Installing and Configuring Windows Server 2012: Official Microsoft Learning Product
Installing and Configuring Windows Server 2012: Official Microsoft Learning Product
Installing and Configuring Windows Server 2012: Official Microsoft Learning Product
M I C R O S O F T
L E A R N I N G
P R O D U C T
20410B
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein. 2012 Microsoft Corporation. All rights reserved.
Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty /Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners
Contents
Module 1: Deploying and Managing Windows Server 2012
Lesson 1: Windows Server 2012 Overview Lesson 2: Overview of Windows Server 2012 Management Lesson 3: Installing Windows Server 2012 Lesson 4: Post-Installation Configuration of Windows Server 2012 Lesson 5: Introduction to Windows PowerShell Lab: Deploying and Managing Windows Server 2012 1-2 1-14 1-20 1-25 1-34 1-39
xxiv
Course Materials
The following materials are included with your kit: Course Handbook A succinct classroom learning guide that provides all the critical technical information in a crisp, tightly-focused format, which is just right for an effective in-class learning experience. Lessons: Guide you through the learning objectives and provide the key points that are critical to the success of the in-class learning experience. Labs: Provide a real-world, hands-on platform for you to apply the knowledge and skills learned in the module. Module Reviews and Takeaways: Provide improved on-the-job reference material to boost knowledge and skills retention. Lab Answer Keys: Provide step-by-step lab solution guidance at your fingertips when its needed.
Course Companion Content on the http://www.microsoft.com/learning/companionmoc Site: Searchable, easy-to-navigate digital content with integrated premium online resources designed to supplement the Course Handbook. Modules: Include companion content, such as questions and answers, detailed demo steps and additional reading links, for each lesson. Additionally, they include Lab Review questions and answers and Module Reviews and Takeaways sections, which contain the review questions and answers, best practices, common issues and troubleshooting tips with answers, and real-world issues and scenarios with answers. Resources: Include well-categorized additional resources that give you immediate access to the most up-to-date premium content on TechNet, MSDN, and Microsoft Press.
Student Course files on the http://www.microsoft.com/learning/companionmoc Site: Includes the Allfiles.exe, a self-extracting executable file that contains all the files required for the labs and demonstrations. Course evaluation At the end of the course, you will have the opportunity to complete an online evaluation to provide feedback on the course, training facility, and instructor. To provide additional comments or feedback on the course, send e-mail to [email protected]. To inquire about the Microsoft Certification Program, send e-mail to [email protected].
1-1
Module 1
Deploying and Managing Windows Server 2012
Contents:
Module Overview Lesson 1: Windows Server 2012 Overview Lesson 2: Overview of Windows Server 2012 Management Lesson 3: Installing Windows Server 2012 Lesson 4: Post-Installation Configuration of Windows Server 2012 Lesson 5: Introduction to Windows PowerShell Lab: Deploying and Managing Windows Server 2012 Module Review and Takeaways 1-1 1-2 1-14 1-20 1-25 1-34 1-39 1-48
Module Overview
Understanding the capabilities of a new Windows Server 2012 operating system enables you to leverage that operating system effectively. If you do not understand the capabilities of your new Windows Server 2012 operating system, you may end up using it the same way that you used the previous operating system, and you may forego the advantages of the new system. By understanding how to utilize your new Windows Server 2012 operating system fully, and by understanding the tools that are available to manage that functionality, you can provide your organization with more value. This module introduces the new Windows Server 2012 administrative interface. In this module, you will learn about the different roles and features that are available with the Windows Server 2012 operating system. You will also learn about the different installation options that you can use when you install Windows Server 2012. This module discusses the configuration steps that you can perform both during installation and after deployment to ensure that the servers can begin functioning in its assigned role. You will also learn how to use Windows PowerShell to perform common administrative tasks in Windows Server 2012.
Objectives
After completing this module, you will be able to: Describe Windows Server 2012. Describe the management tools available in Windows Server 2012. Install Windows Server 2012. Perform post-installation configuration of Windows Server 2012. Perform basic administrative tasks using Windows PowerShell.
Lesson 1
Lesson Objectives
After completing this lesson, you will be able to: Describe the role of on-premises servers on a modern network. Explain the difference between the private and public clouds. List the different editions of Windows Server 2012. Describe the difference between a Server Core installation of Windows Server 2012 and traditional installation of Windows Server 2012. Explain the function of the server roles that are available on computers running Windows Server2012. Explain the purpose of various Windows Server 2012 features.
On-Premises Servers
As an IT professional, you most likely have heard about cloud computing. You might have heard how software and services are being moved to a public or private cloud because the cloud is predicted to be an important aspect of the future of enterprise computing. You also may have heard that Windows Server 2012 is ready for the cloud. As an IT professional who has worked with locally-deployed servers, it would be reasonable to ask why, If everything is moving to cloud computing, do you need to learn about deploying Windows Server 2012 locally? The reality is, not every service and application that is used on a daily basis should be hosted by cloud computing. Locally deployed servers form the backbone of an organizational network, and provide the following resources to clients: Infrastructure services. Servers provide clients with infrastructure resources, including Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) services. These services allow clients to connect and communicate with other resources. Without these services, clients would not be able to connect either to each other or to remote resourcesincluding resources that are hosted by cloud computing.
Shared files and printers. Servers provide a centralized location that allows users to store and share documents. Servers also host resources such as shared printers that allow groups of users to leverage resources more efficiently. Without these centralized, locally deployed resources, sharing and backing up files centrally would be a more complex and time-intensive process. While it might be possible to host some of this information with cloud computing, it does not always make sense to send a job to a printer that is in the next room through a server that is hosted at a remote location. Hosted applications. Servers host applications such as Microsoft Exchange Server, Microsoft SQL Server, Microsoft Dynamics, and Microsoft System Center. Clients access these applications to accomplish different tasks, such as accessing email or self-service deployment of desktop applications. In some cases, these resources can be deployed to cloud computing. In many cases these resources must be hosted locally for performance, cost, and regulatory reasons. Whether it is best to host these resources locally or with cloud computing depends on the specifics of the individual organization. Network access. Servers provide authentication and authorization resources to clients on the network. By authenticating against a server, a user and client can prove their identity. Even when many of an organizations servers are located in a public or private cloud, people still need to have some form of local authentication and authorization infrastructure. Application, Update, and Operating System deployment. Servers are often deployed locally to assist with the deployment of applications, updates, and operating systems to clients on the organizational network. Because of intensive bandwidth utilization, these servers must be in proximity to the clients to which they are providing this service.
Each organization will have its own requirements. An organization in an area that has limited Internet connectivity will need to rely more on on-premises servers than an organization that has access to high-speed bandwidth. It is important that, even in a case of Internet connectivity issues, work in an organization can continue. Productivity will be negatively affected if the failure of the organizations Internet connection suddenly means that no one is able to access his or her shared files and printers. While Windows Server 2012 is ready for integration with cloud computing, it is also still eminently suited to the traditional tasks that Windows Server operating systems have performed historically. Therefore, you will still be able to configure and deploy Windows Server 2012 to perform the same or similar workloads that you configured for servers running Windows Server 2003, and maybe even for the Microsoft Windows NT Server 4.0. Question: What is the difference between a server and a client operating system? Question: How has the role of the server evolved over time from the Microsoft Windows NT 4.0 Server operating system to Windows Server 2012?
Description Provides all roles and features available on the Windows Server 2012 platform. Supports up to 64 sockets and up to 4 terabytes (TB) of random access memory (RAM). Includes two virtual machine licenses. Provides all roles and features that are available on the Windows Server 2012 platform. Includes unlimited virtual machine licenses for virtual machines that are run on the same hardware. Supports 64 sockets, up to 640 processor cores, and up to 4 TB of RAM. Designed for small business owners, allows only 15 users, cannot be joined to a domain, and includes limited server roles. Supports one processor core and up to 32 gigabytes (GB) of RAM. Next edition of Small Business Server. Must be root server in domain. It cannot function as a Hyper-V, Failover Clustering, Server Core, or Remote Desktop Services server. It has limits for 25 users and 50 devices. Supports two processor cores and 64 GB of RAM. Stand-alone Hyper-V platform for virtual machines with no UI. No licensing cost (free) for host operating system, but virtual machines are licensed normally. Supports 64 sockets and 4 TB of RAM. Supports domain join. Does not support other Windows Server 2012 roles other than limited file services features. Entry-level unified storage appliance. Limited to 50 users, one processor core, 32 GB of RAM. Supports domain join.
The Windows Server 2012 Datacenter operating system The Windows Server 2012 Foundation operating system The Windows Server 2012 Essentials operating system
The Windows Storage Server2012 Workgroup operating system The Windows Storage Server 2012 Standard operating system
Supports 64 sockets, but is licensed on a two-socket incrementing basis. Supports 4 TB of RAM. Includes two virtual machine licenses. Supports domain join. Supports some roles including DNS and DHCP Server roles, but does not support others including Active Directory Domain Services (AD DS), Active Directory Certificate Services (AD CS), and Active Directory Federation Services (AD FS). Supports multiple users accessing the same host computer directly using separate mouse, keyboard, and monitors. Limited to one socket, 32 GB of RAM, and a maximum of 12 sessions. Supports some roles including DNS and DHCP Server roles, but does not support others including AD DS, AD CS, and AD FS. Does not support domain join.
Description Supports multiple users accessing the same host computer directly using separate mouse, keyboard, and monitors. Limited to two sockets, 4 TB of RAM, and a maximum of 22 sessions. Supports some roles including DNS and DHCP Server roles, but does not support others including AD DS, AD CS, and AD FS. Supports domain join.
Additional Reading: For more information about the differences between Windows Server 2012 editions, see the Windows Server Catalog at http://go.microsoft.com/fwlink/?LinkID=266736.
Increasing numbers of Microsoft server applications are designed to run on computers with Server Core installed operating systems. For example, you can install SQL Server 2012 on computers that are running the Server Coreinstalled version of Windows Server 2008 R2. There are two ways of installing Windows Server 2012 in a Server Core configuration: Server Core. This is the standard deployment of Server Core. It is possible to convert to the full version of Windows Server 2012 with the graphical administration components, but only if you have access to an installation source with all server files, such as a mounted Windows image file (.wim) image. Server Core with Minimal Server Interface. This works the same as a deployment of Windows Server 2012 with the graphical component, except that the graphical components are not installed, nor are they removed. You can convert between Server Core with Minimal Interface and Windows Server 2012 with a graphical interface by installing the graphical features, but without needing to specify an installation source.
You can switch from Server Core to the graphical version of Windows Server 2012 by running the following Windows PowerShell cmdlet, where c:\mount is the root directory of a mounted image that hosts the full version of the Windows Server 2012 installation files:
Import-Module ServerManager Install-WindowsFeature -IncludeAllSubFeature User-Interfaces-Infra -Source c:\mount
Installing the graphical components gives you the option of performing administrative tasks using the graphical tools. You can also add the graphical tools using the sconfig.cmd menu-driven command-line tool. Once you have performed the necessary administrative tasks, you can return the computer to its original Server Core configuration. You can switch a computer that has the graphical version of Windows Server 2012 to Server Core by removing the following features: Graphical Management Tools and Infrastructure Server Graphical Shell
Note: Be careful when removing graphical features, as some servers will have other components installed that are dependent upon those features. When connected locally, you can use the tools that are listed in the following table to manage Server Core deployments of Windows Server 2012. Tool Cmd.exe PowerShell.exe Sconfig.cmd Notepad.exe Regedt32.exe Msinfo32.exe Taskmgr.exe Function Allows you to run traditional command-line tools such as ping.exe, ipconfig.exe, and netsh.exe. Launches a Windows PowerShell session on the Server Core deployment. You can then perform Windows PowerShell tasks normally. A command-line menu-driven administrative tool that allows you to perform most common server administrative tasks. Allows you to use the Notepad.exe text editor within the Server Core environment. Provides registry access within the Server Core environment. Allows you to view system information about the Server Core deployment. Launches the Task Manager.
Note: If you accidentally close the command window on a computer that is running Server Core, you can recover the command window by performing the following steps: 1. 2. Press the Ctrl+Alt+Del keys, and then click Task Manager. From the File menu, click New Task (Run), and then type cmd.exe.
Server Core supports most Windows Server 2012 roles and features. However, you cannot install the following roles on a computer running Server Core: AD FS Application Server Network Policy and Access Services (NPAS) Windows Deployment Services (Windows DS)
Even if a role is available to a computer that is running the Server Core installation option, a specific role service that is associated with that role may not be available. Note: You can check which roles on Server Core are available and which are not by running the query Get-WindowsFeature | where-object {$_.InstallState -eq Removed}. The Windows Server 2012 administration paradigm focuses more on managing many servers from one console than the traditional method of managing each server separately. This means that when you want to perform an administrative task, you are more likely to manage multiple computers that are running the Server Core operating system from one computer, than you are to connect to each computer individually. You can enable remote management of a computer that is running Server Core through sconfig.cmd, or by running the following command:
Netsh.exe firewall set service remoteadmin enable ALL
AD FS
Role Active Directory Lightweight Directory Services (AD LDS) Active Directory Rights Management Services (AD RMS) Application Server
Function Supports storage of application-specific data for directory-aware applications that do not require the full infrastructure of AD DS.
Allows you to apply rights management policies to prevent unauthorized access to sensitive documents. Supports centralized management and hosting of high-performance distributed business applications, such as those built with Microsoft .NET Framework 4.5. Provisions client computers on the network with temporary IP addresses. Provides name resolution for TCP/IP networks. Supports sending and receiving of faxes. Also allows you to manage fax resource on the network. Supports the management of shared folders storage, distributed file system (DFS), and network storage. Enables you to host virtual machines on computers that are running Windows Server 2012. Authorization infrastructure for remote connections, including Health Registration Authority (HRA) for Network Access Protection (NAP). Supports centralized management of document tasks, including network scanners and networked printers. Supports Seamless Connectivity, Always On, and Always Managed features based on the Windows 7 DirectAccess feature. Also supports remote access through virtual private network (VPN) and dial-up connections. Supports access to virtual desktops, session-based desktops, and RemoteApp programs. Allows you to automate and simplify the management of volume license keys and volume key activation. Allows you to manage a Key Management Service (KMS) host or configure AD DSbased activation for computers that are members of the domain. The Windows Server 2012 web server component. Allows you to deploy server operating systems to clients over the network. Provides a method of deploying updates for Microsoft products to network computers.
DHCP Server DNS Server Fax Server File and Storage Services Hyper-V Network Policy and Access Services Print and Document Services Remote Access
When you deploy a role, Windows Server 2012 automatically configures aspects of the servers configuration (such as firewall settings), to support the role. Windows Server 2012 also automatically and simultaneously deploys role dependencies. For example, when you install the WSUS role, the Web Server (IIS) role components that are required to support the WSUS role are also installed automatically. You add and remove roles using the Add Roles and Features Wizard, which is available from the Windows Server 2012 Server Manager console. If you are using Server Core, then you can also add and remove roles using the Install-WindowsFeature and Remove-WindowsFeature Windows PowerShell cmdlets. Question: Which roles are often co-located on the same server?
Feature .NET Framework 3.5 Features .NET Framework 4.5 Features Background Intelligent Transfer Service (BITS) Windows BitLocker Drive Encryption BitLocker network unlock Windows BranchCache
Description Installs .NET Framework 3.5 technologies. Installs .NET Framework 4.5 technologies. This feature is installed by default. Allows asynchronous transfer of files to ensure that other network applications are not adversely impacted. Supports full-disk and full-volume encryption, and startup environment protection. Provides a network-based key protector that can unlock locked BitLockerprotected domain-joined operating systems. Allows the server to function as either a hosted cache server or a BranchCache content server for BranchCache clients. Provides access to files stored on network file system (NFS) servers. Allows you to enforce bandwidth allocation on Converged Network Adapters. Provides support for additional functionality available in Enhanced Storage Access (IEEE 1667 protocol) device, including data access restrictions.
Feature Failover Clustering Group Policy Management Ink and Handwriting Services Internet Printing Client IP Address Management (IPAM) Server Internet SCSI (iSCSI) Target Storage Provider Internet Storage name Service (iSNS) Server service Line Printer Remote (LPR) Port Monitor Management Open Data Protocol (OData) IIS Extension
Description A high availability feature that allows Windows Server 2012 to participate in failover clustering. An administrative management tool for administering Group Policy across an enterprise. Allows use of Ink Support and Handwriting Recognition. Supports use of Internet Printing Protocol. Centralized management of IP address and namespace infrastructure. Provides iSCSI target and disk management services to Windows Server 2012. Supports discovery services of iSCSI storage area networks (SANs). Allows computer to send print jobs to printers that are shared using the Line Printer Daemon (LPD) service. Allows you to expose Windows PowerShell cmdlets through an ODatabased web service running on the Internet Information Services (IIS) platform. Supports media file infrastructure. Supports message delivery between applications. Supports multiple data paths to storage devices. Allows traffic to be distributed in a load-balanced manner across multiple servers that host the same stateless application. Name resolution protocol that allows applications to resolve names on the computer. Supports audio and video streaming applications on IP home networks. Allows you to create connection manager profiles that simplify remote access configuration deployment to client computers. Allows remote support through invitations. Transfers the differences between files over a network, minimizing bandwidth utilization. Collection of consoles and tools for remotely managing roles and features on other servers. Relays RPC traffic over HTTP as an alternative to VPN connections.
Media Foundation Message Queuing Multipath input/output (I/O) Network Load Balancing (NLB)
Peer Name Resolution Protocol (PNRP) Quality Windows Audio Video Experience Remote Access Server (RAS) Connection Manager Administration Kit Remote Assistance Remote Differential Compression (RDC) Remote Server Administration Tools Remote Procedure Call (RPC) over HTTP Proxy
Feature Simple TCP/IP Services Simple Mail Transfer Protocol (SMTP) Server Simple Network Management Protocol (SNMP) Service Subsystem for UNIX-based Applications Telnet Client Telnet Server Trivial File Transfer Protocol (TFTP) Client User Interfaces and Infrastructure
Description Supports basic TCP/IP services, including Quote of the Day. Supports transfer of email messages. Includes SNMP agents that are used with the network management services. Supports Portable Operating System Interface for UNIX (POSIX)compliant UNIX-based applications. Allows outbound connections to Telnet servers and other Transmission Control Protocol (TCP)based services. Allows clients to connect to the server using the Telnet protocol. Allows you to access TFTP servers. Contains the components necessary to support the graphical interface installation option on Windows Server 2012. On graphical installations, this feature is installed by default. Allows use of fingerprint devices for authentication. Supports sending of feedback to Microsoft when joining a Customer Experience Improvement Program (CEIP). Set of .NET Framework classes that support implementing claims based identity on .NET applications. Relational data store that can only be used by Windows roles and features such as WSUS. Task-based command-line shell and scripting language used to administer computers running Windows operating systems. This feature is installed by default. Allows remote management of computers by running Windows PowerShell sessions in a web browser. Allows applications hosting Windows Communication Foundation (WCF) services that to not use HTTP protocols to use features of IIS. Allows fast searches of files hosted on a server for clients compatible with the Windows Search service. Backup and recovery software for Windows Server 2012. Collection of Windows PowerShell cmdlets that assist in the migration of server roles, operating system settings, files, and shares from computers running previous versions of Windows Server operating systems to Windows Server 2012.
Windows Biometric Framework (WBF) Windows Feedback Forwarder Windows Identity Foundation 3.5
Windows Search service Windows Server Backup Windows Server Migration Tools
Description Set of Application Programming Interfaces (APIs) that allow the discovery, management, and monitoring of storage devices that use standards such as Storage Management Initiative Specification (SMI-S). Allows you to control the allocation of CPU and memory resources. Supports Optical Character Recognition on Tagged Image File Format (TIFF) 6.0-compliant files. Windows Remote Management for IIS. Supports name resolution for NetBIOS names. Allows the server to use a wireless network interface. Supports running 32-bit applications on Server Core installations. This feature is installed by default. Supports the viewing and singing of documents in XPS formats.
WinRM IIS Extension Windows Internet Naming Service (WINS) Server Wireless local area network (LAN) Service Windows on Windows (WoW) 64 Support XPS Viewer
Features on Demand
Features on Demand enables you to add and remove role and feature files, also known as feature payload, from the Windows Server 2012 operating system to conserve space. You can install roles and features where the feature payload is not present by using a remote source, such as a mounted image of the full operating system. If an installation source is not present but an internet connection is, source files will be downloaded from Windows Update. The advantage of a Features on Demand installation is that it requires less hard disk space than a traditional installation. The disadvantage is that if you want to add a role or feature, you must have access to a mounted installation source. This is something that is not necessary if you perform an installation of Windows Server 2012 with the graphical features enabled. Question: Which feature do you need to install to support NetBIOS name resolution for client computers running a Microsoft Windows NT 4.0 operating system workstation?
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe Server Manager. Describe how to use administrative tools and Remote Server Administration Tools. Describe how to use Server Manager to perform a variety of tasks. Describe how to configure services. Describe how to configure Windows Remote Management.
You can access each of these tools in Server Manager by accessing the Tools menu. Note: You can also pin frequently used tools to the Windows Server 2012 taskbar, or to the Start menu.
Demonstration Steps Sign in to Windows Server 2012 and view the Windows Server 2012 desktop
Sign in to LON-DC1 with the Adatum\Administrator account and the password Pa$$w0rd, and then close the Server Manager console.
10. On the Confirmation page, select the Restart the destination server automatically if required check box, click Yes, click Install, and then click Close. 11. Click the flag icon next to Server Manager Dashboard, and review the messages. Note: You can close this console without terminating the task.
Configuring Services
Services are programs that run in the background and provide services to clients and to the host server. You can manage services through the Services console, which is available in Server Manager from the Tools menu. When securing a computer, you should disable all services except those that are required by the roles, features, and applications that are installed on the server.
Startup Types
Services use one of the following startup types: Automatic. The service starts automatically when the server boots. Automatic (Delayed Start). The service starts automatically after the server has booted. Manual. The service must be started manually, either by a program or by an administrator. Disabled. The service is disabled and cannot be started.
Note: If a server is behaving problematically, open the Services console, sort by startup type, and then locate those services that are configured to start automatically, and which are not in a running state.
Service Recovery
Recovery options determine what a service does in the event that it fails. You access the Recovery tab from the DNS Server Properties window. On the Recovery tab, you have the following recovery options: Take no action. The service remains in a failed state until attended to by an administrator. Restart the Service. The service restarts automatically. Run a Program. Allows you to run a program or a script. Restart the Computer. The computer restarts after a preconfigured number of minutes.
You can configure different recovery options for the first failure, the second failure, and subsequent failures. You can also configure a period of time after which the service failure clock resets.
You also can enable WinRM from a command line by running the command WinRM -qc. You disable WinRM by using the same method that you use to enable it. You can disable WinRM on a computer running the Server Core installation option using the sconfig.cmd tool.
Remote Desktop
Remote Desktop is the traditional method by which systems administrators connect remotely to the servers that they manage. You can configure Remote Desktop on a computer that running the full version of Windows Server 2012 by performing the following steps: 1. 2. 3. In the Server Manager console, click the Local Server node. Next to Remote Desktop, click Disabled. In the System Properties dialog box, on the Remote tab, select one of the following options: o Dont allow connections to this computer. The default state of remote desktop is disabled.
o o
Allow connections from computers running any version of Remote Desktop. Allows connections from Remote Desktop clients that do not support Network Level Authentication. Allow Connections only from Computers running Remote Desktop with Network Level Authentication. Allows secure connections from computers running Remote Desktop clients that support network-level authentication.
You can enable and disable Remote Desktop on computers that are running the Server Core installation option by using the sconfig.cmd command-line tool.
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe the different methods that you can use to install Windows Server 2012. Identify the different installation types that you can choose when installing the Windows Server 2012. Determine whether a computer or virtual machine meets the minimum hardware requirements necessary to install Windows Server 2012. Describe the decisions that you need to make when performing a Windows Server 2012 installation.
Installation Methods
Microsoft distributes Windows Server 2012 on optical media and in an .iso (ISO) image format. ISO format is becoming more common as organizations acquire software over the Internet rather than obtaining physical removable media. Once you have obtained the Windows Server 2012 operating system from Microsoft, you can then use your own method to deploy the operating system. You can install Windows Server 2012 by using a variety of methods, including the following: Optical Media o o Advantages include: Traditional method of deployment.
Disadvantages include: Requires that the computer have access to a DVD-ROM drive. Is typically slower than USB media. You cannot update the installation image without replacing the media. You can only perform one installation per DVD-ROM at a time.
USB Media o Advantages include: All computers with USB drives allow boot from USB media.
The image can be updated as new software updates and drivers become available. The answer file can be stored on a USB drive, minimizing the amount of interaction that the administrator must perform.
Disadvantages include: Requires the administrator perform special steps to prepare USB media from an ISO file.
Mounted ISO image o Advantages include: o With virtualization software, you can mount the ISO image directly, and install Windows Server 2012 on the virtual machine.
Network Share o Advantages include: o It is possible to boot a server off a boot device (DVD or USB drive) and install from installation files that are hosted on a network share.
Disadvantages include: This method is much slower than using Windows DS. If you already have access to a DVD or USB media, it is simpler to use those tools for operating system deployment.
Windows DS o Advantages include: You can deploy Windows Server 2012 from .wim image files or specially prepared VHD files. You can use the Windows Automated Installation Kit (AIK) to configure lite-touch deployment. Clients perform a Preboot eXecution Environment (PXE) boot to contact the Windows DS server, and the operating system image is transmitted to the server over the network. Windows DS allows multiple concurrent installations of Windows Server 2012 using multicast network transmissions.
System Center Configuration Manager o Advantages include: Configuration Manager allows you to fully automate the deployment of Windows Server 2012 to new servers that do not have an operating system installed. This process is called Zero Touch deployment.
Virtual Machine Manager Templates o Advantages include: Windows Server 2012 is typically deployed in private cloud scenarios from preconfigured virtual machine templates. You can configure multiple components of the System Center suite to allow self-service deployment of Windows Server 2012 virtual machines.
Question: What is another method that you can use to deploy Windows Server 2012?
Installation Types
How you deploy Windows Server 2012 on a specific server depends on the circumstances of that installation. Installing on a server that is running Windows Server 2008 R2 requires different actions than installing on a server running an x86 edition of Windows Server 2003. When you are performing an installation of the Windows Server 2012 operating system, you can choose one of the options in the following table.
Description Allows you to perform a fresh install on a new disk or volume. Fresh installations are the most frequently used, and take the shortest amount of time. You can also use this option to configure Windows Server 2012 to perform a dual boot if you want to keep the existing operating system. An upgrade preserves the files, settings, and applications that are installed already on the original server. You perform an upgrade when you want to keep all of these items, and want to continue to use the same server hardware. You can only upgrade to an equivalent or newer edition of Windows Server 2012 from x64 versions of Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, and Windows Server 2008 R2. You launch an upgrade by running setup.exe from within the original Windows Server operating system. Use migration when migrating from an x86 version of Windows Server 2003, Windows Server 2003 R2, or Windows Server 2008 to Windows Server 2012. You can use the Windows Server Migration Tools feature in Windows Server 2012 to transfer files and settings.
Upgrade
Migration
When you perform a fresh installation, you can deploy Windows Server 2012 to an unpartitioned disk, or to an existing volume. You can also install Windows Server 2012 to a specially prepared VHD file in a boot to VHD scenario. Boot to VHD requires special preparation, and is not an option that you can choose when performing a typical installation using the Windows Setup Wizard.
Each role service and feature places a unique load on network, disk I/O, processor, and memory resources. For example, the file server role places different stresses on server hardware than the DHCP role. When considering hardware requirements, remember that Windows Server 2012 can be deployed virtually. Windows Server 2012 is supported on Hyper-V and some other non-Microsoft virtualization platforms. Windows Server 2012 virtualized deployments need to match the same hardware specifications as physical deployments. For example, when creating a virtual machine to host Windows Server 2012, you need to ensure that you configure the virtual machine with enough memory and hard disk space. Windows Server 2012 has the following minimum hardware requirements: Processor architecture: x86-64 Processor speed: 1.4 gigahertz (GHz) Memory (RAM): 512 megabytes (MB) Hard disk drive space: 32 GB, more if the server has more than 16 GB of RAM
The Datacenter edition of Windows Server 2012 supports the following hardware maximums: 640 logical processors 4 TB of RAM 63 failover cluster nodes
Additional Reading: For more information about the Windows Server Virtualization Validation Program, see http://go.microsoft.com/fwlink/?LinkID=266736. Question: Why does a server need more hard disk drive space if it has more than 16 GB of RAM?
On the first page of the Windows Setup Wizard, select the following: Language to install
o o 3.
On the second page of the Windows Setup Wizard, click Install now. You can also use this page to select Repair Your Computer. You use this option in the event that an installation has become corrupted, and you are no longer able to boot into Windows Server 2012. In the Windows Setup Wizard, on the Select The Operating System You Want To Install page, choose from the available operating system installation options. The default option is Server Core Installation. On the License Terms page, review the terms of the operating system license. You must choose to accept the license terms before you can proceed with the installation process. On the Which Type Of Installation Do You Want page, you have the following options: o Upgrade. Select this option if you have an existing installation of Windows Server that you want to upgrade to Windows Server 2012. You should launch upgrades from within the previous version of Windows Server rather than booting from the installation source. Custom. Select this option if you want to perform a new installation.
4.
5. 6.
o 7.
On the Where do you want to install Windows page, choose an available disk on which to install Windows Server 2012. You can also choose to repartition and reformat disks from this page. When you click Next, the installation process will copy files and reboot the computer several times. On the Settings page, provide a password for the local Administrator account.
8.
Lesson 4
Lesson Objectives
After completing this lesson, you will be able to: Describe how to use Server Manager to perform post-installation configuration tasks. Describe how to configure server network settings. Describe how to join an Active Directory domain. Explain how to perform an offline domain join. Explain how to activate Windows Server 2012. Describe how to configure a Server Core installation.
You can use the same context of the netsh.exe command to configure DNS configuration.
For example, to configure the adapter named Local Area Connection to use the DNS server at IP address 10.10.10.5 as the primary DNS server, type the following command:
Netsh interface ipv4 set dnsservers Local Area Connection static 10.10.10.5 primary
Prior to joining the domain, be sure to complete the following steps to verify that the new server is ready to be domain-joined: Ensure that you are able to resolve the IP address of the domain controller, and can contact that domain controller. Use the PING protocol to ping the domain controller by hostname to accomplish both of these goals. Complete one of the following tasks: o Create a computer account in the domain that matches the name of the computer that you want to join to the domain. This is often done when large numbers of computers need to be joined to the domain automatically. Join the computer to the domain using a security account that has the right to perform domain-join operations.
Verify that the security account that is used for the domain operation already exists within the domain.
Now that you have renamed your Windows Server 2012 server and have verified that it is ready to be domain-joined, you can join the server to the domain. To join the domain using Server Manager, perform the following steps: 1. 2. 3. 4. 5. 6. In Server Manager, click the Local Server node. In the Properties window, next to Workgroup, click WORKGROUP. In the System Properties dialog box, on the Computer Name tab, click Change. In the Computer Name/Domain Changes dialog box, in the Member Of area, click the Domain option. Enter the new domain name, and then click OK. In the Windows Security dialog box, enter domain credentials that allow you to join the computer to the domain. Restart the computer.
2.
Open an elevated command prompt and use the djoin.exe command with the /provision option. You also need to specify the domain to which you want to join the computer, the name of the computer you will be joining to the domain, and the name of the savefile that you will transfer to the target of the offline domain join. For example, to join the computer Canberra to the domain adatum.com using the savefile Canberra-join.txt, type the following command:
djoin.exe /provision /domain adatum.com /machine canberra /savefile c:\canberra-join.txt
3.
Transfer the generated savefile to the new computer, and then run the djoin.exe command with the /requestODJ option. For example, to perform the offline domain join, after transferring the savefile Canberra-join.txt to computer Canberra, you would run the following command from an elevated command prompt on Canberra:
djoin.exe /requestODJ /loadfile canberra-join.txt /windowspath %systemroot% /localos
4.
Restart the computer to complete the domain-join operation. Question: In what situation would you perform an offline domain join rather than a traditional domain join?
Manual Activation
With manual activation, you enter the product key, and the server contacts Microsoft. Alternatively, an administrator performs the activation over the phone or through a special clearinghouse website. You can perform manual activation from the Server Manager console by performing the following steps: 1. 2. 3. Click the Local Server node. In the Properties window, next to Product ID, click Not Activated. In the Windows Activation dialog box, enter the product key, and then click Activate.
4.
If a direct connection cannot be established to the Microsoft activation servers, details will display about performing activation using a website from a device that has an Internet connection, or by using a local telephone number.
Because computers running the Server Core installation option do not have the Server Manager console, you can also perform manual activation using the slmgr.vbs command. Use the slmgr.vbs /ipk command to enter the product key, and slmgr.vbs /ato to perform activation once the product key is installed. You can perform manual activation using either the retail product key, or the multiple activation key. You can use a retail product key to activate only a single computer. However, a multiple activation key has a set number of activations that you can use. Using a multiple activation key, you can activate multiple computers up to a set activation limit. OEM keys are a special type of activation key that are provided to a manufacturer and allow automatic activation when a computer is first powered on. This type of activation key is typically used with computers that are running client operating systems such as Windows 7 and Windows 8. OEM keys are rarely used with computers that are running server operating systems. Performing activation manually in large-scale server deployments can be cumbersome. Microsoft provides a method of activating large numbers of computers automatically without having to enter product keys on each system manually.
Automatic Activation
In previous versions of the Windows Server operating system, you could use KMS to perform centralized activation of multiple clients. The Volume Activation Services server role in Windows Server 2012 allows you to manage a KMS server through a new interface. This simplifies the process of installing a KMS key on the KMS server. When you install Volume Activation Services, you can also configure Active Directory based activation. Active Directorybased activation allows automatic activation of domain-joined computers. When you use Volume Activation Services, each computer activated must periodically contact the KMS server to renew its activation status. You use the Volume Activation Management Tool (VAMT) 3.0 in conjunction with Volume Activation Services to perform activation of multiple computers on networks that are not connected directly to the Internet. You can use VAMT to generate license reports and manage client and server activation on enterprise networks.
You can use sconfig.cmd to perform the following tasks: Configure Domain and Workgroup information Configure the computers name Add local Administrator accounts Configure WinRM Enable Windows Update Download and install updates Enable Remote Desktop Configure Network Address information Set the date and time Perform Windows Activation Enable the Windows Server GUI Sign out Restart the server Shut down the server
You can change a servers name using sconfig.cmd by performing the following steps: 1. 2. 3. From a command-line command, run sconfig.cmd. Choose option 2 to configure the new computer name. Type the new computer name, and then press Enter.
You must restart the server for the configuration change to take effect.
Note: Prior to joining the domain, verify that you are able to ping the DNS server by hostname. To join a Server Core computer to the domain using sconfig.cmd, perform the following steps: 1. 2. 3. 4. 5. 6. From a command-line command, run sconfig.cmd. Choose option 1 to configure Domain/Workgroup. To choose the Domain option, type D, and then press Enter. Type the name of the domain to which you want to join the computer. Provide the details in domain\username format, of an account that is authorized to join the domain. Type the password associated with that account.
You can also install a Windows role or feature using the Install-WindowsFeature cmdlet. For example, to install the NLB feature, execute the command:
Install-WindowsFeature NLB
Not all features are available directly for installation on a computer running the Server Core operating system. You can determine which features are not directly available for installation by running the following command:
Get-WindowsFeature | Where-Object {$_.InstallState -eq Removed}
You can add a role or feature that is not directly available for installation by using the -Source parameter of the Install-WindowsFeature cmdlet. You must specify a source location that hosts a mounted installation image that includes the full version of Windows Server 2012. You can mount an installation image using the DISM.exe command-line tool. If you do not specify a source path when installing a component that is not available and the server has internet connectivity, Install-WindowsFeature will attempt to retrieve source files from Windows Update.
Lesson 5
Lesson Objectives
After completing this lesson, you will be able to: Describe the purpose of Windows PowerShell. Describe Windows PowerShell cmdlet syntax, and explain how to determine commands associated with a particular cmdlet. Describe common Windows PowerShell cmdlets used to manage services, processes, roles and features. Describe the functionality of Windows PowerShell ISE. Explain how to use Windows PowerShell. Explain how to use Windows PowerShell ISE.
You can extend Windows PowerShell functionality by adding modules. For example, the Active Directory module includes Windows PowerShell cmdlets that are specifically useful for performing Active Directoryrelated management tasks. The DNS Server module includes Windows PowerShell cmdlets that are specifically useful for performing DNS server-related management tasks. Windows PowerShell includes features such as tab completion, which allows administrators to complete commands by pressing the tab key rather than having to type the complete command. You can learn about the functionality of any Windows PowerShell cmdlet by using the Get-Help cmdlet.
You can learn the available verbs for a particular Windows PowerShell noun by executing the following command:
Get-Help -Noun NounName
You can learn the available Windows PowerShell nouns for a specific verb by executing the following command:
Get-Help -Verb VerbName
Windows PowerShell parameters start with a dash. Each Windows PowerShell cmdlet has its own associated set of parameters. You can learn what the parameters are for a particular Windows PowerShell cmdlet by executing the following command:
Get-Help CmdletName
You can determine which Windows PowerShell cmdlets are available by executing the Get-Command cmdlet. The Windows PowerShell cmdlets that are available depend on which modules are loaded. You can load a module using the Import-Module cmdlet.
