Партнерка на США и Канаду по недвижимости, выплаты в крипто

  • 30% recurring commission
  • Выплаты в USDT
  • Вывод каждую неделю
  • Комиссия до 5 лет за каждого referral
Table A.76. Dfsutil. exe Parameters

Option

Description

/list:Domain [/dcname:DcName]

Outputs the Dfs in the domains that are fully qualified, with the Active Directory domain name defining a specific domain controller.

/view:\\dfsname\dfsshare [/dcname:DcName] [/level:Level]

Displays the metadata in \\dfsname\dfsshare and dumps the Active Directory-based Partition Knowledge Table (PKT) that shows the Dfs tree for each computer directory and site location. The |more pipe command can be used. The /dcname option defines a specific domain controller and /level specifies the level of viewing material, with the highest providing greater detail.

/verify:\\dfsname\dfsshare [/dcname:DcName] [/level:Level]

Verifies metadata in \\dfnsame\dfshare. The /dcname option defines a specific domain controller and /level specifies the level of viewing material, with the highest providing greater detail.

/reinit:ServerName

Reestablishes or refreshes the Dfs server name.

/whatis:ServerName

Displays the type of the specified server.

/dfsalt:UNCPath

Resolves the UNC path for the server.

/clean:ServerName

Removes the Dfs designation within the registry of the defined server.

/dclist:Domain

Lists all the domain controllers in the defined domain.

/trusts:Domain/pktinfo [/dfs]

Lists the trust relationships of the specified domains.

[/level:Level]

Shows the Partition Kit Table for the designated Dfs.

/pktflush[:EntryToFlush]

Removes or flushes Partition Kit Table entries.

/spcinfo [/all]

Outputs the SPC information—the/all switch outputs all the data.

/spcflush[:EntrytoFlush]

Removes or flushes the SPC data.

DNSCMD. EXE—DNS TROUBLESHOOTING TOOL

This administrative tool is used to view and diagnosis DNS settings and properties of DNS servers, zones, and resource records. The syntax is

НЕ нашли? Не то? Что вы ищете?

dnscmd ServerName Command [Command Parameters]

DSACLS. EXE—DSACLS

This tool is used to manage access control lists. It permits the manipulation of security attributes for Active Directory objects and serves as a command-line alternative to the Active Directory snap-in tools.

Table A.77. Dnscmd. exe Parameters

Option

Description

ServerName

Specifies the server to be managed.

IP address

Specifies the IP address.

Command

Defines the command desired from the following options:

/Info— provides DNS server properties.

/Config— resets server or zone configuration.

/Statistics— provides server statistics data.

/ClearCache— clears the cache for a DNS server.

/WriteBackFile— writes back all data for the specified zone.

/StartScavenging— initiates server scavenging.

/ResetListenAddresses— resets/selects server IP address(es).

/ResetForwarders— resets/selects and forwards IP address(es).

/EnumZone— enumerates zones on the DNS server.

/ZoneInfo— displays zone data.

/ZoneAdd— creates a new zone.

/ZoneDelete— deletes a specified zone.

/ZonePause— pauses the specified zone.

/ZoneResumes— resumes the specified zone.

/ZoneReload— reloads the specified zone from its database.

/ZoneWriteBack— writes back the specified zone to the file.

/ZoneRefresh— forces a refresh of the secondary zone.

/ZoneUpdateFromDs— updates the specified DS integrated zone by data from DS.

/ZoneResetType— changes a type of the specified zone.

/ZoneResetSecondaries— sets/resets a notify list for the specified zone.

/ZoneResetScavengeServers— resets scavenging servers for a zone.

/EnumRecords— enumerates records at a name.

RecordAdd— creates a record in the specified zone on the DNS server.

/RecordDelete— deletes a record from the specified zone on the DNS server.

/NodeDelete— deletes all records at a name from the specified zone, RootHints, or Cache at the specified DNS server.

/Restart— restarts the DNS server.

/AgeAllRecords— forces timestamping and aging on a zone.

 

Table A.78. Dsacls. exe Parameters

Option

Description

/a

Outputs permissions, ownership, and auditing data.

/d

Denies permissions for the specified user or group.

/g

Grants permissions for the specific user or group.

/i:{c | o | i | p}

Specifies the inheritance—p = propagate inheritable permissions one level only; s = subobjects only; t = this object and subobjects.

/n

Replaces the object permissions.

/p

Sets the object as protected (y = yes) or not (n = no). Lacking the /p option, the current protection flag is preserved.

/r

Removes the security permissions for specified user or group.

/s

Restores the security permissions for the specified user or group.

/t

Restores the security permissions for the object tree.

/?

Output to syntax options.

