Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2008 R2 : Analyze Server Roles (part 1) - Use the Best Practices Analyzer

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
6/17/2011 11:48:54 AM
Installing server roles, with proper planning, on a Windows Server 2008 R2 server can be a fairly straightforward process. But even with the proper planning, sometimes your server roles can be made to run more efficiently. You may also want to make sure your servers and the roles installed on the servers are running properly.

When you install a server, you usually have planned out how it will fit the needs of your business and your network infrastructure. However, what happens when you are not in control and you "inherit" servers from a new customer, from an acquisition, or because you took a new role in your organization? How do you know if the servers and roles are running properly? In the following sections, you will learn about a tool called the Best Practices Analyzer (BPA) that will provide you with guidance to help run your servers more efficiently.

1. Understand the Best Practices Analyzer

Microsoft has provided the Best Practices Analyzer for several years for the various server platforms currently available. These analyzers were available through a free download from the Microsoft site. With Windows Server 2008 R2, the Best Practices Analyzer is now built in to the server platform and is available for you to use when you install certain roles on your server. Currently in Windows Server 2008 R2, the BPA is provided only for the following roles:

  • Active Directory Certification Services (AD CS)

  • Active Directory Domain Services (AD DS)

  • DNS

  • Remote Desktop Services (RDS)

  • Internet Information Services (IIS)

The BPA is like a mini IT consultant running around your Windows Server 2008 R2 server and checking your roles to make sure the ones on your server are running properly. This tool provides you with the ability to manage your servers proactively and get in front of any potential issues or concerns before they happen. The BPA helps you make sure your configurations are good and helps reduce the amount of troubleshooting you have to do when issues do occur.

When you use the BPA, it will analyze your current environment and compare this against common best practices for the particular role. What makes the guidance from the tool unique is that Microsoft is not the only one providing feedback; the feedback comes from IT administrators and customers like yourself, from support professionals, and even from the many folks in the field working for Microsoft.

When you invoke a BPA scanner against one of your server roles, you start the BPA runtime. The runtime is the main process responsible for collecting and comparing the configuration settings on your Windows Server 2008 R2 server. Regardless of which role you are currently scanning, the BPA follows the process illustrated in Figure 1.

  1. The BPA scans and verifies the current role configuration settings.

  2. As the BPA service scans and verifies, the BPA runtime uses a BPA Windows PowerShell script to collect configuration data and store it in an XML document.

  3. The BPA runtime then validates the XML document against an XML schema. The schema defines the format and structure of the XML document.

  4. The BPA runtime then applies the BPA rules (these are the best-practice configurations) for the environment against the XML document.

  5. From there the guidance is used to produce the BPA report. The report is used to help make adjustments to your environment if needed.

Figure 1. BPA process flow

When you first review a report, you may see violations in the report. You do not need to panic when you see violations in your BPA report. These violations do not always indicate a major problem for your server. Remember, the BPA tool is trying to help identify for you server configurations that can result in poor performance, poor reliability, unexpected conflicts, increased security risks, or other potential problems.

Although the guidance in the tool can be a tremendous help in reporting your actual configuration vs. the known best practices, you should always look carefully at the suggestions. The best practices are sound; however, sometimes based on your business rules and the demands of your infrastructure, they may not improve your configuration. So, review the recommendations very carefully.

2. Use the Best Practices Analyzer

The BPA is located in Server Manager and becomes available after you install the supported roles. You will find the BPA on the role summary screen for the supported roles on your server. The summary screen for the roles provides a wealth of information for your server, and if the role has a BPA available, you will see it there.

  1. Open Server Manager by selecting Start => Administrative Tools and clicking Server Manager.

  2. Click the + sign next to Roles in the tree menu on the left to expand the roles.

  3. Click the role you want to scan, and you will see a role summary screen similar to Figure 2.

    Figure 2. Role summary screen
  4. Next to Best Practices Analyzer, click Scan This Role, and you will see the BPA process begin to scan your selected role, as shown in Figure 3. The scan could take several minutes.

    Figure 3. BPA scanning
  5. After the scan is complete, you will see the BPA report, as shown in Figure 4.

