Understanding Windows Server Administration - Level 100 - Document
Understanding Windows Server Administration - Level 100 - Document
Server Administration
Level 100
Ashwin Venugopal
BinaryTitans IT Solutions Pvt. Ltd.
www.binarytitans.com
www.binarytitans.com
What we are going to
Learn here?
www.binarytitans.com
Server Overview
Initial Configuration Tasks
Managing Storage
Content Essential Services
File and Print Services
Popular Windows Network Services and Applications
Monitoring and Troubleshooting Servers
www.binarytitans.com
Server Overview
www.binarytitans.com
Server - A computer that is a meant to be a dedicated service
provider
Server Client - A computer that requests services.
Overview System Administrators be working on a network that is made up
of dedicated servers and clients.
www.binarytitans.com
When you are figuring out the hardware and software needs we
need to look at the role the server needs to do and what kind of
load does that need to take.
Server Roles So a server role means the primary duty that the server performs.
A server could have multiple roles.
www.binarytitans.com
Primary subsystems that make up a server are:
Processor
Primary Memory
Subsystems of
Network
Storage
a Server If any of these fails or under performs, it can compromise the
service.
www.binarytitans.com
This is also called the brain of the computer.
Intel and AMD produce most of today’s server processors.
Qualcom and MediaTek produce most of the mobile processors.
Processor
Processors can be are 32 bit as well 64 bit
Server processors are mostly 64-bit, because it works faster than
the older 32-bit processors.
www.binarytitans.com
RAM - random access memory - temporary memory.
It stores instructions and data and the processor accesses them
directly.
RAM If you have more RAM, you can load more instructions and data,
making it faster and more efficient.
Windows Server 2012 R2 or the latest 2016 supports maximum of 4
TB of RAM
www.binarytitans.com
Hard drives are generally half electronic/half mechanical devices
that store magnetic fields on rotating platters.
Solid-state drives are electronic devices with no mechanical
components.
www.binarytitans.com
A good network connection is necessary for the server to
communicate with other servers or the clients.
Most servers include more than one network interface cards or
Network NICs.
We can combine multiple network cards together for performance
and redundancy reasons using NIC Teaming.
www.binarytitans.com
Motherboard brings these four subsystems together.
Motherboard
www.binarytitans.com
Communication with disks, RAM, monitor etc are kept in the
System ROM chips known as the BIOS (basic input/output
system).
BIOS BIOS helps the system to know how to communicate with some
basic components such as a keyboard.
The process of upgrading or updating your system ROM BIOS is
called flashing the BIOS.
www.binarytitans.com
A case provides an enclosure that helps protect the system
components that are inside.
Power Supply
A case with the power supplies and additional fans are usually
and Cases designed to provide a fair amount of airflow through the system
to keep the system cool.
www.binarytitans.com
Ports are plug sockets that enable you to connect an external
device, such as a printer, keyboard, mouse, or external drive, to
your computer.
Ports
www.binarytitans.com
Virtualization enables multiple operating systems to run
concurrently on a single physical machine.
This allows for a separation of services so that changes on one
Virtualization virtual server do not affect the other virtual servers.
In addition, it offers a way to better utilize hardware since most
hardware is sitting idle most of the time.
www.binarytitans.com
The server room contains the servers and most of the
Server Room communication devices including switches and routers.
(Data Center) The room should be secure, with only a selected people allowed to
have access to it.
www.binarytitans.com
Windows NT (first released in 1993) is a family of operating
systems produced by Microsoft.
Windows Since then, Microsoft has released Windows 2000 Server, Windows
Server Server 2003, Windows Server 2003 R2, Windows Server 2008,
Windows Server 2008 R2, Windows Server 2012, Windows Server
2012 R2, Windows Server 2016.
www.binarytitans.com
Similar to previous Windows Servers, Windows Server 2008 R2 will
be released with six editions. These are the most common
editions:
Windows Server 2016 Standard edition
Windows Server 2016 Datacenter edition
Windows Windows Server 2016 Foundation edition
Server 2016
Microsoft Hyper-V Server 2016
Windows Storage Server 2016 Workgroup edition
Windows Storage Server 2016 Standard edition
www.binarytitans.com
A server is designed to provide services.