The Dsacls. exe command syntax is as follows:

dsacls object [/a] [/d {user | group}:permissions [...]] [/g {user |

group}:permissions [...]] [/i:{p | s | t}] [/n] [/p:{y | n}] [/r {user

| group} [...]] [/s [/t]] [/?]

DSASTAT. EXE AND DSASTAT COMMAND

This tool compares naming contexts on domain controllers and detects differences. In the case of a Global Catalog, it compares two directory trees within the same or different domains, gathering capacity statistics that include megabytes per server, objects per server, megabytes per object class, and attribute comparisons for replicated objects.

The syntax for Dsastat. exe is

dsastat [/?] [-loglevel:option] [-output:option] [-f:filename]

[-s:servername[portnumber][;servername[portnumber];...]] [-t:option]

[-sort:option] [-p:entrynumber] [-b:searchpath] [-filter:ldapfilter]

[-gcattrs:option[;option;...]]

DSKPROBE. EXE—DISK PROBE

The Dskprobe. exe command launches the graphical Disk Probe application discussed in Chapter 14.

Table A.79. Dsastat. exe Parameters

Option

Description

/?

Displays the syntax options.

-loglevel:option

Establishes the extent of logging performed during execution. The valid option values are INFO (default), TRACE, and DEBUG.

-output:option

Sets where the output of DsaStat is displayed. The valid option values are SCREEN (default), FILE, or BOTH.

-f:filename

Sets the name for the initialization file to use for parameters if not user-specified

-s:servername[portnumber] [;servername[portnumber]]

Sets the name of servers to be compared, separated by a semicolon. The server name can include the IP port number. The default port number is the default LDAP port (389).

-t:option

Determines if a full or statistical comparison is to be made. The option TRUE is for statistical; FALSE is for a complete content comparison.

-sort:option

Determines if the GUID is to be used as the sorting basis. The option TRUE will sort by GUID; FALSE will not.

-p:entrynumber

Sets the page size for ldap-search from 1–999, with 54 as the default.

-filter:ldapfilter

Sets the LDAP filter used in the LDAP search operation. The default is "(objectclass=*)".

-b:searchpath

Uses the Distinguished Name as the basis of comparison and allows reviews of all subtrees.

-gcattrs:option[;option;...]

Specifies attributes to be returned for the search.

DUMPCHK. EXE—DUMP CHECK

This is a debugging tool used to review crash and other system dumps. Its syntax is as follows:

dumpchk [-v] [-p] [-c] [-x] [-e] [-y] [-?] CrashDumpFile

FILEVER. EXE—FILE VERSION VERIFICATION

This is a command-line utility employed to verify the version level of an. exe or. dll file. The syntax is as follows:

filever [/s] [/v] [/e] [/x] [/b] [/a] [/d] [[drive:][path][filename]]

Table A.80. Dumpchk. exe Parameters

Option

Description

-e

Performs a dump examination.

-c

Validates the dump file.

-v

Outputs in verbose mode.

-x

Performs extra dump file examination.

-y

Sets the path to the symbols file.

 

Table A.81. Filever. exe Parameters

Option

Description

/a

Does not display attributes.

/b

Outputs a bare format with directories.

/d

Does not display time and date.

/e

Lists executable components only.

/s

Shows all directories and subdirectories.

/v

Uses verbose mode.

/x

Generates a short name for even non-8.3-based names.

GFLAGS. EXE—GLOBAL FLAGS

The gflags command launches a graphical application used by system administrators and developers to edit NTGlobalFlag. This command is used to modify the current flags for the kernel or the global Registry.

CAUTION

Modifying global flags is not advised except by the most experienced developer or system administrator. Consult with Microsoft Professional Services when doing this because flag changes that are inappropriately applied can damage your system.

The syntax used for gflags is

gflag [-r [flag [maxdepth]] [-k [flag]] [-i ImageFileName [flag]] [-l

flag commandline...]

Table A.82. Gflag. exe Parameters

Option

Description

-i

Operates on the specified image.

-I

Launches the command line for a specified flag.

-r

Displays Registry settings.

-k

Operates on the kernel settings.

The global flag abbreviations and their meanings are

·  kst— create kernel mode stack trace database.

·  ust— create user mode stack trace database

·  dic— debug Initial Command.

·  dwl— debug WINLOGON.

·  dhc— disable Heap Coalesce on Free.

·  ddp— disable kernel mode DbgPrint output.

·  dps— disable paging of kernel stacks.

·  dpd— disable protected DLL verification.

·  ece— enable Close Exception.

·  d32— enable Win32 Subsystem debugging.

·  eel— enable Exception Logging.

·  hat— enable Heap API Call Tracing.

·  hfc— enable heap free checking.

·  hpc— enable heap parameter checking.

·  htg— enable heap tagging.

·  htd— enable Heap Tagging by DLL.

·  htc— enable heap tail checking.

·  hvc— enable heap validation on call.

·  ksl— enable loading of kernel debugger symbols.

·  eot— enable Object Handle Type Tagging.

·  pfc— enable pool free checking.

·  ptg— enable pool tagging.

·  ptc— enable pool tail checking.

·  otl— maintain a list of objects for each type.

·  hpa— place heap allocations at ends of pages.

·  sls— Show Loader Snaps.

·  soe— Stop On Exception.

·  shg— Stop on Hung GUI.

·  idp— unused.

KILL. EXE—TASK KILLING UTILITY

This command-line utility is employed to terminate one or more processes, using the process identification number (PID) to recognize them. See the Tlist. exe to view the tasks. The syntax for the Kill. exe utility is

kill [/f] {process_id | pattern}

The /f option forces termination.

KSETUP. EXE—KERBEROS CLIENT CONFIGURATION

KSetup is a command-line tool that configures Windows Server 2003 or Professional clients used by an MIT Kerberos server. The client employs a Kerberos realm (instead of a Windows Server 2003 domain), which establishes a single sign-on to the Key Distribution Center (KDC) and a local Windows Server 2003 client account.

The syntax for KSetup. exe is as follows:

ksetup [/SetRealm DnsDomainName] [/MapUser Principal Account] [/AddKdc

RealmName KdcName] [/DelKdc RealmName KdcName] [/AddKpasswd Realmname

KpasswdName] [/DelKpasswd Realmname KpasswdName] [/Server Servername]

[/SetComputerPassword Password] [/Domain DomainName] [/ChangePassword

OldPasswd NewPasswd][/?][/Help]

KTPASS. EXE—KERBEROS TAB KEY SETUP

The command-line tool Ktpass. exe is a configuration utility that creates Kerberos keytab Ktpass files. It generates a mapping of password and account names for UNIX services that use Windows Server 2003 KDCs. Along with the Trustdom. exe utility, they establish Kerberos interoperability by creating a key shared by UNIX and Windows Server 2003 Kerberos services. The syntax for Ktpass. exe is

ktpass /out filename /princ username [/mapuser] [/in filename]

[/crpyto type] [/ptype type] [/keyno keynum] [/?]

Table A.83. KSetup. exe Parameters

Option

Description

/AddKdc Realmname Kdcname

Adds the Kpasswd server address for a realm.

/ChangePassword OldPasswd NewPasswd

Changes a logged-on user's password via Kpassword.

/DelKdc RealmName KdcName

Deletes instance(s) of the KDC address for the realm.

/DelKpasswd Realmname KpasswdName

Deletes the Kpasswd server address for a realm.

/Domain DnsDomainName

Uses the current domain if no domain name is set.

/MapUser KerbName LocalName

Maps the name of a Kerberos principal and an account (* = any/all).

/SetComputerPassword Passwd

Sets the local computer password.

/SetRealm DnsDomainName

Establishes/SetRealm DnsDomainName.

/Server servername

Sets the target Windows Server 2003 that will be changed.

 

Table A.84. Ktpass. exe Parameters

Option

Description

/crypto [DES-CBC-CRC | DES-CBC-MD5]

Establishes the cryptographic type—DES-CBC-CRC is the default.

/DesOnly

Establishes the use of DES only.

/in

The keytab to digest or read.

/kvno

The key version number—the default is 1.

/mapOp

The mapping attribute—add: add value (default) or set: set value.

/mapuser

Maps the user of the Kerberos principal to a local account; this is done by default.

/out

Sets the name of the Krb5 keytable file. This keytable file is transferred to the UNIX system and then merged with (or replaces) the /etc/krb5/keytab.

/pass

Sets password for the principle. The wildcard * prompts for the password.

/princ

Inputs the principal name in the form user@REALM, for example, "example" or "host/".

/ptype [KRB5_NT_PRINCIPAL | KRB5_NT_SRV_INST | KRB5_NT_SRV_HST]

Specifies the principal type: KRB5_NT_PRINCIPAL for the general type and the name of the principal is recommended; KRB5_NT_SRV_INST for user service instance; or KRB5_NT_SRV_HST for host service instance.

LDP. EXE—LDAP TOOL

The Ldp. exe tool launches a graphical utility for performing LDAP (Lightweight Directory Access Protocol) functions. These functions include connect, bind, search, modify, add, and delete against any LDAP-compatible directory, such as the Active Directory.

