Some questions from a recent interview for Active Directory specialist position:
What are some extended Active Directory attribute that are created when you install common enterprise Microsoft offerings?
Depending on the MS product being deployed, there could be various changes on the schema. The good thing is that they are all well documented with sufficient description in Technet.
For example, when installing Exchange 2016, attributes that are being created are: ms-Exch-UG-Event-Subscription-Link and ms-Exch-UG-Event-Subscription-BL.
When deploying Skype for bussienss: msExchUserHoldPolicies, msRTCSIP-UserRoutingGroupId, msRTCSIP-MirrorBackEndServer
Name 3 usage case of AD delegation that would be useful in a company
Delegate Microsoft BitLocker Decryption rights to Help Desk
Delegate new user creation and Identity and access management team [IAM]
Delegate password reset to Global Service Desk users [GSD]
Solve for this scenario.
o User A needs access to
o User B needs access to
§ Cannot have access to \\company.share\Confidential
o Solution needs to be scalable for the future
Make 2 groups – User-a-category and User-b-category
For the user-a-category, assign appropriate NTFS access to the specified folders in \\company.share\.
For the user-b-category, assign NTFS access to the specified folders in \\company.share\.
Set security permissions to the \\company.share\Confidential folder.
If a user calls and tells you a newly created distribution group is unable to accept email from clients. What is the problem?:
Analyze the error code, generated by sending emails [if available]
Check if Group scope is appropriate [Universe/Global/Domain local]
Check if “Sender authentication” is enabled
Check with Get-TransportServer | Get-MessageTrackingLog -sender “address of sender” -recipient “address of DL”
Check if there isn’t an anti-spam filter interfering [althou this could be depending if internal/external messages are being received]
Remove the user from the group and add him again [some classical IT troubleshooting]
What is a loop back group policy?
Allows user configuration settings to be applied, based on the computers GPO. Thus computers policies take precedence over user’s policies/ settings. Works in 2 modes:
replace: the user policies defined in the computer’s GPO replace the user policies, normally applied to the user
merge: the user policies defined in the computer’s GPO and the user policies normally applied on the user’s are merged. If a conflict occurs, the user policies in the computer’s default GPO overwrite the user’s normal policies.
So, setting up a nice Windows Server 2012 R2 machine in Hyper-V for some active directory testing.
Allocating the minimum required resources for WS 2012 R2, as seen here , and just after selecting the edition that I wanted to install [doesn’t matter if you prefer Standard or datacenter edition, with or without GUI], a greeting window appeared: