupted Floppy Disk Q177113 Incomplete Print Jobs Using JetDirect over SPX Q177125 User Cannot Log On to LAN Because of RAS Logon Failures Q177154 Access Control Causes Reverse Proxy to Fail Q177245 Multiprocessor Computer May Hang Because of Tcpip.sys Q177257 STOP 0x0000000A or Difficulty Recognizing IDE CD-ROM Drives Q177445 Use LoadLibraryEx When Loading Printer Drivers Q177471 EBCDIC Characters not Properly Converted to ANSI Characters Q177591 Service Pack Version Truncated in About Box Q177631 Comdlg32 Fails to Display Drives Mapped by SUBST Command Q177644 Commenting Macintosh File Changes Date and Time Stamp Q177647 Nonpaged Pool Size Incorrectly Displayed in Performance Monitor Q177650 Remote Shutdown Fails If User Is Logged On Without Rights Q177651 AT Command Handles Quotation Marks Differently Q177653 CRT Conflict with Getservbyname Q177654 Slow Network Performance Using NetBEUI Across Bridges Q177655 Negative Values in Performance Monitor Data Q177660 Access Violation Occurs in Sfmprint.exe on Busy Print Server Q177668 Calibration Does Not Change When You Calibrate Foot Pedals Q177670 RRAS Does Not Enforce Strong Encryption for DUN Clients Q177676 Stop 0x00000024 May Occur When Bypass Traverse Checking Disabled Q177677 TSR Applications Hang While Login.exe Is Running Q177680 With GSNW, WinNT Client Cannot See All Files on NetWare Server Q177684 Application Using SetOwner May Hang Windows NT User Interface Q177757 Dr. Watson Does Not Report Service Pack Number Q177868 SnmpMgrTrapListen API Returns ERROR_SERVICE_NOT_ACTIVE Error Q177906 Caching Does Not Work Under Reverse Proxying Q177983 Stop 0xA in Netbt.sys with Greater Than 64 Adapters Q178109 Roving Profiles for Windows 95 Clients Stop Working Q178110 FPNW Does Not Allow OS/2 Clients to Open Files Q178113 Specifying a Group Name in LMHOSTS File May Cause STOP 0xA Q178202 Fix for Loss of Data Records or Partial Records Written to Disk Q178205 Connecting to a Server is Slow over RAS Using LMHOSTS File Q178208 CrashOnAuditFail with Logon/Logoff Auditing Causes Blue Screen Q178302 XADM: Upgrade to Exchange 5.5 Fails If Virus Software Is Enabled Q178364 Macintosh Clients See Files on WinNT Server Constantly Moving Q178381 SNMP Leaks Memory If the OID Cannot Be Decoded Q178393 SQL Server Hangs When Sending a Message Using SQLMail Q178413 Windows NT System May Hang When Running a Filter Driver Q178414 Archive Bit Is Not Reset When a File Is Renamed Q178471 STOP 0XA Caused by Race Condition in VDM and Process Delete Q178546 CSNW Does Not Display Directory Name with Extended Characters Q178550 IP Address Conflict with Address 0.0.0.0 Q178557 Dr. Watson May Display Message Box Even When Disabled Q178636 Directory Listing Not Correct When Using Russian Characters Q178723 Problems with "Run Only Allowed Windows Application" Q178741 Event Log Opening Problem Causes Services.exe Failure Q179092 NWLNKIPX Sends Broadcast RIPX Packets Over the Network Q179107 STOP 0x0000000A in Raspptpe.sys on a Windows NT PPTP Server Q179129 STOP 0x0000000A or 0x00000019 Due to Modified Teardrop Attack Q179147 Access Denied Starting Program Q179156 Updated TCP/IP Printing Options for Windows NT 4.0 SP3 and Later Q179157 Stop 0xA in Tcpip.sys When Source Routing Data Exceeds 18 Bytes Q179187 Problems Using TAPI 2.1 Q179190 NWRDR May Send Excessive GetNearestServer Requests Q179433 Cache Manager May Cause Data Corruption on SMB Servers on FAT Q179553 Access Violation in PolEdit When Defining Allowed Windows Apps Q179741 STOP 0x0A Due to Duplicate Free in Afd.sys Q179827 Registry Handle Leak Causes Random Blue Screens Q179873 Files Open with UNC Path May Be Closed Prematurely Q179983 RDR Sessions on UNC Name Images May Log Off Prematurely Q179995 Memory Leak in FPNW Causes Windows NT Server to Hang Q180168 Novell Client 32 for Win95 Displays Duplicate Files on FPNW Q180356 NWConv Fails to Apply Correct Group Permissions Q180532 Xircom PC Card Fails to Function Q180622 STOP:0x0000001E with STATUS_INSUFFICIENT_RESOURCES in Sfmsrv.sys Q180648 Windows NT 4.0 Traps with a Stop 0x24 or Stop 0xA Q180716 SFM Fails to Accept Associations with Two-Character Extensions Q180717 SFM: File Date and Time Stamp Change with Get Info Q180718 SFM: Disconnect Macintosh Clients before Dismounting Volume Q180854 Access Violation in Winlogon with Third-Party Gina.dll Q180875 Russian Clients May Have File I/O Problems on an FPNW Server Q180963 Denial of Service Attack Causes Windows NT Systems to Restart Q181022 Err: Cannot Write to LPTx Printing to Parallel Port Q181120 Manual Dial Dialog Fails to Appear when Logging On Q181311 Data Corruption Occurs with Record Locking on FPNW Server Q181799 RPC/TCP Connection Attempt Made Only to First Address Q181859 Stop 0x0000000A When Using UltraBac to Back Up a SQL Server Q181928 Using POLEDIT to Save Policy Files on NetWare Servers May Fail Q182005 Euro Currency Not Available in Windows NT Character Sets Q182047 DHCP Server Performance Degraded by Large Number of Scopes Q182205 Clients Cannot Send Mail Attachments Through Modem Sharing Q182227 DNS Server Does Not Check for Delegations Before Forwarding Q182288 RPC May Cause System to Stop Responding during Shutdown Q182322 SNMP Appends Garbage to Data in Response to SNMP Get Q182333 Excessive Processor Usage on Print Servers Q182441 Full Synchronization from WinNT PDC to LanMan Server May Fail Q182444 NBF MaxFrameSize Calculated Incorrectly on Token Ring Q182540 WinNT x86 MPS HAL Can Fail To Map System Relative IRQs Q182644 DNR Sorts IP Address for Multihomed Hosts Before Returning List Q182781 Client Connections to Multihomed Server Not Load Balanced Q182816 WINS PriorityClassHigh Parameter Does Not Work After Restarting Q182817 CSNW: Unable to Rename File on NetWare Server Q182825 NET USE Returns Error 53 When Host Has 3 or more NICs Q182918 Account Lockout Event also Stored in Security Event Log on DC Q183054 Taking Ownership Remotely May Set Owner Incorrectly Q183069 Ensoniq PCI Sound Card Experiences Static When Disk Is Accessed Q183123 Find Files Displays Garbled Date if Year is 2000 or Greater Q183125 Shell Doc Property Dialog Custom Date Incorrect after Year 2000 Q183283 IE Through Proxy Server to IIS May Stop on Page with Scripts Q183292 Print Preview Frequently Causes Access Violation in Spooler Q183335 Calling Card and Area Code Not Dialed Using Both TAPI Options Q183419 Memory Leak in Spoolss.exe Causes Performance Degradation Q183581 Out of Virtual Memory Messages During Windows NT Installation Q183651 Default Memory Settings for Lexmark Optra S 1250 Incorrect Q183652 Access Violation When More Than 200 Adapters Are Installed Q183653 Client Authentication Fails Connecting to Netscape Server Q183654 IBM DTTA-351010 10.1 GB Drive Capacity Is Inaccurate Q183656 XCOPY Returns "Invalid Parameter" When Using Date Switch Q183657 Unable to Insert OLE Objects into Application Documents Q183664 NDS Logon Scripts Do Not Execute Correctly Q183676 Window Position of Windisk.exe Causes Access Violation Q183677 Client Authentication with Personal Certificates Fail Q183699 Winsdmp.exe Inefficiently Dumps WINS Databases with Large ID Q183704 Hide Drives Policy in Common.adm Has No VALUEOFF Statement Q183705 RPC Mishandles Changes in the Number of IP Addresses Q183709 Printing from Xerox 3006 May Cause Paper Jams Q183718 CACLS Not Resolving Principle Names Correctly Q183749 Access Violation in INETINFO:TerminateExtension Q183755 More Than One Internal IP with Socks Enabled Causes Dr. Watson Q183812 Problems When a Connection over an ISDN Bridge Is Not Closed Q183819 DCOM over HTTP Method Calls May Hang for up to 15 Minutes Q183832 GetHostName() Must Support Alternate Computer Names Q183840 Stop 0xC000021A When Starting Task Manager with CTRL+ALT+DEL Q183859 Integrity Checking on Secure Channels with Domain Controllers Q183875 DHCP Server Leases Excluded Addresses if the Scope Is Expanded Q183886 Access Violation in LSASS When Logging on System Q183930 FIX: IP Is Mangled When Using UDP on Multihomed Computers Q184017 Administrators Can Display Contents of Service Account Passwords Q184026 NetDDE Causes Dr. Watson When Closing Incomplete Connections Q184072 HasOverlappedIoCompleted, GetOverlappedResult Give Wrong Value Q184101 Small Single and Double-Precision Values Are Rounded to Zero Q184132 Err Msg: Value Entered Does Not Match with the Specified Type Q184139 Stopping RPC Locator Service Causes Error 2186 Q184213 SystemFileCacheInformation Can Be Changed Without Privilege Q184219 Access Violation in Microsoft TAPI Browser 2.0 Q184228 Dr. Watson in Nwssvc.exe Deleting Queue and Printer from FPNW Q184229 Copying Files to a Macintosh Volume Changes Date and Time Stamp Q184232 DCOMCNFG Saves Incorrect Display Name in Services Q184278 Server in One Domain May Disconnect Client in Another Domain Q184288 GP Fault May Occur with IIS on Multi-processor System Q184344 Reconcile on DHCP Scope Does Not Work Correctly for BOOTP Client Q184350 WordPerfect Suite 6.0 Setup Fails with Multiple CD-ROMs Q184353 DHCP ALT+H Shortcut Key for HELP Is Not Available Q184414 Access Violation When Printing PostScript to SFM Print Server Q184537 Very Large Files Cause Performance Problems Q184538 Error Message: A Controller for This Domain Could Not Be Found Q184744 DHCP Server Leaks Registry Quota on Alpha Version of Windows NT Q184752 Xerox PCL Does Not Print Landscape Q184754 Several Threads Created in LRPC Running Stress Test in IIS Q184758 STOP 0x78 When NonPagedPoolSize > 7/8 of Physical Memory Q184794 STOP 0x50 May Be Caused by PPTP Registry Entries Q184832 Intermittent Name Conflicts with WINS Server Q184835 Explorer on Windows 95 DFS Client May Hang Q184836 Application Access Violates When Session Is Terminated Q184875 API Function BroadcastSystemMessage() Always Returns 1 (Success) Q184879 Windows NT Logon Dialog May Disappear Q184881 Reverse Lookups with BIND Earlier Than 4.8.3 Fail Q184891 Server.HTMLEncode Garbles Extended Characters Q184937 Session Between Multihomed Computers May End Unexpectedly Q184954 Computer Hangs While Booting with HP 6L Printer out of Paper Q184996 Incomplete List of NetWare Server Volumes with CSNW/GSNW Q184998 RDR May Read or Write from Wrong File If File Is Memory Mapped Q185051 Restarting Cluster Service Causes Services.exe to Crash Q185081 No Domain Controllers Found When Logging on Using RAS Q185137 Log Logical Record Request May Be Sent to Wrong Server Q185142 NetWare API Log Logical Record May Incorrectly Succeed Q185203 SPOOLSS Hangs When Printing a File With a Corrupted EMF Record Q185212 Cluster Server Does Not Support More than 900 Shares Q185219 IIS 4.0 with Multiple Certificates May Return Error Q185260 User Accounts May Get Locked out After Entering Wrong Password Q185300 STOP 0x24 in Ntfs.sys Function NTFSMoveFile() Q185323 Pool NonPaged Bytes Not Accurately Calculated for User Mode Q185349 Problems Remotely Accessing W3 or FTP Perfmon Counters Q185355 Printers Folder Displays Printer Error When Printer Is Busy Q185559 Negative Value in NtGdiFastPolyPolyline Causes Blue Screen Q185568 WlxCloseUserDesktop Function Unavailable for GINA Writers Q185571 Printing from Lotus Freelance 97 Produces Thin Horizontal Line Q185605 Stop Error Caused by Invalid Use of Private Video Driver Handle Q185624 Calls to NtQueryVolumeInformationFile May Cause Stop 0x0000001E Q185625 Windows NT Client Logon Fails with EnableSecuritySignature Set Q185668 IntelliMouse TrackBall Wheel Does Not Work with Service Pack 3 Q185682 Bugcheck When IPX Is Bound to Only Ndiswan Adapter Q185722 SFM Rebuilds Indexes upon Restarting of Windows NT Q185723 Explorer File Copy from Windows 95 Share Fails Q185727 BUG: closesocket() Fails with 10038 After _open_osfhandle() Q185729 Computer Becomes Unresponsive During CGI Stress Test Q185734 DNS Server Access Violation in Dns!sendNbstatResponse Routine Q185735 Explorer Crashes When Dragging Lotus Notes Files over Toolbar Q185736 Applications May Appear Hung or Unresponsive on Windows NT 4.0 Q185765 HP LaserJet 4Si Driver Unprintable Region is Incorrect Q185773 NTFS Corruption on Drives > 4 GB Using ExtendOEMPartition Q185787 STOP 0x0000002E on Alpha with ISA Sound Card Q185788 Windows NT Hangs on Boot on DEC Alpha Clustered Servers Q185791 STOP on DEC Miata and Rawhide Platforms Using Graphics Tablet Q185867 STOP 0x0000000A in Win32k.sys After Installing Korean Office 97 Q185870 IIS: SQL Server Insert Error Regarding Column Name Mismatch Q185892 Unwanted Popup Message While Printing to an LPR Printer Q185944 Stop 0x7B After Installing Windows NT on an ALR Evolution-V ST Q185945 Access violation in win32k!HMMarkObjectDestroy in JPN and KOR NT Q186051 Archive Bit Is Not Set with File or Directory Rename Q186078 Name Resolution May Fail If NetBios Name Has ASCII Character Q186081 STOP 0x0000000A When Restoring Tape Q186101 FTP Client Does Not Show the Correct Transfer Size for Files Q186150 NetBEUI May Hang When Using Arcnet Under Heavy Network Traffic Q186158 Blue Screen When Shutting Down with RAS Connection Established Q186217 3C509 Is Not Autodetected During Setup on ThinkPad 760EL & XL Q186241 Dr. Watson May Cause CPU Usage to Spike Q186247 Users Are Unable to Print to Server Q186339 Adobe ATM 4.1 OpenType Fonts Not Showing up in Font Menu Q186357 RPC UseWinsockForIP is Only Applicable to UDP and IPX Q186416 System Hang Results from Large Number of Notify Syncs Q186434 Slow Network Default Profile Operation Q186439 Removing Server Service Results in Memory Leak Q186455 Mgmtapi.dll Opens Trap Socket in Exclusive Mode Q186463 Windows NT Replies to Address Mask Requests Q186473 You Can Delete All Records on a WINS Server Using SNMP Q186494 Event ID 517 Not Created When Security Log Is Cleared Q186495 WOW Leak Launching Many Instances of a 16-Bit Application Q186669 FPNW Logout.exe Incorrectly Reports Year After Jan. 1, 2000 Q186743 International Characters Print Incorrectly in Schedule Plus Q186746 International Calling Codes Updated in Service Pack 4 Q186770 Windows NT Hangs Trying to Access SuperDisk SLS-120 Disk Drive Q186805 Intermittent Stop 0xA in Srv.sys on Shutdown Q186820 DNS Server Returns Wrong Response When WINS Lookup Is Enabled Q186860 Update Memory Settings and Add Exec Paper Size to Sharp Models Q186873 Netbios Delays Sending/Receiving Packets When Session Is Lost Q186904 MPROUTER Access Violation on Invalid Radius Response Q186905 Radius Client Uses 100 Percent CPU on Invalid Response Q186929 LowercaseFiles Registry Key Has Added Functionality Q186963 Incorrect Dimensions in Executive Form with Mannesmann Driver Q187277 The FTP PORT Command Fails in IIS 3.0 Q187302 Stop 0x00000040 in NetBT Protocol Q187392 PATCH: Stop 0x0000000A in Wind32k.sys xxxDDETrackWindowDying Q187493 Some Netscape Client Certificates Rejected by IIS Q187508 FTP Server Fails to Respond If First Binding Does Not Work Q187518 Apps Using Beep API on Multiprocessor Systems May Crash Q187519 NTBackup Will Not Run from Command Line with Blank Space Q187520 Tandberg SL5 Tape Device Not Auto-Detected in Window NT 4.0 Q187555 WINS Incorrect Version ID Assigned During Scavenging Q187576 Stop 0x0000000A May Occur in TCP/IP Q187577 STOP 0xA Because of Spin Lock in Sfmatalk.sys on DEC Alpha Q187615 Setup Hangs When System Includes More Than Two RAW Drives Q187669 Unable to Use NetBIOS Resources over SLIP Q187672 Access Violation in RAS Using Multilink Q187686 LookupAccountSid Causes Access Violation on Multihomed System Q187696 Changes to Calculator in Service Pack 4 Q187705 Application Error in CorelWEB.GALLERY Q187708 Cannot Connect to SQL Virtual Server via Sockets in Cluster Q187709 Domain Name Resolver Caches Responses Q187769 Application Error in NTVDM Running cc:Mail Utilities Q187802 DHCP Assigns "Bad_Address" to "Host Unreachable" Q187830 Performance Decrease Transmitting Data over the Network Q187856 IIS: Limit SSL Message Size to 16 KB for Netscape Q187884 CoCreateInstance on Multiple Threads Causes Hangs or Failures Q187936 Application May Hang Calling LogonUser() API Q187939 IPX May Not Work When Packet Size Is Larger Than Receive Buffer Q187940 Input Filters over IPX WAN Routing May Fail to Filter Packets Q187941 An Explanation of the New CHKDSK /C and /I Switches Q187947 100 Percent CPU System Handle Problem Q187964 MGI PhotoSuite May Paste Screenshots as Garbage or an AV Occurs Q187999 "Access Denied" w/ Personalization & Membership Authentication Q188000 Cannot Enter Stand-Alone Dieresis Character on Swiss Keyboards Q188027 Performance, Audit Logging, and Fixes to the DHCP Service Q188303 Random Stop 0x50 Errors on Cirrus Video Adapters Q188312 Lexmark Optra E+ Unprintable Region Is Incorrect Q188315 Stop Error Message in Sfmsrv.sys Q188414 Random Stop 0x0000000A When Running IPX over Token Ring Q188424 Multilayered Display Driver Produces Black Line in Word Q188571 STOP 0x0000000A in Netbt.sys Caused by Invalid DNS Record Q188652 Error Replicating Registry Keys Q188700 Screensaver Password Works Even if Account Is Locked Out Q188806 "::$DATA" Data Stream Name of a File May Return Source Q188838 Task Manager CPU Usage Only Displays Eight Processors Q188879 RPC Endpoint Mapper Will Not Register All Interfaces Q188896 Access Violation in Explorer.exe Changing Share Permissions Q189010 SBS: RAS Leases Six Addresses from DHCP Q189011 Using Performance Monitor Remotely Causes Access Violation Q189012 Clicking Default Scope Does Not Open Active Lease Window Q189013 Atapi.sys Does Not Support Multiple Logical Devices Q189032 Floating Point Arguments Won't Pass Between NT RPC and IBM RPC Q189061 Repeated Regsavekey/Regrestorekey Actions Corrupt Registry Hive Q189080 TCP Connection May Drop When Transferring Large Amounts of Data Q189114 NetDDE Refuses Incoming WM_DDE_INITIATEs from Windows 95 Q189119 UserEnv Returns Corrupted Profile for All Failures Q189171 WinSock Applications May Fail or Stop Responding Q189225 LMMIB2 Unable to "Walk" from .1.3.6.1.4.1.77.1.4.4 Q189245 Lmmib2.dll Does Not Support All Objects Q189262 FTP Passive Mode May Terminate Session Q189276 ODBC Causes Access Violation in 16-Bit Winsock Q189283 No More Than About 570 Reservations Visible in a DHCP Scope Q189290 Loss of Desktop After Logon When Using a Filter Gina.dll Q189291 Hang in Winlogon on Workstation Locked Dialog Box Q189395 Support for Canadian ACNOR Keyboard Q189462 Only Partial Pages Displayed or Error "The Connection Was Reset" Q189471 WpuOpenCurrentThread Does Not Work Q189522 Network Drive Letters in PATH Statement Causes Excessive Traffic Q189579 F11 and F12 Keys Do Not Function in MS-DOS Applications Q189606 Browser Service Fails to Start or Stop Button Is Unavailable Q189612 Access Violation Occurs in Windows NT Explorer (Explorer.exe) Q189756 PerfMon Percentage of Registry Quota in Use Displayed Wrong Q189988 CMPXCHG8B CPUs in Non-Intel/AMD x86 Compatibles Not Supported Q190009 Client Cert. Mapping Only Works w/First Page on Proxy Connection Q190010 Logging Performs Unwanted Flushes of Log Data Buffer Q190011 Perl Script Mappings Converted to Uppercase During Upgrade Q190015 Setting LogonMethod to Batch Causes "Parameter is Incorrect" Q190288 SecHole Lets Non-administrative Users Gain Debug Level Access Q190354 Unattended Setup of MSCS with -JOIN Parameter Requires Input Q190449 Corrupted SAM Hangs Windows NT Server Q190506 WINS Replication Problem Events 4262, 4261, and 1c Replication Q190552 WinNT 4.0 DHCP Client Modified to meet RFC 2131 Q190791 STATUS_CANT_WAIT Returned from an NTCreateFile Call Q190834 SCSI Adapter Is No Longer Visible from SCSI Adapters Utility Q190928 Poledit Spin Boxes Limit Max Value to 9999 Q190931 Snmptrap.exe Ignores SNMP Trap PDU Greater Than 4,096 Bytes Q190932 SNMP Service Ignores SNMP Trap PDU Greater Than 4,096 Bytes Q191088 Printer Prompts for Paper with Dutch Workstations Q191098 Large File Copy Operation Causes Available Bytes to Drop Q191284 STOP 0x0000001E in Netbt.sys Q191285 Services for Macintosh Index Corruption on Large Volumes Q191309 ALT+Numeric Keypad Problem When CHCP Command is Used Q191362 FPNW Pass-Through Authentication from Trusted Domain May Fail Q191387 Unable to Run 16-bit Apps If FILES= Is Greater Than 255 Q191418 Arcs Print Incorrectly with EMF on PCL Printers Q191419 GP Fault or Access Violation When Buffer Too Small Q191428 WINS Replication Fails If More Than 30 Partners Are Configured Q191614 Able to Commit More Memory Than Is Available Q191634 Group Policies Cause Excessive \PIPE\samr Connections on PDC Q191689 Incorrect Font Characteristics May Be Used on Imported Graphics Q191751 Smoothing Fonts Disabled Using ETO_GLYPHINDEX Q191756 Stop 0x1E Switching Between System Menus in Application Window Q191767 LogicalDisk Partition Missing in Performance Monitor Q191768 Date of Print Job May Be Displayed Incorrectly in Print Queue Q191775 WINS Service Fails to Start With More Than 99 PNG Entries Q191830 Memory Leak Due to Repeated Logon/Logoff May Corrupt Profiles Q191832 Access Violation in Hangul Version of Lotus Organizer 97 Q191834 Network Problems That Occur When Logging Off May Corrupt Profile Q191850 Convert Reports Cannot Create Elementary File System Structures Q191852 Bhnetb.dll Leaks Memory in Winlogon.exe Process with NetMon Q191896 Printing to NT LPD Server from SUN OS 4.1.4 May Not Process C/R Q191915 Screen Saver Time-out is Limited to 60 Minutes Q191992 NdrConvert Causes Access Violation in RPC Client on WinNT 4.0 Q192051 LDAP Does Not Authenticate on French WinNT Due to Encryption Q192056 Point and Print Functionality with More Than 20 Driver Files Q192104 Windows NT Does Not Start If Primary Partition Is Above 2 GB Q192126 Add Workstation Fails with RestrictAnonymous Q192127 BUG: RpcTestCancel() Always Returns Error Code 5 Q192132 STA Threads Lose Thread Token Q192229 Login Script Group Membership Mapping on BDC Fail If PDC Is Down Q192266 Sockets-based Child Processes Are Not Stopped Q192267 Various STOP Errors When Opening Files on Novell NetWare Servers Q192293 IIS Stops ODBC Logging after Failing to Communicate with SQL Q192409 Open Files Can Cause Kernel to Report INSUFFICIENT_RESOURCES Q192453 MoveFile API from Windows 95 with Invalid UNC Causes STOP 0xa Q192457 Downloaded File May Be Saved in Incorrect Folder with IE Q192460 Matrox Video Driver Causes STOP 0x00000050 Q192547 WINSADMIN Writes Invalid SP Time to Registry Q192690 Search: Unable to Connect to Catalog Server via Search MMC Q192736 STOP 0x0000000A Blue Screen on Alpha AXP Q192749 Multiple SSL Connections May Cause Error Starting Security Sys Q192774 Stop 0x0000000A in Tcpip.sys Processing an ICMP Packet Q192786 Event ID 11 Changed to an Informational Message Q193056 Problems in Date/Time after Choosing February 29 in a Leap Year Q193064 Pressing Cancel Button in Date/Time Utility Changes Date Q193090 Inetmib1.dll Causes Memory Leak in Winlogon.exe Process Q193106 Filesystem Filter Drivers may Unload Unexpectedly Q193121 Cannot Connect to DFS Leaf a Second Time if Server is NetWare Q193157 TCP/IP Does Not Allow MAC Addresses to Change Dynamically Q193169 Script Mappings Are Not Removed from the Registry after Migration Q193206 Acquiring SNMP Info For OSPF in RRAS Hangs Q193209 Gethostbyname Not Working Correctly with Only DUN Installed Q193233 Rpcss.exe Consumes 100% CPU Due to RPC Spoofing Attack Q193271 Cannot Create Virtual Directory in Administrator Program Q193371 WINS/DHCP Admin Show Expiration Dates 2000 - 2009 with One Digit Q193436 DHCP Client Shuts Down After Two Declines Q193499 Multiple RRAS Client Disconnects Cause Increased CPU Usage Q193525 Access Violation Occurs When Viewing Web Sharing Tab Q193526 W3SVC Counters Fail after a Successful Install Q193528 Internet Service Manager Does Not Allow Wildcard Redirections Q193529 Modem Sharing Clients Cause Stop 0x000001E on SBS Q193530 Access Violation in WINSCL When Using CR or SDB Parameter Q193532 Stop 0x0000000A When Running Executable from Floppy Disk Q193548 Stop 0x0000002E Using Qlogic Driver Version 2.29 Q193596 RASMAN Registry Values Cannot Be Set Higher Than 0xFF Q193613 ADSI Paths Greater than 80 Characters Causes Access Violation Q193614 Viewing Computer from MMC Causes Access Violation to Occur Q193646 Event ID 10005 from DCOM After Installing IIS Q193654 Services Continue to Run After Shutdown Initiated Q193655 Multiple Entries for AUTOCHK Abort in System Log Q193686 SMTP Services Do Not Start Automatically After One Is Stopped Q193687 Invalid Handle Exception Error During SMTP Server Maintenance Q193688 HTMLA: Object Already Exists When Creating New Web Sites Q193689 IIS Security: Mapping IDC Reveals Paths for Web Directories Q193779 Cluster Server Drive Letters Do Not Update Using Disk Admin Q193781 Cache Manager May Cause Data Corruption Q193793 ":$DATA" Data Stream Name Returns Source of a Remote File Q193806 CSNW Error 85, Local Device Already in Use Q193812 Extended Characters in URL Translated into UTF-8 Characters Q193891 HTTP Through Firewall and "Bypass Proxy for Local Intranet" Q193899 Event ID 1008, 4005 with Missing TCP/IP Performance Counters Q194130 SNMP Edit Box Drops a Character When Writing to the Registry Q194133 Remote Shell (RSH) Commands Hang w/ Multiple Sessions Running Q194193 STOP 0xA in Sfmatalk.sys When Copying Files on an SFM Volume Q194194 DNS Fails with Error 1201 If Secondary Zone File Not Specified Q194200 Cannot Change WinNT Passwords from Exchange and Outlook Clients Q194228 Rule Containing Multiple Clauses Only Functions Properly Once Q194322 T/R NIC May Fail Windows Hardware Quality Lab (WHQL) Test Q194336 ERROR: Destroyed NTFS Directory Q194340 Access Violation when Using Rcp.exe to Copy to Unix Q194341 Simple TCP/IP Services Can Be Driven to 100% CPU Q194393 New Window From Here Option in MMC May Cause Fatal Error Q194424 DHCP Server May Fail to Record Lease Q194429 TCPIP Timewaitstate may not remain in 2*msl Q194431 Applications May be able to "Listen" on TCP or UDP Ports. Q194465 PPTP May Refuse Connections When VPNs Are Free Service Pack 3Q135707 Programs Run at Priority Level 15 May Cause Computer to Hang Q139506 Connections to Share-Level Server May Fail Q140419 Name Release Notifications Not Sent to WINS on Shut Down Q140967 Changing Password in User Manager Does Not Permit Logon Q141189 BUG: Wrong Error Code on NetBIOS Call When Using NWNBLNK Q141381 Retail SP3 Clients Cannot Connect to SP3 Beta 1 Servers Q142047 Bad Network Packet May Cause Access Violation (AV) on DNS Server Q142609 Corruption Problem When Running DPMI Application Q143470 Run Logon Scripts Synchronously Not Applied to New Users Q143472 FPNW Blue Screens Accessing or Creating Folders with Long Paths Q143473 Unattended Setup Stops Unexpectedly Q147012 Activating /W Switch to Prevent Rebooting in WinNT Q149538 System Restarts Every 5 Hours if Workstation to Server Upgrade Q151926 Delayed WinLogon When Drive Mapped to Local Share Q152273 DHCP Server May Give Out Duplicate IP Addresses Q153220 DHCP Manager Error "No More Data Is Available" Q154710 Cannot View Long File Names on Network in 16-Bit Programs Q154939 CreateQueueJobAndFile Fails w/ Queues Other Than Print Queue Q156410 STOP 0x1E or 0x50 Error on Multiprocessor DEC Alpha Computer Q157077 Netstat Slow to List Large Numbers of Connections Q157745 Command Extensions Cause Access Violation in Cmd.exe Q158433 Re-creating Admin Shares Causes Exception Error Q158548 Sysdiff Changes Dates on Files It Applies to WinNT Q159060 Mouse Cursor Freezes or Fails with Microsoft IntelliMouse Q159176 XADM: Store Stops Responding with High CPU Usage Q159330 Map.exe Does Not Set Environment Variables Correctly Q159998 Error Message: Error Access Is Denied Q160386 Incorrect MediaType Parameter on IBM PCMCIA Token Ring Card Q160405 Video Memory Not Correctly Detected on Dell Latitude Laptops Q161038 Winsock Apps Fail on First Attempt at NetBIOS Name Resolution Q161368 Service Pack 2 May Cause Loss of Connectivity in Remote Access Q161432 WINS Static Entries Overwritten by Duplicate Group Names Q161644 STOP 0x0000000A Sfmsrv.sys When Copying File to Mac Volume Q161714 IPX Doesn't Function Correctly over Token Ring Source Routing Q161830 Message from Unix Using Smbclient w/ Long Username Crashes Q161838 Programs That Lock 0 Bytes at Byte 0 Lock Entire File Q162077 Stop: 0x0000000A when Selecting NDS Map Objects Q162096 SET: Drivers Fail to Load When I/O Address Is Above 0xFFF Q162189 Macintosh Clients May Hang Temporarily with Multiple Mac Volumes Q162396 Problem with DHCP Decline Feature in Service Pack 2 Q162404 Service Pack 5 Breaks Microsoft Mail Shared Using FPNW Q162471 Windows NT 4.0 May Not Recognize SCSI Devices Using Nonzero LUNs Q162563 WINS Restore Fails on Windows NT Server 4.0 Q162566 FPNW Causes Incomplete Display When Executed from Windows 95 Q162567 Telnet to Port 135 Causes 100 Percent CPU Usage Q162616 Extra Form Feed with Passthrough Functions to Text Only Driver Q162657 Choosing Default Domain Name for RAS Client Authentication Q162774 Policy Editor Crashes When Using Large Custom ADM Files Q162775 Access Violation in SPOOLSS when Printing to a Serial Printer Q162778 WINS May Report Database Corruption w/ More Than 100 Owners Q162881 RIP Table Sent While Shutting Down When Silent RIP Set Q162926 STOP: 0x0x0000000A After Call to GlobalAddAtom() Q162927 Telnetting to Port 53 May Crash DNS Service Q163129 RAS Client Fails to Connect to Service Pack 2 Using NetBEUI Q163143 STOP: 0x0000001E with Status C000009A Q163196 New Windows NT PING.EXE Prevents Hanging Other TCP/IP Stacks Q163202 Limit of the Number of Simultaneously Open Root Storage Files Q163203 Remote Access Autodial Manager may fail for second user logon Q163213 WebSTONE Benchmark of IIS May Show Poor Results for MP Systems Q163214 RAS Script with Set IPADDR May Fail with 3Com Defender Add-on Q163261 DEC ALPHA WinNT 4.0 Servers w/ SP2 Fail to Lease DHCP Addresses Q163267 Delay While Establishing SPX II Connection Q163318 Helpfile Word Lists May Be Rebuilt After Daylight Savings Change Q163333 Autosynch Compatible COM Applications May Fail w/ FIFO Enabled Q163383 Failure to Obtain IP Address Via DHCP on Token Ring w/ SP2 Q163431 16-Bit Application Stops Responding When Run on WinNT 4.0 Q163508 STOP 0xA in Ntfs.sys During Reboot Q163512 Error: The Mapi Spooler has Shut Down Unexpectedly Q163525 Delay When Saving Word 7.0 File to Windows NT 4.0 Server Q163538 NTBackup Does Not Properly Eject Tapes on DLT Tape Devices Q163614 HP LaserJet Series II Prints Extra Small Stripes or Points Q163616 Cannot Unlock Workstation If Password Change Cancelled Q163620 STOP 0x50 in Rdr.sys If Pathname Too Long in SMB Q163672 Windows NT 4.0 Setup Fails on ThinkPad 535 Q163687 Winsock Applications May Timeout or Fail with an Error Q163700 IIS Access Violation for Polygon with More Than 100 Vertices Q163714 ATDISK Finds the Same Disk Twice on SunDisk PCMCIA ATA Adapter Q163725 NDIS Driver Fails To Check Functional Address Q163790 RPC Service Stops Responding on UDP Port 135 Q163872 Sysdiff Cannot Delete Files Q163873 Czech Keyboard Layout Has Wrong Mapping Q163874 Pressing CTRL+ALT+DEL When Logging On Can Cause Blue Screen Q163875 Group Policies Not Applied If DC Name Is More Than 13 Characters Q163876 CSNW Clients Cannot Delete Print Jobs on NetWare Print Queue Q163880 COPY Command Causes File Cache to Grow Q163881 Windows NT Does not Display Some Fonts Q163883 NetBT (tag=Nbt8) Corrupts Pool with WinNT 4.0 SP2 Installed Q163891 Microsoft Excel 97 Causes a Windows NT Access Violation Q163892 A Service May Not Set Hooks on 32-bit GUI Applications Q163936 CLOCK Hangs and Consumes 90% CPU When Set to Digital Display Q163969 Event 552: DNS Was Unable to Serve a Client Request Q164014 Slow Exchange Client Logons Due to Deadlock in LSASS Q164121 Corel Fonts Unavailable Outside of English Locale Q164133 Logon Allowed When Access Denied to Mandatory User Profile Q164138 Files in Macintosh Volume Disappear from Macintosh Clients Q164159 Verify Reports Errors When Restoring a Tape Backup Q164161 NTBACKUP Fails to Back up Microsoft Exchange Server Data Q164201 Access Violation Installing IIS Q164211 FPNW Doesn't Convert the Long File Names Correctly Q164260 Compressing and Uncompressing Files Cause File Cache to Grow Q164309 Windows NT Client: Primary/Secondary WINS Servers Switch Q164322 Memory Leak in NetQueryDisplayInformation API Q164350 NEC IDE CD-ROM Drive CDR-1400C Cannot Play Audio CDs Q164352 Stop 0x00000050 in Tcpip.sys Caused by Winsock Applications Q164391 WinNT 4.0 SP2 Atapi Claims IRQ for Unused IDE Channel Q164410 CHGPASS and SETPASS Do Not Prompt For Typing Correction Q164432 Accented Greek Characters Are Not Being Created Q164462 Conner 4 mm DAT Tape Devices Fail After About 30 Seconds Q164491 Stop: 0x0000000A in Rdr.sys When Mailslot Message > 512 Bytes Q164507 Any User Can Log on to FTP Server with Disabled Anonymous Logon Q164542 MGET to an IBM Host FTP Server Returns Garbage Characters Q164546 SCSI Driver Description Truncated in Control Panel Q164595 Duplicate Route Not Removed After Second Redirection Q164600 4 mm DAT Driver Reports DEC TZ9L Supports Setmarks Q164606 Deferred Reconnections to Password Shares May Not Work Q164630 RPC over NetBEUI Fails from WinNT 4.0 RAS to WinNT 4.0 RAS Q164631 Scavenging WINS