Партнерка на США и Канаду по недвижимости, выплаты в крипто
- 30% recurring commission
- Выплаты в USDT
- Вывод каждую неделю
- Комиссия до 5 лет за каждого referral
Table A.76. Dfsutil. exe Parameters | |
Option | Description |
/list:Domain [/dcname:DcName] | Outputs the Dfs in the domains that are fully qualified, with the Active Directory domain name defining a specific domain controller. |
/view:\\dfsname\dfsshare [/dcname:DcName] [/level:Level] | Displays the metadata in \\dfsname\dfsshare and dumps the Active Directory-based Partition Knowledge Table (PKT) that shows the Dfs tree for each computer directory and site location. The |more pipe command can be used. The /dcname option defines a specific domain controller and /level specifies the level of viewing material, with the highest providing greater detail. |
/verify:\\dfsname\dfsshare [/dcname:DcName] [/level:Level] | Verifies metadata in \\dfnsame\dfshare. The /dcname option defines a specific domain controller and /level specifies the level of viewing material, with the highest providing greater detail. |
/reinit:ServerName | Reestablishes or refreshes the Dfs server name. |
/whatis:ServerName | Displays the type of the specified server. |
/dfsalt:UNCPath | Resolves the UNC path for the server. |
/clean:ServerName | Removes the Dfs designation within the registry of the defined server. |
/dclist:Domain | Lists all the domain controllers in the defined domain. |
/trusts:Domain/pktinfo [/dfs] | Lists the trust relationships of the specified domains. |
[/level:Level] | Shows the Partition Kit Table for the designated Dfs. |
/pktflush[:EntryToFlush] | Removes or flushes Partition Kit Table entries. |
/spcinfo [/all] | Outputs the SPC information—the/all switch outputs all the data. |
/spcflush[:EntrytoFlush] | Removes or flushes the SPC data. |
DNSCMD. EXE—DNS TROUBLESHOOTING TOOL
This administrative tool is used to view and diagnosis DNS settings and properties of DNS servers, zones, and resource records. The syntax is
dnscmd ServerName Command [Command Parameters]
DSACLS. EXE—DSACLS
This tool is used to manage access control lists. It permits the manipulation of security attributes for Active Directory objects and serves as a command-line alternative to the Active Directory snap-in tools.
Table A.77. Dnscmd. exe Parameters | |
Option | Description |
ServerName | Specifies the server to be managed. |
IP address | Specifies the IP address. |
Command | Defines the command desired from the following options: /Info— provides DNS server properties. /Config— resets server or zone configuration. /Statistics— provides server statistics data. /ClearCache— clears the cache for a DNS server. /WriteBackFile— writes back all data for the specified zone. /StartScavenging— initiates server scavenging. /ResetListenAddresses— resets/selects server IP address(es). /ResetForwarders— resets/selects and forwards IP address(es). /EnumZone— enumerates zones on the DNS server. /ZoneInfo— displays zone data. /ZoneAdd— creates a new zone. /ZoneDelete— deletes a specified zone. /ZonePause— pauses the specified zone. /ZoneResumes— resumes the specified zone. /ZoneReload— reloads the specified zone from its database. /ZoneWriteBack— writes back the specified zone to the file. /ZoneRefresh— forces a refresh of the secondary zone. /ZoneUpdateFromDs— updates the specified DS integrated zone by data from DS. /ZoneResetType— changes a type of the specified zone. /ZoneResetSecondaries— sets/resets a notify list for the specified zone. /ZoneResetScavengeServers— resets scavenging servers for a zone. /EnumRecords— enumerates records at a name. RecordAdd— creates a record in the specified zone on the DNS server. /RecordDelete— deletes a record from the specified zone on the DNS server. /NodeDelete— deletes all records at a name from the specified zone, RootHints, or Cache at the specified DNS server. /Restart— restarts the DNS server. /AgeAllRecords— forces timestamping and aging on a zone. |
Table A.78. Dsacls. exe Parameters | |
Option | Description |
/a | Outputs permissions, ownership, and auditing data. |
/d | Denies permissions for the specified user or group. |
/g | Grants permissions for the specific user or group. |
/i:{c | o | i | p} | Specifies the inheritance—p = propagate inheritable permissions one level only; s = subobjects only; t = this object and subobjects. |
/n | Replaces the object permissions. |
/p | Sets the object as protected (y = yes) or not (n = no). Lacking the /p option, the current protection flag is preserved. |
/r | Removes the security permissions for specified user or group. |
/s | Restores the security permissions for the specified user or group. |
/t | Restores the security permissions for the object tree. |
/? | Output to syntax options. |
The Dsacls. exe command syntax is as follows:
dsacls object [/a] [/d {user | group}:permissions [...]] [/g {user |
group}:permissions [...]] [/i:{p | s | t}] [/n] [/p:{y | n}] [/r {user
| group} [...]] [/s [/t]] [/?]