Service Cmdlets
You can use the following Windows PowerShell cmdlets to manage services on a computer that is running Windows Server 2012: Get-Service. View the properties of a service. New-Service. Creates a new service. Restart-Service. Restarts an existing service. Resume-Service. Resumes a suspended service. Set-Service. Configures the properties of a service. Start-Service. Starts a stopped service. Stop-Service. Stops a running service. Suspend-Service. Suspends a service.
Process Cmdlets
You can use the following Windows PowerShell cmdlets to manage processes on a computer that is running Windows Server 2012: Get-Process. Provides information on a process. Start-Process. Starts a process.
Stop-Process. Stops a process. Wait-Process. Waits for the process to stop before accepting input. Debug-Process. Attaches a debugger to one or more running processes.
ServerManager Module
The ServerManager module allows you to add one of three cmdlets that are useful for managing features and roles. These cmdlets are: Get-WindowsFeature. View a list of available roles and features. Also displays whether the feature is installed, and whether the feature is available. You can only install an unavailable feature if you have access to an installation source. Install-WindowsFeature. Installs a particular Windows Server role or feature. The Add-WindowsFeature cmdlet is aliased to this command and is available in previous versions of Windows operating systems. Remove-WindowsFeature. Removes a particular Windows Server role or feature.
Demonstration Steps Use Windows PowerShell to display the running services and processes on a server
1. 2. On LON-DC1, open a Windows PowerShell session. Execute the following commands, and then press Enter:
Get-Service | where-object {$_.status -eq Running} Get-Command -Noun Service Get-Process Get-Help Process Get-Help Full Start-Process
3.
On the taskbar, right-click on the Windows PowerShell icon, and then click Run as Administrator.
Demonstration Steps Use Windows PowerShell ISE to import the ServerManager module
1. 2. 3. Ensure that you are signed in to LON-DC1 as Administrator. In Server Manager, click Tools, and then click Windows PowerShell ISE. At the command prompt, type Import-Module ServerManager.
Objectives
After completing this lab, you will be able to: Deploy Windows Server 2012. Configure Windows Server 2012 Server Core. Manage servers by using Server Manager. Manage servers with Windows PowerShell.
Lab Setup
Estimated Time: 60 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: a. b. 5. User name: Adatum\Administrator Password: Pa$$w0rd
Repeat steps 1 to 3 for 20410B-LON-CORE and 20410B-LON-SVR3. Do not sign in until directed to do so.
Click to install the Windows Server Windows Server 2012 Datacenter Evaluation (Server with a GUI) operating system. Accept the license terms, and then click Custom: Install Windows only (advanced). Install Windows Server 2012 on Drive 0. Note: Depending on the speed of the equipment, the installation will take approximately 20 minutes. The virtual machine will restart several times during this process.
7.
Enter the password Pa$$w0rd in both the Password and Reenter password boxes, and then click Finish to complete the installation.
5. 6.
In the Computer Name/Domain Changes dialog box, click OK. Restart the computer to apply changes.
8. 9.
In the System Properties dialog box, click Close. After LON-SVR3 restarts, sign in as Adatum\Administrator with the password Pa$$w0rd.
Results: After completing this exercise, you should have deployed Windows Server 2012 on LON-SVR3. You also should have configured LON-SVR3, including name change, date and time, networking, and network teaming.
10. Set the preferred DNS server to 172.16.0.10. 11. Do not configure an alternate DNS server address. 12. Exit sconfig.cmd. 13. Verify network connectivity to lon-dc1.adatum.com using the PING tool.
10. Sign in to server LON-CORE with the Adatum\Administrator account using the password Pa$$w0rd.
Results: After completing this exercise, you should have configured a Windows Server 2012 Server Core deployment, and verified the servers name.
10. In the Add Roles and Features Wizard, click Role-based or feature-based installation, and then click Next. 11. Verify that LON-SVR3.Adatum.com is selected, and then click Next twice.
12. Click Windows Server Backup, and then click Next. 13. Select the Restart the destination server automatically if required check box, click Install, and then click Close. 14. In Server Manager, click the IIS node, and verify that LON-CORE is listed.
3. 4. 5. 6. 7. 8.
Sign in to LON-DC1 with the Adatum\Administrator account. In Server Manager, click LAB-1, right-click LON-CORE, and then click Computer Management. Expand Services and Applications, and then click Services. Verify that the Startup type of the World Wide Web Publishing service is set to Automatic. Verify that the service is configured to use the Local System account. Configure the following service recovery settings: o o o o o First failure: Restart the Service Second failure: Restart the Service Subsequent failures: Restart the Computer. Reset fail count after: 1 days Reset service after: 1 minute
9.
Configure the Restart Computer option to 2 minutes, and then close the Service Properties dialog box.
Results: After completing this exercise, you should have created a server group, deployed roles and features, and configured the properties of a service.
Task 1: Use Windows PowerShell to connect remotely to servers and view information
1. 2. 3. 4. 5. 6. Sign in to LON-DC1 with the Adatum\Administrator account and the password Pa$$w0rd. On LON-DC1, in Server Manager, click the LAB-1 server group. Right-click LON-CORE, and then click Windows PowerShell. Type Import-Module ServerManager. Type Get-WindowsFeature, and review roles and features. Use the following command to review the running services on LON-CORE:
Get-service | where-object {$_.status -eq Running}
7. 8.
Type get-process to view a list of processes on LON-CORE. Review the IP addresses assigned to the server by typing the following command:
Get-NetIPAddress | Format-table
9.
Review the most recent 10 items in the security log by typing the following command:
Get-EventLog Security -Newest 10
4.
To deploy the XPS Viewer feature on LON-SVR3, type the following command, and then press Enter:
Install-WindowsFeature XPS-Viewer -ComputerName LON-SVR3
5.
Type the following command to verify that the XPS Viewer feature has now been deployed on LON-SVR3:
Get-WindowsFeature -ComputerName LON-SVR3
6. 7.
In the Server Manager console, in the Tools drop-down menu, click Windows PowerShell ISE. In the Untitled1.ps1 script pane, type the following:
Import-Module ServerManager Install-WindowsFeature WINS -ComputerName LON-SVR3 Install-WindowsFeature WINS -ComputerName LON-CORE
8. 9.
Save the script as InstallWins.ps1 in a new folder named Scripts. Press the F5 key to execute InstallWins.ps1.
Results: After completing this exercise, you should have used Windows PowerShell to perform a remote installation of features on multiple servers.
2-1
Module 2
Introduction to Active Directory Domain Services
Contents:
Module Overview Lesson 1: Overview of AD DS Lesson 2: Overview of Domain Controllers Lesson 3: Installing a Domain Controller Lab: Installing Domain Controllers Module Review and Takeaways 2-1 2-2 2-8 2-14 2-20 2-24
Module Overview
Active Directory Domain Services (AD DS) and its related services form the foundation for enterprise networks that run Windows operating systems. The AD DS database is the central store of all the domain objects, such as user accounts, computer accounts, and groups. AD DS provides a searchable hierarchical directory, and provides a method for applying configuration and security settings for objects in the enterprise. This module covers the structure of AD DS and its various components, such as forest, domain, and organizational units (OUs). The process of installing AD DS on a server is refined and improved with Windows Server 2012. This module examines some of the choices that are available with Windows Server 2012 for installing AD DS on a server.
Objectives
After completing this module, you will be able to: Describe the structure of AD DS. Describe the purpose of domain controllers. Explain how to install a domain controller.
Lesson 1
Overview of AD DS
The AD DS database stores information on user identity, computers, groups, services and resources. AD DS domain controllers also host the service that authenticates user and computer accounts when they log on to the domain. Because AD DS stores information about all of the objects in the domain, and all users and computers must connect to AD DS domain controllers when signing into the network, AD DS is the primary means by which you can configure and manage user and computer accounts on your network. This lesson covers the core logical components that make up an AD DS deployment.
Lesson Objectives
After completing this lesson you will be able to: Describe the components of AD DS. Describe AD DS domains. Describe OUs and their purpose. Describe AD DS forests and trees, and explain how you can deploy them in a network. Explain how an AD DS schema provides a set of rules that manage the objects and attributes that are stored in the AD DS domain database.
Overview of AD DS
AD DS is composed of both physical and logical components. You need to understand the way the components of AD DS work together so that you can manage your network efficiently, and control what resources your users can access. In addition, you can use many other AD DS options, including installing and configuring of software and updates, managing the security infrastructure, enabling Remote Access and DirectAccess, and certificate handling. One of the AD DS features is Group Policy, which enables you to configure centralized policies that you can use to manage most objects in AD DS. Understanding the various AD DS components is important to successfully using Group Policy.
Physical Components
AD DS information is stored in a single file on each domain controllers hard disk. The following table lists some of the physical components and where they are stored. Physical component Domain controllers Data store Global catalog servers Description Contain copies of the AD DS database. The file on each domain controller that stores the AD DS information. Host the global catalog, which is a partial, read-only copy of all the objects in the forest. A global catalog speeds up searches for objects that might be stored on domain controllers in a different domain in the forest. A special install of AD DS in a read-only form. These are often used in branch offices where security and IT support are often less advanced than in the main corporate centers.
Logical Components
AD DS logical components are structures that you use to implement an Active Directory design that is appropriate for an organization. The following table describes some of the types of logical structures that an Active Directory database might contain. Logical component Partition Description A section of the AD DS database. Although the database is one file named NTDS.DIT, it is viewed, managed, and replicated as if it consisted of distinct sections or instances. These are called partitions, which are also referred to as naming contexts. Defines the list of object types and attributes that all objects in AD DS can have. A logical, administrative boundary for users and computers. A collection of domains that share a common root domain and a Domain Name System (DNS) namespace. A collection of domains that share a common AD DS. A collection of users, groups, and computers as defined by their physical locations. Sites are useful in planning administrative tasks such as replication of changes to the AD DS database. OUs are containers in AD DS that provide a framework for delegating administrative rights and for linking Group Policy Objects (GPOs).
OU
Additional Reading: For more information about domains and forests, see Domains and Forests Technical Reference at http://go.microsoft.com/fwlink/?LinkId=104447.
You can use OUs to represent the hierarchical, logical structures within your organization. For example, you can create OUs that represent the departments within your organization, the geographic regions within your organization, or a combination of both departmental and geographic regions. You can use OUs to manage the configuration and use of user, group, and computer accounts based on your organizational model. Every AD DS domain contains a standard set of containers and OUs that are created when you install AD DS, including the following: Domain container. Serves as the root container to the hierarchy. Builtin container. Stores a number of default groups. Users container. The default location for new user accounts and groups that you create in the domain. The users container also holds the administrator and guest accounts for the domain, and some default groups. Computers container. The default location for new computer accounts that you create in the domain. Domain Controllers OU. The default location for the computer accounts for domain controller computer accounts. This is the only OU that is present in a new installation of AD DS.
Note: None of the default containers in the AD DS domain can have GPOs linked to them, except for the default Domain Controllers OU and the domain itself. All the other containers are just folders. To link GPOs to apply configurations and restrictions, create a hierarchy of OUs, and then link GPOs to them.
Hierarchy Design
The design of an OU hierarchy is dictated by the administrative needs of the organization. The design could be based on geographic, functional, resource, or user classifications. Whatever the order, the hierarchy should make it possible to administer AD DS resources as effectively and with as much flexibility as possible. For example, if all computers that IT administrators use must be configured in a certain way, you can group all the computers in an OU, and then assign a GPO to manage its computers. To simplify administration, you also can create OUs within other OUs. For example, your organization might have multiple offices, and each office might have a set of administrators who are responsible for managing user and computer accounts in their office. In addition, each office might have different departments with different computer configuration requirements. In this situation, you could create an OU for the office that is used to delegate administration, and then create a department OU within the office OU to assign desktop configurations. Although there is no technical limit to the number of levels in your OU structure, for the purpose of manageability, limit your OU structure to a depth of no more than 10 levels. Most organizations use five levels or fewer to simplify administration. Note that Active Directoryenabled applications can have restrictions on the OU depth within the hierarchy. These applications can also have restrictions on the number of characters that can be used in the distinguished name, which is the full Lightweight Directory Access Protocol (LDAP) path to the object in the directory.
What Is an AD DS Forest?
A forest is a collection of one or more domain trees. A tree is a collection of one or more domains. The first domain that is created in the forest is called the forest root domain. The forest root domain contains a few objects that do not exist in other domains in the forest. For example, the forest root domain contains two special domain controller roles, the schema master and the domain naming master. In addition, the Enterprise Admins group and the Schema Admins group exist only in the forest root domain. The Enterprise Admins group has full control over every domain within the forest. The AD DS forest is a security boundary. This means that, by default, no users from outside the forest can access any resources inside the forest. It also means that administrators from outside the forest have no administrative access within the forest. One of the primary reasons why organizations deploy multiple forests is because they need to isolate administrative permissions between different parts of the organization. The AD DS forest is also the replication boundary for the configuration and schema partitions in the AD DS database. This means that all domain controllers in the forest must share the same schema. A second reason why organizations deploy multiple forests is because they must deploy incompatible schemas in two parts of the organization. The AD DS forest is also the replication boundary for the global catalog. This makes most forms of collaboration between users in different domains easier. For example, all Microsoft Exchange Server 2010 recipients are listed in the global catalog, making it easy to send mail to any of the users in the forest, even those users in different domains. By default, all the domains in a forest automatically trust the other domains in the forest. This makes it easy to enable access to resources such as file shares and websites for all users in a forest, regardless of the domain in which the user account is located.
AD DS uses objects as units of storage. All object types are defined in the schema. Each time that the directory handles data, the directory queries the schema for an appropriate object definition. Based on the object definition in the schema, the directory creates the object and stores the data. Object definitions control both the types of data that the objects can store, and the syntax of the data. Using this information, the schema ensures that all objects conform to their standard definitions. As a result, AD DS can store, retrieve, and validate the data that it manages, regardless of the application that is the original source of the data. Only data that has an existing object definition in the schema can be stored in the directory. If a new type of data needs to be stored, a new object definition for the data must first be created in the schema. In AD DS, the schema defines the following: Objects that are used to store data in the directory Rules that define what types of objects you can create, what attributes must be defined (mandatory) when you create the object, and what attributes are optional Structure and content of the directory itself
You can use an account that is a member of the Schema Administrators to modify the schema components in a graphical form. Examples of objects that are defined in the schema include user, computer, group, and site. Among the many attributes are location, accountExpires, buildingName, company, manager, and displayName. The schema master is one of the single master operations domain controllers in AD DS. Because it is a single master, you must make changes to the schema by targeting the domain controller that holds the schema master operations role. The schema is replicated among all domain controllers in the forest. Any change that is made to the schema is replicated to every domain controller in the forest from the schema operations master role holder, typically the first domain controller in the forest. Because the schema dictates how information is stored, and because any changes that are made to the schema affect every domain controller, changes to the schema should be made only when necessary. Before making any changes, you should review the changes through a tightly-controlled process, and then implement them only after you have performed testing to ensure that the changes will not adversely affect the rest of the forest and any applications that use AD DS. Although you might not make any change to the schema directly, some applications make changes to the schema to support additional features. For example, when you install Exchange Server 2010 into your AD DS forest, the installation program extends the schema to support new object types and attributes.
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe the purpose of domain controllers. Describe the purpose of the global catalog. Describe the AD DS logon process, and the importance of DNS and SRV records in the logon process. Describe the functionality of SRV records. Explain the functions of operations masters.
Note: Two domain controllers should be considered an absolute minimum. When you deploy a domain controller in a branch office where physical security is less than optimal, there are some additional measures that you can use to reduce the impact of a breach of security. One option is to deploy an RODC. The RODC contains a read only copy of the AD DS database, and by default, it does not cache any user passwords. You can configure the RODC to cache the passwords for users in the branch office. If an RODC is compromised, the potential loss of information is much lower than with a full read-write domain controller. Another option is to use Windows BitLocker Drive Encryption to encrypt the domain controller hard drive. If the hard drive is stolen, BitLocker encryption ensures that there is a very low chance of a malicious user getting any useful information from it. Note: BitLocker is a drive encryption system that is available for Windows Server operating systems, and for certain Windows client operating system versions. BitLocker securely encrypts the entire operating system so that the computer cannot start without being supplied a private key and (optionally) passing an integrity check. A disk remains encrypted even if you transfer it to another computer.
In a single domain, all domain controllers should be configured as holders of the global catalog; however, in a multiple domain environment, the infrastructure master should not be a global catalog server. Which domain controllers are configured to hold a copy of the global catalog depends on replication traffic and network bandwidth. Many organizations are opting to make every domain controller a global catalog server. Question: Should a domain controller be a global catalog?
Every user and computer account and every group that you create has a unique SID. They only differ from each other by virtue of the unique RID. You can tell that this particular SID is the SID for the administrator account because it ends with RID 500.
Sites
Sites are used by a client system when it needs to contact a domain controller. It starts by looking up SRV records in DNS. The client system then attempts to connect to a domain controller in the same site before trying elsewhere. Administrators can define sites in AD DS. Sites usually align with the parts of the network that have good connectivity and bandwidth. For example, if a branch office is connected to the main data center by an unreliable wide area network (WAN) link, it would be better to define the data center and the branch office as separate sites in AD DS.
SRV records are registered in DNS by the Net Logon service that is running on each domain controller. If the SRV records are not entered in DNS correctly, you can trigger the domain controller to reregister those records by restarting the Net Logon service on that domain controller. This process only reregisters the SRV records; if you want to reregister the host (A) record information in DNS, you must run ipconfig /registerdns from a command prompt, just as you would for any other computer. Although the logon process appears to the user as a single event, it is actually made up of two parts: The user provides credentials, usually a user account name and password, which are then checked against the AD DS database. If the user account name and the password match the information that is stored in the AD DS database, the user becomes an authenticated user and is issued a TGT by the domain controller. At this point, the user does not have access to any resources on the network. A secondary process in the background submits the TGT to the domain controller and requests access to the local machine. The domain controller issues a service ticket to the user, who is then able to interact with the local computer. At this point in the process, the user is authenticated to AD DS and logged on to the local machine.
When a user subsequently attempts to connect to another computer on the network, the secondary process is run again, and the TGT is submitted to the nearest domain controller. When the domain controller returns a service ticket, the user can access the computer on the network, which generates a logon event at that computer. Note: A domain-joined computer also logs on to AD DS when it startsa fact that is often overlooked. You do not see the transaction when the computer uses its computer account name and a password to log on to AD DS. Once authenticated, the computer becomes a member of the Authenticated Users group. Although the computer logon process does not have any visual confirmation in the form of a GUI, there are event log events that record the activity. Additionally, if auditing is enabled, there are more events that are viewable in the Security Log of the Event Viewer.
These roles are distributed as follows: Each forest has one schema master and one domain naming master Each AD DS domain has one RID master, one infrastructure master, and one primary domain controller (PDC) emulator
PDC emulator master. The domain controller that holds the PDC emulator role is the time source for the domain. The domain controllers that hold the PDC emulator role in each domain in a forest synchronize their time with the domain controller that has the PDC emulator role in the forest root domain. You set the PDC emulator in the forest root domain to synchronize with an external atomic time source. The PDC emulator is also the domain controller that receives urgent password changes. If a users password is changed, the information is sent immediately to the domain controller holding the PDC emulator role. This means that if the user subsequently tried to log on and they were authenticated by a domain controller in a different location that had not yet received an update about the new password, the domain controller in the location to which the user tried to log on would contact the domain controller holding the PDC emulator role and check for recent changes. The PDC emulator is also used when editing GPOs. When a GPO other than a local GPO is opened for editing, the copy that is edited is the one stored on the PDC emulator. Note: The global catalog is not one of the operations master roles. Question: Why would you make a domain controller a global catalog server?
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Explain how to install a domain controller by using the GUI. Explain how to install a domain controller on a Server Core installation of Windows Server 2012. Explain how to upgrade a domain controller by using Install from Media. Explain how to install a domain controller by using Install from Media.
You can select the link to Promote this server to a domain controller, and then the Active Directory Domain Services Configuration Wizard runs. You can then provide the information listed in the following table about the proposed structure. Required information Add a domain controller to an existing domain Add a new domain to an existing forest Add a new forest Specify the domain information for this operation Supply the credentials to perform this operation Description Choose whether to add an additional domain controller to a domain. Create a new domain in the forest. Create a new forest. Supply information about the existing domain to which the new domain controller will connect. Enter the name of a user account that has the rights to perform this operation.
Some additional information that you need to have prior to running the domain controller promotion is listed in the following table. Required information DNS name for the AD DS domain NetBIOS name for the AD DS domain Whether the new forest needs to support domain controllers running previous versions of Windows operating systems (affects choice of functional level) Whether this domain controller will also be a DNS server Location to store the database files, for example, NTDS.DIT, edb.log, or edb.chk Description For example, adatum.com For example, adatum For example, if you are considering deploying Windows Server 2008 R2 domain controllers, you should select the Windows Server 2008 R2 domain and forest functional level. Your DNS must be functioning well to support AD DS. By default, these files will be stored in C:\Windows\NTDS.
The Active Directory Domain Services Configuration Wizard continues through several different pages where you can enter prerequisites such as the NetBIOS domain name, DNS configuration, whether this domain controller should be a global catalog server, and the Directory Services Restore Mode password. Finally, you must restart to complete the installation. Note: If you need to restore the AD DS database from a backup, restart the domain controller in Directory Services Restore Mode. When the domain controller starts up, it is not running the AD DS services; instead, it is running as a member server in the domain. To log on to that server in the absence of AD DS, sign in using the Directory Services Recovery Mode password.
Run dcpromo /unattend at a command prompt with the appropriate switches, for example:
dcpromo /unattend /InstallDns:yes /confirmglobal catalog:yes /replicaOrNewDomain:replica /replicadomaindnsname:"mynewdomain.com" /databasePath:"c:\ntds" /logPath:"c:\ntdslogs" /sysvolpath:"c:\sysvol" /safeModeAdminPassword:Pa$$w0rd /rebootOnCompletion:yes
Note: With this type of upgrade, there is no need to preserve users settings and reinstall applications; everything is upgraded in place. Remember to check for hardware and software compatibility before performing an upgrade. To introduce a clean install of Windows Server 2012 as a domain controller, perform the following steps: 1. 2. Deploy and configure a new installation of Windows Server 2012 and join it to the domain. Promote the new server to be a domain controller in the domain by using Server Manager 2012 or one of the other methods described previously.
Note: You can upgrade directly from Windows Server 2008 and Windows Server 2008 R2 to Windows Server 2012.
2.
On the server that you are promoting to a domain controller, perform the following steps: a. b. c. d. Use Server Manager to add the AD DS role. Wait while the AD DS binaries install. In Server Manager, click the notification icon to complete the post-deployment configuration. The Active Directory Domain Services Configuration Wizard runs. At the appropriate time during the wizard, select the option to install from IFM, and then provide the local path to the snapshot directory.
AD DS then installs from the snapshot. When the domain controller restarts, it contacts other domain controllers in the domain and updates AD DS with any changes that were made since the snapshot was created.
Additional Reading: For more information about the steps necessary to install AD DS, see Install Active Directory Domain Services (Level 100) at http://go.microsoft.com/fwlink/?LinkID=266739. Question: What is the reason to specify the Directory Services Restore Mode password?
Objectives
After performing this lab, you will be able to: Install a domain controller. Install a domain controller by using IFM.
Lab Setup
Estimated Time: 45 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: o o o 5. User name: Administrator Password: Pa$$w0rd Domain: Adatum
Task 1: Add an Active Directory Domain Services (AD DS) role to a member server
1. 2. 3. On LON-DC1, in Server Manager, add LON-SVR1 to the server list. Add the Active Directory Domain Services server role to LON-SVR1. Add all required features as prompted. Installation will take several minutes. When the installation completes, click Close to close the Add Roles and Features Wizard.
Results: After completing this exercise, you should have explored Server Manager and promoted a member server to be a domain controller.
Results: After completing this exercise, you should have installed an additional domain controller for the branch office by using IFM.
3-1
Module 3
Managing Active Directory Domain Services Objects
Contents:
Module Overview Lesson 1: Managing User Accounts Lesson 2: Managing Group Accounts Lesson 3: Managing Computer Accounts Lesson 4: Delegating Administration Lab: Managing Active Directory Domain Services Objects Module Review and Takeaways 3-1 3-3 3-10 3-17 3-23 3-26 3-32
Module Overview
User accounts are fundamental components of network security. Stored in Active Directory Domain Services (AD DS), user accounts identify users for the purposes of authentication and authorization. Because of their importance, an understanding of user accounts and the tasks related to supporting them is a critical aspect of administering a Windows Server operating system enterprise network. Although users and computers, and even services, change over time, business roles and rules tend to remain more stable. Your business probably has a finance role, which requires certain capabilities in the enterprise. The user or users who perform that role might change over time, but the role will remain relatively the same. For that reason, it is not sensible to manage an enterprise network by assigning rights and permissions to individual users, computers, or service identities. Instead, you should associate management tasks with groups. Consequently, it is important that you know how to use groups to identify administrative and user roles, to filter Group Policy, to assign unique password policies, and to assign rights and permissions. Computers, like users, are security principals: They have an account with a logon name and password that Windows Server changes automatically on a periodic basis. They authenticate with the domain. They can belong to groups, have access to resources, and you can configure them by using Group Policy.
Managing computersboth the objects in AD DS and the physical devicesis one of the day-to-day tasks of most IT pros. New computers are added to your organization, taken offline for repairs, exchanged between users or roles, and retired or upgraded. Each of these activities requires managing the computers identity, which is represented by its object, or account, and AD DS. As a result, it is important that you know how to create and manage computer objects.
In small organizations, one person might be responsible for performing all of these day-to-day administrative tasks. However, in large enterprise networks, with thousands of users and computers, that is not feasible. It is important for an enterprise administrator to know how to delegate specific administrative tasks to designated users or groups to ensure that enterprise administration is efficient and effective.
Objectives
After completing this module, you will be able to: Manage user accounts with graphical tools. Manage group accounts with graphical tools. Manage computer accounts. Delegate permissions to perform AD DS administration.
Lesson 1
Lesson Objectives
After completing this lesson, you will be able to: View AD DS objects by using various AD DS administration tools. Explain how to create user accounts that you can use in an enterprise network. Describe how to configure important user account attributes. Describe how to create user profiles. Explain how to manage user accounts.
AD DS Administration Tools
Before you can begin creating and managing user, group, and computer accounts, it is important that you understand which tools you can use to perform these various management tasks.
Note: To administer AD DS from a computer that is not a domain controller, you must install Remote Server Administration Tools (RSAT). RSAT is a feature that can be installed from the Features node of Server Manager on Windows Server 2012.
You also can install RSAT on Windows clients, including Windows Vista Service Pack 1 (or newer), Windows 7, and Windows 8. After you download the RSAT installation files from the Microsoft website, run the Setup Wizard, which steps you through the installation. After installing RSAT, you must turn on the tool or tools that you want to use. To do this, in Control Panel, in the Programs And Features application, use the Turn Windows Features On or Off command. Additional Reading: To download the RSAT installation files, see the Microsoft Download Center at http://go.microsoft.com/fwlink/?LinkID=266735.
Windows PowerShell
You can use the Active Directory module for Windows PowerShell (Active Directory module) to create and manage objects in AD DS. Windows PowerShell is not only a scripting language; it also enables you to run commands that perform administrative tasks, such as creating new user accounts, configuring services, deleting mailboxes, and similar functions. Windows PowerShell is installed by default on Windows Server 2012, but the Active Directory module is only present when: You install the AD DS or Active Directory Lightweight Directory Services (AD LDS) server roles. You run Dcpromo.exe to promote a computer to a domain controller. You install RSAT.
Note: It is possible to pipe the results of the Dsquery command to other Directory Service commands. For example, typing the following at a command prompt returns the office telephone number of all users that have a name starting with John: dsquery user name John* | dsget user office
A user account enables a user to log on to computers and domains with an identity that the domain can authenticate. When creating a user account, you must provide a user logon name, which must be unique in the domain/forest in which the user account is created. To maximize security, you should avoid multiple users sharing a single account, and instead ensure that each user who logs on to the network has a unique user account and password. Note: Although AD DS accounts are the focus of this course, you also can store user accounts in the local security accounts manager (SAM) database of each computer, enabling local logon and access to local resources. Local user accounts are, for the most part, beyond the scope of this course.
When creating user accounts, consider the following properties: The Full name user account property is used to create several attributes of a user object, most notably, the common name (CN) and display name properties. The CN of a user is the name displayed in the details pane of the snap-in, and it must be unique within the container or OU. If you are creating a user object for a person with the same name as an existing user in the same OU or container, you need to enter a unique name in the Full name field. The User UPN logon property consists of a user logon name prefix and a user principal name (UPN) suffix that will be appended to the user logon name following the @ symbol. o User names in AD DS can contain special characters, including periods, hyphens, and apostrophes. These special characters let you generate accurate user names, such as OHare and Smith-Bates. However, certain applications might have other restrictions, so we recommend that you use only standard letters and numerals until you fully test the applications in your enterprise environment for compatibility with special characters. You can manage the list of available UPN suffixes by using the Active Directory Domains and Trusts snap-in. Right-click the root of the snap-in, click Properties, and then use the UPN Suffixes tab to add or remove suffixes. The DNS name of your AD DS domain is always available as a suffix, and you cannot remove it.
Note: It is important that you implement a user account naming strategy, especially in large networks where users might share the same full name. A combination of last name and first name, and where necessary, additional characters, should yield a unique user account name. Specifically, it is only the UPN name that must be unique within your AD DS forest. The Full name needs to be unique only within the organizational unit where it resides, while the User SamAccountName name must be unique within that domain.
Attribute Categories
The attributes of a user object fall into several broad categories. These categories display in the navigation pane of the User Properties dialog box in the Active Directory Administrative Center, and include the following: Account. In addition to the users name properties (First name, Middle initial, Last name, Full name) and the users various logon names (User UPN logon, User SamAccountName logon), you can configure the following additional properties: o Log on hours. This property defines when the account can be used to access domain computers. You can use the weekly calendar style view to define Logon permitted hours and Logon denied hours. Log on to. Use this property to define which computers a user can use to log on to the domain. Specify the computers name and add it to a list of allowed computers. Account expires. This value is useful when you want to create temporary-use user accounts. For example, you might want to create user accounts for interns that are used for just one year. You can use this value to set an account expiration date in advance. The account cannot be used after the expiration date until manually reconfigured by an administrator. User must change password at next log on. This property enables you to force a user to reset their own password the next time they log on. This is typically something you might enable after you have reset a users password. Smart card is required for interactive log on. This value resets the users password to a complex, random sequence of characters, and sets a property that requires that the user use a smart card to authenticate during logon. Password never expires. This is a property that you normally use with service accounts; that is, those accounts that are not used by regular users but by services. By setting this value, you must remember to update the password manually on a periodic basis; however, you are not forced to do so at a predetermined interval. Consequently, the account can never be locked out due to password expirationa feature that is particularly important for service accounts. User cannot change password. Again, this option is generally used for service accounts. Store password using reversible encryption. This policy provides support for applications that use protocols that require knowledge of the user's password for authentication purposes. Storing passwords using reversible encryption is essentially the same as storing plaintext versions of the passwords. For this reason, this policy should never be enabled unless application requirements outweigh the need to protect password information. This policy is required when using Challenge Handshake Authentication Protocol (CHAP) authentication through remote access or Internet Authentication Service (IAS). It is also required when using Digest Authentication in Internet Information Services (IIS). Account is trusted for delegation. You can use this property to allow a service account to impersonate a standard user to access network resources on behalf of a user.
o o
o o
Organization. This includes properties such as the users Display name, Office, Email address, various contact telephone numbers, managerial structure, department and company names, addresses and so forth. Member of. This section enables you to define the group memberships for the user.
Profile. This section enables you to configure a location for the users personal data, and to define a location in which to save the users desktop profile when he or she logs out. Extensions. This section exposes many additional user properties, most of which do not normally require manual configuration.
These settings contain the sub-nodes in the following table. Sub-nodes in the Windows Settings node AppData (Roaming) Desktop Start Menu Document Pictures Music Videos Favorites Contacts You can use these sub-nodes to configure all aspects of a users desktop profile and application settings. For a given sub-node, such as Documents, you can choose between Basic and Advanced redirection. In Basic redirection, all users affected by the GPO have their Documents folder redirected to an individual named subfolder off a common root folder defined by a UNC name, for example, \\LON-SVR1\Users\. Advanced redirection enables you to use security group membership to determine where a users settings and documents will be stored. Downloads Links Searches Saved Games
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe group types. Describe group scopes. Explain how to implement group management. Describe default groups. Describe special identities. Manage groups in Windows Server.
Group Types
In a Windows Server 2012 enterprise network, there are two types of groups: security, and distribution. When you create a group, you choose the group type and scope. Distribution groups, which are not security-enabled, are used primarily by email applications. This means that they do not have SIDs, so they cannot be given permission to resources. Sending a message to a distribution group sends the message to all group members. Security groups are security principals with SIDs. You can therefore use these groups in permission entries in access control lists (ACLs) to control security for resource access. You also can use security groups as a means of distribution for email applications. If you want to use a group to manage security, it must be a security group. Note: The default group type is security.
Because you can use security groups for both resource access and email distribution, many organizations use only security groups. However, we recommend that if a group is used only for email distribution, you should create the group as a distribution group. Otherwise, the group is assigned a SID, and the SID is added to the users security access token, which can lead to an unnecessary size increase of the security token. Note: Consider that when you add a user to a security group, the users access token which authenticates user processesupdates only when the user signs in. Therefore, if the user is currently logged on, they must log off and log back on to update their access token with any changed group memberships. Note: The benefit of using distribution groups becomes more evident in large-scale Exchange Server deployments, especially where there is a need to nest these distribution groups across the enterprise.
Group Scopes
Windows Server 2012 supports group scoping. The scope of a group determines both the range of a groups abilities or permissions, and the group membership. There are four group scopes: Local. This group type is for standalone servers or workstations, on domain member servers that are not domain controllers, or on domain member workstations. Local groups are truly local, which means that they are available only on the computer where they exist. The important characteristics of a local group are: o o You can assign abilities and permissions only on local resources, meaning on the local computer. Members can be from anywhere in the AD DS forest, and can include: Any security principals from the domain: users, computers, global groups, or domain local groups. Users, computers, and global groups from any domain in the forest. Users, computers, and global groups from any trusted domain. Universal groups defined in any domain in the forest.
Domain Local. This group type is used primarily to manage access to resources or to assign management responsibilities (rights). Domain local groups exist on domain controllers in an AD DS forest, and consequently, the groups scope is localized to the domain in which they reside. The important characteristics of domain local groups are: o You can assign abilities and permissions only on domain local resources, meaning on all computers in the local domain.
Members can be from anywhere in the AD DS forest, and can include: Any security principals from the domain: users, computers, global groups, or domain local groups. Users, computers, and global groups from any domain in the forest. Users, computers, and global groups from any trusted domain. Universal groups defined in any domain in the forest.
Global. This group type is used primarily to consolidate users that have similar characteristics. For example, global groups often are used to consolidate users that are part of a department or geographic location. The important characteristics of global groups are: o o You can assign abilities and permissions anywhere in the forest. Members can be only from the local domain, and can include: Users, computers, and global groups from then local domain.
Universal. This group type is most useful in multidomain networks because it combines the characteristics of both domain local groups and global groups. Specifically, the important characteristics of universal groups are: o o You can assign abilities and permissions anywhere in the forest, as with global groups. Members can be from anywhere in the AD DS forest, and can include: o Users, computers, and global groups from any domain in the forest. Universal groups defined in any domain in the forest.
Properties of universal groups are propagated to the global catalog, and made available across the enterprise network on all domain controllers that host the global catalog role. This makes universal groups membership lists more accessible, which can be useful in multidomain scenarios. For example, if a universal group is used for email distribution purposes, the process for determining the membership list typically is quicker in distributed multidomain networks.
Identities (user and computer accounts) are members of global groups, which represent business roles. Those role groups (global groups) are members of domain local groups, which represent management rulesfor example, determining who has Read permission to a specific collection of folders. These rule groups (domain local groups) are granted access to resources. In the case of a shared folder, access is granted by adding the domain local group to the folders ACL, with a permission that provides the appropriate level of access. In a multidomain forest, there are universal groups also, which fit in between global and domain local groups. Global groups from multiple domains are members of a single universal group. That universal group is a member of domain local groups in multiple domains. You can remember the nesting as IGUDLA.
IGDLA Example
This figure on the slide represents a group implementation that reflects the technical view of group management best practices (IGDLA), and the business view of role-based, rule-based management. Consider the following scenario: The sales force at Contoso, Ltd has just completed its fiscal year. Sales files from the previous year are in a folder called Sales. The sales force needs Read access to the Sales folder. Additionally, a team of auditors from Woodgrove Bank, a potential investor, require Read access to the Sales folder to perform the audit. You would perform the following steps to implement the security required by this scenario: 1. Assign users with common job responsibilities or other business characteristics to role groups implemented as global security groups. Do this separately in each domain. Salespeople at Contoso are added to a Sales role group; Auditors at Woodgrove Bank are added to an Auditors role group. Create a group to manage access to the Sales folders with Read permission. You implement this in the domain containing the resource that is being managed. In this case, the Sales folder resides in the Contoso domain. Therefore, you create the resource access management rule group as a domain local group named ACL_Sales Folders_Read. Add the role groups to the resource access management rule group to represent the management rule. These groups can come from any domain in the forest or from a trusted domain, such as Woodgrove Bank. Global groups from trusted external domains, or from any domain in the same forest, can be members of a domain local group. Assign the permission that implements the required level of access. In this case, grant the Allow Read permission to the domain local group.
2.
3.
4.
