M.C.S.E: Microsoft Certified Solution Expert
M.C.S.E: Microsoft Certified Solution Expert
E
Microsoft Certified Solution Expert
Introduction
1
Ayman Fouad shokry
MCSE
1- Bootable CD/DVD
2- Bootable USB
Notes:
These 2ways won’t be helpful in case we need install win in firm or company so we need faster way to do
it is use hiren boot with image of win.
3- Imaging
Is because we can’t copy and paste the win system because we will can’t paste in the cluster 0 in the HDD
manually.
So the image going to be the righteous way for it install the files in its place.
Notes:
Any program we going to use out of Microsoft software’s going to be “third party “.
2nd is Acronis
2
Ayman Fouad shokry
MCSE
3
Ayman Fouad shokry
MCSE
A+, Electronics
HHD
HDD Bad Sectors:
It happens cause of chromo oxide “CrO2” are get less on the platter “disk media “
For solve this problem we use DLG “Data Life Guard “or “Dr Norton “
Notes:
As long as chromo oxide be less it be harder to fix and as it be large it be easier in fix cause programs are
use the exist around it and fix the affected areas .
4
Ayman Fouad shokry
MCSE
MCSE
File System
When file be written on cluster place it divide it on the cluster sizes 4k or 16k so if file has 20k amount it
going to take 5 clusters size of 4k size and in 16 going to take 2 clusters size , but the 2nd cluster which
have 12k free it won’t be unable to use .
In the same time when file be written on platter it happened randomly cause platter moves with 7500
RPM and pin moves forward and backward .. So data never be written organized.
Every data has number for can recognize it again and for recognize the file again it need
And that how virus can destroy file … by accessing the FAT and delete or destroy it.
- Definition of File system :
- Allocation Tables :
1-permission
2-encryption
3-compression
4-qouta
5
Ayman Fouad shokry
MCSE
- History of Microsoft :
Bill Gates start his work in Apple Corporation in the beginning as programmer then he stole the code of
DOS idea and leave.
Then he start his own business and made DOS 1,2,3,4 they all failure then made 5, 6, 7 and they success.
But wasn’t good enough until 1995 made Windows 95, but it kept have problems,
DOS
st
1 it was 16 bit/APP
1 16bit/app
2nd its working wiz MS.DOS sub dos in restarting.
2 16bit/app
3rd haven’t good security or arrangement for corporations.
3 16bit/app
In 1998 Microsoft made windows 98 and said its 32Bit/APP, until Java Company discover
it’s wrong 4 16bit/app
And that windows still work wiz only 16Bit/APP but in double way 16 for sent and 16 for 5 16bit/app
receive. 6 16bit/app
But it keep the same 16Bit/APP. 7 16bit/app
In the same time at 1990 company name New Technology made them first operating
system NT1 , 2 and 3 failed but NT 4 success in 1995 and all companies and
corporations start use it cause its features were great for them from users and Microsoft
security and log files and not depending on MS DOS and work stations and servers . 3.1 90 16b/a
1999 Microsoft bought New Technology Company and made them most real success 3.11 94 16b/a
windows 2000 NT 32bit/APP.
Win 95 95 16b/a
Win98 98 32b/a
Notes:
Win me 99 32b/a
Bit/Application: is the road which carry data sent and receive from user to system to
H.W and as road is have more size as it be faster and better. Win NT 2000 32b/a
6
Ayman Fouad shokry
MCSE
NTFS
Permissions
As you see NTFS permissions must think direct in “Who - Doing - What? “
- User Account :-
Is the file which has all users’ security that be on the local device can’t share same users with other
device cause it going to have different SAM which not have the files and difference S.ID.
7
Ayman Fouad shokry
MCSE
Is the users which is being created by default in windows system “Administrator, Guest “.
Notes:
When we get message error “Access denied “be sure is cause of permission.
Administration have almost control of permission and can give permissions to users.
2 – Folder
3 – Partition
If user A have full control permission inside group, and we want make user A dun have permission to
Read some folder.,
By that priority be with deny be before than full control so user A will can’t read the folder even it has
full control in the group.
8
Ayman Fouad shokry
MCSE
Then the sub folders going to be inheritance the same of the main,
You can’t change or edit in the sub folders,, but can only add more permissions.
For solve this is change Advanced security for new folder unmark on inheritance permission object.
Steps:
Properties -> security -> advanced security setting -> change permission -> unmark.
Choose add “for keep permission as it is but with your control”
Or choose remove and clear “for delete the permissions and add manual over new “.
Press ok.
9
Ayman Fouad shokry
MCSE
NTFS
Special permissions
Let’s say if there company have 500 users and we want to make them read only 1 folder for each user
and in the same time make 5 admins can have full control on all partitions with its sub folders.
With normal permissions is very hard cause will have to give deny to 495 users manually and that going
to waste too much time and won’t be 100% occurred.
So we use special permission for control and manage these kind of cases.
Ex:
Company have 5 departments “HR has R/W, IT has R/W and R on the partition, Sales have R only, Help
desk have R for whole partition, Admins has full control “.
10
Ayman Fouad shokry
MCSE
11
Ayman Fouad shokry
MCSE
NTFS
Quota
Quota:
Is for give limited space on partitions for users.
We also use quota for reduce high usage on HHD and control the Backup.
- Steps :
1st we going to enable the quota “partition properties > quota > show quota settings > check mark
“enable quota management
12
Ayman Fouad shokry
MCSE
2nd when we need more space we going to “quota entries (will appear window of quota)
For add users we press on add and type username”.
