0% found this document useful (0 votes)
128 views27 pages

Windows Server Administration

This document provides an overview of Windows server administration. It discusses what servers are and their roles, how to select server hardware and software, how to install Windows Server 2008 R2 through various methods, and how to manage servers after installation through Windows updates and licensing. Key topics covered include server roles like file, print and web services, requirements for installation, and ensuring servers are properly licensed and receive critical updates.

Uploaded by

Patricia Ann
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views27 pages

Windows Server Administration

This document provides an overview of Windows server administration. It discusses what servers are and their roles, how to select server hardware and software, how to install Windows Server 2008 R2 through various methods, and how to manage servers after installation through Windows updates and licensing. Key topics covered include server roles like file, print and web services, requirements for installation, and ensuring servers are properly licensed and receive critical updates.

Uploaded by

Patricia Ann
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

WINDOWS SERVER ADMINISTRATION

ITE 3205

PREREQ

JUNIOR STANDING

UNDERSTANG WHAT A SERVER DOES?

A server is a computer that is meant to be a dedicated

service provider, and a client is a computer that requests

services.

A network that is made up of dedicated servers and clients

is known as a client/server network.

A server-based network is the best network for sharing

resources and data, while providing centralized network

security for those resources and data.

WHAT IS SERVICES?

YOUR OS

When you access a web page over the Internet,

access your email, access a data file on another

computer, or access a printer that is connected to the

network, you are requesting services.


SERVER OS

-They can also request services from other computers.

-For example, they can access a web server locally or over

the Internet, access a software repository, or print to a

network printer.

DETERMINING HARDWARE AND SOFTWARE

Look at the role the computer needs to fill and the load the computer will be placed under.

Disaster recovery is a MUST!

Plan your server growth(3 to 5 years)

SERVER ROLES

A server role is a primary duty that a server performs

Server could have multiple roles.

• File services

• Print services

• Web services
• Remote access

• Application servers

• Email server

• Database server

• Monitoring servers

• Threat management servers

SERVER ROLES

A server role is a primary duty that a server performs

Server could have multiple roles.

• File services-centrally locate files to be accessed by multiple people(server message

block.

• Print services-hare an expensive heavy-duty, or fast, printer that supports advanced options

• Web services- users can access web pages using their browsers. (IIS,HTTP,HTTPS)

• Remote access- supports multiple inbound requests in connecting to the server or network.(VPN)

• Application servers -provides an integrated environment for deploying and running server-based

business application
• Email server -stores and manages electronic messages (email) among users.

• Database server

• Monitoring servers

• Threat management servers

Selecting Server Hardware

The server is designed to provide network services.

Server is usually much more powerful than most client PCs.

Choose hardware that is less prone to failure than a normal client PC and that has some redundancy

built in.

Create a plan so you know how to deal with these problems when they occur.

Selecting Server Hardware

These are the primary subsystems that make up a server:

• Processor

• Memory

• Storage
• Network

NOTE: If any of these fails, the entire system can fail.

Selecting Server Hardware

UNDERSTANDING THE PROCESSOR(multi-core)

They use other technologies to keep the processor working at peak efficiency, like using an

assembly line approach or trying to anticipate what needs to be done first so that the

pipelines are always clear for new tasks.

Selecting Server Hardware

UNDERSTANDING THE PROCESSOR(multi-core)

Having additional cores doesn’t always mean a linear

increase in performance.

Example:

Having two cores doesn’t always mean that you get double

the performance. In these cases,performance is limited by

how well the software is optimized to use both cores.

Selecting Server Hardware

UNDERSTANDING THE PROCESSOR(multo-core)


With more data in memory, a 64-bit processor can work

faster because it can access larger amounts of RAM

instead of swapping data back and forth with the much

slower disks.

Microsoft’s Hyper-V, which is Microsoft’s virtualization software, you need to have

processors and basic input/output systems (BIOS) that support virtualization technology.

Others that must be consider

RAM

STORAGE

NETWORK

CONNECTIONS

THE MOTHERBOARD

POWER SUPPLIES AND

CASES

PORTS

COMPARING SERVERS AND WORKSTATIONS

COMPARING PHYSICAL SERVERS AND VIRTUAL

SERVERS
bare-metal server,’ is a single-tenant computer

server, meaning that a specific physical server is

designated to a single user.

“multi-tenant” environment, meaning that

multiple VMs run on the same physical hardware.

LOCATING THE SERVER

Check the size of the rack

Selecting the Software

Selecting the Software

Selecting the Software

INTRODUCING SERVER ROLES IN WINDOWS

SERVER 2008 R2

INTRODUCING SERVER ROLES IN WINDOWS

SERVER 2008 R2

INTRODUCING SERVER ROLES IN WINDOWS

SERVER 2008 R2

COMPARING FULL VERSION AND SERVER CORE


Server Core installation provides a minimal

environment with no Windows Explorer shell for

running specific server roles and no Start button.

COMPARING FULL VERSION AND SERVER CORE

A Server Core machine can be configured for the following roles:

• Active Directory Lightweight Directory Services (ADLDS)

• DHCP Server

• DNS Server

• Domain controller/Active Directory Domain Services

• File Services (including DFSR and NFS)

• IIS 7 web server (but does not include ASPNET, .Net Framework, IIS

Management

Console, IIS Legacy Snap-In, and IIS FTP Management)

• Print Services

• Streaming Media Services

• Terminal Services including Easy Print, TS Remote Programs, and

TS Gateway
• Windows Server Virtualization

COMPARING FULL VERSION AND SERVER CORE

A Server Core machine can be configured for the following features:

• Backup

• Bitlocker Drive Encryption

• Failover Clustering

• Multipath IO

• Network Load Balancing

• Removable Storage

• Simple Network Management Protocol (SNMP)

• Subsystem for UNIX-based applications

• Telnet client

• Windows Internet Name Service (WINS)

WINDOWS SERVER ADMINISTRATION


ITE 3205

PREREQ

JUNIOR STANDING

Installing Windows Server 2008 R2

SYSTEM REQUIREMENTS

Performing Clean Installations

-it is installing the software from scratch on a

new drive or on a newly

reformatted drive.

Many people find that doing a clean install of

an operating system is the best way to go

because you are starting fresh.

Disadvantage

-the system and all of its software needs

to be reinstalled, patched, and configured and

data copied over, something that may take

hours or even days.


Note: click the load driver disk for SCSI and Raid

Performing an Upgrade

You can upgrade (using an upgrade installation) from the previous versions of Windows to Windows

Server 2008 R2

Note: you cannot perform an in-place upgrade from 32-bit to 64-bit architecture since all editions of

Windows Server 2008 R2 are 64-bit only.

Performing an Upgrade

GUIDELINES

•Verify that the current server will support Windows

Server 2008 R2. In addition, make sure you have the

appropriate drivers before installation.

• Update your antivirus program, run it, and then disable

it. After you install Windows, remember to re-enable the

antivirus program, or install new antivirus software that

works with Windows Server 2008 R2.

• Back up your files. You can back up files to an external

hard disk, a DVD or CD, or a network folder.

•Connect to the Internet. These updates include

security updates and hardware driver updates that can

help with installation.


Disk Cloning and System Preparation Tool

Cloning

It include the same parameters, including the same computer name and security identifier

(SID).

run the system preparation tool (Sysprep), which removes the security identifiers and all other

user-specific or computer-specific information from the computer before you run the disk

cloning software to make the cloned disk image.

c:\Windows\System32\sysprep or thec:\Windows\SysWOW64\sysprep

The /generalize prepares the Windows installation to be imaged.

Performing an Unattended Installation

an installation that requires little interaction to install.

To perform an unattended installation of Windows, you would use an answer file. An

answer file is an XML file that stores the answers for a series of graphical user interface

(GUI) dialog boxes.

The /generalize prepares the Windows installation to be imaged.

Using Windows Deployment Services(WDS)


a technology from Microsoft for network-based installation of Windows operating system

including Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008.

Windows Imaging Format (WIM)

-file-based imaging format that Windows Server uses for rapid installation on a new

computer.

Understanding Windows Licensing

The typical restriction limits you to use only one copy of the software per license and prohibits

you from distributing or copying the license in any way (except for backup purposes).

Licenses for enterprise-class server software (such as Microsoft Exchange or Microsoft SQL)

could also require a Client Access License (CAL) for each user that is to access the server

software.

Understanding Windows Activation

-is an anti-piracy technology designed to verify that software products are legitimately licensed.

-reduce software piracy through casual copying and hard drive cloning.

Understanding Windows Updates

-includes fixes, patches, service packs, and device drivers, and apply them to the Windows system.

-for stablity and security.


Understanding Windows Updates

-includes fixes, patches, service packs, and device drivers, and apply them to the Windows system.

-for stablity and security.

For small environments, you can configure your system to perform Auto Updates to ensure

that critical, security and compatibility updates are made available for installation automati_x0002_cally

without significantly affecting your regular use of the Internet.

Understanding Windows Updates

-If Windows update fails to get updates, you should check your proxy settings in Internet Explorer to

determine whether it can get through your proxy server (if any) or firewall.

