0% found this document useful (0 votes)
15 views

Understanding Windows Server Administration - Level 100 - Document

Uploaded by

Hector Rivera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Understanding Windows Server Administration - Level 100 - Document

Uploaded by

Hector Rivera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 137

Understanding Windows

Server Administration
Level 100

Ashwin Venugopal
BinaryTitans IT Solutions Pvt. Ltd.
www.binarytitans.com

www.binarytitans.com
What we are going to
Learn here?

www.binarytitans.com
 Server Overview
 Initial Configuration Tasks
 Managing Storage
Content  Essential Services
 File and Print Services
 Popular Windows Network Services and Applications
 Monitoring and Troubleshooting Servers

www.binarytitans.com
Server Overview

www.binarytitans.com
 Server - A computer that is a meant to be a dedicated service
provider
Server  Client - A computer that requests services.
Overview  System Administrators be working on a network that is made up
of dedicated servers and clients.

www.binarytitans.com
 When you are figuring out the hardware and software needs we
need to look at the role the server needs to do and what kind of
load does that need to take.
Server Roles  So a server role means the primary duty that the server performs.
 A server could have multiple roles.

www.binarytitans.com
 Primary subsystems that make up a server are:
 Processor
Primary  Memory
Subsystems of 

Network
Storage
a Server  If any of these fails or under performs, it can compromise the
service.

www.binarytitans.com
 This is also called the brain of the computer.
 Intel and AMD produce most of today’s server processors.
 Qualcom and MediaTek produce most of the mobile processors.
Processor
 Processors can be are 32 bit as well 64 bit
 Server processors are mostly 64-bit, because it works faster than
the older 32-bit processors.

www.binarytitans.com
 RAM - random access memory - temporary memory.
 It stores instructions and data and the processor accesses them
directly.
RAM  If you have more RAM, you can load more instructions and data,
making it faster and more efficient.
 Windows Server 2012 R2 or the latest 2016 supports maximum of 4
TB of RAM

www.binarytitans.com
 Hard drives are generally half electronic/half mechanical devices
that store magnetic fields on rotating platters.
 Solid-state drives are electronic devices with no mechanical
components.

Storage  Storage can be


 local storage
 internal hard drives
 external storage
 network-attached storage (NAS)
 storage area network (SAN).

www.binarytitans.com
 A good network connection is necessary for the server to
communicate with other servers or the clients.
 Most servers include more than one network interface cards or
Network NICs.
 We can combine multiple network cards together for performance
and redundancy reasons using NIC Teaming.

www.binarytitans.com
 Motherboard brings these four subsystems together.

Motherboard

www.binarytitans.com
 Communication with disks, RAM, monitor etc are kept in the
System ROM chips known as the BIOS (basic input/output
system).
BIOS  BIOS helps the system to know how to communicate with some
basic components such as a keyboard.
 The process of upgrading or updating your system ROM BIOS is
called flashing the BIOS.

www.binarytitans.com
 A case provides an enclosure that helps protect the system
components that are inside.
Power Supply
 A case with the power supplies and additional fans are usually
and Cases designed to provide a fair amount of airflow through the system
to keep the system cool.

www.binarytitans.com
 Ports are plug sockets that enable you to connect an external
device, such as a printer, keyboard, mouse, or external drive, to
your computer.

Ports

www.binarytitans.com
 Virtualization enables multiple operating systems to run
concurrently on a single physical machine.
 This allows for a separation of services so that changes on one
Virtualization virtual server do not affect the other virtual servers.
 In addition, it offers a way to better utilize hardware since most
hardware is sitting idle most of the time.

www.binarytitans.com
 The server room contains the servers and most of the
Server Room communication devices including switches and routers.