Figure 4. BPA report

2.1. Understand the BPA Report

When you create a BPA report, it considers several factors for your server role. For example, when you run an AD DS BPA scan, the analyzer is checking these aspects of your configuration:

  • DNS rules

  • Operation master connectivity rules

  • Operation master ownership rules

  • Number of controllers in the domain

  • Required service rules

  • Replication configuration rules

  • W32time configuration rules

  • Virtual machine configuration rules

You can view all the rules scanned for the different roles at http://technet.microsoft.com/en-us/library/dd392255(WS.10).aspx

As you can see, the scan is very thorough. Regardless of what scan you run, you will see several aspects of the report on the summary screen. Your report will have one of three severity levels for each rule. The three levels of severity for the scanned rules are as follows:

Non-Compliant (indicated by an X in a red circle) This means your scanned role is not compliant with the particular BPA rule scanned.

Warning (indicated by an ! in a yellow triangle) This means your current role is compliant, but your current configuration of the role does not meet all the conditions specified by the rule. In general, this means your role will work; however, there may indications the role is not fully functional.

Compliant (indicated by a in a green circle) This means your scanned role is compliant with the particular BPA rule scanned.

In addition to the severity level, each rule is categorized into one of eight categories. The categories are designed to help you further target and work with the BPA report. In a sense, the categories, as listed in Table 1, help you prioritize the tasks you will need to take action on.

Table 1. BPA Rule Categories
CategoryDefinition
SecurityThese rules help you examine the areas of your server with potential security risks; you'll want to pay close attention to them.
PerformanceThese rules are designed to help you tune or improve the performance of your servers. These rules help to make sure your server can perform the appointed tasks properly.
ConfigurationThese rules allow you to verify the configurations of certain roles on your server. These help the role(s) run properly and free of configuration errors.
PolicyThese rules identify which areas in the registry or Group Policy need improvements to make sure your role is running in a secure and best-possible fashion.
OperationThese rules will identify whether a role is failing and how to correct the role to get it up and running properly.
Pre-deploymentThese rules allow you to identify any issues or possible errors prior to the deployment of a particular role in the enterprise.
Post-deploymentThese rules allow you to identify any issues or possible errors after the role has been deployed to the enterprise.
BPA PrerequisitesThese rules are for the BPA scanner. In order for certain BPA rules to be included in a report, there may be some prerequisites that need to be met in order for a rule to be scanned. If you have a BPA prerequisite error, this simply means the BPA tool could not scan your role with a particular rule.

2.2. Work with the BPA Report

Now that you understand how the report is categorized, you will want to see how to fix any issues the BPA scan detected for you. After the report is processed and you have identified the events you want to view, you will start to see the power behind the BPA reports. Each rule has properties you can view that will tell you what violated the BPA rule. The properties of the report are broken into three sections: what the issue is, what is the impact of the violation, and most important what the resolution is. To see this information, you need to view the properties of the rule:

  1. In the BPA report, click the rule you want to view.

  2. To view the properties, you can either double-click the rule, right-click the rule and select Properties, or click Properties to the right of the BPA report. After you have done this, you will see a Properties dialog box similar to Figure 5.

  3. When you are done viewing the information, click Close.

You also have the ability to exclude your BPA rule information from future reports. With a rule highlighted, you can click Exclude This Item, and it will be removed from the report. It will be moved to the Excluded tab of the report.

As you can see, the BPA reports provide some excellent analysis for your server. After you have viewed the error messages and corrected any errors, you should also consider rerunning the BPA for the role to verify the issue has been properly resolved.

Figure 5. BPA rule properties
Other -----------------
- Windows Server 2008 R2 : Maintaining Your Web Server - Work with Websites
- SQL Server 2008 : Creating Indexes via T-SQL (part 2) - Creating Filtered Indexes & Creating XML Indexes
- SQL Server 2008 : Creating Indexes via T-SQL (part 1) - Creating Clustered and Nonclustered Indexes & Creating Unique and Primary Key Indexes
- SQL Server 2008 : Index Vocabulary, Structure, and Concepts
- BizTalk 2009 : The Enterprise Service Bus Toolkit 2.0 - The Architecture (part 2) - Adapter Providers & Mediation Policies
- BizTalk 2009 : The Enterprise Service Bus Toolkit 2.0 - The Architecture (part 1) - Mediation Components & Resolvers
- BizTalk 2009 : The Enterprise Service Bus Toolkit 2.0 - BizTalk and the ESB Concept
- SQL Server 2008 High Availability : Log Shipping (part 2) - SharePoint and Log Shipping
- SQL Server 2008 High Availability : Log Shipping (part 1) - How to Configure Log Shipping
- Windows Server 2008 R2 : Manage Internet Information Services (part 2) - Remotely Manage IIS Servers & Manage IIS with PowerShell
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server