Database Removes Static Entries Q164639 SNA Windows 95 Fails Logon If Password Change Required Q164702 WINDISK crashes during initialization when Compaq ATAPI PD/CD Q164758 Remote Procedure Call (RPC) Service Access Violation Q164806 CHKNTFS Does Not Exclude FAT Partitions from AUTOCHK on Boot Q164812 Computer Name Truncated When Name Resolution Attempted Q164821 DHCP Server Service May Stop Responding Q164826 Direct Draw Programs May Hang NT 4.0 with S3 968 Video Chipset Q164904 Stop 0x0000000A in NETBT.SYS After Applying Service Pack 2 Q164928 Not All Objects Are Displayed When Browsing NDS Trees Q164938 Event Logging Frozen While Doing Heavy Logging; Services CPU Peg Q164982 Lack of Secondary Address May Cause DNS Service to Hang Q164987 Hard-coded Socket of 451 Causes LANtegrity Software to Fail Q165004 NTVDM Support for Compaq Financial Keyboard Scan Codes Q165245 DDE Client Experiences Intermittent DDE Disconnects Q165314 Grace Logon Remaining Is Not Decremented When Logging to BDC Q165388 Invalid Directory Returned When Attempting to Access FPNW Q165427 Convlog.exe May Cause Access Violation Q165443 NDS Login Script Fails When Checking "If Member Of" Q165456 STOP 0x0000000A in Ntoskrnl.exe Q165483 RasEnumEntries() API Leaks Memory Q165813 16-bit Applications Cause Access Violation in NTDLL.DLL Q165814 Stop: 0x0000001E When Opening My Computer Q165816 STOP 0x0000000A in HAL.DLL on Multiprocessor Computers Q165818 Truncation of Backup Log In Eastern Europe or Russian NT 4.0 Q165946 RasEnumEntries Return Incorrect Number of Phonebook Entries Q165950 Unable to Change Font Cartridge Selection Q165989 GetPeerName() Returns WSAENOTCONN After Select() Returns Success Q166043 DHCPAdmin Incorrectly Writes the BootFileTable in the Registry Q166148 RasSetEntryProperties() Fails to Set Options in Service Pack 2 Q166158 Access Violation Occurs in SPOOLSS.EXE Q166159 Connecting to Windows Network resources from multi-homed machine Q166183 FPNW Server Returns Error When User Opens More Than 256 Files Q166186 OS/2 with TCP\IP May Refuse Socket Connections from Windows NT Q166197 NBTSTAT Error when Using >25 Dialout Devices with RAS Q166222 Dlc.sys Sends Frame Reject (FRMR) and Drops Connection Q166224 SNA Server 802.2 Connection Fails to Reactivate Q166226 Backup of Local Registry Does Not Work With NTBACKUP.EXE /b Q166257 Applications Using OpenGl Cause Access Violation in OPENGL.DLL Q166265 Printing To A Postscript Printer May Cause A STOP 0x0000003b Q166266 STOP 0x0000000A Using OpenNT Commands and Utilities Q166267 Office Shortcut Bar Fonts Appear as Non-Cyrillic on Russian NT Q166311 Memory Leak Retrieving OLE Property Values with Service Pack 2 Q166334 OpenGL Access Violation on Windows NT Version 4.0 Q166421 FPNW Returns Time Stamp with 60 Seconds to Clients Q166423 Access Violation in SERVICES.EXE in EVENTLOG.DLL Q166475 NWLNKSPX Retransmission Problem Over a Slow Link Q166478 Logon Rights Are Not Audited Q166482 DUMPCHK.EXE Incorrectly Reports Some Dump Files as Invalid Q166686 RASDIAL Error w/English Text on Non-English Version of Windows NT 4.0 Q166696 NT 4 Err Msg: "The INF OEMNADDI is missing the referenced file" Q166823 Cannot Connect To AT&T Advanced Server VMS or OSF Print Share Q166834 Lost Record Locks from MS-DOS-based Program to NetWare Server Q166842 CSNW & GSNW Won't Display NetWare Servers via a SAP Seed Server Q166846 Cannot Reconnect to TN3270 Server with Close Listen Sockets Q166874 No Crashdump and Compaq Systems with Smart-2/P (PCI) Controller Q166963 Cannot Communicate with Computer Running NWLink IPX/SPX Q166964 Incorrect File Listing on NetWare Server with DIR /TC Command Q167009 Description of DHCP Server Service Has a Misspelled Word Q167010 Access Violation in CMD.EXE Processing Batch File Script Argument Q167026 Windows NT 4.0 DNS Server Stops Responding To Queries Q167038 RAS Clients Run Winsock and RPC Applications Slowly Q167044 Request From Perfmon Counter Can Cause Excessive Page Faults Q167110 NT 4.0 RAS client slows over time due to lack of resources Q167129 Stop 0x7A or System Lockup in NTBACKUP With MINIQIC Q167130 Fatal System Error in NDIS.SYS Allocating Map Registers Q167362 STOP 0x00000050 in SRV.SYS When Shutting Down Computer Service Pack 2Q108261: Windows NT Hangs on Shutdown with Certain PCMCIA Devices Q140059: Stop 0xA in Afd When Browsing IIS Q140065: Multi-Processor Systems Randomly Restart or Stop Responding Q141375: Winstone 97 May Fail on Windows NT 4.0 Q142634: Multiple Processes Are Able to Open the Same Winsock Port Q142641: Internet Server Unavailable Because of Malicious SYN Attacks Q142648: STOP 0x00000024 in Ntfs.sys Q142656: Internet Explorer 3.0 on RISC Computer Cannot Connect to Host Q142671: Backup Fails on Certain Directories Due to Lack of Permissions Q142675: CSNW Sends Packets Greater Than Negotiated Maximum Packet Size Q142686: First Line of Print Job Lost When Printing Using Lpdsvc Q142687: Windows NT 4.0 Not Able to Read Some Compact Discs Q142847: Bugcheck 0x1e Caused by Isotp.sys Driver Q142872: Length of PDC Name May Affect Performance on a Domain Q142903: Windows NT Ndis.sys and Netflx3.sys Performance Improvement Q146336: Joystick in Windows NT 4.0 Does Not Work Properly Q147363: AlphaServer Hangs on Install of Windows NT Version 4.0 Q147497: Matrox Video Driver May Fail on Alpha-based Computers Q147552: Backup Always Reports Time as PM Q148378: Setup of RAS with Multiple Modems Gives Slow Performance Q148525: Removable Media Does Not Eject if Formatted in NTFS Q148602: Running SNA Server 2.11 on the Windows NT 4.0 Q150815: Windows NT May Fail to Boot on Toshiba Portable Computers Q153665: SPX Data Stream Type Header May Reset Unexpectedly Q154556: Delegation Requires a Stop and Restart of the DNS Server Service Q154620: Windows NT 4.0 DNS Server Loses the Forwarders Settings Q154784: Windows NT Operating System SNMP OID Incorrect Q155883: NT 4.0 Breaks SNA Server 2.x Server Communication Over IP Q156091: Access Violation with Long NDS Context in CSNW/GSNW Q156095: Replace Command with Space Character in the Path Does Not Work Q156276: Cmd.exe Does Not Support UNC Names as the Current Directory Q156324: Device Failure Message with Microchannel Network Adapter Q156520: Logon Validation Fails Using Domain Name Server (DNS) Q156578: Cannot Cancel Print Job on Windows NT 3.51 Shared Printer Q156735: WOW Applications Stack Fault When Launched by a Service Q156746: Print Jobs Are Deleted When Printer Is Resumed After Restart Q156750: AddGroupNameResponse Frame from WinNT May Cause WFWG to Hang Q156884: Problems Saving Event Viewer Log from Windows NT 4.0 to 3.51 Q156958: Serial Service Won't Stop with Serial Printer Installed Q157279: Nwrdr.sys Fails Reading File with Execute Only Attribute Q157289: Memory Leak Using RegConnectRegistry API Q157494: PPC 4.0 Cirrus Driver Fails to Redraw & Fill Objects Correctly Q157621: Personal Groups Not Visible If %Systemroot% Is Read-Only Q157673: Policy Not Updated on Workstation Q158142: WM_DDE_EXECUTE API Causes a Memory Leak in the WOW Subsystem Q158387: RAS Server Cannot Use DHCP to Assign Addresses w/ PPTP Filtering Q158587: 16-Bit Named Pipe File Open Leads to WOW Access Violation Q158682: Shortcuts Created Under NT 4.0 Resolve to UNC Paths Q158707: DDE Destroy Window Code May Stop 0x0000001e in Windows NT 4.0 Q158796: Macintosh Clients Connected to WinNT Server Appear to Hang Q158981: IBM Thinkpads 760ED and 760ELD May Hang During Shutdown Q159053: NTFS Stream Limitation in Windows NT 4.0 Q159066: A Client Crash May Prevent an NTFS Volume Dismount Q159071: NTFS Does Not Prevent a File Deletion During Rename Q159072: An Account That Still Has System Access May Be Deleted Q159073: Screen Corruption on Dell Laptops Using Cirrus Video Q159075: Compression Is Not Supported on Quantum 4000DLT Q159076: Windows NT 4.0 May Hang or Crash in Win32k.sys During Setup. Q159085: Windows NT Kernel Crashes While Processing WM_NCCREATE Q159090: Delphi 2.00 and 2.01 Users Encounter Error 998 Q159091: German Time Zone Results in Incorrect Log Times Q159092: Mouse Buttons Not Swapped on German Windows NT 4.0 Q159093: Windows NT Muldiv() Function Returns Incorrect Value Q159095: STOP 0x0000001E in Win32k.sys When Exiting Applications Q159098: WinNT 4.0 Resource Kit Utility "Remote Console" Client Fails Q159105: Cannot Open Truncated File Names from Compact Discs Q159107: Access Violaion in AddAtom Inside Kernel32.dll Q159108: SMP Full Duplex Adapter Configuration May Cause a Blue Screen Q159109: ExitWindowsEx Does Not Work With NEC Power Switch Service Q159110: CDFS Does Not Complete IRPs Correctly Q159111: Multiprocessor Computer Hangs Under Stress Using Halsp.dll Q159119: NTFS Generates Cross-Linked Files Q159127: Bugcheck in Windows NT While Running POSIX Applications Q159129: OpenGL Access Violation with Invalid OpenGL Context Q159137: Moving Files Can Corrupt NTFS Partition Q159141: CDFS Incorrectly Creates Short File Names for Some Files Q159144: Dongle May Not Function Under Windows NT 4.0 Q159203: Unattended Install Prompts for New IP if Zero Is in Address Q159204: IoCompletionPort Causes Blue Screen Error Q159205: SFM File Type and Creator Properties Invalid Q159206: Reactivation of Paused Print Queues Deletes Print Jobs Q159309: Windows NT 4.0 RAS Not Releasing Static IP Addresses Q159352: RPC over NetBIOS Programs Can't Call from Server to RAS Client Q159447: Applications Testing for Directory Existence Fail Q159449: DNS Server Glue Data Is Deleted Q159450: Second Recursive Query Sent from DNS Server Is Broken Q159594: Missing Eastern Europe FontSubstitutes in Registry Q159910: Memory Corruption on a Windows NT Alpha Platform Q159970: Slow List of Folders and Files with CSNW Q159971: SetTimer() API Causes Memory Leak in the WOW Subsystem Q159972: WinNT 4.0 May Not Return Valid Response for SMB Search Command Q160015: 2D Vector Performance on WinNT 4.0 Slower Than on 3.51 Q160055: Warning Event ID 4010 Generated on Windows NT LPD Server Q160189: CSNW Cannot See More Than 32 Volumes Per Server Q160190: RasSetEntryProperties Does Not Save a Full Path Script Name Q160354: Mouse and Keyboard Can Disappear when Replacing Drivers Q160370: Stop Screen 0x00000050 Caused by Fs_rec.sys Q160372: Intermittent File Corruption when Compiling on NTFS Partition Q160373: Adaptec Aic78xx Does Not Issue Multiple Tagged Commands Q160377: File Size Data Does Not Remain Consistent After Defrag on NTFS Q160392: Systems with 4 GB or More of RAM Cannot Boot Windows NT 4.0 Q160398: Cannot Read Files Greater than 4 GB Q160404: Madge EISA Stops Responding on Alpha in Windows NT 4.0 Q160405: Video Memory Not Correctly Detected on Dell Latitude Laptops Q160420: Changing Colors on Cirrus Logic Cards to 65k Can Cause Stop Q160459: DNS Delegations May Fail Q160470: Stop 0x0000000a IPX Sends Browser an Incomplete Datagram Q160493: NWLNKRIP Data Structures Corruption when Using a Demand Dial NIC Q160494: DNS Zone Transfer Fails After WINS Record Added Q160497: Cache File Entries Disappear Q160508: Unnecessary DNS Zone Transfers Q160518: Zone Files in Multiples of 4 KB May Cause Access Violation Q160583: Windows NT 4.0 with More Than 4 Processors May Stall & Reboot Q160601: Bad Parameters Sent to Win32k.sys May Cause Stop Message Q160603: No Output from DBMON Using OutputDebugString While Debugging Q160604: Access Violation in security!SspQueryContextAttributesW Q160606: Performance Enhancements for SQL Server Under Windows NT Q160610: READ_REGISTER_ULONG Doesn't Preserve ULONG Semantics on Alpha Q160649: STOP 0x0000000A in Ntoskrnl.exe at Logon to Windows NT 4.0 Q160650: Blue Screen When Closing Kernel Mode Handles from User Mode Q160651: OpenGL May Cause an Exception 0xc0000090 Q160653: NTFS Fails Assertion Under High Stress During Transfer Q160657: 16-bit Version of Visual Basic 4 May Hang Windows NT 4.0 Q160658: Stop C0000021A Using MoveFileEx MOVEFILE_DELAY_UNTIL_REBOOT Q160670: FPSCR is Not Being Saved Across Thread Context Switches Q160671: Stop 0x0000007F May Occur on Compaq SystemPro Q160678: Possible Access Violation in Win32k.sys Under High Stress Q160702: Event 2006 Errors in Xcopy from WinNT 4.0 to OS/2 3.0 Client Q160732: FIX: SQL Server 6.5 Service Pack 2 Fixlist (Part 2 of 2) Q160791: Excel Charts Lose Color When Pasted into Word Q160840: Sharing Violation When Accessing User Profiles Q160894: Incoming Fax Jobs Do Not Appear in Print Queue Q160964: 0x0000001e When Printing Certain Documents from Windows NT 4.0 Q161201: NTBackup.exe from WinNT 3.51 SP5 Causes Verify Errors Q161802: Stop 0x0000000A During Create File SMB Q161990: How to Enable Strong Password Functionality in Windows NT Q162157: Cyberbit Unicode Font Does Not Return Correct Charset Q163055: DHCP Client May fail with NT 4.0 SP2 Multinetted DHCP Server Q163736: Access Violation in DNS Manager when deleting cached domain Q163772: Nested "for" Loops Using the '~' Operators Does not Work Q163773: Brief 3.0 in NTVDM Consumes 100% Processor Q163837: SNMP query to Windows NT returns same value for NTS and NTW Service Pack 1Q78303: Intermittent File Corruption Problem Q142653: STOP Message Occurs Calling GetThreadContext/SetThreadContext Q142654: Winsock Memory Access Violation in Ws2help.dll Or Msafd.dll Q142655: Stop Message Appears After Deleting ProductOption Registry Key Q142656: Internet Explorer 3.0 on RISC Computer Cannot Connect to Host Q142657: Data Corruption on Windows NT 4.0 Q142658: Internet Information Server Runs Out of Memory Q149903: File Manager Performs a Move Instead of a Copy Q156832: STOP Message when IBM Warp Client Connects to Windows NT 4.0 Q. When should I reapply a Service Pack? A. You should reapply any Service Pack (and subsequent hotfixes) whenever you add any system utilities/services or hardware/software. A good rule of thumb is if the computer says "Changes have been made you must shutdown and restart your computer" reapply your service pack before the reboot. The only problem is once you reinstall a service pack, unless you uninstall then reinstall, you will lose the ability to uninstall it. A. Due to a lot of public pressure, Microsoft agreed to no longer include any new functionality in Service Packs, but would rather produce a separate add-on which would update various option components. Option Pack 4 is the first of these (to keep in step with Service Pack 4) and can be downloaded from http://www.microsoft.com/windows/downloads/contents/updates/nt40ptpk/default.asp or is supplied as part of MSDN. The download is about 27MB. If you download from the web you have to download a special program, download.exe, which you then run which downloads or installs the software. Included in Option Pack 4 are:
More information can be found at http://www.microsoft.com/NTServer/Basics/WhatNew.asp To install the Option Pack you must be running Service Pack 3 or above (I tested with Service Pack 4 and you get warnings that it has not been tested on Service Pack 4 but it works fine) and you must have Internet Explorer 4.01 or above. Once you start the installation you should click Next to the introduction screen and you will then have two options
If you select Upgrade Only then only existing components on the system will be upgrade to Option Pack 4 version, clicking Upgrade Plus allows you to install extra software. If you select Upgrade Plus you can then choose which components to install. Items such as IIS have sub-components such as NNTP server (news) which you can optionally install. Depending on the components you selected you will be asked some minor questions and then the machine will reboot. Q. How can I tell which version Service Pack I have installed? A. When a Service Pack is installed using the normal method (e.g. not just copying the files to a build location) the service pack version is entered into the registry value CSDVersion which is under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion. The value is of the formal "Service Pack n", e.g. "Service Pack 4" but can have extra information if it is a beta or release candidate, e.g. "Service Pack 4, RC 1.99". To check this from the command line you could use the REG.EXE Resource Kit supplement 2 utility: C:\>reg query "HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\CSDVersion" Make sure you put the value in double quotes ("). An alternative is to just run WINVER.EXE which will tell you your current build and Service Pack version. You can also use WINMSD.EXE or Help/About in Explorer. Q. I receive an error trying to install Service Pack 4 for NT 4.0. A. If when installing Service Pack 4 you receive the error: "Service Pack Setup Error. You do not have permissions to update Windows NT. Please contact your system administrator." it may be caused by the update.exe image being in the wrong directory. If you have expanded the service pack using nt4sp4i.exe /x it will create a subdirectory, update, which will include the files
When running update.exe it must be in the update subdirectory. If not you should move the image accordingly. Q. Setupdd.sys is missing in Service Pack 4/5. A. Setupdd.sys is included on the Service Pack 4/5 CD and in the Y2K download version of Service Pack 4 but not the normal version. This file is needed to replace the one on the second Windows NT installation disk to repair a system that has Service Pack 3 or above. To create a set of NT installations disks insert the NT installation CD-ROM and type winnt32 /ox. You can download SETUPDD.SYS here. Q. Important steps for installing Service Pack 4. A. Service Pack 4 makes some permanent changes to the registry and so before installing you should perform the following steps to facilitate a Service Pack uninstall in the event of a problem. Before installing the service pack make sure you have performed the installation on a test server and as with another "fix" don't install unless you need a fix supplied by the Service Pack or have been instructed to install it by a Microsoft support engineer. If it ain't broke, don't fix it.
Q. Uninstalling Service Pack 4. A. As was explained in "Q. Important steps for installing Service Pack 4.", Service Pack 4 makes some changes to registry which can't be undone. Because of this, in the event of a Service Pack 4 uninstall the following files are left unrestored
Additionally the files below are also not restored: Crypt32.dll, Comctl32.dll, Schannel.dll, Cryptdlg.dll, Pstorerc.dll, Psbase.dll, Pstores.exe, Pstorec.dll, Cryptext.dll, Cryptui.dll, Mssign32.dll, Wintrust.dll, Softpub.dll, Mssip32.dll, Mscat32.dll, Initpki.dll, Cryptnet.dll, Xenroll.dll, Dssig.dll, Sigres.exe, Dssbase.dll, Reaenh.dll (128 bit security only), Rsabase.dll, Certmgr.msc, and Syske.exe. To uninstall the Service Pack either start the Add/Remove programs control panel applet (Start - Settings - Control Panel - Add/Remove programs), select "Windows NT Service Pack 4" and click Remove, or, move to the %systemroot%\$NtServicePackUninstall$\spuninst directory and run spuninst.exe. If you wanted to completely uninstall the service pack, undoing the registry changes and restoring all original files you would need to restore the %systemroot% directory from a back and repair the registry using the ERD disk you created. Alternatively you could uninstall as normal then use the ERD to repair the registry and replace the six files that the uninstall does not fix. Q. How can I tell who installed/uninstalled Service Pack 4? A. When Service Pack 4 is installed or uninstalled an Event is written to the System Event Log. The Event ID is 4353 so you could just create a filter (View - Filter Events) to view only Event ID 4353. It gives information of the person and time it was actioned. The messages are Windows NT Service Pack 4 was installed (Service Pack 3 was previously installed). or Windows NT Service Pack 4 was uninstalled. Restoring Windows NT to Service Pack 3. Q. Service Pack 4 unattended installation switches. A. The following switches can be used with UPDATE.EXE program supplied with Service Pack 4
Q. New Event Logs in Windows NT 4.0 Service Pack 4. A. Service Pack 4 adds 4 new Event log messages to the System Event Log:
These can all be viewed using the Event Viewer which is located in the Administrative Tools program folder. Q. When will Service Pack 5 for NT 4.0 be released? A. Service Pack 5 is now released and expect SP6 to follow! Q. I receive an error that setup.log cannot be found when installing a service pack. A. If when you try and install a service pack you receive one of the following errors: Service Pack Setup could not find the Setup.log file in your repair directory or Service Pack Setup cannot open or modify your SETUP.LOG file The problem is either
If the file SETUP.LOG in the %systemroot%\repair is missing then you can copy it off your Emergency repair disk however if this is not an option you could copy from another machine but you may need to update the first few number of lines in the file (I copied a setup.log file from a NT Server Terminal Server installation to an NT Workstation and installed Service Pack 5 with no problems after changing the device and directory! This is not a supported method though). Below is an example of the first lines of setup.log [Paths] If you copy from another machine you may need to update the TargetDirectory and also the TargetDevice (which is where the %systemroot% is located and can be compared against the boot.ini file) and SystemPartition (which is the active partition, starting from 1, e.g. C:, this should not need to be changed). If the TargetDirectory is different you should perform a global replace in the file from the old name, e.g. WINTSRV to the new name, e.g. WINNT. If you do have a setup.log file in the repair directory and still get problems installing check that its format matches that given above. If you don't have any SETUP.LOG files I have an example one you can download and modify from an NT Workstation installation (but don't mail me asking for support) but the correct procedure is outlined at http://support.microsoft.com/support/kb/articles/Q173/3/84.asp which involves reinstalling NT over your existing installation. Q. What is new in Windows NT 5.0? A. NT 5.0 is the next major release of NT. It is expected to include the following new features:
For more information on what's new please goto http://www.microsoft.com/NTServer/Basics/Future/WindowsNT5/Features.asp information on Windows NT 5.0? A. Below is a list of useful links at Microsoft
Q. How do I get the Microsoft Windows 2000 Beta? A. Windows 2000 is currently in beta test. The technical beta program is closed and is not accepting additional requests at this time. The Windows 2000 beta is not generally available at present for free. If you want this beta, there are five approaches you can consider taking:-
A. Microsoft have renamed NT 5.0 to Windows 2000 in an attempt to simplify the product lines. Below is an extract from the Microsoft press release: Four products to make up initial Windows 2000 offerings, all "Built on NT Technology". The company has decided to rename the next release of the Windows NT® line of operating systemsformerly known as Windows NT 5.0as Windows 2000. Now that millions of people use the Windows NT operating systems every day, Microsoft has decided to rename its next releases to reflect their shift into the mainstream market and to help customers understand the products. All currently released operating systems will retain their names. The company has also expanded the Windows server line to meet customer demand for solutions that are more powerful than Windows NT Server Enterprise Edition and for lower cost clustering alternatives for branch-office servers. "Windows NT was first released five years ago as a specialized operating system for technical and business needs. Today it has proven its value as the preferred technology for all users who want industry-leading cost-effectiveness, rich security features and demonstrated scalability," said Jim Allchin, senior vice president at Microsoft. "The Windows NT kernel will be the basis for all of Microsoft's PC operating systems from consumer products to the highest-performance servers."
Microsoft offers the Windows 2000 Server as the ideal solution for small- to medium-sized enterprise application deployments, web servers, workgroups and branch offices. Windows 2000 Server will support new systems with up to two-way SMP; existing Windows NT Server 4.0 systems with up to four-way SMP can be upgraded to this product. Windows 2000 Advanced Server is a more powerful departmental and application server that provides network operating system and Internet services. Supporting new systems with up to four-way SMP and large physical memories, this product is ideal for database-intensive work. In addition, Windows 2000 Server integrates clustering and load-balancing support to provide excellent system and application availability. Organizations with existing Windows NT 4.0 Enterprise Edition servers with up to eight-way SMP can install this product.
Microsoft believes its new Windows 2000 name will help both its partners and customers. "The new name also serves our goal of making it simpler for customers to choose the right Windows products for their needs," said Brad Chase, vice president at Microsoft. "The new naming system eliminates customer confusion about whether 'NT' refers to client or server technology. Also, with our across-the-board improvements in ease of use, mobile support and total cost of ownership that provide benefits to so many users, 'NT' technology is no longer just for high-end workstations." Microsoft will use the tagline "Built on NT Technology" to help its customers through the naming transition. The company believes that the Windows 2000 name and NT tagline will help people to identify which operating system will work best in their environment. Andas the name impliesWindows 2000 is ready for the next millennium. Q. Getting the most out of NT 5.0 beta 2. A. Windows NT Expert Thomas Lee has submitted these tips for getting the most out of NT 5.0 Beta 2.0. Dated 04/11/1998 Now that NT5 Beta 5 Beta 2 Workstation and Server have been in the field for some time, some experience in these releases has been gained. In these public newsgroups, we often see issues being repeated since later users have not seen the related posts. To help in assisting new users, I've complied what I modestly called: THOMAS'S TOP 10 FAQ TIPS FOR NT5 BETA 2I've written both specific answers to the these noted problems, plus some general tips on how to get the most out of NT5 B2. I can't get DHCP to work. Two things to check: first that the DHCP server has been authorised and second that the subnet has been activated, To find out more about setting up a DHCP server, refer to the Walkthroughs. In general, read the walkthroughs for all the functions before asking more questions in the newsgroups. But if you are unclear, certainly post! CDR is broken in B2 This is a known issue. But please file a bug report on your details, especially including your exact hardware configuration. In general, try to read the older messages - the last couple of weeks or so to see if the issue has come up. A lot of issues are repeated, and repeated, suggesting, to some, that newsgroups are write only. So how do I create a domain - there was nothing in the setup about that! In Windows 2000, the creation of a domain controller is not done during the installation of the OS. With Win2k, you install the OS first then you create a Domain Controller by DCPROMO.EXE either from the command prompt of from Start/Run. Prior to running DCPROMO.EXE, you must install and setup a DNS service. For more details on setting up a DC, see advsetup.txt on the CD. In general, please read all the files in the root of the CD before asking further questions in the newsgroup please! [J.S. There is also an example in the FAQ Q. How do I promote a server to a domain controller?] Beta 2 is does not support my <pick your hardware device> First, check the HCL in \support\hcl.txt to see if this card is supported. If it is and it does not work, try the standard tricks: take card out, see what works. Check the IRQs, etc. IF all else fails, file a bug report. If your device in NOT on the HCL, file a bug report explaining the details of your system, the precise way the card fails (BSOD, installs but fails, reduced functionality). Also try Win98 drivers if you can find them. Finally file a bug report. In general, the HCL is your friend. Please consider consulting it prior to asking questions on the newsgroups. Also, Help is your other friend - check Help for configuration questions. The Find dialog is broken. The find/search dialog does work, it's just not user friendly. This is a bug, and is "fixed in later builds" - a common reply to bugs submitted regarding this dialog! But file searching can be significantly improved by use if the index server. This does devour a lot of disk resources initially ( it content indexes your entire disk setup). Once it has completed the first pass (which can take hours depending how much disk space you have and hot much horsepower your system has. Initial indexing is an ideal task to kick off at night, and come back to seeing complete in the morning. Once installed, it's efficient, and is very useful for searching. Development staff, developing HTML, Office documents, C Code, etc., will love the ability to search for specific strings in the myriad of .cpp, .htm, .shh, .asp files, etc! Check it out. In general, for certain users, Index server is a real pal. I can't work out how to do something in NT5 B2. Try looking in the help. The server help, especially, has a lot of really great background information. Help is massively different, and better, in Windows 2000 than in NT4! The Help text include documentation on how to carry out most basic configuration tasks, back ground concepts (and much of it well written), and places to go for more information (e.g. web sites, books, RFCs, etc). Take a look - Help has gotten a whole lot better. In general, Help is a friend. Why is this wise guy always asking me to read the documentation? Simple, really. A number of procedures will be new, and the details of these are documented. Secondly, the release notes document known issues, work arounds, etc. Windows 2000 is a lot different from NT4. I'd like to find the 'This sure isn't Kansas any more Toto' quote from the Wizard of oz as the start-up sound. MS are aware and really have tried to document the key points. The walkthroughs make a great self paced self study tour of Windows 2000 - enjoy the ride. In general: the product documentation is your friend. Why that guy always saying 'file a bug report' Why IS that guy always telling me to file a bug report??? Well, to put it bluntly: The product shipped as NT5 B2 is in beta test. It is not a final product. There are most likely thousands of bugs still remaining ranging from serious show stoppers to trivial things that simply will never get fixed (e.g. the titles on a dialog box). That is not abnormal for such a large product this far from shipping. Win2000 is simply NOT ready go to ship today - MS need to find, and resolve, these bugs. If you find something wrong, it may just be simple user error but it may well be a bug. So if you think it's broken, tell MS. You, as future users, can influence and have helped to shape the product as it evolves. MS has listened to the feedback and are incorporating it. With the NT team embark on the death march to Beta 3, if you don't tell MS, you may well have to live with the consequences - and condemn others. MS have made it clear that Windows 2000 will not ship before it's ready. They have said they will ship when customers tell them it's ready. You are the customer - tell MS what you've found out and what you think. In general: Make a difference. File a GOOD bug report. OK, Cool, so how do I do it. If you are on an internal beta, you will know how to do this - it was on the release notes accompanying your CD (and in email). Please follow directions, and discuss the issue on the internal newsgroups. Please read those groups. If you are not on the technical beta, then go to ntbeta.microsoft.com. Fill in a short survey, and give them your email alias. You will then get a userid and password to enter the site. Go back, and with your password, you can drill down to a web tool to file a bug report. Spend a bit of time, if you can, to look at the site for more details on bug reporting. Oh, and the ntbeta.microsoft.com has not been renamed. Yet. In general: The ntbeta.microsoft.com site is your friend. How much do I need to tell MS about a bug. How good is good? To some degree, the more you can provide, the better. Filing good bug reports means report as much as possible, including all your hardware, the exact nature of problem, and if possible precise steps to reproduce it. In general, If MS can't reproduce it - it's not a bug. Written by that guy who is always asking folks to read the documentation, use Help, and file good bug reports. And for the humour impaired: this entire post is classified ":-) " Q. What hardware is needed to run Windows 2000? A. Below is a list of the minimum hardware needed to install Windows 2000.