(Data Center)  The room should be secure, with only a selected people allowed to
have access to it.

www.binarytitans.com
 Windows NT (first released in 1993) is a family of operating
systems produced by Microsoft.
Windows  Since then, Microsoft has released Windows 2000 Server, Windows
Server Server 2003, Windows Server 2003 R2, Windows Server 2008,
Windows Server 2008 R2, Windows Server 2012, Windows Server
2012 R2, Windows Server 2016.

www.binarytitans.com
 Similar to previous Windows Servers, Windows Server 2008 R2 will
be released with six editions. These are the most common
editions:
 Windows Server 2016 Standard edition
 Windows Server 2016 Datacenter edition
Windows  Windows Server 2016 Foundation edition

Server 2016 
Microsoft Hyper-V Server 2016
Windows Storage Server 2016 Workgroup edition
 Windows Storage Server 2016 Standard edition

 Windows Server 2016 is only available in 64-bit version.


.

www.binarytitans.com
 A server is designed to provide services.
 Windows Server has organized the most common services into
Windows server roles.
Server Roles  Windows Server features are software programs that are not
directly part of a role, but they can provide additional
functionality.

www.binarytitans.com
 You can install Windows Server 2016 in one of three modes:
 Full Version
 Server Core
 Nano Server

 The full version is the normal version that you would expect from
Full Version Windows with a fully functional GUI interface.
 Server Core installation provides a minimal environment with no
Server Core Windows Explorer shell for running specific server roles and no
Nano Server Start button.
 Nano Server is a remotely administered server operating system
and is optimized for private clouds and datacenters. This is
significantly smaller than Core Server and has no local logon
capability.
 This Nano Server installation option is available for Standard and
Datacenter editions of Windows Server 2016.

www.binarytitans.com
 Processor
 Minimum
 1.4 GHz 64-bit processor

 RAM
Windows  Minimum
Server 2016  512 MB
 ECC (Error Correcting Code) type or similar technology
System (Recommended)

 Disk space requirements


Requirements  Minimum
 32 GB

 Network adapter requirements


 An Ethernet adapter capable of at least gigabit throughput

www.binarytitans.com
Different
Installation  A clean installation is installing the software from scratch on a new
drive or on newly reformatted drive.
Options
 The disadvantage is that the system and all of its software needs
to be reinstalled, patched, and configured and data copied over,
something that may take hours or even days.
Clean
Installation

www.binarytitans.com
Different
Installation  Upgrade from an older version of Windows to Windows Server
2016.
Options  You cannot perform an in-place upgrade from 32-bit to 64-bit
architecture.

Performing an  You also cannot upgrade from one language to another.

Upgrade

www.binarytitans.com
Different
Installation  One way to install Windows Server 2008 R2 is to clone an already
installed system in to an image file.
Options  Create new servers using this cloned image.

Cloning

www.binarytitans.com
Different  An unattended installation is an installation that requires little
interaction to install.
Installation  All the inputs required during the Installation are written on an
Options answer file.
 An answer file is an XML file that stores the answers for a series of
graphical user interface (GUI) dialog boxes.
Unattended  You can use any text editor such as notepad to create and modify
Installation the answer file.

www.binarytitans.com
Different
Installation  Windows Deployment Services (WDS) is a technology from
Options Microsoft for network-based installation of Windows operating
system including Windows XP, Windows Vista, Windows Server
2003, Windows Server 2008, Windows Server 2008 R2, Windows
Server 2012, Windows Server 2012 R2, Windows Server 2016.
Windows  The deployment of Windows can be fully automated and
Deployment customized through the use of unattended installation scripting
files.
Services
(WDS)

www.binarytitans.com
 A software license is given to you from a software company like
Microsoft that gives you permission to use a specific software
Windows package.
Licensing  Most licenses from corporations such as Microsoft work more like
a lease rather than a purchase of the actual software.

www.binarytitans.com
 Microsoft product activation, including Windows activation, is an
anti-piracy technology designed to verify that software products are
legitimately licensed. If the server is not activated, it could restart
every hour.

Windows
Activation

www.binarytitans.com
 After installing Windows, we need to check whether Microsoft has
any Windows updates. This will include fixes, patches, service packs,
and device drivers..
Windows
 By adding fixes and patches, you will keep Windows stable and
Updates secure.
 If there are many fixes or patches, Microsoft releases them together
as a service pack or a cumulative package.

www.binarytitans.com
Windows
Updates

www.binarytitans.com
Initial Configuration
Tasks

www.binarytitans.com
 Configure the IP address
 Set the computer name
 Join an Active Directory domain
Initial
 Configure the time zone
Configuration  Enable automatic updates
Tasks  Add roles and features
 Enable Remote Desktop
 Configure Windows Firewall settings

www.binarytitans.com
IP address
classes and
Ranges

www.binarytitans.com
Managing Storage

www.binarytitans.com
 IBM 305 RAMAC
 Random Access Method of
The first HDD Accounting and control.
 4 MB
(1956)
 50x24” disks
 1200 rpm

www.binarytitans.com
The first HDD
(1956)

Play

www.binarytitans.com
The internal
look of HDD
(Current HDD)

www.binarytitans.com
 Access Time = Seek Time + Rotational Delay + Transfer Time

Data access of
HDD

www.binarytitans.com
 A RAID is a Redundant Array of Inexpensive Disks.
RAID  “I” can also be called as“Independent”

introduction  Disks are small and cheap, so it’s easy to put lots of disks (10s to
100s) in one box for increased storage, performance, and availability.

www.binarytitans.com
 Level 0 is non-redundant disk array
 Files are Striped across disks, no redundant info
 High read throughput
 Best write throughput (no redundant info to write)
 Any disk failure results in data loss

RAID 0
Stripe 0 Stripe 1 Stripe 2 Stripe 3

Stripe 4 Stripe 5 Stripe 6 Stripe 7

Stripe 8 Stripe 9 Stripe 10 Stripe 11

data disks

www.binarytitans.com
 Level 0 is non-redundant disk array
 Mirrored Disks, data is written to two places
 On failure, just use surviving disk
 On read, choose fastest to read
 Write performance is same as single drive, read performance is 2x better
 Expensive

RAID 10
RAID 1 Stripe 0 Stripe 1 Stripe 2 Stripe 3 Stripe 0 Stripe 1 Stripe 2 Stripe 3

Stripe 4 Stripe 5 Stripe 6 Stripe 7 Stripe 4 Stripe 5 Stripe 6 Stripe 7

Stripe 8 Stripe 9 Stripe 10 Stripe 11 Stripe 8 Stripe 9 Stripe 10 Stripe 11

data disks mirror copies

www.binarytitans.com
 Block-level parity with Stripes
 A read accesses all the data disks
 A write accesses all data disks plus the parity disk
 Heavy load on the parity disk

RAID 4
Stripe 0 Stripe 1 Stripe 2 Stripe 3 P0-3

Stripe 4 Stripe 5 Stripe 6 Stripe 7 P4-7

Stripe 8 Stripe 9 Stripe 10 Stripe 11 P8-11

Parity disk
data disks

www.binarytitans.com
 Block Interleaved Distributed Parity
 Like parity scheme, but distribute the parity info over all disks (as
well as data over all disks)
 Better read performance, large write performance

RAID 5
Stripe 0 Stripe 1 Stripe 2 Stripe 3 P0-3

Stripe 4 Stripe 5 Stripe 6 P4-7 Stripe 7

Stripe 8 Stripe 9 P8-11 Stripe 10 Stripe 11

data and parity disks

www.binarytitans.com
 Level 5 with an extra parity
 Can tolerate two failures

RAID 6
Stripe 0 Stripe 1 Stripe 2 Stripe 3 P0-3 Q0-3

Stripe 4 Stripe 5 Stripe 6 P4-7 Q4-7 Stripe 7

Stripe 8 Stripe 9 P8-11 Q8-11 Stripe 10 Stripe 11

data and parity disks

www.binarytitans.com
NAS
 Network attached storage (NAS) is a file-level data storage device
(Network that is connected to a network and provide shared drives or folders.
Attached  NAS devices usually contain multiple drives in a form of RAID.
Storage)

