Active Directory:
What is your experience using Active Directory? Like password reset and managing groups?
My experience using Active Directory (AD), group management, password settings that includes special
characters, symbols, minimum length, change password after first login, and expiration date.
Also, user accounts and grant permissions to it and to groups, and implementing Group Policy Objects
GPOs, we can include Server Virtualization with Hyper-V, that is Windows feature that must be installed
first in order to use it. It is an option provided within the OS.
What are OU’s?
Containers that can be used to group objects within a domain
-Create OUs to:
• Configure objects by assigning GPOs
• Delegate administrative permissions
OUs are represented by a folder with a book on it
Containers are represented by a blank folder
What is a security group in Active Directory?
Security groups are a way to collect user accounts, computer accounts, and other groups into
manageable units.
Is a container object used to manage and assign permissions to multiple users, computers, or other
security groups. It is a fundamental component of access control in Windows-based environments.
In the Windows Server operating system, several built-in accounts and security groups are
preconfigured with the appropriate rights and permissions to perform specific tasks. In Active Directory,
administrative responsibilities are separated into two types of administrators:
• Service administrators: Responsible for maintaining and delivering Active Directory Domain
Services (AD DS), including managing domain controllers and configuring AD DS.
• Data administrators: Responsible for maintaining the data that's stored in AD DS and on
domain member servers and workstations.
Security groups can provide an efficient way to assign access to resources on your network. Assign
user rights to security groups in Active Directory.
Networking:
What a DNS is and what is for?
DNS (Domain Name System) entries take a human-friendly name, it’s like Phonebook for all the
websites, for instance: [Link], and translate it to an IP address. The DNS can quickly be
updated with some propagation time, which is the length of time (or like a TTL) needed to update
records across the Internet.
Name DNS record types.
• A Record (Address Record): Points a domain or subdomain to an IP address. For example,
you can use it for [Link] or [Link] and point it to where you have your
store. These are commonly used for Amazon and Ebay. Just to mention some examples.
• C Name (Canonical Name): Points one domain or subdomain to another domain name,
allowing you to update one A Record each time you make a change, regardless of how many
Host Records need to resolve to that IP address.
These records point to [Link] to [Link], [Link] to
[Link], and [Link] to [Link]. The first record allows the
domain to resolve to the same server with or without the www subdomain. The second record
allows you to use an alternative subdomain for email hosting and delivery. The third record allows
you to use the [Link] subdomain with G Suite, where you can use Google's
document management system. This type of record requires additional configuration with
Google.
• MX Entry: A mail exchanger (MX) record is a DNS record that identifies which server will handle
your domain's incoming mail. MX records always point to a domain, never to an IP address.
When using Any name servers, your default MX record is your domain name which contains a
local IP address to the server, so all mail is handled locally, but this record can be modified to
point to a third-party email host, or you can add additional MX records and set their priority.
What is a Virtual Machine?
A Virtual Machine (VM) is a compute resource that uses software instead of a physical computer to run
programs and deploy apps. One or more virtual “guest” machines run on a physical “host” machine.
Each virtual machine runs its own operating system and functions separately from the other VMs, even
when they are all running on the same host. This means that, for example, a virtual MacOS virtual
machine can run on a physical PC.
A virtual machine (VM) in VMware refers to a software emulation of a physical computer system. It
allows you to run multiple operating systems simultaneously on a single physical machine, each
operating system running in its own isolated environment. VMware is a popular virtualization technology
that provides the platform for creating and managing virtual machines.
What is DHCP and what it does?
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol used to automatically
assign IP addresses and other network configuration settings to devices on a network. DHCP simplifies
the process of network configuration and helps manage IP address allocation efficiently.
Here's how DHCP works:
1. Client Request: When a device (client) connects to a network, it sends a DHCP request
broadcast message to discover DHCP servers on the network.
2. DHCP Server Response: DHCP servers on the network receive the client's request and
respond with a DHCP offer. The offer includes an available IP address, subnet mask, default
gateway, DNS server addresses, and other configuration settings.
3. Client Selection: The client receives multiple DHCP offers from different servers and selects
one based on various criteria, typically accepting the first offer it receives.
4. DHCP Acknowledgment: The client sends a DHCP request to the chosen DHCP server,
confirming its acceptance of the offered configuration settings.
5. IP Address Lease: The DHCP server assigns the requested IP address to the client and
specifies a lease duration. The lease duration determines how long the client can use the
assigned IP address before it must renew the lease.
6. Configuration Parameters: Along with the IP address, the DHCP server provides other network
configuration parameters, such as subnet mask, default gateway, DNS server addresses, and
potentially additional options like domain name and NTP server.