Windows Server has organized the most common services into
Windows server roles.
Server Roles Windows Server features are software programs that are not
directly part of a role, but they can provide additional
functionality.
www.binarytitans.com
You can install Windows Server 2016 in one of three modes:
Full Version
Server Core
Nano Server
The full version is the normal version that you would expect from
Full Version Windows with a fully functional GUI interface.
Server Core installation provides a minimal environment with no
Server Core Windows Explorer shell for running specific server roles and no
Nano Server Start button.
Nano Server is a remotely administered server operating system
and is optimized for private clouds and datacenters. This is
significantly smaller than Core Server and has no local logon
capability.
This Nano Server installation option is available for Standard and
Datacenter editions of Windows Server 2016.
www.binarytitans.com
Processor
Minimum
1.4 GHz 64-bit processor
RAM
Windows Minimum
Server 2016 512 MB
ECC (Error Correcting Code) type or similar technology
System (Recommended)
www.binarytitans.com
Different
Installation A clean installation is installing the software from scratch on a new
drive or on newly reformatted drive.
Options
The disadvantage is that the system and all of its software needs
to be reinstalled, patched, and configured and data copied over,
something that may take hours or even days.
Clean
Installation
www.binarytitans.com
Different
Installation Upgrade from an older version of Windows to Windows Server
2016.
Options You cannot perform an in-place upgrade from 32-bit to 64-bit
architecture.
Upgrade
www.binarytitans.com
Different
Installation One way to install Windows Server 2008 R2 is to clone an already
installed system in to an image file.
Options Create new servers using this cloned image.
Cloning
www.binarytitans.com
Different An unattended installation is an installation that requires little
interaction to install.
Installation All the inputs required during the Installation are written on an
Options answer file.
An answer file is an XML file that stores the answers for a series of
graphical user interface (GUI) dialog boxes.
Unattended You can use any text editor such as notepad to create and modify
Installation the answer file.
www.binarytitans.com
Different
Installation Windows Deployment Services (WDS) is a technology from
Options Microsoft for network-based installation of Windows operating
system including Windows XP, Windows Vista, Windows Server
2003, Windows Server 2008, Windows Server 2008 R2, Windows
Server 2012, Windows Server 2012 R2, Windows Server 2016.
Windows The deployment of Windows can be fully automated and
Deployment customized through the use of unattended installation scripting
files.
Services
(WDS)
www.binarytitans.com
A software license is given to you from a software company like
Microsoft that gives you permission to use a specific software
Windows package.
Licensing Most licenses from corporations such as Microsoft work more like
a lease rather than a purchase of the actual software.
www.binarytitans.com
Microsoft product activation, including Windows activation, is an
anti-piracy technology designed to verify that software products are
legitimately licensed. If the server is not activated, it could restart
every hour.
Windows
Activation
www.binarytitans.com
After installing Windows, we need to check whether Microsoft has
any Windows updates. This will include fixes, patches, service packs,
and device drivers..
Windows
By adding fixes and patches, you will keep Windows stable and
Updates secure.
If there are many fixes or patches, Microsoft releases them together
as a service pack or a cumulative package.
www.binarytitans.com
Windows
Updates
www.binarytitans.com
Initial Configuration
Tasks
www.binarytitans.com
Configure the IP address
Set the computer name
Join an Active Directory domain
Initial
Configure the time zone
Configuration Enable automatic updates
Tasks Add roles and features
Enable Remote Desktop
Configure Windows Firewall settings
www.binarytitans.com
IP address
classes and
Ranges
www.binarytitans.com
Managing Storage
www.binarytitans.com
IBM 305 RAMAC
Random Access Method of
The first HDD Accounting and control.
4 MB
(1956)
50x24” disks
1200 rpm
www.binarytitans.com
The first HDD
(1956)
Play
www.binarytitans.com
The internal
look of HDD
(Current HDD)
www.binarytitans.com
Access Time = Seek Time + Rotational Delay + Transfer Time
Data access of
HDD
www.binarytitans.com
A RAID is a Redundant Array of Inexpensive Disks.