www.binarytitans.com
SAN  A storage-area network (SAN) is a dedicated high-speed network (or
(Storage Area subnetwork) that interconnects and presents shared pools of
storage devices to multiple servers.
Network)

www.binarytitans.com
Host Bus
 A host bus adapter (HBA) connects a computer to a network or
Adapter storage device.
(HBA)

www.binarytitans.com
LUN  LUN (Logical unit numbers) allow a SAN to break its storage down
(Logical unit into manageable pieces, each LUN can be assigned to one or more
servers in the SAN.
numbers)

www.binarytitans.com
 Optic fibre cabling gives you a higher bandwidth and also can be
used over longer distances compared to copper cabling.
Fibre Channel  Fibre Channel or FC is a gigabit-speed technology heavily used for
storage networking.
 It uses a Fibre Channel Protocol (FCP) as its transport protocol.

www.binarytitans.com
 Internet Small Computing System Interface or iSCSI is an Internet
Protocol (IP)-based storage networking standard for linking data
storage facilities.
iSCSI
 iSCSI allows clients to send SCSI commands over a TCP/IP network
using TCP port 3260.

www.binarytitans.com
 A file system is a method of storing and organizing data.
File System  Windows Server supports FAT16, FAT32, and NTFS file systems on
hard drives.

www.binarytitans.com
 FAT16 or File Allocation Table (FAT) 16, is a simple file system that
uses minimum memory and was used with DOS.
FAT16 and  FAT 16 can only support volumes up to 2 GB.
FAT32  FAT32 was released with the second major release of Windows 95.
 FAT 32 can only support volumes up to 32 GB.

www.binarytitans.com
 New Technology File System (NTFS) is the preferred file system,
NTFS File largely because it supports a much larger hard disk (up to 16
exabytes) and longer file names.
System  NTFS offers better security through permissions and encryption.

www.binarytitans.com
Essential Services

www.binarytitans.com
 In today’s networks, you assign logical addresses, such as with IP
addressing.
 Unfortunately, these addresses tend to be hard to remember,
especially in the case of newer, more complicated IPv6 addresses.
Naming
 Therefore, you need to use some form of naming service that will
Resolution allow you to translate logical names, which are easier to remember,
into logical addresses.
 The most common naming service is Domain Name System, or
DNS.

www.binarytitans.com
 DNS is short for Domain Name System.
 DNS is a hierarchical client/server-based distributed database
management system that translates domain/hosts names to IP
addresses.
DNS  The top of the tree is known as the root domain.
 Below the root domain, you will find top-level domains, such as
.com, .edu, .org, and .net, as well as two-letter country codes, such
as .uk, .ca, and .us.

www.binarytitans.com
DNS Zones  Zone is a collection of records which share similar naming pattern.

www.binarytitans.com
 When you define DNS zones, you create the zone as either:
 Forward lookup zone
DNS Zones  A forward lookup zone is the most common type of zone. DNS clients can
use this zone to obtain such information as IP addresses that correspond
Types to DNS domain names or services that is stored in the zone.
 Reverse lookup zone.
 Provides mapping from IP addresses back to DNS domain names.

www.binarytitans.com
 DNS servers use a mechanism called round-robin to share and
DNS Round distribute loads for a network resource.

Robin  Round-robin rotates the order of resource records with the same
name that point to different IP addresses.

www.binarytitans.com
DNS Queries  DNS queries and DNS transfers occur over TCP/UDP port 53.
&  So, if you have any firewall between servers (including firewalls
running on the servers), you will need to open port 53.
DNS Transfers

www.binarytitans.com
 Dynamic Host Configuration Protocol (DHCP) services automatically
assign IP addresses and related parameters (including subnet mask
and default gateway and length of the lease) to a host.
 A DHCP server maintains a pool which will have the list of IP
addresses.
DHCP
 When a DHCP client starts and needs an IP address assigned to it, it
broadcasts to a DHCP server asking for a leased address.
 The client sends messages to UDP port 67, and the server sends
messages to UDP port 68.

www.binarytitans.com
DORA Process

www.binarytitans.com
 Active Directory is Microsoft’s answer to directory services and it
does a lot more than just locating resources.
 Active Directory take care of this by using Kerberos Authentication
and Single Sign-On (SSO). SSO means ability of Kerberos to provide
a user with one set of credentials and grant them access across a
range of resources and services with that same set of credentials.
Kerberos authenticates the credentials and issues the user a ticket
Active with which the user gains access to the resources and services that
support Kerberos.
Directory  Active Directory also makes user management more easier as it acts
as a single repository for all of this user and computer related
information.
 More Details available here
 Part 1
 Part 2

www.binarytitans.com
File and Print Services

www.binarytitans.com
NTFS
Permissions

www.binarytitans.com
Using Groups  By assigning NTFS permissions to a group, you are granting
permissions to one or more people simultaneously, reducing the
with NTFS number of entries in each access list, as well as the amount of effort
required to grant multiple people access to certain files or folders
Permissions

www.binarytitans.com
 There are two types of permissions used in NTFS:
 Explicit permissions: Permissions granted directly to a file or folder.
 Inherited permissions: Permissions that are granted to a folder
(parent object or container) that flow into a child objects (subfolders
Types of NTFS or files inside the parent folder).

Permissions  Besides granting the Allow permissions, you can also grant the
Deny permission.

www.binarytitans.com
Effective
Permissions

www.binarytitans.com
 When copying and moving files, the following three
scenarios can result:
 If a folder or file is copied, the new folder or file will
automatically acquire the permissions of the drive
or folder to which it is being copied.
 If a folder or file is moved within the same volume,
Copying and the folder or file will retain the same permissions
Moving Files that were already assigned.
 If a folder or file is moved from one volume to
another volume, the folder or file will automatically
acquire the permissions of the drive to which it is
being moved.

www.binarytitans.com
 The owner of an object controls how permissions are
set on the object and to whom permissions are
File and Folder granted.
Owners  All administrators automatically have the Take
ownership permission of all NTFS objects.

www.binarytitans.com
 Encryption is the process of converting data into a
format that cannot be read by another user.
Encryption  Decryption is the process of converting data from an
encrypted format back to its original format.

www.binarytitans.com
 Encrypting File System (EFS) is used to store encrypted
files on NTFS file system volumes.
 Encrypted files cannot be used unless a user has access
to the keys required to decrypt the information.
Encrypting File  After a file has been encrypted, you do not have to
System (EFS) manually decrypt that file before you can use it.
 Rather, once you encrypt a file or folder, you can
work with that file or folder just as you would with
any other file or folder.

www.binarytitans.com
Encrypting File
System (EFS)

www.binarytitans.com
 Most users are not going to log onto a server directly
to access their data files.
 Instead, a drive or folder will be shared (known as a
shared folder), and they will access the data files over
a network.
Sharing  To help protect against unauthorized drive or folder
Folders access, you should use share permissions along with
NTFS permissions.
 When a user needs to access a network share, he or
she will use the UNC, which is
\\servername\sharename.

www.binarytitans.com
Sharing
Folders

www.binarytitans.com
 The share permissions that are available are as follows:
 Full control
 Change
 Read
 Because users can be members of several groups, it is
Share possible for them to have several sets of explicit
Permissions permissions for a particular folder or file.
 When this occurs, the permissions are combined to
form the effective permissions, which are the actual
permissions when logging in and accessing a file or
folder.

www.binarytitans.com
Network
Discovery and
Browsing

www.binarytitans.com
 An administrative share is a shared folder typically
used for administrative purposes and usually hidden.
 To make any shared folder or drive hidden, the share
name must have a $ at the end of it.
 Because the share folder or drive cannot be seen
during browsing, you have to use a UNC name to find
Administrative the folder or drive, which includes the share name
(including the $).
Shares
 By default, all hard drive volumes with drive letters
automatically have administrative shares (C$, D$, E$,
and so on).
 Other hidden shares can be created as needed for
individual folders.

www.binarytitans.com
 Using network printing multiple users can share the
same printer.
 This is a cost-effective solution when you have multiple
Network employees in different locations.
Printing  As an administrator, you can install two types of
printers: local and network.

www.binarytitans.com
 When you create or install the printer, you also load a
print driver that acts as a translator for Windows and
Printing in the programs running on Windows so that they do not
have to worry about the specifics of the printer’s
Windows hardware and printer language.

www.binarytitans.com
 You can use the Add Printer Wizard to install the
printer.
Installing  After the printer is installed, it will appear in the
Printers Devices and Printers folder as well as in the Device
Manager.

www.binarytitans.com
Adding
Printers

www.binarytitans.com
 When the Add Printer dialog box appears, specify the
port to which the printer is connected.
Adding  If a printer is connected directly on the network, you
Printers will have to create a Standard TCP/IP Port.
 The TCP/IP printer port uses host port 9100 to communicate.

www.binarytitans.com
Adding Printer
Drivers

www.binarytitans.com
 Network printers are usually used by more than one
user.
 If you have a high volume of print jobs, the printer can
become congested and users will have to wait for the
documents to print.
Printer Pools  Either you can purchase a faster printer or you can
create a group of printers called a printer pool that acts
as a single virtual printer with a single print queue.
 Users print to a single printer, and the print jobs are
distributed among the printers within the pool.

www.binarytitans.com
 With most printers, you
have a wide range of
options.
 These options vary from
Printer printer to printer and they
are easily accessible by
Properties right-clicking the printer in
the Devices and Printers
folder and selecting Printer
Properties.

www.binarytitans.com
 Printers are considered
objects.
 Therefore, you can assign
Printer permissions to a printer so
that you can specify who
Permissions can use the printer, who can
manage the printer, and
who can manage the print
jobs.

www.binarytitans.com
Managing
Print Jobs

www.binarytitans.com
 When the print device is available, the spooler retrieves the next print
job and sends it to the print device.
 By default, the spool folder is located at
Print Spooler  C:\Windows\System32\Spool\Printers.

Folder  If you have a server that handles a large number of print jobs or
several large print jobs, make sure the drive where the spool folder is
has sufficient disk space.

www.binarytitans.com
Popular Windows
Network Services and
Applications

www.binarytitans.com
 The World Wide Web is a system of web pages that can be viewed
with a web browser such as Internet Explorer, Chrome etc.
World Wide  Web pages may contain text, images, videos, and other
multimedia that you can navigate between by using hyperlinks,
Web and Web and they are usually found by using a search engine such as Bing
Pages or Google.
 When you fetching a web pages, you are connecting to the web
server using TCP port 80.

www.binarytitans.com
 File Transfer Protocol (FTP) is a standard network
protocol used to transfer a file from one host to
another over a TCP/IP-based network.
FTP  Different from HTTP, it uses two TCP ports to operate—
ports 20 and 21.
 FTP can be used with user-based password
authentication or with anonymous user access.

www.binarytitans.com
 Email servers (or any server or client that sends email directly out)
use Simple Mail Transfer Protocol (SMTP) as an outgoing mail
SMTP transport.
 SMTP uses TCP port 25.

www.binarytitans.com
IIS Manager

www.binarytitans.com
Creating a  When IIS is installed, the server will only have a default Web site.

Website  IIS is designed to handle multiple Web sites.

www.binarytitans.com
 The default Web site is made to respond to all IP addresses
assigned to server port 80 and port 443.
 To support multiple Web sites:
 You can assign additional IP addresses and assign a Web site
to each IP address.
Multiple  You can also define a different port instead of port 80 or 443.
When a user tries to access http://acme.com, they are really
Websites accessing http://acme.com:80.
 The :80 means port 80.
 One method that allows you to share the same IP address
and port is to use host headers, which are used to specify a
name that the Web site will respond to rather than all names
that point to the address.

www.binarytitans.com
 When you create a Web site, you specify a folder that
Web Server represents the root of the Web site.
Folders  Within that folder, you can create subfolders.

www.binarytitans.com
 An application pool is a set of resources (a worker
process or a set of worker processes) used by a Web site
or application that defines the memory boundaries for
the Web site.
Application  Forcing each application to have its own application
pool ensures that one Web site does not interfere with
Pool another Web site on the same server, which ensures
application performance and improved application
availability.
 Therefore, if one application has a memory leak or
crashes, it will not affect the other sites.

www.binarytitans.com
 By default, when you type in a Web site’s URL such as
http://acme.com, it will go to the root folder designed
for acme.com and first look for one of the following
files:
1. Default.htm
Default Files 2. Default.asp
3. Index.htm
4. Index.html
5. Isstart.htm
6. Default.aspx

www.binarytitans.com
 Since Web sites are designed to provide information,
some of which may be sensitive, there will be times
when you have to protect that data.
 You can protect it by limiting who can access the Web
site, how users authenticate, and/or by encrypting the
IIS Security content when a request is made.
 You can grant or deny specific computers, groups of
computers, or domains access to sites, applications,
directories, or files on your server by using
Authorization rules.

www.binarytitans.com
IIS  Authentication is used to confirm the identity of clients
Authentication who request access to your sites and applications.

www.binarytitans.com
 When you use SSL to encrypt web traffic, you are using
asymmetric encryption, which involves a private key and a public
key.
 The public key is provided to anyone who wants to access the web
SSL server, and the private key is kept secret, usually by the web server
that you are trying to protect.
 The public key is used to encrypt data, which only the private key
can decrypt.

www.binarytitans.com
 RAS enables users to connect remotely to a network.
 By connecting to the RAS over the Internet, users can
Remote Access connect to their organization’s network so that they
Server can access data files, read email, and access other
applications just as if they were sitting at office
network.

www.binarytitans.com
 Virtual private networks (VPNs) links two computers
through a wide-area network such as the Internet.
VPN  To keep the connection secure, the data sent between
the two computers is encapsulated and encrypted.
 This is an improvement to RAS.

www.binarytitans.com
 By default, when you connect to a VPN using the
previous configuration, all web browsing and network
traffic goes through the default gateway on the
Remote Network unless you are communicating with
local home computers.
Split Tunneling  If you wish to route your Internet browsing through
your home Internet connection rather than going
through the corporate network, you can do so. Such
connection is called split tunnel.

www.binarytitans.com
 Earlier days, users utilized dumb terminals (systems
consisting of a monitor and keyboard without a
Remote processor) to connect to a mainframe.
Desktop  Remote Desktop Services, earlier known as Terminal
Services Services, is one of the components of Microsoft
Windows that allows a user to access applications and
data on a remote computer over a network.

www.binarytitans.com
 RemoteApp enables you to make programs that are
accessed remotely through Remote Desktop Services
RemoteApp appear as if they are running on the end user's local
computer.

www.binarytitans.com
 As an alternate to VPN tunnel, you can use a Remote
Desktop Gateway (RD Gateway) role service to enable
authorized remote users to connect to resources on an
internal private network over the Internet using a
Remote Remote Desktop Connection (RDC) client.
Desktop  RD Gateway uses the Remote Desktop Protocol (RDP)
over HTTPS to establish a secure, encrypted
Gateway connection between remote users on the Internet and
the internal network resources on which their
productivity applications run.

www.binarytitans.com
 By using virtualization, you can run multiple operating
systems concurrently on a single machine, which
allows separation of services while keeping cost to a
Virtualization minimum.
 It can also be used to create Windows test systems in a
safe, self-contained environment.

www.binarytitans.com
 Microsoft Hyper-V is a hypervisor-based virtualization
system for x64 computers starting with Windows
Server 2008.
 The hypervisor is installed between the hardware and
the operating system and is the main component that
manages the virtual computers.
Microsoft  To run several virtual machines on a single computer,
Hyper-V you need to have sufficient processing power and
memory to handle the load.
 However, since most servers often sit idle,
virtualization utilizes the server’s hardware more
efficiently.

www.binarytitans.com
 To install Hyper-V, you need:
Installing  An x64 version of Windows.
 64-bit processors and BIOS that support hardware-
Hyper-V assisted virtualization (Intel VT or AMD-V)
technology.

www.binarytitans.com
Hyper-V
Manager

www.binarytitans.com
 Some of the older Windows built-in drivers do not run efficiently
under a virtual environment. Therefore, you need to install
Integration Integration Services, which includes some basic drivers.