7. Lease Renewal: During the lease duration, the client can continue to use the assigned IP
address. It periodically contacts the DHCP server to renew the lease and extend its validity. If
the client doesn't renew the lease in time, the IP address may be released and made available
for other devices.
What is a default Gateway?
It’s also known as a default route, basically is a network device or IP address that serves as the entry
point or exit point for traffic going between different networks. In simple terms, it is the path that network
devices use to send data outside of their local network to reach destinations on other networks, such
as the internet.
When a device needs to send data to a destination outside of its local network, it checks its routing
table for a specific route. If there is no specific route available, the device uses the default gateway as
a catch-all route. The default gateway acts as the "gateway" or intermediary between the local network
and other networks, forwarding traffic to its appropriate destination.
For example, in a home network setup, the default gateway is typically the IP address of the home
router. Any device within that network, such as a computer or smartphone, will use the default gateway
to send data to external destinations.
In summary, the default gateway is the network device or IP address that enables devices within a
network to communicate with devices on other networks by forwarding traffic between them.
Can you explain the difference between HTTP and HTTPS?
The main difference between HTTP (Hypertext Transfer Protocol) and HTTPS (Hypertext Transfer
Protocol Secure) lies in the level of security they provide when transferring data over the internet.
In summary, while HTTP is a standard protocol for transmitting data over the web, it lacks encryption,
making it vulnerable to interception. HTTPS, on the other hand, provides encryption through SSL/TLS
certificates, ensuring secure and private communication between the web server and the user's
browser.
To enable HTTPS, websites use an SSL/TLS (Secure Sockets Layer/Transport Layer Security)
certificate. This certificate verifies the identity of the website and enables the encryption of data during
transmission. HTTPS is commonly used on websites that handle sensitive data, such as online banking,
e-commerce sites, or any website where secure transmission of personal information is necessary.
What is a Subnet?
In computer networking, a subnet, short for "subnetwork," refers to a smaller division or segment of an
IP network. It involves dividing a larger network into smaller, more manageable subnetworks to improve
network efficiency, security, and address allocation.
A subnet is defined by a subnet mask, which is a numerical value that determines the size of the subnet
and identifies the network and host portions of an IP address. The subnet mask is applied to an IP
address to determine which portion identifies the network and which portion identifies the specific host
within that network.
Overall, subnets provide a way to efficiently divide and manage IP networks, allowing for improved
address allocation, network segmentation, and enhanced security within a larger network infrastructure.
OFFICE 365 Management:
How do I delegate access to emails or forwarding emails too?
To delegate access to emails or set up email forwarding in Office 365, you can follow these steps:
Delegate Access:
• Sign in to your Office 365 account and open Outlook.
• Click on the "File" tab in the top left corner.
• In the File menu, select "Account Settings" and then click on "Delegate Access."
• In the Delegates window, click on the "Add" button.
• Enter the name or email address of the person you want to delegate access to and click on "Add"
again.
• Select the appropriate permissions you want to grant to the delegate (e.g., Calendar, Inbox,
Tasks, etc.).
• If you want to send a notification to the delegate about the permissions, check the box next to
"Automatically send a message to delegate summarizing these permissions."
• Click "OK" to save the changes.
Email Forwarding:
• Sign in to your Office 365 account and open Outlook.
• Click on the "Settings" gear icon in the top right corner.
• In the Settings menu, click on "View all Outlook settings" at the bottom.
• In the left sidebar, select "Mail" under the "Mail" section.
• Click on "Forwarding" in the main panel.
• Check the box next to "Enable forwarding" and enter the email address to which you want to
forward your messages.
• Choose whether to keep a copy of forwarded messages in your Office 365 mailbox or not.
• Optionally, you can choose to enable or disable automatic replies to senders notifying them
about the forwarding.
• Click "Save" to apply the changes.
What is the main difference between E3 vs E5 license?
Office 365 is available in three plans: E1, E3, and E5.
• E1 is the most basic plan, offering essential business services like email, file sharing, and
storage.
• E3 provides the full suite of enterprise functionality with Office applications (Word, Excel,
PowerPoint, etc.) and additional security functionality.
• E5 is the most advanced package, with all the features of E3, alongside advanced email security
functionality, analytics, and phone systems.
OUTLOOK:
How do you recreate an Outlook profile?
Recreating an Outlook profile will remove the existing profile and its associated data. Before
proceeding, ensure that you have a backup of any important emails, contacts, or other data associated
with the current profile.
• Close Outlook: Make sure Outlook is closed completely before proceeding.
• Open Control Panel: Go to the Control Panel on your Windows computer. You can access it by
typing "Control Panel" in the Windows search bar and selecting the corresponding result.