This strategy results in two single points of management, reducing the management burden. One point of management defines who is in Sales, the other point of management defines who is an Auditor. Because these roles are likely to have access to a variety of resources beyond the Sales folder, you have another single point of management to determine who has Read access to the Sales folder. Furthermore, the Sales folder might not be a single folder on a single server; it could be a collection of folders across multiple servers, each of which assigns the Allow Read permission to the single domain local group.
Default Groups
The Windows Server 2012 server creates a number of groups automatically. These are called default local groups, and they include well-known groups such as Administrators, Backup Operators, and Remote Desktop Users. There are additional groups that are created in a domain, both in the Builtin and Users containers, including Domain Admins, Enterprise Admins, and Schema Admins. The following list provides a summary of capabilities for the subset of default groups that have significant permissions and user rights related to the management of AD DS: Enterprise Admins (in the Users container of the forest root domain). This group is a member of the Administrators group in every domain in the forest, which gives it complete access to the configuration of all domain controllers. It also owns the Configuration partition of the directory and has full control of the domain naming context in all forest domains. Schema Admins (Users container of the forest root domain). This group owns and has full control of the Active Directory schema. Administrators (Built-in container of each domain). Members of this group have complete control over all domain controllers and data in the domain naming context. They can change the membership of all other administrative groups in the domain, and the Administrators group in the forest root domain can change the membership of Enterprise Admins, Schema Admins, and Domain Admins. The Administrators group in the forest root domain is arguably the most powerful service administration group in the forest. Domain Admins (Users container of each domain). This group is added to the Administrators group of its domain. It therefore inherits all of the capabilities of the Administrators group. It is also, by default, added to the local Administrators group of each domain member computer, giving Domain Admins ownership of all domain computers. Server Operators (Built-in container of each domain). Members of this group can perform maintenance tasks on domain controllers. They have the right to log on locally, start and stop services, perform backup and restore operations, format disks, create or delete shares, and shut down domain controllers. By default, this group has no members. Account Operators (Built-in Container of each domain). Members of this group can create, modify, and delete accounts for users, groups, and computers located in any OU in the domain (except the Domain Controllers OU), and in the Users and Computers container. Account Operator group members cannot modify accounts that are members of the Administrators or Domain Admins groups, nor can they modify those groups. Account Operator group members also can log on locally to domain controllers. By default, this group has no members. Backup Operators (Built-in container of each domain). Members of this group can perform backup and restore operations on domain controllers, and log on locally and shut down domain controllers. By default, this group has no members. Print Operators (Built-in container of each domain). Members of this group can maintain print queues on domain controllers. They also can log on locally and shut down domain controllers.
You need to carefully manage the default groups that provide administrative privileges, because they typically have broader privileges than are necessary for most delegated environments, and because they often apply protection to their members.
The Account Operators group is a good example of this. If you examine the capabilities of the Account Operators group in the preceding list, you can see that members of this group have very broad rights they can even log on locally to a domain controller. In very small networks, such rights would probably be appropriate for one or two individuals who typically would be domain administrators anyway. In large enterprises, the rights and permissions granted to Account Operators usually are far too broad. Additionally, the Account Operators group is, like the other administrative groups, a protected group. Protected groups are defined by the operating system and cannot be unprotected. Members of a protected group become protected by association. The result of protection is that the permissions (ACLs) of members are modified so that they no longer inherit permissions from their OU, but rather receive a copy of an ACL that is quite restrictive. For example, if you add Jeff Ford to the Account Operators group, his account becomes protected, and the help desk, which can reset all other user passwords in the Employees OU, cannot reset Jeff Fords password. You should try to avoid adding users to the groups that do not have members by default (Account Operators, Backup Operators, Server Operators, and Print Operators). Instead, create custom groups to which you assign permissions and user rights that achieve your business and administrative requirements. For example, if Scott Mitchell should be able to perform backup operations on a domain controller, but should not be able to perform restore operations that could lead to database rollback or corruption, and should not be able to shut down a domain controller, do not put Scott in the Backup Operators group. Instead, create a group and assign it only the Backup Files And Directories user right, and then add Scott as a member.
Special Identities
Windows and AD DS also support special identities, which are groups for which membership is controlled by the operating system. You cannot view the groups in any list (in the Active Directory Users and Computers snap-in, for example), you cannot view or modify the membership of these special identities, and you cannot add them to other groups. You can, however, use these groups to assign rights and permissions. The most important special identitiesoften referred to as groups (for convenience)are described in the following list: Anonymous Logon. This identity represents connections to a computer and its resources that are made without supplying a user name and password. Prior to Windows Server 2003, this group was a member of the Everyone group. Beginning with Windows Server 2003, this group is no longer a default member of the Everyone group. Authenticated Users. This represents identities that have been authenticated. This group does not include Guest, even if the Guest account has a password. Everyone. This identity includes Authenticated Users and the Guest account. (On computers that are running versions of the Windows Server operating system that precede Windows Server 2003, this group includes Anonymous Logon.)
Interactive. This represents users accessing a resource while logged on locally to the computer that is hosting the resource, as opposed to accessing the resource over the network. When a user accesses any given resource on a computer to which the user is logged on locally, the user is added to the Interactive group automatically for that resource. Interactive also includes users who log on through a Remote Desktop connection. Network. This represents users accessing a resource over the network, as opposed to users who are logged on locally at the computer that is hosting the resource. When a user accesses any given resource over the network, the user is added automatically to the Network group for that resource.
The importance of these special identities is that you can use them to provide access to resources based on the type of authentication or connection, rather than the user account. For example, you could create a folder on a system that allows users to view its contents when they are logged on locally to the system, but that does not allow the same users to view the contents from a mapped drive over the network. You could achieve this by assigning permissions to the interactive special identity.
Lesson 3
It is important that you know how to perform these various computer-management tasks so you can configure and maintain the computer objects within your organization.
Lesson Objectives
After completing this lesson, you will be able to: Explain the purpose of the AD DS Computers container. Describe how to configure the location of computer accounts. Explain how to control who has permission to create computer accounts. Describe computer accounts and the secure channel. Explain how to reset the secure channel.
Note: You do not have to create a computer object in the directory service, but it is recommended. Many administrators join computers to a domain without first creating a computer object. However, when you do this, Windows Server attempts to join the domain to an existing object. When Windows Server does not find the object, it fails back and creates a computer object in the default Computer container. The process of creating a computer account in advance is called prestaging a computer. There are two major advantages of prestaging a computer: The account is placed into the correct OU, and is therefore delegated according to the security policy defined by the ACL of the OU. The computer is within the scope of GPOs linked to the OU, before the computer joins the domain.
After you have been given permission to create computer objects, you can do so by right-clicking the OU and from the New menu, clicking Computer. Next, enter the computer name, following the naming convention of your enterprise, and select the user or group that will be allowed to join the computer to the domain with this account. The two computer namesComputer Name and Computer Name (previous to Windows 2000)should be the same. Very rarely is there a justification for configuring them separately.
Delegating Permissions
By default, the Enterprise Admins, Domain Admins, Administrators, and Account Operators groups have permission to create computer objects in any new OU. However, as discussed earlier, we recommend that you tightly restrict membership in the first three groups, and that you do not add Administrators to the Account Operators group. Instead, you should delegate the permission to create computer objects (called Create Computer Objects) to appropriate administrators or support personnel. This permission, which is assigned to an OUs group, allows group members to create computer objects in that OU. For example, you might allow your desktop support team to create computer objects in the clients OU, and allow your file server administrators to create computer objects in the file servers OU.
To delegate permissions to create computer accounts, you can use the Delegate Control Wizard to choose a custom task to delegate. When you delegate permissions to manage computer accounts, you might consider granting additional permissions beyond those required to create computer accounts. For example, you might decide to allow a delegated administrator to manage the properties of existing computer accounts, to delete the computer account, or to move the computer account. Note: If you want to allow a delegated administrator to move a computer accounts, consider that they require the appropriate permissions both in the source AD DS container (where the computer currently exists), and in the target container (to which they will move the computer). Specifically, they must have Delete Computer permissions in the source container and Create Computer permissions in the target container.
When the secure channel fails, you must reset it. Many administrators do this by removing the computer from the domain, putting it in a workgroup, and then rejoining the domain. However, this is not a good practice because it has the potential to delete the computer account altogether. Deleting the computer account removes the computers SID, and more importantly, its group memberships. When you rejoin the domain using this procedure, even though the computer has the same name, the account has a new SID, and all the group memberships of the previous computer object must be recreated to include the new SID. Therefore, if the trust with the domain has been lost, do not remove a computer from the domain and then rejoin it. Instead, reset the secure channel. This will ensure that the existing computer account can be reused. To reset the secure channel between a domain member and the domain, use the Active Directory Users and Computers snap-in, DSMod.exe, NetDom.exe, or NLTest.exe. If you reset the account, the computers SID remains the same, and it maintains its group memberships. To reset the secure channel by using the Active Directory Administrative Center: 1. 2. 3. Right-click a computer, and then click Reset Account. Click Yes to confirm your choice. Rejoin the computer to the domain, and then restart the computer.
To reset the secure channel by using DSMod: 1. At a command prompt, type the following command:
dsmod computer ComputerDN reset
2.
Rejoin the computer to the domain, and then restart the computer.
To reset the secure channel by using NetDom.exe, type the following command at a command prompt, where the credentials belong to the local Administrators group of the computer:
netdom reset MachineName /domain DomainName /UserO UserName /PasswordO {Password | *}
This command resets the secure channel by attempting to reset the password on both the computer and the domain, so it does not require rejoining or rebooting. To reset the secure channel by using NLTest.exe, on the computer that has lost its trust, type the following command at a command prompt:
NLTEST /SERVER:SERVERNAME /SC_RESET:DOMAIN\DOMAINCONTROLLER
You also can use Windows PowerShell with Active Directory module to reset a computer account. The following example demonstrates how to reset the secure channel between the local computer and the domain to which it is joined. You must run this command on the local computer:
Test ComputerSecureChannel Repair
Note: You also can reset a remote computers password with Windows PowerShell: invoke-command -computername Workstation1 -scriptblock {reset-computermachinepassword}
Lesson 4
Delegating Administration
Although a single person can manage a small network with a few user and computer accounts, as the network grows, so too does the volume of work that relates to network management. At some point, teams with particular specializations evolve, each with responsibility for some specific aspect of network management. In AD DS environments, it is common practice to create OUs to bring departmental or geographic structure to the networked objects, and to enable configuration of administrative delegation. It is important that you know why and how to create OUs, and how to delegate administrative tasks to users on objects within those OUs.
Lesson Objectives
After completing this lesson, you will be able to: Describe AD DS permissions. Determine a users effective AD DS permissions on an AD DS object. Delegate administrative control of an AD DS object to a specified user or group of users.
AD DS Permissions
All AD DS objects, such as users, computers, and groups, can be secured by using a list of permissions. The permissions on an object are called access control entries (ACEs), and they are assigned to users, groups, or computers, which are also known as security principals. ACEs are saved in the objects discretionary access control list (DACL), which is part of the objects ACL. The ACL contains the system access control list (SACL) that includes auditing settings. Each object in AD DS has its own ACL. If you have sufficient permissions, you can modify the permissions to control the level of access on a specific AD DS object. The delegation of administrative control involves assigning permissions that manage access to objects and properties in AD DS. Just as you can give a group the ability to change files in a folder, you can give a group the ability, for example, to reset passwords on user objects. The DACL of an object also allows you to assign permissions to an objects specific properties. For example, you can allow (or deny) permission to change phone and email options. This is, in fact, not just one property. It is a property set that includes multiple, specific properties. Using property sets, you can easily manage permissions to commonly used collections of properties. However, you can also assign more granular permissions and allow or deny permission to change just some of the information, such as the mobile telephone number or the street address. Assigning the help desk permission to reset passwords for each individual user object is tedious. Even so, in AD DS, it is not a good practice to assign permissions to individual objects. Instead, you should assign permissions at the level of OUs.
The permissions that you assign to an OU are inherited by all objects in the OU. Therefore, if you give the help desk permission to reset passwords for user objects and attach that permission to the OU that contains the users, all user objects within that OU will inherit that permission. In just one step, you have delegated that administrative task. Child objects inherit the permissions of the parent container or OU. That container or OU in turn inherits its permissions from its parent container OU. If it is a first-level container or OU, it inherits the permissions from the domain itself. The reason child objects inherit permissions from their parents is that, by default, each new object is created with the Include inheritable permissions from this objects parent option enabled.
Effective AD DS Permissions
Effective permissions are the resulting permissions for a security principal (such as a user or group), based on the cumulative effect of each inherited and explicit ACE. Your ability to reset a users password, for example, might be due to your membership in a group that is allowed the Reset Password permission on an OU several levels above the user object. The inherited permission assigned to a group to which you belong results in an effective permission of Allow: Reset Password. Your effective permissions can be complicated when you consider Allow and Deny permissions, explicit and inherited ACEs, and the fact that you might belong to multiple groups, each of which might be assigned different permissions. Permissions, whether assigned to your user account or to a group to which you belong, are equivalent. This means that ultimately an ACE applies to you, the user. The best practice is to manage permissions by assigning them to groups, but it is also possible to assign ACEs to individual users or computers. A permission that has been assigned directly to you, the user, is neither more important nor less important than a permission assigned to a group to which you belong. The Allow permissions, which allow access, are cumulative. When you belong to several groups, and when those groups have been granted permissions that allow a variety of tasks, you will be able to perform all of the tasks assigned to all of those groups, and tasks assigned directly to your user account. Deny permissions, which deny access, override equivalent Allow permissions. If you are in one group that has been allowed the permission to reset passwords, and you are also another group that has been denied permission to reset passwords, the Deny permission prevents you from resetting passwords. Note: Use Deny permissions rarely. In fact, it is unnecessary to assign Deny permissions, because if you do not assign an Allow permission, users cannot perform the task. Before assigning a Deny permission, check to see if you could achieve your goal instead by removing an Allow permission. For example, if you want to delegate an Allow permission to a group, but exempt only one member from that group, you can use a Deny permission on that specific user account while the group still has an Allow permission.
Every permission is granular. Even if you have been denied the ability to reset passwords, you might still have the ability through other Allow permissions to change the users logon name or email address. Because child objects inherit the inheritable permissions of parent objects by default, and because explicit permissions can override inheritable permissions, an explicit Allow permission will actually override an inherited Deny permission. Unfortunately, the complex interaction of user, group, explicit, inherited, Allow, and Deny permissions can make evaluating effective permissions tedious. You can use the permissions reported by the DSACL command, or listed on the Effective Access tab of the Advanced Security Settings dialog box to begin evaluating effective permissions, but it is still a manual task.
Objectives
After completing this lab, you will be able to: Delegate administration for a branch office. Create and configure user accounts in AD DS. Manage computer objects in AD DS.
Lab Setup
Estimated Time: 60 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, from Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: a. b. c. 5. User name: Administrator Password: Pa$$w0rd Domain: Adatum
Move Holly Dickson from the IT OU to the Branch Office 1 OU. Move the following users to the Branch Office 1 OU: o o o o o Development\Bart Duncan Managers\Ed Meadows Marketing\Connie Vrettos Research\Barbara Zighetti Sales\Arlene Huff
5. 6. 7.
Move the LON-CL1 computer to the Branch Office 1 OU, and then restart the LON-CL1 computer. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd. On LON-DC1, in Active Directory Users and Computers, use the Delegate Control Wizard to delegate administration of the Branch Office 1 OU to the Branch 1 Administrators security group by delegating the following common and custom tasks: a. Delegate the following common tasks: Create, delete, and manage user accounts Reset user passwords and force password change at next logon Read all user information Create, delete and manage groups Modify the membership of a group Manage Group Policy links
b.
Delegate the following custom tasks: Create and delete computer objects in the current OU Full control of computer objects in the current OU
Task 2: Delegate a user administrator for the Branch Office Help Desk
1. 2. On LON-DC1, in Active Directory Users and Computers, use the Delegate Control Wizard to delegate administration of the Branch Office 1 OU to the Branch 1 Help Desk security group. Delegate the following common tasks: o o o Reset user passwords and force password change at next logon Read all user information Modify the membership of a group
8. 9.
Reset Connies password to Pa$$w0rd. After confirming the password reset is successful, sign out from LON-DC1.
Results: After completing this exercise, you should have successfully created an OU and delegated administration of it to the appropriate group.
Task 3: Create a new user for the branch office, based on the template
1. On LON-DC1, copy the _Branch_template user account, and configure the following properties: o o o o o 2. o o o 3. First name: Ed Last name: Meadows Password: Pa$$w0rd User must change password at next logon is cleared. Account is disabled is cleared.
Verify that the following properties have been copied during account creation: City: Slough Home folder path: \\lon-dc1\branch1-userdata\Ed Group: Branch 1 Users
Results: After completing this exercise, you should have successfully created and tested a user account created from a template.
2.
When prompted, restart the computer. Sign in as Adatum\Ed with the password of Pa$$w0rd. You are successful because the computer had been successfully rejoined.
Results: After completing this exercise, you should have successfully reset a trust relationship.
Tools
Tool Active Directory Users and Computers Active Directory module for Windows Power Shell DS utilities Active Directory module for Windows PowerShell Djoin.exe Redircmp.exe DSACLS Use Manage groups Manage groups Manage groups Computer account management Offline domain join Change default computer container View and modify AD DS permissions Where to find it Administrative Tools Installed as Windows Feature Command line Administrative Tools Command line Command line Command line
4-1
Module 4
Automating Active Directory Domain Services Administration
Contents:
Module Overview Lesson 1: Using Command-line Tools for AD DS Administration Lesson 2: Using Windows PowerShell for AD DS Administration Lesson 3: Performing Bulk Operations with Windows PowerShell Lab: Automating AD DS Administration by Using Windows PowerShell Module Review and Takeaways 4-1 4-2 4-8 4-14 4-21 4-25
Module Overview
You can use command-line tools and Windows PowerShell to automate Active Directory Domain Services (AD DS) administration. Automating administration speeds up processes that you might otherwise perform manually. Windows PowerShell includes cmdlets for performing AD DS administration and for performing bulk operations. You can use bulk operations to change many AD DS objects in a single step rather than updating each object manually.
Objectives
After completing this module, you will be able to: Use command-line tools for AD DS administration. Use Windows PowerShell cmdlets for AD DS administration. Perform bulk operations by using Windows PowerShell.
Lesson 1
Lesson Objectives
After completing this lesson, you will be able to: Describe the benefits of using command-line tools for AD DS administration. Describe how and when to use csvde. Describe how and when to use ldifde. Describe how and when to use DS commands.
Note: You can administer Server Core remotely by using graphical tools.
What Is Csvde?
Csvde is a command-line tool that exports or imports Active Directory objects to or from a comma-separated values (.csv) file. Many applications are capable of exporting or importing data from .csv files. This makes csvde useful for interoperability with other applications, such as databases or spreadsheets. The main limitation of csvde is that it cannot modify existing Active Directory objects; it can only create new objects. For example, you can use csvde to create a set of new user accounts, but you cannot use it to modify the properties of the user accounts after they are created. You can also use csvde to export object properties, such as a list of users and their email addresses.
Other options that you can use with csvde are listed in the following table. Option -d RootDN Description Specifies the distinguished name of the container from which the export will begin. The default is the domain. Specifies the scope of the search relative to the container specified by the option -d. The SearchScope option can be either base (this object only), onelevel (objects within this container), or subtree (this container and all subcontainers). The default is subtree. Limits the objects returned to those that match the filter. The filter is based on Lightweight Directory Access Protocol (LDAP) query syntax. Specifies the attributes to be exported. Use the LDAP name for each attribute, and separate them with commas.
-p SearchScope
-r Filter -l ListOfAtrributes
After the export completes, the .csv file will contain a header row and one row for each object that was exported. The header row is a comma-separated list with the names of the attributes for each object.
The -i parameter specifies import mode. The -f parameter identifies the file name from which to import. The -k parameter instructs csvde to ignore error messages, including the Object Already Exists error message. The suppress errors option is useful when importing objects to ensure that all of the objects possible are created, instead of stopping when partially complete. The .csv file that is being used for an import must have a header row that contains names of LDAP attributes for the data in the .csv file. Each row must contain exactly the correct number of items as specified in the header row. You cannot use csvde to import passwords, because passwords in a .csv file are not protected. As a result, user accounts that you create with csvde have a blank password and are disabled. Note: For more information about parameters for csvde, at a command prompt, type csvde /?, and then press Enter. Additional Reading: For more information about LDAP query syntax, see LDAP Query Basics at http://go.microsoft.com/fwlink/?LinkId=168752.
What Is Ldifde?
Ldifde is a command-line tool that you can use to export, create, modify, or delete AD DS objects. Like csvde, ldifde uses data that is stored in a file. The file must be in LDAP Data Interchange Format (LDIF). Most applications cannot export or import data in LDIF format. It is more likely that you will obtain data in LDIF format from another directory service. An LDIF file is text-based, with blocks of lines composing a single operation such as creating or modifying a user object. Each line within the operation specifies something about the operation, such as an attribute or the type of operation. A blank line separates multiple operations within the LDIF file.
For each operation in an LDIF file, the changetype line defines the operation to be performed. The valid values are add, modify, or delete.
Some other options you can use when exporting objects ldifde are listed in the following table. Option -d RootDN -r Filter -p SearchScope Description The root of the LDAP search. The default is the root of the domain. An LDAP search filter that limits the results returned. The scope, or depth, of the search. This can be: subtree (the container and all child containers) base (the immediate child objects of the container only) onelevel (the container and its immediate child containers) -l ListOfAttributes -o ListOfAttributes A comma-separated list of attributes to include in the export. A comma-separated list of attributes to exclude in the export.
The -i parameter specifies import mode. The -f parameter identifies the file name from which to import. The -k parameter instructs ldifde to ignore errors, including the Object Already Exists error. The option suppress errors is useful when importing objects to ensure that all objects possible are created, instead of stopping when partially complete. You cannot use ldifde to import passwords, because passwords in an LDIF file would not be secure. As a result, user accounts created by ldifde have a blank password and are disabled.
Description Creates AD DS objects. Displays properties of AD DS objects. Searches for AD DS objects. Modifies AD DS objects. Removes AD DS objects. Moves AD DS objects.
Question: What criteria would you use to select between using csvde, ldifde, and the DS commands?
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Use Windows PowerShell cmdlets to manage user accounts. Use Windows PowerShell cmdlets to manage groups. Use Windows PowerShell cmdlets to manage computer accounts. Use Windows PowerShell cmdlets to manage OUs.
Description Creates user accounts. Modifies properties of user accounts. Deletes user accounts. Resets the password of a user account. Modifies the expiration date of a user account. Unlocks a user account when it is locked after exceeding the accepted number of incorrect login attempts. Enables a user account. Disables a user account.
Some commonly used parameters for the New-ADUser cmdlet are listed in the following table. Parameter AccountExpirationDate AccountPassword ChangePasswordAtLogon Department Enabled HomeDirectory HomeDrive GivenName Surname Path Description Defines the expiration date for the user account. Defines the password for the user account. Requires the user account to change passwords at the next logon. Defines the department for the user account. Define whether the user account is enabled or disabled. Defines the location of the home directory for a user account. Defines the drive letters that are mapped to the home directory for a user account. Defines the first name for a user account. Defines the last name for a user account. Defines the OU or container where the user account will be created.
The following is an example of a command that you could use to create a user account with a prompt for a password:
New ADUser "Sten Faerch" Department IT AccountPassword (Read Host AsSecureString "Enter password")
Question: Are all cmdlet parameters that you use to manage user accounts the same?
Cmdlet New-ADGroup Set-ADGroup Get-ADGroup Remove-ADGroup Add-ADGroupMember Get-ADGroupMember Remove-ADGroupMember Add-ADPrincipalGroupMembership Get-ADPrincipalGroupMembership Remove-ADPrincipalGroupMembership
Description Creates new groups. Modifies properties of groups. Displays properties of groups. Deletes groups. Adds members to groups. Displays membership of groups. Removes members from groups. Adds group membership to objects. Displays group membership of objects. Removes group membership from an object.
Description Defines the OU or container in which the group is created. Defines a name that is backward compatible with older operating systems.
The following command is an example of what you could type at a Windows PowerShell prompt to create a new group:
New ADGroup Name "CustomerManagement" Global GroupCategory Security Path "ou=managers,dc=adatum,dc=com" GroupScope
The *-ADPrincipalGroupMembership cmdlets modify the group membership of an object such as a user. For example, you can modify a user account to add it as a member of a group. o o You can pipe a list of members to these cmdlets. You cannot provide a list of groups to these cmdlets. Note: When you pipe a list of objects to a cmdlet, you pass a list of objects to a cmdlet.
Some of the cmdlets for managing computer accounts are listed in the following table. Cmdlet New-ADComputer Set-ADComputer Get-ADComputer Remove-ADComputer Test-ComputerSecureChannel Reset-ComputerMachinePassword Description Creates a new computer account. Modifies properties of a computer account. Displays properties of a computer account. Deletes a computer account. Verifies or repairs the trust relationship between a computer and the domain. Resets the password for a computer account.
The following is an example that you can use to create a computer account:
New ADComputer Name LON SVR8 Path "ou=marketing,dc=adatum,dc=com" Enabled $true
Description Creates OUs. Modifies properties of OUs. Displays properties of OUs. Deletes OUs.
The following is an example you can use when you want to create a new OU:
New ADOrganizationalUnit Name Sales Path "ou=marketing,dc=adatum,dc=com" ProtectedFromAccidentalDeletion $true
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe bulk operations. Use graphical tools to perform bulk operations. Query AD DS objects by using Windows PowerShell. Modify AD DS objects by using Windows PowerShell. Use .csv files with Windows PowerShell. Modify and execute Windows PowerShell scripts to perform bulk operations.
2.
You can perform bulk operations with graphical tools, at a command prompt, or by using scripts. Each method for performing bulk operations has different capabilities.
For example: Graphical tools tend to be limited in the properties that they can modify. Command-line tools tend to be more flexible than graphical tools when defining queries, and they have more options for modifying object properties. Scripts can combine multiple command-line actions for the most complexity and flexibility.
In this demonstration, you will see how to: Create a query for all users. Configure the Company attribute for all users. Verify that the Company attribute has been modified.
Description Defines the AD DS path to begin searching, for example, the domain or an OU. Defines at what level below the SearchBase a search should be performed. You can choose to search only in the base, one level down, or the entire subtree. Defines how many objects to return in response to a query. To ensure that all objects are returned, you should set this to $null. Defines which object properties to return and display. To return all properties, type an asterisk (*). You do not need to use this parameter to use a property for filtering.
Properties
Create a Query
You can use the Filter parameter or the LDAPFilter parameter to create queries for objects with the Get-AD* cmdlets. The Filter parameter is used for queries written in Windows PowerShell. The LDAPFilter parameter is used for queries written as LDAP query strings. Windows PowerShell is preferred because: It is easier to write queries in Windows PowerShell. You can use variables inside the queries. There is automatic conversion of variable types, when it is required.
The following table lists commonly used operators that you can use in Windows PowerShell. Operator -eq -ne -lt -le -gt Description Equal to Not equal to Less than Less than or equal to Greater than
The following is a command that you use to display all of the properties for a user account:
Get ADUser Administrator Properties *
The following is a command that you use to return all the user accounts in the Marketing OU, and all of its child OUs:
Get ADUser Filter * SearchBase "ou=Marketing,dc=adatum,dc=com" SearchScope subtree
The following is a command that you use to show all of the user accounts with a last logon date older than a specific date:
Get ADUser Filter {lastlogondate lt "January 1, 2012"}
The following is a command that you use to show all of the user accounts in the Marketing department that have a last logon date older than a specific date:
Get-ADUser -Filter {(lastlogondate -lt "January 1, 2012") -and (department -eq "Marketing")}
Additional Reading: For more information about filtering with Get-AD* cmdlets, see about_ActiveDirectory_Filter at http://go.microsoft.com/fwlink/?LinkID=266740. Question: What is the difference between using -eq and -like when comparing strings?
The following is a command that you could use to generate a list of user accounts that have not logged on since a specific date, and then disable them:
Get ADUser Filter {lastlogondate lt "January 1, 2012"} | Disable ADAccount
Question: Which attributes of a user account can you use when creating a query by using the Filter parameter?
The following is a command that you could use to import a .csv file into a variable, and use a foreach loop to display the first name from each row in a .csv file:
$users=Import-CSV C:\users.csv Foreach ($i in $users) { Write Host "The first name is:" $i.FirstName" }
4.
Set the department attribute of all users in the Research OU using the following command:
Get-ADUser Filter * -SearchBase "ou=Research,dc=adatum,dc=com" | Set-ADUser -Department Research
5.
Display a table-formatted list of users in the Research department. Display the distinguished name and department by using the following command:
Get-ADUser Filter 'department -eq "Research"' | Format-Table DistinguishedName,Department
6.
Use the Properties parameter to allow the previous command to display the department correctly. Use the following command:
Get-ADUser Filter 'department -eq "Research"' -Properties Department | Format-Table DistinguishedName,Department
Create an OU
At the Windows PowerShell prompt, create a new OU named LondonBranch using the following command:
New-ADOrganizationalUnit LondonBranch -Path "dc=adatum,dc=com"
At the Windows PowerShell prompt, change to the E:\Labfiles\Mod04 directory, and then run the following command:
.\DemoUsers.ps1
Objectives
After completing this lab, you will be able to: Create user accounts and groups by using Windows PowerShell. Use Windows PowerShell to create user accounts in bulk. Use Windows PowerShell to modify user accounts in bulk.
Lab Setup
Estimated Time: 45 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: 5. User name: Adatum\Administrator Password: Pa$$w0rd
Repeat steps 2-3 for 20410B-LON-CL1. Do not sign in to LON-CL1 until directed to do so.
3.
Create a new user account for Ty Carlson in the LondonBranch OU using the following command:
New-ADUser -Name Ty -DisplayName "Ty Carlson" -GivenName Ty -Surname Carlson -Path "ou=LondonBranch,dc=adatum,dc=com"
4.
Change the blank password for the new account to Pa$$w0rd, using the following command:
Set-ADAccountPassword Ty
5.
6. 7.
On LON-CL1, sign in as Ty using a password of Pa$$w0rd. Verify that sign in is successful, and then sign out of LON-CL1.
2.
At the Windows PowerShell prompt, add Ty as a member of LondonBranchUsers, using the following command:
Add-ADGroupMember LondonBranchUsers -Members Ty
3.
At the Windows PowerShell prompt, confirm that Ty has been added as a member of LondonBranchUsers, using the following command:
Get-ADGroupMember LondonBranchUsers
Results: After completing this exercise, you should have created user accounts and groups by using Windows PowerShell.
3.
Results: After completing this exercise, you should have used Windows PowerShell to create user accounts in bulk.
Task 1: Force all user accounts in LondonBranch to change their passwords at next logon
1. 2. On LON-DC1, open a Windows PowerShell prompt. At the Windows PowerShell prompt, create a query for user accounts in the LondonBranch OU using the following command:
Get-ADUser -Filter * -SearchBase "ou=LondonBranch,dc=adatum,dc=com" | Format-Wide DistinguishedName
3.
At the Windows PowerShell prompt, modify the previous command to force all user accounts to change their password at the next logon using the following command:
Get-ADUser -Filter * -SearchBase "ou=LondonBranch,dc=adatum,dc=com" | Set-ADUser -ChangePasswordAtLogon $true
Results: After completing this exercise, you should have modified user accounts in bulk.
5-1
Module 5
Implementing IPv4
Contents:
Module Overview Lesson 1: Overview of TCP/IP Lesson 2: Understanding IPv4 Addressing Lesson 3: Subnetting and Supernetting Lesson 4: Configuring and Troubleshooting IPv4 Lab: Implementing IPv4 Module Review and Takeaways 5-1 5-2 5-6 5-11 5-16 5-24 5-28
Module Overview
IPv4 is the network protocol used on the Internet and local area networks. To ensure that you can you understand and troubleshoot network communication, it is essential that you understand how IPv4 is implemented. In this module, you will see how to implement an IPv4 addressing scheme, and determine and troubleshoot network-related problems.
Objectives
After completing this module, you will be able to: Describe the TCP/IP protocol suite. Describe IPv4 addressing. Determine a subnet mask necessary for subnetting or supernetting. Configure IPv4 and troubleshoot IPv4 communication.
Lesson 1
Overview of TCP/IP
TCP/IP is an industry standard suite of protocols that provides communication in a heterogeneous network. This lesson provides an overview of IPv4, and how it relates to other protocols to enable network communication. It also covers the concept of sockets, which applications use to accept network communications. Combined together this lesson provides a foundation for understanding and troubleshooting network communication.
Lesson Objectives
After completing this lesson, you will be able to: Describe the elements of the TCP/IP suite of protocols. Describe the individual protocols that make up the TCP/IP suite. Describe TCP/IP application layer protocols. Describe a socket, and identify port numbers for specified protocols.
Application Layer
The application layer of the TCP/IP model corresponds to the application, presentation, and session layers of the OSI model. This layer provides services and utilities that enable applications to access network resources.
Transport Layer
The transport layer corresponds to the transport layer of the OSI model and is responsible for end-to-end communication using TCP or User Datagram Protocol (UDP). The TCP/IP protocol suite offers application programmers the choice of TCP or UDP as a transport layer protocol: TCP. Provides connection-oriented reliable communications for applications. Connection-oriented communication confirms that the destination is ready to receive data before it sends the data. To make communication reliable, TCP confirms that all packets are received. Reliable communication is desired in most cases, and is used by most applications. Web servers, File Transfer Protocol (FTP) clients, and other applications that move large amounts of data use TCP. UDP. Provides connectionless and unreliable communication. When using UDP, reliable delivery is the responsibility of the application. Applications use UDP for faster communication with less overhead than TCP. Applications such as streaming audio and video use UDP so that a single missing packet will not delay playback. UDP is also used by applications that send small amounts of data, such as Domain Name System (DNS) name lookups.
The transport layer protocol that an application uses is determined by the developer of an application, and is based on the communication requirements of the application.
Internet Layer
The Internet layer corresponds to the network layer of the OSI model and consists of several separate protocols, including: IP; Address Resolution Protocol (ARP); Internet Group Management Protocol (IGMP); and Internet Control Message Protocol (ICMP). The protocols at the Internet layer encapsulate transport layer data into units called packets, address them, and then route them to their destinations. The Internet layer protocols are: IP. IP is responsible for routing and addressing. The Windows 8 operating system and the Windows Server 2012 operating system implement a dual-layer IP protocol stack, including support for both IPv4 and IPv6. ARP. ARP is used by IP to determine the media access control (MAC) address of local network adaptersthat is, adapters installed on computers on the local networkfrom the IP address of a local host. ARP is broadcast-based, meaning that ARP frames cannot transit a router and are therefore localized. Some implementations of TCP/IP provide support for Reverse ARP (RARP) in which the MAC address of a network adapter is used to determine the corresponding IP address. IGMP. IGMP provides support for multitasking applications over routers in IPv4 networks. ICMP. ICMP sends error messages in an IP-based network.
TCP/IP Applications
Applications use application layer protocols to communicate over the network. A client and server must be using the same application layer protocol to communicate. The following table lists some common application layer protocols.
Protocol HTTP HTTP/Secure (HTTPS) FTP Remote Desktop Protocol (RDP) Server Message Block (SMB) Simple Mail Transfer Protocol (SMTP) Post Office Protocol version 3 (POP3) Internet Message Application Protocol (IMAP)
Description Used for communication between web browsers and web servers. A version of HTTP that encrypts communication between web browsers and web servers. Used to transfer files between FTP clients and servers. Used to remotely control a computer that is running Windows operating systems over a network. Used by servers and client computers for file and printer sharing. Used to transfer email messages over the Internet. Used to retrieve messages from some email servers.
What Is a Socket?
When an application wants to establish communication with an application on a remote host, it creates a TCP or a UDP socket, as appropriate. A socket identifies the following as part of the communication process: The transport protocol that the application uses, which could be TCP or UDP The TCP or UDP port numbers that the applications are using The IPv4 or IPv6 address of the source and destination hosts
Well-Known Ports
Applications are assigned a port number between 0 and 65,535. The first 1,024 ports are known as well-known ports and have been assigned to specific applications. Applications listening for connections use consistent port numbers to make it easier for client applications to connect. If an application listens on a non-standard port number, then you need to specify the port number when connecting to it. Client applications typically use a random source port number above 1,024. The following table identifies some of these well-known ports. Port 80 443 110 143 25 53 53 20, 21 Protocol TCP TCP TCP TCP TCP UDP TCP TCP Application HTTP used by a web server HTTPS for a secure web server POP3 used for email retrieval IMAP used for email retrieval SMTP used for sending email messages DNS used for most name resolution requests DNS used for zone transfers FTP used for file transfers
You need to know the port numbers that applications use so you can configure firewalls to allow communication. Most applications have a default port number for this purpose, but it can be changed when required. For example, some web-based applications run on a port other than port 80 or port 443. Question: Are there other well-known ports that you can think of?
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe IPv4 Addressing. Identify public and private IPv4 addresses. Explain how dotted decimal notation relates to binary numbers. Describe a simple IPv4 network with classfull addressing. Describe a more complex IPv4 network with classless addressing.
IPv4 Addressing
To configure network connectivity, you must be familiar with IPv4 addresses and how they work. Network communication for a computer is directed to the IPv4 address of that computer. Therefore, each networked computer must be assigned a unique IPv4 address. Each IPv4 address is 32 bits long. To make IP addresses more readable, they are displayed in dotted decimal notation. Dotted decimal notation divides a 32-bit IPv4 address into four groups of 8 bits, which are converted to a decimal number between zero and 255. The decimal numbers are separated by a period (dot). Each decimal number is called an octet.