Managing Windows Server 2008 R2

ITE 3205

PREREQ

JUNIOR STANDING

Managing Windows Server 2008 R2

Initial Configuration Tasks that

automatically launch when you

first log on to Windows.


activate Windows

set the time zone

configure networks

provide computer name and

domain

update Windows

add roles and features

enable remote desktop

configure the Windows Firewall

Using Control Panel

It is the main graphical utility to configure the

Windows environment and hardware devices.

Understanding User Account Control

Prevent unauthorized changes to your computer.

Designed to make sure that unauthorized changes are not made, especially by malicious software that

you may not know you are running.


Task w/out admin permission

Install updates from Windows Update

Install drivers from Windows Update or those that

are included with the operating system.

View Windows settings.

Pair Bluetooth devices with the computer

Reset the network adapter and perform other

network diagnostic and repair tasks

Understanding User Account Control

Changing Computer Name and Domain Settings

Every computer must have a unique computer name assigned to a network.

If two computers have the same name, one or both of the computers will have trouble communicating
on

the network.

A workgroup is usually associated

with a peer-to- peer network in

which user accounts are

decentralized and stored on each


individual computer.

Changing Computer Name and Domain Settings

A domain is a logical unit of

computers that define a security

boundary, and it is usually

associated with Microsoft’s Active

Directory

Configuring Remote Settings

You can access a computer running Windows with another computer that is connected to the

same network or over the Internet just as if you were sitting in front of the server

The /generalize prepares the Windows installation to be imaged.

Designed for support personnel to connect to an active login session to assist or troubleshoot a

problem

Configuring IP Address Settings

For a server to serve other clients, it will need connect to and communicate over the network.

Therefore, you need to know how to connect the server and configure the TCP/IP properties.

IP address and its corresponding subnet mask (uniquely identifies

the computer using a logical address)

Default gateway (nearest router that connects to the other


networks or the Internet)

One or more DNS servers provide name resolution (domain/host

name to IP address)

Configuring IP Address Settings

The IP address, subnet mask, default gateway, and DNS servers

can be configured manually or automatically via a DHCP server.

Proxy Server

s used to translate between public and private networks using Network Address Translation

(NAT).

A proxy server hides the internal addresses and allows you to have a multitude of private

addresses.

Managing Devices and Device Drivers

Device drivers are programs that control a device.

You can think of them as a translator between the device and the operating system and

programs that use the device.

Note :Because a computer running Windows Server 2008 R2

can have a wide array of devices, it can sometimes be a

challenge to make all devices operate correctly, especially

because servers often have nonstandard hardware that may


require you to manually install or update drivers.

Understanding Plug and Play Devices

- where you install or connect a device, and the device is automatically recognized and configured, and

the appropriate driver is installed.

System Resources

Interrupt request (IRQ) line numbers Interrupt request (IRQ) line numbers: A signal sent

by a device to get the attention of the processor when the device is ready to accept or send

information.

Direct memory access (DMA) channels: Memory access that does not involve the processor.

Input/output (I/O) port addresses: A channel through which data is transferred between a

device and the processor. The port appears to the processor as one or more memory addresses

that it can use to send or receive data.

Memory address ranges: A portion of computer memory that can be allocated to a device and

used by a program or the operating system. Devices are usually allocated a range of memory

addresses.

Understanding Signed Drivers

It help fight faulty drivers.

Although signed drivers will not fix a faulty driver, they make sure the publisher of the driver is

identified, the driver has not been altered, and the driver has been thoroughly tested to be reliable so
that it will not cause a security problem.

A device driver that includes a digital signature,

which is an electronic security mark that can

indicate the publisher of the software and

information that can show if a driver has been

altered.

Using Device Manager

provides you with a graphical view of the hardware (internal and exter- nal) that is installed on your

computer and gives you a way to manage and configure your devices.

Using Device Manager

Driver Details: Shows the driver file(s) and their location, the provider of the driver, the version of the

file, and the digital signer of the file.

Update Driver: Allows you to update the driver software for a device.

Roll Back Driver: Used to roll back a driver if problems exist when you update a device driver. If

there’s no previous version of the driver installed for the selected device, the Roll Back Driver button

will be unavailable.

Disable/Enable: Instead of uninstalling the driver, you can use the Device Manager to disable the

device.

Uninstall: Used to remove the driver software from the computer.


Using Microsoft Management Console and

Administrative Tools

-It provides a standard method to create, save, and open the various administrative tools provided by

Windows.

To start an empty MMC, go to the command prompt, Start Search box or

Run box, type mmc or mmc.exe

Using Microsoft Management Console and

Administrative Tools

Administrative Tools is a folder in the Control Panel that contains tools for system administra- tors and

advanced users.

• Component Services: Configure and

administer Component Object Model (COM)

components. Component Services is

designed for use by developers and

administrators.

Using Microsoft Management Console and

Administrative Tools

Administrative Tools is a folder in the Control Panel that contains tools for system administra- tors and

advanced users.
• Computer Management: Manage local or

remote computers by using a single,

consolidated desktop tool.

Using Computer Management, you can

perform many tasks, such as monitoring

system events, configuring hard disks, and

managing system performance.

Using Microsoft Management Console and

Administrative Tools

• Data Sources (ODBC): Use Open Database Connectivity (ODBC) to move data from

one type of database (a data source) to another.

• Event Viewer: View information about significant events, such as a program starting or

stopping, or security errors, that are recorded in event logs.

• iSCSI Initiator: Configure advanced connections between storage

Using Microsoft Management Console and

Administrative Tools

Administrative Tools is a folder in the Control Panel that contains tools for system administra- tors and

advanced users.

• Local Security Policy: View and edit Group Policy


security settings.

• Performance Monitor: View advanced system

information about the processor, memory,

hard disk, and network performance.

• Print Management: Manage printers and print servers

on a network and perform other

administrative tasks.

Using Microsoft Management Console and

Administrative Tools

Administrative Tools is a folder in the Control Panel that contains tools for system administra- tors and

advanced users.

• Security Configuration Wizard: A

wizard that walks you through how to

create a security policy that you can apply

to any server on the network.

Using Microsoft Management Console and

Administrative Tools

Administrative Tools is a folder in the Control Panel that contains tools for system administra- tors and

advanced users.
• Server Management: A console that allows

you to manage and secure multiple server roles

including managing the server’s identity,

system information; displaying server status;

identifying problems with the server role

configuration; and managing all roles

installed on the server.

Using Microsoft Management Console and

Administrative Tools

Administrative Tools is a folder in the Control Panel that contains tools for system administra- tors and

advanced users.

• Services: Manage the different services that run in the background on your computer.

• Share and Storage Management: A centralized location for you to manage folders

and volumes that are shared on the network and volumes in disks and storage

subsystems.

• Storage Explorer: View and manage Fibre Channel and iSCSI fabrics that are available

in your storage area network (SAN).

• System Configuration: Identify problems that might be preventing Windows from


running correctly.

• Task Scheduler: Schedule programs or other tasks to run automatically.

• Windows Firewall with Advanced Security: Configure advanced firewall settings on

both this computer and remote computers on your network.

• Windows Memory Diagnostics: Check your computer’s memory to see whether it is

functioning properly.

• Windows PowerShell Modules: A task-based command-line shell and scripting language

designed especially for system administration.

• Windows Server Backup: Back up and restore the server.

Using Computer Management Console and Server

Management Console

The Remote Server Administration Tools-allowing you to open and run management tools and snap-ins
to

manage roles, role services, or features on a remote computer.

Installing Programs, Roles, and Features

By default, most of the roles and features that are available for Windows Server 2008 must
be installed or enabled before you can use them. This is to reduce the surface attack that

hackers or malicious software can utilize.

A server role is a set of software programs that, when installed and properly

configured, enables a computer to perform a specific function for multiple users or

computers within a network.

Installing Programs, Roles, and Features

Managing Services-A service is a program, routine, or process that performs a specific system function to

support other programs or to provide a network service.

Installing Programs, Roles, and Features

Understanding the Registry-The registry is a central, secure database in which Windows stores all

hardware configu_x0002_ration information, software configuration information, and system security


policies.

Registry

HKEY_CLASSES_ROOT: Stores information about

registered applications, such as the file association

that tells which default program opens a file with a

certain extension.

• HKEY_CURRENT_USER: Stores settings that are

specific to the currently logged-in user. When a user

logs off, the HKEY_CURRENT_USER is saved to


HKEY_USERS.

• HKEY_LOCAL_MACHINE: Stores settings that are

specific to the local computer.

• HKEY_USERS: Contains subkeys corresponding to

the HKEY_CURRENT_USER keys for each user

profile actively loaded on the machine.

• HKEY_CURRENT_CONFIG: Contains information

gathered at run time. Information stored in this key is

not permanently stored on disk, but rather

regenerated at the boot time.

Managing Server Core

Server Core installation provides a minimal environment with no Windows Explorer shell for running
specific

server roles and no Start button

MANAGE A SERVER CORE SERVER USING AN

MMC SNAP-IN

You might also like