The minimum memory is the minimum memory and setup program performs a test to check you have that amount or the installation will not proceed (very annoying when I tried to install server on my portable which (then) only had 32MB of RAM). You can hack the txtsetup.sif files, however, to install either Server or Workstation on systems with less memory. There is no check on CPU type. The 64bit Alpha processor continues to be supported, although memory requirements are slightly larger (eg 96MB for Server) than Intel systems. Support for archaic 1st generation systems such as the Jensen has been dropped for Windows 2000. This information is also in the file setup.txt on the Windows 2000 (NT 5.0 Beta) CD-ROM. Q. Where is the Hardware Compatibility List for Windows 2000? A. The HCL for Windows 2000 is supplied on the CD in both text and HTML Help format. It can also be found at ftp://ftp.microsoft.com/services/whql/win2000hcl.txt. Q. How can a FAT partition be converted to an NTFS partition? A. From the command line enter the command convert d: /fs:ntfs . This command is one way only, and you cannot convert an NTFS partition to FAT. If the FAT partition is the system partition then the conversion will take place on the next reboot. After the conversion File Permissions are set to Full Control for everyone, where as if you install directly to NTFS the permissions are set on a stricter basis. Q. How can a NTFS partition be converted to a FAT partition? A. A simple conversion is not possible, and the only course of action is to backup all the data on the drive, reformat the disk to FAT and then restore your data backup. Q. How do I run HPFS under NT 4.0? A. If you want NT support for HPFS, you can upgrade from 3.51 to 4.0 which will retain HPFS support. You can manually install the 3.51 driver under NT 4.0, however this is not supported by Microsoft.
Q. How do I compress a directory? A. Follow instructions below (this can only be done on an NTFS partition)
Q. How do I uncompress a directory? A. Follow the same procedure above, but uncheck the compress box. Q. Is there an NTFS defragmentation tool available? A. There are a number available for NT that I know of.
Windows 2000 has a limited built in defragmentation tool which can be used as follows:
Q. Can I undelete a file in NT? A. It depends on the file system. NT has no undelete facility, however if the filesystem was FAT then boot into DOS and then use the dos undelete utility. With the NT Resource kit there is a utility called DiskProbe which allows a user to view the data on a disk, which could then be copied to another file. It is possible to search sectors for data using DiskProbe. If the files are deleted on an NTFS partition booting using a DOS disk and using the undelete.exe program is not possible since DOS cannot read NTFS partitions. NTFS does not perform destructive deletes which means the actual data is left intact on the disk (until another file is written in its place) and so a new application from Executive Software, Network Undelete can be used to undelete files from NTFS partitions. A free 30-day version can be downloaded from http://www.networkundelete.com/. Executive Software also have a free utility Emergency Undelete which can undelete locally deleted files, http://www.execsoft.com. It is important that once any file is delete all activity on the machine is stopped to reduce the possibility of other files overwriting the data that wants to be recovered. A. Native NT does not support FAT32. NT Internals have released a read-only FAT32 driver for Windows NT 4.0 from http://www.sysinternals.com/fat32.htm, or a full read/write version can be purchased from http://www.winternals.com. Windows 2000 has full FAT 32(x) support with the following conditions:
Q. Can you read an NTFS partition from DOS? A. Not with standard DOS, however there is a product called NTFSDos which enables a user to read from a NTFS partition. The homepage for this utility is http://www.sysinternals.com. Q. How do you delete a NTFS partition? A. You can boot off of the three NT installation disks and follow the instructions below:
Usually a NTFS partition can be deleted using FDISK (delete non-DOS partition), however this will not work if the NTFS partition is in the extended partition. You can delete an NTFS partition using Disk Administrator, by selecting the partition and pressing DEL (as long as it is not the system/boot partition). There is also a utility called delpart.exe that will delete a NTFS partition from a DOS bootup. Q. Is it possible to repartition a disk without losing data? A. There is no standard way in NT, however there is a 3rd party product called Partition Magic which will repartition FAT, NTFS and FAT32, however there is a bug in the product which makes the boot partition unbootable if it is repartitioned. A fix is available for this from their web site Q. What is the biggest disk NT can use? A. The simple answer to this question is that NT can view a maximum partition size of 2 terabytes (or 2,199,023,255,552 bytes), however there are limitations that restrict you well below this number. FAT has internal limits of 4 GB due to thefact it uses 16-bit fields to store file sizes, 2^16 is 65,536 with a cluster size of 64 KB gives us the 4 GB. HPFS uses 32bit fields and can therefore handle greater size disks, but the largest single file size is 4GB. HPFS allocates disk space in 512 byte sectors which can cause problems in Asian markets where sector sizes are typically 1024 bytes which means HPFS cannot be used. NTFS uses 64-bits for all sizes, leading to a max size of..... 16 exabytes!!! (18,446,744,073,709,551,616 bytes), however NT could not handle a volume this big. For IDE drives, the maximum is 136.9 GB, however for a standard IDE drive this is constrained to 528MB. The new EIDE drives can access much larger sizes. It is important to note that the System partition (holding ntldr, boot.ini, etc.) MUST be entirely within the first 7.8Gb of any disk (if this is the same as the boot partition this limit applies) This is due to the BIOS int 13H interface used by ntldr to bootstrap up to the point where it can drive the native HDD IDE or SCSI. int 13H presents a 24 bit parameter for cylinder/head/sector for a drive. If say by defragmentation the system are moved beyond this point you will not be able to boot the system. Q. Can I disable 8.3 name creation on a NTFS? A. From the key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem, change the value NtfsDisable8dot3NameCreation from 0 to 1. You may experience problems installing Office 97 if you disable 8.3 name creation and may have to re-enable it during the installation of the software. Q. How can I stop NT from generating LFN's (Long File Names) on a FAT partition? A. Using the registry editor change the value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem\Win31FileSystem from 0 to 1 and only 8.3 file names will be created. The reason for not wanting the LFN's to be created is that some 3rd party disk utilities that directly manipulate FAT can destroy the LFN's. Utilities such as SCANDISK and DEFRAG that come with DOS 6.x and above do not harm LFN's. Q. I can't create any files on the root of a FAT partition. A. The root of a FAT drive has a coded limit of 512 entries, so if you have exceeded this you will not be able to create any more files. I don't have this many! Remember Long File Names take up more than one entry, see the next FAQ for more information, so if you have many LFN's on the root this will drastically reduce the number of files you can have. A. Long File Names are stored using a series of linked directory entries. A LFN will use one directory entry for its alias (the alias is the 8.3 name automatically generated), and a hidden secondary directory entry for every 13 characters in its name, so if you had a 200 character long file name, this would use 17 entries! The alias is generated using the first six characters of the LFN, then a
~ and a number for the first 4 versions of a files with the same first six
characters, e.g. for the file After the first 4 version of a file, only the first two characters of the file name are used, and the last 6 are generated, e.g. jo0E38~1.txt Q. How do I change access permissions on a directory? A. You can only set access permissions on an NTFS volume. Follow the instructions below:
Q. How can I change access permissions from the command line? A. A utility called CACLS.EXE comes as standard with
NT, and can be used from the command prompt. Read the help with the
CACLS.EXE program (cacls /?). To give user john read access to a directory
called files enter: Q. I have a CHKDSK scheduled to start next reboot, but I want to stop it. A. If the command chkdsk /f /r (find bad sectors, recover information from bad sectors and fix errors on the disk) is run, on the next reboot the check disk is scheduled, however you may want to cancel this check disk. To do this perform the following:
Q. My NTFS drive is corrupt, how do I recover? A. To restore an NTFS drive using the information below, it must have been created using Windows NT 4.0, if it was not created using NT 4.0 you should see Knowledge base article Q121517. To restore an NTFS partition you must locate the spare copy of the boot sector and copy it to the correct position on the drive. You need the NTdiskedit utility (you can also use Disk Probe that comes with the resource kit and instructions for Disk Probe can be found at http://support.microsoft.com/support/kb/articles/q153/9/73.asp or Norton disk edit) which is available from Microsoft Support Services.
Q. How can I delete a file without it going to the recycle bin? A. When you delete the file, hold down the shift key. Q. How can I change the serial number of a disk? A. The serial number is located in the boot sector for a volume. For FAT drives its 4 bytes starting at offset 0x27; for NTFS drives its 8 bytes starting at offset 0x48. You'll need a sector-level editor to modify the number (like the Resource Kit's Diskprobe). Q. How can I backup the Master Boot Record? A. The Master boot record on the hard disk used to start the computer (the system partition) is the most critical sector so make sure this is the sector you backup. The boot partition is also very important (where %systemroot% resides). You need the DiskProbe utility that comes with the Resource Kit.
Q. How do I restore the Master Boot Record? A. Follow the instructions below, however be very careful!!!
Q. What CD-ROM file systems can NT read? A. NT's primary file system is CDFS a read only file system, however it can read any file system that is ISO9660 compliant. Q. How do I disable 8.3 name creation on VFAT? A. Start the registry editor (regedit.exe) and set the value HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem\Win95TruncatedExtensions to 0. Q. How do I create a Volume Set? A. A volume set allows you to take all the unused space on one or more drives (up to 32 drives per volume set) and combine it into a single, large, system recognizable drive. To create a volume set:
The main problem with volume sets is that if one drive in the volume set fails, the entire volume set becomes unavailable. Q. How do I extend a Volume Set? A. Extending a volume set is very simple, however a reboot will be required
The reboot will take longer than normal as the new area added has to be formatted to the same file system as the rest of the volume set. Note: Only NTFS Volume Sets can be extended. Q. How do I delete a Volume Set? A. When you delete a volume set all the data stored will be lost. To delete a volume set:
Q. What is the maximum number of characters a file can be? A. This depends on if the file is being created on a FAT or NTFS partition. The maximum file length on a NTFS partition is 256 characters, and 11 characters on FAT (8 character name, . , 3 character extension). NTFS filenames keep their case, whereas FAT filenames have no concept of case (however the case is ignored when performing a search etc on NTFS). There is the new VFAT which also has 256 character filenames. NTFS filenames can contain any characters, including spaces, uppercase/lowercase except for the following " * : / \ ? < > | which are reserved for NT, however the file name must start with a letter or number. VFAT filenames can also contain any characters except for the following / \ : | = ? " ; [ ] , ^ and once again the file name must start with a letter or number. NTFS and VFAT also creates a 8.3 format file name, see Q. How to LFN's work? Q. How can I stop chkdsk at boot time from checking volume x? A. When NT boots it performs a check on all volumes to see if the dirty bit is set, and if it is a full chkdsk /f is run. To stop NT performing this dirty bit check you can exclude certain drives. The reason you may want to do this is for some type of removable drive, e.g. Iomega drives:
Where x is the drive letter, e.g. if you wanted to stop the check on drive f: you would type autocheck autochk /k:f *. To stop the check on multiple volumes just enter the drive names one after another, e.g. to stop the check on e: and g: autocheck autochk /k:eg *, you do not retype the /k each time. If you are using NT 4.0 with Service Pack 2 or above, you can also use the CHKNTFS.EXE command which is also used to exclude drives from the check and updates the registry for you. The usage to disable a drive is chkntfs /x <drive letter>: To set the system back to checking all drives just type chkntfs /d Q. How can I compress files/directories from the command line? A. A utility is supplied with the resource kit called compact.exe which can be used to view and change the compression characteristics of a file/directory. Q. What protections can be set on files/directories on a NTFS partition? A. When you right click on a file in Explorer and select properties (or select Properties from the File menu) you are presented with a dialog box telling you information such as size, ownership etc. If the file/directory is on a NTFS partition there will be a security tab, and within that dialog, a permissions button. If you press that button you can grant access to users/groups on the resource at various levels. There are six basic permissions
These can be assigned to a resource, however they are grouped for ease of use
The permissions above can all be set on a directory, however this list is limited for a file, and permissions that can be set are only No Access, Read, Change and Full Control. Another permission exists called "Special Access" (on a directory there will be two, one for files, one for directories), and from this you can set which of the basic permissions should be assigned. Q. How can I take ownership of files? A. Sometimes you may want to take ownership of files/directories, usually as someone has removed all access on a resource and can't see it. You would log on as the Administrator and take ownership. You cannot give ownership to someone else using standard NT functionality, only take ownership.
Q. How can I view the permissions a user has on a file from the command line? A. A utility is supplied with the resource kit called perms.exe which can be used to view permissions on files/directories. The usage is perms <domain>\<user> <file> You can add /s to also show details of sub files/directories. The permissions shown equate to
To output to a file just add > filename.txt at the end, e.g. perms <user> <file> > file.txt Q. How can I tell the total amount of space used by a folder (including sub folders)? A. There are two ways of doing this (there are more!), one using explorer and one from the command line. Using Explorer
From the command line you can just use the dir command
with /s qualifier which also lists all sub-directories,
e.g. Q. There are files beginning with $ at the root of my NTFS drive, can I delete them? A. NO!!! These files hold the information of your NTFS volume. Below is a table of all the files used by the file system:
If you want to have a look at any of these files use the command dir /ah $mft Its basically impossible to delete these files anyway as you can't remove the hidden flag and if you can't remove the hidden flag you can't delete it! Q. What file system do Iomega ZIP disks use? A. By default, the formatted ZIP disks are FAT, however you can format these with NTFS is you want. NTFS has a higher overhead than FAT on small volumes (an initial 2MB) which is why you don't have NTFS on 1.44 floppy disks. Q. What cluster size does a FAT/NTFS partition use? A. The default cluster size for a FAT partition is as follows:
This is why FAT volumes larger than 511MB are not recommended due to the amount of potentially wasted space due to the 16KB and above cluster size. The default for NTFS is as follows:
NTFS better balances the trade off between disk defragmentation due to smaller cluster size and wasted space due to a large cluster size. When formatting a drive you can change the cluster size using the /a:<size> switch, e.g. format d: /a:1024 /fs:ntfs Q. How much free space do I need to convert a FAT partition to NTFS? A. The calculation below can be used for disks of a standard 512 bytes per sector:
To summarize: Free space needed = (<size of partition in bytes>/100) + (<size of partition in bytes>/803) + (<no of files & directories> * 1280) + 196096 For more information see Knowledge Base article Q156560 at http://support.microsoft.com/support/kb/articles/q156/5/60.asp Q. NT becomes unresponsive during an NTFS disk operation such as a dir. A. When you perform a large NTFS disk operation such as a dir/s *.* or a ntbackup :\*.* NT can sometimes become unresponsive because NT updates NTFS files with a last access stamp and if viewing thousands of files the NTFS log file can become full and waits to be flushed to the hard disk, this can cause NT to become unresponsive. To stop NTFS updating the last access stamp perform the following:
This should improve the performance of your NTFS partitions. Below is an example or a .reg file that can be used to automate this: REGEDIT4 Q. I have missing space on my NTFS partitions (Alternate Data Streams). A. Its possible to hide data from both explorer and the dir command within an NTFS file that you cannot see unless you know its stream name. NTFS allows multiple streams to a file in the form of <filename>:<stream name>, you can try it
You can have as many streams as you want. If you copy a file it keeps the streams, so copying normal.txt to john.txt, john.txt:hidden would exist. You cannot use streams from the command prompt as it does not allow : in files names except for drive letters. Microsoft provide no way of detecting or deleting these streams. The two ways to delete are
One application I have found to detect alternate data steams is by Frank Heyne and can be downloaded from http://www.heysoft.de/nt/ep-lads.htm. Alternatively you can use Lizp which is downloadable from http://www.lizp.com. I have not used it in earnest, however what I have seen looks very good. An example use would be Its also possible to write a function to enumerate every altstream in
every file matching c:\winnt\*. To do this, let's define a function, we'll
call it las, and it'll take one argument, the wild path. Then we could
type Here's such a function definition: (sequence (define (las Dir) (filter '(lambda (o) (cdr o) ) (mapcar '(lambda (FileInfo) (if (getfilesize (car FileInfo) ) (cons (car FileInfo) (getaltstreams (car FileInfo) ) ) (cons nil nil) ) ) (dirlist Dir) ) ) ) '(Enhanced with las) ) Even though you could type all this in at the prompt, on one long line, it's easier to save the code above to a file. Let's call the file las.lzp. Now, from the Lizp prompt, you could type (eval (load 'las.lzp)) and voila, you'll have a new function, las. Now try the thing above: (las 'c:\winnt\*) Suppose we think our Lizp should have this functionality always. Then type (Compile (load 'las.lzp) 'Lizp_with_las.exe true) and we'll have a new version of Lizp, called Lizp_with_las.exe. Finally, suppose we wanted a GUI application which asked us for the wild path, and then displayed the alternate streams in a window. Save the following lines to a file, let's call it las_gui.lzp: (local (Result) (setq Result (las (inputbox '((Wild path to check for Alt Streams)) ) ) ) (messagebox (if Result Result '((No Alt Streams found in path.)) ) ) (exit) ) Now, from Lizp_with_las' prompt, type (Compile (load 'las_gui.lzp) 'Las.exe nil and you'll have a new program, Las.exe, doing what we want. Note the last argument to the Compile function: the first time we compiled, we used "true", this last time we used "nil". This is because the first time we wanted the new program to create a console when run (because it was going to be our new Lizp interpreter). The second time we don't need a console. Another way to delete these streams is to edit them in notepad and delete all the text. When you quit notepad NT tells you that the file is empty and will be deleted and you only have to confirm. If you want to write your own programs to detect streams have a look at Basically the only reliable way of handling streams is to use the BackupRead() function. The only "problem" is that BackupRead() requires SeRestorePrivilege/SeBackupPrivilege rights which most users will not have BackupRead() actually does is to turn a file and its associated metadata (extended attributes, security data, alternate streams, links) into a stream of bytes. BackupWrite() converts it back. Q. How can I change the Volume ID of a disk? A. Windows NT provides functionality to change the volume name of a disk by using the command label <drive>: <label name> Windows NT does not provide built in functionality to change Volume ID's, however NT Internals has produced a free utility that can be downloaded from http://www.sysinternals.com/misc.htm called VolumeID which can change the volume ID of a FAT or NTFS volume. To view a drives current Volume ID you can just perform a dir <drive>: and the volume serial number is shown on the second line down, e.g. Volume in drive E is system volumeid <drive letter>: xxxx-xxxx Q. How do I read NTFS 5.0 partitions from Windows NT 4.0? A. Service Pack 4 includes a read/write driver for NTFS 5.0 volumes (an updated ntfs.sys driver). More details will follow once Service Pack 4 is released, the non-disclosure agreement limits me from saying any more. Q. How do share and file system protections interact? A. In general when you have protections on a share or on a file/directory the privileges are added, for example if user John was a member of 2 groups, one with read access and another with change the user would have read and change access. The exception to this if a group has "no access" which means no mater what other group memberships there are, any user in that group will have no access. The opposite is true when protections are set on the file system and on the share where the most restrictive policy is enforced, e.g. if the file has full control set for a user and the share only has read then the user will be limited to read-only privileges, likewise if the file had only read-only but the share had full the user would still be limited to read-only. Share protections are only used when the file system is accessed through a network connection, if the user is using the partition locally then the share protections will be ignored. Q. How can I backup/restore my Master Boot Record? A. The Windows NT Resource kit supplies a utility DISKSAVE.EXE which enables a binary image of the Master Boot Record (MBR) or Boot Sector to be saved. DISKSAVE has to be run from DOS and so you will need to create a bootable DOS disk and copy DISKSAVE.EXE to the disk. To create a DOS bootable disk just use the command C:\> format a: /s from a DOS machine (do not do it from a Windows NT command session). Once you boot with the disk you will have a number of options: F2 - Backup the Master Boot Record - This function will prompt for a path and filename to save the MBR image to. The path and filename are limited to 64 characters. The resulting file will be a binary image of the sector and will be 512 bytes in size. The MBR is always located at Cylinder 0, Side 0, Sector 1 of the boot disk. F3 - Restore Master Boot Record - This function will prompt for a path and filename for the previously save Master Boot Record file. The only error checking is for the file size (must be 512 bytes). Copying and incorrect file to the MBR will permanently destroy the partition table information. In addition, the machine will not boot without a valid MBR. The Path/filename is limited to 64 characters. F4 - Backup the Boot Sector - This function will prompt for a path and filename to save the Boot Sector image to. The path and filename are limited to 64 characters. The resulting file will be a binary image of the sector and will be 512 bytes in size. The function opens the partition table, searches for an active partition, then jumps to the starting location of that partition. The sector at that location is then saved under the filename the user entered. There are no checks to determine if the sector is a valid boot sector. F5 - Restore Boot Sector - This function will prompt for a path and filename for the previously save Boot Sector file. The only error checking is for the file size (must be 512 bytes). Copying and incorrect file to the Boot Sector will permanently destroy Boot Sector information. In addition, the machine will not boot without a valid Boot Sector. The Path/filename is limited to 64 characters. F6 - Disable FT on the Boot Drive - This function may be useful when Windows NT will not boot from a mirrored system drive. The function looks for the bootable (marked active) partition. It then checks to see if the SystemType byte has the high bit set. Windows NT sets the high bit of the SystemType byte if the partition is a member of a Fault Tolerant set. Disabling this bit has the same effect as breaking the mirror. There is no provision for re-enabling the bit once it has be disabled. Q. How do I convert an NTFS partition to NTFS 5.0? - NT 5.0 only A. Windows NT 5.0 introduces NTFS 5.0 which enables a number of new features. By default when you install Windows NT 5.0 it will automatically convert any NTFS 4.0 partitions to NTFS 5.0 (however this may change). Service Pack 4 has an updated NTFS.SYS which can read NTFS 5.0 partitions so apply this to any systems that need to read Windows 2000 NTFS 5.0 partitions. To check the version of an NTFS partition use the CHKNTFS.EXE utility. C:\> chkntfs <drive>: If the file system is not NTFS 5.0 and you want to upgrade it use the command C:\> chkntfs /e <drive>: The machine will need to be rebooted for the upgrade to take place. Q. I cannot compress files on an NTFS partition. A. If when you try and compress files on an NTFS partition using Explorer (right click on a file/directory, select properties and check the compress box) the option is not available or when you try from the command prompt using the command: C:\> compact /c ntfaq.txt /s you get the error "The file system does not support compression" the cause is normally that the cluster size of the NTFS partition is greater than 4096. To check the cluster size of your NTFS partition use the CHKDSK command, e.g. C:\> chkdsk <disk>: /i /c The /i /c are used to speed up the chkdsk and at the end of the display it will tell you the bytes in each allocation unit: 2048 bytes in each allocation
unit. If this number is greater than 4096 you will need to backup all the data on the disk and then reformat the partition using any of the following methods:
Once reformatted you can then restore your backed up data. To understand more about the 4,096 limit please read Knowledge base article Q171892 at http://support.microsoft.com/support/kb/articles/q171/8/92.asp Q. How can I modify the CHKDSK timer? A. Service Pack 4 introduces a new feature which before performing a chkdsk of a disk if its dirty bit is set a 30 second countdown timer is given allowing you to cancel to chkdsk from running. If you want to modify this 30 second value perform the following:
The change will take effect at the next reboot Q. How can I view the current owner of a file? A. The normal method would be to right click on the file in Explorer, select Properties, click the Security tab and click Ownership. This will then show the current owner and give the option to take ownership. To view from the command line you can use the SUBINACL.EXE utility that is shipped with the Windows NT Resource Kit Supplement 2. To view the current owner use as follows: C:\> subinacl /file <file name> You could perform on *.* to list owners for all files in all subdirectories (no need for any /s switch). Q. How can I view/defrag pagefile fragmentation? A. System Internals has released PageDefrag, a free utility that shows fragmentation in the pagefile and then offers the option of defragmentation at boot time. The utility can be downloaded from http://www.sysinternals.com/pagedfrg.htm. Once you download just unzip the file and run pagedfrg.exe. Below is a sample output. I understand that Executive Software's Diskeeper 4.0 can also defragment pagefiles however I have not seen it in action (http://www.diskeeper.com). Q. I get a disk maintenance message during setup. A. If during setup up get the message: Setup has performed maintenance on your hard disk(s) that requires a reboot to take effect. You must reboot and restart Setup to continue. Press F3 to reboot. This is returned when the Autochk part of the installation was able to repair the partition, but will require a reboot. For a FAT partition, this could include corruption of extended attributes was fixed, the dirty bit was cleared, orphaned long filename entry was fixed (or any other fixing of lfns), directory entry fixed, crosslinked files fixed, non-unique filename uniqued, or any other structural issues at all fixed. There will of course be other specific "fixing steps" that would cause this for NTFS, or other non-file system specific structures. In short this is not a problem as long as the setup does not get stuck in a loop keep running this stage. Q. Where is Disk Administrator in Windows 2000? - Windows 2000 only A. As with every other Administration tool in Windows 2000, Disk Administrator has been replaced with a Microsoft Management Console (MMC) snap-in. By default it is accessible via the Computer Management MMC snap-in
Alternatively create your own MMC console
You now have your own MMC with just the Disk Management. You could save by selecting "Save As" from the Console menu, enter "Disk Admin" as the name and click Save. You will now see under the Programs menu a new folder, My Administrative Tools with Disk Admin as a MMC snap-in. Q. How do I convert a basic disk to dynamic? - Windows 2000 only A. Windows 2000 introduces the idea of a dynamic disk needed for fault tolerant configurations. To convert perform the following:
Converting Basic disks to Dynamic disks don't require reboots - however any volumes contained on them after the conversion will generate a popup that basically says a re-boot is necessary before the volumes can be used. I generally say - NO, do not reboot - until all the volumes are identified and all the popups go away, then perform a single re-boot. When you upgrade from basic to dynamic any existing partitions become simple volumes. Any existing mirrored, striped or spanned volumes sets created with NT 4.0 become dynamic mirrored, striped or spanned volumes respectively. If you get a message that says you are out of space then you may not have enough unallocated free space at the end of the disk for the private region database that Dynamic disks use to keep volume information. To be Dynamic it needs about 1 MB of this space, sometime the space is not visible to the user in the GUI but it is still there. You may not have the space if the partition(s) on the disk take up the entire disk and were created with Setup, an earlier version of NT or another OS. If partitions are created within Windows 2000 the space is reserved, partitions created with Setup will reserve the space in a later release. To undo this conversion run Dmunroot.exe which will revert boot and system partition back to basic but all other volumes will be destroyed. Alternatively you should backup any data on the disk you wish to preserve, then delete all partitions - that should activate the menu choice "Revert to Basic Disk", the entire disk HAS to be unallocated or free space. Q. How do I delete a volume in Windows 2000? A. To delete a volume just perform the following, be warned you will lose any data on these volumes.
Q. How do I import a foreign volume in Windows 2000? A. If you take a disk from another machine and place in a Windows 2000 box it will be shown as foreign and its partitions not available, however its partition information can be imported and volumes used. Any volumes that were part of a set will be deleted during the import phase unless the whole set of disks are imported.
The data on the imported volumes will now be accessible (you have to refresh in Explorer to see them (press F5)). Q. How can I wipe the Master Boot Record? A. The normal method is using the DOS FDISK command: C:\> fdisk /mbr however there are some cases where this does not work and a more direct method may be needed. A program called DEBUG.EXE is supplied with DOS, Windows 9x and NT and can be used to run small Assembly language programs and just such a program can be used to wipe the MBR. Perform the following, but BE CAREFUL, this WILL wipe your MBR leaving your system unbootable and its data lost.
You can now install a replacement MBR via a normal installation. Thanks to Mark Minasi for giving permission to reproduce this Assembler code and a full explanation can be found in Windows NT Magazine Summer 1999 issue Q. How can I cancel a scheduled NTFS conversion? A. If you have scheduled a NTFS conversion for next reboot using the CONVERT command it can be canceled as follows:
Q. What is Distributed File System? A. Distributed File System (or Dfs) is a new tool for NT server that was not completed in time for inclusion as part of NT 4.0, but is now available for download. It basically allows Administrators to simulate a single server share environment that actually exists over several servers, basically a link to a share on another server that looks like a subdirectory of the main server. This allows a single view for all of the shares on your network, which could then simplify your backup procedures as you would just backup the root share, and Dfs would take care of actually gathering all the information from the other servers across the network. You do not have to have a single tree (Dfs directory structures are called trees), but rather could have a separate tree for different purposes, i.e. one for each department, but each tree could have exactly the same structure (sales, info. etc). For more information on DFS see http://www.microsoft.com/ntserver/nts/downloads/winfeatures/NTSDistrFile/AdminGuide.asp A. Dfs is available for download from Microsoft http://www.microsoft.com/ntserver/nts/downloads/winfeatures/NTSDistrFile/default.asp. Follow the instructions at the site and fill in the form about your site. The file you want for the I386 platform is dfs-v41-i386.exe. Once downloaded just double click on the file, and agree to the license. It will then install files to your drive which you need to install. A. Follow the instructions below, you must have first downloaded and expanded the file dfs-v40-i386.exe:
Q. How do I create a new folder as part of the Dfs? A. Once Dfs is installed a new application, the Dfs Administrator, is created in the Administrative Tools folder. This app should be used to manage Dfs. To add a new area as part of the Dfs tree follow the procedures below:
A. Follow the procedure below:
Q. How do I assign User Rights for a standalone server (not the PDC/BDC) in a domain? A. In NT Workstation, User Manager/Policies/User Rights... assigns the privileges (e.g. the Shutdown or Log On Locally privilege) for the local machine. However, in NT Server the User Rights you assign with User Manager for Domains affect the Domain Controller(s). To modify privileges for the local machine, first choose Select Domain... from the User menu, and type in the name of the computer at the Domain prompt (you cannot browse the domain). Q. I can't FTP to my server, although the FTP service is running? A. Have you unchecked the "Allow only anonymous connections" option, but still receive a "530 User xyz cannot log in. Login failed." message? To log on to the FTP server with your domain account, it is not sufficient to specify your name at the User prompt. The FTP service checks local accounts only, even if the computer is participating in a domain. Use domainname\username instead, e.g. if the domain name was savilltech and the user was john, enter savilltech\john as the username. Q. How do I validate my NT Logon against a UNIX account? A. There is software to do this available at
Q. Can I synchronize the time of a NT Workstation with a NT Server? A. Yes, enter the command NET TIME \\<name of the server to set time to> /SET /YES Please note that users will require "Change System Time" user right, via User Manager\User rights. There is a utility on the resource kit called TimeServ which runs the time synchronization as a service and works even when there are no logged on users. Also see Q. How do I configure a user so it can change the system time? Q. How can I send a message to all users? A. Ensure the "Messenger" service is started
(Control Panel - Services - Messenger - Auto). To send a message type: There are also various GUI utilities, and one of the best is NT Hail at http://www.geocities.com/SiliconValley/Bay/1999/NT_Hail.html Q. How do I change a Workstations Name? A. Follow the steps below
Q. How do I stop the default admin shares from being created? A. This can be done through the registry.
This can also be done using the policy editor. Start the policy editor (poledit.exe), load the default computer profile, and expand the Windows NT Network tree, then Sharing and set "Create hidden drive shares" to blank for server/workstation. There are a few other options though. The first is to use NTFS and set
protections on the files so people may be able to connect to the share,
but they will not be able to see anything. The second is to delete the
shares each time you logon, this can be done through explorer, but it
would be better to have a command file run each time with the lines Q. How do I disconnect all network drives? A. Use net use * /del /yes Q. How do I hide a machine from Network Browsers? A. Using the registry editor set the key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters and set value Hidden from 0 to 1. You should then reboot. You can also type net config server /hidden:yes You can still connect to the computer, but it is not displayed on the browser. A. NT does not support remote boot. It is possible to reboot a machine from another computer using the Shutdown Manager that comes with the NT resource kit. You could also reboot by using the shutdown.exe resource kit utility and specify another machine name. C:\>shutdown \\<machine name> /r /y /c Software such as PC Anywhere can also remotely reboot machines. Q. How can I get a list of users currently logged on? A. Use the net sessions command, however this will only work if you are an Administrator. You can also use control panel and choose server. The resource kit utility, Net Watch, can also show current logged on users that are connected to the Netlogon share if you connect to the domain controller, however these connects terminate after a finite amount of time so will not necessarily show all users. Q. How do I configure NT to be a gateway to an ISP? A. Firstly the hardware required would be a network and a modem. The network card would be so the other clients in the network can communicate with the "to be" gateway, and the modem to connect to the gateway. Dial-up networking is not covered here, and you should first be confident with dial-up networking before attempting this.
This would enable the machines to send out IP packets to the internet, however the packets would have no way of finding there way back, as the ISP would not know to route them through the gateway, so you ISP will have to either a) have host entries for each of the machines or b) point to the gateway as another DNS. Other things to check are as follows:
Have a look at http://support.microsoft.com/support/ntserver/serviceware/nts40/e9mslcs1z.asp for more information. Q. How do I install the FTP server service? A. In prior version of NT, the FTP server service was installed as part of TCP/IP, however as of NT 4.0, it became part of IIS/PWS, so it needs to be installed manually. Before you install the FTP server, TCP/IP must be installed.
Q. How do I get a list of all connections to my PC? A. Use the command netstat -a Q. How can I get the Ethernet address of my Network card? A. Type ipconfig /all from a command box. Q. How can I configure the preferred Master Browser? A. On the NT server you want to be the preferred master browser change the registry setting HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Browser\Parameters\IsDomainMaster to True Q. Is it possible to protect against Telnet attacks? A. There was a recent well-known problem that a telnet client could connect to an NT machine on port 135, type 10 characters and it would hang NT. There is no simple way to protect NT from a certain port attack. It is possible to configure NT to only accept incoming packets from a set of configured ports, however you have to name the ports you want to accept input from:
To protect against the port 135 attack, install the RPC hotfix for Service Pack 2. Service Pack 3 and some its Hotfixes are also highly desirable, and address a number of Internet attack methods. Q. What Telnet Servers/Daemons are available for Windows NT? A. A Telnet Server on NT allows connection to an NT machine using a Telnet client from any hardware platform. Products are available from:
Q. How do I install MSN under NT? A. The new MSN 2.0 only runs under Windows 95, however a version for NT 4.0 is being developed. In the mean time it is possible to use MSN to connect to the Internet, however you cannot read Mail
Q. What FireWall products are available for NT? A. Below are a selection of FireWall systems for NT:
Q. How do I install the Remoteboot Service? A. Before installing the Remoteboot service you must have both the NetBEUI and DLC protocols installed. The remoteboot service will only run on NT server.
Q. How many connections can NT have? A. NT workstation can have up to 10 concurrent connections, with one exception, Peer Web Services which allows unlimited concurrent connections. Q. How can I secure a server that will be a Web Server on the Internet? A. Below are points to be aware of
Q. How can I stop a user logging on more than once? A. There is no way in NT to stop a user logging on more than once, however it is possible to restrict a workstation so that only a certain user can login, and with this method each user would be tied to one workstation and thus could only logon once.
This solution is far from ideal, and it may be plausible to write a login script that checked if a user was currently logged on and if so, logoff straight away (using the logout command line tool). Q. How can I get information about my domain account? A. From the command prompt type net user <username> /domain And all your user information will be displayed including last logon time, password change etc. Q. A machine is shown as Inactive in Server manager when it is not. A. Sometimes Server Manager fails to see a machine has
become active, you can attempt to force it to see the machine by typing Q. How do I automatically FTP using NT? A. I use a basic script to update my main site and the mirrors using two batch files. The first consists of a few lines: d: The -i suppresses the prompt when performing a multiple put, and the -s defines an input file for the FTP like: open ftp.savilltech.com - the name of the FTP
server Q. How can I change the time period used for displaying the password expiration message? A. Follow Instructions below:
Q. How can I modify share permissions from the command line? A. The Windows NT resource kit ships with a utility called RMTSHARE.EXE that is used to modify permissions on shares, the syntax to grant access to a share is as follows rmtshare \\<server name>\<share> /grant <username>:<permission>,
e.g. Valid permissions are f for full, r for read, c for change and n for none. To revoke access to a share type rmtshare \\<server name>\<share> /grant <username>,
e.g. This would remove savillj's access to the share. To view share permissions enter: rmtshare \\<server name>\<share> /users, e.g. RMTSHARE.EXE also allows the creation and deletion of shares. Type rmtshare /? for help. Q. How can I change the protocol binding order? A. Network bindings are links that enable communication between the network adapter(s), protocols and services. If you have multiple protocols installed on a machine you can configure NT to try a certain protocol first for communication:
Q. What criteria are used to decide which machine will be the Master Browser? A. There are 5 roles a machine can have
When an election takes place, a number or criteria are used. Firstly the browser type
If two machines have the same role then the operating system is used
If there is still a tie, the Windows NT version is used
To set a machine as a certain type of browser perform the following
Q. How can I get a list of MAC to IP addresses on the network? A. An easy way to get a list of MAC to IP addresses on the local subnet is to ping every host on the subnet and then check you ARP cache, however pinging every individual node would take ages and the entries only stay in the ARP cache for 2 minutes. An alternative is to ping the broadcast mask of your subnet which will ping every host on the local subnet (you can't ping the entire network as you only communicate directly with nodes on the same subnet, all other requests are via the gateway so you would just get a ARP entry for the gateway). What is the broadcast mask? The broadcast mask is easy to calculate if the subnet mask is in the format 255.255.255.0 or 255.255.0.0 etc. (multiples of 8 bits). For example if the IP address was 134.189.23.42 and the subnet mask was 255.255.0.0 the broadcast mask would be 134.189.255.255, where 255 is in the subnet mask the number from the IP address is copied over, where 0 it is replaced with 255, basically the network id part is kept. If the subnet mask is not the basic 255.255 format, you should use the following, all you need is the IP address and the subnet mask
for example, IP address 158.234.24.98 and subnet mask 255.255.248.0
The first row is the subnet mask 255.255.248.0, the second row the IP address 158.234.24.98 and the third row is the broadcast mask, 158.234.31.255. To get the MAC to IP addresses, you would therefore perform the following ping <broadcast mask> Voila, a list of IP addresses and their MAC address (you can add > filename to get the list to a file, e.g. arp -a > iptomac.lst). You could repeat this exercise on the various subnets of your organization. Unfortunatly due to limitations in NT's implementation of PING the above will not work correctly so put the following into a file REM arpping.bat You can then call the batch file as follows: C:\> for /l %i in (1,1,254) do arpping 160.82.220 %i In this case it would generate a list of all MAC to IP addresses for 160.82.220.1 to 160.82.220.254. Again you could put this all in a file, redirect to a file and then search, e.g. REM test.bat Notice you have to use two %%. You could run as C:\> test.bat > file.txt Then search listing.txt for (example) dynamic C:\> findstr dynamic file.txt Q. How can I control the list of connections shown when mapping a network drive? A. When you map a network drive (Explorer - Tools - Map network drive), if you click the down arrow on the path, a list of previous connections will be shown. These are stored on the registry and can be edited
Q. How do I grant users access to a network printer? A. The same way as files have security information, so do printers, and you need to set which users can perform actions on each network printer
Q. How can I create a share on another machine over the network? A. From a Windows NT Server machine a share can be created by opening Server Manager, highlight the target system, select Computer, Shared Directories, and click on New Share. The Windows NT Resource kit comes with a utility called RMTSHARE.EXE and this can be used to create shares on other machines providing you have sufficient privilege. The basic syntax is as follows rmtshare \\<computer name>\"<share name to be
created>"="<path>" /remark="<share
description>" You only need to use double quotes around the share to be created and the path if there are spaces in the share/file name, e.g. if the share was to be called misc files instead of miscfiles it would have to be in quotes, e.g. rmtshare \\savillmain\"misc files"="d:\my files\misc" /remark="With space share" There is also a wizard to share and administer your NT server c:\%systemroot%\system32\wizmgr.exe. Q. I get errors accessing a Windows NT FTP Server from a non Internet Explorer browser. A. If you run the Microsoft FTP Server Service then you may find problems accessing an area other than the root from a non Internet Explorer browser. This is because most other FTP Servers use the UNIX type naming conventions and that is what browsers such as Netscape expect, however the Microsoft FTP service outputs using dos naming conventions. This can be resolved by forcing the FTP server service to use Unix conventions rather than dos
You will need to stop and start the FTP server service for this change to take effect (Start - Settings - Control Panel - Services - FTP Service - stop - start) Q. How can I view which machines are acting as browse masters? A. There are 2 utilities shipped with the NT resource kit (one GUI, on command line) which can be used to view current browse master status. BROWMON.EXE - Select from the Diagnostics Resource Kit menu. The master browser will then be displayed for each domain. Double clicking on a machine will then list the other machines that are browsers and a subsequent double click on these machines will tell their status, e.g. backup browser. BROWSTAT.EXE - Start a command session. There are a
number of commands that can be used, however to get a general view enter
the command As can be seen the master browser name is shown, as are backup servers. Q. Is there any way to improve the performance of my modem internet connection? A. By default, NT will use a Maximum Transmission Unit (MTU) (packet size) over the path to a remote host of 576. Problems can arise if the data is sent over routes etc that cannot handle data of this size and the packets get fragmented. The parameter EnablePMTUDiscovery set to 1 forces NT to discover the maximum MTU of all connections that are not on the local subnet. To change this perform the following:
By discovering the Path MTU and limiting TCP segments to this size, TCP can eliminate fragmentation at routers along the path that connect networks with different MTUs. Fragmentation adversely affects TCP throughput and network congestion. Q. How can I remotely tell who is logged on at a machine? A. The easiest way to do this is to use the NBTSTAT command. There are two ways to use this command depending on if you know the machines name or just its IP address. If you know the machines name enter the command nbtstat -a <machine name> The output will be of the format: NetBIOS Remote Machine Name Table The user name is the <03>. If you only know the IP address use the command nbtstat -A <IP address> The output is the same and notice we just use a capital A instead of a lowercase a. This will only work if the remote machine in question is running it's messenger service, otherwise the username is not returned. Q. How do I remove a NT computer from a domain? A. The first way would be to logon to the machine you wish to remove from the domain and start the Network Control Panel Applet (Start - Settings - Control Panel - Network or just right click on Network Neighborhood and select properties). Select the Identification tab and click Change. Just enter a different domain or workgroup, you will receive a notice welcoming you to the new domain/workgroup. The problem with this is the machine can still rejoin the domain as its account has not been removed from the domain. To actually remove the computer account from the domain perform the following:
Alternatively you can remove a computer from the command line using the Resource Kit utility NETDOM netdom /Domain:<domain> MEMBER <machine name>
/delete You can use this command from any machine workstation or server as long as you are logged on as an administrator. When you enter the command it will find the PDC and delete, the output is as follows: Searching PDC for domain SAVILLTECH ... Q. How can I shutdown a number of machines without going to each machine? A. I have a number of machines setup in my Lab and at the end of an entertaining evening of computing I don't want to have to goto each machine and shut them down so I wrote a small batch file that uses the shutdown.exe resource kit utility. Just enter the following into a file with a .bat extension: rem Batch file to shutdown local machine and the PDC, BDC You can then just right click the file in explorer and drag onto the desktop, release and select "Create shortcut". Clicking this icon will then shutdown all the machines in the file. Q. How can I close all network sessions/connections? A. The command below will close all network sessions net session /delete Q. How can I connect to a server using different user accounts? A. It is possible to specify a user account to use when connecting to a share using the /user switch, e.g. C:\> net use k: \\server\share /user:domain\user If you then attempt to connect to the server again with a different username an error will be given. A workaround is to connect to the server using its IP address rather than its NetBIOS name, e.g. C:\> net use l: \\<ip address>\share /user:domain\user Q. How do I set the comment for my machine that is displayed in Network Neighborhood? A. There are 3 ways to set this, from the command line, edit the registry or via the GUI. The easiest way is via the Server control panel applet
An alternative method is from the command prompt using the "net config" command. C:\> net config server /srvcomment:"machine comment" Note that even if you are performing this on a workstation machine you still use "net config server" as this is a configuration on the server service of the machine. Both of the methods shown update a single registry value so this can also be edited directly.
You can remotely change the comment of other machines by using the NT Server utility "Server Manager". Double click on a machine and you will then be presented with the same dialog box as with the Server control panel applet. This has the advantage of allowing the Administrator to set a common description format. Q. How can I define multiple NetBIOS names for a machine? A. This would be useful if, for instance, you wanted to migrate a number of shares to a different machine and rather than having to switch all clients to the new machine instantly you could define the new machine to also answer to the old machines NetBIOS name and then slowly migrate the machines. To define extra names for a machine perform the following:
There is bug when using multiple NetBIOS names on print servers, see 'Q. The additional NetBIOS name of my server does not work for print services.' Q. How can I manage my NT domain over the net? A. Microsoft have released "Web Administrator 2.0 for Microsoft Windows NT Server" which allows you to use to manager the following via the web
The additional software required has to be installed on a server (though it does not have to be a domain controller) with
Internet Information Server 4.0 is available as part of Option Pack 4 which can be obtained from http://www.microsoft.com/windows/downloads/contents/updates/nt40ptpk/default.asp or as part of MSDN. Option Pack 4 has its own requirement that Internet Explorer 4.0 be installed. Once all the software is installed you can download the Web Admin tools from http://www.microsoft.com/ntserver/nts/downloads/management/NTSWebAdmin/default.asp To begin the installation just execute the required executable and the installation wizard will begin. Once the installation is complete you will be able to administer your domain by connecting to http://<the server name>/ntadmin/default.asp. For example if I had installed the software on titanic in the savilltech.com I would connect to http://titanic.savilltech.com/ntadmin/default.asp. You will need Internet Explorer 4.0 or above to use the site and once connected you can perform a number of options. Below is an example of viewing/changing users. Q. How can I remotely manage services? A. The Windows NT Resource kit has two utilities, SC.EXE and NETSVC.EXE, which allow remote services to be managed. The resource kit has help on both on these but we will only look at NETSVC.EXE. To view the services on a remote machine use C:\> netsvc /query \\<server name> /list To see the current state of a service use C:\> netsvc <service name> \\<server> /query You can then modify the state of the service using the /start, /stop, /pause and /continue switches, e.g. C:\> netsvc <service name> \\<server> /stop A. Below is a summary of all the net.exe usage methods. net accounts Used to modify user accounts. Specified on its own will give information about the current logon. Options:
net computer Used to add and remove computer accounts from the domain. Options:
net config server Allows modifications to the server service. Entered with no parameters give details of the current configuration Options:
net config workstation Allows modifications to the workstation service. Entered with no parameters give details of the current configuration Options:
net continue <service name> Restarts the specified paused service. net file Lists any files that are open/locked via a network share. Options:
See Q. How can I tell who has which files open on a machine? for more details. net group Adds/modifies global groups on servers. Without parameters will list global groups. Syntax: net group <group name> [/command:"<text>"]
[/domain] Options:
net localgroup Performs actions on local groups. Same parameters as net group. net name Adds/removes a name to which messaging may be directed to. Running the command on its own will list all messaging names eligible on the machine. Options:
net pause <service name> Used to pause a service from the command line. net print Used to list/modify print jobs. Options:
net send Sends a message to a computer, user or messaging name. Options:
net session Lists or disconnects sessions. Used with no options lists the current sessions. Options:
net share Used to manage shares from the command line. Syntax: net share <sharename>=<drive>:\<directory>
[/users=<number> or /unlimited] [/remark:"text"] Options:
net start <service name> Start the specified service net statistics [workstation or service] Gives information about either the server or workstation service. net stop <service name> Stops the specified service net time Used to synchronize the time of a computer. Options:
net use Connects or disconnects to a network share. Used with no qualifiers lists the current network mappings. Syntax: net use <device name> or * \\<computer name>\<share name>
[password or *] [/user:[domain\user] /delete or [persistent:[yes or no]] Options:
net user Used to add/create/modify user accounts Syntax: net user <username> [password or *] [/add] [options] [/domain]
net view Lists shared resources on a domain. Used with no parameters lists all machine accounts in a domain. Options:
Q. How can I make net.exe use the next available drive letter? A. The normal syntax to map a network drive is C:\> net use <drive letter>: \\<server>\<share> however this can be modified to C:\> net use * \\<server>\<share> which will make the net use command utilize the next available drive letter. Q. How can I check if servers can communicate via RPC's? A. Exchange ships with RPINGS.EXE and RPINGC32.EXE which can be used to test RPC communication between two servers. These programs are located in the SERVER\SUPPORT\RPCPING directory of the Exchange CD. Test as follows:
The connection will then be checked. Once complete close the RPINGC32.EXE utility by clicking Exit and on the target machine enter the sequence '@q'. Below is an example of a successful test. Q. How can I reduce the delay when using multiple redirectors? A. The MUP (Multiple UNC Provider) first establishes whether Distributed File System (Dfs) is in use and passes the request to DFS. The delays come from two locations:
Depending on the number of redirectors, protocols, and timer configurations for connectivity, these delays can exceed 13 seconds for each initial connection. Service Pack 4 for Windows NT 4.0 has introduced an updated MUP.SYS giving better performance and a new registry entry which may speed up the initial connect to non-Windows UNC resources, DisableDFS. Perform the following change on each client:
Setting the DisableDFS value to 0 or deleting will set the machine back to its old behaviour. If you have the Novell IntranetWare client also installed you must also perform the following before rebooting:
Knowledge base article Q171386 at http://support.microsoft.com/support/kb/articles/q171/3/86.asp has more information on this. Q. How can a DOS machine connect to an NT domain? A. Microsoft provide software to enable a DOS machine to participate on a network using a variety of protocols and to connect to a Windows NT domain. NT Server ships with the "Network Client Administrator" which allows the creation of an installation disk set or a disk to allow Network based installation of a variety of clients, including a network client for DOS. 'Q. How do I install NT over the network?' has an example of creating a network installation disk, instead we will concentrate on creating an installation disk set.
To install on a DOS machine you perform the following:
When the machine reboots it will load all the network and protocol drivers and then attempt to logon to the network by issuing the net start command. You will then be asked for a username and password: Type your user name, or press ENTER if it is ADMINISTRATOR: You will be asked if you want to create a password file. If you select yes then you will no longer be asked for a password at start-up time, like an auto-logon but be aware it means anyone accessing your computer can logon as you. Q. What is the Active Directory? A. The Active Directory is Microsoft's implementation of a 'Directory Service' and a directory service is basically something that stores data in an organized format and has the mechanisms needed to publish and access the data. Active Directory is not a Microsoft innovation, but rather an implementation of an existing model (X.500), an existing communication mechanism (LDAP) and an existing location technology (DNS), and each of these are covered in the FAQ. Before the details of Active Directory are considered, it is important to have an overview of what it is trying to achieve. A directory in its most basic sense is just a container for other information, such as a telephone directory has various entries, and each entry has values. An example would be a name, address and telephone number that would make up a single entry in the directory. Name: John Savill In a large directory these entries may be grouped by location or by their type, e.g. lawyers, pest control, etc, or both which would lead to a hierarchy of each type of person in each location. The actual telephone directory would be a directory service as it contains not only the data but also a means to access and use it. The telephone operator would also constitute a directory service as it has access to the data and presents it to you where you can request data and an answer to your query is given. Active Directory is a type of Directory Service, it holds information about all resources on the network and clients can query the Active Directory for information about any aspect of the network. Active Directory has a number of powerful features:
The last point regarding partitioning the information in the Directory into different stores does not mean that the Active Directory cannot be queried for information from other domains. Each domain maintains a list of other domains, the location of the global catalog for each of these domains and the Schema of the domain. Q. A number of Active Directory descriptions. A. Below are some definitions for the active directory: ONE SENTENCE SUMMARY OF DNS AND ACTIVE DIRECTORY: A dns server is used by a client to provide the address of the client's nearest domain controller, which has a copy of Active Directory, which the client then uses to locate whatever object it's looking for. ONE PARAGRAPH SUMMARY OF DNS AND ACTIVE DIRECTORY: First a client contacts a dns (domain name system) server which looks up the client's domain, and provides him with the address of the closest dc in that domain. The client proceeds to contact the dc which can then authenticate him. Once authenticated, the client can search Active Directory (a database on the dc) to find objects the client is looking for, like an address for mail, a file, printer, or list of users in a group, etc. If the client cannot contact a dns server, it won't be able to find its domain controller, since only the dns server has the address of it. ONE PAGE SUMMARY OF DNS AND ACTIVE DIRECTORY: When dcpromo is performed on a W2K machine named, say, "fido" for the first time creating a new domain, say, "narnia", dcpromo creates two different kinds of "domains". First it creates a domain on the dns server, in our example: "narnia.extest.microsoft.com". This will be found on the extest dns servers, which are in exlab's minilab in bldg 43. Exlab maintains these as community dns servers to save testers the trouble of installing a dns server every time they want to install W2K. Simplified a little, the dns domain on the extest master dns servers looks like this: extest.microsoft.com Clients contact the dns server and it looks up the client's domain. Looking for "narnia" the dns server also discovers "bigthud" and "blackie", both dc's of "narnia". Let's say "bigthud" is the closest dc to the client. The dns server would send the client the address of the dc "bigthud", namely, 172.30.224.34. The client connects and accesses the Active Directory domain database stored on "bigthud" to find objects (like printers, file servers, users, groups, organizational units, etc) in the "narnia" domain. "bigthud" also stores links to other domains in the tree "com". Thus, the client can search a whole tree of domains. If the search needs to go beyond the client's tree of domains, then a version of Active Directory listing the objects in the whole forest is also available. It is called the Global Catalog. The GC can be kept on any dcs in the forest you may choose, or all, but it does not have to be kept on all. GC is a shorthand way to access an object ANYWHERE in the forest, but it only provides a few of its attributes, you have to go to the domain AD (always on a dc in that domain) to get the whole object. The GC can be configured to provide whatever object attributes you choose, too, not just a rigid default set of them. To help in creating objects in AD, the dc also keeps a copy of the classes and hierarchy of classes for the whole forest, too. For example, if we had a class of "baseball players", and a derived class "pitchers" (which is just a player with a few records added of strikeouts and no-hitters, etc) then the class structure would be kept in AD in the part called the "Schema". If we then created an actual group of players we would use our Schema classes to make the players as objects (instances of the classes) in Active Directory. We can also add more classes, eg: "football players" and "quarterbacks" to the Schema, and we call that freedom an "extensible Schema". The schema is a part of the W2K "configuration namespace" kept on all dcs in a forest. A namespace is a range of labels you put on things, eg: a supermarket "aisle" namespace: aisle=cookies, shelf=top, item=oreo. The configuration namespace in W2K consists of a number of defined items such as physical locations, W2k "sites" (a site is a child of a forest, and can contain machines from any domain, only condition being that all machines in a site have fast reliable net connections for dc replication), and "subnets" which are IP address groupings assigned to sites which help further speed up AD replication amongst dc's, eg: "your dc rocks if it's in the IP subnet and W2K site where its friends are". Active Directory employs LDAP (Lightweight Directory Access Protocol, a standard Internet protocol that many applications use) to access its records. Why? Because its records are STORED on the dc in "LDAP distinguished name format". But what is LDAP distinguished name format? In the following LDAP distinguished name format example "fred" is a user in the "programming" organizational unit in "narnia" domain in "extest" domain in "microsoft" domain in "com" domain: cn=fred,ou=programming,dc=narnia,dc=extest,dc=microsoft,dc=com where cn stands for common name, ou stands for organizational unit, and dc in this case stands for "domain component", NOT domain controller. This is how "fred" appears in Active Directory, and a client such as an administrator can access attributes about fred using that syntax, assuming the client has security permissions to do so. The client's actions are straightforward, as long as the client talks LDAP to Active Directory. However, an action may be done from a client running an application that uses a different name format. To support this, there are two other name formats that can be used (with a little translating) to access Active Directory: 1. "LDAP URL": 2. "Active Directory Canonical name": A. X.500 is the most common protocol that is used for Directory Management and there are currently 2 main standards, the 1988 and 1993 standards with the 1993 standard providing a number of advances over the older standard. The Windows NT 5.0 implementation of its Directory Services is derived from the 1993 X.500 standard as described below. The X.500 model uses a hierarchical approach to the objects in the name space with a root at the top of the namespace with children coming off of it. Domains in Windows 2000 are DNS names, for example savilltech.com is a domain name, legal.savilltech.com is a child domain of savilltech.com. Child domains are covered elsewhere. The example shows a root of the directory service and then a number of children. In this case the first layer or children represent countries, however there are no rules and you may break these down however you want. Imagine each country as a child domain of the root, for example usa.root.com and england.root.com. Each child domain can then be broken into a number of organizations. These organizations can be broken down further into organizational units and various privileges/policies can be applied to each Organization unit. Each Organizational Unit has a number of objects such as users, computers, groups etc. While the directory service is based on X.500, the access mechanism actually uses LDAP (Lightweight Directory Access Protocol) which solves a number of problems with X.500. X.500 is part of the OSI model however this does not translate well into a TCP/IP protocol environment so LDAP uses TCP/IP for its communication medium. LDAP cuts down on the functions available with a full X.500 implementation making a leaner faster directory service while keeping the overall structure of X.500. LDAP is actually the mechanism used to communicate with the Active Directory and performs basic read, write, and modify operations. More on X.500 can be found at http://www.salford.ac.uk/its024/X500.htm Q. What is the Global Catalog? A. The Global Catalog contains an entry for every object in the enterprise forest (the term forest is explained later) but contains only a few properties of each object. The entire forest shares a global catalog with multiple servers holding copies. Searches in the whole enterprise forest can only be done on the properties in the Catalog where as searches in the users own domain tree can be for any property. Only Directory Services (or Domain Controllers) can be configured to hold a copy of the Global Catalog. Do not configure to many global catalogs in each domain, as you will waste network bandwidth with the replication. One global catalog server per domain in each physical location is sufficient, however NT will set servers as Global Catalogs as it thinks are necessary so there should be no need for you to modify this unless you notice slow query response times. Since full searches involve querying the whole domain tree rather that the global catalog, grouping the enterprise into a single tree will improve your searches as it will allow you to query on items not in the global catalog, thus a larger search criteria. Q. How do I configure a server as a Global Catalog? A. To configure a Windows 2000 domain controller as a global catalog server perform the following:
A. The Schema is a blueprint of all objects in the domain and when first created a default Schema exists which contains definitions for users, computers, domains etc. Because of this, you can only have one schema per domain as you cannot have multiple definitions of the same object. The default schema definition is defined in the SCHEMA.INI file that also contains the initial structure for the NTDS.DIT (storage for the Directory data). This file is located in the %systemroot%\ntds directory. This file is a plain ASCII format file and can be typed out. You will also notice a file ntds.dit which is the storage location for the Active Directory. A. In Windows 2000 one domain can be a child of another domain, e.g. child.domain.com is a child of domain.com (a child domain always has the complete domain name of the parent in it), and a child domain and its parent share a two way transitive trust. When you have a domain as a child of another, a domain tree is formed. A domain tree has to have a contiguous name space.
The name of the tree is the root domain name, so in the example the tree would be referred to as root.com. Since the domains are DNS names and inherit the parent part of the name, if a part of the tree is renamed, then all of its children will implicitly also be renamed, for example if parent ntfaq.com of sales.ntfaq.com was renamed to backoffice.com the child would be renamed to sales.backoffice.com. This is not actually currently possible though. Domain trees can currently only be created during the server to Domain Controller promotion process with DCPROMO.EXE, this may change in the future. There are a number of advantages in placing domains in a tree. The first and most useful is that all members of a tree have kerberos transitive trusts with its parent and all its children. These transitive trusts also mean that any user or group in a domain tree can be granted access to any object in the entire tree. This also means that a single network logon can be used at any workstation in the domain tree. A. You may have a number of separate domain trees in your organization that you would like to share resources and this can be accomplished by joining trees to form a forest. A forest is a collection of trees that do not have to form a contiguous name space (however each tree still has to be contiguous). This may be useful if your company has multiple root dns addresses. As can be seen from the example, the two root domains are joined via a transitive, two-way Kerberos trusts as in the trust created between a child and its parent. Forests always contain the entire domain tree of each domain and it is not possible to create a forest containing only parts of a domain tree. Forests are created during the server to Domain Controller promotion process with DCPROMO and can currently not be created at any other time, this will change in the next version. You are not limited to only 2 domain trees in a forest, you can add as many trees as you want and all domains within the forest will be able to grant access to objects for any user within the forest. Again this cuts back on having to manually manage the trust relationships. The effect of creating a forest is the following:
You may of course choose not to join trees to become a forest and may instead create normal trusts between individual elements of the tree's. A. Windows NT 4.0 trust relationships are not transitive so if domain2 trusts domain1, and domain3 trusts domain2, domain3 does not trust domain1. This is not the case with the trust relationships used to connect members of a tree/forest in Windows 2000, trust relationships used in a tree are two-way, transitive Kerberos trusts which means any domain in a tree implicitly trusts every other domain in the tree/forest. This removes the need for time-consuming administration of the trusts as they are created automatically when a domain joins a tree. Kerberos is the primary security protocol for Windows NT. Kerberos verifies both the identity of the user and the integrity of the session data. The Kerberos services are installed on each domain controller, and a Kerberos client is installed on each Windows NT workstation and server. A user's initial Kerberos authentication provides the user a single logon to enterprise resources. Kerberos is not a Microsoft protocol and is based on version 5.0 of Kerberos. For more information see IETF RFCs (Requests For Comments) 1510 and 1964. These documents are available on the web from http://www.isi.edu/rfc-editor/rfc.html. Q. How do I create a new Active Directory Site? A. Active Directory has the concept of sites which can be used to group servers into containers which mirror the physical topology of your network, and allow you to configure replication between domain controllers (among other things). A number of TCP/IP subnets can also be mapped to sites which the allow new servers to automatically join the correct site depending on their IP address and for clients to easily find a domain controller closest to them. When you create the first domain controller a default site, Default-First-Site-Name is created to which the domain controller is assigned. Subsequent domain controllers are also added to this site however they can then be moved. This site can be renamed if you wish. Sites are administered and created using the "Active Directory Sites and Services Manager" MMC snap-in. To create a new site perform the following:
Now the site is created you can assign various IP subnets to it as follows:
You now have a subnet linked to a site. You can assign multiple subnets to a site if you wish. If you are confused about the bits masked in the subnet name it can be between 22 and 32 and is just the number of bits set in the subnet mask. The subnet mask is made up of 4 sets of 8 bits. To convert the subnet mask to bits you can use the illustration below. Therefore the subnet mask 255.255.255.0 would be 11111111.11111111.11111111.00000000 in binary which therefore uses 8+8+8 bits (24) to define the subnet mask. A subnet mask of 255.255.252.0 would be 11111111.11111111.11111100.00000000 which is 8+8+6 or 22. Q. How do I move a server to a different site? A. If your sites and subnets are configured then new servers will automatically get added to the site that owns the subnet however you can also manually move a server to a different site:
The move will take immediate effect. Q. How can a server belong to more than one site? A. By default a server will belong to one site however you may want to configure a server to belong to multiple sites. Bear in mind sites are used for replication, for clients to find resources and to cut down on traffic on inter-site connections so just modifying the site membership may cause performance problems. To configure a server to have multiple site membership perform the following:
The above does not create the objects in the Active Directory to evaluate the sites and these need to be added manually. Q. How can I backup the Active Directory/System State? A. The Active Directory is backed up using the NTBACKUP.EXE utility. The Active Directory is part of the machines System State which is defined as follows: For all Windows 2000 machines the System State includes the registry, class registration database and the system boot files. For a Windows 2000 Server that is a certificate server it also contains the Certificate Services database. Finally for a Windows 2000 machine that is a domain controller it includes the Active Directory and the SYSVOL directory also. To backup the System State using the Backup Wizard perform the following:
If you don't want to use the wizard it can be manually backed up as follows:
To backup only the System State from the command line use the command C:\> ntbackup backup systemstate /f d:\active.bkf Of course this is the most basic backup to file and you can use more complex options. Q. How can I restore the Active Directory? A. The Active Directory cannot be restored to a domain controller while the Directory Service is running so to restore perform the following:
The computer will boot into a special safe mode and will not start the Directory Service. Be warned that during this time the machine will not act as a domain controller and will perform not perform authentication etc.