13
Ayman Fouad shokry
MCSE
This feature can work with users which has Read/ write or modify or full control permissions and not
with Read only cause it won’t need space for use on HDD anyway.
14
Ayman Fouad shokry
MCSE
NTFS
Compression
Compression:
Is for make folder has automatically compressing as per we are adding files inside it.
Steps:
Right click on folder > properties > advance > check mark on: compress contents to save disk “.
Notes :
File compressing is bad for computers processor cause as long as its in use its loading on it.
15
Ayman Fouad shokry
MCSE
NTFS
Encryption
Is for make encryption on folder or file and that away from permission.
Encryption can be made by “owner “.
Problem is we can’t depend on permission because as windows system changes all permission will be
under control of new windows administrator.
But encrypted folders won’t be able to access because S.ID will be changed so no owner or recovery
agent will be able for decrypted or accessing.
Steps:
Right click > properties > advanced > check mark on “encrypt contents of secure”
Color of folder name will be changes for green color.
Standard:
Can’t use compression and encryption in the same time in the same folder.
16
Ayman Fouad shokry
MCSE
In copy and cut from folder to folder and in the same partition, or from partition to partition.
EX:
Partition D has (HR folder compressed with R permission) and (admin folder with R/W permission).
Partition E has (IT folder compressed with F.C permission) and (H.D folder has modify permission).
- When folder HR moves to IT E:// it will have permission of E:// F.C and modify also will not be
compressed,
When HR moves to admin will be the same compressed.
17
Ayman Fouad shokry
MCSE
Disk Management
1) Basic disk :
Types:
1)
2)
3)
4)
Notes:
When we delete all partitions first partition we going to create going to be automatically primary.
Hard Disk types:
Fault tolerance Fault tolerance No fault tolerance No fault tolerance No fault tolerance
Win 8,10 support Win 8,10 support Win 8,10 support
only this types only this types only this types
18
Ayman Fouad shokry
MCSE
Midi: is working with DOS and full system with less performance.
- Server/ client
- Stand alone
- All computers are peers; no computer has
control over another computer.
- Each computer has a set of user accounts. One or more computers are servers. Network
To use any computer in the workgroup, administrators use servers to control the
you must have an account on that security and permissions for all computers
computer. on the domain. This makes it easy to make
- There are typically no more than ten to changes because the changes are
twenty computers. automatically made to all computers.
- All computers must be on the same local If you have a user account on the domain,
network or subnet. you can log on to any computer on the
domain without needing an account on that
computer.
19
Ayman Fouad shokry
MCSE
Pc Roles:
Operating system Role
Client Professional Ask for service
Servers
Server Win server + service Provide service
Domain controller Win server + A.D Manage control
Notes:
For add A.D in win 2008 press Run “DC promo”.
20
Ayman Fouad shokry
MCSE
Network structure
Network structure
Logical N.S Physical N.S
Notes:
1) Domain which is the main root of tree and forest and parent.
2) Domain of new tree and child’s and belong to #1 forest.
3) 4) Child domains are belong #2 domain and belong to #1 forest.
5) 6) Child’s domains belong to #1 domain.
7) Child of #6 domain and belong to #1 domain tree.
- Every domain work alone and controlling its users. But all domains are connected to other and
they can ping or share files, printers with each other even separated.
21
Ayman Fouad shokry
MCSE
22
Ayman Fouad shokry
MCSE
23
Ayman Fouad shokry
MCSE
After installation finish will see this caution mark press on it and then press on promote this server
Press on new domain to existing forest for add child or tree. And sure must type domain name and the
new domain name.
24
Ayman Fouad shokry
MCSE
25
Ayman Fouad shokry
MCSE
26
Ayman Fouad shokry
MCSE
Notes:
- We can use Ou when we have company with branches with the same protocols and same stable
standards.
- If not then we have other option is create domain for each department or branch, but it going to
be increase the expenses of IT department cause it going to need increase the IT team.
- If have problem with the current exist domain we need the CEO agreement for establish new
domain.
EX:
27
Ayman Fouad shokry
MCSE
Domain object
- Domain object:
1) User account 2) computers account
After join domain with users a computer account would be created in container file.
Notes:
- User can login from any device in the same domain but just not be the domain controllers.
- For make user enter from specific computer and specific duration shift..
Steps: user properties > accounting tab > set time > set computer.
- For make user have expire date for specific user for employers which work part time contracts.
Steps: user properties > accounting tab > expired date set.
28
Ayman Fouad shokry
MCSE
- When user account type his password 3 times wrong it going to be locked.
- For apply policies on user must give him option for he create his own password for can judge on
him incase something wrong happened because only him have his own pw.
29
Ayman Fouad shokry
MCSE
- G.P.O History:
It started with new technology corporation with system policy it like group policy but it’s not categories,
so when we need to search in whole policy for find what we want, but it didn’t success in make
advertisements for NT operating system until Microsoft hijacked the New technology, and then they edit
the system policy and made categories for policies EX” Desktop, administration, etc..” then they called it
Group policy object.
We not need to save all policies in our brain, enough we know the tools and how we do it perfectly.
-50% - Deploy s.w” s.w settings” -50% - Deploy s.w “ s.w settings”
-90% -10%
- Deploy security “win settings” - Deploy security “ win settings”
Notes:
- Group policy able you for control everything from your device.
- Computer configuration is for apply on common.
- User configuration is for apply policy for specific users.
- For access G.P.O have 2 ways :
- 1st run > gpedit.msc
- 2nd run > mmc >file> add snap in. “ Microsoft management console”
- Can’t apply policy on computers on common and then apply user configuration for except it.
- Even windows professional client has G.P.O.
- G.P.O is little bit like roaming what we apply on user will find it in any computer we going to use.