RAID “I” can also be called as“Independent”
introduction Disks are small and cheap, so it’s easy to put lots of disks (10s to
100s) in one box for increased storage, performance, and availability.
www.binarytitans.com
Level 0 is non-redundant disk array
Files are Striped across disks, no redundant info
High read throughput
Best write throughput (no redundant info to write)
Any disk failure results in data loss
RAID 0
Stripe 0 Stripe 1 Stripe 2 Stripe 3
data disks
www.binarytitans.com
Level 0 is non-redundant disk array
Mirrored Disks, data is written to two places
On failure, just use surviving disk
On read, choose fastest to read
Write performance is same as single drive, read performance is 2x better
Expensive
RAID 10
RAID 1 Stripe 0 Stripe 1 Stripe 2 Stripe 3 Stripe 0 Stripe 1 Stripe 2 Stripe 3
www.binarytitans.com
Block-level parity with Stripes
A read accesses all the data disks
A write accesses all data disks plus the parity disk
Heavy load on the parity disk
RAID 4
Stripe 0 Stripe 1 Stripe 2 Stripe 3 P0-3
Parity disk
data disks
www.binarytitans.com
Block Interleaved Distributed Parity
Like parity scheme, but distribute the parity info over all disks (as
well as data over all disks)
Better read performance, large write performance
RAID 5
Stripe 0 Stripe 1 Stripe 2 Stripe 3 P0-3
www.binarytitans.com
Level 5 with an extra parity
Can tolerate two failures
RAID 6
Stripe 0 Stripe 1 Stripe 2 Stripe 3 P0-3 Q0-3
www.binarytitans.com
NAS
Network attached storage (NAS) is a file-level data storage device
(Network that is connected to a network and provide shared drives or folders.
Attached NAS devices usually contain multiple drives in a form of RAID.
Storage)
www.binarytitans.com
SAN A storage-area network (SAN) is a dedicated high-speed network (or
(Storage Area subnetwork) that interconnects and presents shared pools of
storage devices to multiple servers.
Network)
www.binarytitans.com
Host Bus
A host bus adapter (HBA) connects a computer to a network or
Adapter storage device.
(HBA)
www.binarytitans.com
LUN LUN (Logical unit numbers) allow a SAN to break its storage down
(Logical unit into manageable pieces, each LUN can be assigned to one or more
servers in the SAN.
numbers)
www.binarytitans.com
Optic fibre cabling gives you a higher bandwidth and also can be
used over longer distances compared to copper cabling.
Fibre Channel Fibre Channel or FC is a gigabit-speed technology heavily used for
storage networking.
It uses a Fibre Channel Protocol (FCP) as its transport protocol.
www.binarytitans.com
Internet Small Computing System Interface or iSCSI is an Internet
Protocol (IP)-based storage networking standard for linking data
storage facilities.
iSCSI
iSCSI allows clients to send SCSI commands over a TCP/IP network
using TCP port 3260.
www.binarytitans.com
A file system is a method of storing and organizing data.
File System Windows Server supports FAT16, FAT32, and NTFS file systems on
hard drives.
www.binarytitans.com
FAT16 or File Allocation Table (FAT) 16, is a simple file system that
uses minimum memory and was used with DOS.
FAT16 and FAT 16 can only support volumes up to 2 GB.
FAT32 FAT32 was released with the second major release of Windows 95.
FAT 32 can only support volumes up to 32 GB.
www.binarytitans.com
New Technology File System (NTFS) is the preferred file system,
NTFS File largely because it supports a much larger hard disk (up to 16
exabytes) and longer file names.
System NTFS offers better security through permissions and encryption.
www.binarytitans.com
Essential Services
www.binarytitans.com
In today’s networks, you assign logical addresses, such as with IP
addressing.
Unfortunately, these addresses tend to be hard to remember,
especially in the case of newer, more complicated IPv6 addresses.
Naming
Therefore, you need to use some form of naming service that will
Resolution allow you to translate logical names, which are easier to remember,
into logical addresses.
The most common naming service is Domain Name System, or
DNS.
www.binarytitans.com
DNS is short for Domain Name System.
DNS is a hierarchical client/server-based distributed database
management system that translates domain/hosts names to IP
addresses.
DNS The top of the tree is known as the root domain.