Once you have restored the backup reboot the computer and start in normal mode to start using the restored information. You may find a hang after the restore has completed and I found a 30 minute wait on some machines. Q. What are the FSMO roles in Windows 2000? A. In Windows 2000 all domain controllers are equal and through a process known as multi-master replication changes are replicated to all domain controllers in the domain. However in keeping with George Orwell's Animal Farm some Domain Controllers are more equal than others. Multi-master replication resolves conflicts however in some situations it is better to stop the conflict before it happens and to this end there are five difference Flexible Single Master of Operations (FSMO) roles (formally known as Floating Single Master of Operations as the roles were originally going to be dynamically changeable) each managing an aspect of the domain/forest. These roles can be moved between domain controllers but not dynamically, they must be manually moved in the same manner as a BDC has to be manually promoted to a PDC. There are two types of roles, some are per domain, some are per forest. Only a domain controller in the domain can hold a domain specific FSMO role, any domain controller in the forest can hold a forest FSMO role. Domain controllers cannot hold FSMO roles in other domains/forests. These roles are assigned in different GUI ways or using the NTDSUTIL utility. The five roles are defined below:
Q. How can I change the RID master FSMO? A. The RID master is defined here. To modify the role perform the following:
This can also be accomplished using the NTDSUTIL.EXE utility. Enter the commands it bold C:\> ntdsutil Click Yes to the role transfer dialog Server "titanic" knows about 5 roles Schema - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Si
tes,CN=Configuration,DC=savilltech,DC=com Domain - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Si
tes,CN=Configuration,DC=savilltech,DC=com PDC - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Sites
,CN=Configuration,DC=savilltech,DC=com RID - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Sites
,CN=Configuration,DC=savilltech,DC=com Infrastructure - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Na
me,CN=Sites,CN=Configuration,DC=savilltech,DC=com Q. How can I change the PDC emulator FSMO? A. The PDC emulator is defined here. To modify the role perform the following:
This can also be accomplished using the NTDSUTIL.EXE utility. Enter the commands it bold C:\> ntdsutil Click Yes to the role transfer dialog Server "titanic" knows about 5 roles Schema - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Si
tes,CN=Configuration,DC=savilltech,DC=com Domain - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Si
tes,CN=Configuration,DC=savilltech,DC=com PDC - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Sites
,CN=Configuration,DC=savilltech,DC=com RID - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Sites
,CN=Configuration,DC=savilltech,DC=com Infrastructure - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Na
me,CN=Sites,CN=Configuration,DC=savilltech,DC=com Q. How can I change the Infrastructure master FSMO? A. The Infrastructure master is defined here. To modify the role perform the following:
This can also be accomplished using the NTDSUTIL.EXE utility. Enter the commands it bold C:\> ntdsutil Click Yes to the role transfer dialog Server "titanic" knows about 5 roles Schema - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Si
tes,CN=Configuration,DC=savilltech,DC=com Domain - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Si
tes,CN=Configuration,DC=savilltech,DC=com PDC - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Sites
,CN=Configuration,DC=savilltech,DC=com RID - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Sites
,CN=Configuration,DC=savilltech,DC=com Infrastructure - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Na
me,CN=Sites,CN=Configuration,DC=savilltech,DC=com Q. How can I change the Domain naming master FSMO? A. The Domain naming master is defined here. To modify the role perform the following however make sure the machine is a global catalog:
This can also be accomplished using the NTDSUTIL.EXE utility. Enter the commands it bold C:\> ntdsutil Click Yes to the role transfer dialog Server "titanic" knows about 5 roles Schema - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Si
tes,CN=Configuration,DC=savilltech,DC=com Domain - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Si
tes,CN=Configuration,DC=savilltech,DC=com PDC - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Sites
,CN=Configuration,DC=savilltech,DC=com RID - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Sites
,CN=Configuration,DC=savilltech,DC=com Infrastructure - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Na
me,CN=Sites,CN=Configuration,DC=savilltech,DC=com Q. How can I change the Schema master FSMO? A. The Schema master is defined here. To modify the role perform you must use the 'Active Directory Schema Manager' and you must first register the .dll for the MMC snap-in C:\> regsvr32 schmmgmt.dll You can now start the Schema Manager via the Resource Kit Tools console or by creating a custom MMC and add the Active Directory Schema snap-in to it (Start - Run - MMC - Console menu - Add/Remove Snap-in - Add - Active Directory Schema - Add - Close - OK)
To modify the role from the command line enter the commands in bold C:\> ntdsutil Click Yes to the role transfer dialog Server "titanic" knows about 5 roles Schema - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Si
tes,CN=Configuration,DC=savilltech,DC=com Domain - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Si
tes,CN=Configuration,DC=savilltech,DC=com PDC - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Sites
,CN=Configuration,DC=savilltech,DC=com RID - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Name,CN=Sites
,CN=Configuration,DC=savilltech,DC=com Infrastructure - CN=NTDS
Settings,CN=TITANIC,CN=Servers,CN=Default-First-Site-Na
me,CN=Sites,CN=Configuration,DC=savilltech,DC=com Q. What is Multi-master replication? A. In a Windows 2000 domain, all domain controllers are equal which means changes can be made on ANY domain controller and each servers complete domain directory has to be kept up-to-date with each other through a process of multi-master replication. Each time a change is made to the Active Directory the servers Update Sequence Number, or USN, where the change is implemented is incremented by one and this USN is also stored along with the change to the property of the object modified. These changes have to be replicated to all domain controllers in the domain and the Update Sequence Number provides the key to the multi-master replication. Update Sequence Number increments are atomic in operation which means that the increment to the USN and the actual change occurs simultaneously, if one part fails the whole change fails which means its not possible for a change to be made without the USN to be incremented, which means changes will never be "lost". Each domain controller keeps track of the highest USN's of the other domain controllers that it replicates with so it can calculate which changes it needs to be replicated on each replication cycle. At the start of the replication cycle each server checks its Update Sequence Number table and then queries the domain controllers it replicates with for their latest USN's. For example the table below represents the USN table for server A
Server A then queries the domain controllers for their current USN's and gets the following:
From this server A can calculate the changes it needs from each server:
It would then query each server for the changes needed. It is possible for multiple changes to the same property of an object to occur, and collisions are detected via a Property Version Number (PVN) which every property has. These work like the USN's and each time a property is modified, the PVN is incremented by one. In the event of a modification to the same property of the same object then the change with the highest PVN takes precedence, and if the PVN's are the same for a property update then a collision has occurred. If the PVN's match then the time stamp is used to resolve any conflicts. Each change is time stamped and this highlights the need for the domain controllers time to be accurate with one-an-other. In the highly unlikely event that the PVN's match AND the time stamp is the same then a binary buffer comparison is carried out with the larger buffer size change taking precedence. Property Version Numbers are only incremented on original writes and not on replication writes (unlike USN's) and are not server specific but rather travels with the property. A propagation-dampening scheme is also use to stop changes being repeatedly sent to other servers which already have the change and to this end each server keeps a table of up-to-date vectors which are the highest originating writes that are received from each controller and take the form of: <the change>,<domain controller making the original change>,<USN of the change> For example <object savillj, property Password xxx>,Titanic,54 Domain controllers then also send this information with the USN's so they can calculate if they already have the change the other domain controllers are trying to replicate. Q. How can I move objects within my Forest? A. The Windows 2000 Resource Kit ships with the MOVETREE.EXE utility which can be used to move organization units, users or computers between domains in a single forest. This is useful for the consolidation of domains or to reflect organization restructuring. Certain objects cannot be moved with MOVETREE such as Local and Domain Global groups and if the container they are in is moved these objects will be placed in an "orphan" container in the "LostAndFound" container in the source domain. Associated data is not moved with MOVETREE such as policies, profiles, logon scripts and personal data. To accomplish the movement of these items you should write custom scripts using the 'Remote Administration Scripts'. The syntax of MOVETREE is MoveTree [/start | /continue | /check] [/s SrcDSA] [/d DstDSA] [/sdn SrcDN] [/ddn DstDN] [/u Domain\Username] [/p Password] [/quiet]
You should first run in /check mode as this will perform a test without actually performing the move. Any errors will be displayed and also written to the file movetree.err in your current directory. If the test is OK run with the /start option. An example use would be C:\> movetree /check /s titanic.market.savilltech.com /d pluto.legal.savilltech.com /sdn OU=testing,DC=Market,DC=Savilltech,DC=COM /ddn OU=test2,DC=Legal,DC=Savilltech,DC=COM This would move the OU testing from domain market.savilltech.com to test2 in domain legal.savilltech.com. Q. How do I allow modifications to the Schema? A. The Schema is extensible which means it can be changed but modifying the Schema is a dangerous task as it will affect the entire domain Forest (since a forest shares a common schema) and someone at Microsoft once said the following: "If you find you have to change the schema find another way. If you still have to, look again. If after all that you find you still need to change the schema you better make sure your managers are fully aware of the implications" That being said to allow modifications there are two ways. If you want to use the GUI first register the .dll for the MMC snap-in (if you haven't all ready) C:\> regsvr32 schmmgmt.dll You can now start the Schema Manager via the Resource Kit Tools console or by creating a custom MMC and add the Active Directory Schema snap-in to it (Start - Run - MMC - Console menu - Add/Remove Snap-in - Add - Active Directory Schema - Add - Close - OK)
This can also be accomplished by directly editing the registry
Other related FAQ items: Q. What are Tombstone objects? A. Because of the complex replication available in Windows 2000 and the Active Directory just deleting an object would result in it potentially being recreated at the next replication interval and so deleted objects are 'Tombstoned' instead. This basically marks them as deleted and applies to all objects. Objects marked as tombstoned are actually deleted 60 days after their original tombstone status setting, however this time can be changed by modifying tombstonelifetime under cd=DirectoryServices,cn=WindowsNT,cn=Services,cn=Configuration,dc=DomainName however it is not advised. Q. How do I switch my 2000 domain to native mode? A. Windows 2000 domains have two modes, mixed and native. Mixed mode domains allow Windows NT 4.0 Backup Domain Controllers to participate in a Windows 2000 domain. In native mode only 2000 based domain controllers can participate in the domain and 4.0 based Backup Domain Controllers will no longer be able to act as domain controllers. Also the switch to native mode allows use of the new "Universal" groups which unlike global groups can be nested inside each other. Older NetBIOS based clients will still be able to logon using the NetBIOS domain name even in native mode. To perform the switch perform the following:
You will need to check all other domain controllers in the domain and when the domain operation mode says "Native Mode" (instead of mixed mode) reboot them. This can take 15 minutes (or more if contact is not able to be made). If a domain controller cannot be contacted (if on a remote site and only connects periodically) when you make the change the remote DC will switch mode the next time replication occurs. Q. How can I force replication between two domain controllers in a site? A. In Windows NT 4.0 replication between domain controllers could be forced using Server Manager. Replication can also be forced with Windows 2000 domain controllers as follows.
The replication is one way and if you want two way replication you will need to replicate in each direction. Q. How can I change replication schedule between two domain controllers in a site? A. By default domain controllers will replicate once an hour but this can be changed as follows. This is only for domain controllers in a single site, cross site replication is configured differently.
This replication schedule is one way and would to be repeated for the other direction. Q. Can I rename a site? - Windows 2000 A. Basically yes. When you install your first domain controller it creates a default site of Default-First-Site-Name which is not very helpful and can be changed as follows:
That's it! Q. What DNS entries are added when a Windows 2000 domain is created? A. Windows 2000 domains rely heavily on DNS entries however the entries are created automatically providing you have enable dynamic update on the relevant DNS zones. Below are explanations of what the entries are used for: _ldap._tcp.<DNSDomainName> _ldap._tcp.<SiteName>._sites.<DNSDomainName> _ldap._tcp.pdc._ms-dcs.<DNSDomainName> _ldap._tcp.gc._msdcs.<DNSTreeName> _ldap._tcp.<site>._sites.gc._msdcs.<DNSTreeName> _ldap._tcp.<DomainGuid>.domains._msdcs.<DNSTreeName> <DNSDomainName>
Q. How can I manually defragment the Active Directory? - Windows 2000 only A. By default Windows 2000 servers running directory services will perform a directory online defragmentation every 12 hours (by default) as part of the garbage collection process. This defragmentation only moves data around the database file (NTDS.DIT) and does not reduce its size. To create a new, smaller NTDS.DIT and offline defragmentation must be performed as follows:
Below is an example of the entire procedure Microsoft Windows 2000 [Version 5.00.2031] Q. How can I audit the Active Directory? A. It is possible to configure auditing on the Active Directory to produce both successful and failed entries in the Directory Service event log. To configure perform the following:
The logs can be viewed in the Security Log (using Event Viewer). The policy change may take a while to take effect as domain controllers poll for policy changes every five minutes. Other domain controllers in the enterprise receive the changes at this interval plus the time of replication. Q. How do I change Domain Names? A. This is not so much a procedure but things to think about.
A knowledge base article exists at http://support.microsoft.com/support/kb/articles/q178/0/09.asp. Q. How do I move a Workstation to another Domain? A. Logon to the Workstation locally as Administrator (i.e. name of machine) and goto Control Panel. Double click Network and click change. Enter the new Domain name and click OK. You will receive a message "Welcome to Domain x". Reboot the machine and you are part of the new domain. If you wish to administer this box from the new domain you will need to add <Domain>\DomainAdmins to the local administrators group by connecting to the local user database via User Manager for Domains (i.e. \\computername) Q. How many user accounts can I have in one Domain? A. The real problem is that each user account and machine account takes up space in the SAM file, and the SAM file has to be memory resident. A user account takes up 1024 bytes of memory (a machine account half as much), so for each person (assuming they each had one machine) would be 1.5 KB. This would mean for a 10,000 user domain each PDC/BDC would need 15MB of memory just to store the SAM! Imagine a network with 100,000 people. This is one of the reasons you have multiple domains and then setup trust relationships. Q. How to I change my server from Stand Alone to a PDC/BDC? A. You cannot change the role of a NT server, you will need to reinstall NT. A. A PDC is a Primary Domain Controller, and a BDC is a Backup Domain Controller. You must install a PDC before any other domain servers. The Primary Domain Controller maintains the master copy of the directory database and validates users. A Backup Domain Controller contains a copy of the directory database and can validate users. If the PDC fails then a BDC can be promoted to a PDC. Possible data loss is user changes that have not yet been replicated from the PDC to the BDC. A PDC can be demoted to a BDC if one of the BDC's is promoted to the PDC. Q. How many BDC's should I have? A. Microsoft say one BDC for every two thousand users. This is fine considering a 486DX2 with 32MB of RAM can, on average, perform at least 10 logons per minute, however if everyone in your company arrives at 9:00 on the dot and log on (except for the helpful people who arrive half an hour late) there will be a surge of logon requests to deal with, resulting in large delays. To try and improve on this, it is possible to configure the Server service to throughput for Network Applications rather than File Applications. Remember the more powerful the processor, the more logons (for a Pentium 133, would be able to logon at least 30 people). Q. How do I configure a Trust Relationship? A. Domains by default are unable to communicate with other domains, which means somewhere in domain x cannot access any resource that is part of domain y. Before a trust relationship is configured
After a trust relationship is defined, say x trusts y the following happens
In the example above x is the trusting domain, and y is the trusted domain. Also the above is a one-way trust relationship, i.e. while domain y users can use domain x resources, users of domain x cannot use domain y resources. A two-way relationship would allow each domain to access resources of the other (if given permission). The basics of a trust relationship is to first configure domain y to allow domain x to trust it, and then configure domain x to trust domain y:
Q. How do I terminate a Trust Relationship? A. Firstly you have to stop domain x trusting domain y, then remove domain x's ability to trust domain y:
Q. How can I join a domain from the command line? A. The NT Resource Kit Supplement 2 ships a new utility called NETDOM.EXE which can be used to not only join domains, but create computer account and trust relationships. To join a domain there are 2 paths, the first is to just add the computer to the domain and create the computer account simultaneously which is OK if you are logged on as a domain administrator, if you are not a domain administrator the account needs to be added in advance and then you join the domain. If you are logged on as a domain administrator then enter the command below to create the account and join the domain netdom /domain:savilltech /user:savillj /password:nottelling
member <computer name> /joindomain If you are not an administrator the domain admin people will have to add you an account first using either server manager or using NETDOM.EXE netdom /domain:savilltech /user:savillj /password:nettelling member <computer name> /add Once the account has been add the normal user could join the domain using the first command shown. Q. How do I demote a PDC to a BDC? A. Normally when you promote a BDC to the PDC, the existing PDC is automatically demoted to a BDC, but in the event that the PDC was taken off line and then a BDC promoted when the old PDC is restarted it will still think its the PDC and when it detects another PDC it will simply stop its own netlogon service. To actually modify the machine to be a BDC the registry needs to be changed directly:
To avoid having to set security perform the registry change from the system account by submitting the registry editor via the schedule service. C:\> net start schedule (only if not already running) Q. How can I configure a BDC to automatically promote itself to a PDC if the PDC fails? A. There is no way to do this, the assumption is that the PDC would be configured to write out the dump information and then reboot itself thus coming back online. You configure this behavior using the System Control Panel Applet - Startup/Shutdown tab. A. To rename a Primary Domain Controller perform the following:
To Rename a Backup Domain Controller
Note: If the BDC begins to receive 7023 or 3210 errors after synching the domain in server manager, on the PDC choose the BDC and then synch that specific BDC with the PDC. After an event indicating that the synch is complete, restart the BDC. Q. Can I move a BDC to another domain? A. Normally no, the BDC shares a common SID with the PDC of the domain and so there is no way to move a BDC to another domain, you would need to reinstall the BDC. System Internals have released NewSID 3.0 ( from http://www.sysinternals.com) which has a SID-synchronizing feature that let's you have one machine copy the SID of another. This makes it possible to move a BDC to a new domain. On the BDC start NewSID and click "Synchronize SID", enter the name of the PDC and click OK. Q. Can I change a PDC/BDC into a stand-alone server? A. No, the PDC/BDC registry is different from that of a stand alone server, again a reinstallation would be needed. Q. Can I administer my domain from an NT Workstation? A. Yes, if you install the NT Server client based Administration tools:
Q. In what order should I upgrade my PDC and BDC's from 3.51 to 4.0? A. The two different versions can coexist happily so you can upgrade in order you want however the safest option may be the following schedule:
Q. What tuning can I perform on PDC/BDC Synchronization? A. There are several registry settings that can be configured for PDC/BDC Synchronization : These are all values under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Netlogon\Parameters
Q. I cannot add a BDC over a WAN. A. To add a BDC to a domain, the PDC has to be contactable. Therefore the first task is to check that communications are working. If you are using TCP/IP then ensure you can PING the PDC, ping <ip address of the PDC> If this is OK then the problem is at the NetBIOS level. If you have WINS on the network ensure the BDC is configured to use the WINS server as when the PDC starts it will register the WINS name <domain><1Bh> which is used to identify the domain controller. Alternatively the LMHOSTS file can be updated.
To use the lmhosts file during installation you should create the file on another machine and copy it over when the BDC is being installed. Q. How can I synchronize the domain from the command line? A. To force a domain synchronization use the command net accounts /sync Q. How can I force a client to validate its logon against a specific domain controller? A. Before answering this it is best to understand what happens when a login occurs. When a logon request is made to a domain, the workstation sends out a request to find a domain controller for the domain. The domain name is actually a NetBIOS name that is a 16-character name with the 16th character used by Microsoft networking services to identify the NetBIOS type. The type used for a domain controller is <1C> and so the NetBIOS name for domain controller of domain "SAVILLTECH" would be "SAVILLTECH <1C>" The NetBIOS type has to be the 16th character, hence the name of the domain has to be filled with blanks to make its length up to 15 characters. If the client is WINS enabled then a query for the resolution of "<domain name> <1C>" will be sent to the WINS server as defined in the clients TCP/IP properties. The WINS server will return up to 25 IP addresses that correspond to domain controllers of the requested domain, a \mailslot\net\ntlogon is broadcast to the local subnet and if the workstation receives a response then it will attempt logon with the local domain controller. If WINS is not configured then it is possible to manually configure the LMHOSTS file on the Workstations to specify the Domain Controller. This file is located in the %systemroot%\system32\drivers\etc directory. An example entry in LMHOSTS would be as follows 200.200.200.50 titanic #PRE #DOM:savilltech #savilltech domain controller The above sets up IP address 200.200.200.50 to be host Titanic, which is the domain controller for savilltech and instructs the machine that this entry is to be preloaded into the cache. To check the NetBIOS name cache you can use command nbtstat -c, which will show all the entries including their type. If WINS is not configured and there is no entry in LMHOSTS then the Workstation will send out a series of 3 broadcasts. In the situation where no response is received and WINS is configured to use DNS for WINS resolution a request to the DNS server will be sent and finally the HOSTS file checked. If all of this fails then an error "A domain controller for your domain could not be contacted. To force a client to use a specific domain controller we need only do the following:
The machine is now configured to broadcase for a domain controller on a local subnet and then query a name server. If no domain controllers are found on the WINS server, or WINS is not used it will then search the LMHOSTS file. The next stage is to edit this file.
Service Pack 4 includes a new utility, SETPRFDC.EXE, which will direct a secure channel client to a preferred list of domain controllers. The syntax is: C:\> SETPRFDC <Domain Name> <DC1, DC2, ....., DCn> SETPRFDC will try each DC in the list in order, until a secure channel is established. If DC1 does not respond, DC2 is tried, and so on. Once you run SETPRFDC on a WinNT 4.0, SP4 computer, the list is remembered until you change it. You can run SETPRFDC in batch, via the scheduler, or even in a logon script (for future logons). Don't forget to undo any LMHOSTS entries you might have set. Q. How do I promote a server to a domain controller? - Windows 2000 only A. Windows 2000 ships with a utility, DCPROMO.EXE, which is used to promote a stand-alone/member server to a domain controller and vice-versa. In Windows 2000 domains are DNS names which means you can have a hierarchy of domains leading to parent-child domain relationships. The advantage of these parent-child relationships is that there have a bidirectional transitive trust which means that if domain b is a child of domain a, and domain c is a child of domain b, domain c implicitly trusts domain a. This is very different from the way trusts work in earlier versions of Windows NT. Since Windows 2000 domains rely on DNS it is vital that DNS is correctly configured to enable the domain to be created (if you are creating a new top level domain). Information on configuring DNS for a domain can be found here. A final pre-requisite is that an NTFS 5.0 volume is required to house the SYSVOL volume and so ensure you have at least one NTFS 5.0 volume (use CHKNTFS to check the versions of your partitions). To upgrade a stand-alone/member server to a domain controller perform the following:
You now have a Windows 2000 domain controller. Additional domain controllers (old BDC's) can be added by performing the above and selecting "Replica domain controller in existing domain" in step 3. It would then ask you the name of the domain to replica. Q. How can I generate a list of all computer accounts in a domain? A. The normal method under Windows NT 4.0 and earlier is to use Server Manager (Start - Programs - Administrative Tools - Server Manager) and computer accounts can be viewed/added/deleted. Under Windows NT 5.0 this information can be viewed using the Active Directory MMC (Microsoft Management Console) snap-in and browse the domain/Computers group. Of course under Windows NT 5.0 and the Active Directory computers can also be created in Organisation Units so would not all be shown under this tree (as shown below the computer account in the law OU would not be listed in the Computers group). A more complete method is to use the Windows NT Resource Kit NETDOM.EXE utility (which runs under Windows NT 5.0) to generate the list, e.g. C:\> netdom member Member 1 = \\ODIN It is also possible to list other domains using a mixture of command line switches, e.g. C:\> netdom /d:<domain name> [/u:<domain>\<user to which query> /p:<password] member The information in the [] is only needed if your account does not have privileges in the requested domain. The advantage of the command line tool is it lists all computer accounts, even those in OU's in the Active Directory. An alternative method is to use the net view /domain:<domain> command which has the advantage that you can pipe the output to a file or another command, e.g. C:\> net view /domain:savtech Q. How can I verify my Windows 2000 domain creation? - Windows 2000 only A. To verify the tcp/ip configuration is OK check for the ldap.tcp.<domain> service record, e.g. ldap.tcp.savilltech.com C:\> nslookup The ldap record used to be ldap.tcp.<domain> but was modified in build 1946 onwards. The underscore is necessary to definitively differentiate our unique names in the DNS namespace from internic registered domain names on the internet. In this way we can ensure that there will never be a DNS name clash. My understanding is that RFC 1034\1035 (may be wrong with these numbers as they may have been superceded) say that the underscore character is NOT a valid character to use in a DOMAIN NAME. All internet registered names should never contain the underscore. Now, RFC2181 states that the underscore is a valid label to use in DNS (as well as plenty of other characters too) so we the underscore is used to prevent possible clash with INTERNET names. This change was introduced in earlier builds of windows 2000. For a while DC's generated both styles of names in DNS to support both styles of clients (ie newer and older builds). Now that client code is changed to look for underscores, we have now retired the ldap.tcp names in favour of the _ldap.tcp names. Also make sure the NetBIOS computer name is OK C:\> net view \\<computer name> Finally check the NetBIOS Domain name works C:\> usrmgr <domain name> The NetBIOS domain name is used for backwards compatibility. Use a 4.0 version of usrmgr. Q. How can I configure multiple Logon Servers with LMHOSTS? A. Service Pack 4 adds support for multiple domain controllers for a single domain to be configured in the LMHOSTS file (located in %systemroot%\system32\drivers\etc). Normally when a computer starts, the WINS server is queried for any [1C] entries, domain controllers, and it will return a list. This list is not geographically aware and you could be given a domain controller on the other side of the world. An alternative is to specify a list of domain controllers in the LMHOSTS file (which is now checked before WINS is #PRE is in the entry) and have different LMHOSTS files in different regions. Example entries in the file would be 200.200.200.50 titanic #PRE #DOM:SAVILLTECH You will need to ensure the computer is configured to use the LMHOSTS file
Q. Are trust relationships kept when upgrading for a 4.0 domain to a Windows 2000 domain? A. When a 4.0 PDC is upgrade to Windows 2000 all trust relationships are maintained. Q. How are trust relationships administered in Windows 2000? A. Instead of using User Manager as in NT 4.0, a new MMC snap-in, Active Directory Tree Manager is used. Although the host application is different the usage is exactly the same. To view/add/remove perform the following:
Obviously you should try and use the tree and forest concept rather than manual trust relationships with pure Windows 2000 domains. This is discussed in the Active Directory section (which will be added shortly). Q. I can't promote a BDC to PDC. A. If you receive an 'Access Denied' message when attempting to promote a BDC to the PDC it may be due to the fact the PDC has Service Pack 4 installed. This is because Service Pack 4 upgraded the security mechanism used so you will either have to perform the promotion from a Service Pack 4 domain controller or upgrade the BDC in question to SP4. Another reason for this error is trying to get a renamed and upgraded (3.51 to NT4) server to sync with the domain. The accounts database may have become out of date and thus couldn't be synchronised. NETLOGON may not even be startable. The way round is to do a "connect as" from the PDC to the rogue BDC using an admin ID known to be good by the BDC before it was upgraded. Once the "connect as" (say to Cc) was accepted, the BDC would then accept the synchronise request from the PDC's Server Manager, restarting NETLOGON in the process. Q. Unable to join a domain because of SMB signing, what can I do? A. If the following error message is displayed when you attempt to add a computer running Windows NT to the domain: "Unable to connect to the domain controller for this domain. Either the username or password entered is incorrect." The error message is displayed even though networking is enabled and the correct administrator name and password credentials were supplied. The problem is that the PDC has SMB signing set to required and the client cannot communicate as it does not have SMB signing enabled. Two options are possible. The first is to disable RequireSecuritySignature SMB signing on the domain controller as described in Q. How do I enable SMB signing? or install the machine into a workgroup, enable SMB signing then join the domain. Of course this would not work with BDC's. Q. How can I create a child domain? A. Windows 2000 allows the creation of a domain as a child of another domain. When two or more domains are joined in a parent-child relationship a domain tree is formed. A child domain is created when executing the DCPROMO.EXE image and the parent domain must be accessible to create.
Instead of performing screenshots I've produced an animated GIF of the entire child domain creation (I was bored ;-) ). Click Refresh to make it start from the beginning, a gap of 2 seconds is shown between each screen. Q. How can I create a domain trust through a firewall? A. When creating trust relationships communications between the two domains is carried out over a number of protocols with each protocol using different TCP/IP port. Below is a list of ports which need to be enabled on the firewall for a trust relationship:
You may use LMHOSTS for name resolution (which would have #pre #dom entries for the domain controllers) or WINS can be used which requires:
Alternatively, a trust can be established through point-to-point tunnelling protocol (PPTP). For PPTP, the following ports must be enabled:
Also see the following knowledge base articles:
Q. How can I check the browse masters for a domain? A. The resource kit has a utility BROWSTAT.EXE which allows status of the browse service to be ascertained. To check browse masters for a domain use the following command: C:\> browstat status <domain> To check statistics for a single server use the command C:\> browstat stats \\<server> Q. How can I stop a remote master browser? A. The resource kit utility BROWSTAT can be used to remotely stop a browse master with the following command: C:\> BROWSTAT TICKLE <transport> <domain> |
\\<server name> To check which transport use the command: C:\> net config rdr The transport device is indicated by '<network service>_<NIC type>', where <network service> is the session-layer network service, and <NIC type> is the type of network interface card on your computer. The session-layer network services are NetBT for NetBIOS over TCP/IP, NwlnkNb for IPX, or Nbf for NetBEUI, e.g. NetBT_Tcpip. C:\> browstat tickle NetBT_Tcpip_{C2F8C130-F2AF-11D2-B748-DAEDF5F58140} \\titanic Q. How can I force a browser election? A. The resource kit utility BROWSTAT can be used to force a browser election: C:\> BROWSTAT ELECT <transport> <domain> |
\\<server name> To check which transport use the command: C:\> net config rdr The transport device is indicated by '<network service>_<NIC type>', where <network service> is the session-layer network service, and <NIC type> is the type of network interface card on your computer. The session-layer network services are NetBT for NetBIOS over TCP/IP, NwlnkNb for IPX, or Nbf for NetBEUI, e.g. NetBT_Tcpip. C:\> browstat elect NetBT_Tcpip_{C2F8C130-F2AF-11D2-B748-DAEDF5F58140} savilltech A. Modern day PC users are used to having a system with large amounts of memory, disk and CPU power to run their applications. This is very different to UNIX and VMS environments where servers have all the memory, disks and CPU and users have "dumb" terminals which just send keystrokes to the server which in turn sends back screen updates. There are a number of advantages with the UNIX/VMS approach. Most desktop computers are idle for most of the time with the CPU only 10% busy normally and a significant amount of memory spare, this is a waste of resources. A central server approach distributes resource's to sessions as needed, minimizing waste and ensuring resources are available when needed. Installing applications and maintaining them on each desktop is very time consuming. A central server based install simplifies this significantly and lowers the Total Cost of Ownership (TCO). Windows NT Terminal Server and Windows 2000 address this with client software for Windows 9x/NT and Windows for Workgroups machines that allow a window to be created which allows all processing and execution to be carried out on the server and the only task the local machine does is to pass back keyboard and mouse actions. The Terminal Server does all the computation and storage and passes back screen updates to the client.
Obviously Windows NT/95 are operating systems of their own and it may seem pointless running terminal server client on these machines however it could be used for application management, install Office 97 on the Terminal Server and all clients use Office via the Terminal Server connection. Imagine running Office 97 on a Windows for Workgroups machine! Communication is via RDP (Remote Desktop Protocol) which was designed by Microsoft. Windows Terminal Server is based on Citrix's WinFrame product and Citrix provide a bolt-on, MetaFrame, which adds functionality to Terminal Server including support for DOS, OS/2, Unix, Java and much more. http://www.citrix.com Q. How do I install Windows NT 4.0 Terminal Server Edition? A. The installation of Windows NT Terminal Server edition is the same as a normal Windows NT Server installation except during installation you will additional be asked:
Once installation is complete if IE 4.0 was selected it will be installed and configured and an additional reboot performed. Due to the method applications need to be installed on Terminal Server (for use with clients) an upgrade of a Windows NT 4.0 server is not supported or advised. It is also not advised to run backoffice applications on a Terminal Server due to the massive amounts of resources Terminal Server uses for its clients and as such Terminal Server is not part of the Backoffice suite of applications. You will also notice that Terminal Server is supplied with Service Pack 3 installed, do NOT install a normal version of a service pack on Terminal Server, special service packs will be made available for Terminal Server installations. Once install is complete you will notice 4 new tools under the Administrative Tools branch of the Programs Start menu
These will be looked it in detail later in the Terminal Server section. You will also notice User Manager is modified to include a new 'Config' button for each user which allows Terminal Server settings to be configured. Q. How do I enable Terminal Server under Windows 2000? A. Windows 2000 has Terminal Server components built into the operating system and they can be installed at installation time or at a later time. To install the components perform the following:
Once reboot is complete 4 new programs will be under the Administrative Tools branch of the Start menu
Q. How do I install Windows NT/9x based Terminal Server clients? A. Terminal Server has built in support for the following clients
The first 4 all share a common piece of software and terminal server (both NT 4.0 and Windows 2000) ships with a utility to create it on a single floppy disk:
All the above does is copy the contents of %systemroot%\system32\clients\tsclient\win32\disks\disk1 to disk so you could directly copy or share this directory. There is also a net subdirectory of tsclient which also contains the clients with each client in its own subdirectory without the disk1 etc. folders, so you could share out this folder to allow access to all client installations. Sharing the net folder would be the prefered method. To install the client perform the following:
A new folder "Terminal Server Client" has been added with 2 utilities and an uninstall option. Q. How do I install Windows for Workgroups based Terminal Server clients? A. Terminal Server has built in support for Windows for Workgroups but they must have TCP/IP 32b installed (this can be downloaded from Microsoft at http://support.microsoft.com/support/kb/articles/q111/6/82.asp). I found this out the hard way! TCP/IP can be installed using the Network setup icon in WFW. You may want to run MEMMAKER after installation of TCP/IP to "tidy" your memory, I had to, just choose Express. To create floppy disks for Windows for Workgroups TS client installation perform the following:
All the above does is copy the contents of %systemroot%\system32\clients\tsclient\win32\disks\disk1 to disk so you could directly copy or share this directory. There is also a net subdirectory of tsclient which also contains the clients with each client in its own subdirectory without the disk1 etc. folders, so you could share out this folder to allow access to all client installations. Sharing the net folder would be the prefered method. To install the client perform the following:
A new program group "Terminal Server Client" has been added with 2 utilities and an uninstall option.
Q. How do I connect to a Terminal Server from WFW/9x/NT/2000? A. The first action is to install the client which is explained in 'Q. How do I install Windows NT/9x based clients?'. Once the client is installed there are two methods to connect to a terminal server. The first is a very manual method and while simple may not be ideal for many normal users.
You should be aware that pressing Ctrl-Alt-Del will bring up the Local security menu and not the remote. To bring up the remote security menu select "Windows NT Security" from the Start menu. You will notice you don't have a shutdown button (unless you are an Administrator) as this would shutdown the terminal server machine. An alternative is to setup a shortcut to connections and this is accomplished using the "Client Connection Manager".
You may create a shortcut to this on the desktop by right clicking on it and selecting 'Create shortcut on desktop'. This shortcut actually calls the normal Terminal Server Client with a parameter of the configuration name, e.g. "C:\Program Files\Terminal Server Client\MSTSC.EXE" "TS 1 Connect" This may be useful for you to build into batch menus etc. The actual connection details are stored in the registry under the 'HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client' key. You could therefore dump out this registry key and import into other machines automating the shortcut installations. The only item not read in is the password if autologon was selected. To dump out to file just select the registry key in REGEDIT.EXE, e.g. "TS 1 Connect", and select "Export Registry File" from the File menu. Enter a file name and click OK. You can then copy this .reg file to any machine and execute using C:\> regedit /s <file>.reg Q. How do I close a Terminal Server connection? A. If you click Start from a Terminal Server session you will see two options if connected to a Windows NT 4.0 box
There is a major difference between the two. If you select Logoff your session is logged off and your connection to the terminal server is closed and the connection slot you were using may be used by someone else. If you select Disconnect you are not logged off, rather the session window closed but if you restart and logon as the same person it will remember all applications and their state. This may seem ideal but remember a Terminal Server has a finite number of allowed connections and a disconnected session constantly uses a connection stopping someone else from connecting. A disconnected session remains active until one of the following:
If you connect to a Windows 2000 box you will see Disconnect and Shutdown, selecting Shutdown gives the option of logging off. Q. How do I install applications for use with Terminal Server? A. Installing applications on a terminal server has to be done in a special way to ensure it is usable by all users of the terminal server. There are two modes in terminal server, Execute and Install. By default all users are logged on in Execute mode and this means they can run programs etc. When you want to install an Application for use by everyone the Administrator should change to Install mode. The best way to install software is to use the Add/Remote programs control panel applet as this will automatically set the mode to Install during the installation and then back to Execute at the end. Alternatively you can manually change your mode to install by typing C:\> change user /install To change back to execute use C:\> change user /execute And to check you current mode use C:\> change user /query In this example we will use Add/Remove to install Winzip on a terminal server.
All terminal server users will now have Winzip. An alternative would be to manually set the mode to install, install the software and set back to execute. Q. I can't install Office 97 SR2 on Terminal Server. A. If when you try and install Office 97 SR2 on a terminal server via the Add/Remove Programs control panel applet you get the error: "Setup cannot register MSJET35.dll in the system registry because an older version is in use. Close all applications and try again" this is because the Terminal Server License Service is using the file. To workaround this stop the licensing service C:\> net stop "terminal server licensing" Click Retry on the error dialog and install will continue. Once installation is complete restart the service C:\> net start "terminal server licensing" Office 97 has now been installed for use by all your terminal server clients. Q. How do I install Citrix Metaframe? A. Citrix Metaframe is an add-on to Windows NT Terminal Server and although there is currently no version for Windows 2000 it is under development. To install perform the following:
Once the machine has rebooted upon logon a new toolbar is added to your desktop which allows control of the MetaFrame environment. Q. How do I create Citrix Metaframe client media? A. MetaFrame ships with a utility, ICA Client Creator, which is in
the MetaFrame Tools program group. It can also be started by clicking the
client creator button on the MetaFrame toolbar,
Once started the utility will check for the CD-ROM and give options to create a variety of clients: Select the client to install, the disk drive and whether to format the disks. Alternativly all the clients are copied to the %systemroot%\system32\clients\ica directory, e.g. DOS is wfcdos, so share the directory and allow clients to map directory and install. Q. How do I install the ICA DOS client? A. You will first need to create the DOS ICA client installation disk as explained in 'Q. How do I create Citrix Metaframe client media?'. The DOS machine will also need the ability to connect to the network as explained in 'Q. How can a DOS machine connect to an NT domain?'. To install the client perform the following:
To run the client simply change to the wfclient directory (or add to the machines path variable) and run WFCLIENT.EXE. When you run for the first time you will need to create a new entry, click Yes to create a new entry. Enter connection details such as connection medium (Microsoft TCP/IP), server name/address. You should then select the Entry and select Connect. Q. How do install Backup Exec 7.X on TSE? A. Be sure to disable Terminal Server Licensing before you start the installation.
Q. Can I use normal Service Packs on Windows NT Terminal Server Edition? A. No, Terminal Server has modifications to its components meaning normal Service Pack's cannot be applied. Terminal Server Edition has Service Pack 3 built in and Service Pack 4 for terminal server was released April 1999. In Windows 2000 this will not be the case as Terminal Server is just a component of the normal product. Q. Can I use normal Hot fixes on Windows NT Terminal Server Edition? A. It depends. Some components of Windows NT Terminal Server Edition are specially modified and some are not. You will need to check if the file you are replacing is specially modified for Terminal Server Edition: Enter the command: C:\> filever /v <filename> -r--- W32i DRV ENU 4.0.1381.32772 shp 25,840 06-08-1998 atapi.sys VS_FIXEDFILEINFO: We are interested in the FileVer property. If the final number is greater than 32767 then the file was built for Terminal Server, you should therefore only apply a hotfix that is specially released for Terminal Server. The actually bit value we are interested in is the 0x8000 bit. If set then it is modified for Terminal Server. Below is a file that is not specially modified for Terminal Server Signature: feef04bd Special Terminal Server fixes can be found under ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40TSE In Windows 2000 this will not be the case as Terminal Server is just a component of the normal product. Q. I've reached 40 - 45 users and additional users can't log onto Terminal Server? A. If you have more than 40 users you should increase the amount of PTEs (page table entries) on the system. Microsoft says that you should increase this if you'll have more than 45 connections. But I've seen that this can be a problem with less users as well. TSE Memory Manager allocates 10,000 PTEs as default. TSE uses PTEs to map the location of physical memory pages. Each user who logs on to TSE requires a minimum of 200 PTEs. If the PTE pool is exhausted, additional users will not be able to log on. The maximum allowed limit of PTEs are 50,000. To change the number of PTE's on the system see Q. How do I increase the number of Page Table Entries on my system? Q. How do I configure a CE based Terminal Server client? A. One option for Terminal Server clients is to use a "thin" client which has no disks but an embedded operating system and one such device is a Windows CE based client. The advantage is the machine has zero maintenance apart from the initial configuration. The instructions below are for the Viewpoint series from http://www.boundless.com (many thanks for letting me have one to use). When you first turn on the machine it will ask for certain details:
You will have no start bar, just a dialog asking for a connection to be made. You should configure sessions as you would a normal Terminal Server client by selecting the Configure tab. Q. I am having troubles getting the ICA DOS client to work. A. The ICA DOS client uses a LOT of memory and to get working I had to remove nearly every other process from memory, thankfully Citrix have now released a new 32 bit DOS client which can access more of your machines memory eliminating the memory problems. It can be download from http://download.citrix.com and its usage is exactly the same as the old 16bit DOS client. Q. Where can I download updates for MetaFrame? A. These can be downloaded from http://www.citrix.com/support/ftpserve.htm. Q. What Service Packs are available for Windows NT Terminal Server Edition? A. Windows NT Terminal Server Edition is supplied with Service Pack 3 built in. The following Service Packs are available for Windows NT 4.0 Terminal Server Edition. Service Pack 4 - http://www.microsoft.com/ntserver/terminalserver/downloads/recommended/tsesp4/ordercd.asp Special hotfixes (when available) can be downloaded from ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40TSE/hotfixes-postSP3 Q. How do I send a message to a Terminal Server client? A. Terminal Server supports two methods of communicating with a Terminal Server client process. The first is via the GUI:
To send from the command line perform use the MSG command, msg <user> [/time:<seconds>] [/w] [/server:<server name>] <message> For example: C:\> msg savillj /w Get off that computer John! The /w switch will force the administrators session to pause until the user has clicked OK to the message. Q. How do I locate machines that are running Terminal Server? A. Starting the Terminal Services Manager MMC snap-in (Start - Programs - Administrative Tools - Terminal Services Manager) will list machines running the Terminal Server services by expanding the domain. It can also be done with the following command: qappsrv [/address] [/domain:<domain name>] [/continue] For example C:\> qappsrv /address The /domain is optional unless you wish to query a domain other than the machines membership and /continue does not pause after each screen of information. Q. How can I check if a user is logged on via Terminal Server? A. Starting the Terminal Services Manager MMC snap-in (Start - Programs - Administrative Tools - Terminal Services Manager) will list user processes by machine but this may be cumbersome if a large number of terminal servers are running. It can also be done with the following command: query user [<user name>] [/server:<server name>] For example C:\> query user The above lists all users. You can also check what the user is running with the QPROCESS command: C:\> qprocess <user name> To check who is running a certain program (e.g. winword.exe) C:\> qprocess <process> will list all users running the passed program. Q. How do I connect two Workstations using RAS? A. NT Workstation supports one inbound RAS connection so one NT station will be the RAS server, and one will be the client. The procedure below is what I did to connect two machines. Server If RAS is already installed
If RAS is not already installed, goto My Computer and double click Dial-up Networking, it will then detect your modem and then take you to step 3 as above. Client This assumes RAS is not installed
Q. Is it possible to dial an ISP using the command line? A. Yes, use RASPHONE -d <entry> or RASDIAL <entry> To disconnect you can type RASPHONE -h <entry> or RASDIAL /disconnect. Q. How can I stop the RAS connections closing when I logoff? A. Perform the following:
Q. How can I create a RAS Connection Script? A. It is possible to write a script that will run when you connect during a RAS connection to automate actions such as entering your username and password. To specify a script perform the following
An example addition to the SWITCH.INF would be ; the phonebook entry In depth information on all of the commands can be found in the SWITCH.INF file. Q. How can I debug the RAS Connection Script? A. It is possible to create a log file of the connection by performing the following steps
Each dial-up session will now be appended to the file %systemroot%/system32/RAS/device.log. To stop logging perform the steps above but set the value back to 0. Q. How do I configure RAS to connect to a leased line? A. The method will vary depending on your systems current setup, however assuming you have RAS already installed below are the actions needed to configure in your leased line. It is assumed the modems (at both ends) are configured correctly for leased line usage (&D0 for DTR override).
You should now configure the RAS connection (server/client) in the normal way (use the RAS service properties).
Once this has been done you may also want a phonebook entry for outgoing use as you would normally except under the Dialing section check the "Persistent connection" box. Q. How can I disable RAS AutoDial? A. The easiest way to do this is to disable the RAS AutoDial service:
To re-enable you would repeat the above but change the startup to automatic. Q. RAS tries to dial out even on local resources. A. Perform the following:
You may also wish to add addresses to the disabled list:
You will need to reboot the machine in both of the above cases. A. When you configure the RAS server you set for each protocol the scope of the connection, the server or the whole network. To change this perform the following:
Clients should now be able to view the entire network. Q. How do I force the "Logon Using Dialup Networking" to be checked by default on the logon screen? A. This can be accomplished with a registry change on each client machine.
Q. Where are the RAS phone book entries and settings stored? A. The actual phone book entries are stored in the file %systemroot%/system32/ras/rasphone.pbk (pbk - phone book). You could therefore copy this file to another machine to copy the phone book entries. Another important file is %systemroot%/system32/ras/switch.inf which is used to create terminal login scripts (as discussed earlier in this section), and you may find phone book entries may refer to an entry in this file at the end of the entry: DEVICE=switch In this case, Type=Terminal means bring up a terminal window after connection so it does not use switch.inf, DEVICE=switch would cause the script "Pipex" (which is in switch.inf) to be run once a connection has been made. If these two lines are missing don't worry, it just means you don't need a terminal window once you have connected (probably means you are connecting to a Windows NT box). Usually if you connect to a non-NT machine you have to send it a username and password, along with the connection type (protocol), which is usually PPP on most modern systems, SLIP is an older option. RAS information relating to phone book entries and outbound connections in the registry is actually stored under HKEY_CURRENT_USER\Software\Microsoft\RAS Phonebook, and contains details about redial attempts, display settings etc. Again you export this section of the registry to a reg file (using regedit.exe) and import into another machine to copy the machine specific settings. Q. How can I change the number of rings that RAS server waits for before answering? A. The normal method is to edit the file %systemroot%\system32\ras\modem.inf. Edit the file, find the sections relating to your modem and find the line COMMAND_LISTEN=ATS0=1<cr> Change the numeric value to the number of rings to answer after, e.g. COMMAND_LISTEN=ATS0=10<cr> would answer after 10 rings (you must really hate your users, don't we all :-) ). You must restart Windows NT for this change to take effect. The above does not work if RAS is using any TAPI (Telephony Application Programming Interface )/Unimodem-based devices. If this is the case perform the following:
A. By default the RAS Server will wait 12 seconds before calling back a RAS client however this can be changed by editing the registry.
Q. Whenever I connect via RAS I cannot connect to local machines on my LAN. A. To enable WWW and FTP browsing when you connect via RAS you enable the "use default gateway on remote network" of the RAS options. This has the effect of when the connection is made a new route is added to the route list superseding the existing LAN routes so any traffic destined for a node outside your local subnet will attempt to be sent using the RAS route. This is because a metric is used to identify the number of hops needed and once connected to RAS it will have a metric 1 and existing routes will be bumped out to a metric of 2. To solve this a persistent route can be manually added for your LAN's subnet and the associated subnet gateway. While not connected via RAS you can examine your route information using the ROUTE PRINT command: If your network was 160.82.0.0 (your company has a class B address) and the gateway was 160.82.220.1 for your local subnet you can add a route for the LAN only and all addresses outside of 160.82.0.0 will be routed using the RAS gateway. C:\>route -p add <ip network> mask <subnet mask>
<local gateway for the route> This would mean all addresses from 160.82.1.1 to 160.82.254.254 would be routed via 160.82.220.1 and anything else via the RAS gateway. If you wanted to add a route for a single host (maybe your internet firewall which is on another subnet) use the following: C:\>route -p add 192.168.248.8 mask 255.255.255.254 160.82.220.1 Notice the subnet mask of 255.255.255.254 which means only for this single host. When connected via RAS you will still be able to access resources outside of your local subnet on the LAN with no problems. Q. How can I disable the "Save Password" option in dial-up networking? A. When you connect via RAS you can cache the password. If you feel this is a security problem then you can disable the option to enable the password to be saved.
If you disable the "save password" make sure "redial on link failure" is not activated as one redial attempts as it does not save user information it will attempt to connect as Administrator which will not work (unless the ISP has very poor security :-) ). Q. How can I set the number of Authentication Retries for Dial-Up connections? A. By default after two unsuccessful authentication attempts the dial-up networking (DUN) component will hang up the line however this can be changed to between 0 and 10. 0 means the line will be hung up after the first attempt, 1 will allow one retry etc.
Q. How can I set the Authentication Time-out for Dial-Up connections? A. As well as changing the number of Authentication Retries that are allowed, the amount of time between each attempt can also be configured and after that time has elapsed it will count as a logon failure. This can be between 20 and 600 seconds.
Q. Enabling 128-bit RAS Data Encryption. A. Service Pack 3 (128 bit version) introduced the ability to use 128-bit RAS data encryption with a Windows NT 4.0 RAS server as opposed to the normal 40-bit encryption. To enable this 128-bit encryption perform the following:
It is now necessary to enable the 128-bit setting:
After reboot is completed clients connecting via RAS or PPTP will have to authenticate using 128-bit key encryption. A number of event logs can be viewed using Event Viewer (Start - Programs - Administrative Tools - Event Viewer). If a successful connection is made you will see the log: Event ID: 20107 If the connection was unsuccessful you will see entry Event ID: 20077 The client attempting connection would also receive a 629 error. Q. Why does my RAS client have the wrong subnet mask, etc.? A. The only parameter from DHCP that the RAS client uses is the IP address. Other parameters come as follows: The subnet mask is that used by the NIC in the workstation, if fitted. IPCONFIG shows the mask as being the default mask for the class of IP address in use but this is irrelevant. MS used to display it as 0.0.0.0 which is clearly wrong, but the default is more subtly wrong. If there is no NIC in the client, then the subnet mask is irrelevant as all traffic is passed through the dial-up connection. The default router is displayed as the same as the address of the client RAS interface. What is actually used as default router is the RAS server itself. WINS server addresses and DNS server addresses for use by the client similarly do not come from the parameters set on the DHCP server but instead are those used by the RAS server itself. Node Type is not taken from the DHCP parameters but can change on the RAS client depending on WINS information. If the RAS server has no WINS servers defined locally, a b-node Windows NT RAS client will remain a b-node client. If the RAS server has WINS servers defined locally, a b-node Windows NT RAS client will switch to h-node for the duration of the connection. More information can be found in knowledge base article Q160699 at http://support.microsoft.com/support/kb/articles/q160/6/99.asp Q. How long is the lease on the IP address when issued to a RAS client from DHCP? A. When a RAS server is set to allocate IP addresses from DHCP, it grabs n+1 addresses when the service starts, (where n is the number of dial-up interfaces), and keeps them. Therefore, the lease time is largely irrelevant. When a client dials in, the RAS server issues one of these cached leases and the RAS server maintains the lease on behalf of the client. The RAS server only records the address of the DHCP server and the lease parameters. All other DHCP options are discarded. You may notice that, if you use IPCONFIG or WINIPCFG on a RAS client to look at lease information, it has null dates (ie. Jan 1, 1980). When the client disconnects, the IP address will be released back to the RAS server, NOT back to the DHCP server. This causes a lot of confusion when people expect to get their IP addresses back to the DHCP server. These will only be released back to DHCP when the RAS service is stopped and then the lease expires in due course. Thanks to Peter Smith Q. How can I disconnect users from the RAS server? A. It is possible to disconnect any user using the "Remote Access Admin" utility:
If you also wanted to revoke the users dial-in permission check the 'Revoke Remote Access Permission' check box from the dialog. Q. How can I disable the modem speaker when dialling? A. Its possible to disable the modem speaker in a number of ways. The easiest method is to use the RAS properties:
An alternative (and you may try this if the above fails to work) is to edit the dial string and add the control sequence for your modem to disable the speaker, its normally M0 however this can vary.
A. When you configure the RAS server, you set for each protocol the scope of the connection, the server or the whole network. To change this perform the following:
Clients should now be able to only view local RAS server connections. Q. How do I install the Windows 98 Virtual Private Network adapter? A. Windows 98 contains the Virtual Private Network as standard and to install perform the following:
Once the machine has rebooted to create a new VPN connection start the Dial-Up Networking software and double click the 'Make New Connection'. Under the device select "Microsoft VPN Adapter", click Next and enter the host name or IP address of the VPN server. To make a connection dial into the Internet then double click the VPN connection, enter a username and password and you are connected! Q. How do I install the Point To Point Tunneling Server? A. Windows NT Server contains the Point To Point Tunneling Protocol as standard and to install perform the following:
Once the machine has rebooted it will operate as a Virtual Private Network server. Make sure any users who want to logon to it have RAS dial in rights (as configured using User Manager). If you experience any problems with protocols make sure that the RAS server has the protocols configured, e.g. TCP/IP correctly. This can be done by starting the Network Control panel applet, select Services, select RAS and click Configure. Select the VPN port and click Network. You can then configure TCP/IP etc., ensure there are no problems with addresses etc. Extra VPN connections can also be configured by clicking Add and selecting VPN2, VPN3 etc. You can only have simultaneous VPN connections for the number of VPN devices on the server. Q. How do I install the Windows NT Virtual Private Network client? A. Windows NT contains the Virtual Private Network as standard and to install perform the following:
Once the machine has rebooted to create a new VPN connection start the Dial-Up Networking software and double click New. Under the device select "Microsoft VPN Adapter", and under Phone number the host name or IP address of the VPN server. To make a connection dial into the Internet then select the VPN connection, enter a username and password and you are connected! You can check PPP is working by using the IPCONFIG command PPP adapter NdisWan4: Q. How can I remove the dial-up networking icon from My Computer? A. The dial-up networking icon can be removed by editing the registry as follows:
To restore it using your reg file just double click on the reg file from Explorer and dial-up networking will be restored. Q. I've connected two computers using two 56K modems but I never connect at more than 33Kb, why? A. The problem is that your modems cannot send faster than 33.6k. The 56k technologies, such as X2, K56flex and the new standard V.90 are asymmetric - 56k from a service such as an ISP to you, and 33.6k (maximum negotiated rate, may be less) from you to an ISP. Having one of your V.90 modems call the other won't create a connection faster than 33.6k since neither side can transmit faster than 33.6k. The 56Kb is possible because the line from your house to the telephone company switching office is analog, and that the rest of the path from the CO to the service (ISP) is 100% digital. At the service end, they specifically install digital modems designed to operate as the service end of V.90/X2/K56flex connection. This means you would need on of the boxes the same kind of modem that an ISP would buy. You may find however that you can't get one of those without also having the digital phone circuit to connect it to. If you need 56Kb look at ISDN. The easiest way to setup a system which can accept 56K V90 incoming connections is to get an ISDN2 or home highway and a 3COM Courier-I modem. The Courier-I can act as a standard and ISDN modem. It will also act in V90 mode as a server it it detects an incoming analogue call across the ISDN. A. If you are viewing this page on the web then you are using TCP/IP now! TCP/IP is a suite of related protocols and utilities used for network communications. TCP/IP is actually two protocols, Internet Protocol (IP) and Transmission Control Protocol (TCP). There are many different implementations of TCP/IP however they all conform to a standard which means different implementations can communicate with each other. Each machine that uses TCP/IP must have a unique TCP/IP address which is a 32 bit number, which is usually displayed in the dotted quad (or dotted decimal) format xxx.xxx.xxx.xxx, where xxx is a number from 0 to 255, for example the IP address 147.98.26.11 is shown in its 32 bit form, and how it breaks down into the dotted quad format
TCP/IP was originally used on ARPANET, a military network and grow to universities and is now used on virtually every computer system. A. Below are the instructions on installing non-DHCP clients:
Q. Is there a way to trace TCP/IP traffic using NT? A. As part of the Systems Management Server there is a Network Monitor module which enables the entire network to be monitored, also traffic over a modem. There is a limited version of this with NT 4.0 server, however only communications between the server and other computers can be monitored. The Network Monitor Service has to be installed (Control Panel - Network - Services - Add). Q. I do not have a network card, but would like to install TCP/IP. A. Microsoft provide a Loopback adapter that can be used for the testing of TCP/IP. To install the Loopback adapter perform the following actions:
Q. I have installed TCP/IP, what steps should I use to verify the setup is correct? A. Follow the steps below:
Q. How can I trace the route the TCP/IP packets take? A. In general TCP/IP packets will not always take the same route to a destination, however the start of the journey is likely to be the same, i.e. to your gateway, to the firewall etc. The command to use is tracert and the syntax is as follows c:\tracert <host name or IP address>,e.g. 1 <10 ms <10 ms <10 ms 200.200.24.1 200.200.200.24.1
is the gateway Trace complete The first column is the hop count, the next 3 columns show the time taken for the cumulative round-trip times (in milliseconds), the 4th column is the hostname if the IP address was resolved, and the last column is the IP address of the host. It is really like a street map telling each turn to take. An important thing to note is to look for looping routes, so host a goes to b then c then back to a, as this indicates a problem usually. Tracert will not always work with some FireWalls for hosts outside the FireWall. A. As has been shown the IP address consists of 4 octets and is usually displayed in the format 200.200.200.5, however this address on its own does not mean much and a subnet mask is required to show which part of the IP address is the Network ID, and which part the Host ID. Imagine the Network ID as the road name, and Host ID as the house number, so with "54 Grove Street", 54 would be the Host ID, and Grove Street the Network ID. The subnet mask shows which part of the IP address is the Network ID, and which part is the Host ID. For example, with an address of 200.200.200.5, and a subnet mask of 255.255.255.0, the Network ID is 200.200.200, and the Host ID is 5. This is calculated using the following:
What happens is a bitwise AND operation between the IP address and the subnet mask, e.g. 1 AND 1=1 There are default subnet masks depending on the class of the IP address as follows: Class A : 001.xxx.xxx.xxx to 126.xxx.xxx.xxx uses subnet mask 255.0.0.0 as
default Where's 127.xxx.xxx.xxx ??? This is a reserved address that is used for testing purposes. If you ping 127.0.0.1 you will ping yourself :-) The subnet mask is used when two hosts communicate. If the two hosts are on the same network then host a will talk directly to host b, however if host b is on a different network then host a will have to communicate via a gateway, and the way host a can tell if it is on the same network is using the subnet mask. For example Host A 200.200.200.5 If Host A communicates with Host B, they are both have Network ID 200.200.200 so Host A communicates directly to Host B. If Host A communicates with Host C they are on different networks, 200.200.200 and 200.200.199 respectively so Host A would send via a gateway. Q. What diagnostic utilities are there for TCP/IP? A. We have already seen PING and TRACERT, and below is a full list
For more information on these commands just enter the command with a -?, e.g. netstat -? Q. What is routing and how is it configured? A. When host a wants to send to host b, if they are on the same local network then the IP protocol resolves the IP address to a physical address using ARP (Address Resolution Protocol), and the physical address (e.g. 00-05-f3-43-d3-3e) of the source and destination hosts are added to the IP datagram to form a frame, and using the frame, the two hosts can communicate directly with each other. If the 2 hosts are not on the same local network, then they cannot communicate directly with each other, and instead have to go through a router. You have probably already come across a router when you install TCP/IP, as the default gateway is just a router that you have chosen to use as a means of communicating with hosts outside your local network if no specific route is known. A router can be a Windows NT computer with 2 or more network cards (one card for connection to each separate local network) or it can be a physical hardware device, such as Cisco routers. Assuming our two hosts are not on the same local network, host A will check its routing table for a router that connects to the local network of host B. If it does not find a match then the data packets will be send to the "default gateway". In most cases, there will not be one router that connects straight to the intended recipient, rather the router will know of another route to pass on your packet, which will then goto another router etc. For example: Host A - 200.200.200.5 In this example, Host A would deduce that Host B is on a separate network, as its Network ID is 200.200.199. Host A would then check its routing table and see that it knows for network 200.200.199 (the zero means all) it should send to 200.200.200.2. The router would receive the packets and then forward them to network 200.200.199. What actually happens is each router will have its own routing table that will point to other routes. To actually configure a route, you use the route command, for example to configure a root for network 200.200.199 to use router 200.200.200.2 you would type route -p add 200.200.199.0 mask 255.255.255.0 200.200.200.2 The -p makes the addition permanent, otherwise it will be lost with a reboot. To view your existing information type route print. A. ARP stands for Address Resolution Protocol and was touched on in the previous question as a means of resolving a IP address to an actual physical network card address. All network cards have a unique 48 bit address, that is written as six hexadecimal pairs, e.g. 00-A0-24-7A-01-48, and this address is hard coded into the network card. You can view your network cards hardware address by typing ipconfig /all As discussed in the Subnet question, if a packets destination is on the same local network as the senders, then the sender needs to resolve the destinations IP address into a physical hardware address, otherwise the sender needs to resolve the routers IP address into a physical hardware address. When a NT machines TCP/IP component starts, it broadcasts an ARP message with its IP to hardware address pair. The basic order of events for sending to a host on the local network is as follows:
If you are sending to a destination not on your local network, then the process is similar except the sender will resolve the routes IP address instead. To inspect your machines ARP cache, type: You may wish to add static entries for some hosts (to save time with the
ARP requests) and the format is Q. My Network is not connected to the Internet, can I use any IP address? A. The basic answer would be Yes, however it is advisable to use one of the following ranges which are reserved for use by private networks: 10.0.0.0 - 10.255.255.255 this is a single class A network The addresses above are detailed in RFC 1918 (Request for comment). The advantage of these addresses is that they are automatically filtered out by routers, thus protecting the internet. Obviously if you did one day want to part of your network on the internet you would need to apply for a range of IP addresses (from Internic or from your ISP). Q. How can I increase the time entries are kept in the ARP cache? A. The default 2 minutes can be changed by performing the following:
Q. What other registry entries are there for TCP/IP? A. There is a whole knowledge base article on them that may be useful at http://support.microsoft.com/support/kb/articles/q120/6/42.asp . Q. How can I configure more than 6 IP addresses? A. Using the TCP/IP configuration GUI you are limited to 6 IP addresses however more can be added by directly editing the registry:
Q. What are the common TCP ports? A. Below is a list of the most common TCP ports.
Q. How can I perform a migration to DHCP? A. There are only a few basic registry entries that define a client as a DHCP client so an easy way to migrate clients to DHCP is to create a registry script that sets the required values via logon script. You should obviously be careful that there is no overlap between the addresses in the DHCP address pool and those statically assigned. The DHCP service needs to be configured to start at system startup.Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCP\ and change the value entry Start from 1 to 2. TCPIP parameters are defined to each NIC (Network Interface Card). The following is an example registry script you may consider using. If you are unsure of the card service goto HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards\1 and write down the data for the value entry ServiceName REGEDIT4 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\<card
service>\Parameters\Tcpip] You should then add something into the logon script to detect the NIC installed into the computer, run the reg script and request an IP address, e.g. if reg=elpc575 (for the 3com575tx) goto dhcp A quick way to find out which network card you are using is on you LAN you will have various types of NIC. For instance you may have the 3c89d, netflx3,3c575tx for instance for the Neflx3 driver, when the install takes place on the NT 4.0 it adds a registry key in the HKEY_LOCAL_MACHINE\systems\Current control set\system\services\cpqNF31 with the parameters: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CpqNF31\Parameters\Tcpip]
You have to find out what the key name is because it is different for each NIC then you can run kix32.exe and use the arguement: EXISTKEY ( Checks for the existence of a registry key. Parameters Returns $ReturnCode=ExistKey( If $ReturnCode=0 ...to detemine if the key exist and then execute accordingly for that specific card. You may also set the value IPAddress=0.0.0.0 and value SubnetMask=0.0.0.0 for the card service however they will be ignored anyway. Fill in the IPAddress and SubnetMask with 0.0.0.0. Blanking out or deleting the values won't work. Restart the workstation to complete the change. This can also be done using Windows Scripting Host From MS SupportOnline Article ID: Q197424
Q. How do I assign multiple IP addresses to a single NIC? A. It is possible to assign more than one IP address to a single NIC (Network Interface Card). To configure extra IP addresses under NT 4.0 perform the following:
Under Windows 2000 the procedure is the same except to get the TCP/IP protocol properties you need to:
Q. How do I install the Network Monitor Utility? A. Windows NT Server ships with a limited version of the Network Monitor utility which allows you to monitor only traffic to and from the installed box. The full SMS version allows promiscuous monitoring of the network. To install the basic NT version:
The SMS 1.2 version can be installed as part of a full SMS installation by selecting "Install Admin Tools" option and clicking Custom to add the network monitor. It can also be installed directly from the SMS\nmext directory on the SMS 1.2 CD-ROM:
SMS 2.0 version instructions will be added shortly. Q. How do I perform a network trace using NetMon? A. To start Network Monitor select "Network Monitor" from the "Network Analysis Tools" Start menu Programs folder. Once started you will be presented with the initial trace dialog which is split into 4 main windows. Initially the trace will be for all hosts to all hosts however you will probably want to refine this using a filter as follows:
You are now ready to start the search by selecting Start from the Capture menu (or click F10). Once you have collected the data you require stop the search by selecting Stop from the Capture menu (or click F11). An alternative is to select Stop + View data which will stop the trace and show the captured data. The normal method to display captured data is to select "Display Captured Data" from the Capture menu or click F12. A new dialog will be shown will all frames sent between the selected hosts. For more detail about a frame just double click it. It will then give the full frame information and content. Notice you can actually see the data that was sent and full IP and TCP headers can also be inspected. If you start another search it will ask if you want to save the current captured data. You can also manually save by selecting "Save As" from the File menu. Q. Nothing shows up on my NETMON trace, why? A. Netmon is capable of capturing data on all adapters including RAS adapters and by default it will trace the adapter with the lowest MAC address, which would be 000000000000 for a RAS device and thus the default. To change the adapter used perform the following:
Restart your capture. You could check your cards MAC address (if you had several) using the IPCONFIG /ALL command. A. In some situations you may want to monitor traffic for a certain machine but are unable to actually use that machine to perform the network monitor (maybe because of physical location). The Network Monitor agent is installed on the machine whose traffic you wish to monitor and then you can "connect" to it from a machine running the Network Monitor application and capture its traffic. The Network Monitor agent runs as a service and needs to be started on the machine whose traffic you wish to capture. Q. How do I install the Network Monitor agent? A. The Network Monitor agent is supplied with both Windows NT Workstation and Windows NT Server and is installed as follows:
Once the reboot has completed you need to configure the Network Monitor so it starts automatically
To start the Network Monitor Service from the command line use the command C:\> net start nmagent Q. How do I monitor traffic for an agent? A. To monitor traffic from an agent perform the following:
If the connection fails ensure the Network Monitor Agent is running on the remote machine and that you have local Administrator rights on it. You can now perform captures as per normal. To switch back to local just select Networks from the Capture menu and select one of the Local node options. Q. How do I filter captured packets? A. Once you have captured data it is possible to apply a filter to view only certain type of packets:
The data displayed will now be that which matches the specified criteria. Do disable the filter just select "Disable Filter" from the Filter menu. A. IPv6 is the next verions of the Internet Protocol, version 6.0 hence IPv6. Current computers use IP version 4.0 which despite being created in the mid-1970's has done very well however it has reached its limit and is about to run out of addresses and is not the most bandwidth friendly protocol so its time for an upgrade. Below are the 4 main reasons that IP version 4.0 needs an upgrade:
Current IP addresses consist of 32 bits, represented as 4 bytes, dotted-quad format, e.g. 200.200.200.202. IP version 6 uses 128 bits for addresses! IPv6 is defined in the following RFC's (Request for Comments)
Q. How will IPv6 addresses be written? A. Since IPv6 address's are 128-bit and hence four times longer than an IPv4 address, addresses are expressed as: X:X:X:X:X:X:X:X where each X is a 4-digit hexadecimal integer (16 bits) and each digit is 4 bits and so can be between 0 and F (F is 15 in hexadecimal) and so examples of valid addresses would be FEDC:BA98:7654:3210:FEDC:BA98:7654:3210 Notice in the second address you can leave off any leading zeros, but you must have at least one numeral in each part. For example :0800: can be written as :800:. Obviously you may have a large sequence of zero's in the address and so it is possible to have a single gap by writing :: which will fill the gap with zero's, for example 1080:0:0:0:8:800:200C:417A may be written as 1080::8:800:200C:417A 0:0:0:0:0:0:0:1 the loopback address (the same as 127.0.0.1 in IPv6) can be written as ::1. A third format is available, when dealing with a mixed environment of IPv4 and IPv6 nodes is x:x:x:x:x:x:d.d.d.d where the 'x's are the hexadecimal values of the six high-order 16-bit pieces of the address, and the 'd's are the decimal values of the four low-order 8-bit pieces of the address (standard IPv4 representation). Examples: 0:0:0:0:0:0:13.1.68.3 or in compressed form: ::13.1.68.3 The subnet mask is now replaced by a number appended to the network address specifying the number of bits making up the network part (CIDR notation), e.g. ipv6-address/prefix-length: 12AB:0000:0000:CD30:0000:0000:0000:0000/60 Means the first 60 bits make up the network part of the address. When writing both a node address and a prefix of that node address (e.g., the node's subnet prefix), the two can combined as follows: the node address 11AC:0:0:CA20:123:4567:89AB:CDEF can be abbreviated as 11AC:0:0:CA20:123:4567:89AB:CDEF/60 Q. What is the IPv6 header format? A. Below is the specification for the header format of IPv6:
Version - 4-bit Internet Protocol version number. Traffic Class - 8-bit traffic class field Flow Label - 20-bit flow label Payload Length -16-bit unsigned integer. Length of the IPv6 payload, i.e., the rest of the packet following this IPv6 header, in octets. (Note that any present are considered part of the payload, i.e., included in the length count.) Next Header - 8-bit selector. Identifies the type of header immediately following the IPv6 header. Uses the same values as the IPv4 Protocol field [RFC-1700 et seq.]. Hop Limit - 8-bit unsigned integer. Decremented by 1 by each node that forwards the packet. The packet is discarded if Hop Limit is decremented to zero. Source Address - 128-bit address of the originator of the packet. Destination Address - 128-bit address of the intended recipient of the packet (possibly not the ultimate recipient, if a Routing header is present). Notice that the IPv6 header has far less fields than the IPv4 header and IPv6 introduces a number of extension headers as defined in RFC 2460. Q. I am unable to install TCP/IP, why? A. If you are trying to reinstall TCP/IP after previously uninstalling it the problem may be due to certain TCP/IP registry values not being removed correctly. To manually remove perform the following:
An alternative which avoids having to change security is to start regedt32.exe under the System account by submitting it via the schedule service C:\> net start schedule (only if not already running) Once the computer has rebooted restart REGEDT32.EXE and ensure all of the following are deleted (these are the keys whose security you must set) Connectivity Utilities:
SNMP Service:
TCP/IP Network Printing Support:
FTP Server Service:
Simple TCP/IP Services:
DHCP Server Service:
WINS Server Service:
Windows sockets:
It may also be necessary to remove the following keys:
Q. What switches can be used with PING? A. PING is used to test TCP/IP connectivity with another host and gives information about the length of time test data takes to be sent to the host and a reply received. Its most basic use is as follows: C:\>ping <IP address or hostname> Pinging 160.82.52.11 with 32 bytes of data: Reply from 160.82.52.11: bytes=32 time=10ms TTL=252 From the above you can see it send 32 bytes to host 160.82.52.11 and each time a reply was received in 10ms or less, this shows a good connection. PING does have a number of option parameters to accomplish different objectives. ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS] [-r count] [-s count] [[-j host-list] | [-k host-list]] [-w timeout] destination-list
In Windows 2000 you can press Ctrl-Break when running the -t option for a list of statisitics. Press Ctrl-C to actually stop the ping. It can be useful to have a small batch file ping various hosts and terminal servers at regular intervals to ensure all are still present (although there are commercial software packages that do this). A simple command like: C:\>ping -f -n 1 -l 1 148.32.43.23 Pinging 148.32.43.23 with 1 bytes of data: Reply from 148.32.43.23: bytes=1 time<10ms TTL=128 pings a host once with one byte of data. You should be aware that PING works by sending ICMP echo packets and some routers etc may filter these out meaning a PING will not work. Q. How can I modify TCP retransmission timeout? A. Service Pack 5 adds a new registry entry, InitialRtt, which allows the retransmission time to be modified. The range is 0 - 65535 milliseconds and can be set as follows:
This parameter controls the initial retransmission timeout used by TCP on each new connection. It applies to the connection request (SYN) and to the first data segment(s) sent on each connection. Care should be used when adjusting this value. Setting it to large values will dramatically increase the amount of time that it takes for a TCP connection attempt to fail, if the target IP address does not exist. For instance, the default value is 3,000, or 3 seconds. By default, a connection request is retried 2 times. The total time-out is (3+6+12) seconds, or 21 seconds. If this registry value is set to 6,000 (6 seconds), the total timeout will be (6+12+24) seconds, or 42 seconds. During this time, an application can appear to stop responding (hang). A. DHCP stands for Dynamic Host Configuration Protocol and is used to automatically configure a host during boot up on a TCP/IP network and also to change settings while the host is attached. This means that you can store all the available IP addresses in a central database along with information such as the subnet mask, gateways, DNS servers etc. The basics behind DHCP is the clients are configured to use DHCP instead of being given a static IP address. When the client boots up it sends out a BOOTP request for an IP address. A DHCP server then offers an IP address that has not been assigned from its database, which is then leased to the client for a pre-defined time period. If the DHCP client is Windows 2000 and no offer is made and IP auto configuration has not been disabled the client will attempt to find and use an IP address not currently in use otherwise TCP/IP will be disabled. Q. How do I install the DHCP Server Service? A. The DHCP server service can only be install on a NT Server.
