BACK
Information Assurance: Security, Fault Tolerance, 
  Windows Clustering, Windows NLB, Backup and Recovery
 
Security:
Windows 2003 security features: http://www.activewin.com/reviews/software/operating-sys/win2003serv/security.shtml
A Technical Comparison of TTLS and PEAP: 
  http://www.oreillynet.com/pub/a/wireless/2002/10/17/peap.html
According to the (default) password complexity policy, a valid 
  password cannot contain any of the user's account name, and it must be at least 
  six characters long. The password must also contain characters from three of 
  the four categories: uppercase letters, lowercase letters, numbers, and non-alphanumeric 
  characters.
 Sites and links: 
  - securitytracker.com
-  cert.org
-  cve.mitre.org
-  securityfocus.com
-  isc.sans.org (Internet Storm Center)
The Microsoft Baseline Security Analyzer (MBSA)
  - Cannot be used to scan computers running Windows 98 SE.
- It can only be used to scan computers running Windows NT 4.0 SP4, Windows 
    2000, Windows XP, and Windows Server 2003.
- Computers can only be scanned remotely if they have the File and Printer 
    service, the Server service, and the Remote Registry service started. 
- A computer running either Windows 2000, Windows XP, or Windows Server 2003 
    can be used to remotely scan other computers, so there is no need to upgrade 
    the computer that will be used to perform the scan.
Certificates:
  -  A Smart Card User certificate can be used both for logon and for securing 
    e-mail.
- Smart Card User certificates can only be issued by enterprise CAs.
- An offline root CA cannot be an enterprise CA. 
- An Enrollment Agent certificate must be issued to someone so that he or 
    she can issue smart cards to other users.
- Enrollment Agent certificates can only be issued by enterprise CAs.
- A Smart Card Logon certificate can be used for authentication, but not for 
    secure e-mail.
- Certificate Manager is a role on the CA that allows users to approve enrollment 
    requests and revoke certificates - it is not a certificate type.
- You can prevent the Certificate Authority (CA) name from being sent as part 
    of the payload. This is an important security precaution to keep data about 
    the company's CA or the company's internal CA structure private from interlopers. 
    When the CA name is sent, it is sent prior to negotiating security, so it 
    is sent in clear text. 
- Diffie-Hellman Group 1 is less secure than Diffie-Hellman Group 2048 because 
    Diffie-Hellman Group 2048 uses a 2048-bit key. Diffie-Hellman Group 1 uses 
    only a 768-bit key. 
Fault Tolerance:
Fault Tolerance = FT
Automated System Recovery (ASR) is a part of 
  Backup that you can use to recover a system that will not start. With ASR, you 
  can create ASR sets on a regular basis as part of an overall plan for system 
  recovery in case of system failure. You should use ASR as a last resort in system 
  recovery, only after you have exhausted other options such as the startup options 
  Safe Mode and Last Known Good Configuration.
ASR is a recovery option that has two parts: ASR backup and ASR restore. You 
  can access the backup portion through the Automated System Recovery Preparation 
  Wizard located in Backup. The Automated System Recovery Preparation Wizard creates 
  an ASR set, which is a backup of the System State data, system services, and 
  all disks associated with the operating system components. It also creates a 
  floppy disk, which contains information about the backup, the disk configurations 
  (including basic and dynamic volumes), and how to restore your system.
You can access the restore part of ASR by pressing F2 when prompted in the 
  text mode portion of Setup. ASR reads the disk configurations from the floppy 
  disk and restores all of the disk signatures, volumes and partitions on the 
  disks that are required to start your computer (at a minimum). It will attempt 
  to restore all of the disk configurations, but under some circumstances it might 
  not be able to. ASR then installs a simple installation of Windows and automatically 
  starts to restore from backup using the backup ASR set.
ASR Notes
  - ASR does not include data files. You should back up data files separately 
    on a regular basis and restore them after the system is working.
-  ASR only supports FAT16 volumes up to 2.1 gigabytes (GB). ASR does not 
    support 4-GB FAT16 partitions that use a cluster size of 64 K. If your system 
    contains 4-GB FAT16 partitions, convert them from FAT16 to NTFS before using 
    ASR.
 
Cluster / NLB stuff
Cluster / load balancing options:
  - DNS round robin: This is you original and still viable 
    load balance tool. On by default with DNS - just set two (or more) A records 
    for the same FQDN but with different IPs. DNS will alternate between the various 
    A records. Great for stateless load balancing. Not aware of any hosts failure, 
    so not so great for FT. (Can script removal of records, but then may have 
    DNS cache related FT delays.) Clustering and NLB are more "mature" 
    dynamic systems. 
- Clusters: multiple machines intended to share the load 
    and take over for one another. Quick fail-over. More expensive, more to administer, 
    more "wasted" CPU cycles. (NT4 had clustering marketed as wolf 
    pack, but as the max cluster size was two it was AKA wolf pair.)
- NLB: Network Load Balancing. Bunch of machines offering 
    same service. Clients spread over them. Can add boxes as load increases.
Statefullness - Data or situation unique to the particular 
  client / server session. Something about the session that necessitates that 
  the client continue to communicate with the same server over time. Statefullness 
  can be handled by client-side cookies, or unique statefull strings in URLs. 
  Client state specific data can be stored in a central storage area outside of 
  server host and shared by all the servers. Or, clients can be made to maintain 
  a specific server for the length of the session. An IE to Exchange cluster OWA 
  session is statefull - if the target Exchange server node goes down the client 
  would reconnect to a different node and reopen windows and have to reset things 
  like sort order, sizing, etc..An on-line banking session failing over from one 
  node to anther wouldn't know what check detail you were looking at, for example. 
  However, if the data was a static website were all server nodes had the exact 
  same data, there is no state and thus failover is automatically transparent 
  and stateless.
Cluster / NLB comparison:
   