- Computer settings policy will be difference that any user will find the policy of computers.
30
Ayman Fouad shokry
MCSE
- G.P.O levels:
1) Site
2) Domain
3) OU
4) local
G.P.O conflicts:
For example hen we have wallpaper policy on “Site with red “ and “ blue on domain” “ green on OU” “
orange on local”.
- Standard:
When we’re in enterprise we must use the most less G.P.O.
Ex: better use 200 G.P.O than 2000 G.P.O as it give me my needs.
Reason: as per G.P.O increase the traffic on network because every 90 mins the group policy
make update and it refresh and load all the G.P.O the enable and the disabled features.
31
Ayman Fouad shokry
MCSE
Scenario 1:
- Description:
1) Deploy office and antivirus and it going to use inheritance for deploy on all Ou’s.
5) Deploy AutoCAD for marketing and H.D
Use block for sales Ou don’t get office but H.D wont inheritance the office.
Deploy G.P.O antivirus on sales and it will inheritance to indoor.
Deploy G.P.O management engine.
- Steps:
32
Ayman Fouad shokry
MCSE
Create G.P.O
33
Ayman Fouad shokry
MCSE
Server manager > tools > group policy management > choose sales Ou > properties > block inheritance.
- Group policy update:
Is update happens every 90 min’s or restarting if on computer but if on OU user will be every 90 min’s
Or logging and logoff.
34
Ayman Fouad shokry
MCSE
- Scenario 2:
- Description:
1. We already have 2 default G.P.O of domain and domain controller, so for we not use a lot of
G.P.O we put in 1) default domain G.P.O office., and made 3) enforce for antivirus for it reach
sales and indoor,
2. Made 4) G.P.O management engine and AutoCAD.
3. Now we just made 4 G.P.O only and it give us all our need from group policies, in the end is up
to ever IT specialist “ so don’t save 1 way in make it”.
4. Before you start create you must make design like pervious for see the best way to get your
needs and G.P.O’s.
5. For indoor ou have office we made link to get it from 1) default domain G.P.O.
6. Block option for Sales for it don’t get office.
7. Made enforce for antivirus for it reach sales ou and indoor.
8. Made link for IT and H.D to get them G.P.O.
35
Ayman Fouad shokry
MCSE
- Enforce:
For deploy antivirus even block inheritance we use enforce for make antivirus don’t be blocked on sales
Ou and inherit to indoor.
Steps:
Server manager > tools > group policy management > choose sales Ou > properties > enforce.
36
Ayman Fouad shokry
MCSE
- Link order:
When we have 2 G.P.O have conflicts in order which going to be have priority to apply is which are in
top of link order list.
For not use too much G.P.O we can use link way that if the G.P.O are already exist in other G.P.O will
make link to direct it for it.
37
Ayman Fouad shokry
MCSE
Notes:
- When the domain conflict happen in password G.P.O will deploy its policy and not the OU,
because password level deploy on domain only.
- Expect when use domain/forest functional level 2008/2012.
- For disable G.P.O we press right click then unmark “link enabled “that will disabled until other
action being taken.
G.P.O Editing:
There 3 options inside any policy “not configured, enable, disable”
- Not configured: is has no action but is on standby for any action taken.
- Enable: is make the policy activated.
- Disabled: is make policy not activated.
Ex:
When domain has G.P.O for hide control panel and is enabled and if in domain is not configured and is
disabled on OU “what going to deployed is the OU”.
If domain is not configured and is disabled on OU “ the OU is going to deploy its G.P.O”.
If is disabled on domain and not configured on OU “the domain is going to deployed its G.P.O”
38
Ayman Fouad shokry
MCSE
DNS
Domain Name System
DNS:
1 DNS definition
2 Types of names
3 Host name
4 Net bios name
5 DNS process
6 Host file
7 LM file
8 Types of query
9 Root hints
10 Installing DNS service
11 Configuring DNS
12 Forward lookup zone
13 Reverse zones
14 Types of zones
15 Primary zone
16 Secondary zone
17 Stub zone
18 Active directory integrate zone
19 Creating zone
20 Zone properties
21 Server properties
22 Zone transfer
23 Forwarding
24 Conditional forwarding
25 Root zone
26 Start of authority “ AOS”
27 Monitoring
28 DNS records
29 Host record
30 PTR record
31 Alias record
32 Max record
33 Backup
34 Planned design
35 DNS and active directory
36 DNS requirement for A.D
37 SRV
38 Dynamic update
39 Master browser
40 suffix
39
Ayman Fouad shokry
MCSE
1) Definition: #1
DNS: is server for resolve name to IP.
Name
Ayman.lab4.com
Notes:
- DNS is resolving name to IP, because you can’t achieve site without add.
- Every dot in host name have it job for define the name and domain.
- Net bios name can write the full name like host name but dots won’t have the same job for
define the name and the whole going to be name for net bios.
- Until 2003 net bios name was use “WINS” for resolving it until 2008 it start use DNS.
- WINS: is windows internet naming system.
- Now days DNS resolving both host name and net bios name.
But its use only the first 16 characters 1st 15 for name 16th is for service or tag or role.
40
Ayman Fouad shokry
MCSE
- DNS process: #5
1st it’s going to check the device cache if it have the ip already or not.
3rd LM Host: #7
If last 3 steps didn’t success in find the ip already by user pc it going to check it in the DNS
First it going to check the DNS cache then the Data base of DNS.
If it didn’t success in find it it will go to the root hint the base of all servers.
- Root Hint: #9
Is the root and base of all servers Dot “.”
41
Ayman Fouad shokry
MCSE
- Types of Query: #8
And is like when DNS ask DNS it show it the best way to get the answer.
Steps: “server manager > add role > next > DNS> next > install “
Installing the DNS only not mean the service is work, must with configuration.
42
Ayman Fouad shokry
MCSE
- Forward zone : # 12
Notes:
- Forward lookup zone must be the same of the domain for it work, and its preferring that before
make it ask the manager for names and plan for work.
- Reverse zone must keep in the same network for it work.
- Master browser: # 39
Is pc’s in network they auto elect pc of them for be master browser nd it have role near of DNS in the
network but automatically without configuration and by it you can run the ip of pc and open its shared
folders for example.
43
Ayman Fouad shokry
MCSE
Notes:
44
Ayman Fouad shokry
MCSE
- Secondary zone must be have preferred DNS same ip of primary and the alternate DNS server is
the same of your secondary ip.
- Sometimes firewall block the DNS transfers.
- Primary can make only one zone and others must be secondary.
- Active directory integrated can be installed unlimited only on domain controllers.
- Active directory integrated secure transfers updates only that mean it won’t send all record list,
just the updates.
45
Ayman Fouad shokry
MCSE
- Primary:
46
Ayman Fouad shokry
MCSE
- Secondary:
47
Ayman Fouad shokry
MCSE
DNS
Active directory integrated
- Zone properties:
General:
- Status: is for start or pause it.
- Type: which type of DNS need to change it “ primary or secondary or stub”
- Dynamic update: none or non-secure and secure for primary, and for integrated it has 1 more
option is secure for users inside domain.
- Aging:
48
Ayman Fouad shokry
MCSE
- Zone transfer:
A) To any server:
B) Only to servers:
- WINS:
- S.O.A:
1) Serial number:
It have the number of changes happens in DNS database and it appear more when have 2 A.D.I “sending
incremental updates”.
It sent updates only to the DNS and which control which has more mount of changes.
2) Primary server:
4) Refresh interval:
Incase DNS didn’t respond on it, it will continue work normally while keep checking by time had set
before until 1 day pass on not responding it going to be expired .. And other DNS will stop work.
49
Ayman Fouad shokry
MCSE
DNS
Forwarding
- Forwarding:
When want enter yahoo.com and it’s not have it in DNS records and if not found it, it’ll ask near DNS or
Root hint.
Forward is give DNS 8.8.8.8 preferred DNS and 10.0.0.10 as alternate DNS so when going type for search
something in internet it going to find it so fast as preferred DNS is 8.8.8.8.
But when want search in the local network it going to late a lot cause 8.8.8.8 going to search in the
whole world until find inside your network.
So the best solution is forwarding options for avoid this issue.
Steps:
Server manager > DNS > name DNS > properties > forwards > add ip > edit for put time.
- Conditional forwarding:
Is when have other company with local domain, it going to use conditional forwarding by give it the DNS
domain 20.0.0.10 and lab7.com the same steps but with 10.0.0.10.
Steps:
Conditional forwarding > properties > new conditional forwarding.
50
Ayman Fouad shokry
MCSE
DNS
Server Properties
- Interface:
Is tab responsible for decide which ip listen to or ignore. Ip for all “and is listening and replaying to any
DNS queries”. For specific ip’s “is for choose specific ip’s for listen to”.
51
Ayman Fouad shokry
MCSE
- Root hint:
Is tab has the 13 servers which DNS go to, when it don’t find in its record.
It be used when have private company or place and want to keep it secure and only listen and replay
and don’t receive queries from out the network.
So we create forward lookup zone “.”(Root) and this going to disable the searching in root hints as it will
be its own root hint.
52
Ayman Fouad shokry
MCSE
- Monitoring:
53
Ayman Fouad shokry
MCSE
- Advanced:
Disable recursion “also forwarding “Is for disable ask or receive forwarding p.s: before 2012
was able to choose 1 feature for disable it.
Enable BIND secondary’s: is for Linux o/s when secondary DNS be able for take records.
Fail on load if bad zone data: if there bad records it will stop work.
Enable round robin: is for rotate the ip's for not make traffic on record.
Enable net mask ordering: is for make DNS check first before give the record for it be sure it
work with the queries.
Secure cache against pollution: is for keep cache always safe from bad records.
Enable DNSSE validation for remote responding: is when have DNS in other site and is going to
connect with our site this point for secure and make sure its safe.
Name checking: it has the decoding type between DNS’s.
Load zone data on startup: is the distention of records if text has all records or create new or
use it has public DNS.
Enable automatic scarving of state records: when mark on it any expired DNS records will be
deleted after 7 days.
54
Ayman Fouad shokry
MCSE
- Debug logging:
Is tab work for monitor department and it’s related with cisco with its packets direction and transport
protocol, and what inside each packet and its types.
- Suffix:
Is for make DNS device join domain even before it be exist, for make A.D when be configured it have the
DNS primary work and replicate data with it.
Must be sure that DNS have the same name of domain which going to make it also the suffix name all
must be match 100% or the whole process going to be failure.
Steps:
“My computer > right click > properties > change > more > type the suffix name > ok “.
55
Ayman Fouad shokry
MCSE
56
Ayman Fouad shokry
MCSE
DNS
Records
- Host (A) record:
Is for resolving name to ip.
- MX (Mail exchange):
Is the same like Alias record just it have extra option is priority.
- SRV(service) record:
- Backup:
Destination C:// windows > system32> DNS
- Design planned:
Is put perfect plan for make downtime 0 and never be in risk.
- Stub zone:
Is responsible for be center of S.O.A in the huge firm which has a lot of DNS and all DNS go and ask for
the final update S.O.A has been updated.
57
Ayman Fouad shokry
MCSE
DHCP
Dynamic Host Configuration protocol
- 1 - Definition - 27 - Ipconfig /renew
- 2 - What does it used for - 28 - Apipa
- 3 - DHCP clients - 29 - Ipconfig /release
- 4 - How it works
- 5 - Installing DHCP service “role”
- 6 - Configuring DHCP
- 7 - Creating scope
- 8 - Exclusion
- 9 - Lease duration
- 10 - Scope options
- 11 - Reservation
- 12 - Authorization
- 13 - Redmadanc
- 14 - User class
- 15 - Vendor class
- 16 - Monitor
- 17 - Backup
- 18 - Server properties
- 19 - Scope properties
- 20 - Server option
- 21 - Option 60 wds
- 22 - Policy
- 23 - Filter
- 24 - Tcp/ip client
- 25 - Boot p
- 26 - DHCP relay agent
58
Ayman Fouad shokry
MCSE
- DHCP definition:
- TCP/IP client:
TCP/IP client
auto manual
static static
dynamic
reserved
- How it works:
It work by give the DHCP the Ip Range and DNS and gateway, clients will send DHCP requests with B.C
and then DHCP will replay on clients mac add with pole of Ip’s Randomly.
- Case1:
2 branches and 1 has all servers “DHCP, DNS, D.C, etc” and other branch can’t make DHCP request
because router doesn’t Support B.C.
Solution:
1st is Bootp is option in good manufacturing expensive routers which it able DHCP for receive B/C
But it won’t work in that case because 2 branches not connected to same router directly.
2nd is DHCP relay agent it take clients requests from B router to DHCP server and back with the pole IP’s.
59
Ayman Fouad shokry
MCSE
- Apipa:
(Automatic Private IP Addressing) The Windows function that provides DHCP auto configuration
addressing. APIPA assigns a class B IPaddress from 169.254.0.0 to 169.254.255.255 to the
client when a DHCP server is either permanently or temporarily unavailable.
- Ipconfig / release:
For delete all ip’s from device must use Command CMD “ipconfig /release”.
- Ipconfig /renew:
For make device take ip over again must use command CMD “ipconfig /renew”.
- Installing DHCP:
Server manager > add role > DHCP > next > install
The same like installing DNS
60
Ayman Fouad shokry
MCSE
DHCP
Creating Scope
61
Ayman Fouad shokry
MCSE
- Ip address range:
Is give ip address range for DHCP start make pole and share randomly with any client
Is for avoid DHCP use the specific IP or range from use it in the DHCP pole for later can use these
excluded IP’s for main servers like DNS, D.C, etc.
62
Ayman Fouad shokry
MCSE
- Lease duration:
Is for make client when take ip DHCP reserve the ip for it don’t be forever and be only for limited time
because when have more clients than DHCP ip poles.
Is add DNS ip’s and must be aware with use primary ip or A.D.I in beginning then secondary ip and move
up and down depending on priority.
63
Ayman Fouad shokry
MCSE
- Activate scope:
Is for activate scope later from scope options that because you maybe set the DHCP and will make it work
later , so is not good make DHCP keep working and give ip’s to useless clients and they use it for lease
duration time.
64
Ayman Fouad shokry
MCSE
- Scope properties:
Can modify in IP range after creating it also in lease duration but cant in subnet, also it have extra option
in lease duration it’s unlimited.
- Scope options:
65
Ayman Fouad shokry
MCSE
- Reservation:
Steps: enter inside scope > reservation > right click > new reservation.
Add name and ip add mac address (without use Dash “-“ ).
Reservation is for reserve ip and avoid DHCP for use it to random clients.
- Supported types:
Both: its mix of DHCP and BOOTP and is the best option.
DHCP: is when client in the same switch it can ask DHCP for IP.
BOOTP: is for clients which re in other Switch for it use DHCP relay agent it calls BOOTP.
66
Ayman Fouad shokry
MCSE
User class:
Is for when want scope option have extra option for specific user.
For example in the figure all clients inside range 20.0.0.x will have TCP/IP from DHCP to use 20.0.0.10
“Router A”, but remote access users will use 20.0.0.50 “Router B”
That can be done by user class in policies option.
- Step: “ policies> right click > new policy >type name > user class > choose (Default routing and
remote access)> mark on append wild card
67
Ayman Fouad shokry
MCSE
68
Ayman Fouad shokry
MCSE
Vendor Class:
Is give extra option by depending on the user operating system buuut is much better use user class instead
of it cause not all operating system support this service
Server properties:
Advanced:
It assign IP for users out of range which using “BOOTP, DHCP or both”
Steps: scope>right click > properties > advanced tab
Monitor:
Is folder has the files log of week with its all activity and its updating weekly
Path: C://>windows>system32>dhcp
69
Ayman Fouad shokry
MCSE
As it’s enabled it will keep always updated with clients with its last changes.
We disable it for publish a public DNS for secure it.
- Dynamically update DNS records only if requested by the DHCP:
Is make update only when clients request for the action.
- Always dynamically update DNS records:
Is DHCP make DNS delete the expired leased records of Host A and PTR.
- Dynamically update DNS records for DHCP clients that not request:
Is for make updates for client which them O/S don’t support request action.
70
Ayman Fouad shokry
MCSE
Backup:
Server options:
Incase these scope has different specific properties it will have priority before server option properties
Radiance:
It make other DHCP for be backup increase the main DHCP server down.
So we ‘ll create other DHCP server and make the first main DHCP range “ 1-~100” and the backup have
range “101~200” for avoid conflicts and keep range covered.
For make DHCP respond on requests first must increase the delay.
Filter:
Is option has allow or deny for client with mac address and make don’t require nothing from DHCP server.
Authorized:
Is for make DHCP authorized for no one can make fake DHCP and give Fake ip’s and down the main DHCP.
It work only in domain or D.C, can’t work while stand alone.
Multicast Scope:
Is for use multicast with specific clients per them requests and it work with multimedia,
Is for not broadcasting the media with all clients because sure there clients not need that, also can’t use
unicast because it will take a lot of time to replay on each request in replay in share session.
71
Ayman Fouad shokry
MCSE
While installing A.D service will appear “Net Bios Name” sometimes normal or have “0” beside
the name
EX: lab3.com, lab3.com0
Because NetBIOS name check the network if it have already the name exist if it found it already
will add 0 if not it will not add nothing.
Data base:
NTDS: it has the schema table, link table, data table in Active directory.
Sysvol: is responsible for save replicated data while it transferring from D.C to other in windows. And it
need NTFS hard drive.
LADP:
is protocol which take the query and move it and back with answer inside Domain .
Korbous :
Is protocol responsible for secure any traffic happened inside the domain.
Notes:
As you see message “ Domain controller an active directory could not contacted “ be sure is problem of
DNS, also check the firewall sometimes it blocking it.
72
Ayman Fouad shokry
MCSE
How it work :
1st install the 4 roles WDS, AD, DNS, DHCP in the server side.
2nd configuring the 4 roles and insert windows CD/DVD for configuring WDS.
Steps:
“Server manager > WDS> install image > add install image > location “Browse” > sources > install. Win”.
“Server manager > WDS> install image > add install image > location “Browse” > sources> boot. Win”.
3rd make the target device boot from network boot for bios work on DHCP for obtain ip .
Notes:
If there any problem or mistake in any role of server side the whole process going to failure totally.
PXE: is option able the network card obtaining and booting from bios and almost network cards have it.
73
Ayman Fouad shokry
MCSE
It start with NT4 O/S then 2000 with Microsoft until now days, in NT4 it was have PDC”primary
domain controller” and its R/W, also have the additional be BDC” backup domain controller”
and its R only.
But after 2003 it start be D.C “domain controller” and Add D.C “additional domain controller”
both R/W
Simply when have environment without security and away from IT head quarter control and
must use additional D.C for deploy policies on users there but in the same time afraid from virus
or get hacked and been infected in the database of D.C .
In that case the NT4 will be good because the additional be just back up read only so nothing can effect
on the main database on the D.C.
But can use “RODC” option for make an additional domain controller have only read and not
write so it will be more secure more controlled by D.C.
Steps:
“Sever manager > add role> active directory > promote > make it to existing D.C > connect it to
domain > check mark on “RODC” > install”.
74
Ayman Fouad shokry
MCSE
75
Ayman Fouad shokry
MCSE
Notes:
In NT4 O/S when PDC be down the users going to be able work with the current BDC have already but
not able for create or modify anything until make other PDC and give it the control.
76
Ayman Fouad shokry
MCSE
Delegation
Is give normal user some specific options for make specific tasks in active directory and reduce
the pressure on the IT team and not waste them time in simple tasks like add or remove user or
enable or disable.
In the same time can’t give the user full control access in the active directory, so we use for
them taskpad view for make them control only the specific tasks they need.
Steps:
delegation
“Run > type “mmc” > file > add / remove snap in > active directory and users > open > click n ou > right
click > delegation > choose user > choose task > next > choose task “.
77
Ayman Fouad shokry
MCSE
78
Ayman Fouad shokry
MCSE
Taskpad view
“right click on OU > new taskpad view > next > then right click on OU > edit taskpad> choose “task”>
New > next > menu command >next > “choose command “> next choose icon > (check mark on when I
finish run this wizard again)> finish.”
79
Ayman Fouad shokry
MCSE
Notes:
Users which have delegations options will be the only users which can use the tasks options …
normal users will can’t open the hyperlinks.
80
Ayman Fouad shokry
MCSE
Publish resources
Is for make shared folders be shared on Active directory for make users can use it easily because
users usually aren’t educated enough for fix IT problems.
So publish source going to help in that case is create shared folder and publish in all users in 1
place have them tools which they’re need for work “ shared folder , printers , files , etc “ without
need path or IP or change nothing.
Steps:
“Server manager > active directory > Ou > right click > shared folder > give it path > ok “.
81
Ayman Fouad shokry
MCSE
Notes:
*this option going to save a lot of time for not waste on users or users waste in find path or change IP or
printer be offline.
82
Ayman Fouad shokry
MCSE
Backup solutions
Problems:
1st lose or delectation in the domain... Then how can bring back same files with the SID for it work on
users in OU’s again.
3rd when have backup weekly and is for example Sunday but what going to happen when domain be
down at Saturday that will make backup lose 6 days of work.
4th when have online folders like in banks or stoke holders and always someone using folder and can’t
make backup while.
Backup solutions
System
1- System state:-
Is take backup from system state only and it include the SAM files inside and it was could be controlled
perfectly until XP O/S.
2- Image:-
Online application:
1 - Shadow:
Is take flash backup while folders are in use and without effect on the system.
83
Ayman Fouad shokry
MCSE
3 – differential :-
Notes:
For make perfect backup of system state must make image of windows with active directory
“before it be configured “because system state must restored in the same in the same device
with the same SID.
Symantec backup exec 2012 work on only windows server 2008 and below.
84
Ayman Fouad shokry
MCSE
User profile
Windows security requires a user profile for each user account on a computer.
The system automatically creates a local user profile for each user when the user logs on the computer
for the first time.
Users can store their profiles on the servers these are called roaming user profiles.
Automatic resources availability, a user’s unique profile is automatically available when he or she logs on
the any computer on the network, user won’t need to create profile on each computer going to use.
User will find his saved data as it is in any device going to use it.
User must logoff after finish for action be updated and start work in other device.
85
Ayman Fouad shokry
MCSE
1st Routing:
Is service in windows server able device for be router just need it have 2 network cards for it can made 2
networks 10.0.0.x and 20.0.0.x.
2nd NAT:
Is option inside routing service be configured for make network 20.0.0.x and able for access the internet.
- Routing:-
Is service for make device be router and connect 2 networks in the same time.
Steps:
“Server manager > add role > next > remote access > next > choose routing > install > tools > routing and
remote access > right click > configure and enable routing > in the wizard > in the wizard press next >
customized > next > choose lan routing > next > finish “
86
Ayman Fouad shokry
MCSE
87
Ayman Fouad shokry
MCSE
88
Ayman Fouad shokry
MCSE
- NAT:-
Is option responsible for change network IP to other ip for access internet, example cange virtual IP
inside network to Real ip while accessing the internet.
The same steps again but choose 10 > (public) > check mark (enable NAT on interface”.
89
Ayman Fouad shokry
MCSE
90
Ayman Fouad shokry
MCSE
- Relay Agent:-
Is option responsible for to network broadcast and then deliver it for DHCP as broadcast will can’t pass
cause router will stop it so relay agent will change broadcast to unicast and be middleman to send it to
DHCP and back with IP.
Steps:
“server manager > tools > routing and remote access > ipv4 > general > right click > new routing protocol
> DHCP ( right click ) > new interface > first choose listen network > right click on relay > properties > put
IP of DHCP > ok “.
91
Ayman Fouad shokry
MCSE
92
Ayman Fouad shokry
MCSE
RAS
Remote Access server
1st two networks 50.0.0.X and 60.0.0.X need Routing service for they can connect to each other.
2nd DHCP server is at network 50.0.0.X so it will can’t listen to network 60.0.0.X and took the IP to
them.
3rd need use NAT for devices can access to internet because they will have other gateway.
4th remote access from outside network and its not secured as it’s in public worldwide network
and here need use VPN.
Is creating virtual tunnel from remote user to host router and it be secured with virtual ip address
away from hackers.
Steps:
“Server manager > add role > routing and remote access > next > choose (routing) > install > tools > routing
> and remote access > configure > choose VPN properties > set amount of ports”.
93
Ayman Fouad shokry
MCSE
94
Ayman Fouad shokry
MCSE
95
Ayman Fouad shokry
MCSE
- Dial up:-
Network access permission:
Totally allow all remote access.
Notes:
- When client try access RAS will check the AAA in the local device or the AAA/ ISE / radius “which
they have records data of users.
- It will check first if username and password are available and then check user roles and what they
can do when start session m then it going to make log file of session.
Is option for make users can access from specific place and specific device outside the network.
Is give specific path and hops for users incase network has many routers.
96
Ayman Fouad shokry
MCSE
Trust
In domain “A” user can use printer inside the domain with its G.P.O.
But user of domain “B” can also use the printer of domain “A”, just as domain “A” user “B” trust
each other.
When domain “A” trust domain “B” it will be two ways trust and is going to allow both users use
each other printers and data and sure every user will use with his own G.P.O.
As long as domain “A” parent trust domain “B” child and domain “C” child domain “B” and “C”
going to transitive trust and that will happen automatically.
But when want trust domain from outside forest “D” must make external trust but it won’t have
transitive trust.
EX:
When new vision company buy VUE Company it will can’t delete all database and build newer with
policies of VUE so going to use external trust for connect both companies without rebuild over new
97
Ayman Fouad shokry
MCSE
Function level
Is option while installing domain controller in first domain in the first domain are doing the
function level option will be shown and it has “2003-2008-2012” but can’t downgrade if once
raise to other level.
When DC be 2003 then can be 2008 or 2012 and users can be any OS.
98
Ayman Fouad shokry
MCSE
Notes:
99
Ayman Fouad shokry
MCSE
Domain Group
1) Distribution:
2) Security:
Is for apply permissions on groups.
- Groups scope:
1) Domain local group:
2) Global group:
3) Universal:
100
Ayman Fouad shokry
MCSE
Site
- Site definition:
Domain controller are replicating data every 15 sec and can’t be managed or make specific
hourly for it and that loading on the wan link cause beside replicating D.C data its replicating
DHCP and DNS data and requests that beside normal users data transferring.
Using site to divide main default site for 2 sites 1 is the default other be created like in figure 2
Create site link for less the load on wan link and for be controlled with specific hourly.
When servers start replicate it repeat itself many times for example in figure 2 the EG site
servers add it replicate its data with the sites 2 servers then with its D.C then D.C replicate its
data + add data and its mean replicate repeat the same many times, then we make 1 server in
each site are responsible for replicating.
101
Ayman Fouad shokry
MCSE
Steps:
“Server manager > tools > active directory sites and services > right click on site > new site > rename the
default site > right click on subnet > put range”.
102
Ayman Fouad shokry
MCSE
- Site link:
In inter-site transport > right click on site > add replication > after finish put sites inside server folder.
Server (name) > properties > general tab > add “IP” option to this server is preferred bridge head.
103
Ayman Fouad shokry
MCSE
Operation Masters
When Master “first DC “be down the additional be automatically read only.
Any task DC had add it or made it will need 5 operation masters for be done.