Under Windows 2000 to install perform the following:
Q. How do I configure DHCP Server Service? A. The DHCP Server Service is configured using "DHCP Manager" that is installed after the installation of the DHCP Server Service.
Usually items such as DNS servers, WINS server etc will be configured on a global scale and this is also done using Server Manager
Q. How do I configure a client to use DHCP? A. For NT workstation and Windows95 follow the instructions below:
Q. How can I compress my DHCP database? A. NT Server ships with a utility called JETPACK.EXE which can be used to compact DHCP and WINS databases. To compact your DHCP database perform the following:
Note: While you stop the DHCP service, clients using DHCP to receive a TCP/IP address will not be able to start this protocol and may hang. Jetpack actually compacts DHCP.MDB into TMP.MDB, then deletes DHCP.MDB and copies TMP.MDB to DHCP.MDB! Simple :-) For more information, see Knowledge base article Q145881 at http://support.microsoft.com/support/kb/articles/q145/8/81.asp Q. How can a DHCP client find its IP address? A. Depending on the client: Windows NT machine - type ipconfig from the command
prompt Q. How can I move a DHCP database from one server to another? A. Perform the steps below on the server that currently hosts the DHCP Server service. Be warned that while doing this no DHCP clients will be able to start TCP/IP so this should be done outside working hours.
Optionally if you want to remove DHCP from the source machine totally delete the DHCP directory (%systemroot%\system32\dhcp) and then delete the DHCP Service (Start - Settings - Network - Services - Microsoft DHCP Server - Remove) On the new DHCP server perform the following
Q. How do I create a DHCP Relay Agent? A. If you have routers separating some of your DHCP clients from the DHCP server you may have problems if they are not RFC compliant. This can be solved by placing a DHCP relay agent on the local network area which is not actually a DHCP server which communicates on behalf of the DHCP Server. The DHCP Relay Agent must be a Windows NT Server computer.
Q. How can I stop the DHCP Relay Agent? A. All you have to do is stop the DHCP Relay Agent service:
Q. How can I backup the DHCP database? A. The DHCP database backs itself up automatically every 60 minutes to the %SystemRoot%\System32\Dhcp\Backup\Jet directory. This interval can be changed:
You could backup the %SystemRoot%\System32\Dhcp\Backup\Jet directory if you wish. Q. How can I restore the DHCP database? A. Perform one of the following:
Q. How do I reserve a specific address for a particular machine? A. Before performing this you will need to know the hardware address of the machine and this can be found by entering the command ipconfig /all Look for the line Physical Address. . . . . . : 00-60-97-A4-20-86 Now at the DHCP server perform the following
Q. What registry settings control the DHCP log in Windows 2000? A. DHCP has always had auditing abilities for DHCP however these abilities have been expanded in 2000 to reduce problems CAUSED by the log files. These improvements will stop log files filling to take up whole partitions and cause system problems. The following keys are all located under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCPServer\Parameters
Q. How do I authorize a DHCP server in Windows 2000? A. Any user running Windows 2000 server could install the DHCP server service causing potential problems and so Windows 2000 adds the concept of authorizing the servers with the Active Directory before they can service client requests. If the server is not authorized in the Active Directory then the DHCP service will not be started. To Authorize a server perform the following:
The red arrow Q. How do I create a DHCP scope in Windows 2000? A. A DHCP scope is a range of addresses that can be assigned to clients and can also optionally provide information about DNS servers, WINS etc. DHCP scopes are configured using the DHCP MMC snap-in as follows:
The new scope will now be listed and the status as either Active or Inactive. If you selected to not activate the scope it can be manually activated by
right clicking on the scope, select 'All Tasks' and select Activate. The
activation is immediate. Likewise you can deactivate by selecting deactivate Useful links: Q. How do I configure DHCP scope options in Windows 2000? A. When you create a scope the more common options such as DNS and WINS servers can be configured but many more options are available.
The new option(s) will now show in the right hand window. You can change existing options by performing the above and selecting an item already configured and change the details in the Data entry area.
Q. How can I view DHCP address leases in Windows 2000? A. When a client is offered and accepts an IP address a 'lease' is created for x amount of days. To view current leases perform the following:
It will give details of the IP address, client name and the lease expiration date. Expired leases are also shown for approximately one day but have a dimmed icon. This grace period protects a client lease in the event of the client and server being in different time zones, clocks not synced or simply offline. Q. How do I change the DHCP address lease time in Windows 2000? A. To modify the DHCP lease duration from the normal 8 days perform the following:
Q. How do I install the DNS Service? A. The DNS Service can only be installed on NT Server and is installed as follows:
Q. How do I configure a domain on the DNS Server? A. A new application has been added to the Administrative Tools group, DNS Manager, to configure the domain follow the procedures below:
Q. How do I add a record to the DNS? A. To add a record, for example TAZ with IP address 200.200.200.4 perform the following
Q. How do I configure a client to use the DNS? A. For an NT machine (and Windows 95) perform the following:
To test, you can start a command prompt and enter nslookup <host name> The IP address of Taz will be displayed. Also try the reverse translation by entering nslookup <ipaddress> The name Taz will be displayed. Q. How do I change the IP address of a DNS server? A. The information below assumes you have already changed the IP address of the machine ( Start - Settings - Control Panel - Network - Protocols - TCP/IP - Properties) and have rebooted. The scenario below assumes the old IP address was 200.200.200.3 and the new is 200.200.200.8
Update all the clients to use the new DNS server IP address. The above procedure is the most complete way, however it should still work if you only perform steps 2 and 3. Q. How can I configure DNS to use a WINS server? A. Is is possible to configure the DNS to use a WINS server to resolve the host name of a Fully Qualified Domain Name (FQDN).
Q. Where in the registry are the entries for the DNS servers located? A. The entries for the DNS servers are stored in the registry in the location HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters under the NameServer value, Each entry should be separated by a space. Using the Resource Kit utility REG.EXE the command to change would be as follows reg update HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\NameServer="158.234.8.70 158.234.8.100" \\<machine name> where 158.234.8.70 and 158.234.8.100 were the addresses of the DNS servers you wanted to configure. Note it sets the value, it does not append so ensure you enter in the existing DNS servers as well as the new ones. This may be useful for granting users access to the internet by remotely updating their registry to know which DNS servers to use. Q. I receive error message "No More Endpoints". A. This can be caused by installing DNS on a machine that has previous settings contained in the %systemroot%\system32\dns directory. To correct perform the following.
Q. How do I configure DNS for an NT 5.0 domain? - NT 5.0 only A. Windows NT 5.0 domains rely on DNS and require Dynamic DNS which is an update to the basic DNS specification and details can be found in RFC 2136 that can be viewed at ftp://ftp.isi.edu/in-notes/rfc2136.txt. Another major update in DNS 5.0 is the addition of service (SRV) records and these have already been seen as a mechanism for publishing the ldap server, ldap.tcp.<domain> and it is through these records that domains can be looked up through the DNS service. You could perform this on a separate NT 5.0 machine, the domain controller and the DNS server will probably not be the same machine, it just has to exist before upgrading the server to a domain controller. To install DNS 5.0 on the server perform the following:
You then need to configure the DNS service
Now the basic zone is configured the required entries for the domain need to be added
The final stage is to configure the zones to be dynamic update enabled which allows hosts to add records in the DNS server.
DNS is now configured for a domain and you can create the domain. Q. How do I configure Active Directory integrated DNS? - NT 5.0 only A. It is possible to configure DNS servers that are also domain controllers to store the contents of the DNS database in the Active Directory which will then be replicated to all domain controllers in the domain. The option to store the DNS database in the Active Directory is not available on DNS servers that are not domain controllers.
Q. Setting a secondary DNS server as primary results in errors. A. If you have a secondary DNS server configured to duplicate all entries from another DNS server you may experience a problem if you try and set it as a primary DNS server, which results in the service not starting and an error to the effect of the data being wrong: Event ID: 7023 Event ID: 130 Event ID: 133 DNS The DNS Manager forgets to set the correct value for the DNS Type in the registry (secondary is remaining), but it is erasing the address of the primary DNS, where the data came from. To correct this perform the following:
You should now be able to successfully start the DNS service C:\> net start dns The TYPE value can have one of two values, 0x1 specifies Primary zone A fix for this can be downloaded from ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/ hotfixes-postSP3/dns-fix Q. How do I turn off Dynamic DNS? - Windows 2000 only A. By default, the TCP/IP stack in NT 5.0 Beta 2 (and later builds) attempts to register it's Host (A) record with it's DNS server. This makes sense in an all NT (Windows 2000) environment. But if you are using a static, legacy DNS server, the DNS guys might not like all the 'errors' this shows up on their server since the DNS servers will not understand these "updates". You will get errors such as:
To make the clients stop attempting to publish their DNS names/addresses to the DNS server perform the following:
If you have multiple adapters in the machine you may not want to disable for all so instead of setting HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DisableDynamicUpdate to 1, set as 0 and then move to the sub key Interfaces\<interface name> and create the DisableDynamicUpdate value there and set to 1. If you needed to perform this on a large number of machines you should create a reg script or set from the login script. Q. How do I configure a forwarder on DNS 5.0? - Windows 2000 only A. If you create a DNS server on your network but are not the main DNS server, i.e. your company has a central main DNS server, you will want to forward queries your DNS server cannot service to that DNS server. This is because only certain servers in your network will have access to DNS servers outside your network (due to firewalls etc) and thus your (departmental?) DNS server cannot access the DNS servers higher up in the DNS hierarchy. To configure a forward perform the following:
If you are missing the forwarder tab see Q. I am missing the forwarder and Root Hints tabs in DNS 5.0 Q. I am missing the forwarder and Root Hints tabs in DNS 5.0. - Windows 2000 only A. This is caused if your server thinks it is the root server in the domain, and will hence have a "." zone. To enable the forwarder you need to delete this zone from your server:
Q. How do I enable DNS round robin resolution? A. Recent Windows NT service packs introduced LocalNetPriority which tries to return Host resources that are local to the requestor instead of using round robin however round robin can be enabled as follows:
A. WINS stands for Windows Internet Name Service. WINS is a NetBIOS Name Server that registers your NetBIOS names and resolves into IP addresses. If you're using NetBIOS over TCP/IP you will need to have WINS running so that each can find out the correct IP address of the other to communicate. Need to browse over an interdomain network? WINS! A. Once your machine is configured to point at a WINS server (and maybe a second backup WINS server);
A. WINS is a server service. If you have any non-WINS clients, add them in as static name->IP
mappings. NT Workstation TCP/IP->Properties->WINS add the IP address of the WINS server (and your secondary if you have one). Q. What is a WINS Proxy Agent? A. If you have non-WINS machines on your subnet and want
them to be visible participants, you will want a Proxy Agent to be active
within this subnet. Use a Registry Editor (e.g. regedt32.exe) to open HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters and set the EnableProxy parameter to 1. Q. How do I configure WINS static entries for a non-WINS client? A. Go into WINS Manager (under Admin Tools) Q. How do I configure WINS to work with DHCP? A. If the computer is a DHCP client, then at the DHCP server, go into DHCP Administrator (Admin Tools) and add two new SCOPE options:
Q. How can I compress my WINS database? A. NT Server ships with a utility called JETPACK.EXE which can be used to compact DHCP and WINS databases. To compact your WINS database perform the following:
Note: While you stop the WINS service, clients using WINS to resolve addresses will fail unless another mechanism of name resolution is in place. Jetpack actually compacts WINS.MDB into TMP.MDB, then deletes WINS.MDB and copies TMP.MDB to WINS.MDB. For more information, see Knowledge base article Q145881 at http://support.microsoft.com/support/kb/articles/q145/8/81.asp Q. WINS Automatic Backup does not run every 3 hours. A. By default WINS backup will actually take place every 24 to 27 hours after the last backup completed. To work around this perform the following:
Q. WINS Log files are created in incorrect locations. A. The WINS service creates a number of log files, J50.log or J50.chk, in the %systemroot%\system32\WINS directory. This is normal. If these files are being created in other directories then it may cause a problem and stop the WINS service from starting. The log files can be created in different directories from one of the following reasons:
If your system now has the log files in the wrong place and the WINS service will not start just copy the log files to the %systemroot%\system32\WINS directory and restart the service C:\> net start wins If the WINS service is running it will lock the file and you will not be able to delete them so you should perform the following:
Q. WINS server is not being queried for entries in LMHOSTS after Service Pack 4. A. Before Service Pack 4 a resolution request was always passed to a WINS server and only if no entry was found the LMHOSTS file checked. Under Service Pack 4 any entry in the LMHOSTS file that has the #PRE qualifier (preloaded) will be used and the WINS server not queried. Therefore if you have incorrect entries in your LMHOSTS file it will prevent the WINS server from being queried so you should therefore edit the file %systemroot%\system32\drivers\etc\lmhosts (e.g. d:\winnt\system32\drivers\etc\lmhosts) and remove the offending entries. Q. The Outlook/Exchange client takes a long time to start. A. Sometimes the protocol binding for Exchange can be wrong if more than one protocol is installed, for example if you have NetBEUI and TCP/IP installed, and you connect to the Exchange server via TCP/IP, you need to ensure TCP/IP is first in the binding order, otherwise Exchange will attempt to communicate via NetBEUI initially. To check/set perform the following:
Q. How can I stop Outlook dialing my Internet Account on Startup? A. Perform the following:
A. The following instructions are to install Exchange 5.0
It is a good idea to have a large pagefile.sys when running Exchange, a good size would be the amount of memory plus 100. Q. How do I enable the Exchange Active Server Pages? A. This functionality is new in 5.0, and enables a user to view their exchange mailbox from an Internet browser, such as Internet Explorer or Netscape. Before the Exchange Active Server Pages extension can be installed, there are two pre-requisites
NT Server 4.0 ships with IIS 2.0, therefore assuming you have not upgraded your system since then you will need to perform the following
Once this has finished, you will be able to connect to your Exchange mailbox by entering the URL http://<Exchange server>/exchange You then need to enter you Exchange alias and then click the "click here" text. Q. How do I use the Exchange Optimizer utility? A. After you install Exchange you are prompted to run the Exchange Optimizer utility, however it can also be run afterwards:
Q. How can I convert mail system X to Exchange? A. Exchange is supplied with a migration wizard which can convert the following mail systems to Exchange
The wizard is in the Microsoft Exchange folder and below is an example of converting a MsMail Postoffice
Q. How can I create shortcut on the desktop with the "to" field completed? A. As you may be aware, if you enter the command
If you now double click on the desktop message icon it will create a new message which you can edit and then send with information already filled in! Q. NT Server hangs at shutdown if User Manager is running. A. This is caused by an Exchange dll file which is used by User Manager, to fix this perform the following
Q. How can I send a mail message from the command line? A. You need to use the MAPISEND.EXE utility that is supplied with the Exchange Resource kit. The resource kit can be downloaded from http://www.microsoft.com/msdownload/exchange/rkintel/rkintel.htm and you need to download the AdminNT part. Once downloaded double click on the zip file and it will expand to a specified location. Copy the MAPISEND.EXE from the restored path (i386\admin\mapisend) to an area of your choice. The usage is simple as long as the exchange client is installed on the computer already (outlook is also OK). mapisend -u "<profile>" -p <anything> -r <recipient>
-s "<subject>" -t <text file containing the message> This is just an example usage, and you may not be sure what you profile name is so instead of using -u and -p, use just -i and this allows interactive login and will also allow you to create a profile which you can then use in future. The full list of switches are
In all cases if the passing parameter is more than one word it should be enclosed in quotes. Q. What files does Exchange use? A. Below is a list of the more common files used by Exchange
Q. How can I change the location of my mail file in Outlook 98? A. Your messages are stored in a .pst file, and by default this is kept in your personal profile space (%systemroot%/Profiles/<user name>/Application Data/Microsoft/Outlook). This is fine unless you use roaming files which mean you mail file is stored on a central server taking up space. Fortunately moving you mail file is easy.
What this actually does is update one registry key, HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings\14780fd532f9d11181cc00600851c569\001e6700 and its value is the name and location of the .pst file. Q. How can I reduce the size of my mail file? A. When you delete files from your mail file the space is usually not cleared away and your mail file may actually grow! To reclaim the wasted space you can "compact" the mail database. The information below is for Outlook 98 but previous versions have similar functions.
If you find the mail file has not been substantially reduced in size it may be there is no redundant information or you may need to run the compaction a couple more times as sometimes the process does not work 100%. Q. I have a bad message in my POP3 mail box , how can I remove it/read POP using TELNET? A. It is possible to connect to a POP3 mailbox using Telnet so you should connect via telnet and delete the problem message.
This is obviously useful in a number of scerios and you could use it just to read you mail if you did not have access to a mail client. Below is an example of the above in action. Q. How can I send mail to a SMTP server using Telnet? A. As with POP3, SMTP messages can also be sent using telnet by connecting to port 25 on the SMTP server, e.g. C:\> telnet smtp.savilltech.com 25 Once connected you optionally announce to the server who you are (this is needed for some SMTP servers) helo <domain> vrfy <user account> Once you are verified you can commence to write an e-mail message. The first command is mail and you specify who it is from, e.g. mail from:<billg@microsoft.com> The address has to be in <>. Next you have to specify who will be receiving the message using rcpt, e.g. rcpt to:<john@savilltech.com> The from and to have been completed you can start the body of the message using the data command. You have to create the header information in the first lines of the message. Once you have completed the message enter a '.' on a blank link and the message will be sent. Below is an example creating a message. As you can see I entered a from, date, to and a subject and then entered the body of the text. Make sure you don't make a mistake as if you backspace this is enterpreted as a bad character and will be rejected. If a message is rejected a rejection will be send to the address specified in the "mail from:<...>" and for this reason you should only ever put your e-mail address. Although I have used a different address as a joke you should NEVER do this. Below is how the message looks when received in Outlook 98: The above shows how easy it is to send a message and make it look from a different address but if you examined the header you would easily see it was sent from a different mail server and rumble its a fake (and a very bad one)! I shall be adding future entries describing how to STOP people sending mail from your server (as they probably can at the moment). For full information on SMTP and the commands you can use see Request For Comments 821. Q. Is there a list of known Exchange Directory and Information store problems? A. An excellent collection has been compiled and is located at http://support.microsoft.com/support/exchange/content/whitepapers/dsis.asp Q. How do I install Exchange Server 5.5? A. These instructions are to install the first Exchange Server in the Enterprise Before you install Exchange Server 5.5, two accounts need to be decided on. The first account is the account that you log on as when you perform the installation of Exchange as this account will be automatically granted the Exchange Administrator permission. The second account needs to be created and this will be used as the service account for running the Exchange Server services. Any name can be used, the most obvious would be "Exchange Service". To create this account perform the following:
Under Windows 2000 this would be set using the Active Directory Users and Computers MMC snap-in, expand the domain, right click on Users and select New - Users. Enter Exchange Service, click Next and then select the options as in step 4 and click Finish. I found under Windows 2000 I had to make the Exchange Service account a member of the local Administrators group on the server Exchange is being installed on. Also before installing make sure you have a complete backup of your system. Now you can start the installation.
Once Installation is complete you should run the Microsoft Exchange Performance Optimizer (Start - Programs - Microsoft Exchange - Microsoft Exchange Optimizer). You will be given the option to run this automatically if installation is successful. Q. How do I run the Exchange Optimizer? A. Exchange ships with a utility that allows the program to gather information about the computer and make changes to the Exchange configuration to enhance performance. These performance enhancements are primarily gained by moving the files that make up Exchange to different physical disk drives.
Q. What Service Packs are available for Exchange? A. Below is a list of the service packs available: Exchange 5.5 Service Pack 2 from ftp://ftp.microsoft.com/bussys/exchange/exchange-public/fixes/Eng/Exchg5.5/Sp2/Server/ Files to download:
Service Pack 1 from ftp://ftp.microsoft.com/bussys/exchange/exchange-public/fixes/Eng/Exchg5.5/SP1/Server/ Files to download:
Hotfixes post Service Pack 1
Exchange 5.0 Service Pack 1 from ftp://ftp.microsoft.com/bussys/exchange/exchange-public/fixes/Eng/Exchg5.0/Sp1/Server/ Files to download:
Service Pack 2 from ftp://ftp.microsoft.com/bussys/exchange/exchange-public/fixes/Eng/Exchg5.0/Sp2/Server/ Files to download:
Q. How can I retrieve mail from a POP3 mailbox and forward it to Exchange server? A. If your ISP does not support ETRN, then you have to use a third party utility to retrieve the mail from a POP3 mailbox. One of these utilities is Mail essentials Small Business (http://www.gficomms.com). For one mailbox this is a freeware utility. A more complete listing of utilities can be found on http://www.slipstick.com Q. How do I upgrade from Exchange 5.0 to 5.5? A. The Exchange 5.5 upgrade process actually performs a database upgrade before it actually copies any of the code of 5.5 to the server. This allows for a complete rollback in case the upgrade of the database fails. Below are the steps in performing the upgrade
Q. How do I uninstall Exchange? A. To uninstall Exchange perform the following. Be aware you will lost all information.
Q. How do I install a duplicate Exchange server? A. With the concepts of sites in Exchange, it is possible to install multiple Exchange services in a site which will replicate to one another. Duplicates servers in a site provide fault-tolerance and load balancing. To install a duplicate server in a site perform the following. Servers within a site don't have to be in the same domain but should be connected by a fast connection, 128KB is the normal definition of a fast link.
You now have a duplicate Exchange server in the specified site. Q. How do I connect Exchange sites? A. If you configure multiple sites by installing new servers and entering a different site name (but the same organizational name) you can connect the sites using Exchanges built-in site connector. To connect sites using the built-in connector they must be able to communicate via RPC calls and to test this see Q. How can I check if servers can communicate via RPC's?. Many routes actually filter out RPC's so it is important you perform this test. To add a connector between sites perform the following:
The connection will now be visible under the Connections tab. Q. Exchange Security Knowledge Base list. A. Below is a list of useful Knowledge Base articles. 1) How to install Exchange 5.5 with support for V1 and V3 Certificates for SMIME and Public/ Private Key encryption (Signing and Sealing Mail Messages). This uses the CA version 1.0 (Certificate Authority) in IIS 4.0 that comes in the NT 4.0 Option Pack. This requires the Updated CA Server. See these KB's. Q192044
Setting Up X509v3 Certs on Exch 5.5 SP1 KMS with Local CertSrv 2) How to setup SSL/TLS between between Exchange Server 5.0 /5.5 and Internet Email Clients, POP3, IMAP4, NNTP, HTTP, SMTP. Q175439 XFOR: Enabling SSL For Exchange Server 3) How to setup SSL/TLS between Exchange Server and other SMTP (non-exchange) host. This requires enabling SSL for the SMTP protocol first. See Q175439 for instructions, but select SMTP as the Protocol to be used in Key Manger. Q174755 XFOR: Connecting IMS to IMS with SASL 4) When you use Microsoft Outlook Express to connect to Microsoft Exchange Server, version 5.0 with Service Pack 1 installed, the Information Store may stop responding (crash). Fixed in the Latest Service Pack. Q166627 XCLN: Outlook Express Crashes Store When SSL Is Used 5) When trying to access a mailbox in Internet Explorer version 3.02 when the WWW Service for the Internet Information Server (IIS) computer is configured to use Windows (NTLM) authentication only, you may receive the following error message: The Login Request was Denied. Fix is to upgrade to IE 4.0 or use Registry Entry. Q173307 XWEB: "The Login Request was Denied" Error Message 6) If you configure the Internet Mail Service on two Microsoft Exchange Server computers to use Secure Sockets Layer (SSL) without authentication, you may receive a non-delivery report (NDR) when you attempt to send mail from one server to another through the Internet Mail Service. The text of the NDR includes a 505 error and indicates that authentication is required for the message to be delivered. Fixed in the Latest Service Pack for 5.5. Q181481 XFOR: Non-Delivery Report When Using SSL Without Authentication 7) On July 17, 1998 Microsoft released an updated version of Schannel.dll. This latest version provides the following benefits: Updates the SChannel.dll used by IIS and Exchange Server for Encryption. See article for Details. Q148427
Generic SSL (PCT/TLS) Updates for IIS and MS Internet Products 8) Microsoft Proxy Server is designed to work well with other servers like Microsoft Exchange Server. Most Windows Sockets server applications are able to use the server proxy feature while installed on or behind the Proxy Server. Certain additional advanced settings may be required, based on your particular internal server configuration. Q181420
How to Configure Exchange or Other SMTP with Proxy Server 9) This article discusses the known TCP/IP ports (TCP and/or UDP) that are used by services within Microsoft Windows NT version 4.0 and Microsoft Exchange Server version 5.0 and 5.5. Q150543 WinNT, Terminal Server, & Exchange Services Use TCP/IP Ports [crossnet] 10) Microsoft Exchange Server versions 5.0 and 5.5 support a variety of Internet-focused protocols, including POP3, HTTP, LDAP, and NNTP. This article explains the different authentication forms for each protocol. Q175440 Protocol Authentication on Exchange Server [exchange] Q. How do I configure Exchange Directory Replication? A. Once you have connected sites by a connector, be it Exchange, X.400 or Dynamic RAS, no data will be replicated until you configure the directory replication. You must have defined connections between the sites before Directory Replication can be configured. To configure Directory Replication perform the following:
The Directory Replicator between the sites is now configured and can be modified by double clicking on the replicator as part of the Directory Replication folder. Q. How do I monitor an Exchange link? A. It is possible to install link connectors which can be configured to perform a number of actions in the event of a link failure.
Q. How do I delete a server from an Exchange site? A. If you have multiple servers in a site and a server no longer exists you can delete it from the Exchange Administrator program by performing the following:
The server will now be removed. Q. How do I setup an Exchange forward? A. A forward can be configured in a number of places. The first place is at the Exchange server:
People will now be able to send mail to this person and it will be forwarded accordingly. You could also in Exchange Administrator setup a Custom Recipient (as above), then in the Delivery Options for your mailbox set an Alternate Recipient which points to the Custom Recipient that you just created. Select the "Deliver messages to both recipient and alternate recipient" checkbox. In the properties for the custom recipient you can select the option to hide it from the address list. Other options that can be done at the client end include
Q. How do I configure a X.400 Exchange connector? A. Aside from the native Exchange Connector, the X.400 connector is the most common Exchange connector, allowing Exchange to connector to non-Exchange systems. While X.400 suffers a 20% drop in performance in comparison to the native Exchange connector it is still impressive. X.400 is a common standard and Exchanges implementation is based on the 1988 standard. X.400 operates on the MTA stack and has to be installed before installing a X.400 connector. MTA stacks are available for TCP/IP, X.25 and TP4. It is available for RAS as well but that stack does not support X.400. In this walkthrough we will look at implementing X.400 over TCP/IP. Only Exchange Enterprise edition has the X.400 connector and not the standard edition (also Enterprise has the SNADS and OV/VM(PROFS) connectors which standard does not have). If you only have standard edition and require X.400 connector you will need to upgrade. The first step is to install the MTA transport stack
If you find you don't have a number of MTA stacks check you installed the X.400 connector at installation time. Re-run setup and click Add/Remove. Select Exchange Server and click Change Options. Check the "X.400 Connector" box and click OK. Click Continue. You will now be able to install the TCP/IP MTA stack. Now the MTA stack is installed you can install the actual X.400 connector and configure it accordingly.
You now have a functionality one-way X.400 link. You would now need to repeat the above for the opposite directory. Q. How do I allow a user to administer Exchange? A. When Exchange is installed the user who performs the installation is granted Exchange Administrator rights. To grant additional users the ability to administer Exchange perform the following:
The user (or group) will now have the granted rights to Exchange. You may want to create a group, e.g. Exchange Admins, grant this access in Exchange, then Add/Remove users to this group. Q. How do I grant permission for people to create top level public folders? A. By default all users can create top level folders however this can be changed if you would like to restrict this
Alternatively you could have left is as All and modified the list of people who should not be able to create top-level folders. If people are still logged in they will be able to continue to create top-level folders until they close Outlook/Exchange and restart it. Q. How do I create public folders? A. Public folders are administered/created using the 32-bit Exchange clients such as Exchange and Outlook. To create a top-level public folder perform the following:
To create non-top level folders just select the folder that you wish to be the parent and select New - Folder from the File menu. You will then be able to name the sub-folder as with above. Q. How do I connect my Exchange server to a SMTP server? A. Exchange Server 5.5 ships with the Internet Mail Service which allows Newsgroup feeds and, among other things, connections to a SMTP mailbox. You will need a connection method to the SMTP mailbox, for example a RAS dial-up connection to an ISP. If you are connecting via a firewall make sure the ports used by POP and SMTP and not disallows (ports 25, 110 and 995). Before doing any of this you should ensure DNS is correctly configured for you local domain (or this may be done by the ISP) by adding a MX record for the Exchange server in DNS (this is not needed if you are connecting via a RAS dial-up connection and just connecting to a specific host). In this example we will connect to a SMTP mailbox at a ISP.
To configure items such as the dial-up account username and password double click on "Internet Mail Service" under Configuration\Connections, select the Dial-up Connections tab and click Logon Information. From this tab you can also configure time-out and how ofter to dial out. If you have problems try applying Service Pack 1 which I found fixes a number of problems. Q. How do I connect my Exchange server to a NEWS feed? A. Exchange Server 5.5 has the ability to accept a news feed and publish to the Public Folders area. It can also be configured to post back any articles posted by your networks user to the appropriate news server.
It will now connect for the first time and get an initial feed for all newsgroups selected.
Clients will now be able to view via the Folders List in Outlook, Public Folders - All Public Folders - Internet Newsgroups - microsoft ..... You can change any details but double clicking on the appropriate Newsfeed entry under Connections. For example click Schedule allows you to specify how often to connect at certain times of the day/days of the week. If you are connecting via dial-up you can change the time-out parameter as follows:
Q. What web sites have good Exchange information? A. Below are a list of some of the best sites I have found
Good Downloads are:
Q. How do I download to Exchange from multiple POP3 mail boxes? A. Exchange does not really support the downloading of mail from POP3 since you would be asking a Server to act like a client. A 3rd party piece of software called PULLMAIL which can be downloaded from http://www.swsoft.co.uk/pullmail can be used to download from a POP3 mailbox and deposit in an Exchange mailbox. Using the command procedure below it can be made to download from multiple POP3 mailboxes and depost in the correct mailbox. Enter the following into file getmail.cmd and save.
The next step is to create the file that GETMAIL.CMD will read in, POPUSERS.DAT. Below is an example. GETMAIL.CMD expects to find the file in the %systemroot% directory (e.g. d:\winnt) however you can change that by altering the "SET POPUSERS=.." line. POPusers.dat Q. How do I install the Key Management Server? A. Key Management Server allows secure e-mail via both signed and encrypted messages. To install perform the following:
You will notice whether you choose to store the password a single file kmserver.pwd will be created with a single word in, for example: SWOBRQSBQZPSPQC The final step is to configure the Key Management service to start automatically at reboot time.
Q. How do I manage the Certificate Authority of Key Management Server? A. This is managed through the Exchange Administrator program as follows but make sure that the Microsoft Key Management service is running (Start - Settings - Control Panel - Services)
To change your CA password perform the above then:
You can also add new KM administrators from the Administrators tab Q. How do I enable advanced security for a user? A. By default users do not have advanced security after GM server is installed. To enable for a user perform the following actions
To allow the key to be sent via e-mail to the user perform the following:
Now notify the recipient to read their mail or give them the password and they should perform the following:
Options for which security to use, signing or encryption can be set using the Security tab of the clients Options dialog or on an individual message basis by clicking the Options button. Q. How do I automatically create an Exchange mailbox for all members of the domain? A. Exchange can import users from a comma-separated-file (CSV) of the format: Obj-Class,Common-Name,Display-Name,Home-Server,Comment Exchange has the ability to generate this file from either a NT domain listing or a NetWare account list.
The file generated has ALL accounts in the domain (as can be seen in the example), for example Exchange service accounts, guest account, IIS accounts so you may want to edit the file generated and remove the lines for whom accounts should not be created. Once the file has been edited to satisfaction perform the following:
Every member of your domain now has a mailbox on the Exchange server. In larger domains with multiple Exchange sites you may edit the file and import some people into one Exchange site and others into a different site depending on their geographical location. Q. How do I avoid having to enter the Key Management password? A. If you have the Key Management Server installed each time you start the KM service you have to either insert a disk with the password on or manually enter it depending on your configuration. It is possible to configure the service to look on the hard disk although this is not recommended due to security reasons however on development systems this may be OK.
Next time the service is started it will look for the password file on the local harddisk and not prompt for a disk to be entered. Q. I archived some .pst files to a CD-ROM but unable to load the files. A. When Outlook opens a PST file it needs write access so you will be unable to load a file from a read-only media such as a CD-ROM drive. To resolve simply copy the file to a writeable media and read accordingly. Messages can be send to a .pst file by using Outlooks archive function. To open with Outlook 98 select File - Open - Personal Folders File. Q. How can I limit Exchange mailbox size? A. Exchange comes built in with the ability to limit and notify of quota violations. To set the limits perform the following:
Individual limits can be set for users by double clicking on them under the Recipients branch and selecting the "Limits" tab. Under "Information Store storage limits" sections unselect the "Use information store defaults" and set explicit values for the user. Useful for your own mailbox ;-) Now the values for the warning have been configured you must tell the system how often to warn the mailbox owner.
If a client exceeds the limit they will be given warnings to the effect of If the client does not have the helpful Office Assists enabled they will just get a normal dialog box. A message from the "System Administrator" with the conditions of the mailbox quotas will also be sent: Your mailbox has exceeded one or more size limits set by your
administrator. Mailbox size limits: You may not be able to send or receive new mail until you reduce your mailbox size. To make more space available, delete any items that you are no longer using or move them to your personal folder file (.pst). Items in all of your mailbox folders including the Deleted Items and Sent Items folders count against your size limit. You must empty the Deleted Items folder after deleting items or the space will not be freed. See client Help for more information. Q. How can I limit message sizes in Exchange? A. Maximum size limits can be set on the Message Transfer Agent (MTA) for inter server traffic by selecting the General tab of the MTA configuration dialog of the server. The message would then be returned to sender in the event of the message being to large however for the people on the same server this limit is not used. Limits can also be set on a per user basis for all traffic:
Q. How can I undelete mail in Outlook? A. When you delete an item from the Outlook client (and its been removed from the Deleted Items folder) it is actually kept on the Exchange server for a set amount of time (Exchange Server 5.5 and above only), obviously this only applies if the mail is from an Exchange server, if you use Outlook to download from POP3, IMAP etc this does not work. Mail and can be recovered as follows:
To change the number of days Exchange stores deleted items for perform the following:
![]() Q. What workflow software is available for Exchange server? A. Workflow software is a tool to manage and automate business processes such as order processing, purchasing, support and sales. Using Microsoft Exchange Server or an SMTP/POP3 server and third party workflow software, you can easily implement powerful workflow applications that will streamline and decrease the cost of a business process. There are several third party workflow packages available for Exchange server. A few of them are
For a complete list please go to http://www.exchangesoftware.com/ or for more information on workflow, go to http://www.workflowsoftware.com. Q. How do you add an additional Global Address Book or another view to the global address book? A. This would be useful so, for example, you could separate out vendors email addresses (internet mail) from your actual post office users. This can not be done easily. You would have to create Address Book Views. This would divide GAL any way you wanted based on criteria that you provide. But you have to assign search rights to everyone and if you make one mistake, NO ONE will be able to see anything of Address lists Here is the procedure for setting up Container Level Search Control using Address Book Views. This allows you to create virtual Exchange Server organizations within a single Exchange Server organization or site. This is useful if you have multiple companies or departments within one Exchange Server organization and you want to prevent these companies or departments from viewing the mailboxes of other companies or departments in the Global Address List. To set up Container Level Search Control using Address Book Views, perform the following steps:
NOTE: Before changing the rights of the Exchange Service Account, make sure that at least one other Windows NT account or group has at least the Permissions Admin Role on the Organization object. After you perform these steps, you should be able to log on to an Exchange Sever mailbox. Open the Address Book and choose "Show Names from the:" Global Address List. You should only see mailboxes and/or custom recipients from the Address Book View that your mailbox is associated with. This will not work for any mailbox whose associated Windows NT account has permissions on objects that give them inherited rights to the Address Book Views. These mailboxes will still be able to view the complete Global Address List. Q. How do I delete a bad Schedule + message? A. When users free busy information that is not being published to the Schedule+ Free Busy public folder server correctly or free busy information shows free even though a user has appointments you may need to remove the "stuck" or corrupted messages in the Schedule+ Free Busy hidden public folder. To resolve this use mdbvu32 to remove the corrupt message. Mdbvu32.exe is on the Exchange Server CD in the support/utils directory.
MDBVU32 STEPS
If the information is still not visible go back to step 1 on using mdbvu32 to look at the schedule+ free busy information again check to make sure that 2 messages don't exist. If they do follow steps to remove and complete the process again. Q. How do I link Exchange 5.5 and the Windows 2000 Active Directory? A. The latest beta of Windows 2000 ships with the Microsoft Active Directory Connector (ADC) which replicates a hierarchy of directory objects between the Exchange Server 5.5 directory and the Windows 2000 Active Directory. But first a potential problem: Protocol 389 is used for LDAP communication but if you are running Windows 2000 and Exchange 5.5 on the same computer then you may find Exchange has problems starting the LDAP directory service and thus stopping you creating the connection. To get around this change the port the Exchange LDAP service uses by double clicking LDAP under <Org>\<Site>\Configuration\Protocols and change the protocol, e.g. to 1020. Restart the Exchange Directory service for the change to take effect. Exchange 5.5 with Service Pack 3 allows you to change the port used by LDAP SSL. Also if you install Exchange 5.5 on a 2000 domain controller you must make the Exchange Server account a member of the local Server Operators group. Back to ADC :-) The software is under the VALUADD\MGMT\ADC directory of the Windows 2000 CD. To install perform the following on the Windows 2000 domain controller:
A new icon 'Active Directory Connector Management' will have been added to the 'Administrative Tools' branch. Now we need to setup a connection agreement between the Exchange Server and the Active Directory:
Now changes will be replicated between the Exchange and Windows 2000 directory services. Q. What is the upgrade to large table option in Outlook? A. Microsoft Outlook 98 has a feature, "Allow upgrade to large tables," for Personal Folder (.pst) files. This feature increases the limit on the number of folders per file and the number of messages per folder in a .pst file. The limit has been increased from approximately 16,000 folders per file and messages per folder to approximately 64,000. This upgrade is permanent and cannot be undone. To enable the upgrade on the Internet Mail Only version of Outlook 98 perform the following:
To enable on the Corporate Workgroup version:
Q. How can I disable the Journal in Outlook? A. The Journal function in Outlook can be used to track document changes and openings, mail actions, meetings and task management however it can take up a large amount of space if not archived regularly. If you don't want the features of the Journal it can be disabled as follows:
No records will be written to the journal now. If you want to delete all current Journal information select the Journal branch, right click on each entry type, for example Microsoft Word, and select Delete from the context menu. Q. Internet Mail Server hangs on start-up, ID 7022, why? A. A FAQ reader recently brought this to my attention who after changing RAS in the network applet to only dial out and rebooting the server the NT event viewer showed an error message saying that The Internet Mail Server hung on start up ID7022. This occurs even if you install Exchange server to NT4 where RAS incoming call handling is disabled. The RAS setting was changed and the event was still generated. This was resolved by re-enabling the Incoming and outgoing dial access in RAS-> Network -> control applet. In Control panel -> Services selecting RAS Connection manager and setting it to start up as automatic and RAS Access Server and setting it to start up as automatic. Q. How can I search my Exchange stores for virus infected messages? A. After the problems with the recent Melissa virus, Microsoft have produced a utility which can search your Exchange store for messages which have been infected with a virus and clean them. This will not in any way prevent the virus from being introduced into the email system, you should ensure you are running anti-virus software to prevent the virus infecting your message stores. The utility can be downloaded for Exchange 5.5 and 5.0 for both Intel and Alpha Once downloaded the self extracting file produces two files, ISSCAN.EXE and the symbol file ISSCAN.DBG. Once you copy the files to the server running Exchange it is used as follows (you don't need to copy the .dbg file) For Exchange 5.5
ISSCAN will create a report called either isscan.pri or isscan.pub, depending on whether you are scanning a private store or public store. This report will include the attachment's filename that is deleted, and the sender of a message that is deleted. You can then use this information to determine the users computers who may need extra attention. This utility is very powerful and can be very constructive or destructive depending on how it is used. Please use with caution and consider every action twice before implementing. There is no undo so restoring a backup is the alternative if a problem occurs. It is recommended that you do not use this utility until a known good backup is secured. Q. How do I create an Outlook vCard? A. Microsoft Outlook supports the use of vCards, the Internet standard for creating and sharing virtual business cards. In Outlook, as well as other e-mail applications and personal information managers, you can save a contact as a vCard or save vCards sent in e-mail messages. To create a vCard to be attached to all outgoing messages perform the following under Outlook 98 and Outlook 2000:
All outgoing mail will now have your signature and vCard attached. Q. How can I configure Outlook to be the default mail client? A. Outlook 98 and Outlook 2000 will prompt you when starting to set as the default mail client if they are not already configured as such however if you checked the "Don't ask me this again" box you cannot display this dialog. To force Outlook 98 and 2000 to check type the following: C:\> "c:\program files\microsoft office\office\outlook.exe" /checkclient Click Yes to the "Outlook is not currently your default manager for Mail and News. displayed message. Clicking Yes updates the following registry entries which you can also manually update (and will need to for older Outlook clients such as Outlook 97)
Q. How do I install a digital signature in Outlook? A. A Digital ID, also known as a digital certificate, is the electronic equivalent to a passport or membership card. It is a credential, issued by a trusted authority, that you can present electronically to prove your identity or your right to access information. There are a number of authorities who can grant these certificates, VeriSign is the Microsoft preferred certificate provider. To request a digital certificate perform the following:
You can now configure Outlook via the Tools - Options - Security to attach a digital signature to every outgoing message or it can be manually added to messages individually. More information on this can be found at http://www.verisign.com/securemail/outlook98/outlook.html. If you have multiple machines with Outlook you can install your digital certificate on them by exporting the digital certificate and then importing on the others as follows: On the machine with the certificate installed perform the following:
On the other machines copy the digital ID file created and perform the following:
Q. How do I create a distribution list in Outlook 2000? A. Outlook 2000 introduces the ability to create distribution list and populate with people from your contacts list. To create a distribution list perform the following:
The empty distribution list will now be shown. To add members perform the following:
Distribution lists can be identified as they are shown in bold. Q. How can I add a disclaimer to each outgoing mail at server level? A. You can't do this in Exchange server. You would have to use a third party application such as EMail Essentials for Exchange. To setup a disclaimer in Mail Essentials perform the following:
All outgoing mail will now include the disclaimer at the bottom. Q. How I can I block mail with certain attachments or certain words at server level? A. You can't do this in Exchange server. You would have to use a third party application such as EMail Essentials for Exchange or Mimesweeper. To setup a the content checking feature in Mail Essentials;
Administrators/supervisors can then check the mail and either approve or reject it. Q. How can I automatically compress all outbound mail to save on bandwidth? A. You would have to use a third party product to do this. Two of these are A. Internet Information Server (IIS) is a World Wide Web server, a Gopher server and an FTP server all rolled into one. IIS means that you can publish WWW pages and extend into the realm of ASP (Active Server Pages) whereby JAVA or VBscript (server side scripts) can generate the pages on the fly. IIS has fun things like application development environment (FrontPage), integrated full-text searching (Index Server), multimedia streaming (NetShow), and site management extensions. Q. How do I install Internet Information Server? A. IIS 2.0 is supplied with Windows NT Server 4.0. It can be installed at the time you installed NT 4.0 by checking the "Install Microsoft Internet Information Server" box, alternatively it can be installed at a later time by performing the following
Internet Information Server 3.0 is supplied on the Service Pack 2 CD-ROM and as part of Service Pack 3. It is supplied as an upgrade, so you must already have IIS 2.0 installed before applying the service pack. Internet Information Server 4.0 is now supplied with Option Pack 4 and IIS 5.0 with Windows 2000! Q. What is Internet Service Manager? A. If you look under Programs->Microsoft Internet Server, you will find the Internet Service Manager. ISM is used to configure and monitor IIS. With ISM you can define user connections and user logon and authentication, the home directory location for each IIS service, logging and security. A. It gives the ability to perform full-text searches and retrieve information from a Web browser. It can search HTML, text, and all Microsoft Office documents. When started, it builds an index of the virtual roots and subdirectories on your Web server. You can select which directories and file types can be skipped. The index is updated automatically whenever a file is added, deleted, or changed on the server. Q. What are Active Server Pages? A. ASP is server-side scripting. You can use ASP to create and run dynamic, interactive, Web applications. When your scripts run on the server, the SERVER does all the work involved in generating the HTML pages. Q. How can I configure the Connection Limit? A. This is configured using the Internet Service Manager and can be between 1 and 32,767
Q. How do I change the default file name? A. The default file name is the file searched for if only a directory name is specified and can be changed by performing the following:
Q. How can I enable browsers to view the contents of directories on the server? A. By default if you select a directory on a server and no default file name exists then an error is returned. It is possible to change this behavior to instead of an error a directory listing is displayed
You can only set this for the whole site, not on a per directory basis. If you want to set this on a directory basis enable the directory browsing and make sure the default file name exists in directories you do not want people to be able to browse. Q. How can I configure the FTP welcome message? A. Using the IIS admin utility a welcome, end and connect refused message can be displayed
Q. How do I configure a virtual server? A. It is possible using Windows NT to bind multiple IP addresses to one network card and for each IP address it is possible to run a virtual domain server. The procedure below will add an IP address, add the new IP address as a domain and setup the new IIS virtual server. To bind an additional IP address to your network card perform the following:
You now need to configure the DNS server to respond to the new name.com with the new IP address
Next update the IIS server to support the new domain
You will now be able to browse to this domain. Under Windows 2000 (IIS 5.0)
Q. How can I administer my IIS server using a web browser? A. IIS comes with a built in HTML version of Internet Service Manager, with an address of <server name>/iisadmin/default.htm. It does have to be installed. To check if its installed start the browser and move to the \iisadmin\default.htm and if you see the Internet Server Manager page but with no graphics, e.g. To install perform the following:
If your default file name is not default.htm you may have a few navigation problems, if you do just enter default.htm after any directory name. Once you connect using a browser to the iisadmin area you may have to enter a username and password depending on the browser you use, and you can then perform actions to administer the site. Q. How can I configure FTP to use Directory Annotation? A. Follow the procedure below:
You now need to create a file called ~ftpsvc~.ckm in each directory where you wish the annotation. The file is just a normal ASCII format file. Q. Only the first line of the Directory Annotation is shown. A. This is caused if you have no welcome message. Simply add a welcome message as described in Q. How can I configure the FTP welcome message? Q. How can I configure the amount of IIS Cache? A. By default InetInfo, the process responsible for WWW, FTP and Gopher uses a 3MB of cache for all of the services. This cache is used to store files in memory providing faster access than from disk. To change the amount of memory available for the cache perform the following:
If you wish to disable caching set the value to 0 however this could have a serious effect on performance. Q. How do I create a virtual directory? A. Before we describe how to create a virtual directory, it is first important to understand what a virtual directory is. For those who remember DOS, there was a command called join which allowed you to treat a different disk as a directory on the current drive. A Virtual directory is the same kind of thing, you can treat a directory or disk as a subdirectory of your web site. For example your default web area may be c:\InetPub\wwwroot and this may be http://www.savilltech.com . If you had a subdirectory off of wwwroot called ntfaq, e.g. (c:\InetPub\wwwroot\ntfaq) you could access this as http://www.savilltech.com/ntfaq. What if I had run out of space on c: and wanted the FAQ to be on d:? You would create a virtual directory called ntfaq which would point to d:\pages\ntfaq and this procedure of creating a virtual directory is shown below.
Q. How to install FrontPage Extensions on Beta 2? - NT5 only A. The FrontPage Extensions are not installed during the Beta 2 NT/IIS setup. To install the extensions, perform the following steps:
Contributed by Thomas Lee Q. What fixes are available for IIS? A. Microsoft have released the first NT Option Pack QFE (Quick Fix Engineering) Update but this actually only updates IIS 4.0 at this time. The update includes every hotfix made to IIS from its release. This is a cumulative hotfix and you should only install this if you are experiencing specific problems with IIS. The new intent is about every month or so or when appropriate release a new fix pack. The value add here is not waiting for such a long period of time between service packs. Customers who are experiencing problems don't need to hunt down individual hotfixes any more they just download this update and get everything. The uninstall is very clean, so if something goes wrong, remove the fix. Something new here is in letting customers know what DLL's are being replaced up front. Upon installation of the update, the file iis_hotfix.htm is dropped in the users \inetsrv directory. This file will contain all of the information about the fix and should make it very easy for PSS to determine what version of IIS the customer is using. Download from : http://www.microsoft.com/windows/downloads/contents/updates/ntopqfe/default.asp Q. How do I specify more than one default document? A. When you select a web site directory, e.g. http://www.ntfaq.com/games a default document is looked for, e.g. default.htm and this filename can be changed. With IIS 2.0 and 3.0 the default document is changed as follows:
With IIS 4.0 and IIS 5.0 (both via the MMC interface) the change is performed as follows:
Q. How can I move my IIS server to another machine? A. In the %systemroot%\system32\inetsrv directory there is a program called "iissync". This program will transfer over all your IIS settings to the new computer, including certificates, virtual domains, and for the most part, everything you need. Just open a dos prompt, and run "iissync \\newcomputername" and wait a bit. Q. Front Page Search Component always returns No Documents Found running IIS4 and FP 98exts, why? A. If Index Server is installed on IIS4, Front Page will default to use that as it's search engine. If no catalog has been built with Index Server for that web, the search component will return "No Documents Found". Either index the site using Index Server, or in the frontpg.ini file (found in %systemroot%, e.g. d:\winnt) add "NoIndexServer=1" which defaults Front Page to use it's built in search engine instead of Index Server. Q. How to stop the NT4 Option Pack/Windows 2000 SMTP service from advertising 8bitmime? A. Start a telnet session with the SMTP service (port 25) and enter "EHLO server-name". Note the presence of the keyword "8bitmime". To disable the advertising of 8bitmime perform the following:
If you now telnet to the SMTP service you will notice the 8bitmime is no longer advertised. To reverse the process, repeat steps 1 through 4, reenter the data in step 5, but this time, change the "-value:0" to "-value:1". Q. How do I enable Index Server in Windows 2000? A. Index Server is installed by default if you install IIS on Windows 2000. To enable perform the following:
That's all, you can now configure Index Server. By default web sites are enabled for Index Server to change right click on the site in the Internet Services Manager MMC snap-in, select Properties, select the 'Home Directory' and check/uncheck 'Index this resource'. Q. How do I create a new Index Server catalog? A. Index Server stores its information in catalog's and you can create multiple catalogs to store different groups of information such as web sites, directories etc.
Once added you must configure the directories that need to be indexed:
Q. I receive an Index Server error 'Query Is Too Expensive', why? A. If the content index is out of date, and you are executing queries that must be enumerated, you will get the above error message. To fix this problem wait until the index is up-to-date (it can be monitored through the Computer Management MMC snap-in in 2000) and perform the following steps:
Q. I receive error 'The catalog is corrupt' when performing an Index Server search, what can I do? A. Index Server catalogs can be caused by unsafe computer shutdowns, system crashes, or applications that write to or lock the catalog files while Index Server is active. Normally, Index Server attempts to fix any corruption automatically; however, sometimes it is necessary to manually fix the corruption. To do manually fix the corruption, stop and restart the Content Index service, For Index 1.x, stop and restart the World Wide Web service, under Windows 2000 start the Computer Management MMC snap-in, expand 'Server Applications and Services', right click on 'Indexing Service' and stop then start. This normally causes Index Server to rebuild the catalog. If this does not work, stop Index Server again, locate the Catalog.wci folder, and delete the contents of the folder. This manually deletes the catalog. When you restart Index Server, the catalog is re-created. This can also occur when a file is unfilterable and the Filter Retries is set to a number greater than 4. When this happens, the information that the filter process sends to the Content Index Service (CISVS) causes the CISVS to report that the in-memory catalog information is corrupt, even though the data on the drive is fine. To correct set retry value to 4 or less:
Q. How can I stop hidden files etc. being returned by Index Server queries? A. It is not possible to exclude an unreadable root or other file that is physically located below a readable root. A workaround is to append to the user’s restriction. For example, FrontPage roots can be removed by setting the CiRestriction in the .Idq file to the following: CiRestriction=(%UserRestriction%) &! #vpath *-vti_*. Its also possible to exclude certain files and combine, for example: CiRestriction=%if FreeText eq on% $contents "%CiRestriction%" &! #vpath *\_vti_*. &! #filename *.|(txt|,hhc|,hlp|,htx|,tmp|) %else% %CiRestriction% &! #vpath *\_vti_*. &! #filename *.|(txt|,hhc|,hlp|,htx|,tmp|) %endif% This will exclude the FrontPage specific files and any .txt, .hhc, .hlp, .htx and .tmp files. Q. How can I control the amount of resource used by the Index service? - Windows 2000 A. Left unchecked the Index service can grab most of the CPU time leaving a computer almost unusable. To configure the service to more reasonable levels perform the following:
Q. How can I stress test my IIS server? A. Microsoft have a tool called 'Homer' (obviously watch the Simpsons to much!) which can be used to stress test all aspects of an IIS server. "Microsoft Homer is a web stress tool that is designed to realistically simulate multiple browsers requesting pages from a web application. It was developed by web testers. We have made the tool as easy to use as possible by masking some of the complexities of web server testing. This makes the tool desirable for anyone interested in gathering performance data on their web site." It can be downloaded from http://homer.rte.microsoft.com/ along with tutorials and more information. You can also download the Replay tool which is used to reproduce request traffic as closely as possible. It is a simulation tool that can work in conjunction with stress tools such as Microsoft Homer. A. A Proxy Server is a system that sits between the client applications (such as Internet Explorer) and the connection to the Internet (Server) and intercepts the requests to the server to see if it can action them itself, this improves performance by filtering requests that go out to the Internet. The Proxy Server can cache files it downloads from the Internet for a client, using this method if someone else asks for the same page the Proxy Server can send back the version its holding in its cache rather than sending a request out on the Internet. Proxy servers can also act as a fire wall by filtering IP traffic by port or IP address. Proxy Server 2.0 performs the above but also has extra functions such as Winsock proxy for use by Winsock based clients such as Windows 95 etc. to enable IP type access even if the local network protocol used is, for example, IPX. It does this by replacing the winsock on the client machines. It can also be used to hide your networks TCP/IP configuration by allowing you to have any TCP/IP addresses on your Intranet as only the Proxy Servers IP address is used on the Internet. Proxy Server 2.0 also has the Sock's proxy service for non-winsock type clients such as UNIX based machines. Q. How do I install Proxy Server 2.0? A. Before you install Proxy Server 2.0 make sure your system meets the following pre-requisites
Once your system meets the criteria above you can start the installation:
Q. How do I install the client for the WinSock Service? A. There are two methods, the easiest is to use the Web based installation method. Before you start this, make sure the IIS server has default.htm as one of the default document types
Alternatively you can run the setup manually by connecting to the Mspclnt share on the server and running the Setup.exe. The installation is as above. Once the machine has rebooted, confirm the installation is OK by performing the following:
Q. How do I remove the client WinSock Service? A. Just run the Uninstall program from the Microsoft Proxy Client group. Q. How can I bypass the client Winsock? A. There may be a scenario where the machine is taken to different locations (such as a portable taken home) and in this situation you do not want to use the WinSock Proxy client. Rather then uninstalling every time you take the machine home, you can disable it:
Once the computer has restarted it will no longer use the Proxy WinSock. To re-enable perform the above but check the "Enable WinSock Proxy Client". Q. How do I configure an Internet Browser to use the Web Proxy service? A. This procedure is basically the same for all browsers: Internet Explorer 4.0
Netscape Navigator 4.0
Mosaic 3.0
You need to make sure all clients are allowed to use the proxy server:
Q. How do I manage the Proxy Server? A. Proxy Server uses the Microsoft Internet Service Manager (ISM) as its management interface, so to manage your proxy server just start the ISM (Start - Programs - Microsoft Proxy Service - Internet Service Manager). In the example below we will examine which clients are currently using the Web Proxy service
You use the Internet Service Manager to stop/start/pause/continue the Proxy services. If you select a service, for example the Web Proxy Service, if it was running the Stop and Pause buttons would become active and you could then stop or pause the service and its State would change. Double clicking on the services brings up their options. You can also hide certain types of services from the display, as shown in the diagram I have hidden FTP and Gopher services by unclicking their icons. Q. How can I configure the Proxy server to automatically dial out to the ISP when needed? A. This is configured via the Internet Service Manager, however before Proxy Server is configured we need to ensure the correct RAS services are running.
You need to make sure before you proceed that you have a phonebook entry for your ISP, if not you should add one before you proceed. The WINS client has to be disabled for the Remote Access WAN Wrappers
You can now configure the Proxy Services to autodial
You should now stop and start all services that will use autodial. Any client request that cannot be locally handled will now cause the Proxy server to dial out to the internet. Q. How can I stop and start the Proxy services? A. There are several options available to you. The easiest is to use the Internet Service Manager, just select the service and click the stop/start button. You can also stop the services from the command line using
Q. How can I use the Web based Proxy Server Administration software? A. This can be downloaded from http://backoffice.microsoft.com/downtrial/moreinfo/proxyadmin.asp and on the Intel platform will download watx86r.exe to your machine. Before you download you really need IE4.0 to get the most from it. To install follow the procedures below
To administer the Proxy server from a browser you would connect to http://<proxy server name>/PrxAdmin. You then click the large graphic and enter in an Admin username, password and domain. You can then perform all the normal functions via the interface. Q. Which port does WinSock use? A. Proxy Server 2.0 uses UDP port 1745, Proxy Server 1.0 used 9321. Q. How can I configure the RAS Autodisconnect? A. You may have RAS Autodisconnect configured but it does not disconnect after the assigned time, the following may be to blame
To actually change the idle timeout perform the following:
Q. How do I ban the Dilbert Zone using Proxy Server? :-) A. Proxy Server allows you to ban certain sites and IP addresses from being visible. To ban a site (such as the Dilbert Zone which gets you listed in the "Pointy Haired Boss Index") perform the following:
Clients trying to access a banned site will recive the error shown: I'd just like to say I love the dilbert zone, I read it everyday.
Q. How do I install Proxy Server 2.0 on Windows 2000? A. Microsoft have released a Proxy Server installation add-on which has to be used to install Proxy Server 2.0 on Windows 2000/ NT 5.0 beta. The file is called msp2x86a.exe and can be downloaded from http://www.microsoft.com/proxy/default.asp. To install perform the following:
If you are upgrading a Windows NT Server 4.0 system, on which Proxy Server 2.0 is already installed, to a Windows NT Server 5.0 system, then after installing Windows NT 5.0 Beta 2, do the following:
To uninstall Microsoft Proxy Server 2.0, use the Uninstall command on the Proxy menu. Running uninstall via Add/Remove Programs in Control Panel will fail because it searches for the installation files in the (now deleted) temporary location created by the wizard. Always backup your server before performing any actions described above. Q. How can I create custom error messages for Proxy Server? A. When a client receives a error from a proxy server (such as a page is not allowed) these error pages can be customised to display anything you require. Simply place a page named as the error number (example ERROR 10060=10060.htm) in the directory C:\msp\ErrorHtmls and then Stop and Start Msproxy for it to load the new error message. Q. Audio and Video are unavailable in NetMeeting via Proxy server, why? A. This behavior can occur if you connect to the Internet through a proxy server using Microsoft Proxy Server version 2.0, and you have Microsoft Winsock version 2.0 installed on your computer. To resolve this perform the following:
Also check if the ports for sending audio and video are enabled (usually ports 1503, 1720 and 1731). Also port 389 is used for ILS (Internet Locator Server) by NetMeeting 2.0 and port 522 for ULS (User Location Server) used by NetMeeting 1.0. To connect to a directory server, the directory server must be functioning properly. NetMeeting directory services require either port 389 or port 522. To verify that the directory server is functioning properly, use Telnet to connect over these ports. In summary to enable NetMeeting access through a firewall:
Q. How can I use Chat behind a Proxy server? A. If you have packet filtering enabled Internet Relay Chat (IRC) may pause for long periods of time or fail to connect. This is caused by the Identd (Identification Protocol) being filtered out. To resolve perform the following:
This will allow Identd traffic to pass through instead of being discarded by the proxy packet filter driver. Microsoft Chat uses the standard chat port (#6667). Q. How can I remove the Active Desktop? A. You can turn off the Active Desktop without removing it by performing the following:
To actually remove Active Desktop completely while leaving the browser intact:
Q. How can I get past the "Active Desktop Recovery" page? A. This can usually be fixed by deleting the desktop.htt file:
Q. What keyboard commands can I use with Internet Explorer 4.0? A. Below is a list of common keyboard commands:
Q. How can I create a keyboard shortcut to a web site? A. It is possible to create your own keyboard shortcuts with a Ctrl + Alt + <letter> combination as follows:
You can also use the above to create a keyboard shortcut to a desktop item by right clicking on the shortcut and choosing properties. Q. How can I customize folders with web view enabled? A. If you have installed the Windows Desktop Update and have the view as web page enabled ( view - as web page) you can customize the folder (view - customize this folder) and then select the type (background picture or a whole HTML file) or you can change the default which is stored in a hidden HTML file (%systemroot%\web\folder.htt). You can then edit this file and change accordingly. There is a line in folder.htt "HERE'S A GOOD PLACE TO ADD A FEW LINES OF YOUR OWN" which you can add your own links which will then appear on all folders. There are 4 other templates you can edit:
As I said these are hidden so you will either need to remove the hidden attribute (attrib <file> -h) or just enter the name specifically in the edit utility you use to change these files. A word of warning, make a backup of these files before you break them :-). Q. How can I change the icons in the Quick Launch toolbar? A. The icons on the quick launch taskbar (Internet Explorer, Outlook Express, Show Desktop and Channels by default) are all stored in %systemroot%/profiles/<user>/Application Data/Microsoft/Internet Explorer/Quick Launch and to remove/add just add and remove the files from this directory using Explorer. You can copy any shortcut to this directory and the update will be done straight away, no need to logoff/reboot. As you can see below I have added a shortcut for Word and Frontpage just by copying the shortcut to the Quick Launch directory, easy. An alternative method is to just drag a shortcut over the Quick Launch bar and it will add the shortcut for you. All the files in this folder are shortcuts except for Show Desktop and View Channels. See the next FAQ for their contents. Q. I have lost Show Desktop/View Channels from the Quick Launch bar, help! A. As was discussed in the previous FAQ these icons are just files in the %systemroot%/profiles/<user>/Application Data/Microsoft/Internet Explorer/Quick Launch directory. To get the Show Desktop/View Channels icons back create the following files in the Quick Launch directory (or copy from another user) For Show Desktop, create "Show Desktop.SCF" with the
following content: For View Channels, create "View Channels.SCF" with
the following content: Q. How do I change the default Search Engine? A. The URL for the Search Engine used with the Go - Search the Web is stored in the registry so this can easily be changed:
Now when you select search you will be taken to this URL. If you want to change back to the default enter http://www.msn.com/access/allinone.htm Q. How do I remove the Internet Explorer icon from the desktop? A. This can be done from the advanced options of Internet Explorer:
A. As you may be aware when you connect to a site the information you view is cached locally to speed up future visits to the site (the cache size can be set View - Internet Options - General - Temporary Internet files - Settings). Its actually possible to view the web using only the cache when not connected, obviously you can only view sites that are stored in the cache. To work off line:
You can then enter URL's and link as normal but will receive an error if you attempt to link to a site that is not cached. To stop working Offline just deselect "Work Offline" Q. How can I reclaim wasted space by Microsoft's Internet E-mail readers? A. Microsoft's Internet E-mail clients (both Internet Mail under IE3 and Outlook Express under IE4) waste a large amount of disk space due to the method used to store mail. The reason behind this is to improve performance, however if you do want to reclaim some of the lost space perform the following:
Also set-up Outlook to automatically delete the "Deleted Items" folder contents
Q. I cannot specify a download directory when I download a file. A. When you download a file you are asked what to do, "Open this file from its current location" or "Save this file to disk". If you take the latter option you are asked for a storage location and you then click Save. Also on the selection screen is a "Always ask before opening this type of file", if you clear this check in future any downloads of this type will be downloaded to the Temporary Internet Files folder and opened by the program associated with the file type. To undo this perform the following:
Q. Internet Explorer opens .EXE files instead of Downloading them. A. As in the previous FAQ if you unselect "Always ask before opening this type of file" for an executable it updates the registry so you are not asked however this can be fixed:
For files such as WAV, MOV and AVI (ActiveMovie files) you would modify the entry HKEY_CLASSES_ROOT\AMOVIE.ActiveMovieControl.2\EditFlags to be 00000000. Q. How can I change the default start page? A. When you first start Internet Explorer it loads a page, by default this is a Microsoft page (http://home.microsoft.com) however this can be changed:
The above just updates registry entry "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page". You could create a registry script that updates a machines registry to set your page up as the clients Homepage. The REG script would have the following: REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main] [HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main] You would then setup a link on your page to the script and people would select "Open from current location". The official Microsoft image for this is (if you want it right click on it and select "Save Picture As"). I have set the above up so it sets http://www.ntfaq.com as your start page but I would advise against it ;-) If you wanted no start page, e.g. blank, set the value to "about:blank". If you use Netscape use the following to change your default homepage
It does not store the start page location in the registry, rather in a javascript file prefs.js, which is located in the Program Files\Netscape\Users\<Netscape Profile Name> directory. The line in the file is user_pref("browser.startup.homepage", "http://www.ntfaq.com/"); however you should not edit this file. Q. I have forgotten the content advisor password. A. The password for the content advisor is stored in an encrypted form and decryption it, while possible, is to complicated for our purposes so we will instead just "reset" the password as if it had never been set.
Q. Where can I download IE 5.0? A. IE 5.0 beta can be downloaded from http://www.microsoft.com/windows/ie/default.htm Internet Explorer 5.0 does not ship with the Active Desktop so if you want Active Desktop you will need to have installed IE 4.0 Service Pack 2 with Active Desktop and upgrade to IE 5.0. Q. How do I clear Internet Explorers History? A. Internet Explorer keeps a history of the sites you visit and can be viewed by clicking the History button on the toolbar. If you wish to clear this History perform the following IE 4
IE 5 Same as above except Internet Options is under the Tools menu The History files are actually stored under the directory %systemroot%\Profiles\<user name>\History\History however the permissions on the files are complex so deleting manually is not advised. Q. How can I modify IE's toolbar background? A. The picture behind the IE toolbar buttons can be set to any bitmap you wish. To do this perform the following:
Below is an example. Q. How can I restore the IE animated logo? A. Using the Internet Explorer Admin Kit it is possible to modify the small "E" logo in the top right hand corner of Internet Explorer (ISP's such as MSN do this). To restore to the default perform the following:
Q. Are there any Easter Eggs in Internet Explorer 5.0? A. There are two Easter eggs I know of for IE 5.0.
(Actually this Easter Egg also runs on IE4.01) Number two:
To remove ie-ee just start the Languages dialog again, select ie-ee and click Remove. Q. How can I stop users accessing local drives via Internet Explorer? A. If you type "C:" (or any other drive) in the Microsoft Internet Explorer address box you will be shown the contents and if proper NTFS file permissions are not in place users will be able to delete, rename, read any files on the disk. This is usually a problem if you have a locked down environment where users do not normally have access to Explorer etc (such as an Internet Cafe). To stop the ability to view local drives from Internet Explorer perform the following:
|