    | CLUSTER | NLB | 
   
    | 2003 Enterprise or Data Center | all 2003 versions | 
   
    | 8 nodes max | 32 nodes max | 
   
    | cluster aware applications | any application | 
   
    | application and server failure aware | server failure aware only | 
 
Windows Cluster 
  Servers:
Requires shared storage:
  - SAN
- Shared SCSI
- Fiber Channel (preferred)
Quarum: ???
Windows Server 2003 Clustering whitepaper
  http://www.microsoft.com/windowsserver2003/techinfo/overview/bdmtdm/default.mspx
 
Windows Network Load 
  Balancing - NLB :
Network Load Balancing (NLB) from 2003 TechCenter:
  - Network Load Balancing supports up to 32 computers in a single cluster. 
    Hosts can be added and removed without interrupting cluster availability.
- Network Load Balancing is a driver, Wlbs.sys, which you must load on each 
    host in the cluster. Wlbs.sys includes a statistical mapping algorithm that 
    the hosts of the cluster collectively use to determine which host handles 
    each incoming request./
- You install the driver on each of the cluster hosts, and you configure the 
    cluster to present a virtual IP address to client requests. The client requests 
    go to all of the hosts in the cluster, but only the mapped host accepts and 
    handles the request. All of the other hosts in the cluster drop the request.
- After the driver is installed, it must be configured before the host can 
    join a cluster. You must configure three groups of information about each 
    host: cluster parameters, host parameters, and port rules, before it is possible 
    to create or join a cluster.
NLB Fundamentals - FAQ:
  http://technet2.microsoft.com/WindowsServer/en/library/b098ca89-c162-4a60-bf47-eab85203d7f41033.mspx?mfr=true
 
Backup and Recovery:
Microsoft names for types of backups:
  - Normal backup
 The normal backup is normal. (Surprised?) So, what does this mean? 
    It simply means that it copies all the files you have marked to be backed 
    up, and marks the files as having been backed up. You also only need the most 
    recent copy of the backup file (other types of backups requires several files, 
    see below) to restore. This type is usually what you use the first time you 
    backup files.
- Incremental backup 
 The incremental backup backs up only those files that have been 
    created or changed since last incremental or normal backup. It also marks 
    the files as having been backed up. A combination of Normal backups and Incremental 
    backups is common, and also a very good combination. It also requires the 
    least amount if storage space and is fast for backing up the data. The disadvantage 
    of this is that it's time-consuming to recover files, simply because you need 
    the last normal backup set and all incremental backup sets, which can be stored 
    on several backup drives or tapes.
- Differential backup 
 The differential backup is similar to the incremental backup and 
    only copies files that have been created or changed since the last normal 
    or incremental backup. No, it wasn't a typo, it doesn't check if a differential 
    backup has been run. This is because differential backups does not mark files 
    as having been backed up. A combination of differential backups and normal 
    backups is more time-consuming concerning the backup part then the incremental 
    + normal backups are. But on the other hand it is faster to restore data because 
    all you need is the last normal backup and the last differential backup.
- Copy backup 
 A copy backup copies all the files you have selected, but does not 
    mark the files as having been backed up. This backup type is useful when you 
    must backup single files between normal and incremental backups because it 
    does not affect these operations.
- Daily backup 
 The daily backup copies all the files that you have selected that 
    have been modified on the day, without marking the files as having been backed 
    up.
To reset the Directory Services password before you restart in DS restore 
  mode:
  - ntdsutil (from cmd line)
- set dsrm password
-  reset password on server null
-  quit
-  quit
- (Getting there and what this is for lead to a whole 
    plethora of other critical information...) 
System state data: 
You can choose to do a System State backup, and this is very important if you 
  want to be able to get a functional system in the event of a crash. This table 
  shows which components that are backed up on a System State backup. 
   
    | Component | Included in System State Backup | 
   
    | Boot files and system files | Yes | 
   
    | Registry | Yes | 
   
    | COM+ | Yes | 
   
    | System files under Windows File Protection | Yes | 
   
    | Active Directory, directory service | If it's a domain | 
   
    | SYSVOL directory | If it's a domain controller | 
   
    | IIS Metadirectory | If it's installed | 
   
    | Certificate Services database | If it's a Certificate Services server | 
   
    | Cluster Service information | If it's within a cluster | 
Nice backup EARL: http://www.ilopia.com/Articles/WindowsServer2003/Backup.aspx
BACK