MEMSNAP. EXE—MEMORY PROFILING TOOL

The Memsnap. exe utility is used to capture information about the memory used by active processes. This data is dumped to a log. The syntax for KSetup. exe is as follows:

memsnap [-t] [-g] [-?] [logfile]

The - t option adds tags for Greenwich mean time (GMT), date, and computer name. The - g option adds GDI and USER resource counts.

MOVETREE. EXE—MOVETREE OBJECT MANAGER

The command-line MoveTree. exe interfaces with the Active Directory Object Manager (MoveTree) that allows the movement of Active Directory objects such as domains within a tree or organizational units. When organizational units are moved, the linked grouped policies remain intact. Universal groups are moved intact during a MoveTree. exe operation, whereas local and domain global groups are not moved at all with this utility. Other objects that can not be moved with movetree include

·  System objects that identified by the objectClass as systemOnly

·  Configuration or schema naming contexts objects

·  Special container objects in the domain including Builtin, ForeignSecurity Principal, System, and LostAndFound

·  Domain controllers

·  Objects with the same name as an object that exists in the target domain

The syntax for the MoveTree. exe utility is

movetree {/start | /startnocheck | /continue | /check} /s SrcDSA

/d DstDSA /sdn SrcDN /ddn DstDN [/u [Domain\]Username /p Password]

[/verbose] [{/? | /help}]

MSINFO32.EXE—MS SYSTEM INFORMATION TOOL

The Msinfo32.exe utility gathers system configuration data including hardware, software, and other system components. It is used to rapidly gather data necessary to resolve system conflicts or other problems.

Table A.85. MoveTree. exe Parameters

Option

Description

/check

Performs a test of MoveTree before actually moving any objects. The reports provide an opportunity to correct noted errors.

/continue

Continues to the move effort even after it is paused or a network failure occurs.

/d Destination DSA

Sets the fully qualified primary DNS name of the destination server.

/ddn DestinationDN

Sets the full distinguished name for the destination server subtree.

/s SrcDSA

Sets the DNS of the source server.

/sdn SrcDN

Sets the full distinguished name for the source server subtree.

/start

Starts the MoveTree operation with the /check option.

/startnocheck

Starts without the /check option.

/u [Domain\]Username/p Password

Launches MoveTree with the specified user and password account.

/verbose

Uses the verbose mode.

 

Table A.86. Msinfo32.exe Parameters

Option

Description

/computer computername

Establishes the computer to be analyzed.

/categories +|-categoryname(s)

Sets the category of data to be retrieved for the output report.

/report filename

Saves the report in the specified text file.

/s filename

Saves the report in a System Information file.

The syntax for Msinfo32.exe is as follows:

msinfo32 [/?] [/report filename] [/s filename] [/info filename]

[/computer computername] [/categories +|- category name(s)]

NETDIAG. EXE—NETWORK CONNECTIVITY TESTER

The Netdiag. exe command-line diagnostic tool identifies network connectivity problems and tests network client connectivity. Its syntax is

netdiag [/q] [/v] [/l] [/debug] [/d:DomainName] [/fix]

[/DcAccountEnum] [/test:testname] [/skip:testname]

Table diag. exe Parameters

Option

Description

/d:DomainName

Locates the specified domain.

/debug

Places in debug mode and outputs more data that even the verbose mode.

/DcAccountEnum

Enumerates domain controller accounts.

/fix

Fixes any identified minor problems automatically.

/l

Outputs results to the netdiag. log log file.

/q

Uses quiet mode and outputs errors only.

/skip:TestName

Skips the named test among those listed below:

·  Autonet— Automatic Private IP Addressing (APIPA) address test

·  Bindings— bindings test

·  Browser— redirect and browser test

·  DcList— domain controller list test

·  DefGw— default gateway test

·  DNS— DNS test

·  DsGetDc— domain controller discovery test

·  IpConfig— IP address configuration test

·  IpLoopBk— IP address loopback ping test

·  IPX— IPX test

·  Kerberos— Kerberos test

·  Ldap— LDAP test

·  Modem— modem diagnostics test

·  NbtNm— NetBT name test

·  Netstat— netstat information test

·  Netware— netware test

·  Route— routing table test

·  Trust— trust relationship test

·  WAN— WAN configuration test

·  WINS— WINS service test

·  Winsock— Winsock test

/test:TestName

Performs the specified test. The optional tests are the same as those listed in the /skip option.

/v

Outputs in verbose mode.

NETDOM. EXE—DOMAIN MANAGER

The Netdom. exe command-line utility manages domains and trust relationships. It can be used to join Windows Server 2003 domains to either a Windows NT or Windows Server 2003 domain and to create one-way explicit trusts. Relationships can be viewed and displayed.

Из за большого объема этот материал размещен на нескольких страницах:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19