Below the root domain, you will find top-level domains, such as
.com, .edu, .org, and .net, as well as two-letter country codes, such
as .uk, .ca, and .us.
www.binarytitans.com
DNS Zones Zone is a collection of records which share similar naming pattern.
www.binarytitans.com
When you define DNS zones, you create the zone as either:
Forward lookup zone
DNS Zones A forward lookup zone is the most common type of zone. DNS clients can
use this zone to obtain such information as IP addresses that correspond
Types to DNS domain names or services that is stored in the zone.
Reverse lookup zone.
Provides mapping from IP addresses back to DNS domain names.
www.binarytitans.com
DNS servers use a mechanism called round-robin to share and
DNS Round distribute loads for a network resource.
Robin Round-robin rotates the order of resource records with the same
name that point to different IP addresses.
www.binarytitans.com
DNS Queries DNS queries and DNS transfers occur over TCP/UDP port 53.
& So, if you have any firewall between servers (including firewalls
running on the servers), you will need to open port 53.
DNS Transfers
www.binarytitans.com
Dynamic Host Configuration Protocol (DHCP) services automatically
assign IP addresses and related parameters (including subnet mask
and default gateway and length of the lease) to a host.
A DHCP server maintains a pool which will have the list of IP
addresses.
DHCP
When a DHCP client starts and needs an IP address assigned to it, it
broadcasts to a DHCP server asking for a leased address.
The client sends messages to UDP port 67, and the server sends
messages to UDP port 68.
www.binarytitans.com
DORA Process
www.binarytitans.com
Active Directory is Microsoft’s answer to directory services and it
does a lot more than just locating resources.
Active Directory take care of this by using Kerberos Authentication
and Single Sign-On (SSO). SSO means ability of Kerberos to provide
a user with one set of credentials and grant them access across a
range of resources and services with that same set of credentials.
Kerberos authenticates the credentials and issues the user a ticket
Active with which the user gains access to the resources and services that
support Kerberos.
Directory Active Directory also makes user management more easier as it acts
as a single repository for all of this user and computer related
information.
More Details available here
Part 1
Part 2
www.binarytitans.com
File and Print Services
www.binarytitans.com
NTFS
Permissions
www.binarytitans.com
Using Groups By assigning NTFS permissions to a group, you are granting
permissions to one or more people simultaneously, reducing the
with NTFS number of entries in each access list, as well as the amount of effort
required to grant multiple people access to certain files or folders
Permissions
www.binarytitans.com
There are two types of permissions used in NTFS:
Explicit permissions: Permissions granted directly to a file or folder.
Inherited permissions: Permissions that are granted to a folder
(parent object or container) that flow into a child objects (subfolders
Types of NTFS or files inside the parent folder).
Permissions Besides granting the Allow permissions, you can also grant the
Deny permission.
www.binarytitans.com
Effective
Permissions
www.binarytitans.com
When copying and moving files, the following three
scenarios can result:
If a folder or file is copied, the new folder or file will
automatically acquire the permissions of the drive
or folder to which it is being copied.
If a folder or file is moved within the same volume,
Copying and the folder or file will retain the same permissions
Moving Files that were already assigned.
If a folder or file is moved from one volume to
another volume, the folder or file will automatically
acquire the permissions of the drive to which it is
being moved.
www.binarytitans.com
The owner of an object controls how permissions are
set on the object and to whom permissions are
File and Folder granted.
Owners All administrators automatically have the Take
ownership permission of all NTFS objects.
www.binarytitans.com
Encryption is the process of converting data into a
format that cannot be read by another user.
Encryption Decryption is the process of converting data from an
encrypted format back to its original format.
www.binarytitans.com
Encrypting File System (EFS) is used to store encrypted
files on NTFS file system volumes.
Encrypted files cannot be used unless a user has access
to the keys required to decrypt the information.
Encrypting File After a file has been encrypted, you do not have to
System (EFS) manually decrypt that file before you can use it.
Rather, once you encrypt a file or folder, you can
work with that file or folder just as you would with
any other file or folder.
www.binarytitans.com
Encrypting File
System (EFS)
www.binarytitans.com
Most users are not going to log onto a server directly
to access their data files.
Instead, a drive or folder will be shared (known as a
shared folder), and they will access the data files over
a network.
Sharing To help protect against unauthorized drive or folder
Folders access, you should use share permissions along with
NTFS permissions.
When a user needs to access a network share, he or
she will use the UNC, which is
\\servername\sharename.
www.binarytitans.com
Sharing
Folders
www.binarytitans.com
The share permissions that are available are as follows:
Full control
Change
Read
Because users can be members of several groups, it is
Share possible for them to have several sets of explicit
Permissions permissions for a particular folder or file.
When this occurs, the permissions are combined to
form the effective permissions, which are the actual
permissions when logging in and accessing a file or
folder.
www.binarytitans.com
Network
Discovery and
Browsing
www.binarytitans.com
An administrative share is a shared folder typically
used for administrative purposes and usually hidden.
To make any shared folder or drive hidden, the share
name must have a $ at the end of it.
Because the share folder or drive cannot be seen
during browsing, you have to use a UNC name to find
Administrative the folder or drive, which includes the share name
(including the $).
Shares
By default, all hard drive volumes with drive letters
automatically have administrative shares (C$, D$, E$,
and so on).
Other hidden shares can be created as needed for
individual folders.
www.binarytitans.com
Using network printing multiple users can share the
same printer.
This is a cost-effective solution when you have multiple
Network employees in different locations.
Printing As an administrator, you can install two types of
printers: local and network.
www.binarytitans.com
When you create or install the printer, you also load a
print driver that acts as a translator for Windows and
Printing in the programs running on Windows so that they do not
have to worry about the specifics of the printer’s
Windows hardware and printer language.
www.binarytitans.com
You can use the Add Printer Wizard to install the
printer.
Installing After the printer is installed, it will appear in the
Printers Devices and Printers folder as well as in the Device
Manager.
www.binarytitans.com
Adding
Printers
www.binarytitans.com
When the Add Printer dialog box appears, specify the
port to which the printer is connected.
Adding If a printer is connected directly on the network, you
Printers will have to create a Standard TCP/IP Port.
The TCP/IP printer port uses host port 9100 to communicate.
www.binarytitans.com
Adding Printer
Drivers
www.binarytitans.com
Network printers are usually used by more than one
user.
If you have a high volume of print jobs, the printer can
become congested and users will have to wait for the
documents to print.
Printer Pools Either you can purchase a faster printer or you can
create a group of printers called a printer pool that acts
as a single virtual printer with a single print queue.
Users print to a single printer, and the print jobs are
distributed among the printers within the pool.
www.binarytitans.com
With most printers, you
have a wide range of
options.
These options vary from
Printer printer to printer and they
are easily accessible by
Properties right-clicking the printer in
the Devices and Printers
folder and selecting Printer
Properties.
www.binarytitans.com
Printers are considered
objects.
Therefore, you can assign
Printer permissions to a printer so
that you can specify who
Permissions can use the printer, who can
manage the printer, and
who can manage the print
jobs.
www.binarytitans.com
Managing
Print Jobs
www.binarytitans.com
When the print device is available, the spooler retrieves the next print
job and sends it to the print device.
By default, the spool folder is located at
Print Spooler C:\Windows\System32\Spool\Printers.
Folder If you have a server that handles a large number of print jobs or
several large print jobs, make sure the drive where the spool folder is
has sufficient disk space.
www.binarytitans.com
Popular Windows
Network Services and
Applications
www.binarytitans.com
The World Wide Web is a system of web pages that can be viewed
with a web browser such as Internet Explorer, Chrome etc.
World Wide Web pages may contain text, images, videos, and other
multimedia that you can navigate between by using hyperlinks,
Web and Web and they are usually found by using a search engine such as Bing
Pages or Google.
When you fetching a web pages, you are connecting to the web
server using TCP port 80.
www.binarytitans.com
File Transfer Protocol (FTP) is a standard network
protocol used to transfer a file from one host to
another over a TCP/IP-based network.
FTP Different from HTTP, it uses two TCP ports to operate—
ports 20 and 21.
FTP can be used with user-based password
authentication or with anonymous user access.
www.binarytitans.com
Email servers (or any server or client that sends email directly out)
use Simple Mail Transfer Protocol (SMTP) as an outgoing mail
SMTP transport.