Subnet Mask
Each IPv4 address is composed of a network ID and a host ID. The network ID identifies the network on which the computer is located. The host ID uniquely identifies the computer on that specific network. A subnet mask identifies which part of an IPv4 address is the network ID, and which part is the host ID. In the simplest scenarios, each octet in a subnet mask is either 255 or 0. A 255 represents an octet that is part of the network ID, while a 0 represents an octet that is part of the host ID. For example, a computer with an IP address of 192.168.23.45 and a subnet mask of 255.255.255.0 has a network ID of 192.168.23.0 and a host ID of 0.0.0.45. Note: The terms network, subnet, and VLAN (Virtual Local Area Network) are often used interchangeably. A large network is often subdivided into subnets, and VLANs are configured on switches to represent subnets.
Default Gateway
A default gateway is a device (usually a router), on a TCP/IP network that forwards IP packets to other networks. The multiple internal networks in an organization can be referred to as an intranet. On an intranet, any given network might have several routers that connect it to other networks, both local and remote. You must configure one of the routers as the default gateway for local hosts. This enables the local hosts to communicate with hosts on remote networks. Before a host sends an IPv4 packet, it uses its own subnet mask to determine whether the destination host is on the same network, or on a remote network. If the destination host is on the same network, the sending host transmits the packet directly to the destination host. If the destination host is on a different network, the host transmits the packet to a router for delivery. When a host transmits a packet to a remote network, IPv4 consults the internal routing table to determine the appropriate router for the packet to reach the destination subnet. If the routing table does not contain any routing information about the destination subnet, IPv4 forwards the packet to the default gateway. The host assumes that the default gateway contains the required routing information. The default gateway is used in most cases. Client computers usually obtain their IP addressing information from a Dynamic Host Configuration Protocol (DHCP) server. This is more straightforward than assigning a default gateway manually on each host. Most servers have a static IP configuration that is assigned manually. Question: How is network communication affected if a default gateway is configured incorrectly?
IANA defines the address ranges in the following table as private. Internet-based routers do not forward packets originating from, or destined to, these ranges. Network 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 Range 10.0.0.0-10.255.255.255 172.16.0.0-172.31.255.255 192.168.0.0-192.168.255.255
Note: The Internet no longer uses routing based on the default subnet mask of IPv4 address classes.
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe how bits are used in a subnet mask or prefix length. Identify when to use subnetting. Calculate a subnet mask that supports a specific number of subnet addresses. Calculate a subnet mask that supports a specific number of host addresses. Identify an appropriate subnet mask for a scenario. Describe supernetting.
The mathematical process that is used to compare an IP address and a subnet mask is called ANDing. When you use more bits for the subnet mask, you can have more subnets, but fewer hosts on each subnet. Using more bits than you need allows for subnet growth, but limits growth for hosts. Using fewer bits than you need allows for growth in the number of hosts you can have, but limits growth in subnets.
To determine the subnet addresses quickly, you can use the lowest value bit in the subnet mask. For example, if you choose to subnet the network 172.16.0.0 by using 3 bits, this mean the subnet mask is 255.255.224.0. The decimal 224 is 11100000 in binary, and the lowest bit has a value of 32, so that is the increment between each subnet address.
The following table shows the subnet addresses for this example; the 3 bits that you have chosen to use to subnet the network are shown in bold type. Binary network number 172.16.00000000.00000000 172.16.00100000.00000000 172.16.01000000.00000000 172.16.01100000.00000000 172.16.10000000.00000000 172.16.10100000.00000000 172.16.11000000.00000000 172.16.11100000.00000000 Decimal network number 172.16.0.0 172.16.32.0 172.16.64.0 172.16.96.0 172.16.128.0 172.16.160.0 172.16.192.0 172.16.224.0
Note: You can use a subnet calculator to determine the appropriate subnets for your network, rather than calculating them manually. Subnet calculators are widely available on the Internet.
The following table shows how many hosts a class C network has available based on the number of host bits. Number of bits (n) 1 2 3 4 5 6 Number of hosts (2n-2) 0 2 6 14 30 62
You can calculate each subnets range of host addresses by using the following process: 1. 2. The first host is one binary digit higher than the current subnet ID. The last host is two binary digits lower than the next subnet ID.
The following table shows examples of calculating host addresses. Network 172.16.64.0/19 172.16.96.0/19 172.16.128.0/19 Host range 172.16.64.1 172.16.95.254 172.16.96.1 172.16.127.254 172.16.128.1 172.16.159.254
To create an appropriate addressing scheme for your organization, you must know how many subnets you need, and how many hosts you need on each subnet. Once you have that information, you can calculate an appropriate subnet mask.
What Is Supernetting?
Supernetting combines multiple small networks into a single large network. This may be appropriate when you have a small network that has grown and you need to expand the address space. For example, a branch office that is using the network 192.168.16.0/24 and that exhausts all of its IP addresses could be allocated the additional network 192.168.17.0/24. If you use the default subnet mask of 255.255.255.0 for these networks then you must perform routing between them. You can use supernetting to combine them into a single network. To perform supernetting, the networks that you are combining must be contiguous. For example, 192.168.16.0/24 and 192.168.17.0/24 can be supernetted, but you cannot supernet 192.168.16.0/24 and 192.168.54.0/24. Supernetting is the opposite of subnetting. When you perform supernetting, you allocate bits from the network ID to the host ID. The following table shows how many networks that you can combine by using a specific number of bits. Number of bits 1 2 3 4 Number of networks combined 2 4 8 16
The following table shows an example of supernetting two class C networks. The portion of the subnet mask that you are using as part of the network ID is shown in bold type. Network 192.168.00010000.00000000/24 192.168.00010001.00000000/24 192.168.00010000.00000000/23 Range 192.168.16.0-192.168.16.255 192.168.17.0-192.168.17.255 192.168.16.0-192.168.17.255
Lesson 4
Lesson Objectives
After completing this lesson, you will be able to: Configure IPv4 manually to provide a static configuration for a server. Configure a server so that it obtains an IPv4 configuration automatically. Explain how to use IPv4 troubleshooting tools. Explain how to use Windows PowerShell cmdlets for troubleshooting IPv4. Describe the troubleshooting process used to resolve fundamental IPv4 problems. Describe the function of Network Monitor. Use Network Monitor to capture and analyze network traffic.
Static configuration requires that you visit each computer and input the IPv4 configuration manually. This method of computer management is reasonable for servers, but it is very time consuming for client computers. Manually entering a static configuration also increases the risk of configuration mistakes. You can configure a static IP address either in the properties of the network connection or by using the netsh command-line tool. For example, the following command configures the interface Local Area Connection with the following parameters: Static IP address Subnet mask Default gateway 10.10.0.10 255.255.255.0 10.10.0.1
Netsh interface ipv4 set address name="Local Area Connection" source=static addr=10.10.0.10 mask=255.255.255.0 gateway=10.10.0.1
Windows Server 2012 also has Windows PowerShell cmdlets that you can use to manage network configuration. The following table describes some of the available Windows PowerShell cmdlets that are available for configuring IPv4. Cmdlet New-NetIPAddress Description of IPv4 configuration uses Creates a new IP address and binds it to a network adapter. You cannot modify an existing IP address; you must remove an existing IP address and then create a new IP address. Enables or disables DHCP for an interface. Creates routing table entries, including the default gateway (0.0.0.0). You cannot modify the next hop of an existing route; instead, you must remove an existing route and create a new route with the correct next hop. Configures the DNS server that is used for an interface.
Set-NetIPInterface New-NetRoute
Set-DNSClientServerAddresses
The following code is an example of the Windows PowerShell cmdlets that you can use to configure the interface Local Area Connection with the following parameters: Static IP address Subnet mask Default gateway 10.10.0.10 255.255.255.0 10.10.0.1
Local Area Connection is also configured to use DNS servers of 10.12.0.1 and 10.12.0.2.
New-NetIPAddress InterfaceAlias "Local Area Connection" IPAddress 10.10.0.10 -PrefixLength 24 DefaultGateway 10.10.0.1 Set-DNSClientServerAddresses InterfaceAlias "Local Area Connection" -ServerAddresses 10.12.0.1,10.12.0.2
DHCP helps simplify the IP configuration process; however, you must be aware that if you use DHCP to assign IPv4 information and the service is business-critical, you must do the following: Include resilience in your DHCP service design so that the failure of a single server does not prevent the service from functioning. Configure the scopes on the DHCP server carefully. If you make a mistake, it can affect the entire network and prevent communication.
If you use a laptop to connect to multiple networks (such as at work and at home), each network might require a different IP configuration. Windows operating systems support the use of Automatic Private IP Addressing (APIPA) or an alternate static IP address for this situation. When you configure Windows-based computers to obtain an IPv4 address from DHCP, use the Alternate Configuration tab to control the behavior if a DHCP server is not available. By default, Windows uses APIPA to assign itself an IP address automatically from the 169.254.0.0 to 169.254.255.255 address range, but with no default gateway or DNS server; this enables limited functionality. APIPA is useful for troubleshooting DHCP; if the computer has an address from the APIPA range, it is an indication that the computer cannot communicate with a DHCP server. Windows Server 2012 also has Windows PowerShell cmdlets that you can use to enable DHCP for an interface. The following table describes some of the available Windows PowerShell cmdlets that are available for configuring DHCP on an interface. Cmdlet Get-NetIPInterface Set-NetIPInterface Get-NetAdapter Restart-NetAdapter Description Obtains a list of interfaces and their configuration. This does not include IPv4 configuration of the interface. Enables or disables DHCP for an interface. Obtains a list of network adapters in a computer. Disables and re-enables a network adapter. This forces a DHCP client to obtain a new DHCP lease.
The following code is an example of how you can enable DHCP for the adapter Local Area Connection, and ensure that it receives an address:
Set-NetIPInterface InterfaceAlias "Local Area Connection" Dhcp Enabled Restart-NetAdapter Name "Local Area Connection"
Ipconfig
Ipconfig is a command-line tool that displays the current TCP/IP network configuration. Additionally, you can use the ipconfig command to refresh DHCP and DNS settings. The following table describes the command-line options for ipconfig. Command ipconfig /all ipconfig /release ipconfig /renew ipconfig /displaydns ipconfig /flushdns Description View detailed configuration information Release the leased configuration back to the DHCP server Renew the leased configuration View the DNS resolver cache entries Purge the DNS resolve cache
Ping
Ping is a command-line tool that verifies IP-level connectivity to another TCP/IP computer. It sends ICMP echo request messages and displays the receipt of corresponding echo reply messages. Ping is the primary TCP/IP command that you use to troubleshoot connectivity; however, firewalls might block the ICMP messages.
Tracert
Tracert is a command-line tool that identifies the path taken to a destination computer by sending a series of ICMP echo requests. Tracert then displays the list of router interfaces between a source and a destination. This tool also determines which router has failed, and what the latency (or speed) is. These results might not be accurate if the router is busy, because the ICMP packets are assigned a low priority by the router.
Pathping
Pathping is a command-line tool that traces a route through the network in a manner similar to Tracert. However, Pathping provides more detailed statistics on the individual steps, or hops, through the network. Pathping can provide greater detail, because it sends 100 packets for each router, which enables it to establish trends.
Route
Route is a command-line tool that allows you to view and modify the local routing table. You can use this to verify the default gateway, which is listed as the route 0.0.0.0. In Windows Server 2012, you can also use Windows PowerShell cmdlets to view and modify the routing table. The cmdlets for viewing and modifying the local routing table include Get-NetRoute, New-NetRoute, and Remove-NetRoute.
Telnet
You can use the Telnet Client feature to verify whether a server port is listening. For example, the command telnet 10.10.0.10 25 attempts to open a connection with the destination server, 10.10.0.10, on port 25, SMTP. If the port is active and listening, it returns a message to the Telnet client.
Netstat
Netstat is a command-line tool that enables you to view network connections and statistics. For example, the command netstat ab returns all listening ports and the executable that is listening.
Resource Monitor
Resource Monitor is a graphical tool that allows you to monitor system resource utilization. You can use Resource Monitor to view TCP and UDP ports that are in use. You can also verify which applications are using specific ports and the amount of data that they are transferring on those ports.
Network Diagnostics
Use Windows Network Diagnostics to diagnose and correct networking problems. In the event of a Windows Server networking problem, the Diagnose Connection Problems option helps you diagnose and repair the problem. Windows Network Diagnostics returns a possible description of the problem and a potential remedy. However, the solution might require manual intervention from the user.
Event Viewer
Event logs are files that record significant events on a computer, such as when a process encounters an error. When these events occur, the Windows operating system records the event in an appropriate event log. You can use Event Viewer to read the event log. IP conflicts, which might prevent services from starting, are listed in the System event log.
Purpose Obtains the list of routes in the local routing table. Obtains the type of network (public, private, domain) to which a network adapter is connected. Obtains the list of resolved DNS names that are stored in the DNS client cache. Obtains the list of DNS servers that are used for each interface.
Get-DNSClientServerAddress
2.
3.
4.
Note: You can force ping to use IPv4 instead of IPv6 by using the -4 option. Question: Are there any other steps that you use to troubleshoot network connectivity problems?
When you select a frame in the Frame Summary pane, the Frame Details pane updates with the contents of that particular frame. You can step through the frames details, examining the content of each element as you proceed. Each layer in the network architecturefrom the application on downencapsulates its data in the container of the layer below. In other words, an HTTP request is encapsulated in an IPv4 packet, which in turn is encapsulated in an Ethernet frame.
When you have gathered a large amount of data, it can be difficult to determine which frames are relevant to your specific problem. You can use filtering to show only those frames of interest. For example, you can select to show only DNSrelated packets.
Demonstration: How to Capture and Analyze Network Traffic by Using Network Monitor
You can use Network Monitor to capture and view packets that are transmitted on the network. This allows you to view detailed information that would not normally be possible to see. This type of information can be useful for troubleshooting. In this demonstration, you will see how to: Capture network traffic with Network Monitor. Analyze the captured network traffic. Filter the network traffic.
Demonstration Steps Capture network traffic with Network Monitor Prepare to perform a packet capture
1. 2. Sign in to LON-SVR2 as Adatum\Administrator with a password of Pa$$w0rd. Open a Windows PowerShell prompt and run the following command: o 3. ipconfig /flushdns
Objectives
After completing this lab, you will be able to: Identify appropriate subnets for a given set of requirements. Troubleshoot IPv4 connectivity issues.
Lab Setup
Estimated Time: 45 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: o o 5. User name: Adatum\Administrator Password: Pa$$w0rd
The current network for your branch office is 192.168.98.0/24. This network needs to be subdivided into three subnets as follows: One subnet with at least 100 IP addresses for clients One subnet with at least 10 IP addresses for servers One subnet with at least 40 IP addresses for future expansion
The main tasks for this exercise are as follows: 1. 2. Calculate the bits required to support the hosts on each subnet. Calculate subnet masks and network IDs.
Task 1: Calculate the bits required to support the hosts on each subnet
1. 2. 3. 4. 5. 6. How many bits are required to support 100 hosts on the client subnet? How many bits are required to support 10 hosts on the server subnet? How many bits are required to support 40 hosts on the future expansion subnet? If all subnets are the same size, can they be accommodated? Which feature allows a single network to be divided into subnets of varying sizes? How many host bits will you use for each subnet? Use the simplest allocation possible, which is one large subnet and two equal sized smaller subnets.
2.
Given the number of host bits allocated, what is the subnet mask that you will use for the server subnet? Calculate the subnet mask in binary and decimal. o The server subnet is using 6 bits for the host ID. Therefore, you will use 26 bits for the subnet mask. Binary Decimal
3.
Given the number of host bits allocated, what is the subnet mask that you will use for the future expansion subnet? Calculate the subnet mask in binary and decimal. o The future expansion subnet is using 6 bits for the host ID. Therefore, you will use 26 bits for the subnet mask. Binary Decimal
4.
For the client subnet, define the network ID, first available host, last available host, and broadcast address. Assume that the client subnet is the first subnet allocated from the available address pool. Calculate the binary and decimal versions of each address. Description Network ID First host Last host Broadcast Binary Decimal
5.
For the server subnet, define the network ID, first available host, last available host, and broadcast address. Assume that the server subnet is the second subnet allocated from the available address pool. Calculate the binary and decimal versions of each address. Description Network ID First host Last host Broadcast Binary Decimal
6.
For the future allocation subnet, define the network ID, first available host, last available host, and broadcast address. Assume that the future allocation subnet is the third subnet allocated from the available address pool. Calculate the binary and decimal versions of each address. Description Network ID First host Last host Broadcast Binary Decimal
Results: After completing this exercise, you will have identified the subnets required to meet the requirements of the lab scenario.
When you have repaired the problem, ping LON-DC1 from LON-SVR2 to confirm that the problem is resolved.
Note: If you have additional time, run an additional break script from \\LON-DC1\E$\Labfiles\Mod05 and troubleshoot that problem.
Results: After completing this lab, you will have resolved an IPv4 connectivity problem.
Review Questions
Question: You have just started as a server administrator for a small organization with a single location. The organization is using the 131.107.88.0/24 address range for the internal network. Is this a concern? Question: You are working for an organization that provides web hosting services to other organizations. You have a single /24 network from your ISP for the web hosts. You are almost out of IPv4 addresses and have asked ISP for an additional range of addresses. Ideally, you would like to supernet the existing network with the new network. Are there any specific requirements for supernetting? Question: You have installed a new web-based application that runs on a non-standard port number. A colleague is testing access to the new web-based application, and indicates that he cannot connect to it. What are the most likely causes of his problem?
Tools
Tool Network Monitor Ipconfig Ping Tracert Pathping Route Telnet Netstat Resource monitor Windows Network Diagnostics Event Viewer Use for Capture and analyze network traffic View network configuration Verify network connectivity Verify network path between hosts Verify network path and reliability between hosts View and configure the local routing table Test connectivity to a specific port View network connectivity information View network connectivity information Diagnose problem with a network connection View network related system events Where to find it Download from Microsoft website Command prompt Command prompt Command prompt Command prompt Command prompt Command prompt Command Prompt Tools in Server Manager Properties of the network connection Tools in Server Manager
6-1
Module 6
Implementing Dynamic Host Configuration Protocol
Contents:
Module Overview Lesson 1: Installing a DHCP Server Role Lesson 2: Configuring DHCP Scopes Lesson 3: Managing a DHCP Database Lesson 4: Securing and Monitoring DHCP Lab: Implementing DHCP Module Review and Takeaways 6-1 6-2 6-7 6-12 6-16 6-21 6-26
Module Overview
Dynamic Host Configuration Protocol (DHCP) plays an important role in the Windows Server 2012 infrastructure. It is the primary means of distributing important network configuration information to network clients, and it provides configuration information to other network-enabled services, including Windows Deployment Services (Windows DS) and Network Access Protection (NAP). To support and troubleshoot a Windows Serverbased network infrastructure, it is important that you understand how to deploy, configure, and troubleshoot the DHCP server role.
Objectives
After completing this module, you will be able to: Install the DHCP server role. Configure DHCP scopes. Manage a DHCP database. Secure and monitor the DHCP server role.
Lesson 1
Lesson Objectives
After completing this lesson, you will be able to: Describe the benefits of using DHCP. Explain how DHCP allocates IP addresses to network clients. Explain how the DHCP lease generation process works. Explain how the DHCP lease renewal process works. Describe the purpose of a DHCP relay agent. Explain how a DHCP server role is authorized. Explain how to add and authorize the DHCP server role.
NAP is part of a new toolset that can prevent full access to the intranet for computers that do not comply with system health requirements. NAP with DHCP helps isolate potentially malware-infected computers from the corporate network. DHCP NAP enables administrators to ensure that DHCP clients are compliant with internal security policies. For example, all network clients must be up-to-date and have a valid, upto-date antivirus program installed before they are assigned an IP configuration that allows full access to the intranet. You can install DHCP as a role on a Server Core installation of Windows Server 2012. A Server Core installation allows you to create a server with a reduced attack surface. To manage DHCP from the Server Core, you must install and configure the role from the command-line interface. You also can manage the DHCP role running on Server Core installation of Windows Server 2012 from a graphical user interface (GUI)-based console where the DHCP role is installed already.
2. 3.
A DHCP Server responds with a DHCPOFFER packet. This packet contains a potential address for the client. The client receives the DHCPOFFER packet. It might receive packets from multiple servers; in that case, it usually selects the server that made the fastest response to its DHCPDISCOVER. This typically is the DHCP server closest to the client. The client then broadcasts a DHCPREQUEST that contains a server identifier. This informs the DHCP servers that receive the broadcast which servers DHCPOFFER the client has chosen to accept. The DHCP servers receive the DHCPREQUEST. Those servers that the client has not accepted use the message as notification that the client declines that servers offer. The chosen server stores the IP address client information in the DHCP database and responds with a DHCPACK message. If for some reason, the DHCP server cannot provide the address that was offered in the initial DHCPOFFER, the DHCP server sends a DHCPNAK message.
4.
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe the purpose of a DHCP scope. Describe a DHCP reservation. Describe the DHCP Options. Explain how to apply DHCP Options. Create and configure a DHCP scope.
Lease duration. This property lists the lease duration. Use shorter durations for scopes with limited IP addresses, and longer durations for more static networks. Options. You can configure many optional properties on a scope, but typically you will configure: o o o option 003 Router (the default gateway for the subnet) option 006 Domain Name System (DNS) servers option 015 DNS suffix
IPv6 Scopes
You can configure the IPv6 scope options as a separate scope in the DHCP consoles IPv6 node. The IPv6 node contains several different options that you can modify, and an enhanced lease mechanism. When configuring a DHCPv6 scope, you must define the following properties: Name and description. This property identifies the scope. Prefix. The IPv6 address prefix is analogous to the IPv4 address range; in essence, it defines the network address. Exclusions. This property lists single addresses or blocks of addresses that fall within the IPv6 prefix but will not be offered for lease. Preferred lifetimes. This property defines how long leased addresses are valid. Options. As with IPv4, you can configure many options.
4.
You need to understand these options when configuring DHCP, so you will know which level settings has priority when you are configuring different settings on multiple levels. If DHCP option settings are applied at each level and they conflict, then the option that is applied last overrides the previously applied setting. For example, if the default gateway is configured at the scope level, and a different default gateway is applied for a reserved client, then the reserved client setting becomes the effective setting. You can also configure address assignment policies at the server level or scope level. Address assignment policy contains a set of conditions that you define in order to lease different DHCP IP addresses and settings to different types of DHCP clients, such as computers, laptops, network printers, or IP phones. The conditions defined in these policies differentiate various types of clients, and include multiple criteria, such as MAC address or vendor information.
o o o 3.
Exclusions: 172.16.0.190-172.16.0.200 Other settings: use default values Configure options Router 172.16.0.1
Use default settings for all other pages, and then activate the scope.
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe the DHCP database. Explain how to back up and restore a DHCP database. Explain how to reconcile a DHCP database. Explain how to move a DHCP database.
Note: You should not remove or alter any of the DHCP service database files.
The DHCP server database is dynamic. It updates as DHCP clients are assigned, or as they release their TCP/IP configuration parameters. Because the DHCP database is not a distributed database like the Windows Internet Name Service (WINS) server database, maintaining the DHCP server database is less complex. By default, the DHCP database and related registry entries are backed up automatically at 60-minute intervals. You can change this default interval by changing the value of BackupInterval in the following registry key: This is the Code Title that I typed in on Sunday, Sept 23
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCPServer\Parameters
Restoring a Database
If you need to restore the database, use the Restore function in the DHCP server console. You will be prompted for the backups location. Once you have selected the location, DHCP service stops, and the database is restored. To restore the database, the user account must either have administrative-level permissions, or be a member of the DHCP administrators group.
Backup Security
When the DHCP database file is backed up, it should be in a protected location that only the DHCP administrators can access. This ensures that any network information in the backup files remains protected.
Using Netsh
You also can use commands in the Netsh DHCP context to back up the database; this is useful for backing up the database to a remote location using a script file. The following command is a script that you can use from the Netsh DHCP prompt to back up the DHCP data for all scopes: This is the Code Title that I typed in on Sunday, Sept 23
export "c:\My Folder\Dhcp Configuration" all
Note: The Netsh DHCP context does not exist on server computers that do not have the DHCP server role installed.
When you are reconciling scopes, the detail and summary entries are compared to find inconsistencies. To correct and repair these inconsistencies, you must reconcile any scope inconsistencies. After you select and reconcile scope inconsistencies, the DHCP service either restores those IP addresses to the original owner, or creates a temporary reservation for those addresses. These reservations are valid for the lease time that is assigned to the scope. When the lease time expires, the addresses are then recovered for future use.
Lesson 4
Lesson Objectives
After completing this lesson, you will be able to: Explain how to prevent an unauthorized computer from obtaining a lease. Explain how to restrict unauthorized, non-Microsoft DHCP servers from leasing IP addresses. Explain how to delegate administration of the DHCP server role. Describe DHCP statistics. Describe DHCP audit logging. Identify common issues that are possible with DHCP.
Implementing NAP: NAP allows administrators to validate that a client computer is compliant with system health requirements, such as running all the latest Windows operating system updates, or running an up-to-date antivirus client. If users who do not meet security requirements try to access the network, they receive an IP address configuration to access a remediation network where they can receive the necessary updates. The administrator can restrict access to the network by allowing only healthy computers access to the internal local area network (LAN).
The DHCP Administrators local group is used to restrict and grant access to administer DHCP servers. Therefore, the DHCP Administrators group is in the built-in groups on domain controllers, or is on local servers.
Common event ID codes include: 00,06/22/99,22:35:10,Started,,,, 56,06/22/99,22:35:10,Authorization failure, stopped servicing,,domain1.local,, 55,06/22/99,22:45:38,Authorized(servicing),,domain1.local
Example An administrator deletes a lease. However, the client that had the lease is still operating as if the lease is valid. If the DHCP server does not verify the IP address, it might lease the IP address to another machine, causing an address conflict. This can also occur if two DHCP servers have overlapping scopes. If a clients network card driver is configured incorrectly, it might cause a failure to obtain a DHCP address. Additionally, the DHCP server or relay agent on the clients subnet might be not online. Another reason might be that the DHCP server has exhausted its scope, so the scope should be extended or modified. If the client is connected to the wrong network, or if the DHCP relay agent is configured incorrectly, this error could occur. A hardware failure can cause the database to become corrupted. If all of the IP addresses that are assigned to a scope are leased, this error occurs.
Solution
The client does not receive a DHCP address and instead receives an Automatic Private IP Addressing (APIPA) self-assigned address.
The client is obtaining an IP address from the wrong scope, causing it to experience communication problems.
DHCP database suffers data corruption or loss DHCP server exhausts its IP address pool
The DHCP database becomes unreadable or is lost due to a hardware failure. The DHCP servers IP scopes have been depleted. Any new clients requesting an IP address are refused.
Objectives
After completing this lab, you will be able to: Implement DHCP. Implement a DHCP relay agent (optional).
Lab Setup
Estimated Time: 45 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Microsoft Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: o o o 5. 6. User name: Administrator Password: Pa$$w0rd Domain: Adatum
Repeat steps 2 to 4 for 20410B-LON-SVR1 and 20410B-LON-CL1. For the optional Exercise 2, you should repeat steps 2 to 4 for 20410B-LON-RTR and 20410B-LON-CL2.
Task 1: Install the Dynamic Host Configuration Protocol (DHCP) server role
1. 2. 3. Switch to LON-SVR1. Open Server Manager, and install the DHCP Server role. In the Add Roles and Features Wizard, accept all defaults.
Task 3: Configure client to use DHCP, and then test the configuration
1. 2. Switch to LON-CL1. Reconfigure the Local Area Connection using the following information: o o o 3. 4. Configure Internet Protocol Version 4 (TCP/IPv4) Obtain an IP address automatically Obtain DNS server address automatically
Open the Command Prompt window, and initiate the DHCP process using the ipconfig /renew command. To test the configuration, verify that LON-CL1 has received an IP address from the DHCP scope by typing ipconfig /all in the Command Prompt window. This command will return information such as IP address, subnet mask, and DHCP enabled status, which should be Yes.
Results: After completing this exercise, you will have implemented DHCP, configured DHCP scope and options, and configured a DHCP reservation.
o o o o 5. 6. 7.
Subnet Mask: 255.255.0.0 Exclusions: 10.10.0.190-10.10.0.200 Other settings use default value Configure options Router 10.10.0.1. Other setting use default values.
Activate the scope. To test the client, switch to LON-CL2. Open the Network and Sharing Center window and configure Local Area Connection, Internet Protocol Version 4 (TCP/IPv4) properties with following settings: o o Obtain IP address automatically Obtain DNS server address automatically
8. 9.
Open the Command Prompt window. In the Command Prompt window, at a command prompt, type following command: ipconfig /renew
10. Verify that IP address and DNS server settings on LON-CL2 are obtained from DHCP Server scope installed on LON-SVR1. Note: IP address should be from following range: 10.10.0.100/16 to 10.10.0.200/16.
Results: After completing this exercise, you will have implemented a DHCP relay agent.
Review Questions
Question: You have two subnets in your organization and want to use DHCP to allocate addresses to client computers in both subnets. You do not want to deploy two DHCP servers. What factors must you consider? Question: Your organization has grown, and your IPv4 scope is almost out of addresses. What should you do? Question: What information do you require to configure a DHCP reservation? Question: Can you configure option 003 Router as a Server-level DHCP scope option?
Tools
Tool DHCP PowerShell Ipconfig.exe Netsh.exe Use for Graphical User Interface for managing DHCP Server Command line interface for managing DHCP Server Managing and troubleshooting client IP settings Configuring both client and server-side IP settings, including those for DHCP server role Editing and fine-tuning settings, including those for the DHCP server role Where to find it Server Manager Windows Taskbar on the Desktop Command-line Command-line
Regedit.exe
7-1
Module 7
Implementing Domain Name System
Contents:
Module Overview Lesson 1: Name Resolution for Windows Clients and Servers Lesson 2: Installing and Managing a DNS Server Lesson 3: Managing DNS Zones Lab: Implementing DNS Module Review and Takeaways 7-1 7-2 7-11 7-17 7-21 7-26
Module Overview
Name resolution is the process of software translating between names that users can read and understand, and numerical IP addresses, which are necessary for TCP/IP communications. Because of this, name resolution is one of the most important concepts of every network infrastructure. You can think about DNS as being like the Internets phone book for computers. Client computers use the name resolution process when locating hosts on the Internet and when locating other hosts and services in an internal network. Doman Name System (DNS) is one of the most common technologies for name resolution. Active Directory Domain Services (AD DS) depends heavily on DNS, as does Internet traffic. This module discusses some basic name resolution concepts, and installing and configuring a DNS Server service and its components.
Objectives
After completing this module, you will be able to: Describe name resolution for Windows operating system clients and Windows Server servers. Install and manage DNS Server service. Manage DNS zones.
Lesson 1
Lesson Objectives
After completing this lesson you will be able to: Describe computer names. Describe DNS. Describe DNS zones and records. Describe how Internet DNS names are resolved. Describe Link Local Multicast Name Resolution. Describe how a client resolves a name. Troubleshoot name resolution.
Name Type
The type of name (host name or NetBIOS name) that an application uses is determined by the application developer. If the application developer designs an application to request network services through Windows sockets, then host names are used. If, on the other hand, the application developer designs an application to request services through NetBIOS, a NetBIOS name is used. Most current applications, including Internet applications, use Windows socketsand thus use host namesto access network services. NetBIOS is used by many earlier Windows operating system applications. Earlier versions of Windows operating systems, such as Microsoft Windows 98 and Windows Millennium Edition, require NetBIOS to support networking capabilities such as file sharing. However, since Microsoft Windows 2000, all operating systems support NetBIOS for backward compatibility with earlier versions of Windows, but do not require NetBIOS themselves.
Note: You can use Windows sockets applications to specify the destination host either by IP address or by host name. NetBIOS applications require the use of a NetBIOS name.
Host Names
A host name is a user-friendly name that is associated with a computers IP address to identify it as a TCP/IP host. The host name can be up to 255 characters long, and can contain alphabetic and numeric characters, periods, and hyphens. You can use host names in various forms. The two most common forms are as an alias, and as a fully qualified domain name (FQDN). An alias is a single name that is associated with an IP address, such as payroll. You can combine an alias with a domain name to create an FQDN. An FQDN is structured for use on the Internet, and includes periods as separators. An example of an FQDN is payroll.contoso.com.
NetBIOS Names
A NetBIOS name is a 16-character name that identifies a NetBIOS resource on the network. A NetBIOS name can represent a single computer or a group of computers. The first 15 characters are used for the name; the final character identifies the resource or service that is being referred to on the computer. The 15-character name may include the computer name, the domain name, and the name of the user who is logged on. The sixteenth character is a 1-byte hexadecimal identifier. The NetBIOS namespace is flat, meaning that names can be used only once within a network. You cannot organize NetBIOS names into a hierarchical structure, as you can with FQDNs. Additional Reading: For more information about NetBIOS name resolution, see NetBIOS Name Resolution at http://go.microsoft.com/fwlink/?LinkId=269710.
What Is DNS?
DNS is a service that resolves FQDNs and other host names to IP addresses. All Windows Server operating systems include a DNS Server service. When you use DNS, users on your network can locate network resources by typing in userfriendly names (for example, www.microsoft.com), which the computer then resolves to an IP address. The benefit is that IPv4 addresses may be difficult to remember (for example, 131.107.0.32), while a domain name typically is easier to remember. In addition, you can use host names that do not change while the underlying IP addresses can be changed to suit your organizational needs. DNS uses a database (stored in a file or in AD DS) of names and IP addresses to provide this service. DNS client software performs queries on and updates to the DNS database. For example, within an organization, a user who is trying to locate a print server can use the DNS name printserver.contoso.com, and the DNS client software will resolve the name to a printers IP address, such as 172.16.23.55. Even if the printers IP address changes, the user-friendly name can remain the same.
Originally, there was one file on the Internet that contained a list of all domain names and their corresponding IP addresses. This list quickly became too long to manage and distribute. DNS was developed to solve the problems associated with using a single internet file. With the adoption of IPv6, DNS becomes even more important, because IPv6 addresses are even more complex than IPv4 addresses (for example, 2001:db8:4136:e38c:384f:3764:b59c:3d97). DNS groups information about network resources into a hierarchical structure of domains. The hierarchical structure of domains is an inverted tree structure beginning with a root domain at its apex, and descending into separate branches with common levels of parent domains, and descending downward even further into individual child domains. The representation of the entire hierarchical domain structure is known as a DNS namespace. The Internet uses a single DNS namespace with multiple root servers. To participate in the Internet DNS namespace, a domain name must be registered with a DNS registrar. This ensures that no two organizations attempt to use the same domain name. If hosts that are located on the Internet do not need to resolve names in your domain, you can host a domain internally, without registering it. However, you must still ensure that the domain name is unique from Internet domain names, or connectivity to Internet resources might be affected. A common way to ensure uniqueness is to create an internal domain in the .local domain. The .local domain is reserved for internal use in much the same way that private IP addresses are reserved for internal use. In addition to resolving host names to IP addresses, DNS can be used to: Locate domain controllers and global catalog servers. This is used when logging on to AD DS. Resolve IP addresses to host names. This is useful when a log file contains only the IP address of a host. Locate a mail server for email delivery. This is used for the delivery of all Internet email.
Resource Records
The DNS zone file stores resource records. Resource records specify a resource type, and the IP address to locate the resource. The most common resource record is a host (A) resource record. This is a simple record that resolves a host name to an IP address. The host can be a workstation, server, or another network device, such as a router. Resource records also help find resources for a particular domain. For instance, when a Microsoft Exchange Server needs to find the server that is responsible for delivering mail for another domain, it requests the mail exchanger (MX) resource record for that domain. This record points to the host (A) resource record of the host that is running the SMTP mail service. Resource records also can contain custom attributes. MX records, for instance, have a preference attribute, which is useful if an organization has multiple mail servers. The MX record tells the sending server which mail server the receiving organization prefers. SRV records also contain information regarding on which port the service is listening, and the protocol that you should use to communicate with the service.
To see how these servers work together to resolve a DNS name, look at the following name resolution process for the name www.microsoft.com: 1. 2. 3. 4. 5. A workstation queries the local DNS server for the IP address www.microsoft.com. If the local DNS server does not have the information, then it queries a root DNS server for the location of the .com DNS servers. The local DNS server queries a .com DNS server for the location of the microsoft.com DNS servers. The local DNS server queries the microsoft.com DNS server for the IP address of www.microsoft.com. The IP address of www.microsoft.com is returned to the workstation.
The name resolution process can be modified by caching or forwarding: Caching. After a local DNS server resolves a DNS name, it caches the results for approximately 24 hours. Subsequent resolution requests for the DNS name are given the cached information. Forwarding. Instead of querying root servers, you can configure a DNS server to forward DNS requests to another DNS server. For example, requests for all Internet names can be forwarded to a DNS server at an Internet service provider (ISP).
For example, you might want to set up a temporary network for testing purposes without a server infrastructure. LLMNR is supported on Windows Vista, Windows Server 2008, and all newer Windows operating systems. It uses a simple system of request and reply messages to resolve computer names to IPv6 or IPv4 addresses. For a node to respond to a LLMNR request Network Discovery must be enabled, but Network Discovery is not needed just to make a request for name resolution. To use LLMNR, you need to turn on the Network Discovery feature for all nodes on the local subnet. This feature is available in the Network and Sharing Center. Be aware that Network Discovery is usually disabled for any network that you designate as Public.
If you want to control the use of LLMNR on your network, you can configure it via Group Policy. To disable LLMNR via Group Policy, set the following Group Policy value: Group Policy = Computer Configuration\Administrative Templates\Network\DNS Client \Turn off Multicast Name Resolution. Set this value to Enabled if you do not want to use LLMNR, or to Disabled if you want to use LLMNR.
DNS
As previously discussed, DNS is the Microsoft standard for resolving host names to IP Addresses. For more information on DNS, refer back to second topic of this Lesson, What Is DNS.
WINS
WINS provides a centralized database for registering dynamic mappings of a networks NetBIOS names. Windows operating systems retain support for WINS to provide backward compatibility. You can resolve NetBIOS names by using: Broadcast messages. Broadcast messages, however, do not work well on large networks because routers do not propagate broadcasts. Lmhosts file on all computers. Using an Lmhosts file for NetBIOS name resolution is a high maintenance solution, because you must maintain the file manually on all computers. Hosts file on all computers. Similar to an Lmhosts file, you can also use a hosts file for NETBIOS name resolution. This file is also stored locally on each machine, and it is used for fixed mappings of names to IP addresses, on local network segment.
Note: The DNS server role in Windows Server 2008 R2 and Windows Server 2012 also provides a new zone type, the GlobalNames zone. You can use GlobalNames zone to resolve single-label names that are unique across an entire forest. This eliminates the need to use the NetBIOS-based WINS to provide support for single-label names.
Windows operating systems resolve host names by performing the following tasks in this specific order: 1. 2. 3. 4. 5. 6. 7. Checking whether the host name is the same as the local host name. Searching the DNS resolver cache. In the DNS client resolver cache, entries from hosts file are preloaded. Sending a DNS request to its configured DNS servers. Converting the host name to a NetBIOS name and checking the local NetBIOS name cache. Contacting the hosts configured WINS servers. Broadcasting as many as three NetBIOS name query request messages on the subnet that is attached directly. Searching the Lmhosts file.
Note: You can control the order used to resolve names. For example, if you disable NetBIOS over TCP/IP, none of the NetBIOS name resolution methods are attempted. Alternatively, you can modify the NetBIOS node type, which changes the order in which the NetBIOS name resolution methods are attempted.
Ipconfig: Use this command to view and modify IP configuration details that the computer uses. This tool includes additional command-line options that you can use to troubleshoot and support DNS clients. You can view the client local DNS cache using the command ipconfig/displaydns, and you can clear the local cache using ipconfig/flushdns. If you want to reregister a host in DNS, you can use ipconfig /registerdns. Monitoring on DNS server: To test if the server can communicate with upstream servers, you can perform simple local queries and recursive queries from the DNS server Monitoring tab. You also can schedule these tests for regular intervals. The DNS server Monitoring tab is available only in Windows Server 2008 and Windows Server 2012 in the DNS Server Name Properties dialog box.
In Windows Server 2012 there is a new set of Windows PowerShell cmdlets in that you can use for DNS client and server management. Some of the most commonly used cmdlets are as follows: Clear-DNSClientCache. This cmdlet clears the client cache, similar to ipconfing /flushdns. Get-DNSClient. This cmdlet displays the details of the network interfaces. Get-DNSClientCache. This cmdlet displays the content of the local DNS client cache. Register-DNSClient. This cmdlet registers all of the IP addresses on the computer onto the configured DNS server. Resolve-DNSName. This cmdlet performs a DNS name resolution for a specific name, similar to Nslookup. Set-DNSClient. This cmdlet sets the interface-specific DNS client configurations on the computer.
These cmdlets also let you use several switches and options with them, thereby providing additional options and functionalities.
2.
3.
4.
Perform the Ping-by-host-name test once more. Name resolution should now be successful. Verify that the name was resolved correctly by examining the DNS resolver cache. To display the DNS resolver cache, at a command prompt type IPConfig /displaydns, or use the equivalent Windows PowerShell cmdlet.
6. 7.
Remove the entry that you added to the hosts file, and then clear the resolver cache once more. At the command prompt, type the following command, and then examine the contents of the filename.txt file to identify the failed stage in name resolution:
Nslookup.exe -d2 LON-dc1.contoso.com. > filename.txt
Note: You also should know how to interpret the DNS resolver cache output so that you can identify whether the name resolution problem lies with the client computers configuration, the name server, or the configuration of records within the name server zone database. Interpreting the DNS resolver cache output is beyond the scope of this lesson.
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe the components of a DNS solution. Describe root hints. Describe DNS queries. Describe forwarding. Explain how DNS server caching works. Explain how to install the DNS server role.
DNS Server
A DNS server answers recursive and iterative DNS queries. DNS servers also can host one or more zones of a particular domain. Zones contain different resource records. DNS servers also can cache lookups to save time for common queries.
DNS Resolver
The DNS resolver generates and sends iterative or recursive queries to the DNS Server. A DNS resolver can be any computer that is performing a DNS lookup requiring interaction with the DNS server. DNS servers also can issue DNS requests to other DNS servers.
If the DNS server is authoritative for the querys namespace, the DNS server checks the zone and then does one of the following: Returns the requested address. Returns an authoritative No, that name does not exist.
Note: An authoritative answer can be given only by the server with direct authority for the queried name. If the local DNS server is non-authoritative for the querys namespace, then the DNS server does one of the following: Checks its cache and returns a cached response. Forwards the unresolvable query to a specific server, called a forwarder. Uses well-known addresses of multiple root servers to find an authoritative DNS server to resolve the query. This process uses root hints.
Recursive Queries
In a recursive query, the requester asks the DNS server to obtain a fully resolved IP address of the requested resource, before returning the answer to the requestor. The DNS server may have to perform several queries to other DNS servers before it finds the answer. Recursive queries are generally made by a DNS client to a DNS server, or by a DNS server that is configured to pass unresolved queries to another DNS server, in the case of a DNS server configured to use a forwarder. A recursive query has two possible results: The DNS server returns the IP address of the host requested. The DNS server cannot resolve an IP address.
For security reasons, it sometimes is necessary to disable recursive queries on a DNS server. In doing so, the DNS server in question will not attempt to forward its DNS requests to another server. This is useful when you do not want a particular DNS server to communicate outside its local network.
Iterative Queries
Iterative queries access domain name information that resides across the DNS system; by using iterative queries, you can resolve names across many servers quickly and efficiently. When a DNS server receives a request that it cannot answer using its local information or its cached lookups, it makes the same request to another DNS server by using an iterative query. When a DNS server receives an iterative query, it might answer with either the IP address for the domain name (if known), or with a referral to the DNS servers that are responsible for the domain being queried. The DNS server continues this process until it locates a DNS server that is authoritative for the queried name, or until an error or time-out condition is met.
What Is Forwarding?
A forwarder is a network DNS server that forwards queries for external names to DNS servers outside of its network. You also can create and use conditional forwarders to forward queries according to specific domain names. Once you designate a network DNS server as a forwarder, then other DNS servers in the network forward the queries that they cannot resolve locally to that server. By using a forwarder, you can manage name resolution for names outside of your network, such as names on the Internet. This improves the efficiency of name resolution for your networks computers. The forwarder must be able to communicate with the DNS server that is located on the Internet. This means either you configure it to forward requests to another DNS server, or you configure it to use root hints to communicate. Best Practice: Use a central forwarding DNS server for Internet name resolution. This can improve security because you can isolate the forwarding DNS server in a perimeter network, which ensures that no server within the network is communicating directly to the Internet.
Conditional Forwarder
A conditional forwarder is a DNS server on a network that forwards DNS queries according to the querys DNS domain name. For example, you can configure a DNS server to forward all queries that it receives for names ending with corp.contoso.com to the IP address of a specific DNS server, or to the IP addresses of multiple DNS servers. This can be useful when you have multiple DNS namespaces in a forest.
When you install the DNS server role, the dnscmd.exe command-line tool is also added. You can use the DNSCmd tool to script and automate DNS configuration. For help with this tool, at the command prompt, type: dnscmd.exe /?. In Windows Server 2012, you can also use Windows PowerShell to manage a DNS server. It is recommended that you use Windows PowerShell cmdlets for command-line-based management of the DNS server. In addition, you can use the command-line tools Nslookup, DNSCmd, Dnslint, and Ipconfig in the Windows PowerShell environment. To administer a remote DNS server, add the Remote Server Administrative tools to your administrative workstation, which must be running a Windows Vista Service Pack 1 (SP1) or newer Windows operating system.
Configure forwarding
Configure the DNS Server with a forwarder on IP address 172.16.0.10. Note: Leave all virtual machines in their current state for the next demonstration.
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe DNS zone types. Describe dynamic updates. Describe Active Directoryintegrated zones. Explain how to create an Active Directoryintegrated zone.
Primary Zone
A primary zone is a zone for which the DNS server is both the host and the primary source for information about this zone. In addition, the DNS server stores the master copy of zone data either in a local file or in AD DS. When the DNS server stores the zone in a file, the primary zone file by default is named zone_name.dns, and is located on the server in the %windir%\System32\Dns folder. When the zone is not stored in AD DS, this is the only DNS server that has a writable copy of the database.
Secondary Zone
A secondary zone is a zone for which the DNS server is the host, but is the secondary source for zone information. The information about the zone at this server must be obtained from another remote DNS server that also hosts the zone. This DNS server must have network access to the remote DNS server to receive updated zone information. Because a secondary zone is a copy of a primary zone that another server hosts, the secondary zone cannot be stored in AD DS. Secondary zones can be useful if you are replicating data from non-Windows DNS zones.
Stub Zone
A stub zone is a replicated copy of a zone that contains only those resource records that are necessary to identify that zones authoritative DNS servers. A stub zone resolves names between separate DNS namespaces, which might be necessary when a corporate merger requires that the DNS servers for two separate DNS namespaces resolve names for clients in both namespaces.
A stub zone consists of the following: The delegated zones SOA resource record, NS resource records, and A resource records. The IP address of one or more master servers that you can use to update the stub zone.
The master servers for a stub zone are one or more DNS servers that are authoritative for the child zone. Usually this is the DNS server that is hosting the primary zone for the delegated domain name.
The process of dynamic updates is as follows: 1. The client identifies a name server and sends an update. If the name server hosts only a secondary zone, then the name server refuses the clients update. If the zone is not an Active Directory integrated zone, the client may have to do this several times. If the zone supports dynamic updates, the client eventually reaches a DNS server that can write to the zone. This DNS server is the primary server for a standard, file-based zone, or any domain controller that is a name server for an Active Directoryintegrated zone. If the zone is configured for secure dynamic updates, the DNS server refuses the change. The client then authenticates and resends the update.
2.
3.
In some configurations, you may not want clients to update their records even in a dynamic update zone. In this case, you can configure the DHCP server to register the records on the clients behalf. By default, a client registers that it is a (host/address) record, and the DHCP server registers the PTR (pointer/reverse lookup) record. By default, Windows operating systems attempt to register their records with their DNS server. You can modify this behavior in the client IP configuration, or through Group Policy. Domain Controllers also register their SRV records in DNS, in addition to their host records. SRV records are registered each time the NETLOGON service starts.
Demonstration Steps
Promote LON-SVR1 as an additional domain controller 1. 2. 3. Install the AD DS server role. Start the Active Directory Domain Services Configuration Wizard. Install the DNS Server service.
Create a record
Create a New Host record in Contoso.com zone named www, and have it point to 172.16.0.100.
Objectives
After completing this lab you will be able to: Install and configure DNS. Create host records in DNS. Manage the DNS server cache.
Lab Setup
Estimated Time: 40 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: o o o 5. User name: Administrator Password: Pa$$w0rd Domain: Adatum
Task 1: Configure LON-SVR1 as a domain controller without installing the Domain Name System (DNS) server role
1. 2. 3. 4. Use Add roles and features in Server Manager to add the Active Directory Domain Services role to LON-SVR1. Start the Add Roles and Features Wizard to promote LON-SVR1 to domain controller. Choose to add LON-SVR1 as an additional domain controller in Adatum.com domain. Do not install the DNS server.
Task 3: Review configuration settings on the existing DNS server to confirm root hints
1. 2. In DNS Manager on LON-DC1, open the Properties dialog box for LON-DC1. Review root hints and forwarder configuration.
Task 4: Add the DNS server role for the branch office on the domain controller
Use Server Manager to add the DNS Server role to LON-SVR1.
Results: After completing this exercise, you will have installed and configured DNS on LON-SVR1.
Task 2: Create several host records in the Adatum.com domain for web apps
1. 2. 3. 4. On LON-DC1, open DNS Manager. Navigate to the Adatum.com forward lookup zone. Create new record named www with the IP address 172.16.0.200. Create new record named ftp with IP address 172.16.0.201.
Task 4: Use the ping command to locate new records from LON-CL1
1. 2. 3. On LON-CL1, open a Command Prompt window. Ping www.adatum.com. Ensure that ping resolves this name to 172.16.0.100. Ping ftp.adatum.com. Make sure that ping resolves this name to 172.16.0.200.
Results: After completing this exercise, you will have configured DNS records.
Task 1: Use the ping command to locate an Internet record from LON-CL1
1. 2. On LON-CL1, in the Command Prompt window use ping to locate www.nwtraders.msft. Ensure that the name resolves to an IP address, and document the IP address.
Results: After completing this exercise, you will have examined the DNS server cache.
Tools
Name of tool DNS Manager console Nslookup Ipconfig Windows PowerShell cmdlets Used for Manage DNS server role Troubleshoot DNS Troubleshoot DNS Manage and troubleshoot DNS Where to find it Administrative Tools Command-line tool Command-line tool Windows PowerShell
Best Practices
When implementing DNS, use the following best practices: Always use host names instead of NetBIOS names. Use forwarders rather than root hints. Be aware of potential caching issues when troubleshooting name resolution. Use Active Directoryintegrated zones instead of primary and secondary zones.
8-1
Module 8
Implementing IPv6
Contents:
Module Overview Lesson 1: Overview of IPv6 Lesson 2: IPv6 Addressing Lesson 3: Coexistence with IPv4 Lesson 4: IPv6 Transition Technologies Lab: Implementing IPv6 Module Review and Takeaways 8-1 8-2 8-7 8-13 8-17 8-22 8-27
Module Overview
IPv6 is a technology that helps the Internet support a growing user base and an increasingly large number of IP-enabled devices. IPv4 has been the underlying Internet protocol for almost thirty years. Its robustness, scalability, and limited feature set is now challenged by the growing need for new IP addresses. This is due in large part to the rapid growth of new network-aware devices.
Objectives
After completing this module, you will be able to: Describe the features and benefits of IPv6. Describe IPv6 addressing. Describe IPv6 coexistence with IPv4. Describe IPv6 transition technologies.
Lesson 1
Overview of IPv6
IPv6 has been included with Windows client operating systems and servers beginning with Windows Server 2008 and Windows Vista. The use of IPv6 is becoming more common on corporate networks and parts of the Internet. It is important for you to understand how this technology affects current networks, and how to integrate IPv6 into those networks. This lesson discusses the benefits of IPv6, and how it differs from IPv4.
Lesson Objectives
After completing this lesson, you will be able to: Describe the benefits of IPv6. Describe the differences between IPv4 and IPv6. Describe the IPv6 address format.
Benefits of IPv6
IPv6 support is included in Windows Server 2012 and Windows 8. The following list of benefits describes why IPv6 is being implemented.
End-to-End Communication
One of the design goals for IPv6 is to provide sufficient address space so that you do not have to use translation mechanisms such as network address translation (NAT). This simplifies communication because IPv6 hosts can communicate directly with each other over the Internet. This also simplifies support for applications such as video conferencing and other peer-to-peer applications. However, many organizations may choose to continue using translation mechanisms as a security measure.
Extensibility
IPv6 has been designed so that developers can extend it with much fewer constraints than IPv4. As a network administrator, you will not be extending IPv6, but applications that you purchase may take advantage of this to enhance IPv6 functionality.
To calculate the hexadecimal value for this section of four bits, add up the value of each bit that is set to 1. In the example of 0010, the only bit that is set to 1 is the bit assigned the value 2. The rest are set to zero. Therefore, the hexadecimal value of this section of four bits is 2.
The following example is a single IPv6 address in binary form. Note that the binary representation of the IP address is quite long. The following two lines of binary numbers represents one IP address: 0010000000000001000011011011100000000000000000000010111100111011 0000001010101010000000001111111111111110001010001001110001011010 The 128-bit address is now divided along 16-bit boundaries (eight blocks of 16 bits): 0010000000000001 0000110110111000 0000000000000000 0010111100111011 0000001010101010 0000000011111111 1111111000101000 1001110001011010 Each block is further broken into sections of four bits. The following table shows the binary and corresponding hexadecimal values for each section of four bits: Binary [0010][0000][0000][0001] [0000][1101][1011][1000] [0000][0000][0000][0000] Hexadecimal [2][0][0][1] [0][D][B][8] [0][0][0][0]
Each 16-bit block is expressed as four hexadecimal characters, and is then delimited with colons. The result is as follows: 2001:0DB8:0000:2F3B:02AA:00FF:FE28:9C5A You can simplify IPv6 representation further by removing the leading zeros within each 16-bit block. However, each block must have at least a single digit. With leading zero suppression, the address representation becomes the following: 2001:DB8:0:2F3B:2AA:FF:FE28:9C5A
Compressing Zeros
When multiple contiguous zero blocks occur, you can compress these and represent them in the address as a double-colon (::); this further simplifies the IPV6 notation. The computer recognizes "::" and substitutes it with the number of blocks necessary to make the appropriate IPv6 address. In the following example, the address is expressed using zero compression: 2001:DB8::2F3B:2AA:FF:FE28:9C5A To determine how many 0 bits are represented by the "::", you can count the number of blocks in the compressed address, subtract this number from eight, and then multiply the result by 16. Using the previous example, there are seven blocks. Subtract seven from eight, and then multiply the result (one) by 16. Thus, there are 16 bits or 16 zeros in the address where the double colon is located. You can use zero compression only once in a given address. If you use it twice or more, then there is no way to show how many 0 bits are represented by each instance of the double-colon (::). To convert an address into binary, use the reverse of the method described previously: 1. 2. 3. Add in zeros using zero compression. Add leading zeros. Convert each l number into its binary equivalent.
Lesson 2
IPv6 Addressing
An essential part of working with IPv6 is understanding the different address types and when they are used. This allows you to understand the overall communication process between IPv6 hosts and perform troubleshooting. You also need to understand the processes available for configuring a host with an IPv6 address to ensure that hosts are configured properly.
Lesson Objectives
After completing this lesson, you will be able to: Describe the structure of IPv6 addresses. Describe the structure of global unicast addresses. Describe unique local unicast addresses. Describe link-local unicast addresses and zone IDs. Describe address autoconfiguration for IPv6. Explain how to configure IPv6 client settings on a network host.
Zone ID
Regardless of the number of network interfaces in the host, each IPv6 host has a single link-local address. If the host has multiple network interfaces, the same link-local address is reused on each network interface. To allow hosts to identify link-local communication on each unique network interface, a zone ID is added to the link-local address. A zone ID is used in the following format: Address%zone_ID
Each sending host determines the zone ID that it will associate with each interface. There is no negotiation of zone ID between hosts. For example, on the same network, host A might use 3 for the zone ID on its interface, and host B might use 6 for the zone ID on its interface. Each interface in a Windows-based host is assigned a unique interface index, which is an integer. In addition to physical network cards, interfaces also include loopback and tunnel interfaces. Windows-based IPv6 hosts use the interface index of an interface as the zone ID for that interface. In the following example, the interface ID for the network interface is 3. fe80::2b0:d0ff:fee9:4143%3
Types of Autoconfiguration
Types of autoconfiguration include: Stateless. With stateless autoconfiguration, address configuration is based on the receipt of Router Advertisement messages only. Stateless autoconfiguration includes a router prefix, but does not include additional configuration options such as DNS servers. Stateful. With stateful autoconfiguration, address configuration is based on the use of a stateful address configuration protocol such as DHCPv6 to obtain addresses and other configuration options. A host uses stateful address configuration when: o o It receives instructions to do so in router advertisement messages. There are no routers present on the local link.
Both. With both, configuration is based on both receipt of router advertisement messages, and on DHCPv6.
Stateful Configuration
With stateful configuration, organizations can control how IPv6 addresses are assigned using DHCPv6. If there are any specific scope options that you need to configuresuch as the IPv6 addresses of DNS serversthen a DHCPv6 server is necessary. When IPv6 attempts to communicate with a DHCPv6 server, it uses multicast IPv6 addresses. This is different from with IPv4, which uses broadcast IPv4 addresses.
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe IP node types. Describe methods to provide coexistence for IPv4 and IPv6. Configure DNS to support IPv6. Explain IPv6 over IPv6 tunneling.
Coexistence occurs when the largest number of nodes (IPv4 or IPv6 nodes) can communicate using an IPv4 infrastructure, an IPv6 infrastructure, or an infrastructure that is a combination of IPv4 and IPv6. You will achieve true migration when all IPv4 nodes are converted to IPv6-only nodes. However, for the foreseeable future, you can achieve practical migration when as many IPv4-only nodes as possible are converted to IPv6/IPv4 nodes. IPv4-only nodes can communicate with IPv6-only nodes only when you are using an IPv4-to-IPv6 proxy or translation gateway.
Note: In most cases, the IPv6 host (AAAA) resource records that IPv6 nodes require are registered in DNS dynamically.
When a name can be resolved to both an IPv4 and IPv6 address, both addresses are returned to the client. The client then chooses which address to use based on prefix polices. In these prefix policies each prefix has a precedence level assigned to it. A higher precedence is preferred over a lower precedence. The following table displays typical prefix policies for Windows Server 2012. Prefix ::1/128 ::/0 ::ffff:0:0/96 2002::/16 2001::/32 FC00::/7 ::/96 fec0::/10 3ffe::/16 Precedence 50 40 10 7 5 3 1 1 1 Label 0 1 4 2 5 13 3 11 12 Description IPv6 loopback Default gateway IPv4 compatible address 6to4 Teredo Unique local IPv4 compatible address (depreciated) Site local (depreciated) 6Bone (depreciated)
Note: You can view the prefix policies in Windows Server 2012 by using the Windows PowerShell Get-NetPrefixPolicy cmdlet. Additional Reading: For more information about prefix policies, see Source and Destination Address Selection for IPv6 at http://go.microsoft.com/fwlink/?LinkId=269711.
3.
Create a new host record in Adatum.com with the following settings: o o Name: WebApp IP address: FD00:AAAA:BBBB:CCCC::A
Unlike tunneling for the Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling Protocol (L2TP), there is no exchange of messages for tunnel setup, maintenance, or termination. Additionally, IPv6 over IPv4 tunneling does not provide security for tunneled IPv6 packets. This means that when you use IPv6 tunneling, it does not need to establish a protected connection first. You can manually configure IPv6 over IPv4 tunneling, or use automated technologies such as ISATAP, 6to4, or Teredo that implement IPv6 over IPv4 tunneling.
Lesson 4
Lesson Objectives
After completing this lesson, you will be able to: Describe ISATAP. Describe 6to4. Describe Teredo. Describe PortProxy. Describe the transition process from IPv4 to IPv6.
What Is ISATAP?
ISATAP is an address-assignment technology that you can use to provide unicast IPv6 connectivity between IPv6/IPv4 hosts over an IPv4 intranet. IPv6 packets are tunneled in IPv4 packets for transmission over the network. Communication can occur directly between two ISATAP hosts on an IPv4 network, or communication can go through an ISATAP router if one network has only IPv6-only hosts. ISATAP hosts do not require any manual configuration, and can create ISATAP addresses using standard address autoconfiguration mechanisms. Although the ISATAP component is enabled by default, it only assigns ISATAP-based addresses if it can resolve the name ISATAP on your network. An ISATAP address that is based on a private IPv4 address is formatted like the following example: [64-bit unicast prefix]:0:5EFE:w.x.y.z An ISATAP address that is based on a public IPv4 address is formatted like the following example: [64-bit unicast prefix]:200:5EFE:w.x.y.z For example, FD00::5EFE:192.168.137.133 is an example of a private IPv4 address, and 2001:db8::200:5EFE:131.107.137.133 is an example of a public IPv4 address.
Note: All ISATAP nodes are connected to a single IPv6 subnet. This means that all ISATAP nodes are part of the same Active Directory Domain Services (AD DS) site, which may not be desirable. As such, you should use ISATAP only for limited testing. For intranet-wide deployment, you should instead deploy native IPv6 support.
What Is 6to4?
6to4 is a technology that you use to provide unicast IPv6 connectivity over the IPv4 Internet. You can use 6to4 to provide IPv6 connectivity between two IPv6 sites or between an IPv6 host and an IPv6 site. However, 6to4 is not suitable for scenarios that require NAT. A 6to4 router provides a site with IPv6 connectivity over the IPv4 Internet. The 6to4 router has a public IPv4 address that is configured on the external interface, and a 6to4 IPv6 address that is configured on the internal interface. To
configure client computers, the internal interface advertises the 6to4 network. Any client computer that begins to use the 6to4 network address is a 6to4 host. The 6to4 hosts in the site send 6to4 packets to the 6to4 router for delivery to other sites over the IPv4 Internet. The IPv6 network address that is used for 6to4 is based on the IPv4 address of the external interface on an IPv6 router. The format of the IPv6 is 2002:WWXX:YYZZ:Subnet_ID:Interface_ID, where WWXX:YYZZ is the colon-hexadecimal representation of w.x.y.z, a public IPv4 address. When a single host on the IPv4 Internet participates in 6to4, it is configured as a host/router. A 6to4 host/router does not perform routing for other hosts, but does generate its own Ipv6 network used for 6to4.
What Is Teredo?
Teredo is similar to 6to4 in that it allows you to tunnel IPv6 packets over the IPv4 Internet. However, Teredo functions correctly even when NAT is used for Internet connectivity. Teredo is required because many organizations use private IP addresses, which require NAT to access the Internet. If a NAT device can be configured as a 6to4 router, then Teredo is not required. Note: Teredo is only used if native IPv6, 6to4, or ISATAP do not provide connectivity. IPv6 communication between two Teredo clients over the IPv4 Internet requires a Teredo server that is hosted on the IPv4 Internet. The Teredo server facilitates communication between the two Teredo clients by acting as a known central point for initiating communication. Typically, hosts behind a NAT device are allowed to initiate outbound communication, but are not allowed to accept inbound communication. To work around this problem, both Teredo clients initiate communication with the Teredo server. After connection is initiated with the Teredo server, and after the NAT device has allowed outbound communication, any further communication occurs directly between the two Teredo clients. Note: Several public Teredo servers are available for use on the Internet. Windows operating systems use the Microsoft-provided Teredo server at teredo.ipv6.microsoft.com by default. Teredo can also facilitate communication with IPv6-only hosts on the IPv6 Internet by using a Teredo relay. The Teredo relay forwards packets from a Teredo client to the IPv6 Internet.
You can configure Windows Server 2012 as a Teredo client, Teredo relay, or Teredo server. To configure Teredo use the Windows PowerShell cmdlet Set-NetTeredoConfiguration. The default configuration for Teredo is as a client. When configured as a client, Teredo is disabled when attached to a domain network. To enable Teredo on a domain network, you must configure it as an enterprise client.
What Is PortProxy?
Application developers use specific network application programmer interfaces (APIs) to access network resources when they are writing applications. Modern APIs are able to use either IPv4 or IPv6, and leave the responsibility of choosing the IP version to the operating system. However, some older applications use APIs that can only use IPv4. You use the PortProxy service to allow applications that do not support IPv6 to communicate with IPv6 hosts. You enable PortProxy on the server where the application is running. Incoming IPv6 packets for the application are translated to IPv4, and then passed on to the application. You can also use PortProxy as a proxy between IPv4-only and IPv6-only hosts. To do this, you must configure DNS to resolve the name of the remote host as the address of the PortProxy computer. For example, an IPv4-only host would resolve the name of an IPv6-only host as the IPv4 address of the PortProxy computer. Packets would then be sent to the PortProxy computer, which would then proxy them to the IPv6-only computer. PortProxy has the following limitations: It is limited to TCP connections only. It cannot be used for applications that use UDP. It cannot change address information that is embedded in the data portion of the packet. If the application (such as File Transfer Protocol (FTP)) embeds address information in the data portion, then it will not work.
You can configure PortProxy on Windows Server 2012 by using netsh interface portproxy. However, it is generally preferred to use a tunneling technology instead of PortProxy.
Most organizations will probably add IPv6 to an existing IPv4 environment and continue to have coexistence for an extended time. Many legacy applications and devices that do not support IPv6 are still in existence, and coexistence is much simpler than using transition technologies such as ISATAP. You should only remove IPv4 after resources that depend on it are either removed or updated to use IPv6. IPv6 is enabled by default for Windows Vista and newer Windows client operating systems, and Windows Server 2008 and newer Windows Server operating systems. As a best practice, you should not disable IPv6 unless there is a technical reason to do so. Some features in Windows operating systems rely on IPv6.
Objectives
After completing this lab, you will be able to: Configure an IPv6 network. Configure an ISATAP router.
Lab Setup
Estimated Time: 30 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must complete the following steps: 1. 2. 3. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts.
4.
Sign in using the following credentials: o o o User name: Administrator Password: Pa$$w0rd Domain: Adatum
5.
3.
Allow clients to obtain the IPv6 network address automatically from LON-RTR by using the following Set-NetIPInterface cmdlet to enable router advertisements on Local Area Connection 2:
Set-NetIPInterface -InterfaceAlias "Local Area Connection 2" -AddressFamily IPv6 -Advertising Enabled
4.
Use ipconfig to verify that Local Area Connection 2 has an IPv6 address on the 2001:db8:0:1::/64 network. This address is used for communication on the IPv6-only network.
Results: After completing the exercise, students will have configured an IPv6only network.
2.
Use the following Get-NetIPAddress cmdlet to identify the interface index of the ISATAP interface with 172.16.0.1 in the link-local address.
Get-NetIPAddress | Format-Table InterfaceAlias,InterfaceIndex,IPv6Address
Record the Interface index here: 3. Use the Get-NetIPInterface cmdlet to verify the following on the ISATAP interface: o o Forwarding is enabled Advertising is disabled
Get-NetIPInterface -InterfaceIndex IndexYouRecorded -PolicyStore ActiveStore | Format-List
4.
The ISATAP interface for an ISATAP router must have forwarding enabled and advertising enabled. Use the following Set-NetIPInterface cmdlet to enable router advertisements on the ISATAP interface:
Set-NetIPInterface -InterfaceIndex IndexYouRecorded -Advertising Enabled
5.
Create a new IPv6 network that will be used for the ISATAP network. Use the following New-NetRoute cmdlet to configure a network route for the ISATAP interface:
New-NetRoute -InterfaceIndex IndexYouRecorded -DestinationPrefix 2001:db8:0:2::/64 -Publish Yes
6.
Use the following Get-NetIPAddress cmdlet to verify that the ISATAP interface has an IPv6 address on the 2001:db8:0:2::/64 network:
Get-NetIPAddress -InterfaceIndex IndexYouRecorded
2.
Use ipconfig to verify that the Tunnel adapter for ISATAP has an IPv6 address on the 2001:db8:0:2/64 network. Notice that this address includes the IPv4 address of NYC-DC1.
2. 3.
User Server Manager to modify the properties of TCP/IPv6 on the Local Area Connection, and add 2001:db8:0:2:0:5efe:172.16.0.10 as the preferred DNS server. Use the ping command to test connectivity to LON-DC1.
Note: A ping from LON-DC1 to LON-SVR2 does not respond because the firewall configuration on LON-SVR2 blocks ping requests.
Results: After completing this exercise, students will have configured an ISATAP router on LON-RTR to allow communication between an IPv6only network and an IPv4only network.
Best Practices
Use the following best practices when implementing IPv6: Do not disable IPv6 on Windows 8 or Windows Server 2012. Enable coexistence of IPv4 and IPv6 in your organization rather than using transition technologies. Use unique local IPv6 addresses on your internal network. Use Teredo to implement IPv6 connectivity over the IPv4 Internet.
9-1
Module 9
Implementing Local Storage
Contents:
Module Overview Lesson 1: Overview of Storage Lesson 2: Managing Disks and Volumes Lesson 3: Implementing Storage Spaces Lab: Implementing Local Storage Module Review and Takeaways 9-1 9-2 9-11 9-20 9-25 9-30
Module Overview
Storage is one of the key components that you must consider when planning and deploying a Windows Server 2012 operating system. Most organizations require a great deal of storage because users work regularly with applications that create new files requiring storage in a central location. When users keep their files for longer periods of time, storage demands increase. Every time a user logs on to a server, an audit trail is created in an event log; this also uses storage. Even as files are created, copied, and moved, storage is required. This module introduces you to different storage technologies. It discusses how to implement the storage solutions in Windows Server 2012, and how to use Storage Spaces, a new feature that you can use to combine disks into pools that are then managed automatically.
Objectives
After completing this module you will be able to: Describe the various storage technologies. Explain how to manage disks and volumes. Explain how to implement Storage Spaces.
Lesson 1
Overview of Storage
When you plan a server deployment, one of the key components that you will require is storage. There are various types of storage that you can utilize, from locally attached storage, to storage that is remotely accessed via Ethernet, or even connected with optical fiber. You should be aware of each solutions benefits and its limitations. As you prepare to deploy storage for your environment, you will need to make some important decisions. This lesson addresses questions you might consider, such as the following: Does the storage need to be fast? Does the storage need to be highly available? How much storage does your deployment actually require? How much resilience do you need to add to the initial storage requirement to ensure that your investment remains secure in the future?
Lesson Objectives
After completing this lesson, you will be able to: Describe disk types and performance. Describe direct-attached storage. Describe network-attached storage. Describe storage area network (SAN). Describe Redundant Array of Independent Disks (RAID). Describe RAID levels.
but SATA host adapters and devices communicate via a high-speed serial cable over two pairs of conductors. SATA was introduced in 2003. It can operate at speeds of 1.5, 3.0, and 6.0 GB per second, depending on the SATA revision (1, 2 or 3 respectively). SATA drives are less expensive than other drive options, but also provide less performance. Organizations may choose to deploy SATA drives when they require large amounts of storage but not high performance. SATA disks are generally lowcost disks that provide mass storage. However, for the lower cost they are also less reliable compared to serial attached SCSI (SAS) disks. A variation on the SATA interface is eSATA, which is designed to enable high-speed access to externally-attached SATA drives. Small computer system interface (SCSI). SCSI is a set of standards for physically connecting and transferring data between computers and peripheral devices. SCSI was originally introduced in 1978 and was designed as an interface on a lower-level communication, subsequently allowing it to take less processing power and perform transactions at higher speeds. SCSI became a standard in 1986. Similar to EIDE, SCSI was designed to run over parallel cables; however, recently the usage has been expanded to run over other mediums. The 1986 parallel specification of SCSI had initial speed transfers of 5 MB per second. The more recent 2003 implementation, Ultra 640 SCSI, also known as Ultra 5, can transfer data at speeds of 640 MB per second. SCSI disks provide higher performance than SATA disks, but are also more expensive. SAS. SAS is a further implementation of the SCSI standard. SAS depends on a point-to-point serial protocol that replaces the parallel SCSI bus technology, and uses the standard SCSI command set. SAS offers backward-compatibility with second generation SATA drives. SAS drives are reliable and made for 24 hours-a-day, seven-days-a-week (24/7) operation in data centers. With up to 15,000 rotations per minute (RPM), these disks are also the fastest traditional hard disks. Solid State Drives (SSDs). SSDs are data storage devices that use solid-state memory to store data rather than using the spinning disks and movable read/write heads that are used in other disks. SSDs use microchips to store the data and do not contain any moving parts. SSDs provide fast disk access, use less power, and are less susceptible to failure from being dropped than traditional hard disks (such as SAS drives), but are also much more expensive per GB of storage. SSDs typically use a SATA interface, so you can usually replace hard disk drives with SSDs without any modifications.
Note: Fibre Channel, fire-wire, or USB-attached disks are also available storage options. They define either the transport bus or the disk type. For example, USB-attached disks use mostly with SATA or SSD drives to store data.
Primarily, DAS storage is physically connected to the server. Because of this, if the server suffers a power failure, the storage is unavailable. DAS comes in various disk types such as SATA, SAS or SSD, which affect the speed and the performance of the storage, and has both advantages and disadvantages.
Interface (iSCSI), while NAS services are made available via CIFS and NFS; the disk drives (aggregates) are the same, the methods for writing are the same, and the overhead and reliability are the same.
NAS can also be considered a Plug and Play solution that is easy to install, deploy, and manage, with or without IT staff onsite.
What Is a SAN?
The third type of storage is a SAN. A SAN is a specialized high speed network that connects computer systems or host servers to highperformance storage subsystems. A SAN usually includes various components such as host busadapters (HBAs), special switches to help route traffic, and storage disk arrays with logical unit numbers (LUNs) for storage. A SAN enables multiple servers to access a pool of storage in which any server can potentially access any storage unit. A SAN uses a network like any other network, such as a local area network (LAN).
Therefore, you can use a SAN to connect many different devices and hosts to provide access to any device from anywhere. Unlike DAS or NAS, a SAN is controlled by a hardware device, offers the fastest access to the storage, and offers methods to minimize overhead (such as using raw disks).
What Is RAID?
RAID is a technology that you can use to configure storage systems that provide high reliability and (potentially) high performance. RAID implements storage systems by combining multiple disks into a single logical unit called a RAID array. Depending on the configuration, a RAID array can withstand the failure of one or more of the physical hard disks, or provide higher performance than is available by using a single disk. RAID provides an important component redundancythat you can use when planning and deploying Windows Server 2012 servers. In most organizations, it is important that the servers are available all of the time. Most servers provide highly redundant components such as redundant power supplies and redundant network adapters. The goal of this redundancy is to ensure that the server remains available even when a single component on the server fails. By implementing RAID, you can provide the same level of redundancy for the storage system.
RAID subsystems can also provide potentially better performance than single disks by distributing disk reads and writes across multiple disks. For example, when implementing disk striping, the server can read information from all hard disks in the stripe set. When combined with multiple disk controllers, this can provide significant improvements in disk performance. Note: Although RAID can provide a greater level of tolerance for disk failure, you should not use RAID to replace traditional backups. If a server has a power surge or catastrophic failure and all of the disks fail, then you would still need to rely on standard backups.
supports the use of software RAID, and you can use Disk Management to configure several different levels of RAID. When choosing to implement hardware or software RAID, consider the following: Hardware RAID requires disk controllers that are RAIDcapable. Most disk controllers shipped with new servers have this functionality. To configure hardware RAID, you need to access the disk controller management program. Normally, you can access this during the server boot process or by using a webpage that runs management software. Implementing disk mirroring for the disk containing the system and boot volume with software RAID can require additional configuration when a disk fails. Because the RAID configuration is managed by the operating system, you must configure one of the disks in the mirror as the boot disk. If that disk fails, you may need to modify the boot configuration for the server to start the server. This is not an issue with hardware RAID, because the disk controller accesses the available disk and exposes it to the operating system. In older servers, you may get better performance with software RAID when using parity, because the server processor can calculate parity more quickly than the disk controller can. This is no longer an issue with newer servers, where you may get better performance on the server because you can offload the parity calculations to the disk controller.
RAID Levels
When implementing RAID, you need to decide what level of RAID to implement. The table below lists the features for each different RAID level.
Level RAID 0
Description Striped set without parity or mirroring Data is written sequentially to each disk
Comments Use only in situations where you require high performance and can tolerate data loss Frequently used for system and boot volumes with hardware RAID
RAID 1
Mirrored set without parity or striping Data is written to both disks simultaneously
Good performance
Can only use the amount of space that is available on the smallest disk
Level RAID 2
Description Data is written in bits to each disk with parity written to separate disk or disks Data is written in bytes to each disk with parity written to separate disk or disks Data is written in blocks to each disk with parity written to a dedicated disk Striped set with distributed parity Data is written in blocks to each disk with parity spread across all disks Striped set with dual distributed parity Data is written in blocks to each disk with double parity written across all disks Striped sets in a mirrored set A set of drives is striped, and then the strip set is mirrored
Comments Requires that all disks be synchronized Not currently used Requires that all disks be synchronized Rarely used
RAID 3
RAID 4
Rarely used
RAID 5
Commonly used for data storage where performance is not critical, but maximizing disk usage is important Commonly used for data storage where performance is not critical but maximizing disk usage and availability are important Not commonly used
RAID 6
RAID 0+1
Can tolerate the failure of two or more disks as long as all failed disks are in the same striped set
Description Mirrored set in a stripe set Several drives are mirrored to a second set of drives, and then one drive from each mirror is striped
Space utilization Only half the disk space is available due to mirroring
Redundancy Can tolerate the failure of two or more disks as long as both disks in a mirror do not fail
Comments Frequently used in scenarios where performance and redundancy are critical, and the cost of the required additional disks is acceptable This level is recommended for applications that require high fault tolerance, capacity, and random positioning performance Requires at least six drives
Striped set with distributed parity in a stripe set Drives are striped with RAID 5, and then striped without parity
Note: The most common RAID levels are RAID 1 (also known as mirroring), RAID 5 (also known as striped set with distributed parity), and RAID 1+0 (also known as mirrored set in a stripe set). Question: Should all disks be configured with the same amount of fault tolerance?
Lesson 2
This lesson addresses these and similar questions, including why it is important to manage disks and what tools you need to manage disks.
Lesson Objectives
After completing this lesson, you will be able to: Explain how to select a partition table format. Describe the difference between basic and dynamic disk types. Explain how to select a file system. Describe a resilient file system. Describe mount points and links. Explain how to create mount points and links. Describe the process of extending and shrinking volumes.
MBR
The MBR partition table format is the standard partitioning scheme that has been used on hard disks since the first personal computers came out in the 1980s. The MBR partition table format has the following characteristics: A partition supports a maximum of four primary partitions per drive. A partition can have maximum of 2 terabytes (TB) (2.19 x 10^12 bytes). If you initialize a disk larger than 2 TB using MBR, the disks are only able to store volumes up to 2 TB and the rest of the storage will not be used. You must convert the disk to GPT if you want to use all of its space.
Note: You can use the MBR partition table format for disk drives that never surpass 2 TB in size. This provides you with a bit more space because GPT requires more disk space than MBR. However, Microsoft recommends always using GPT as a best practice.
GPT
The GPT was introduced with Windows Server 2003 and Windows XP 64-bit Edition to overcome the limitations of MBR, and to address larger disks. GPT has the following characteristics: GPT is the successor of MBR partition table format. GPT supports a maximum of 128 partitions per drive. A partition can have up to 8 zettabytes (ZB). A hard disk can have up to 18 exabytes (EB), with 512 kilobytes (KB) logical block addressing (LBA). To boot from a GPT partition table, your BIOS must support GPT. Note: If your hard disk is larger than 2 TB, you must use the GPT partition table format. Additional Reading: For frequently asked questions about the GUID partitioning table disk architecture, see http://go.microsoft.com/fwlink/?LinkID=266748.
Basic Disk
Basic storage uses normal partition tables that are used by all versions of the Windows operating system. A disk that is initialized for basic storage is called a basic disk. A basic disk contains basic partitions, such as primary partitions and extended partitions. You can subdivide extended partitions into logical drives. By default, when you initialize a disk in the Windows operating system, the disk is configured as a basic disk. You can easily convert basic disks to dynamic disks without any loss of data; however, when converting a dynamic disk to basic disk, all data on the disk is lost. There is no performance gain by converting basic disks to dynamic disks, and some applications cannot address data that is stored on dynamic disks.. For these reasons, most administrators do not convert basic disks to dynamic disks unless they need to use some of the additional volume configuration options that are available with dynamic disks.
Dynamic Disk
Dynamic storage was introduced in the Microsoft Windows 2000 Server operating system. A disk that is initialized for dynamic storage is called a dynamic disk. A dynamic disk contains dynamic volumes. With dynamic storage, you can perform disk and volume management without the need to restart computers running Windows operating systems.
When you configure dynamic disks, you create volumes rather than partitions. A volume is a storage unit that is made from free space on one or more disks. You can format the volume with a file system, and can assign it a drive letter or configure it with a mount point. The following is a list of the dynamic volumes that are available: Simple volumes. A simple volume uses free space from a single disk. It can be a single region on a disk, or consist of multiple, concatenated regions. A simple volume can be extended within the same disk or on to additional disks. If a simple volume is extended across multiple disks, it becomes a spanned volume. Spanned volumes. A spanned volume is created from free disk space that is linked together from multiple disks. You can extend a spanned volume onto a maximum of 32 disks. A spanned volume cannot be mirrored, and is not fault-tolerant; therefore, if you lose one disk, you will lose the entire spanned volume. Striped volumes. A striped volume has data that is spread across two or more physical disks. The data on this type of volume is allocated alternately and evenly to each of the physical disks. A striped volume cannot be mirrored or extended, and is not fault-tolerant. This means that the loss of one disk causes the immediate loss of all the data. Striping is also known as RAID-0. Mirrored volumes. A mirrored volume is a fault-tolerant volume that has all data duplicated onto two physical disks. All of the data on one volume is copied to another disk to provide data redundancy. If one of the disks fails, the data can still be accessed from the remaining disk. A mirrored volume cannot be extended. Mirroring is also known as RAID-1. RAID-5 volumes. A RAID-5 volume is a fault-tolerant volume that has data striped across a minimum of three or more disks. Parity is also striped across the disk array. If a physical disk fails, the portion of the RAID-5 volume that was on that failed disk can be re-created from the remaining data and the parity. A RAID-5 volume cannot be mirrored or extended.
Note: When you install the Windows 8 operating system or the Windows Server 2012 operating system in a clean installation, a separate system volume is created to enable encrypting the boot volume by using Windows BitLocker drive encryption. Additional Reading: For more information about how basic disks and volumes work, see http://go.microsoft.com/fwlink/?LinkID=199648. For more information about dynamic disks and volumes, see http://go.microsoft.com/fwlink/?LinkID=199649.
FAT
The FAT file system is the most simplistic of the file systems that Windows operating systems support. The FAT file system is characterized by a table that resides at the very top of the volume. To protect the volume, two copies of the FAT file system are maintained in case one becomes damaged. In addition, the file allocation tables and the root directory must be stored in a fixed location so that the systems boot files can be correctly located. A disk formatted with the FAT file system is allocated in clusters, whose sizes are determined by the size of the volume. When a file is created, an entry is created in the directory, and the first cluster number containing data is established. This entry in the table indicates either that this is the last cluster of the file, or points to the next cluster. There is no organization to the FAT directory structure, and files are given the first open location on the drive. Because of the size limitation with the file allocation table, the original release of FAT could only access partitions that were less than 2 GB in size. To enable larger disks, Microsoft developed FAT32. FAT32 supports partitions of up to 2 TB. FAT does not provide any security for files on the partition. You should never use FAT or FAT32 as the file system for disks attached to Windows Server 2012 servers. You might consider using FAT or FAT32 to format external media such as USB flash media. The file system designed especially for flash drives is Extended FAT (exFAT). It can be used where FAT32 is not suitable, such as when you need a disk format that works with a television, which requires a disk that is larger than 2 TB. A number of media devices support exFAT, such as modern flat panel TVs, media centers, and portable media players.
NTFS
NTFS is the standard file system for all Windows operating systems beginning with Windows NT Server 4.0. Unlike FAT, there are no special objects on the disk, and there is no dependence on the underlying hardware, such as 512-byte sectors. In addition, in NTFS there are no special locations on the disk, such as the tables. NTFS is an improvement over FAT in several ways, such as better support for metadata, and the use of advanced data structures to improve performance, reliability, and disk space utilization. NTFS also has additional extensions such as security access control lists (ACLs), which you can use for auditing, file system journaling, and encryption. NTFS is required for a number of Windows Server 2008 R2 roles and features such as Active Directory Domain Services (AD DS), Volume Shadow Services (VSS), Distributed File System (DFS) and File Replication Services (FRS). NTFS also provides a much higher level of security than FAT or FAT 32.
other items. Additionally, ReFS offers greater resiliency, meaning better data verification, error correction, and scalability. ReFS uses features from NTFS, and is designed to maintain backward compatibility with its older Windows operating system versions. Windows 8 clients and older Windows client operating systems can read and write to ReFS disk drive partitions and to shares on a server, just as they can with those running NTFS. You should use ReFS with very large volumes and very large file shares to overcome the NTFS limitation of error checking and correction. Because ReFS was not available prior to Windows Server 2012 (the only choice was NTFS), it makes sense to use ReFS with Windows Server 2012 instead of NTFS to achieve better error checking, better reliability, and less corruption. Additional Reading: For more information on how FAT works, see http://go.microsoft.com/fwlink/?LinkID=199652. For more information on how NTFS works, see http://go.microsoft.com/fwlink/?LinkID=199654. Question: What file system do you currently use on your file server? Will you continue to use it?
What Is ReFS?
ReFS is a new feature in Windows Server 2012. ReFS is based on the NTFS file system, and provides the following advantages: Metadata integrity with checksums Expanded protection against data corruption Maximizes reliability, especially during a loss of power (while NTFS has been known to experience corruption in similar circumstances) Large volume, file, and directory sizes Storage pooling and virtualization, which makes creating and managing file systems easier Data striping for performance (bandwidth can be managed) Redundancy for fault tolerance Disk scrubbing for protection against latent disk errors Resiliency to corruptions with recovery for maximum volume availability Shared storage pools across machines for additional failure tolerance and load balancing
ReFS inherits some features from NTFS, including the following: BitLocker drive encryption ACLs for security Update sequence number (USN) journal Change notifications Symbolic links, junction points, mount points and reparse points Volume snapshots File IDs
Because ReFS uses a subset of features from NTFS, it is designed to maintain backward compatibility with NTFS. Therefore, applications that run on Windows Server 2012 can access files on ReFS just as they would on NTFS. However, an ReFSformatted drive is not recognized when placed in computers that are running Windows Server operating systems previous to Windows Server 2012. With NTFS, you can change the size of a cluster; however, with ReFS, each cluster has a fixed size of 64 KB, which you cannot change. Encrypted File System (EFS) for files is not supported in ReFS. As its name implies, the new file system offers greater resiliency, meaning better data verification, error correction, and scalability. Beyond its greater resiliency, ReFS also surpasses NTFS by offering larger maximum sizes for individual files, directories, disk volumes, and other items, as listed in the following table. Attribute Maximum size of a single file Maximum size of a single volume Limit Approximately 16 EB (18.446.744.073.709.551.616 bytes) 2^78 bytes with 16 KB cluster size (2^64 * 16 * 2^10) Windows stack addressing allows 2^64 bytes 2^64 2^64 32,000 Unicode characters 32,000 4 petabytes (PB) No limit No limit
Maximum number of files in a directory Maximum number of directories in a volume Maximum file name length Maximum path length Maximum size of any storage pool Maximum number of storage pools in a system Maximum number of spaces in a storage pool
Mount Points
Mount points are used in Windows operating systems to make a portion of a disk or the entire disk useable by the operating system. Most commonly, mount points are associated with drive-letter mappings so that the operating system can gain access to the disk through the drive letter.
Since the Windows 2000 Server was first introduced, you have been able to enable volume mount points, which you can then use to mount a hard disk to an empty folder that is located on another drive. For example, if you add a new hard disk to a server, rather than mounting the drive using a drive letter, you can assign a folder name such as C:\datadrive to the drive. When you do this, any time you access the C:\datadrive folder, you are actually accessing the new hard disk. Volume mount points can be useful in the following scenarios: If you are running out of drive space on a server and you want to add disk space without modifying the folder structure. You can add the hard disk, and configure a folder to point to the hard disk. If you are running out of available letters to assign to partitions or volumes. If you have several hard disks that are attached to the server, you may run out of available letters in the alphabet to which to assign drive letters. By using a volume mount point, you can add additional partitions or volumes without using more drive letters. If you need to separate disk input/output (I/O) within a folder structure. For example, if you are using an application that requires a specific file structure, but which uses the hard disks extensively, you can separate the disk I/O by creating a volume mount point within the folder structure.
Note: You can assign volume mount points only to empty folders on an NTFS partition. This means that if you want to use an existing folder name, you must first rename the folder, create and mount the hard disk using the required folder name, and then copy the data to the mounted folder.
Links
A link is a special type of file that contains a reference to another file or directory in the form of an absolute or relative path. Windows supports the following two types of links: A symbolic file link (also known as a soft link) A symbolic directory link (also known as a directory junction)
A link that is stored on a server share could refer back to a directory on a client that is not actually accessible from the server where the link is stored. Because the link processing is done from the client, the link would work correctly to access the client, even though the server cannot access the client. Links operate transparently. Applications that read or write to files that are named by a link behave as if they are operating directly on the target file. For example, you can use a symbolic link to link to a HyperV parent virtual hard disk file (.vhd) from another location. Hyper-V uses the link to work with the parent virtual hard disk (VHD) as it would the original file. The benefit of using symbolic links is that you do not need to modify the properties of your differencing VHD. Note: In Hyper-V, you can use a differencing virtual hard disk (VHD) to save space by making changes only to the child VHD, when the child VHD is part of a parent/child VHD relationship. Links are sometimes easier to manage than mount points. Mount points force you to place the files on the root of the volumes, whereas with links you can be more flexible with where you save files. You can create links by using the mklink.exe command-line tool.
Wait until the volume is created, right-click MountPoint, and then click Change Drive Letter and Paths. Change the drive letter as follows: o o Mount in the following empty NTFS folder Create new Folder C:\MountPointFolder and use it as mount point.
7.
On the taskbar, open a Windows Explorer window, and then click Local Disk (C:). You should now see the MountPoint folder with a size of 4,095,996 KB assigned to it. Notice the icon that is assigned to the mount point.
Note: As a best practice for shrinking volumes, you should defragment the files on the volume before you shrink it. This method returns the maximum amount of free disk space. During the defragment process, you can identify any immoveable files. To modify a volume, you can use Disk Management, the Diskpart.exe tool, or the Resize-Partition cmdlet in Windows PowerShell. Additional Reading: For more information about how to extend a basic volume, see http://go.microsoft.com/fwlink/?LinkID=266749. For more information about how to shrink a basic volume, see http://go.microsoft.com/fwlink/?LinkID=266750.
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe the Storage Spaces feature. Describe various options for configuring virtual disks. Describe advanced management options for Storage Spaces. Configure Storage Spaces.
Physical disk. Physical disks are disks such as SATA or SAS disks. If you want to add physical disks to a storage pool, the disks need to satisfy the following requirements: o o o o o One physical disk is required to create a storage pool; a minimum of two physical disks is required to create a resilient mirror virtual disk. A minimum of three physical disks are required to create a virtual disk with resiliency through parity. Three-way mirroring requires at least five physical disks. Disks must be blank and unformatted; no volume must exist on them. Disks can be attached using a variety of bus interfaces including iSCSI, SAS, SATA, SCSI, and USB. If you want to use failover clustering with storage pools, you cannot use SATA, USB or SCSI disks.
Storage Layout
This feature defines the number of disks from the storage pool that are allocated. Valid options include: Simple. A simple space has data striping but no redundancy. In data striping, logically sequential data is segmented across all disks in a way that access to these sequential segments can be made to different physical storage drives. Striping makes it possible to access multiple segments of data concurrently. Do not host important data on a simple volume, because it provides no failover capabilities when the disk that is storing the data fails. Two-way and three-way mirrors. Mirror spaces maintain two or three copies of the data that they host (two data copies for two-way mirrors and three data copies for three-way mirrors). Duplication happens with every write to ensure that all data copies are always current. Mirror spaces also stripe the data across multiple physical drives. Mirror spaces provide the benefit of greater data throughput and lower access latency. They also do not introduce a risk of corrupting at-rest data, and do not require the extra journaling stage when writing data. Parity. A parity space is similar to RAID 5. Data, along with parity information, is striped across multiple physical drives. Parity enables Storage Spaces to continue to service read and write requests even when a drive has failed. Parity is always rotated across available disks to enable I/O optimization. Storage spaces require a minimum of three physical drives for parity spaces. Parity spaces have increased resiliency through journaling.
Drive Allocation
This defines how the drive is allocated to the pool. Options are: Data Store. This is the default allocation when any drive is added to a pool. Storage Spaces can automatically select available capacity on data-store drives for both storage space creation and JIT allocation. Manual. Administrators can choose to specify Manual as the usage type for drives that are added to a pool. A manual drive is not used automatically as part of a storage space unless it is specifically selected at the creation of that storage space. This usage property makes it possible for administrators to specify particular types of drives for use by only certain Storage Spaces. Hot Spare. Drives added as Hot-Spares to a pool are reserve drives that are not used in the creation of a storage space. If a failure occurs on a drive that is hosting columns of a storage space, a reserve drive is called upon to replace the failed drive.
Provisioning Schemes
You can provision a virtual disk by using two different schemes: Thin provisioning space. Thin provisioning is a mechanism that allows storage to be easily allocated on a just-enough and JIT basis. Storage capacity in the pool is organized into provisioning slabs that are not allocated until the point in time when datasets grow to require the storage. As opposed to the traditional fixed storage allocation methodwhere large pools of storage capacity are allocated but may remain unusedthin provisioning optimizes utilization of available storage. Organizations are also able to save on operating costs such as electricity and floor space that are associated with keeping unused drives operating. The downside of using thin provisioning is lower disk performance. Fixed provisioning space. With Storage Spaces, fixed provisioned spaces also employ the flexible provisioning slabs. The difference between thin provisioning and a fixed provisioning space is that the storage capacity in the fixed provisioning space is allocated at the same time that the space is created.
Additional Reading: To learn more about storage cmdlets in Windows PowerShell, see http://go.microsoft.com/fwlink/?LinkID=266751.
On the View results page, wait until the task completes, make sure the Create a volume when this wizard closes check box is selected. In the New Volume Wizard, create a volume with these settings: o o o Virtual disk: Simple vDisk File system: ReFS Volume label: Simple Volume
4.
Objectives
After completing this lab, you will be able to: Install and configure a new disk. Resize volumes. Configure a redundant storage space.
Lab Setup
Estimated Time: 30 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must complete the following steps: On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. 1. 2. 3. In Hyper-V Manager, click 20410A-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: o o o 4. User name: Administrator Password: Pa$$w0rd Domain: Adatum
In the Computer Management console, on Disk 2, create a Simple Volume with the following attributes: o o o o Volume size: 5000 MB Drive Letter: G File system: ReFS Volume label: Volume2
Results: After completing this exercise, you should have initialized a new disk, and then created two simple volumes and formatted them. You should also have verified that the drive letters are available in Windows Explorer.
Results: After completing this exercise, you should have made one volume smaller, and extended another.
Task 1: Create a storage pool from five disks that are attached to the server
1. 2. On LON-SVR1, open Server Manager. In the left pane, click File and Storage Services, and then in the Servers pane, click Storage Pools.
3.
Create a storage pool with the following settings: o o Name: StoragePool1 Physical disks: o o o o o PhysicalDisk3 PhysicalDisk4 PhysicalDisk5 PhysicalDisk6 PhysicalDisk7
In the New Volume Wizard, create a volume with the following settings: Virtual disk: Mirrored Disk Drive letter: H File system: ReFS Volume label: Mirrored Volume
Task 3: Copy a file to the volume, and verify that it is visible in Windows Explorer
1. 2. Open a Command Prompt window. Type the following command:
Copy C:\windows\system32\write.exe H:\
3.
Open Windows Explorer from the taskbar, and access Mirrored Volume (H:). You should now see write.exe in the file list.
Task 6: Add a new disk to the storage pool and remove a broken disk
1. 2. 3. 4. 5. Switch to LON-SVR1. In Server Manager, in the STORAGE POOLS pane, on the menu bar, click the Refresh Storage Pools button. In the STORAGE POOLS pane, right-click StoragePool1, click Add Physical Disk, and then click PhysicalDisk8 (LON-SVR1). In the PHYSICAL DISKS pane, right-click the disk that displays a warning next to it, and then select Remove Disk. Click the Refresh Storage Pools button to see the warnings disappear.
Results: After completing this exercise, you should have created a storage pool and added five disks to it. Then you should have created a three-way mirrored, thinly provisioned virtual disk from the storage pool. You should have also copied a file to the new volume and verified that it is accessible. Next, after removing a physical drive, you should have verified that the virtual disk was still available and could be accessed. Finally, you should have added another physical disk to the storage pool.
Tools
Tool Disk Management Use Initialize disks Create and modify volumes Diskpart.exe Initialize disks Create and modify volumes from a command prompt Mklink.exe Chkdsk.exe Create a symbolic link to a file or folder Check a disk for a NTFSformatted volume Cannot be used for ReFS or virtual disks Defrag.exe Disk defragmentation tool for NTFS formatted volumes. Cannot be used for ReFS or virtual disks Command prompt Command prompt Command prompt Where to find it In Server Manager on the Tools menu (part of Computer Management) Command prompt
Best Practices
The following are recommended best practices: If you want to shrink a volume, defragment the volume first so you can reclaim more space from the volume. Use the GPT partition table format for disks larger than 2 TB. For very large volumes, use ReFS. Do not use FAT or FAT32 on Windows Server operating system disks. Use the Storage Spaces feature to have the Windows operating system manage your disks.
10-1
Module 10
Implementing File and Print Services
Contents:
Module Overview Lesson 1: Securing Files and Folders Lesson 2: Protecting Shared Files and Folders by Using Shadow Copies Lesson 3: Configuring Network Printing Lab: Implementing File and Print Services Module Review and Takeaways 10-1 10-2 10-15 10-18 10-24 10-30
Module Overview
Accessing files and printers on the network is one of the most common activities in the Windows Server environment. Reliable, secure access to files and folders and print resources is often the first requirement of a Windows Server 2012-based network. To provide access to file and print resources on your network, you must understand how to configure these resources within Windows Server 2012 server, and how to configure appropriate access to the resources for users in your environment. This module discusses how to provide these important file and print resources with Windows Server 2012. You will learn how to enable and configure file and print services in Windows Server 2012, and you will learn important considerations and best practices for working with file and print services.
Objectives
After completing this module, you will be able to: Secure shared files and folders. Protect shared files and folders by using shadow copies. Configure network printing.
Lesson 1
Lesson Objectives
After completing this lesson, you will be able to: Describe NTFS file system permissions. Describe a shared folder. Describe permissions inheritance. Explain how effective permissions work when you access shared folders. Describe access-based enumeration. Describe Offline files. Explain how to create and configure a shared folder.
Standard Permissions
Standard permissions provide the most commonly used permission settings for files and folders. You assign standard permissions in the NTFS Permissions Assignment window.
The following table details the standard permissions options for NTFS files and folders. File permissions Full Control Modify Read and Execute Read Write List folder contents (folders only) Description Grants the user complete control of the file or folder, including control of permissions. Grants the user permission to read, write, or delete a file or folder, including creating a file or folder. It also grants permission to execute files. Grants the user permission to read a file and start programs. Grants the user permission to view file or folder content. Grants the user permission to write to a file. Grants the user permission to view a list of the folders contents.
Note: Granting users Full Control permissions on a file or a folder gives them the ability to perform any file system operation on the object, and the ability to change permissions on the object. They can also remove permissions on the resource for any or all users, including you.
Advanced Permissions
Advanced permissions can provide a much greater level of control over NTFS files and folders. Advanced permissions are accessible by clicking the Advanced button from the Security tab of a file or folders Properties dialog box. The following table details the Advanced permissions for NTFS files and folders. File permissions Traverse Folder/Execute File Description The Traverse Folder permission applies only to folders. This permission grants or denies users the right to browse through folders to reach other files or folders, even if the user has no permissions for the traversed folders. The Traverse Folder permission takes effect only when the group or user is not granted the Bypass Traverse Checking user right. By default, the Everyone group is given the Bypass Traverse Checking user right. The Execute File permission grants or denies access to run program files. If you set the Traverse Folder permission on a folder, the Execute File permission is not automatically set on all files in that folder. The List Folder permission grants the user permission to view file names and subfolder names. The List Folder permission applies only to folders and affects only the contents of that folderit does not affect whether the folder itself will be listed. In addition, this setting has no effect on viewing the file structure from a command-line interface. The Read Data permission grants or denies the user permission to view data in files. The Read Data permission applies only to files. The Read Attributes permission grants the user permission to view the basic attributes of a file or a folder such as Read-only and Hidden attributes. Attributes are defined by NTFS.
Read Attributes
Description The Read Extended Attributes permission grants the user permission to view the extended attributes of a file or folder. Extended attributes are defined by applications, and can vary by application. The Create Files permission applies only to folders, and grants the user permission to create files in the folder. The Write Data permission grants the user permission to make changes to the file and overwrite existing content by NTFS. The Write Data permission applies only to files. The Create Folders permission grants the user permission to create folders within the folder. The Create Folders permission applies only to folders. The Append Data permission grants the user permission to make changes to the end of the file, but not to delete or overwrite existing data. The Append Data permission applies only to files. The Write Attributes permission grants the user permission to change the basic attributes of a file or folder, such as Read-only or Hidden. Attributes are defined by NTFS. The Write Attributes permission does not imply that you can create or delete files or folders; it includes only the permission to make changes to the attributes of a file or folder. To grant Create or Delete permissions, see the Create Files/Write Data, Create Folders/Append Data, Delete Subfolders and Files, and Delete entries in this table. The Write Extended Attributes permission grants the user permission to change the extended attributes of a file or folder. Extended attributes are defined by programs, and can vary by program. The Write Extended Attributes permission does not imply that the user can create or delete files or folders; it includes only the permission to make changes to the attributes of a file or folder. To grant Create or Delete permissions, see the Create Files/Write Data, Create Folders/Append Data, Delete Subfolders and Files, and Delete entries in this table. The Delete Subfolders and Files permission grants the user permission to delete subfolders and files, even if the Delete permission is not granted on the subfolder or file. The Delete Subfolders and Files permission applies only to folders. The Delete permission grants the user permission to delete the file or folder. If you have not been assigned Delete permission on a file or folder, you can still delete the file or folder if you are granted Delete Subfolders and Files permissions on the parent folder. Read Permissions grants the user permission to read permissions about the file or folder, such as Full Control, Read, and Write. Change Permissions grants the user permission to change permissions on the file or folder, such as Full Control, Read, and Write. The Take Ownership permission grants the user permission to take ownership of the file or folder. The owner of a file or folder can change permissions on it, regardless of any existing permissions that protect the file or folder.
Write Attributes
Delete
Take Ownership
Description The Synchronize permission assigns different threads to wait on the handle for the file or folder, and then synchronize with another thread that may signal it. This permission applies only to multiple-threaded, multiple-process programs.
Note: Standard permissions are combinations of several permissions, individual Advanced permissions that are grouped into commonly file and folder usage scenarios.
Therefore, taking these rules into account, NTFS permissions will apply in the following order: 1. 2. 3. 4. Explicit Deny Explicit Allow Inherited Deny Inherited Allow
It is important to remember that NTFS permissions are cumulative, and these rules apply only when two NTFS permission settings conflict with each other.
3.
Note: When sharing a folder, you will be asked to give the shared folder a name. This name does not have to be the same name as the actual folder; it can be a descriptive name that better describes the folder contents to network users.
Administrative Shares
You can create administrative (or hidden) shared folders that need to be available from the network, but should be hidden from users browsing the network. You can access an administrative shared folder by typing in its UNC path, but the folder will not display if you browse the server by using a Windows Explorer window. Administrative shared folders also typically have a more restrictive set of permissions assigned to the shared folder to reflect the administrative nature of the folders contents.
To hide a shared folder, append the dollar symbol ($) to the folders name. For example, a shared folder on LON-SVR1 named Sales can be made into a hidden shared folder by naming it Sales$. The shared folder is accessible over the network by using the UNC path \\LON-SVR1\Sales$. Note: Shared folder permissions apply only to users who access the folder over the network. They do not affect users who access the folder locally on the computer where the folder is stored.
Change
Full Control
Note: When you assign Full Control permissions on a shared folder to a user, that user can modify permissions on the shared folder, which includes removing all users (including administrators), from the shared folders permissions list. In most cases, you should grant Change Permission instead of Full Control permission.
Permissions Inheritance
By default, NTFS and shared folders use inheritance to propagate permissions throughout a folder structure. When you create a file or a folder, it is automatically assigned the permissions that are set on any folders that exist above it (parent folders) in the hierarchy of the folder structure.
In this example, Adam is a member of two groups that are assigned permissions for files or folders within the folder structure. They are as follows: The top-level folder, Marketing, has an assigned permission for the Marketing Group giving them Read access. In the next level, the Marketing Pictures folder has no explicit permissions set, but because of permissions inheritance Adam has Read access to this folder and its contents from the permissions that are set on the Marketing folder. In the third level, the New York folder has Write permissions assigned to one of Adams groupsNew York Editors. In addition to this explicitly assigned Write permission, the New York folder also inherits the Read permission from the Marketing folder. These permissions pass down to file and folder objects, cumulating with any explicit Read and Write permissions set on those files. The fourth and last level is the Fall_Composite.jpg file. Even though no explicit permissions have been set for this file, Adam has both Read and Write access to the file due to the inherited permissions from both the Marketing folder and the New York folder.
Permission Conflicts
Sometimes, explicitly set permissions on a file or folder will conflict with permissions inherited from a parent folder. In these cases, the explicitly assigned permissions always override the inherited permissions. In the given example, if Adam Carter was denied Write access to the parent Marketing folder, but then explicitly granted Write access to the New York folder, the granted Write access permissions would take precedence over the inherited deny Write access permission.
Blocking Inheritance
You can also disable the inheritance behavior for a file or a folder (and its contents) on an NTFS drive to explicitly define permissions for a set of objects without including any of the inherited permissions from any parent folders. Windows Server 2012 provides an option for blocking inheritance on a file or a folder.
To block inheritance on a file or folder, complete the following steps: Right-click the file or folder where you want to block inheritance, and then click Properties. In the Properties window, click the Security tab, and then click the Advanced button. In the Advanced Security Settings window, click the Change Permissions button. In the next Advanced Security Settings window, click the Disable inheritance button.
At this point, you are prompted to either convert the inherited permissions into explicit permissions or remove all inherited permissions from the object to start with a blank permissions slate.
Effective Permissions
Access to a file or folder in Windows Server 2012 is granted based on a combination of permissions. When a user attempts to access a file or folder, the permission that applies is dependent on various factors, including: Explicitly defined and inherited permissions that apply to the user. Explicitly defined and inherited permissions that apply to the groups to which the user belongs. How the user is accessing the file or folders: locally, or over the network.
Effective NTFS permissions are the cumulative permissions that are assigned to a user for a file of folder based on the factors listed above. The following principles determine effective NTFS permissions: Cumulative permissions are the combination of the highest NTFS permissions granted to the user and to all the groups of which the user is a member. For example, if a user is a member of a group that has Read permission and is a member of a group that has Modify permission, the user is assigned cumulative Modify permissions. Deny permissions override equivalent Allow permissions. However, an explicit Allow permission can override an inherited Deny permission. For example, if a user is denied Write access to a folder via an inherited Deny permission, but is explicitly granted Write access to a subfolder or a particular file, the explicit Allow overrides the inherited Deny for the particular subfolder or file. You can apply permissions to a user or to a group. Assigning permissions to groups is preferred because they are more efficient than managing permissions that are set for many individuals.
NTFS file permissions take priority over folder permissions. For example, if a user has Read permission to a folder, but has been granted Modify permission to certain files in that folder, the effective permission for those files will be set to Modify. Every object in an NTFS drive or in Active Directory Domain Services (AD DS) is owned. The owner controls how permissions are set on the object and to whom permissions are granted. For example, a user who creates a file in a folder where they have Modify permissions can change the permissions on the file to Full Control.
The user must have appropriate permissions on both the NTFS file or folder and the shared folder. If no permissions exist for the user (either as an individual or as the member of a group) on either resource, access is denied.
To exclude one specific permission when you have granted Full Control permissions to a user or a group
Never deny the Everyone group access to an object. If you deny the Everyone group access to an object, you deny Administrators accessincluding yourself. Instead, remove the Everyone group from the permissions list, as long as you grant permissions for the object to other users, groups, or computers. Grant permissions to an object that is as high in the folder structure as possible, so that the security settings are propagated throughout the tree. For example, instead of bringing groups representing all departments of the company together into a Read folder, assign Domain Users (which is a default group for all user accounts on the domain) to the share. In this manner, you eliminate the need to update department groups before new users receive the shared folder. Use NTFS permissions instead of shared permissions for fine-grained access. Configuring both NTFS and shared folder permissions can be difficult. Consider assigning the most restrictive permissions for a group that contains many users at the shared folder level, and then use NTFS permissions to assign permissions that are more specific.
When the Enable access-based enumeration check box is selected, access-based enumeration is enabled on the shared folder. This setting is unique to each shared folder on the server. Note: The File and Storage Services console is the only place in the Windows Server 2012 interface where you can configure access-based enumeration for a shared folder. Access-based enumeration is not available in any of the properties dialog boxes that are accessible by right-clicking the shared folder in Windows Explorer.
With Windows Server 2012, you view the Offline Settings window for a shared folder by clicking the Caching button in the Advanced Sharing window. The following options are available within the Offline Settings window: Only the files and programs that users specify are available offline. This is the default option when you set up a shared folder. When you use this option, no files or programs are available offline by default, and users control which files and programs they want to access when they are not connected to the network. Alternatively, you can choose the Enable BranchCache option. This option enables computers that are accessing the files to cache files downloaded from the folder using Windows BranchCache. You must install and configure BranchCache on the Windows Server 2012 server to select this option. No files or programs from the shared folder are available offline. This option blocks client computers from making copies of the files and programs on the shared folder. All files and programs that users open from the shared folder are automatically available offline. Whenever a user accesses the shared folder or drive and opens a file or program in it, that file or program is made automatically available offline to that user. Files and programs that are made automatically available offline remain in the offline files cache and synchronize with the version on the server until the cache is full or the user deletes the files. Files and programs that are not opened are not available offline. Optimized for performance. If you select the Optimized for performance check box, executable files (.exe, .dll) that are run from the shared folder by a client computer are cached on that client computer automatically. The next time the client computer runs the executable files, it will access its local cache instead of the shared folder on the server.
Note: The Offline Files feature must be enabled on the client computer for files and programs to be cached automatically. In addition, the Optimized for performance option does not have any effect on client computers that use Windows Vista or older Windows operating systems, because these operating systems perform the program-level caching automatically, as specified by this option.
Demonstration Steps
Create a shared folder 1. 2. 3. Sign in to LON-SVR1 as Adatum\Administrator with a password of Pa$$w0rd. On drive E, create a folder named Data. Share the Data folder.
Assign permissions for the shared folder Grant the Authenticated Users Change permissions for \\LON-SVR1\Data.
Configure access-based enumeration 1. 2. 3. Open Server Manager. Navigate to the Share pane in the File and Storage Services management console. Open the Data Properties dialog box for \\LON-SVR1\Data, and enable access-based enumeration.
Configure offline files 1. 2. 3. Open the Data Properties dialog box for E:\Data. Navigate to the Sharing tab, and open the Advanced Sharing settings. Open the Caching settings, and then disable offline files. Note: Leave all virtual machines in their current state for the subsequent demonstration.
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe shadow copies. Describe considerations for scheduling shadow copies. Identify methods for restoring data from shadow copies. Restore data from a shadow copy.