• Open Mail (or Mail Setup): In the Control Panel, search for "Mail" or "Mail Setup" and click on
the corresponding option. The name may vary depending on your version of Windows.
• Show Profiles: In the Mail dialog box, click on the "Show Profiles" button.
• Remove the existing profile: Select the existing Outlook profile and click on the "Remove" button.
Confirm the removal when prompted. This will delete the profile and its associated data.
• Add a new profile: After removing the existing profile, click on the "Add" button to create a new
profile.
• Enter Profile Name and Email Address: In the "New Profile" dialog box, provide a name for the
new profile and enter your email address. Click on the "OK" button to proceed.
• Configure Account: Follow the on-screen instructions to configure your email account in the new
profile. Depending on your email provider, you may need to provide additional information such
as your password and server settings.
• Finish Setup: Once the account configuration is complete, click on the "Finish" button.
• Open Outlook: Launch Outlook, and it should now open with the newly created profile.
Outlook keeps prompting for password, what is causing this issue?
If Outlook keeps prompting for a password, it could be caused by several factors. Here are some
common reasons and troubleshooting steps to resolve the issue:
• Incorrect Password: Ensure that you are entering the correct password for your email account.
Double-check for any typing errors or ensure that your password hasn't been changed.
• Saved Password Issues: Sometimes, the saved password in Outlook gets corrupted or
becomes outdated. To fix this, you can remove the saved password and re-enter it:
o Close Outlook.
o Open the Windows Control Panel and navigate to the "Credential Manager" (or "User
Accounts" > "Credential Manager").
o Under "Windows Credentials," locate and remove any saved credentials related to your
email account.
o Restart Outlook and enter your password when prompted.
• Account Security Settings: Your email provider may have enabled additional security settings
that require you to create an app password or enable two-factor authentication (2FA). Check
with your email provider for any specific requirements or app password generation instructions.
• Network Connectivity Issues: Poor or intermittent network connectivity can cause Outlook to
repeatedly prompt for a password. Ensure you have a stable internet connection and check if
other applications are working properly.
• Expired or Disabled Account: If your email account has expired or has been disabled, Outlook
may continuously prompt for a password. Contact your email provider to verify the status of your
account.
• Antivirus or Firewall Interference: Sometimes, antivirus software or firewalls can interfere with
Outlook's connection to your email server. Temporarily disable your antivirus or firewall and
check if the issue persists. If it resolves the problem, you may need to adjust the settings or add
exceptions for Outlook in your security software.
• Outdated Outlook Version: Ensure that you are using the latest version of Outlook. Microsoft
frequently releases updates that address known issues and improve compatibility. Check for any
available updates and install them.
Customer calls stating that Outlook keeps crashing when opening, what would you do?
If a customer reports that Outlook keeps crashing when opening, I will try some troubleshoot steps in
order to try to fix it.
• Verify System Requirements: Ensure that the customer's computer meets the minimum
system requirements for running the version of Outlook they are using. Check factors such as
operating system compatibility, available disk space, and RAM.
• Try to update Outlook: Make sure the customer is using the latest version of Outlook. Microsoft
regularly releases updates to address bugs, improve stability, and add new features. Check for
any available updates and install them.
• Start Outlook in Safe Mode: Ask the customer to start Outlook in Safe Mode. This disables any
add-ins or extensions that might be causing conflicts. If Outlook opens successfully in Safe
Mode, it indicates that an add-in is likely causing the crashing issue. Instruct the customer to
disable or remove any recently installed or suspicious add-ins.
• Repair Outlook Data Files: Outlook data files, such as PST or OST files, can become corrupted
and cause crashes. Use the built-in repair tool, [Link] (for PST files) or [Link] (for
OST files), to scan and repair the data files. Provide guidance to the customer on locating and
running the appropriate tool.
• Disable Hardware Graphics Acceleration: In some cases, issues with graphics acceleration
can lead to Outlook crashes. Instruct the customer to disable hardware graphics acceleration in
Outlook:
o Open Outlook and go to File > Options.
o In the Options window, select the "Advanced" tab.
o Scroll down to the "Display" section and check the box for "Disable hardware graphics
acceleration."
o Click OK to save the changes and restart Outlook.
o Create a New Outlook Profile: A corrupted or damaged Outlook profile can cause crashes. Guide
the customer to create a new profile and configure their email account again. This will create a
fresh profile and may resolve any issues with the previous profile.
• Repair or Reinstall Office: If the above steps do not resolve the crashing issue, it may be
necessary to repair or reinstall the Microsoft Office suite. Instruct the customer to use the Office
Repair feature or uninstall and reinstall Office following the proper procedure.