DSASTAT. EXE AND DSASTAT COMMAND
This tool compares naming contexts on domain controllers and detects differences. In the case of a Global Catalog, it compares two directory trees within the same or different domains, gathering capacity statistics that include megabytes per server, objects per server, megabytes per object class, and attribute comparisons for replicated objects.
The syntax for Dsastat. exe is
dsastat [/?] [-loglevel:option] [-output:option] [-f:filename]
[-s:servername[portnumber][;servername[portnumber];...]] [-t:option]
[-sort:option] [-p:entrynumber] [-b:searchpath] [-filter:ldapfilter]
[-gcattrs:option[;option;...]]
DSKPROBE. EXE—DISK PROBE
The Dskprobe. exe command launches the graphical Disk Probe application discussed in Chapter 14.
Table A.79. Dsastat. exe Parameters | |
Option | Description |
/? | Displays the syntax options. |
-loglevel:option | Establishes the extent of logging performed during execution. The valid option values are INFO (default), TRACE, and DEBUG. |
-output:option | Sets where the output of DsaStat is displayed. The valid option values are SCREEN (default), FILE, or BOTH. |
-f:filename | Sets the name for the initialization file to use for parameters if not user-specified |
-s:servername[portnumber] [;servername[portnumber]] | Sets the name of servers to be compared, separated by a semicolon. The server name can include the IP port number. The default port number is the default LDAP port (389). |
-t:option | Determines if a full or statistical comparison is to be made. The option TRUE is for statistical; FALSE is for a complete content comparison. |
-sort:option | Determines if the GUID is to be used as the sorting basis. The option TRUE will sort by GUID; FALSE will not. |
-p:entrynumber | Sets the page size for ldap-search from 1–999, with 54 as the default. |
-filter:ldapfilter | Sets the LDAP filter used in the LDAP search operation. The default is "(objectclass=*)". |
-b:searchpath | Uses the Distinguished Name as the basis of comparison and allows reviews of all subtrees. |
-gcattrs:option[;option;...] | Specifies attributes to be returned for the search. |
DUMPCHK. EXE—DUMP CHECK
This is a debugging tool used to review crash and other system dumps. Its syntax is as follows:
dumpchk [-v] [-p] [-c] [-x] [-e] [-y] [-?] CrashDumpFile
FILEVER. EXE—FILE VERSION VERIFICATION
This is a command-line utility employed to verify the version level of an. exe or. dll file. The syntax is as follows:
filever [/s] [/v] [/e] [/x] [/b] [/a] [/d] [[drive:][path][filename]]
Table A.80. Dumpchk. exe Parameters | |
Option | Description |
-e | Performs a dump examination. |
-c | Validates the dump file. |
-v | Outputs in verbose mode. |
-x | Performs extra dump file examination. |
-y | Sets the path to the symbols file. |
Table A.81. Filever. exe Parameters | |
Option | Description |
/a | Does not display attributes. |
/b | Outputs a bare format with directories. |
/d | Does not display time and date. |
/e | Lists executable components only. |
/s | Shows all directories and subdirectories. |
/v | Uses verbose mode. |
/x | Generates a short name for even non-8.3-based names. |
GFLAGS. EXE—GLOBAL FLAGS
The gflags command launches a graphical application used by system administrators and developers to edit NTGlobalFlag. This command is used to modify the current flags for the kernel or the global Registry.
CAUTION
Modifying global flags is not advised except by the most experienced developer or system administrator. Consult with Microsoft Professional Services when doing this because flag changes that are inappropriately applied can damage your system.
The syntax used for gflags is
gflag [-r [flag [maxdepth]] [-k [flag]] [-i ImageFileName [flag]] [-l
flag commandline...]
Table A.82. Gflag. exe Parameters | |
Option | Description |
-i | Operates on the specified image. |
-I | Launches the command line for a specified flag. |
-r | Displays Registry settings. |
-k | Operates on the kernel settings. |
The global flag abbreviations and their meanings are
· kst— create kernel mode stack trace database.
· ust— create user mode stack trace database
· dic— debug Initial Command.
· dwl— debug WINLOGON.
· dhc— disable Heap Coalesce on Free.
· ddp— disable kernel mode DbgPrint output.
· dps— disable paging of kernel stacks.
· dpd— disable protected DLL verification.
· ece— enable Close Exception.
· d32— enable Win32 Subsystem debugging.
· eel— enable Exception Logging.
· hat— enable Heap API Call Tracing.
· hfc— enable heap free checking.
· hpc— enable heap parameter checking.
· htg— enable heap tagging.
· htd— enable Heap Tagging by DLL.
· htc— enable heap tail checking.
· hvc— enable heap validation on call.
· ksl— enable loading of kernel debugger symbols.
· eot— enable Object Handle Type Tagging.
· pfc— enable pool free checking.
· ptg— enable pool tagging.
· ptc— enable pool tail checking.
· otl— maintain a list of objects for each type.
· hpa— place heap allocations at ends of pages.
· sls— Show Loader Snaps.
· soe— Stop On Exception.
· shg— Stop on Hung GUI.
· idp— unused.
KILL. EXE—TASK KILLING UTILITY
This command-line utility is employed to terminate one or more processes, using the process identification number (PID) to recognize them. See the Tlist. exe to view the tasks. The syntax for the Kill. exe utility is
kill [/f] {process_id | pattern}
The /f option forces termination.
KSETUP. EXE—KERBEROS CLIENT CONFIGURATION
KSetup is a command-line tool that configures Windows Server 2003 or Professional clients used by an MIT Kerberos server. The client employs a Kerberos realm (instead of a Windows Server 2003 domain), which establishes a single sign-on to the Key Distribution Center (KDC) and a local Windows Server 2003 client account.
The syntax for KSetup. exe is as follows:
ksetup [/SetRealm DnsDomainName] [/MapUser Principal Account] [/AddKdc
RealmName KdcName] [/DelKdc RealmName KdcName] [/AddKpasswd Realmname
KpasswdName] [/DelKpasswd Realmname KpasswdName] [/Server Servername]
[/SetComputerPassword Password] [/Domain DomainName] [/ChangePassword
OldPasswd NewPasswd][/?][/Help]
KTPASS. EXE—KERBEROS TAB KEY SETUP
The command-line tool Ktpass. exe is a configuration utility that creates Kerberos keytab Ktpass files. It generates a mapping of password and account names for UNIX services that use Windows Server 2003 KDCs. Along with the Trustdom. exe utility, they establish Kerberos interoperability by creating a key shared by UNIX and Windows Server 2003 Kerberos services. The syntax for Ktpass. exe is
ktpass /out filename /princ username [/mapuser] [/in filename]
[/crpyto type] [/ptype type] [/keyno keynum] [/?]
Table A.83. KSetup. exe Parameters | |
Option | Description |
/AddKdc Realmname Kdcname | Adds the Kpasswd server address for a realm. |
/ChangePassword OldPasswd NewPasswd | Changes a logged-on user's password via Kpassword. |
/DelKdc RealmName KdcName | Deletes instance(s) of the KDC address for the realm. |
/DelKpasswd Realmname KpasswdName | Deletes the Kpasswd server address for a realm. |
/Domain DnsDomainName | Uses the current domain if no domain name is set. |
/MapUser KerbName LocalName | Maps the name of a Kerberos principal and an account (* = any/all). |
/SetComputerPassword Passwd | Sets the local computer password. |
/SetRealm DnsDomainName | Establishes/SetRealm DnsDomainName. |
/Server servername | Sets the target Windows Server 2003 that will be changed. |
Table A.84. Ktpass. exe Parameters | |
Option | Description |
/crypto [DES-CBC-CRC | DES-CBC-MD5] | Establishes the cryptographic type—DES-CBC-CRC is the default. |
/DesOnly | Establishes the use of DES only. |
/in | The keytab to digest or read. |
/kvno | The key version number—the default is 1. |
/mapOp | The mapping attribute—add: add value (default) or set: set value. |
/mapuser | Maps the user of the Kerberos principal to a local account; this is done by default. |
/out | Sets the name of the Krb5 keytable file. This keytable file is transferred to the UNIX system and then merged with (or replaces) the /etc/krb5/keytab. |
/pass | Sets password for the principle. The wildcard * prompts for the password. |
/princ | Inputs the principal name in the form user@REALM, for example, "example" or "host/". |
/ptype [KRB5_NT_PRINCIPAL | KRB5_NT_SRV_INST | KRB5_NT_SRV_HST] | Specifies the principal type: KRB5_NT_PRINCIPAL for the general type and the name of the principal is recommended; KRB5_NT_SRV_INST for user service instance; or KRB5_NT_SRV_HST for host service instance. |
LDP. EXE—LDAP TOOL
The Ldp. exe tool launches a graphical utility for performing LDAP (Lightweight Directory Access Protocol) functions. These functions include connect, bind, search, modify, add, and delete against any LDAP-compatible directory, such as the Active Directory.