Demonstration Steps
Configure shadow copies 1. 2. On LON-SVR1, open Windows Explorer. Enable Shadow Copies for Local Disk (C:).
Create a new file 1. 2. 3. 4. Open Windows Explorer. Create a folder on drive C named Data. Create a text file named TestFile.txt in the Data folder. Change the contents of TestFile.txt by adding and saving the text Version 1.
Create a shadow copy 1. 2. 3. In Windows Explorer, right-click Local Disk (C:), and then click Configure Shadow Copies. In the Shadow Copies window, click Create Now. When the shadow copy is complete, click OK.
Modify the file 1. 2. 3. In Windows Explorer, double-click TestFile.txt to open the document. In Notepad, type Version 2. Close Notepad, and click Save to save the changes.
Restore the previous version 1. 2. 3. 4. In Windows Explorer, right-click TestFile.txt, and then click Restore previous versions. Restore the most recent version. In the warning window, click Restore. Open TestFile.txt to open the document, and verify that the previous version is restored. Note: Leave all virtual machines in their current state for the subsequent demonstration.
Lesson 3
Lesson Objectives
After completing the lesson, you will be able to: Identify the benefits of network printing. Describe Enhanced Point and Print. Identify security options for network printing. Create multiple configurations for a print device. Describe printer pooling. Describe Branch Office Direct Printing. Identify methods for deploying printers to clients.
Users can search for printers easily. You can also publish network printers in AD DS, which allows users to search for printers in their domain.
With Enhanced Point and Print, the print device drivers no longer need to be maintained on the print server. Driver installation for network print devices becomes faster because printer drivers no longer need to be transferred over the network from server to client. If the driver store on the client machine does not contain a driver for the network printer that is being installed, and if an appropriate driver cannot be obtained from Windows Update or Windows Server Update Services, Windows uses a fallback mechanism to enable cross-platform printing using the print driver from the print server.
Demonstration Steps
Create a shared printer 1. 2. Open the Devices and Printer window. Add a printer using the LPT1 local port, and the Brother Color Leg Type1 Class driver.
3. 4.
Name the printer AllUsers. Share the printer using the default settings.
Create a second shared printer using the same port 1. 2. 3. 4. Open the Devices and Printer window. Add a printer using the LPT1 local port, and the Brother Color Leg Type1 Class driver. Name the printer Executives. Share the printer using the default settings.
Increase printing priority for a high priority print queue 1. 2. Open the Executives Printer properties window. Increase the Priority to 10.
To configure Branch Office Direct Printing using Windows PowerShell, type the following cmdlet at a Windows PowerShell prompt:
Set-Printer -name "<Printer Name Here>" -ComputerName <Print Server Name Here> -RenderingMode BranchOffice
computer account, and can be targeted by group. For Windows XP computers, you must install the Group Policy Preference Client Extension. GPO created by Print Management. The Print Management administrative tool can add printers to a GPO for distribution to client computers based on either a user account or a computer account. Windows XP computers must be configured to run PushPrinterConnections.exe. Manual installation. Each user can add printers manually by either browsing the network or using the Add Printer Wizard. It is important to note that network printers that are installed manually are available only to the user that installed them. If multiple users share a computer, they must each install the printer manually.
Objectives
After performing this lab you will be able to: Create and configure a file share. Configure shadow copies. Create and configure a printer pool.
Lab Setup
Estimated Time: 45 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410B-LON-DC1 and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: 5. User name: Administrator Password: Pa$$w0rd Domain: Adatum
Repeat steps 2 to 4 for 20410B-LON-SVR1. Repeat steps 2-3 for 20410B-LON-CL1. Do not sign in to LON-CL1 until directed to do so.
The main tasks for this exercise are as follows: 1. 2. 3. 4. 5. 6. 7. Create the folder structure for the new share. Configure NTFS permissions on the folder structure. Create the shared folder. Test access to the shared folder. Enable access-based enumeration. Test access to the share. Disable Offline Files for the share.
Note: Bernard should have access to the Development folder. However, although Bernard can still see the other folders, he does not have access to their contents. 5. Sign out of LON-CL1.
Note: Bernard can now view only the Development folder, the folder for which he has been assigned permissions. 3. 4. Open the Development folder to confirm access. Sign out of LON-CL1.
Results: After finishing this exercise, you will have created a new shared folder for use by multiple departments.
Results: After finishing this exercise, you will have enabled shadow copies on the file server.
Share the printer. List the printer in AD DS. Enable Branch Office Direct Printing.
Open the Branch Office Printer Properties page, and on the Ports tab, enable printer pooling. Select port 172.16.0.201 as the second port.
Results: After finishing this exercise, you will have installed the Print and Document Services server role and installed a printer with printer pooling. Question: How does implementing access-based enumeration benefit the users of the Data shared folder in this lab? Question: Is there another way you could recover the file in the shadow copy exercise? What benefit do shadow copies provide in comparison? Question: In Exercise 3, how could you configure Branch Office Direct Printing if you were in a remote location and did not have access to the Windows Server 2012 GUI for the print server?
Tools
Name of tool Effective Permissions Tool Used for Assessing combined permissions for a file, folder, or shared folder. Where to find it Under Advanced, on the Security tab of the Properties dialog box of a file, folder or shared folder. Command Prompt window. The Tools menu in Server Manager.
Configuring Windows Server 2012 networking components. Managing the print environment in Windows Server 2012.
11-1
Module 11
Implementing Group Policy
Contents:
Module Overview Lesson 1: Overview of Group Policy Lesson 2: Group Policy Processing Lesson 3: Implementing a Central Store for Administrative Templates Lab: Implementing Group Policy Module Review and Takeaways 11-1 11-2 11-10 11-16 11-20 11-24
Module Overview
Maintaining a consistent computing environment across an organization is challenging. Administrators need a mechanism to configure and enforce user and computer settings and restrictions. Group Policy can provide that consistency by enabling administrators to centrally manage and apply configuration settings. This module provides an overview of Group Policy and provides details about how to implement GPOs.
Objectives
After completing this module, you will be able to: Create and manage Group Policy Objects. Describe Group Policy processing. Implement a central store for administrative templates.
Lesson 1
Lesson Objectives
After completing this lesson, you will be able to: Describe the components of Group Policy. Describe multiple local GPOs. Describe storage options for domain GPOs. Describe GPO policies and preferences. Describe starter GPOs. Describe the process of delegating GPO management. Describe the process of creating and managing GPOs.
GPOs
A GPO is an object that contains one or more policy settings that apply configuration setting for users, computers, or both. GPOs are stored in SYSVOL, and can be managed by using the Group Policy Management Console (GPMC). Within the GPMC, you can open and edit a GPO by using the Group Policy Management Editor. GPOs are logically linked to Active Directory containers to apply settings to the objects in those containers.
Most policy settings have three states: Not Configured. The GPO will not modify the existing configuration of the particular setting for the user or computer. Enabled. The policy setting will be applied. Disabled. The policy setting is specifically reversed.
By default, most settings are set to Not Configured. Note: Some settings are multi-valued or have text string values. These are typically used to provide specific configuration details to applications or operating system components. For example, a setting might provide the URL of the home page for Windows Internet Explorer or for blocked applications. The effects of the configuration change depends on the policy setting. For example, if you enable the Prohibit Access to Control Panel policy setting, users will be unable to open Control Panel. If you disable the policy setting, you ensure that users can open Control Panel. Notice the double negative in this policy setting: You disable a policy that prevents an action, thereby allowing the action.
User and computer settings each have three areas of configuration, as described in the following table. Section Software settings Description Contain software settings that can be deployed to either the user or the computer. Software that is deployed to a user is specific to that user. Software that is deployed to the computer is available to all users of that computer. Contain script settings and security settings for both user and computer, and Internet Explorer maintenance for the user configuration. Contain hundreds of settings that modify the registry to control various aspects of the user and computer environment. New administrative templates might be created by Microsoft or other vendors. You can add these new templates to the GPMC. For example, Microsoft has Office 2010 templates that are available for download, and that you can add to the GPMC.
Note: The exception to this feature is domain controllers. Due to the nature of their role, domain controllers cannot have local GPOs.
With the exception of the categories of Administrator or Non-Administrator, it is not possible to apply local GPOs to groups, but only to individual local user accounts. Domain users are subject to the local Group Policy, or the Administrator or Non-Administrator settings, as appropriate.
Note: Domain administrators can disable processing local GPOs on clients that are running Windows client operating systems and Windows Server operating systems by enabling the Turn Off Local Group Policy Objects Processing policy setting in a domain GPO.
Characteristics of Preferences
Preferences have the following characteristics: Preferences exist for both computers and users. Unlike Group Policy settings, preferences are not enforced, and users can change the configurations that are established by preferences. Preferences can be managed through the Remote Server Administration Tool (RSAT). Preferences can be applied only once at startup or logon, or refreshed at intervals. Unlike Group Policy settings, preferences are not removed when the GPO is no longer applied, but you can change this behavior. Preferences can easily be targeted to certain users or computers through a variety of ways, such as security group membership or operating system version. Preferences are not available for local GPOs. Unlike Group Policy, the user interface of the setting is not disabled.
Available Settings
Starter GPOs can only contain settings from the Administrative Templates node of either the User Configuration section or the Computer Configuration section. The Software Settings and Windows Settings nodes of Group Policy are not available, because these nodes involve interaction of services and are more complex and domain-dependent.
The following Group Policy tasks can be delegated independently: Creating GPOs Editing GPOs Managing Group Policy links for a site, domain, or OU Performing Group Policy modeling analysis Reading Group Policy results data Creating WMI filters
The Group Policy Creator Owners group lets its members create new GPOs, and edit or delete GPOs that they have created.
The Authenticated User group has Read and Apply Group Policy permissions only.
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe a GPO link. Explain how to apply GPOs to containers and objects. Describe the Group Policy processing order. Describe the default GPOs. Describe GPO security filtering.
GPO Links
Once you have created a GPO and defined all the settings that you want it to deliver, the next step is to link the policy to an Active Directory container. A GPO link is the logical connection of the policy to a container. You can link a single GPO to multiple containers by using the GPMC. You can link GPOs to the following types of containers: Sites Domains OUs
Once a GPO is linked to a container, by default the policy is applied to all the objects in the container, and subsequently all the child containers under that parent object. This is because the default permissions of the GPO are such that Authenticated Users have Read and Apply Group Policy permission. You can modify this behavior by managing permissions on the GPO. You can disable links to containers, which removes the configuration settings. You can also delete links. Deleting links does not delete the actual GPO, only the logical connection to the container. GPOs cannot be linked directly to users, groups, or computers. In addition, GPOs cannot be linked to the system containers in AD DS, including Builtin, Computers, Users, or Managed Service Accounts. The AD DS system containers receive Group Policy settings from GPOs that are linked to the domain level only.
Applying GPOs
Computer configuration settings are applied at startup, and then are refreshed at regular intervals. Any startup scripts are run at computer startup. The default interval is every 90 minutes, but this is configurable. The exception to the set interval is domain controllers, which have their settings refreshed every five minutes. User settings are applied at logon and are refreshed at regular, configurable intervals; the default is also 90 minutes. Any logon scripts are run at logon. Note: A number of user settings require two logons before the user sees the effect of the GPO. This is because users logging on to the same computer use cached credentials to speed up logons. This means that, although the policy settings are being delivered to the computer, the user is already logged on and thus the settings will not take effect until the next logon. The folder redirection setting is an example of this. You can change the refresh interval by configuring a Group Policy setting. For computer settings, the refresh interval setting is found in the Computer Configuration\Policies\Administrative Templates \System\Group Policy node. For user settings, the refresh interval is found at the corresponding settings under User Configuration. An exception to the refresh interval is security settings. The security settings section of the Group Policy will be refreshed at least every 16 hours, regardless of the interval that you set for the refresh interval. You can also refresh Group Policy manually. The command line utility Gpupdate refreshes and delivers any new Group Policy configurations. The Gpupdate /force command refreshes all the Group Policy settings. There is also a new Windows PowerShell Invoke-Gpupdate cmdlet, which performs the same function. A new feature in Windows Server 2012 is Remote Policy Refresh. This feature allows administrators to use the GPMC to target an OU and force Group Policy refresh on all of its computers and their currently logged-on users. To do this, you right-click any OU, and then click Group Policy Update. The update occurs within 10 minutes.
2. 3. 4.
Site GPOs. Policies that are linked to sites are processed next. Domain GPOs. Policies that are linked to the domain are processed next. There are often multiple polices at the domain level. These policies are processed in order of preference. OU GPOs. Policies linked to OUs are processed next. These policies contain settings that are unique to the objects in that OU. For example, the Sales users might have special required settings. You can link a policy to the Sales OU to deliver those settings. Child OU policies. Any policies that are linked to child OUs are processed last.
5.
Objects in the containers receive the cumulative effect of all polices in their processing order. In the case of a conflict between settings, the last policy applied takes effect. For example, a domain-level policy might restrict access to registry editing tools, but you could configure an OU-level policy and link it to the IT OU to reverse that policy. Because the OU-level policy is applied later in the process, access to registry tools would be available. Note: Other methods such as Enforcement and Inheritance Blocking can change the effect of policies on containers. If multiple policies are applied at the same level, the administrator can assign a preference value to control the order of processing. The default preference order is the order in which the policies were linked. You can also disable the user or computer configuration of a particular GPO. If one section of a policy is known to be empty, then you should disable the empty section to speed up policy processing. For example, if you have a policy that only delivers user desktop configuration, you could disable the computer-side of the policy.
Scenario
The following illustration represents a portion of the A. Datum Corporations AD DS structure, which contains the Sales OU with its child OUs and the Servers OU. GPO1 is linked to the Adatum domain container. The GPO configures power options that turn off the monitors and disks after 30 minutes of inactivity, and restricts access to registry editing tools. GPO2 has settings to lock down the desktops of the Sales Users OU, and configure printers for Sales Users. GPO3 configures power options for laptops in the Sales Laptops OU. GPO4 configures a different set of power options to ensure that the servers never go into power save mode.
Some users in the Sales OU have administrative rights on their computers, and have created local policies to specifically grant access to Control Panel.
Discussion Questions
Based on this scenario, answer the following questions: Question: What power options will the servers in the Servers OU receive? Question: What power options will the laptops in the Sales Laptops OU receive? Question: What power options will all other computers in the domain receive? Question: Will users in the Sales Users OU who have created local policies to grant access to Control Panel be able to access Control Panel? Question: If you needed to grant access to Control Panel to some users, how would you do it? Question: Can GPO2 be applied to other department OUs?
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe the central store. Describe administrative templates. Describe how administrative templates work. Describe managed and unmanaged policy settings.
ADMX and ADML files are stored in the %SystemRoot%\PolicyDefinitions folder. You can also create your own custom administrative templates in XML format. Administrative templates that control Microsoft Office products (such as Office Word, Office Excel and Office PowerPoint) are also available from the Microsoft download website. Administrative templates have the following characteristics: They are organized into subfolders that house configuration options for specific areas of the environment, such as network, system, and Windows components. The settings in the Computer section edit the HKEY_LOCAL_MACHINE registry hive, and settings in the User section edit the HKEY_CURRENT_USER registry hive. Some settings exist for both User and Computer. For example, there is a setting to prevent Windows Messenger from running in both the User and the Computer templates. In case of conflicting settings, the Computer setting prevails. Some settings are available only to certain versions of Windows operating systems, such as several new settings that can be applied only to the Windows 7 and newer operating systems versions. Double-clicking the settings will display the supported versions for that setting. Any setting that cannot be processed by an older Windows operating system is simply ignored by that system.
ADM Files
Prior to Windows Vista, administrative templates had an .adm file extension (ADM). ADM files were language-specific, and were difficult to customize. ADM files are stored in SYSVOL as part of the Group Policy template. If an ADM file is used in multiple GPOs, then the file is stored multiple times. This increases the size of SYSVOL, and therefore increases the size of Active Directory replication traffic.
The Administrative Templates node is organized as shown in the following table. Section Computer settings Nodes Control Panel Network Printers System Windows Components All Settings User settings Control Panel Desktop Network Shared Folders Start Menu and Taskbar System Windows Components All Settings Most of the nodes contain multiple subfolders to further organize settings into logical groupings. Even with this organization, finding the setting that you need might be a daunting task. To help you locate settings, in the All Settings folder you can filter the entire list of settings in either the computer or the user section. The following filter options are available: Managed or unmanaged Configured or not configured Commented By keyword By platform
You can also combine multiple criteria. For example, you could filter to find all the configured settings that apply to Internet Explorer 10 by using the keyword ActiveX.
Changes made by a Group Policy setting and the UI lockout are released if the user or computer falls out of scope of the GPO. For example, if you delete a GPO, managed policy settings that had been applied to a user will be released. This means that, generally, the setting resets to its previous state. Additionally, the UI interface for the setting is enabled.
Objectives
After completing this lab, you will be able to: Configure a Central Store. Create GPOs.
Lab Setup
Estimated Time: 40 minutes
Virtual machines
Repeat steps 2 and 3 for 20410B-LON-CL1. Do not sign in until directed to do so.
Task 1: View the location of administrative templates in a Group Policy Object (GPO)
1. 2. 3. Sign in to LON-DC1 as Administrator with a password of Pa$$w0rd. Start the GPMC. In the Group Policy Object folder, open the Default Domain Policy and view the location of the administrative templates.
Results: After completing this exercise, you should have configured a Central Store.
The main tasks for this exercise are as follows: 1. 2. 3. 4. 5. 6. 7. Create a Windows Internet Explorer Restriction default starter GPO. Configure the Internet Explorer Restriction starter GPO. Create an Internet Explorer Restrictions GPO from the Internet Explorer Restrictions starter GPO. Test the GPO for Domain Users. Use security filtering to exempt the IT Department from the Internet Explorer Restrictions policy. Test the GPO application for IT department users. Test Application of the GPO for other domain users.
Hint: Select All Settings in Administrative Templates and filter for an exact match by the keywords General Page.
Task 3: Create an Internet Explorer Restrictions GPO from the Internet Explorer Restrictions starter GPO
Create a new GPO named IE Restrictions that is based on the Internet Explorer Restrictions starter GPO, and link it to the Adatum.com domain.
Task 5: Use security filtering to exempt the IT Department from the Internet Explorer Restrictions policy
1. 2. On LON-DC1, open GPMC. Configure security filtering on the Internet Explorer Restrictions policy to deny access to the IT department.
Results: After completing this lab, you should have created a GPO.
Tools
Tool Group Policy Management Console (GPMC) Group Policy Object Editor Resulting Set of Policies (RSoP) Group Policy Modeling Wizard Use Controls all aspects of Group Policy Configure settings in GPOs Determine what settings are applying to a user or computer Test what would occur if settings were applied to users or computers, prior to actually applying the settings Configure Group Policy settings that apply only to the local computer Where to find it In Server Manager, on the Tools menu Accessed by editing any GPO In the GPMC
In the GPMC
Accessed by creating a new Microsoft Management Console (MMC) on the local computer, and adding the Group Policy Object Editor snap-in
Best Practices
The following are recommended best practices: Do not use the Default Domain and Default Domain Controllers policies for other uses. Instead, create new policies. Limit the use of security filtering and other mechanisms that make diagnostics more complex. Disable the User or Computer sections of policies if they have no settings configured. If you have multiple administration workstations, create a Central Store. Add comments to your GPOs to explain what the policies are doing. Design your OU structure to support Group Policy application.
12-1
Module 12
Securing Windows Servers Using Group Policy Objects
Contents:
Module Overview Lesson 1: Windows Operating Systems Security Overview Lesson 2: Configuring Security Settings Lab A: Increasing Security for Server Resources Lesson 3: Restricting Software Lesson 4: Configuring Windows Firewall with Advanced Security Lab B: Configuring AppLocker and Windows Firewall Module Review and Takeaways 12-1 12-2 12-6 12-15 12-22 12-26 12-30 12-36
Module Overview
Protecting IT infrastructure has always been a priority for organizations. Many security risks threaten companies and their critical data. When companies fail to have adequate security policies, they can lose data, experience server unavailability, and lose credibility. To protect against security threats, companies must have well-designed security policies that include many organizational and IT-related components. Security policies must be evaluated on a regular basis because as security threats evolve, so must IT evolve. Before you begin designing security policies to help protect your organizations data, services, and IT infrastructure, you must learn how to identify security threats, plan your strategy to mitigate security threats, and secure your Windows Server 2012 infrastructure.
Objectives
After completing this module, you will be able to: Describe Windows Server operating system security. Configure security settings by using Group Policy. Restrict unauthorized software from running on servers and clients. Configure Windows Firewall with Advanced Security.
Lesson 1
Lesson Objectives
After completing this lesson, you will be able to: Identify security risks for Windows Server 2012 and the costs associated with them. Apply the defense-in-depth model to increase security. Describe best practices for increasing Windows Server 2012 security.
Physical Security
If any unauthorized person can gain physical access to a computer on your network, then most other security measures are not useful. You must ensure that computers containing the most sensitive data (such as servers) are physically secure, and that access is granted only to authorized personnel.
Perimeter
These days, no organization is an isolated enterprise. Organizations operate within the Internet, and many organizational network resources are available from the Internet. This might include a website that describes your organizations services, or internal services that you make available externallysuch as web conferencing and emailso that users can work from home or from branch offices. Perimeter networks mark the boundary between public and private networks. Providing reverse proxy servers in the perimeter network enables you to provide more secure corporate services across the public network. Many organizations implement network access quarantine control, where computers that connect to the corporate network are checked for different security criteria, such as whether the computer has the latest security updates, antivirus updates, and other company-recommended security settings. If these criteria are met, the computer is allowed to connect to corporate network. If not, the computer is placed in an isolated network, called a quarantine, with no access to corporate resources. Once the computer has its security settings remediated, it is removed from the quarantine network and is allowed to connect to corporate resources. Note: A reverse proxy, such as Microsoft Forefront Threat Management Gateway 2010 (Forefront TMG), enables you to publish services such as email or web services, from the corporate intranet without placing the email or web servers in the perimeter or exposing them to external users. Forefront TMG acts as both reverse proxy and as a firewall solution.
Networks
Once you connect your computers to a network (either internal or public), they are susceptible to a number of threats including eavesdropping, spoofing, denial of service, and replay attacks. By implementing Internet Protocol Security (IPsec), you can encrypt network traffic and protect data while in transfer between computers. When communication takes place over public networks, such as by employees who are working from home or from remote offices, as a best practice they should connect to a firewall solution such as Forefront TMG 2010 to protect from different types of network threats.
Data Security
The final layer of security is data security. To help ensure the protection of your network, you should: Ensure the proper use of file user permissions by using Access Control Lists (ACLs). Implement the encryption of confidential data with Encryption File System (EFS). Perform regular data backups. Additional Reading: For the latest Microsoft security bulletin and advisory information, see Security for IT Pros at http://go.microsoft.com/fwlink/?LinkID=266741. For more information about common types of network attacks, see http://go.microsoft.com/fwlink/?LinkID=266742. Question: How many layers of the defense-in-depth model should you implement in your organization?
Additional Reading: For more information about best practices for enterprise security, see http://go.microsoft.com/fwlink/?LinkID=266743.
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe how to configure security templates. Describe what user rights are, and how to configure them. Describe how to configure Security Options. Describe how to configure User Account Control. Describe how to configure Security Auditing. Describe how to configure Restricted Groups. Describe how to configure Account Policy Settings.
Additional Reading: Click the following link to search for a detailed list of Group Policy settings: http://go.microsoft.com/fwlink/?LinkID=266744.
Registry. Permissions for registry keys File System. Permissions for folders and files
When you configure a security template, you can use it to configure a single computer or to configure multiple computers on the network. The following are a few ways that you can configure and distribute security templates: Secedit.exe. The secedit.exe command-line tool configures and analyzes system security by comparing the current configuration of a computer running Windows Server 2012 to specified security templates. Security Templates snap-in. The Security Templates snap-in is a snap-in that you can use to create a security policy by using security templates. Security Configuration and Analysis Wizard. This wizard is a tool you can use to analyze and configure computer security. Group Policy. Group Policy is a technology you can use to analyze and configure computer settings, including distribution of specific security settings. Security Compliance Manager. The Security Compliance Manager is a tool that provides centralized security baseline management features and security baseline export functionality.
You can configure rights through Group Policy. Initially, the default domain policy has no user rights defined. You can configure settings for User Rights by accessing Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment from the Group Policy Management Console (GPMC). Some examples of commonly used user rights (and policies configured by them) are: Add workstations to domain. Determines which users or groups can add workstations to the domain. Allow log on locally. Determines which users can log on the computer. Allow log on through Remote Desktop Services. Determines which users or groups have permission to log on as Remote Desktop Services Client.
Back up files and directories. Determines which users have permissions to back up files and folders on a computer. Change the system time. Determines which users or groups have the rights to change the time and date on the internal clock of the computer. Force shutdown from a remote system. Determines which users are allowed to shut down a computer from a remote location on the network. Shut down the system. Determines which of the users who are locally logged on to a computer are allowed to shut down the computer.
You can also configure settings for Security Options by accessing the following location from the GPMC: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options. The following are examples of commonly used Security Options: Prompt user to change password before expiration. Determines how many days prior to a users password expiring that the operating system provides a warning. Interactive logon: Do not display last user name. Determines whether the name of the last user to log on to the computer displays in the Windows logon window. Accounts: Rename administrator account. Determines whether a different account name is associated with the security identifier (SID) for the account Administrator. Devices: Restrict CD-ROM access to locally logged-on user only. Determines whether a CD-ROM is accessible to both local and remote users simultaneously.
Note: In Windows Server 2012, the built-in Administrator account does not run in Admin Approval Mode. The result is that no UAC prompts display when using the local Administrator account. If the user is not an administrator, then a username and password for an account that has administrative permissions needs to be entered. Providing administrative credentials temporarily gives the user administrative privileges, but only to complete the current task. After the task is complete, permissions change back to those of a standard user.
When using this process of notification and elevation to administrator account privileges, changes cannot be made to the computer without the user knowing, because a prompt asks the user for permission or for administrator credentials. This can help prevent malicious software (malware) and spyware from being installed on or making changes to a computer. UAC allows the following system-level changes to occur without prompting, even when a user is logged on as a local user: Install updates from Windows Update Install drivers from Windows Update or those that are packaged with the operating system View Windows operating system settings Pair Bluetooth devices with the computer Reset the network adapter, and perform other network diagnostic and repair tasks
Note: By default, UAC is not configured or enabled in Server Core installations of Windows Server 2012.
You can configure Security Auditing settings by accessing the following location from the GPMC: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy. The following are examples of some GPO settings that you can configure for auditing: Audit account logon events. Determines whether the operating system audits each time the computer validates an accounts credentials. Audit accounting management. Determines whether to audit each event of account management, such as creating, changing, renaming, or deleting a user account, changing a password, or enabling or disabling a user account. Audit object access. Determines whether operating system audits have access to non-Active Directory objects, such as folders or files. Before configuring audit settings with Group Policy, you must configure system access control lists (SACLs) on folders or files to allow auditing for a specific type of action, such as write, read, or modify. Audit system events. Determines whether the operating system audits system-related events, such as attempting to change the system time, attempting a system startup or shutdown, or the security log size exceeding a configurable threshold warning.
Additional Reading: For more information about security auditing, see Whats New in Security Auditing at http://go.microsoft.com/fwlink/?LinkID=266747.
Account Policies
Account policy components include password policies, account lockout policies, and Kerberos Policy. The policy settings under Account policies are implemented at the domain level. A Windows Server 2012 domain can have multiple password and account lockout policies, which are called fine-grained password policies. You can apply these multiple policies to a user or to a global security group in a domain, but not to an OU. Note: If you need to apply a fine-grained password policy to users of an OU, you can use a shadow group, which is a global security group that is logically mapped to an OU. You can configure Account policy settings by accessing the following location from the GPMC: Computer Configuration\Policies\Windows Settings\Security Settings\Account Policies.
Password Policy
Password policies that you can configure are listed in the following table. Policy Password must meet complexity requirements Function Requires passwords to: o o Be at least six characters long. Contain a combination of at least three of the following types of characters: uppercase letters, lowercase letters, numbers, and symbols (punctuation marks). Must not contain the users user name or screen name. Best practice Enable this setting. These complexity requirements can help ensure a strong password. Strong passwords are more difficult to decrypt than those containing simple letters or numbers.
Function Prevents users from creating a new password that is the same as their current password or a recently used password. To specify how many passwords are remembered, provide a value. For example, a value of 1 means that only the last password will be remembered, and a value of 5 means that the previous five passwords will be remembered. Sets the maximum number of days that a password is valid. After this number of days, the user will have to change the password.
Best practice The greater number ensures better security. The default value is 24. Enforcing password history ensures that passwords that have been compromised are not used repeatedly.
The default value is 42 days, but it but best practice is to set it at 90 days. Setting the number of days too high provides hackers with an extended window of opportunity to determine the password. Setting the number of days too low frustrates users who have to change their passwords too frequently, and could result in more frequent calls to the IT help desk. Set the minimum password age to at least 1 day. By doing so, you require that the user can only change their password once a day. This will help enforce other settings. For example, if the past five passwords are remembered, this will ensure that at least five days must pass before the user can reuse the original password. If the minimum password age is set to 0, the user can change their password six times on the same day and begin reusing the original password on the same day. Set the length to between 8 and 12 characters (provided that they also meet complexity requirements). A longer password is more difficult to crack than a shorter password, assuming the password is not a word or a common phrase. Do not use this setting unless you use a program that requires it. Enabling this setting decreases the security of stored passwords.
Sets the minimum number of days that must pass before a password can be changed.
Provides support for applications that require knowledge of a user password for authentication purposes.
After the threshold has been reached and the account is locked out, the account should remain locked long enough to block or deter any potential attacks, but short enough not to interfere with productivity of legitimate users. A duration of 30 to 90 minutes should work well in most situations. Using a timeframe between 30 and 60 minutes is usually sufficient to deter automated attacks and manual attempts by an attacker to guess a password.
Defines a timeframe for counting the incorrect login attempts. If the policy is set for one hour, and the account lockout threshold is set for three attempts, a user can enter the incorrect login information three times within one hour. If they enter incorrect information twice, but get it correct the third time, the counter will reset after one hour has elapsed (from the first incorrect entry) so that future failed attempts will again start counting at one.
Kerberos Policy
This policy is for domain user accounts, and determines Kerberos-related settings such as ticket lifetimes and enforcement. Kerberos policies do not exist in Local Computer Policy.
Objectives
After completing this lab, you will be able to: Use Group Policy to secure member servers. Audit file system access. Audit domain logons.
Lab Setup
Estimated Time: 60 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: o o 5. User name: Adatum\Administrator Password: Pa$$w0rd
Repeat steps 2-4 for 20410B-LON-SVR1 and steps 2-3 for 20410B-LON-CL1. Do not sign in to LON-CL1 until directed to do so.
Task 1: Create a Member Servers organizational unit (OU) and move servers into it
1. 2. 3. On LON-DC1, open Active Directory Users and Computers. Create a new OU named Member Servers OU. Move servers LON-SVR1 and LON-SVR2 to Member Servers OU.
Task 3: Create a Member Server Security Settings Group Policy Object (GPO) and link it to the Member Servers OU
1. 2. 3. On LON-DC1, open the Group Policy Management Console. In the Group Policy Management Console (GPMC), in the Group Policy Objects container, create a new GPO with a name Member Server Security Settings. In the Group Policy Management Console, link the Member Server Security Settings to Member Servers OU.
Task 4: Configure group membership for local administrators to include Server Administrators and Domain Admins
1. 2. 3. 4. 5. On LON-DC1, open the Group Policy Management Console. Edit the Default Domain Policy. Navigate to Computer Configuration, click Policies, click Windows Settings, click Security Settings, and then click Restricted Groups. Add the Server Administrators and Domain Admins groups to the Administrators group. Close the Group Policy Management Editor.
Task 5: Verify that Computer Administrators has been added to the local Administrators group
1. 2. Switch to LON-SVR1, and sign in as Adatum\Administrator with a password of Pa$$w0rd. Open a Windows PowerShell window, and at the Windows PowerShell command prompt, type following command:
Gpupdate /force
3. 4. 5.
Open Server Manager, open the Computer Management console, and then expand Local Users and Groups. Confirm that the Administrators group contains both ADATUM\Domain Admins and ADATUM\Server Administrators as members. Close the Computer Management console.
Task 6: Modify the Member Server Security Settings GPO to remove Users from Allow log on locally
1. 2. 3. Switch to LON-DC1. On LON-DC1, in the GPMC, edit the Member Server Security Settings GPO. In the Group Policy Management Editor window, browse to Computer Configuration \Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment, and configure Allow log on locally for Domain Admins and Administrators security groups.
Task 7: Modify the Member Server Security Settings GPO to enable User Account Control: Admin Approval Mode for the Built-in Administrator account
1. 2. 3. On LON-DC1, in the Group Policy Management Editor window, browse to Computer Configuration \Policies\Windows Settings\Security Settings\Local Policies\Security Options. Enable User Account Control: Admin Approval Mode for the Built-in Administrator account. Close the Group Policy Management Editor.
3.
4. 5. 6.
Try to sign in to LON-SVR1 as Adatum\Adam with a password of Pa$$w0rd. Verify that you cannot sign in to LON-SVR1. To prepare for the next exercise, log off of LON-SVR1, and log back on to LON-SVR1 as Adatum\Administrator with a password of Pa$$w0rd.
Results: After completing this exercise, you should have used Group Policy to secure Member servers.
Task 1: Modify the Member Server Security Settings GPO to enable object access auditing
1. 2. 3. 4. 5. 6. Switch to LON-DC1. Sign in to LON-DC1 as Adatum\Administrator with a password of Pa$$w0rd. In the GPMC, edit the Member Server Security Settings GPO. In the Group Policy Management Editor window, browse to Computer Configuration \Policies\Windows Settings\Security Settings\Local Policies\Audit Policy. Enable Audit object access with both Success and Failure settings. Sign out of LON-DC1.
4. 5. 6. 7. 8.
Close the Command Prompt window. Sign out from LON-CL1, and then sign in again as Adatum\Adam with a password of Pa$$w0rd. Open the Marketing folder on LON-SVR1, by using following Universal Naming Convention (UNC) path: \\LON-SVR1\Marketing. Create a text document with a name Employees. Sign out from LON-CL1.
Task 5: View the results in the security log on the domain controller
1. 2. 3. Switch to LON-SVR1, and start Event Viewer. In the Event Viewer window, expand Windows Logs, and then open Security. Verify that following event and information displays: o o o o Source: Microsoft Windows Security Auditing Event ID: 4663 Task category: File System An attempt was made to access an object.
Results: After completing this exercise, you should have enabled file system access auditing.
4.
Close the Command Prompt window, and sign out from LON-CL1.
Note: This password is intentionally incorrect to generate a security log entry that shows that that an unsuccessful login attempt has been made.
Results: After completing this exercise, you should have enabled domain logon auditing.
Lesson 3
Restricting Software
Users need to have access to the applications that help them do their jobs. However, unnecessary or unwanted applications often get installed on client computers, whether unintentionally or for malicious or non-business purposes. Unsupported or unused software is not maintained or secured by the administrators, and could be used as an entry point for attackers to gain unauthorized access or spread computer viruses. Consequently, it is of the utmost importance for you to ensure that only necessary software is installed on all the computers in your organization. It is also vital that you prevent software from running that is not allowed or is no longer used or supported.
Lesson Objectives
After completing this lesson, you will be able to: Explain how to use software restriction policies to restrict unauthorized software from running on servers and clients. Describe the purpose of AppLocker. Describe AppLocker rules and how to use them to restrict unauthorized software from running on servers and clients. Describe how to create AppLocker rules.
Rules
Rules govern how SRP responds to an application that is being run or installed. Rules are the key constructs within an SRP, and a group of rules together determines how an SRP responds to applications that are being run. Rules can be based on one of the following criteria that apply to the primary executable file for the application in question: Hash. A cryptographic fingerprint of the file. Certificate. A software publisher certificate that is used to digitally sign a file. Path. The local or UNC path to where the file is stored. Zone. The Internet zone.
Security Levels
Each applied SRP is assigned a security level that governs the way that the operating system reacts when the application that is defined in the rule is run. The three available security level settings are as follows: Disallowed. The software identified in the rule will not run, regardless of the access rights of the user. Basic User. Allows the software identified in the rule to run as a standard, non-administrative user. Unrestricted. Allows the software identified in the rule to run unrestricted by SRP.
Using these three settings, there are two primary ways to use SRPs: If an administrator has a comprehensive list of all the software that should be allowed to run on clients, the Default Security Level can be set to Disallowed. All applications that should be allowed to run can be identified in SRP rules that would apply either the Basic User or Unrestricted security level to each individual application, depending on the security requirements. If an administrator does not have a comprehensive list of the software that should be allowed to run on clients, the Default Security Level can be set to Unrestricted or Basic User, depending on security requirements. Any applications that should not be allowed to run can then be identified by using SRP rules, which would use a security level setting of Disallowed.
Software Restriction Policy settings can be found in Group Policy at the following location: Computer Configuration\Policies\Windows Settings\Security Settings\Software Restriction Policies.
What Is AppLocker?
AppLocker, which was introduced in the Windows 7 operating system and Windows Server 2008 R2, is a security setting feature that controls which applications users are allowed to run. AppLocker provides administrators a variety of methods for determining quickly and concisely the identity of applications that they may want to restrict, or to which they may want to permit access. You apply AppLocker through Group Policy to computer objects within an OU. You can also apply Individual AppLocker rules to individual AD DS users or groups. AppLocker also contains options for monitoring or auditing the application of rules. AppLocker can help organizations prevent unlicensed or malicious software from executing, and can selectively restrict ActiveX controls from being installed. It can also reduce the total cost of ownership by ensuring that workstations are standardized across the enterprise, and that users are running only the software and applications that are approved by the enterprise. Using AppLocker technology, companies can reduce administrative overhead and help administrators control how users can access and use files, such as .exe files, scripts, Windows Installer files (.msi and .msp files), and DLLs.
