programming4us
           
 
 
Windows Server

Windwos Server 2008 : Recovering from a Server or System Failure (part 1)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/4/2010 3:39:41 PM
When a failure or issue is reported regarding a Windows Server 2008 R2 system, the responsible administrator should first perform the standard validation tests to verify that there is a real issue. The following sections include basic troubleshooting steps when failure reports are based around data or application access issues, network issues, data corruption, or recovery issues.

Access Issues

When end users report issues accessing a Windows Server 2008 R2 system but the system is still online, this is categorized as an access issue. Administrators should start troubleshooting access issues by first verifying that the system can be accessed from the system console and then verifying that it can be accessed across the network. After that is validated, the access issue should be tested to reveal whether the access issue is affecting everyone or just a set of users. Access issues can be system or network related, but they can also be related to security configurations on the network or local system firewall or application, share, and/or NTFS permissions. The following sections can be used to help troubleshoot access issues.

Network Access Troubleshooting

Troubleshooting access to a system that is suspected to be network related can involve the networking group as well as the Windows Server 2008 R2 system administrators. When networking is a suspect, the protocol and system IP information should be noted before any tests are performed. Tests should be performed from the Windows system console to determine if the system can access other devices on the local network and systems on neighboring networks located across a gateway or router. Tests should be performed using both the system DNS names as well as IP addresses and, if necessary, IP Next Generation IPv6 addresses.

Note

Testing connectivity for web-based applications should be performed using system hostnames, fully qualified domain names, and IP addresses to ensure that tests yield the proper results. Many web servers and/or firewalls can receive a properly formed header in the web GET request and will not respond to a request made from an IP-based uniform resource locator (URL).


If the system can communicate out but users still cannot access the system, possible causes could be an incorrect IP subnet mask default gateway or routing table or a restriction configured in the Windows or network firewall. Windows Firewall is enabled by default on Windows Server 2008 R2 systems and the new firewall supports multiple firewall profiles simultaneously. If a network is identified incorrectly as a public network instead of a domain network, depending on the firewall profile settings, this might restrict access undesirably. When administrators follow the proper procedures for installing roles and role services, during the installation of the roles, exceptions will be added to the firewall. Administrators can review the settings using the Windows Firewall applet from Control Panel but to get very detailed firewall information, the Windows Firewall with Advanced Security console should be used. This console is located in the Administrative Tools program group.

Share and NTFS Permissions Troubleshooting

If network connectivity and firewall configurations check out, the next step in troubleshooting access issues is to validate the configured permissions to the affected application, service, or shared folder. For application access troubleshooting, refer to the section, Application Access Troubleshooting,” and the application vendors’ administration and troubleshooting guides. For Windows services and share folder permission troubleshooting, Event Viewer can assist tremendously, especially if auditing is enabled. Auditing can be enabled within an Active Directory group policy on the Windows Server 2008 R2 local computer policy, but auditing must also be enabled on the particular NTFS folder.To troubleshoot share and NTFS permissions, please review the following sections.

Validating Share Permissions

When share permissions need to be validated, there are several ways to accomplish this task. One way to accomplish this task is to use the Share and Storage Management snap-in, as detailed in the following steps:

1.
Log on to the Windows Server 2008 R2 system with an account with administrator privileges.

2.
Click Start, click All Programs, click Administrative Tools, and select Share and Storage Management.

3.
When the window opens, locate the desired share in the tasks pane, right-click the share, and choose Properties.

4.
Select the Permissions tab and click the Share Permissions button.

5.
Review and, if necessary, reconfigure the share permissions as required.

6.
Click OK to close the Share Permissions window and click OK again to close the share properties pages.

7.
Close the Share and Storage Management console.

Other -----------------
- Windows Server 2008 Server Core : Working with the Remote Desktop Connection Application (part 2)
- Windows Server 2008 Server Core : Working with the Remote Desktop Connection Application (part 1)
- Windows Server 2008 Server Core : Understanding Internal and External Commands
- Windows Server 2008 : Working with NAP (part 8) - 802.1x Enforcement
- Windows Server 2008 : Working with NAP (part 7)
- Windows Server 2008 : Working with NAP (part 6)
- Windows Server 2008 : Working with NAP (part 5)
- Windows Server 2008 : Working with NAP (part 4) - Communication Process with VPN Client and NAP
- Windows Server 2008 : Working with NAP (part 3) - DHCP Enforcement
- Windows Server 2008 : Working with NAP (part 2)
- Windows Server 2008 : Working with NAP (part 1)
- Windows Server 2008 : Configuring Remote Access (part 6)
- Windows Server 2008 : Configuring Remote Access (part 5) - Virtual Private Networks
- Windows Server 2008 : Configuring Remote Access (part 4)
- Windows Server 2008 : Configuring Remote Access (part 3)
- Windows Server 2008 : Configuring Remote Access (part 2) - Network Policy Server and Network Access Protection
- Windows Server 2008 : Configuring Remote Access (part 1) - Routing and Remote Access Services
- Windows Server 2008 : Configuring Wireless Access
- Windows Server 2008: Configuring Routing
- Windows Firewall with Advanced Security in Windows Server 2008 (part 3)
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us