SMTP uses TCP port 25.
www.binarytitans.com
IIS Manager
www.binarytitans.com
Creating a When IIS is installed, the server will only have a default Web site.
www.binarytitans.com
The default Web site is made to respond to all IP addresses
assigned to server port 80 and port 443.
To support multiple Web sites:
You can assign additional IP addresses and assign a Web site
to each IP address.
Multiple You can also define a different port instead of port 80 or 443.
When a user tries to access http://acme.com, they are really
Websites accessing http://acme.com:80.
The :80 means port 80.
One method that allows you to share the same IP address
and port is to use host headers, which are used to specify a
name that the Web site will respond to rather than all names
that point to the address.
www.binarytitans.com
When you create a Web site, you specify a folder that
Web Server represents the root of the Web site.
Folders Within that folder, you can create subfolders.
www.binarytitans.com
An application pool is a set of resources (a worker
process or a set of worker processes) used by a Web site
or application that defines the memory boundaries for
the Web site.
Application Forcing each application to have its own application
pool ensures that one Web site does not interfere with
Pool another Web site on the same server, which ensures
application performance and improved application
availability.
Therefore, if one application has a memory leak or
crashes, it will not affect the other sites.
www.binarytitans.com
By default, when you type in a Web site’s URL such as
http://acme.com, it will go to the root folder designed
for acme.com and first look for one of the following
files:
1. Default.htm
Default Files 2. Default.asp
3. Index.htm
4. Index.html
5. Isstart.htm
6. Default.aspx
www.binarytitans.com
Since Web sites are designed to provide information,
some of which may be sensitive, there will be times
when you have to protect that data.
You can protect it by limiting who can access the Web
site, how users authenticate, and/or by encrypting the
IIS Security content when a request is made.
You can grant or deny specific computers, groups of
computers, or domains access to sites, applications,
directories, or files on your server by using
Authorization rules.
www.binarytitans.com
IIS Authentication is used to confirm the identity of clients
Authentication who request access to your sites and applications.
www.binarytitans.com
When you use SSL to encrypt web traffic, you are using
asymmetric encryption, which involves a private key and a public
key.
The public key is provided to anyone who wants to access the web
SSL server, and the private key is kept secret, usually by the web server
that you are trying to protect.
The public key is used to encrypt data, which only the private key
can decrypt.
www.binarytitans.com
RAS enables users to connect remotely to a network.
By connecting to the RAS over the Internet, users can
Remote Access connect to their organization’s network so that they
Server can access data files, read email, and access other
applications just as if they were sitting at office
network.
www.binarytitans.com
Virtual private networks (VPNs) links two computers
through a wide-area network such as the Internet.
VPN To keep the connection secure, the data sent between
the two computers is encapsulated and encrypted.
This is an improvement to RAS.
www.binarytitans.com
By default, when you connect to a VPN using the
previous configuration, all web browsing and network
traffic goes through the default gateway on the
Remote Network unless you are communicating with
local home computers.
Split Tunneling If you wish to route your Internet browsing through
your home Internet connection rather than going
through the corporate network, you can do so. Such
connection is called split tunnel.
www.binarytitans.com
Earlier days, users utilized dumb terminals (systems
consisting of a monitor and keyboard without a
Remote processor) to connect to a mainframe.
Desktop Remote Desktop Services, earlier known as Terminal
Services Services, is one of the components of Microsoft
Windows that allows a user to access applications and
data on a remote computer over a network.
www.binarytitans.com
RemoteApp enables you to make programs that are
accessed remotely through Remote Desktop Services
RemoteApp appear as if they are running on the end user's local
computer.
www.binarytitans.com
As an alternate to VPN tunnel, you can use a Remote
Desktop Gateway (RD Gateway) role service to enable
authorized remote users to connect to resources on an
internal private network over the Internet using a
Remote Remote Desktop Connection (RDC) client.
Desktop RD Gateway uses the Remote Desktop Protocol (RDP)
over HTTPS to establish a secure, encrypted
Gateway connection between remote users on the Internet and
the internal network resources on which their
productivity applications run.
www.binarytitans.com
By using virtualization, you can run multiple operating
systems concurrently on a single machine, which
allows separation of services while keeping cost to a
Virtualization minimum.
It can also be used to create Windows test systems in a
safe, self-contained environment.
www.binarytitans.com
Microsoft Hyper-V is a hypervisor-based virtualization
system for x64 computers starting with Windows
Server 2008.
The hypervisor is installed between the hardware and
the operating system and is the main component that
manages the virtual computers.
Microsoft To run several virtual machines on a single computer,
Hyper-V you need to have sufficient processing power and
memory to handle the load.
However, since most servers often sit idle,
virtualization utilizes the server’s hardware more
efficiently.
www.binarytitans.com
To install Hyper-V, you need:
Installing An x64 version of Windows.
64-bit processors and BIOS that support hardware-
Hyper-V assisted virtualization (Intel VT or AMD-V)
technology.
www.binarytitans.com
Hyper-V
Manager
www.binarytitans.com
Some of the older Windows built-in drivers do not run efficiently
under a virtual environment. Therefore, you need to install
Integration Integration Services, which includes some basic drivers.
www.binarytitans.com
In many organizations, we may want to consolidate
several physical servers to one machine running
multiple virtual servers.
Microsoft System Center Virtual Machine Manager
Consolidation (VMM) allows you to convert existing physical
computers into virtual machines through a process
known as physical-to-virtual (P2V) conversion.
www.binarytitans.com
When you create a virtual hard drive, you can create:
Fixed size virtual hard disks
Managing Take up the full amount of disk space when
created, even if there is no data using parts of
Disks the hard disk.
Dynamically expanding hard disks
Expands as it needs space up to its full space.
www.binarytitans.com
One of the strengths of virtual servers is the ability to
take snapshots.
A snapshot is a point in time image of a virtual machine
that you can return to.
Snapshots So if you make a change to the system, such as loading
a component or installing an update, and later found
that it is causing problems, you can use the snapshot
to quickly revert back to the point before the change
was made.
www.binarytitans.com
Monitoring and
Troubleshooting
Servers
www.binarytitans.com
ITIL
ITIL (Information Technology Infrastructure Library) is a
Information set of practices for IT service management (ITSM) that
Technology focuses on aligning IT services with the needs of
business.
Infrastructure
Library
www.binarytitans.com
ITIL
Information
Technology
Infrastructure
Library
www.binarytitans.com
Implementing
a Project
www.binarytitans.com
1. Discover the problem
2. Evaluate system configuration
3. List or track possible solutions and try to isolate the
Troubleshooting problem by removing or disabling hardware or
software components
Methodology
4. Execute a plan
5. Check results
6. Take a proactive approach
www.binarytitans.com
Device Manager
System Information
Event Viewer
Task Manager
Resource Monitor
Troubleshooting Performance Monitor
Tools System Configuration
Memory Diagnostics tool
Troubleshooting Wizard
Boot Menu including Safe mode
Windows Repair
www.binarytitans.com
System
Information
www.binarytitans.com
Event Viewer
www.binarytitans.com
System
Configuration
www.binarytitans.com
Virtual
Memory and
Paging File
www.binarytitans.com
Task Manager
www.binarytitans.com
Performance
Monitor
www.binarytitans.com
Resource
Monitor
www.binarytitans.com
Advanced
Boot Options
www.binarytitans.com
High
Availability
www.binarytitans.com
The Windows system state is a collection of system
components that are not contained in a simple file but
can be backed up easily. It includes:
Boot files
DLLScache folder
Registry
System State SYSVOL
Active Directory NTDS.DIT
Certificate Store
User profiles
COM+ and WMI information
IIS metabase
www.binarytitans.com
Windows Server
Administrator Jobs
www.binarytitans.com
Lets take a look at the leading Job Portals.
Windows
Server Naukri.com
Administrator Monster.com
Jobs Shine.com
www.binarytitans.com
Want this document offline?
Click here.
Add your review here.
Now willing to
a.
b.
Installing and Configuring Windows Server 2012
Administering Windows Server 2012
learn more?
c.
d.
Configuring Advanced Windows Server 2012 Services
Designing and Deploying Microsoft Exchange Server 2016
e. Cisco Certified Network Associate
www.binarytitans.com
Thank you for reading
www.binarytitans.com