Services  Hyper-V integration services, are a bundled set of software which,


when installed in the virtual machine improves integration
between the host server and the virtual machine.

www.binarytitans.com
 In many organizations, we may want to consolidate
several physical servers to one machine running
multiple virtual servers.
 Microsoft System Center Virtual Machine Manager
Consolidation (VMM) allows you to convert existing physical
computers into virtual machines through a process
known as physical-to-virtual (P2V) conversion.

www.binarytitans.com
 When you create a virtual hard drive, you can create:
 Fixed size virtual hard disks
Managing  Take up the full amount of disk space when
created, even if there is no data using parts of
Disks the hard disk.
 Dynamically expanding hard disks
 Expands as it needs space up to its full space.

www.binarytitans.com
 One of the strengths of virtual servers is the ability to
take snapshots.
 A snapshot is a point in time image of a virtual machine
that you can return to.
Snapshots  So if you make a change to the system, such as loading
a component or installing an update, and later found
that it is causing problems, you can use the snapshot
to quickly revert back to the point before the change
was made.

www.binarytitans.com
Monitoring and
Troubleshooting
Servers

www.binarytitans.com
ITIL
 ITIL (Information Technology Infrastructure Library) is a
Information set of practices for IT service management (ITSM) that
Technology focuses on aligning IT services with the needs of
business.
Infrastructure
Library

www.binarytitans.com
ITIL

Information
Technology
Infrastructure
Library

www.binarytitans.com
Implementing
a Project

www.binarytitans.com
1. Discover the problem
2. Evaluate system configuration
3. List or track possible solutions and try to isolate the
Troubleshooting problem by removing or disabling hardware or
software components
Methodology
4. Execute a plan
5. Check results
6. Take a proactive approach

www.binarytitans.com
 Device Manager
 System Information
 Event Viewer
 Task Manager
 Resource Monitor
Troubleshooting  Performance Monitor
Tools  System Configuration
 Memory Diagnostics tool
 Troubleshooting Wizard
 Boot Menu including Safe mode
 Windows Repair

www.binarytitans.com
System
Information

www.binarytitans.com
Event Viewer

www.binarytitans.com
System
Configuration

www.binarytitans.com
Virtual
Memory and
Paging File

www.binarytitans.com
Task Manager

www.binarytitans.com
Performance
Monitor

www.binarytitans.com
Resource
Monitor

www.binarytitans.com
Advanced
Boot Options

www.binarytitans.com
High
Availability

www.binarytitans.com
 The Windows system state is a collection of system
components that are not contained in a simple file but
can be backed up easily. It includes:
 Boot files
 DLLScache folder
 Registry
System State  SYSVOL
 Active Directory NTDS.DIT
 Certificate Store
 User profiles
 COM+ and WMI information
 IIS metabase

www.binarytitans.com
Windows Server
Administrator Jobs

www.binarytitans.com
Lets take a look at the leading Job Portals.
Windows
Server  Naukri.com
Administrator  Monster.com
Jobs  Shine.com

www.binarytitans.com
 Want this document offline?
 Click here.
 Add your review here.

 Ready To Deploy Training from BinaryTitans.


 Here we cover the following:

Now willing to 

a.
b.
Installing and Configuring Windows Server 2012
Administering Windows Server 2012
learn more? 

c.
d.
Configuring Advanced Windows Server 2012 Services
Designing and Deploying Microsoft Exchange Server 2016
 e. Cisco Certified Network Associate

 To enroll, reach out to BinaryTitans Administration Team


[email protected]
+91 80 50158271

www.binarytitans.com
Thank you for reading

www.binarytitans.com

You might also like