You can use AppLocker to restrict software that: Is not allowed to be used in the company. For example, software that can disrupt employees business productivity, such as social networking software, or software that streams video files or pictures that can use a large amounts of network bandwidth and disk space. Is no longer used or it has been replaced with a newer version. For example, software that is no longer maintained, or for which licenses have expired. Is no longer supported in the company. Software that is not updated with security updates might pose a security risk. Should be used only by specific departments.
You can configure AppLocker settings by browsing in GPMC to: Computer Configuration \Policies\Windows Settings\Security Settings\Application Control Policies. Note: AppLocker uses the Application Identity service to verify the attributes of a file. This service must be configured to start automatically on each computer where AppLocker should be applied. If the Application Identity service is not running, then AppLocker policies are not be enforced. Additional Reading: For more information about AppLocker, see AppLocker overview at http://go.microsoft.com/fwlink/?LinkID=266745.
AppLocker Rules
AppLocker defines rules based on file attributes that are derived from the digital signature of the file. File attributes in the digital signature include: Publisher name Product name File name File version
Default Configuration
The default configuration for AppLocker contains a set of default rules for each rule collection. This set of rules ensures that files that are allowed to run are necessary for Windows operating systems to run and operate normally.
Demonstration Steps Create a GPO to enforce the default AppLocker Executable rules
1. 2. 3. 4. 5. 6. 7. 8. 9. Sign in as Adatum\Administrator with the password Pa$$w0rd. On LON-DC1, open the GPMC. Create a new GPO named WordPad Restriction Policy. Edit the WordPad Restriction Policys Security Settings by using AppLocker to create a new Executable Rule. Set the permission of the new rule to Deny, the condition to Publisher, and then select wordpad.exe. If prompted, click OK to create default rules. In the Group Policy Management Editor, browse to Computer Configuration\ Policies \Windows Settings\Security Settings\ Application Control Policies\ AppLocker. In AppLocker, configure enforcement with Enforce rules. In the Group Policy Management Editor, browse to Computer Configuration\Policies \Windows Settings\Security Settings\System Services. Configure Application Identity Properties with Define this policy setting, and Select service startup mode with Automatic.
Lesson 4
Lesson Objectives
After completing this lesson, you will be able to: Describe the features of Windows Firewall with Advanced Security. Explain why a host-based firewall is important. Describe Firewall Profiles. Describe connection security rules. Explain how to deploy Windows Firewall rules.
Additional Enhancements
Windows Firewall with Advanced Security is a Microsoft Management Consoles (MMC) snap-in that allows you to perform advanced configuration of Windows Firewall. Windows Firewall in Windows 8 and Windows Server 2012 has the following enhancements: Supports filtering for both incoming and outgoing traffic. Integrates firewall filtering and IPsec protection settings. Enables you to configure rules to control network traffic. Provides network location-aware profiles. Enables you to import or export policies.
You can configure Windows Firewall settings on each computer individually, or with Group Policy at: Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security. Note: Windows Server 2012 introduces the additional option for administering Windows Firewall by using the Windows PowerShell command-line interface.
Firewall Profiles
Windows Firewall with Advanced Security uses firewall profiles to provide a consistent configuration for networks of a specific type, and allows you to define a network as either a domain network, a public network, or a private network. With Windows Firewall with Advanced Security, you can define a configuration set for each type of network; each configuration set is referred to as a firewall profile. Firewall rules are activated only for specific firewall profiles.
Windows Firewall with Advanced security includes the profiles in the following table. Profile Public Description Use when you are connected to an untrusted public network. Other than domain networks, all networks are categorized as Public. By default, the Public profile (which is the most restrictive) is used in Windows Vista, Windows 7, and Windows 8. Use when you are connected behind a firewall. A network is categorized as private only if an administrator or an application identifies the network as private. This profile is referred to as the Home profile in Windows Vista, Windows 7, and Windows 8. Use when your computer is part of a Windows operating system domain. Windows operating systems automatically identify networks on which it can authenticate access to the domain controller. No other networks can be placed in this category. This profile is referred to as the Work profile in Windows Vista, Windows 7, and Windows 8.
Private
Domain
Windows Server 2012 allows multiple firewall profiles to be active on a server simultaneously. This means that a multi-homed server that is connected to both the internal network and the perimeter network can apply the domain firewall profile to the internal network, and the public or private firewall profile to the perimeter network.
Tunnel. With a tunnel rule, you can protect connections between gateway computers. Typically, you would use a tunnel rule when connecting across the Internet between two security gateways. Custom. Use a custom rule to authenticate connections between two endpoints when you cannot set up authentication rules that you need by using the other rules available in the new Connection Security Rule Wizard.
Note: When you import firewall rules, they are treated as a complete set, and replace all currently-configured firewall rules.
Objectives
After completing this lab, you will be able to: Configure AppLocker Policies. Configure Windows Firewall.
Lab Setup
Estimated Time: 60 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. 2. 3. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Connect. If needed, sign in using the following credentials: o o 4. User name: Adatum\Administrator Password: Pa$$w0rd
Task 3: Create a Software Control GPO and link it to the Client Computers OU
1. 2. 3. 4. 5. On LON-DC1, open the GPMC. In the GPMC, in the Group Policy Objects container, create a new GPO with a name Software Control GPO. Edit the Software Control GPO. In the Group Policy Management Editor window, browse to Computer Configuration/Policies /Windows Settings/Security Settings/Application Control Policies/AppLocker. Create default rules for the following: o o o o Executable Rules Windows Installer Rules Script Rules Packaged app Rules
6.
Configure rule enforcement with the Audit only option for the following: o o o o Executable Rules Windows Installer Rules Script Rules Packaged app Rules
7. 8. 9.
In the Group Policy Management Editor, browse to Computer Configuration\Windows Settings \Security Settings, click System Services, and then double-click Application Identity. In the Application Identity Properties dialog box, click Define this policy setting and under Select service startup mode, click Automatic, and then click OK. Close the Group Policy Management Editor.
10. In the GPMC, link the Software Control GPO to Client Computers OU.
3.
Review the result of the command and ensure that Software Control GPO is displayed under Computer Settings, Applied Group Policy Objects. If Software Control GPO is not displayed, restart LON-CL1 and repeat steps from 1 to 2. 3. At a command prompt, type following command, and then press Enter:
C:\CustomApp\app1.bat
Task 7: Create a rule that allows software to run from a specific location
1. 2. 3. On LON-DC1, edit the Software Control GPO. Browse to the following setting location: Computer Configuration/ Policies/ Windows Settings/ Security Settings/ Application Control Policies/ AppLocker. Create a new script rule with the following configuration: o o o o Permissions: Allow Conditions: Path Path: %OSDRIVE%\CustomApp\app1.bat Name and Description: Custom App Rule
3. 4. 5.
Close the Command Prompt window and restart LON-CL1. Sign in to LON-CL1 as Adatum\Tony with a password of Pa$$w0rd. Open a command prompt and verify that you can run the app1.bat application, which is located in the C:\CustomApp folder.
Results: After completing this exercise, you should have configured AppLocker policies for all users whose computer accounts are located in the Client Computers OU organizational unit. The policies you configured should allow these users to run applications that are located in the folders C:\Windows and C:\Program Files, and run the custom-developed application app1.bat in the C:\CustomApp folder.
4.
Task 5: Use security filtering to limit the Application Server GPO to members of Application Server group
1. 2. 3. On LON-DC1, open the GPMC. Expand the Member Servers OU, and then click Application Servers GPO. In the right-hand pane, under Security Filtering, remove Authenticated Users, and configure Application Servers GPO to apply only to the Application Servers security group.
3. 4.
Close the Command Prompt window. Restart LON-SVR1 and then log back on as Adatum\Administrator with the password of Pa$$w0rd.
4.
Results: After completing this exercise, you should have used Group Policy to configure Windows Firewall with Advanced Security to create rules for application servers.
Tools
Tool Group Policy Management Console AppLocker Use for A graphical tool that you use to create, edit, and apply GPOs Applies security settings that control which applications are allowed to be run by users A host-based firewall that is included as a feature in Windows Server 2012 and Windows Server 2008 Deploying security policies based on Microsoft Security Guide recommendations and industry best practices Where to find it Server Manager/Tools GPO Editor in GPMC
Server Manager/Tools if configured individually, or GPO Editor in GPMC for deploying with Group Policy Download from the Microsoft website at http://go.microsoft.com /fwlink/?LinkID=266746.
Best Practices
The following are best practices: Always make a detailed security risk assessment before planning which security features your organization should deploy. Create a separate GPO for security settings that apply to different type of users in your organization, because each department might have differing security needs. Ensure that the security settings that you configure are reasonably easy to use so that employees accept them. Frequently, very strong security policies are too complex or difficult for employees to adopt. Always test security configurations that you plan to implement with a GPO in an isolated, nonproduction environment. Only deploy policies in your production environment after you complete this testing successfully.
After configuring auditing, there are too many events logged in the Security Event Log in Event Viewer. Some users complain that their business applications can no longer access resources on the server.
13-1
Module 13
Implementing Server Virtualization with Hyper-V
Contents:
Module Overview Lesson 1: Overview of Virtualization Technologies Lesson 2: Implementing Hyper-V Lesson 3: Managing Virtual Machine Storage Lesson 4: Managing Virtual Networks Lab: Implementing Server Virtualization with Hyper-V Module Review and Takeaways 13-1 13-2 13-8 13-15 13-22 13-27 13-33
Module Overview
Server virtualization has only been a part of the Windows Server operating system since the release of Windows Server 2008 and the introduction of the Hyper-V role. By using Server virtualization, your organization can save money through server consolidation. However, to use Server Virtualization more efficiently server administrators need to be able to decide which server workloads will run effectively in virtual machines, and which server workloads must remain deployed in a more traditional server environment. This module introduces you to the Hyper-V role in Windows Server 2012, the components of the role, how best to deploy the role, and the new features of the Hyper-V role that are introduced with Windows Server 2012.
Objectives
After completing this module, you will be able to: Describe virtualization technologies. Implement Hyper-V. Manage virtual machine storage. Manage virtual networks.
Lesson 1
Lesson Objectives
After completing this lesson, you will be able to: Describe server virtualization using Hyper-V. Describe Windows Azure. Explain when you would use desktop virtualization. Determine the components required to implement presentation virtualization. Explain the benefits of Microsoft Application Virtualization over traditional application deployment.
This is a simplified example. In real-world environments, you must make adequate preparations before co-locating virtual machines. You have to ensure that the hardware resource needs of all the virtual machines that are hosted on the virtualization server do not exceed the server's hardware resources.
Server Consolidation
With server virtualization, you can consolidate servers that would otherwise need to run on separate hardware onto a single virtualization server. Because each virtual machine on a virtualization server is isolated from the other virtual machines on the same server, it is possible to deploy services and applications that are incompatible with one another on the same physical computer, provided that you host them within virtual machines. Examples of such services and applications include Microsoft Exchange Server 2010, SQL Server 2012, and Active Directory Domain Services (AD DS). This means that an organization only needs to deploy one physical server in place of the three servers that they would have needed in the past. Best Practice: We recommend that you do not deploy a Microsoft Exchange mailbox server on the same computer that contains a domain controller role. We also recommend that you do not deploy a SQL Server 2012 database engine instance on the same computer that contains the domain controller role. Instead, deploy each of these workloads on separate virtual machines and then run those virtual machines as guests on the same virtualization server; this is a supported configuration.
Desktop Virtualization
Client Hyper-V
You can install the Hyper-V role on computers that are running the Windows 8 Pro and Windows 8 Enterprise operating systems. This allows you to run virtual machine guests on client computers. Client Hyper-V, the Hyper-V feature in Windows 8 Pro and Windows 8 Enterprise operating systems, has slightly different processor requirements than Hyper-V on Windows Server 2012. Specifically, with the Windows 8 client operating systems, the computer must have an x64 platform that supports Second-Level Address Translation (SLAT), and have a minimum of 4 gigabytes (GB) of random access memory (RAM). This differs from Hyper-V on Windows Server 2012 which does not require SLAT.
You can also use VDI to implement a Bring Your Own Device (BYOD) policy. In this scenario, workers bring their own computer to the office and use RDC software to connect to the virtual machine to which they are assigned.
Presentation Virtualization
Presentation virtualization differs from desktop virtualization in the following ways: In desktop virtualization, each user is assigned their own virtual machine that is running a client operating system. In presentation virtualization, users sign in and run separate sessions on a server or servers. For example, users Alex and Brad might be signed in simultaneously to the same remote desktop server, yet be running different sessions using RDC. With desktop virtualization, the applications run within virtual machines. With presentation virtualization, the desktop and the applications run on the virtualization server.
On networks that use Windows Server 2012, presentation virtualization is provided by the Remote Desktop Services server role. Clients can access presentation virtualization in the following ways: Full Desktop. Clients can use a remote desktop client such as RDC to access a full desktop session and run applications on the Windows Server 2012 virtualization server. RemoteApp applications. Rather than use a full desktop client such as RDC, the Windows Server feature RemoteApp makes it possible for applications that run on the Windows Server 2012 server to display on the client computer. You can deploy RemoteApp applications as Windows Installer (.msi) files using traditional software deployment methods. This allows you to associate file types with RemoteApp applications. Remote Desktop Web Access. Using Remote Desktop Web Access (RD Web Access), clients can access a website on a specially configured server, and then launch RemoteApp applications and Remote Desktop sessions from their browser.
Application Isolation
App-V isolates the application from the operating system and runs it in a separate virtual environment. This means that applications that you cannot install and run directly on a host operating system because of compatibility problems can run on a server that is running Hyper-V, as App-V applications. For example, applications written for Windows XP that cannot run on the Windows 8 operating system can run on Windows 8 if deployed through App-V. With App-V, you can also run applications that might be compatible with the management operating system when they are run by themselves, but may be problematic when run together. For example, you can use App-V to deploy and run different versions of Microsoft Office Word simultaneously.
Application Streaming
Another useful feature of App-V is application streaming. When an application is streamed, only those parts of the application that are being used are transmitted to the client computer. This speeds up application deployment because only part of the application must be transmitted across the network to the client computer.
Application Portability
When App-V is deployed with Microsoft System Center 2012 Configuration Manager, users can use the same applications on multiple client computers, without requiring a traditional installation on those client computers. For example, a user can sign in to a colleague's computer and then have App-V stream an application to them so that they can use it on that computer. The application is not installed locally, and when the user signs out, the application is no longer available to other users on that computer.
Lesson 2
Implementing Hyper-V
Understanding how Hyper-V works and how virtual machines function is critical to deploying server virtualization effectively in a Windows Server 2012 network environment. This lesson discusses Hyper-V, and the hardware requirements for deploying Hyper-V on a computer running Windows Server 2012. This lesson also discusses the components of a virtual machine (with an emphasis on Dynamic Memory), and the benefits of virtual machine integration services. Finally, it discusses how to measure virtual machine resource use with Windows PowerShell cmdlets.
Lesson Objectives
After completing this lesson, you will be able to: Install the Hyper-V role onto a server. Describe the appropriate hardware for Hyper-V deployment. Describe the virtual machine hardware components. Configure Dynamic Memory. Configure virtual machine integration services. Configure virtual machine start and stop actions. Perform Hyper-V resource metering tasks.
What is Hyper-V?
Hyper-V is the hardware virtualization role that is available in Windows Server 2012. Hardware virtualization provides virtual machines with direct access to the virtualization server's hardware. This is in contrast to software virtualization products such as Microsoft Virtual Server 2005 R2, that use the virtualization server's operating system to provide indirect access to the server's hardware. You can deploy Hyper-V to a computer that is running Windows Server 2012 by using the Add Roles and Features Wizard. You can configure Windows Server 2012 as a virtualization server by using the Hyper-V role. Windows Server 2012 can then host virtual machine guests that are running supported operating systems. You can manage virtual machine administration locally through Windows PowerShell, or you can manage it remotely through the Hyper-V Manager console. You can install the Hyper-V role on both the Server Core installation of Windows Server 2012, and Windows Server 2012 in the non-server core configuration. There is also a Microsoft Hyper-V Server 2012 edition, which includes only the components necessary to host virtual machines. Note: In some documentation, the virtualization server (for example, the Windows Server 2012 computer that is running Hyper-V) is called the parent partition, and a virtual machine that is running on the server is called the child partition.
o o
From which device the virtual machine boots (for example, from a DVD drive, Integrated Drive Electronics (IDE), legacy network adapter, or floppy disk) Whether Num Lock is enabled at boot
Memory. You can allocate up 2 TB of memory resources to an individual virtual machine. Processor. You can allocate up to 32 virtual processors to a single virtual machine. IDE controller 0. A virtual machine can support only two IDE controllers and, by default, two are allocated to each virtual machine. Each IDE controller can support two devices. You can connect virtual hard drives (VHDs) or virtual DVD drives to an IDE controller. If the virtual machine boots from a VHD or a virtual DVD drive, the boot device must be connected to an IDE controller. You can use IDE controllers to connect VHDs and DVD drives to virtual machines that use any operating system that does not support integration services.
IDE controller 1. Allows additional virtual hard drives and DVD drives to be deployed to the virtual machine. SCSI controller. You can use a small computer system interface (SCSI) controller only on virtual machines that have operating systems that support integration services. Synthetic network adapter. Synthetic network adapters represent computer network adapters. You can only use synthetic network adapters with supported virtual machine guest operating systems. COM 1. Allows you to configure a connection through a named pipe. COM 2. Allows you to configure an additional connection through a named pipe. Disk drive. Allows you to map a virtual floppy disk image to a virtual disk drive.
You can add the following hardware to a virtual machine by editing the virtual machine's properties and then clicking Add Hardware: SCSI controller. You can add up to four virtual SCSI devices. Each controller supports up to 64 disks. Network adapter. A single virtual machine can have a maximum of eight synthetic network adapters. Legacy network adapter. You can use legacy network adapters with any operating systems that do not support integration services. You can also use legacy network adapters to deploy operating system images throughout the network. A single virtual machine can have up to four legacy network adapters. Fibre Channel adapter. If you add a Fibre Channel adapter to a virtual machine, the virtual machine can then connect directly to a Fibre Channel SAN. You can only add a Fibre Channel adapter to a virtual machine if the virtualization server has a Fibre Channel host bus adapter (HBA) that also has a Windows Server 2012 driver that supports virtual Fibre Channel. RemoteFX 3D video adapter. If you add a RemoteFX 3D video adapter to a virtual machine, the virtual machine can then display high performance graphics by leveraging Microsoft DirectX and graphics processing power on the host Windows Server 2012 server.
Additional Reading: For more information about virtual Fibre Channel adapters, see Hyper-V Virtual Fibre Channel Overview at http://go.microsoft.com/fwlink/?LinkId=269712.
Thus, by using Dynamic Memory you no longer have to guess how much memory a virtual machine requires; instead, you can configure Hyper-V so that the virtual machine is allocated as much memory as it needs. With Windows Server 2012, you can modify some of the Dynamic Memory minimum and maximum memory values while the virtual machine is running. This was not possible with Windows Server 2008 R2 SP1. You can perform this task from a Virtual Machine's Settings dialog box. Note: Virtual machines must support Hyper-V integration services to use Dynamic Memory.
Smart Paging
Virtual machines may need more memory during startup than they need during normal operation. Smart Paging, which is a new feature in Windows Server 2012, assigns additional temporary memory to a virtual machine when it is starting up. This means that you can allocate memory based on what the virtual machine needs when it is operating normally, rather than the amount that it needs during startup. Smart Paging uses disk paging to assign additional temporary memory to a virtual machine when it is starting up. However, using Smart Paging may result in lower performance because it uses disk resources that would otherwise be used by the host server and other virtual machines. Note: About configuration: You can configure virtual machine memory using the Set-VMMemory Windows PowerShell cmdlet. Additional Reading: For more information about Hyper-V Dynamic Memory, see Hyper-V Dynamic Memory Overview at http://go.microsoft.com/fwlink/?LinkId=269713.
Note: Support for the Windows XP operating system expires in April 2014. Support for Windows Server 2003 and Windows Server 2003 R2 expires in July 2015. You can install the Hyper-V integration services components on an operating system by accessing the Virtual Machine Connection window, and then in the Action menu, clicking the Insert Integration Services Setup Disk item. You can then install the relevant operating system drivers either manually or automatically. You can also enable the following virtual machine integration components: Operating system shutdown. Allows the server running Hyper-V to initiate a graceful shutdown of the guest virtual machine. Time synchronization. Allows the virtual machine to use the virtualization server's processor for the purpose of time synchronization. Data exchange. Allows the server running Hyper-V to write data to the registry of the virtual machine.
Heartbeat. Allows Hyper-V to determine if the virtual machine has become unresponsive. Backup (volume snapshot). Allows the Volume Shadow Copy Service (VSS) provider to create snapshots of the virtual machine for the purposes of backup operation, without interrupting the virtual machines normal operations.
Note: You can also configure virtual machine automatic start and stop actions by using the Windows PowerShell cmdlet Set-VM with the AutomaticStartAction and AutomaticStopAction parameters.
Maximum disk space allocation. Incoming network traffic for a network adapter. Outgoing network traffic for a network adapter.
By measuring how much of these resources each virtual machine uses, an organization can bill departments or customers based on how much resources their virtual machines use, rather than charging a flat fee per virtual machine. An organization with only internal customers can also use these measurements to see patterns of use and plan future expansions. You perform resource metering tasks from a Windows PowerShell command-line interface using the following cmdlets: Enable-VMResourceMetering. Starts collecting data on a per virtual machine basis. Disable-VMResourceMetering. Disables resource metering on a per virtual machine basis. Reset-VMResourceMetering. Resets virtual machine resource metering counters. Measure-VM. Displays resource metering statistics for a specific virtual machine. Note: There is no GUI tool that you can use to perform resource metering. Additional Reading: For more information about resource metering for Hyper-V, see Hyper-V Resource Metering Overview at http://go.microsoft.com/fwlink/?LinkId=269714.
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe the purpose of VHD. Explain how to create a VHD type. Explain how to manage VHDs. Explain how to deploy differencing VHDs to reduce storage. Explain how to use virtual machine snapshots.
What Is a VHD?
A VHD is a file that represents a traditional hard disk drive that you can configure a VHD with partitions and an operating system. You can use VHDs on virtual machines, and you can mount VHDs as local volumes using the Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows 8, and Windows 7 operating systems. Windows Server 2012 supports boot to VHD; this makes it possible for you to configure a computer to boot into a Windows Server 2012 operating system that is deployed on a VHD, or into certain editions of the Windows 8 operating system that are deployed on a VHD. You can create a VHD using: The Hyper-V Manager console. The Disk Management console. The DiskPart (diskpart.exe) command-line tool. The Windows PowerShell cmdlet New-VHD.
Note: Some editions of Windows 7 and Windows Server 2008 R2 also support boot to VHD.
You can convert a VHD with the .vhd format to the .vhdx format using the Edit Virtual Hard Disk Wizard; you may want to do this if you have upgraded a Windows Server 2008 or Windows Server 2008 R2 virtualization server to Windows Server 2012. You can also convert a VHD with the .vhdx format to the .vhd format.
Note: Disk fragmentation is less of an issue when VHDs are hosted on RAID volumes, or on SSDs. Improvements in Hyper-V (since it was first introduced with Windows Server 2008) also minimize the performance differences between dynamic and fixed VHDs. To create a fixed VHD, perform the following steps: 1. 2. 3. 4. 5. 6. 7. Open the Hyper-V Manager console. On the Actions pane, click New, and then click Hard Disk. On the Before You Begin page of the New Virtual Hard Disk Wizard, click Next. In the New Virtual Hard Disk Wizard, on the Choose Disk Format page, click either VHD or VHDX, and then click Next. On the Choose Disk Type page, click Fixed size, and then click Next. On the Specify Name and Location page, enter a name for the VHD, and then specify a folder in which to host the VHD file. On the Configure Disk page, choose one of the following options: o o Create a new blank virtual hard disk of the specified size. Copy the contents of a specified physical disk. With this option you can replicate an existing physical disk on the server as a VHD. The fixed VHD will be the same size as the physical disk. Replicating an existing physical hard disk does not change the data on that disk. Copy the contents of a specified virtual hard disk. With this option, you can create a new fixed hard disk based on the contents of an existing VHD.
Note: You can create a new fixed hard disk using the Windows PowerShell cmdlet New-VHD with the -Fixed parameter.
Direct-attached Storage
Direct-attached storage makes it possible for a virtual machine to access a physical disk drive. You can use direct-attached storage to connect a virtual machine directly to an iSCSI logical unit number (LUN). When you use direct-attached storage, the virtual machine must have exclusive access to the target disk; to ensure this, you must take the disk offline. You can attach direct-attached storage by performing the following steps: 1. 2. 3. 4. Ensure that the target hard disk is offline. If it is not, then use the Disk Management console on the virtualization server to take it offline. Use the Hyper-V Manager console to edit the existing virtual machine's properties. Click on an IDE or SCSI controller, click Add, and then click Hard Drive. In the Hard Drive dialog box, click Physical Hard Disk. From the drop-down menu, select the disk that you want to use as direct-attached storage.
Note: If you connect direct-attached storage to a virtual machine's SCSI controller, then you do not have to shut down the virtual machine. If you want to connect to a virtual machine's IDE controller, then you must first shut down the virtual machine. Question: Why might you consider using fixed VHDs instead of dynamically expanding VHDs? Question: In what situations might you encounter difficulties if you use dynamically expanding disks?
Managing VHDs
From time to time, you need to perform maintenance operations on VHDs. For example, you might want to convert a VHD to another format as your needs change, or you might want to compact a VHD to free up space. You can perform the following maintenance operations on VHDs: Convert the disk from fixed to dynamic Convert the disk from dynamic to fixed Convert a VHD in .vhd format to .vhdx format Convert a VHD in .vhdx format to .vhd format Compact a dynamically expanding VHD Expand a dynamically expanding VHD Expand a fixed VHD
Converting a Disk
When you convert a VHD, the contents of the existing VHD are copied to a newly created VHD. For example, when you convert a fixed VHD to a dynamically expanding VHD, a new dynamic disk is created, then the contents of the fixed disk are copied to the new dynamic disk, and then the fixed disk is deleted.
To convert a VHD from fixed to dynamic or from dynamic to fixed, perform the following steps: 1. 2. 3. 4. 5. 6. 7. In the Hyper-V Manager console, from the Actions pane, click Edit Disk. In the Edit Virtual Hard Disk Wizard, on the Before You Begin page, click Next. On the Local Virtual Hard Disk page, click Browse, and then select the VHD that you want to convert. On the Choose Action page, click Convert, and then click Next. On the Convert Virtual Hard Disk page, choose between VHD and VHDX format. On the Convert Virtual Hard Disk page, choose between Fixed Size and Dynamically Expanding. If you also want to convert the hard disk type, choose the appropriate type, and then click Next. On the Configure Disk page, choose the destination location for the disk.
4. 5. 6.
On the Choose Disk Format page, click VHD, and then click Next. On the Choose Disk Type page, click Differencing, and then click Next. On the Specify Name and Location page, provide the location of the parent hard disk.
To create a differencing VHD using the New-VHD Windows PowerShell cmdlet, follow the pattern of the following example. To create a new differencing VHD named c:\diff-disk.vhd that uses the VHD c:\parent.vhd, use the following Windows PowerShell command:
New-VHD c:\diff-disk.vhd -ParentPath C:\parent.vhd
Using Snapshots
Snapshots are a static image of the data on a virtual machine at a given moment. Snapshots are stored in either .avhd or .avhdx format depending on the VHD format. You can take a snapshot of a virtual machine from the Action menu of the Virtual Machine Connection window, or from the Hyper-V Manager console. Each virtual machine can have a maximum of 50 snapshots. You can take snapshots at any time, even when a virtual machine is shut down. When you take a snapshot of a running virtual machine, the snapshot includes the contents of the virtual machines memory. When taking snapshots of multiple virtual machines that are part of the same group, for example a virtual domain controller and virtual member server, you should take these snapshots simultaneously. This ensures that items such as computer account passwords are the same on all of the snapshots. Remember that when you revert to a snapshot, you are reverting to a computers state at that point in time. If you take a computer back to a point before it had performed a computer password change with a domain controller, you need to rejoin that computer to the domain or run the netdom resetpwd command.
Exporting Snapshots
You can perform a virtual machine export of a snapshot. When you do this, Hyper-V creates full VHDs that represent the state of the virtual machine at the time the snapshot was taken. If you choose to export an entire virtual machine, all snapshots associated with the virtual machine are also exported.
Managing Snapshots
When you apply a snapshot, the virtual machine reverts to the configuration as it existed at the time the snapshot was taken. Reverting to a snapshot does not delete existing snapshots. If you revert to a snapshot after making a configuration change, you are prompted to take a snapshot. It is only necessary to create a new snapshot if you want to return to that current configuration. It is possible to create snapshot trees that have different branches. For example, consider the following scenario: You take a snapshot of a virtual machine on Monday, Tuesday, and Wednesday. On Thursday you apply the Tuesday snapshot. Immediately after applying the Tuesday snapshot, you make changes to the virtual machine's configuration. In this scenario, the original branch is the series of snapshots taken on Monday, Tuesday, and Wednesday. You create a new branch by applying the Tuesday snapshot and making changes to the virtual machine. You can have multiple branches as long as you do not exceed the 50 snapshots per virtual machine limit.
Lesson 4
Lesson Objectives
After completing this lesson, you will be able to: Describe virtual switches. Describe Hyper-V network virtualization. Explain how to manage a virtual machine MAC address pool. Explain how to configure virtual network adapters.
When configuring a virtual network, you can also configure a virtual LAN (VLAN) ID to be associated with the network. This allows you to extend existing VLANs on the external network to VLANs within the virtualization server's network switch. VLANs allow you to partition network traffic, and they function as separate logical networks. Traffic can only pass from one VLAN to another if it passes through a router.
You can configure the following extensions for each virtual switch type: Microsoft NDIS Capture. This extension allows data that is travelling across the virtual switch to be captured. Microsoft Windows Filtering Platform. This extension allows data that is travelling across the virtual switch to be filtered.
Additional Reading: For more information about virtual switches, see Hyper-V Virtual Switch Overview at http://go.microsoft.com/fwlink/?LinkId=269716.
Network Virtualization allows you to host multiple machines that use the same customer addressfor example, 192.168.15.101on the same a server that is running Hyper-V, because the virtual machines have different provider IP addresses. Additional Reading: For more information about network virtualization, see Hyper-V Network Virtualization Overview at http://go.microsoft.com/fwlink/?LinkId=269717.
MAC addresses are in hexadecimal format. When configuring ranges for multiple Hyper-V hosts, you should consider changing the values of the second from the last pair of digits. The following table displays examples of ranges for multiple Hyper-V hosts. Hyper-V host Host 1 MAC address range Minimum: 00-15-5D-0F-AB-00 Maximum: 00-15-5D-0F-AB-FF Minimum: 00-15-5D-0F-AC-00 Maximum: 00-15-5D-0F-AC-FF Minimum: 00-15-5D-0F-AD-00 Maximum: 00-15-5D-0F-AD-FF
Host 2
Host 3
Both synthetic network adapters and legacy network adapters support the following advanced features: MAC address allocation. You can configure a MAC address to be assigned from the MAC address pool, or you can configure the network adapter to use a fixed MAC address. You can also configure MAC address spoofing. This is useful when the virtual machine needs to provide specific network access, such as when the virtual machine is running a mobile device emulator that requires network access. DHCP Guard. This feature drops DHCP messages from virtual machines that are functioning as unauthorized DHCP servers. This may be necessary in scenarios where you are managing a server running Hyper-V that hosts virtual machines for others, but does not have direct control over the configuration of those virtual machines. Router Guard. This feature drops router advertisement and redirection messages from virtual machines that are configured as unauthorized routers. This may be necessary in scenarios where you do not have direct control over the configuration of virtual machines. Port Mirroring. This feature allows you to copy incoming and outgoing packets from a network adapter to another virtual machine that you have configured for monitoring. NIC Teaming. This feature allows you to add the virtual network adapter to an existing team on the server running Hyper-V.
Synthetic network adapters require the guest operating system to support integration services. In addition to the advanced features listed earlier, synthetic network adapters support the following hardware acceleration features: Virtual Machine Queue. This feature uses hardware packet filtering to deliver network traffic directly to the guest. This improves performance because the packet does not need to be copied from the management operating system to the virtual machine. Virtual Machine Queue requires that the host computer has a network adapter that supports this feature. IPsec task offloading. This feature allows calculation-intensive security association tasks to be performed by the host's network adapter. In the event that sufficient hardware resources are not available, the guest operating system performs these tasks. You can configure a maximum number of offloaded security associations between 1 and 4,096. IP security (IPsec) task offloading requires guest operating system support and network adapter support.
SR-IOV. Single-root I/O virtualization (SR-IOV) allows multiple virtual machines to share the same Peripheral Component Interconnect (PCI) Express physical hardware resources. If sufficient resources are not available, then network connectivity falls back to be provided through the virtual switch. SR-IOV requires specific hardware and special drivers to be installed on the guest operating system.
Legacy network adapters emulate common network adapter hardware. You use legacy network adapters in the following situations: You want to support network boot installation scenarios for virtual machines. For example, you want to deploy an operating system image from a Windows Deployment Services (Windows DS) server or through Configuration Manager. You need to support operating systems that do not support integration services and do not have drivers for the synthetic network adapter.
Legacy network adapters do not support the hardware acceleration features that synthetic network adapters support. You cannot configure virtual machine queue, IPsec task offloading, or Single-root I/O virtualization for legacy network adapters.
Objectives
After performing this lab, you will be able to: Install the Hyper-V role onto a server. Configure virtual networking. Create and configure a virtual machine. Use virtual machine snapshots.
Lab Setup
Estimated Time: 75 minutes
Reboot the classroom computer and from the Windows Boot Manager, select 20410B-LON-HOST1. Sign in to LON-HOST1 with the Administrator account and the password Pa$$w0rd.
2.
Use the Add Roles and Features Wizard to add the Hyper-V role to LON-HOST1 with the following options: o o o Do not create a virtual switch. Use the Default stores locations. Allow the server to restart automatically if required.
3.
After a few minutes, the server restarts automatically. Ensure that you restart the machine from the boot menu as 20410B-LON-HOST1. The computer will restart several times.
Results: After completing this exercise, you will have installed the Hyper-V role onto a physical server.
Results: After completing this exercise, you will have configured virtual switch options on a physically deployed Windows Server 2012 server running the Hyper-V role.
Note: The drive letter may depend upon the number of drives on the physical host machine.
2.
In the Hyper-V Manager console, create a VHD with the following properties: o o o o o Disk Format: VHD Disk Type: Differencing Name: LON-GUEST1.vhd Location: E:\Program Files\Microsoft Learning\Base\LON-GUEST1\ Parent Location: E:\Program Files\Microsoft Learning\Base\Base12A-WS12-TMP.vhd
3.
Open Windows PowerShell, import the Hyper-V module using the following command:
Import-Module Hyper-V
4.
5. 6.
Inspect the disk at E:\Program Files\Microsoft Learning\Base\LON-GUEST2\LON-GUEST2.vhd. Verify that LON-GUEST2.vhd is configured as a differencing VHD with E:\Program Files\Microsoft Learning\Base\Base12A-WS12-TMP.vhd as a parent.
Open Windows PowerShell, import the Hyper-V module using the following command:
Import-Module Hyper-V
4.
5.
Use the Hyper-V Manager console to edit the settings of LON-GUEST2 by configuring the following: o o Automatic Start Action: Nothing Automatic Stop Action: Shut down the guest operating system
Results: After completing this exercise, you will have deployed two separate virtual machines using a sysprepped VHD file as a parent disk for two differencing VHDs.
Sign in to the virtual machine using the account Administrator and the password Pa$$w0rd. Reset the name of the virtual machine to LON-GUEST1, and then restart the virtual machine.
3.
Note the average CPU, average RAM, and total disk use figures, and then close Windows PowerShell.
3.
From the Windows Boot Manager, click Windows Server 2008 R2.
Results: After completing this exercise, you will have used virtual machine snapshots to recover from a virtual machine misconfiguration. Question: What type of virtual network switch would you create if you wanted to allow the virtual machine to communicate with the LAN that is connected to the Hyper-V virtualization server? Question: How can you ensure that no one single virtual machine uses all available bandwidth provided by the Hyper-V virtualization server? Question: What Dynamic Memory configuration task was not possible on previous versions of Hyper-V, but which you can now perform on a virtual machine that is hosted on the Hyper-V role on a Windows Server 2012 server?
Best Practices
When implementing server virtualization with Hyper-V, use the following best practices: Ensure that the processor on the computer that will run Hyper-V supports hardware assisted virtualization. Ensure that a virtualization server is provisioned with adequate RAM. Having multiple virtual machines paging the hard disk drive because they have inadequate memory decreases performance for all virtual machines on the server. Monitor virtual machine performance carefully. A virtual machine that uses a disproportionate amount of server resources can reduce the performance of all other virtual machines that are hosted on the same virtualization server.
Tools
You can use the following tools with Hyper-V to deploy and manage virtual machines. Name of tool Sysinternals disk2vhd tool Used for Use to convert physical hard disks to VHD format. Where to find it Microsoft TechNet website.