- 5 operation masters:-
Per forest:-
1- Schema master.
2- Domain name master.
Per domain:-
3- PDC emulator.
4- RID “Relative identifier”.
5 Infra-structure.
104
Ayman Fouad shokry
MCSE
Notes:
- Schema master:
- PDC:
1- Is responsible for group policy management.
2- Is responsible for password changes.
3- Is responsible for organizing the time for the whole domain.
- RID:
is responsible for give users tag if there the same SID in the domain, for can identify the difference.
- Infrastructure:
Responsible for follow objects which have updates and transfer the update notes to D.C.
Server manager > tools > active directory domain and trusts > right click on AD domain and trust >
operating master > change.
105
Ayman Fouad shokry
MCSE
Server manager > tools > active directory users and computers > right click on server > operating masters
> RID “change” > PDC “change” > infrastructure “change”.
Run > mmc > file > add/remove snap in > add “active directory schema” > change active server > choose
current device > right click > operation master > change.
106
Ayman Fouad shokry
MCSE
Global catalog
Is small copy of schema master but has the most common attribute in every domain.
EX: have domain has inside it 3 sites users complaints that authentication are slow that because user must
move to main D.C because it has global catalog,
So must create additional D.C and put inside it copy of global catalog.
Server manager > tools > active directory users and computers > default first site name > server name >
right click properties > check mark on global catalog.
Notes:
107
Ayman Fouad shokry
MCSE
Migration:
Company with domain and it work with windows server 2008 and want to migrate it to 2012 windows
server,
Without losing the data or group policy, and without down the server.
Steps:
Time sync:
108
Ayman Fouad shokry
MCSE
Computer User
- .msi - . msi , .zap
- Assign - Assign , publish
Steps:
First must put software in shared folders and make sure it have at least read permission and also in
security, and while search, search with same ip of domain.
Server manager > tools > group policy management > software installation > new > package > choose
software > assign > publish
Server manager > tools > group policy management > computer/users > d.c > software installiation > right
click on S.W > remove
Notes:
Assign:
Is make the deployed software appear in start menu and control panel.
Publish:
Is appear in file invocation and control panel and can hide it.
109
Ayman Fouad shokry
MCSE
1) General:-
- Default package location:
It has the shared file location, for any D.C user can find the shared s.w folder.
- When adding new package to user settings:
Is for display the deployment, assign, publish.
2) Advanced:-
If it has check mark it will remove the S.W when user change the Ou, because every OU has its policy.
But if unchecked then user can have his S.W in other Ou, but its risk because it may cause a conflicts.
3) File extension:-
When program have 2 version one is old and other is newer, in this tab can choose which of versions is
going to install when user open the icon.
4) Categories:-
Is for make category for each user which want give the specific S, W without see all S.W.
5) Modification:-
When have multinational company it have branches in all over the world and more than 1 branch in each
country , and for example have Microsoft office for deploy and with it languages packs this language file
must be work as ” .mst” Extend for it work.
When do it each Ou will have language as admin specific for the country language.
110
Ayman Fouad shokry
MCSE
NLB
Network load balancing protocol
1) Round robins :
Is feature in DNS responsible for rotate requests for services hosts, web servers, FTP servers, by managing
the domain name system “DNS” responses to address requests from client computers according to an
appropriate statically.
EX:
The hosts inside cluster can be configured the load that is to be handled by each host; you can also add
hosts dynamically to the cluster to handled increase load.
NLB support up to 32 computers in a single cluster.
Manageability:
1) Specify the load balancing behavior for single ip port by using port management.
2) Define different port rules for each website.
3) Direct all clients’ requests to a single host by using option “single host rule”.
4) Block undesired network access to certain ip ports.
5) Enable “IGMP” internet group management protocol” support on cluster hosts to control switch
port flooding “when incoming network packets are sent to all ports on switch”.
6) Start, stop and control the NLB actions from its properties.
7) Drain stop is stop getting incoming requests till finish the current requests then it will stop, for
not down the server.
111
Ayman Fouad shokry
MCSE
Installation Steps:
- 1st in the devices which will join the virtual cluster install the IIS role for devices be webservers.
- Make sure firewall is disabled for webservers be able to communicate.
“Server manager > tools > add role > IIS > next > install”.
112
Ayman Fouad shokry
MCSE
“Sever manager > tools > add features > net load balance > next > install”.
113
Ayman Fouad shokry
MCSE
Edit port rule > choose affinity “None” > press “ok”
114
Ayman Fouad shokry
MCSE
- 4th in DNS server create record with name and ip different than other devices in network “virtual
cluster”.
“Server manager > DNS > create “AAA” > name it “WWW” > browse > choose the webserver
- 5th in NLB
“NLB > right click on cluster > add host to cluster > type ip > connect > next“.
115
Ayman Fouad shokry
MCSE
Check it from open internet explorer and type http://domainname.com if it open then it work perfectly...
Also u can disable device 1 network card then check if 2nd will can work automatically.
116
Ayman Fouad shokry
MCSE
Open internet explorer and type http://ayman.com u will find the device 1 iis image because it have
priority 1
Now disable device1 network card and try again will find the device2 iis appear
117
Ayman Fouad shokry
MCSE
Notes:
- Filtering mode:
Affinity must be “none” for client when requests, devices be rotated between them and clients.
- Unicast mode:
It need huge firm and each device must has 2 network cards and it’s not allowed to communicate to each
other.
- Round robin:
Cant load balance on the NLB clusters or members cause it support only 1 device.
- IIS:
Devices which have records must have iis service “internet info’s services”, for when devices requests web
service the other can respond.
118
Ayman Fouad shokry