MEMSNAP. EXE—MEMORY PROFILING TOOL
The Memsnap. exe utility is used to capture information about the memory used by active processes. This data is dumped to a log. The syntax for KSetup. exe is as follows:
memsnap [-t] [-g] [-?] [logfile]
The - t option adds tags for Greenwich mean time (GMT), date, and computer name. The - g option adds GDI and USER resource counts.
MOVETREE. EXE—MOVETREE OBJECT MANAGER
The command-line MoveTree. exe interfaces with the Active Directory Object Manager (MoveTree) that allows the movement of Active Directory objects such as domains within a tree or organizational units. When organizational units are moved, the linked grouped policies remain intact. Universal groups are moved intact during a MoveTree. exe operation, whereas local and domain global groups are not moved at all with this utility. Other objects that can not be moved with movetree include
· System objects that identified by the objectClass as systemOnly
· Configuration or schema naming contexts objects
· Special container objects in the domain including Builtin, ForeignSecurity Principal, System, and LostAndFound
· Domain controllers
· Objects with the same name as an object that exists in the target domain
The syntax for the MoveTree. exe utility is
movetree {/start | /startnocheck | /continue | /check} /s SrcDSA
/d DstDSA /sdn SrcDN /ddn DstDN [/u [Domain\]Username /p Password]
[/verbose] [{/? | /help}]
MSINFO32.EXE—MS SYSTEM INFORMATION TOOL
The Msinfo32.exe utility gathers system configuration data including hardware, software, and other system components. It is used to rapidly gather data necessary to resolve system conflicts or other problems.
Table A.85. MoveTree. exe Parameters | |
Option | Description |
/check | Performs a test of MoveTree before actually moving any objects. The reports provide an opportunity to correct noted errors. |
/continue | Continues to the move effort even after it is paused or a network failure occurs. |
/d Destination DSA | Sets the fully qualified primary DNS name of the destination server. |
/ddn DestinationDN | Sets the full distinguished name for the destination server subtree. |
/s SrcDSA | Sets the DNS of the source server. |
/sdn SrcDN | Sets the full distinguished name for the source server subtree. |
/start | Starts the MoveTree operation with the /check option. |
/startnocheck | Starts without the /check option. |
/u [Domain\]Username/p Password | Launches MoveTree with the specified user and password account. |
/verbose | Uses the verbose mode. |
Table A.86. Msinfo32.exe Parameters | |
Option | Description |
/computer computername | Establishes the computer to be analyzed. |
/categories +|-categoryname(s) | Sets the category of data to be retrieved for the output report. |
/report filename | Saves the report in the specified text file. |
/s filename | Saves the report in a System Information file. |
The syntax for Msinfo32.exe is as follows:
msinfo32 [/?] [/report filename] [/s filename] [/info filename]
[/computer computername] [/categories +|- category name(s)]
NETDIAG. EXE—NETWORK CONNECTIVITY TESTER
The Netdiag. exe command-line diagnostic tool identifies network connectivity problems and tests network client connectivity. Its syntax is
netdiag [/q] [/v] [/l] [/debug] [/d:DomainName] [/fix]
[/DcAccountEnum] [/test:testname] [/skip:testname]
Table diag. exe Parameters | |
Option | Description |
/d:DomainName | Locates the specified domain. |
/debug | Places in debug mode and outputs more data that even the verbose mode. |
/DcAccountEnum | Enumerates domain controller accounts. |
/fix | Fixes any identified minor problems automatically. |
/l | Outputs results to the netdiag. log log file. |
/q | Uses quiet mode and outputs errors only. |
/skip:TestName | Skips the named test among those listed below: · Autonet— Automatic Private IP Addressing (APIPA) address test · Bindings— bindings test · Browser— redirect and browser test · DcList— domain controller list test · DefGw— default gateway test · DNS— DNS test · DsGetDc— domain controller discovery test · IpConfig— IP address configuration test · IpLoopBk— IP address loopback ping test · IPX— IPX test · Kerberos— Kerberos test · Ldap— LDAP test · Modem— modem diagnostics test · NbtNm— NetBT name test · Netstat— netstat information test · Netware— netware test · Route— routing table test · Trust— trust relationship test · WAN— WAN configuration test · WINS— WINS service test · Winsock— Winsock test |
/test:TestName | Performs the specified test. The optional tests are the same as those listed in the /skip option. |
/v | Outputs in verbose mode. |
NETDOM. EXE—DOMAIN MANAGER
The Netdom. exe command-line utility manages domains and trust relationships. It can be used to join Windows Server 2003 domains to either a Windows NT or Windows Server 2003 domain and to create one-way explicit trusts. Relationships can be viewed and displayed.
|
Из за большого объема этот материал размещен на нескольких страницах:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |


