3 Set Up Computer Server
3 Set Up Computer Server
If you have questions, don’t hesitate to ask your Trainer for assistance.
After completing this module ask your Trainer to assess your competency.
Result of your assessment will be recorded in your competency profile. All the
learning activities are designed for you to complete at your own pace.
Inside this module you will find the activities for you to complete followed by
relevant information sheets for each learning outcome. Each learning outcome
may have more than one learning activity.
Page 1 of 123
Page 2 of 123
Program/Course : COMPUTER SYSTEM SERVCING NCII
Unit of Competency : SET-UP SERVER
Module : SETTING-UP SERVER
INTRODUCTION:
This module covers the knowledge, skills and attitudes needed to set-up
computer servers for LANs and SOHO systems. It consists of competencies to
set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.
Page 3 of 123
LEARNING EXPERIENCES
Page 4 of 123
Read Information Sheets 3.1-4 in
Setting-up client/user access and
security
Page 5 of 123
Page 6 of 123
INFORMATION SHEETS CO3.1-1
“Network Operating System (NOS) features”
I. Domain Name System
Without DNS, computers would have a very tough time communicating with
each other. However, most Windows administrators still rely on WINS for name
resolution on local area networks and some have little or no experience with
DNS.
As many of you are probably aware, the Domain Name System (DNS) is now the
name resolution system of choice in Windows. Without it, computers would have
a very tough time communicating with each other. However, most Windows
administrators still rely on the Windows Internet Name Service (WINS) for name
resolution on local area networks and some have little or no experience with
DNS. If you fall into this category, read on. We'll explain how to install, configure,
and troubleshoot a Windows Server 2008 DNS server.
If you've ever used the Internet, it's a good bet that you've used the Domain
Name System, or DNS, even without realizing it. DNS is a protocol within the
set of standards for how computers exchange data on the Internet and on many
private networks, known as the TCP/IP protocol suite. Its basic job is to turn a
user-friendly domain name like "howstuffworks.com" into an Internet Protocol
(IP) address like 70.42.251.42 that computers use to identify each other on the
network. It's like your computer's GPS for the Internet.
Computers and other network devices on the Internet use an IP address to route
your request to the site you're trying to reach. This is similar to dialing a phone
number to connect to the person you're trying to call. Thanks to DNS, though,
you don't have to keep your own address book of IP addresses. Instead, you just
connect through a domain name server, also called a DNS server or name
server, which manages a massive database that maps domain names to IP
addresses.
Whether you're accessing a Web site or sending e-mail, your computer uses a
DNS server to look up the domain name you're trying to access. The proper term
for this process is DNS name resolution, and you would say that the DNS server
resolves the domain name to the IP address. For example, when you enter
"http://www.howstuffworks.com" in your browser, part of the network
connection includes resolving the domain name "howstuffworks.com" into an IP
address, like 70.42.251.42, for HowStuffWorks' Web servers.
Page 7 of 123
You can always bypass a DNS lookup by entering 70.42.251.42 directly in your
browser (give it a try). However, you're probably more likely to remember
"howstuffworks.com" when you want to return later. In addition, a Web site's IP
address can change over time, and some sites associate multiple IP addresses
with a single domain name.
Without DNS servers, the Internet would shut down very quickly. But how does
your computer know what DNS server to use? Typically, when you connect to
your home network, Internet service provider (ISP) or WiFi network, the modem
or router that assigns your computer's network address also sends some
important network configuration information to your computer or mobile device.
That configuration includes one or more DNS servers that the device should use
when translating DNS names to IP address.
So far, you've read about some important DNS basics. The rest of this article
dives deeper into domain name servers and name resolution. It even includes an
introduction to managing your own DNS server. Let's start by looking at how IP
addresses are structured and how that's important to the name resolution
process.
Short for Domain Name System (or Service or Server), an Internet service that
translates domain names into IP addresses. Because domain names are
alphabetic, they're easier to remember. The Internet however, is really based
on IP addresses. Every time you use a domain name, therefore, a DNS service
must translate the name into the corresponding IP address. For example, the
domain name www.example.com might translate to198.105.232.4. The DNS
system is, in fact, its own network. If one DNS server doesn't know how to
translate a particular domain name, it asks another one, and so on, until the
correct IP address is returned.
Installation
You can install a DNS server from the Control Panel or when promoting a
member server to a domain controller (DC) (Figure A). During the promotion, if
a DNS server is not found, you will have the option of installing it. In you
command prompt or just click “START” and click “RUN” and then type
“DCPROMO”.
Page 8 of 123
Figure A - Domain controller
To install a DNS server from the Control Panel, follow these steps:
Page 9 of 123
Figure B - Expand and click Roles
Page 10 of 123
Figure D - Install DNS
Introduction
Installing Windows Server 2008 DCHP Server is easy. DHCP Server is now a
“role” of Windows Server 2008 – not a windows component as it was in the past.
To do this, you will need a Windows Server 2008 system already installed and
configured with a static IP address. You will need to know your network’s IP
address range, the range of IP addresses you will want to hand out to your PC
clients, your DNS server IP addresses, and your default gateway. Additionally,
Page 11 of 123
you will want to have a plan for all subnets involved, what scopes you will want
to define, and what exclusions you will want to create.
To start the DHCP installation process, you can click Add Roles from the Initial
Configuration Tasks window or from Server Manager Roles Add Roles.
Page 12 of 123
Figure 1: Adding a new Role in Windows Server 2008
Page 13 of 123
When the Add Roles Wizard comes up, you can click Next on that screen.
Next, select that you want to add the DHCP Server Role, and click Next.
If you do not have a static IP address assigned on your server, you will get a
warning that you should not install DHCP with a dynamic IP address.
At this point, you will begin being prompted for IP network information, scope
information, and DNS information. If you only want to install DHCP server with
no configured scopes or settings, you can just click Next through these
questions and proceed with the installation.
On the other hand, you can optionally configure your DHCP Server during this
part of the installation.
Chose to take this opportunity to configure some basic IP settings and configure
my first DHCP Scope.
The network connection binding and asked to verify it, like this:
Page 14 of 123
Figure 3: Network connection binding
What the wizard is asking is, “what interface do you want to provide DHCP
services on?” take default and clicked Next.
Next, enter my Parent Domain, Primary DNS Server, and Alternate DNS
Server (as you see below) and clicked Next.
Page 15 of 123
Figure 4: Entering domain and DNS information
Then, I will promoted to configure a DHCP scope for the new DHCP Server. Configure
an IP address range of 192.168.1.50-100 to cover the 25+ PC Clients on your local
network. To do this, click Add to add a new scope. As you see below, for this purpose
name the Scope WBC-Local, configured the starting and ending IP addresses of
192.168.1.50-192.168.1.100, subnet mask of 255.255.255.0, default gateway of
192.168.1.1, type of subnet (wired), and activated the scope.
Page 16 of 123
Figure 5: Adding a new DHCP Scope
Back in the Add Scope screen, click Next to add the new scope (once the DHCP
Server is installed).
Chose to Disable DHCPv6 stateless mode for this server and click Next.
Then confirmed DHCP Installation Selections (on the screen below) and
click Install.
Page 17 of 123
Figure 6: Confirm Installation Selections
After only a few seconds, the DHCP Server was installed and I saw the window,
below:
Page 18 of 123
Figure 7: Windows Server 2008 DHCP Server Installation succeeded
Click Close to close the installer window, then moved on to how to manage my
new DHCP Server.
Like the installation, managing Windows Server 2008 DHCP Server is also
easy. Back in my Windows Server 2008Server Manager, under Roles, Click on
the new DHCP Server entry.
Page 19 of 123
However, to really configure the DHCP Server and see what clients have
obtained IP addresses, Go to the DHCP Server MMC. To do this, go to Start à
Administrative Tools à DHCP Server, like this:
Page 20 of 123
When expanded out, the MMC offers a lot of features. Here is what it looks like:
The DHCP Server MMC offers IPv4 & IPv6 DHCP Server info including all
scopes, pools, leases, reservations, scope options, and server options.
If you go into the address pool and the scope options, you can see that the
Configuration we made when we installed the DHCP Server did, indeed, work.
The scope IP address range is there, and so are the DNS Server & default
gateway.
Page 21 of 123
Figure 11: DHCP Server Address Pool
Page 22 of 123
SELF-CHECK CO3.1-1
1. What is the CLI command to start installing DNS Network Operating features
in Windows 2008r2?
a. dcpromo
b. dqpromote
c. dcprom
Page 23 of 123
Answer Key CO3.1-1
1. a. dcpromo
Page 24 of 123
TASK SHEET CO3.1-1 “Network Operating System (NOS) features”
Steps/Procedure:
1. Install DNS name your FQDN to “kenzhindrei.local”
2. Install DHCP role and configure your IP range 223.10.5.100 –
223.10.5.200
Page 25 of 123
Performance Criteria Checklist CO3.1-1 “Network Operating System (NOS)
features”
CRITERIA
YES NO
Did you….
1. Did the student properly configured and installed
DHCP
2. Did the student properly configured and installed
DNS?
Page 26 of 123
Learning Experiences
Page 27 of 123
Read Information Sheets 3.2-4
in Network services
configuration
Page 28 of 123
Read Information Sheets 3.2-6
in Installing and configuring
modules/add-ons
Page 29 of 123
INFORMATION SHEETS CO3.1-2
“FILE SERVICES”
Managing Files
Page 30 of 123
fie permissions work only when the operating system is running,
however. To protect data when someone steals a hard drive or an entire
computer, you must use encryption. EFS encrypts individual files and folders on
a per-user basis, whereas BitLocker encrypts entire volumes and can help
protect system files. The sections that follow give more information about these
three technologies.
NTFS file permissions determine which users can view or update files. For
example, you would use NTFS fie permissions to grant your Human Resources
group access to personnel files while preventing other users from accessing those
files. The default NTFS fie permissions for user and system folders are designed
to meet basic needs. These default permissions for different fie types are:
■ user files Users have full control permissions over their own files.
Administrators also have full control. Other users who are not administrators
cannot read or write to a user’s files.
■ system files Users can read, but not write to, the %SystemRoot% folder and
subfolders. Administrators can add and update files. This allows administrators,
but not users, to install updates and applications.
■ List folder Contents Users can browse a folder but not necessarily open the
files in it.
■ Read Users can view the contents of a folder and open files. If a user has Read
but not Read & Execute permission for an executable fie, the user will not be
able to start the executable.
Page 31 of 123
■ Read & Execute In addition to the Read permission, users can run
applications.
■ write Users can create files in a folder but not necessarily read them. This
permission is useful for creating a folder in which several users can deliver files
but not access each other’s files or even see what other files exist.
■ modify Users can read, edit, and delete files and folders.
■ full Control Users can perform any action on the fie or folder, including
creating and deleting it as well as modifying its permissions.
1. Open Windows Explorer (for example, by clicking Start and then choosing
Computer).
2. Right-click the file or folder, and then choose Properties. The Properties
dialog box for the file or folder appears.
5. If the user you want to configure access for does not appear in the Group Or
User Names list, click Add. Type the user name, and then click OK.
6. Select the user you want to configure access for. Then, select the check
boxes for the desired permissions in the Permissions For Users list, as shown
in Figure 1.2 Denying access always overrides allowed access. For example, if
Mary is a member of the Marketing group and you allow full control access for
Mary and then deny full control access for the Marketing group, Mary’s
effective permissions will be to deny full control.
Page 32 of 123
7. Repeat steps 5 and 6 to configure access for additional users.
8. Click OK twice.
Additionally, there are more than a dozen special permissions that you can
assign to a user or group. To assign special permissions, click the Advanced
button on the Security tab of the file or Administrator Properties dialog box, as
shown in Figure 1-3. To configure NTFS fie permissions from a command prompt
or script, use the icacls command. For complete usage information, type icacls
/? at a command prompt. NTFS fie permissions are in effect whether users are
logged on locally or accessing folders across the network.
Page 33 of 123
Figure 1.3
A user who does not have NTFS permissions to read a folder or fie will not see
it listed in the directory contents. This feature, known as Access-based
Enumeration (ABE), was introduced with Windows Server 2003 Service Pack 1.
NTFS provides excellent protection for files and folders as long as Windows is
running. However, an attacker who has physical access to a computer can start
the computer from a different operating system (or simply reinstall Windows) or
remove the hard disk and connect it to a different computer. Any of these very
simple techniques would completely bypass NTFS security, granting the attacker
full access to files and folders. EFS protects files and folders by encrypting them
on the disk. If an attacker bypasses the operating system to open a files, the files
appears to be random, meaningless bytes. Windows controls access to the
decryption key and provides it only to authorized users.
Page 34 of 123
The sections that follow describe how to configure EFS. Another data
encryption technology, BitLocker, encrypts entire volumes and helps prevent
operating system files from being maliciously modified. BitLocker is described
at the end of this lesson.
Figure 1.3
Page 35 of 123
Sharing folders
One of the most common ways for users to collaborate is by storing documents
in shared folders. Shared folders allow any user with access to your network and
appropriate permissions to access files. Shared folders also allow documents to
be centralized, where they are more easily managed than they would be if they
were distributed to thousands of client computers.
Although all versions of Windows since Windows for Workgroups 1.4 have
supported file sharing, Windows Server 2008 R2 includes the File Services server
role, which provides a robust set of features for sharing folders and managing
shared files. With the improved disk quota capability, Windows can notify users
and administrators when individual users consume too much disk space. DFS
provides a centralized directory structure for folders shared from multiple
computers and is capable of automatically replicating files between folders for
redundancy. Offline Files automatically copies shared files to mobile computers
so that users can access the files while disconnected from the network.
Windows Server 2008 R2 can share folders without adding any server roles.
However, adding the File Services server role adds useful management tools
along with the ability to participate in DFS namespaces, configure quotas,
generate storage reports, and other capabilities. To install the File Services server
role, follow these steps:
1. In Server Manager, select and then right-click Roles. Choose Add Role. The
Add Roles Wizard appears.
2. On the Before You Begin page, click Next.
3. On the Server Roles page, select the File Services check box. Click Next.
4. On the File Services page, click Next.
5. On the Select Role Services page, select from the following roles:
■ file server Although not required to share files, adding this core role service
allows you to use the Share And Storage Management snap-in.
■ Distributed file system Enables sharing files by using the DFS namespace
and replicating files between DFS servers. If you select this role service, the
wizard will prompt you to configure a namespace.
■ file server Resources manager Installs tools for generating storage reports,
configuring quotas, and defining fie screening policies. If you select this role
service, the wizard will prompt you to enable storage monitoring on the local
disks.
Page 36 of 123
■ services for network file system Provides connectivity for UNIX client
computers that use Network File System (NFS) for fie sharing. Note that most
modern UNIX operating systems can connect to standard Windows fie shares, so
this service is typically not required.
■ windows search service Indexes files for faster searching when clients connect
to shared folders. This role service is not intended for enterprise use. If you select
this role service, the wizard will prompt you to enable indexing on the local disks.
You can access the File Services tools by using the Roles\File Services node in
Server Manager. The sections that follow provide more information about these
role services.
Folder Sharing
You can share folders across the network to allow other computers to access
them, as if the computers were connected to a local disk. Sharing Folders from
Windows Explorer The simplest way to share a folder is to right-click the folder
in Windows Explorer, choose Share With, and then choose Specific People. As
shown in Figure 1.4, the File Sharing dialog box appears and allows you to select
the users who will have access to the folder. Click Share to create the shared
folder, and then click Done.
Page 37 of 123
Figure 1.4
Using this interface you, can select either Read or Read/Write permissions. The
following section describes a different technique for sharing folders that provides
more permissions flexibility.
2. On the Shared Folder Location page, click the Browse button to select the
folder to share. Click OK. Click Next.
3. On the NTFS Permissions page, you can choose to edit the NTFS fie system
permissions for the shared folder. If you want to change the current permissions,
select Yes, and then, if necessary, click Edit Permissions. Configure the NTFS
permissions as necessary, and then click OK. Click Next.
4. On the Share Protocols page, you can choose whether to share the folder by
using Windows protocol (indicated as SMB, which stands for Server Message
Block) or using a UNIX protocol (indicated as NFS, or Network File System).
Typically, SMB will suffice, even for UNIX clients. NFS is available only when the
Services For Network File System role service is installed. Click Next.
Page 38 of 123
5. On the SMB Settings page, click Advanced if you want to change the default
settings for the number of simultaneous users permitted, offline files, or access-
based enumeration. Access-based enumeration hides shared folders that a user
does not have permission to access. Click Next.
6. On the SMB Permissions page, as shown in Figure 1.5, select the permissions
you want to assign.
To define custom permissions, select Users And Groups Have Custom Share
Permissions, and then click the Permissions button. Click Next.
7. On the Quota Policy page, select the Apply Quota check box if you want to
define a quota. Then, select a quota template. Click Next.
8. On the File Screen Policy page, select the Apply File Screen check box if you
want to allow only specific types of files in the folder. Then, select the file screen
you want to use. Click Next.
9. On the DFS Namespace Publishing page, select the Publish The SMB Share
To A DFS Namespace check box if desired. Then, provide the DFS namespace
information. Click Next.
Page 39 of 123
10. On the Review Settings And Create Share page, click Create. Then click
Close.
Page 40 of 123
Task Sheets CO3.1-2 in File Services
Steps/Procedure:
1. Install Files Services Role on Windows 2008 server r2
2. Create a folder on Drive “C:” and name it “Shared Folder”.
3. Configure the folder from the Security and sharing so that the users
can access the folder.
Page 41 of 123
Performance Criteria Checklist CO3.1-2 in File Services
CRITERIA
YES NO
Did you….
1. Did the student properly installed File Services Role?
Page 42 of 123
Learning Experiences
Page 43 of 123
Read Information Sheets 3.3-3
Enterprise policies and
procedures
Answer Self-Check 3.3-3in
Enterprise policies and
procedures
Page 44 of 123
INFORMATION SHEETS CO3.1-3
2. Right-click the Domain node or the OU node in which you want to add the
new OU, point to New, and then click Organizational Unit.
3. Type the name of the organizational unit. Be sure to follow the naming
conventions of your organization.
4. Select Protect Container From Accidental Deletion. You’ll learn more about
this option later in this section.
Page 45 of 123
5. Click OK. OUs have other properties that can be useful to configure. These
properties can be set after the object has been created.
6. Right-click the OU and click Properties. Follow the naming conventions and
other standards and processes of your organization.
You can use the Description field to explain the purpose of an OU.
If an OU represents a physical location, such as an office, the OU’s address
properties can be useful. You can use the Managed By tab to link to the user or
group that is responsible for the OU. Click the Change button under the Name
box. You’ll learn about the Select Users, Contacts, Or Groups dialog box later in
this lesson. The remaining contact information on the Managed By tab is
populated from the account specified in the Name box. The Managed By tab is
used solely for contact information—the specified user or group does not gain
any permissions or access to the OU.
7. Click OK.
Windows Server 2008 introduced a new option when creating an OU: Protect
Container From Accidental Deletion. This option adds a safety switch to the OU
so that it cannot be accidentally deleted. Two permissions are added to the OU:
Everyone::Deny::Delete and Everyone::Deny::Delete Subtree. No user, not even
an administrator, will be able to delete the OU and its contents accidentally. It
is highly recommended that you enable this protection for all new OUs.
If you want to delete the OU, you must first turn off the safety switch. To delete
a protected OU, follow these steps:
1. In the Active Directory Users And Computers snap-in, click the View menu
and select Advanced Features.
2. Right-click the OU and click Properties.
3. Click the Object tab. If you do not see the Object tab, you did not enable
Advanced Features in step 1.
4. Clear the check box labeled Protect Object From Accidental Deletion.
5. Click OK.
6. Right-click the OU and click Delete.
7. You are prompted to confirm that you want to delete the OU. Click Yes.
8. If the OU contains any other objects, you are prompted by the Confirm
Subtree Deletion dialog box to confirm that you want to delete the OU and all
the objects it contains. Click Yes.
Page 46 of 123
Creating a User Object
To create a new user in Active Directory, perform the following steps. Be certain
to follow the naming conventions and processes specified by your organization.
1. Open the Active Directory Users And Computers snap-in.
2. In the console tree, expand the node that represents your domain (for
instance, contoso.com) and navigate to the OU or container (for example, Users)
in which you want to create the user account.
3. Right-click the OU or container, point to New, and then click User. The New
Object – User dialog box appears, as shown in Figure 1.5.
4. In First Name, type the user’s fist name.
5. In Initials, type the user’s middle initial(s). Note that this property is, in fact,
meant for the initials of a user’s middle name, not the initials of the user’s fist
and last name.
6. In Last Name, type the user’s last name.
8. In User Logon Name, type the name that the user will log on with and, from
the drop-down list, select the user principle name (UPN) suffix that will be
appended to the user logon name following the @ symbol.
Page 47 of 123
Figure 1.5
User names in Active Directory can contain some special characters (including
periods, hyphens, and apostrophes), which allows you to generate accurate user
names such as O’Hara and Smith-Bates. However, certain applications can have
other restrictions, so it is recommended that you use only standard letters and
numerals until you have fully tested the applications in your enterprise for
compatibility with special characters in logon names. You can manage the list of
available UPN suffixes by using the Active Directory Domains And Trusts snap-
in. Right-click the root of the snap-in, Active Directory Domains And Trusts,
choose Properties, and then use the UPN Suffixes tab to add or remove suffixes.
The DNS name of your Active Directory domain will always be available, because
a suffix and cannot be removed.
9. In the User logon name (Pre–Windows 2000) box of the Active Directory Users
And Computers snap-in, enter the pre–Windows 2000 logon name, often called
the down level logon name
10. Click Next.
11. Enter an initial password for the user in the Password and Confirm
Password boxes.
12. Select the User Must Change Password At Next Logon check box. It is
recommended that you always select this option so that the user can create a
new password unknown to the IT staff. Appropriate support staff members can
always reset the user’s password at a future date if they need to log on as the
Page 48 of 123
user or access the user’s resources. However, only users should know their
passwords on a day-to-day basis.
16. Configure user properties. Be certain to follow the naming conventions and
other standards of your organization.
Groups are an important class of object because they are used to collect users,
computers, and other groups to create a single point of management. The most
straightforward and common use of a group is to grant permissions to a shared
folder. If a group has read access to a folder, for example, any of the group’s
members can read the folder. You do not have to grant read access directly to
each individual member; you can manage access to the folder simply by adding
and removing members of the group.
To create a group:
2. In the console tree, expand the node that represents your domain (for
instance, contoso.com) and navigate to the OU or container (such as Users) in
which you want to create the group.
4. Type the name of the new group in the Group Name box. Most organizations
have naming conventions that specify how group names should be created. Be
sure to follow the guidelines of your organization. By default, the name you type
is also entered as the pre–Windows 2000 name of the new group. It is very highly
recommended that you keep the two names the same.
Page 49 of 123
5. Do not change the name in the Group Name (Pre–Windows 2000) box.
Figure 1.6
A Domain Local group is used to collect users and groups who share
similar resource access needs, such as all users who need to be able to
modify a project report.
Page 50 of 123
Note: that if the domain in which you are creating the group object is at a mixed or interim domain functional level,
you can select only Domain Local or Global scopes for security groups.
8. Click OK. Group objects have several properties that are useful to
configure. These can be specified after the object has been created.
10. Configure the properties of the group. Be sure to follow the naming
conventions and other standards of your organization. The group’s
Members and Member Of tabs specify who belongs to the group and
what groups the group itself belongs to. The group’s Description field,
because it is easily visible in the details pane of the Active Directory Users
And Computers snap-in, is a good place to summarize the purpose of the
group and the contact information for individuals responsible for deciding
who is and is not a member of the group. The group’s Notes field can be
used to provide more detail about the group. The Managed By tab can be
used to link to the user or group that is responsible for the group. Click
Change under the Name box. To search for a group, you must first
click Object Types and select Groups. The Select User, Contact, Or Group
dialog box is discussed later in this lesson. The remaining contact
information on the Managed By tab is populated from the account
specified in the Name box. The Managed By tab is typically used for contact
information so that if a user wants to join the group, you can decide who
in the business should be contacted to authorize the new member.
However, if you select the Manager Can Update Membership List option,
the account specified in the Name box is given permission to add and
remove members of the group. This is one method for delegating
administrative control over the group.
Page 51 of 123
Task Sheets CO3.1-3 in User access level configuration
Supplies/Materials :
Steps/Procedure:
1. Create an OU named Mygroup in the Active Directory User and
Computers snap-in.
Page 52 of 123
Performance Criteria Checklist CO3.1-3 in User access level configuration
CRITERIA
YES NO
Did you….
1. Did the student created an OU named Mygroup
Page 53 of 123
INFORMATION SHEETS 3.1-4
Setting-up client/user access and security
In this chapter, you will learn how to apply tools and techniques to
automate the creation and management of users and to locate and
manipulate user objects and their attributes. Along the way, you will be
introduced to Microsoft Windows PowerShell, which represents the
future of command-line-based and automated administration for Windows
technologies. You will learn a variety of options for performing each of the
most common administrative tasks. The certification exam will expect you
to have a very basic understanding of the purpose and syntax of
command-line utilities and Windows PowerShell. However, this chapter
goes beyond the expectations of the exam to provide a solid introduction
to scripting and automation. Practice what you learn in this chapter, not
because you’ll need to be a scripting guru to pass the exam, but because
the more you can automate those tedious administrative tasks, the more
you can elevate your productivity and your success.
Page 54 of 123
To create a user account template, simply create a user account and prepopulate
appropriate attributes. We recommend that you use a naming standard that
makes templates easy to find. For example, configure the full name of the user
with an underscore (_) as the first character, such as _Sales User. The
underscore prefix will cause all templates to appear at the top of the list of users
in an organizational unit (OU).
The template account should not be used to log on to the network, so be sure
to disable the account.
1. Right-click the template user account, and then click Copy. The Copy Object
– User Wizard appears.
5. In the User Logon Name box, type the user logon name, and then select the
appropriate user principal name (UPN) suffix in the drop-down list.
6. In the User Logon Name (Pre-Windows 2000) box, type the user’s pre–Windows
2000 user name, and then click Next.
9. If the user account from which the new user account was copied was disabled,
clear the Account Is Disabled check box to enable the new account.
After a user is created by copying the template, you can view and modify its
attributes in the Properties dialog box of the new account. It’s important to
realize that not all attributes are copied from the template. The list below
summarizes the attributes that are copied from the template, grouped by the
tabs in the Properties dialog box.
Page 55 of 123
Address tab P.O. box, city, state or province, ZIP or postal code, and
country
or region are copied. Note that the street address itself is not copied.
Account tab Logon hours, logon workstations, account options, and
account
expiration are copied.
Profile tab Profile path, logon script, home drive, and home folder path
are copied.
Organization tab Department, company, and manager are copied.
Member Of tab Group membership and primary group are copied.
DSRm Removes an object, all objects in the subtree beneath a container object,
or both.
Page 56 of 123
The object type, user, immediately follows the command. After the object type is
the object’s DN. When the object’s DN includes a space, surround the DN with
quotes. The following command removes the same user:
Use the DSAdd command to create objects in Active Directory. The DSAdd User
command creates a user object and accepts parameters that specify properties
of the user. The following command shows the basic parameters required to
create a user account:
dsadd user "User DN" -samid "pre-Windows 2000 logon name" -pwd {Password
| *} -mustchpwd yes
The -pwd parameter specifies the password. If it is set to an asterisk (*), you are
prompted for a user password. The -mustchpwd parameter specifies that the user
must change the password at next logon. DSAdd User accepts several
parameters that specify properties of the user object. The following command
creates a user with some of the more important fields populated:
Most parameter names are self-explanatory: -email, -profie, and -company, for
example. Type dsadd user /? or search the Windows Server 2008 R2 Help and
Support Center for thorough documentation of the DSAdd User parameters.
Page 57 of 123
Task Sheets CO3.1-3 in User access level configuration
Supplies/Materials :
Steps/Procedure:
1. Using the command line add user named “ric dingal”
organization unit “battousai” password “samurai_x”
Page 58 of 123
Performance Criteria Checklist CO3.1-3 in User access level configuration
CRITERIA
YES NO
Did you….
1. Did the student create a user OU and password using
command line tools?
Page 59 of 123
INFORMATION SHEETS CO3.2-1
“Computer Servers and Functions”
What are server roles, role services, and features?
This section defines the terms role, role service, and feature as they apply to
Windows Server 2008 R2.
Roles
A server role is a set of software programs that, when they are installed and
properly configured, lets a computer perform a specific function for multiple
users or other computers within a network. Generally, roles share the following
characteristics.
They typically include their own databases that can queue user or
computer requests, or record information about network users and
computers that relates to the role. For example, Active Directory Domain
Services includes a database for storing the names and hierarchical
relationships of all computers in a network.
Role services
Role services are software programs that provide the functionality of a role. When
you install a role, you can choose which role services the role provides for other
users and computers in your enterprise. Some roles, such as DNS Server, have
only a single function, and therefore do not have available role services. Other
roles, such as Remote Desktop Services, have several role services that can be
installed, depending on the remote computing needs of your enterprise.
Page 60 of 123
You can consider a role as a grouping of closely related, complementary role
services, for which, most of the time, installing the role means installing one or
more of its role services.
Features
Features are software programs that, although they are not directly parts of
roles, can support or augment the functionality of one or more roles, or improve
the functionality of the server, regardless of which roles are installed. For
example, the Failover Clustering feature augments the functionality of other
roles, such as File Services and DHCP Server, by allowing them to join server
clusters for increased redundancy and improved performance. Another feature,
Telnet Client, lets you communicate remotely with a telnet server over a network
connection, a functionality that enhances the communication options of the
server.
Windows Server 2008 is designed around certain roles and features. A role is a
primary duty that a server performs. For example, you typically would point at
a server and say "that's my domain controller (DC) and DNS server." A feature is
something that helps a server perform its primary duty (Windows Backup,
network load balancing). Certain roles are comprised of sub-elements called Role
Services, which are distinct units of functionality. For example, within the role
of Terminal Services, is the TS Gateway and TS Licensing Role Services (among
others). Please note that Server 2008 Web Edition has only the Web Server role.
Also note that WINS isn't a role in Server 2008, it's a feature (see also, "Control
Windows Server 2008 Roles and Features" and "Windows Server 2008 in
Perspective").
Active Directory Certificate Services. Provides the services for creating and
managing public key certificates used in most aspects of security today,
including HTTP Security (HTTPS), which is vital to many Windows Roles;
Wireless network security; VPNs; IPsec; Encrypting File System (EFS); and other
software security systems that require encryption or digital signatures.
Active Directory Domain Services. Previously known as just Active Directory,
AD Domain Services stores information about users, computers, and other
devices on the network in a security boundary known as a domain. With
resources and users being members of a domain or trusted hierarchy of domains
Page 61 of 123
known as a forest, access to company wide information is secure and no burden
on the user.
Active Directory Federation Services (ADFS). Provides Web single-sign-on
(SSO) capabilities across separate organizations, allowing authentication across
multiple Web applications in various companies using a single user account.
ADFS accomplishes this by securely federating, or sharing, user identities and
access rights, in the form of digital claims, between partner organizations once
a federation trust has been established.
Active Directory Lightweight Directory Services. Previously known as Active
Directory Application Mode (ADAM), Active Directory Lightweight Directory
Services provides a directory service that organizations can use to store
information specific to an application that is separate from the organization's
main AD. Active Directory Lightweight Directory Services runs as a non-OS
service and doesn't require deployment on a DC, with multiple Active Directory
Lightweight Directory Services instances supported on a single server.
Active Directory Rights Management Services. Provides very granular
protection on supported documents via AD RMS-enabled applications to not only
protect documents and other digital information but also to control the actions
that authorized consumers of the information can do.
Application Server. Comprises a number of components that are responsible
for the deployment and managing of .NET Framework 3.0 applications. These
components include the .NET Framework, Web Server (IIS) Support, Message
Queuing, COM+ Network Access, TCP Port Sharing, Distributed Transactions
and Windows Process Activation Service Support.
Dynamic Host Configuration Protocol (DHCP) Server. Allows servers to assign
or lease IP addresses to computers and other devices that are enabled as DHCP
clients on the network.
DNS Server. DNS is used to resolve host names to IP addresses, both IPv4 and
IPv6.
Fax Server. Sends and receives faxes, and allows you to manage fax resources
such as jobs, settings, reports, and fax devices on this computer or on the
network.
File Services. Provides technologies for storage management, which includes
control of the types of files stored on a server via file screens and powerful quotas,
file replication, distributed namespace management, NFS, and support for UNIX
clients.
Hyper-V. Provides the services that you can use to create and manage virtual
machines (VMs) and their resources. Hyper-V will ship within 180 days of the
Server 2008 launch, but a beta version is supplied with the 2008 RTM.
Network Policy and Access Services. Delivers a variety of methods to provide
users with local and remote network connectivity, to connect network segments,
Page 62 of 123
and to allow network administrators to centrally manage network access and
client health policies. With Network Access Services, you can deploy VPN servers,
dial-up servers, routers, and 802.11 protected wireless access. You can also
deploy RADIUS servers and proxies, and use Connection Manager
Administration Kit to create remote access profiles that allow client computers
to connect to your network.
Print Services. Enables the management of print servers and printers. A print
server reduces administrative and management workload by centralizing printer
management tasks. Also part of Print Services is the Print Management Console,
which streamlines the management of all aspects of printer server management
including the ability to remotely scan a subnet for printers and automatically
create the necessary print queues and shares.
Terminal Services. Enables users to access Windows-based programs that are
installed on a terminal server or to access the Windows desktop from almost any
computing device that supports the RDP protocol. Users can connect to a
terminal server to run programs and to use network resources on that server.
Server 2008 has technologies that allow the RDP traffic necessary for
communication with a terminal server from a client to be encapsulated in HTTPS
packets, which means all communication is via port 443 so no special holes are
required in the firewall for access to terminal servers within an organization from
the Internet.
Universal Description, Discovery, and Integration (UDDI) Services. UDDI
Services provides description, discovery, and integration capabilities for sharing
information about Web services within an organization's intranet, between
business partners on an extranet, or on the Internet.
Web Server (IIS). Enables sharing of information on the Internet, intranets, or
extranets. It's a unified Web platform that integrates IIS 7.0, ASP.NET, and
Windows Communication Foundation. IIS 7.0 also features enhanced security,
simplified diagnostics, and delegated administration.
Windows Deployment Services (WDS). Used to install and configure Windows
OSs that are stored in the Windows Imagine format remotely on computers via
Pre-boot Execution Environment (PXE) boot ROMs.
Features
.NET Framework 3.5.1. The .NET Framework 3.5.1 builds incrementally on the
features added in the .NET Framework 3.0, such as enhancements to Windows
Workflow Foundation (WF), Windows Communication Foundation (WCF),
Windows Presentation Foundation (WPF) and Windows CardSpace.
BitLocker Drive Encryption. BitLocker Drive Encryption helps protect data on
lost, stolen or inappropriately decommissioned computers by encrypting the
Page 63 of 123
volume and checking the integrity of early boot components. Data is only
decrypted if those components are successfully verified and the encrypted drive
is located in the original computer. Integrity checking requires a compatible
trusted platform module (TPM).
SMTP Server. Simple Mail Transfer Protocol (SMTP) Server supports the transfer
of e-mail messages between e-mail systems.
Internet Printing Client. Internet Printing Client enables users to connect and
print to printers on the local network or over the Internet by using Internet
Printing Protocol (IPP). You can use the Internet Printing Client and IPP to
connect to the shared printer by using a Web browser (if the print server has the
Internet Printing role service installed), or by using the Network Printer
Installation Wizard.
Multipath I/O. Multipath I/O (MPIO), together with the Microsoft Device Specific
Module (DSM) or a third-party DSM, provides support for using multiple data
paths to a storage device on Windows.
Page 64 of 123
Message Queuing. Message Queuing provides guaranteed message delivery,
efficient routing, security, and priority-based messaging between applications.
Message Queuing also accommodates message delivery between applications
that run on different operating systems, use dissimilar network infrastructures,
are temporarily offline, or that are running at different times.
Page 65 of 123
Self-Check 3.2-1 in Computer servers and functions
Page 66 of 123
Answer Key 3.2-1 “Computer servers and functions”
5. SMTP Server
Page 67 of 123
INFORMATION SHEETS CO3.2-2
The Network Policy and Access Services (NPAS) server role is a logical
grouping of the following related network access technologies:
These technologies are the role services of the NPAS server role. When you
install the NPAS server role, you can install one or more role service while
running the Add Roles Wizard.
Page 68 of 123
Microsoft Windows Server 2008 R2, Windows 7, Windows Server 2008, and
Windows Vista include a complete redesign of the TCP/IP protocol suite. The
TCP/IP redesign supports both Internet Protocol version 4 (IPv4) and Internet
Protocol version 6 (IPv6) to meet the connectivity and performance requirements
of today's networked environments.
Define the priority of traffic: You can configure a QoS policy to mark
outbound network traffic by using a specific Differentiated Services Code
Point (DSCP) value, as defined in RFC 2474.
Manage the use of bandwidth: You can configure a QoS policy with a
throttle rate for outbound traffic. With throttling, the QoS components
limit the aggregate outgoing network traffic that matches the QoS policy
settings to a specified rate.
Page 69 of 123
High-Speed Networking Features. High-speed networking features include TCP
Chimney Offload, Virtual Machine Chimney, Virtual Machine Queue, receive-
side scaling, and Network Direct Memory Access (NetDMA). These features can
improve network and operating system performance, and are available in
Windows Server® 2008 R2. TCP Chimney Offload, receive-side scaling, and
NetDMA are also available in Windows Server® 2008.
Windows Services for NetWare 5.03 does not run on the Windows
Server 2008 R2 operating systems. However, you can still use it to migrate to an
infrastructure based on Windows Server 2008 R2 by using a server running
Windows Server 2003 R2 with Service Pack 2 (SP2) as a member domain
controller.
The following tools in Windows Services for NetWare 5.03 can help simplify your
organization’s adoption of Windows Server 2008 R2 and facilitate its migration
to Windows Server 2008 R2 from NetWare:
Page 70 of 123
SELF-CHECK CO3.2-2
Types of Network services
1. NPS
2. RRAS
3. HRA
4. HCAP
5. TCP/IP
6. QoS
7. NetDMA
8. GPO
Page 71 of 123
Answer Key CO3.2-2
6. Quality of Service
Page 72 of 123
INFORMATION SHEETS CO3.2-2
Server Configuration
If you've just installed Windows Server 2008, and are trying to get connected to
the internet via wireless you'll have no end of problems as it just will not see
any wireless networks no matter what driver you install for your wireless
card.
Page 73 of 123
When the Select Features window appears, scroll down to Wireless LAN Service, and place a
checkmark in there.
Page 74 of 123
you'll be informed that the server may need a restart... click install to continue
click close to continue and then browse your wireless networks as normal.
Page 75 of 123
choose one to connect to and then you are done !
Page 76 of 123
Task Sheets CO3.2-3 in Server configuration
Supplies/Materials :
Steps/Procedure:
1. In the Server Manager enable Wireless Network feature.
2. Connect the laptop pc using Wireless Network
Page 77 of 123
Page 78 of 123
Performance Criteria Checklist CO3.2-3 in Server configuration
CRITERIA
YES NO
Did you….
1. Did the student enabled and configures wireless
feature of Windows 2008 server
2. Did the student connect the laptop pc to the network
using wireless network?
Page 79 of 123
Information Sheets 3.2-4
Network Services Configuration
Windows Server 2008 R2 can share printers without adding any server roles.
However, adding the Print And Document Services server role adds the Print
Management snap-in, which simplifies printer configuration. To install the Print
And Document Services server role, follow these steps:
1. In Server Manager, right-click Roles, and then choose Add Roles. The Add
Roles Wizard appears.
3. On the Server Roles page, select the Print And Document Services check
box. Click Next.
5. On the Select Role Services page, select the appropriate check boxes for the
following roles, and then click Next:
■ Print server Installs the Print Management snap-in, described later in this
lesson. This is sufficient for allowing Windows and many non-Windows clients
to print.
■ LPD service Allows clients to print using the Line Printer Daemon (LPD)
protocol, which is commonly used by UNIX clients. To act as an LPD client, you
must install the Line Printer Remote (LPR) Port Monitor feature, as described in
“Installing Printers” later in this chapter.
■ Internet Printing Allows clients to print using Internet Printing Protocol (IPP)
and creates a website where users can manage print jobs using their web
browsers. This role service requires Internet Information Services (IIS).
Page 80 of 123
6. If you are prompted to install the Web Server (IIS) role service, click Add
Required Role Services, and then click Next.
7. If the Specify Service Account page appears because you chose to install the
Distributed Scan Server role service, specify a domain user account that has
permissions to scan processes in Active Directory Domain Services and to specify
the scan destinations. Typically, you should create a new account specifically for
this purpose. Click Next.
8. If the Specify Temporary Folder Settings page appears because you chose to
install the Distributed Scan Server role service, select a folder to temporarily
store scan files and specify a size limit for the folder. Click Next.
9. If the Specify E-Mail Server For Scan Server page appears because you chose
to install the Distributed Scan Server role service, specify your Simple Mail
Transport Protocol (SMTP) server. Click Next.
10. If the Choose A Server Authentication Certificate For SSL Encryption page
appears because you chose to install the Distributed Scan Server role service.
11. If the Web Server (IIS) page appears because you selected the Internet
Printing role service, click Next. Then, on the Select Role Services page, configure
the required IIS role services by using the default settings, and click Next again.
14. If prompted, restart the computer. Before attempting to use the Print And
Document Services management tools, close and reopen Server Manager. You
can access the Print And Document Services tools by using the Roles\Print And
Document Services node in Server Manager.
Sharing Printers
You can share printers by using both Control Panel and the Print Management
snap-in. From Control Panel, right-click the printer, choose Printer Properties,
and then select the Sharing tab. To share a printer by using the Print
Management snap-in, right-click the printer, and then choose Manage Sharing.
Whichever method you choose, you will see a dialog box resembling 1.7. To share
the printer, select the Share This Printer check box. Select the Render Print Jobs
On Client Computers check box to allow clients to handle the processor-intensive
rendering process, or clear the check box to push the processing to the print
server. Select the List. In The Directory check box to allow the printer to be found
in Active Directory. To add a driver for a processor type other than the operating
system’s default, click the Additional Driver’s button. Then, click OK. If the
Page 81 of 123
client’s operating system uses the same driver as the server, the client can
automatically download the driver the first time the client connects to the
printer. If a client requires a different driver—for example, if a client computer
uses a 32-bit version of Windows and the
server uses a 64-bit version of Windows—you should install the additional driver
on the server to allow the client to automatically install the driver. From the
Sharing tab, click the Additional Drivers button, select the check boxes for the
platforms you want to support, click OK, and then select the printer driver.
Page 82 of 123
Page 83 of 123
Configuring Print Server and Printer Permissions
■ manage Documents Users can remove documents that have been submitted
to the printer. Print servers also have the Print, Management Printers, and
Manage Documents permissions. However, these options define only the default
settings for new printers that you create. Changing these permissions does not
impact any existing printers. In addition to the default printer permissions, you
can configure the following print server permissions to delegate management to
non administrators:
■ view server Users can view the server and shared printers.
■ manage server Users can manage the print server features. Print server and
printer permissions are in effect regardless of whether users are logged on locally
or are accessing folders across the network.
Page 84 of 123
Task Sheets CO3.2-4 in Network Services Configuration
Title: Enabling Wireless feature of Windows 2008 server
Supplies/Materials :
Steps/Procedure:
1. In the Server Manager enable Print and Document Services
2. Connect printer to the server and install
3. Using Printer Sharing share printer so users can access the
printer
Page 85 of 123
Performance Criteria Checklist CO3.2-4 in Network Services Configuration
CRITERIA
YES NO
Did you….
1. Did the student enabled Print and Document Services?
Page 86 of 123
Page 87 of 123
INFORMATION SHEETS 3.2-5
“Web Applications”
IIS is one of the Windows Server® server roles. IIS can be installed through the
graphical user interface (GUI) by using the new Server Manager interface after
the Windows Server operating system is installed. Server Manager provides a
single dashboard to install or uninstall server roles and features. Server Manager
also gives an overview of all currently installed roles and features. When IIS is
chosen from the Server Manager, the basic components and services needed for
IIS are automatically selected.
1. Click Start -> All Programs -> Administrative Tools -> Server Manager.
2. In the Server Manager window, scroll down to Roles Summary, and then
click Add Roles. The Add Roles Wizard will start with a Before You Begin page.
The wizard asks for verification of the following:
Page 88 of 123
b. The network settings, such as IP addresses, are configured.
3. Select Web Server (IIS) on the Select Server Roles page. An introductory
page will open with links for further information.
Note: When you use the Add Roles Wizard to install IIS, you get the default
installation, which has a minimum set of role services. If you need additional IIS
role services, such as Application Development or Health and Diagnostics,
make sure to select the check boxes associated with those features in the Select
Role Services page of the wizard.
4. Select the IIS services to be installed on the Select Role Services page. Add
only the modules necessary. In this case, ASP.NET is selected, and a description
of ASP.NET appears in the right pane. Once desired modules are added,
click Next.
Page 89 of 123
5. Add any required role services.
Page 90 of 123
7. Confirm that the Web server works by using http://localhost.
Note: Install only the absolutely necessary IIS services to minimize the IIS installation footprint. This
also minimizes the attack surface, which is one of the benefits of IIS 7 and above.
Page 91 of 123
Self-Check 3.2-5
Web Applications/Technologies Configuration
Page 92 of 123
Answer Sheet 3.2-5 in Web Applications/Technologies Configuration
IIS is the Web Server (IIS) role in Windows Server® 2008 R2, and the Web server
in Windows® 7. By using IIS administration tools, such as IIS Manager, you can
configure settings for Web servers, sites, and applications.
Page 93 of 123
Task Sheets CO3.2-5 in Modules/add-ons installation and
updates procedures
Title: Installing WEB ISS
Supplies/Materials :
Steps/Procedure:
1. In the Server Manager Add WEB ISS role
2. Check installed role using browser
Page 94 of 123
Performance Criteria Checklist CO3.2-5 in Modules/add-ons installation and
updates procedures
CRITERIA
YES NO
Did you….
1. Did the student successfully installed WEB IIS
Page 95 of 123
INFORMATION SHEETS CO3.2-6
”Testing Network Services”
Overview
Sometimes the CrashPlan app can't make an active network connection even if
the Internet appears to be working. This is because CrashPlan relies on specific
ports to be open. Telnet is a great tool for network troubleshooting, either for
computer-to-computer backups or backups to the cloud. The intent is to use the
Telnet client to test connectivity on the correct ports so as to rule out any sort of
issue with firewalls, anti-virus products, or other network issues.
Considerations
We are not trying to create an actual Telnet session, so you should be able to
run the test even if Telnet access (TCP 23) is “blocked” on the computer.
If the Telnet test passes, there probably isn't an issue with the network. However,
some firewall and anti-virus applications are capable of blocking connections on
a per-application basis, so please ensure that CrashPlan has an exception
configured in your security software.
Try disabling your firewall and any security software. If the test passes with the
firewall and/or security software disabled, then you know you have a
Page 96 of 123
configuration issue with your software firewall or security software. Consult your
manufacturer documentation on how to configure an exception for CrashPlan on
TCP port 4242 or 443.
With your software firewall or security software still disabled, check the router
configuration. Consult your router manufacturer's documentation to make sure
your router is configured properly to allow the connection. Test again after
making any modifications to the router configuration.
Try bypassing your router completely and plugging your computer directly into
your modem instead. This will help rule out the router as a possible issue.
Using Telnet
Once you have the address, open a command prompt on the source computer:
Example:
Trying 50.93.246.47...
Connected to central.crashplan.com.
Page 97 of 123
Escape character is '^]'.
?cA-
18782|com.code42.messaging.security.SecurityProviderReadyMessage??"???Q
??????OM???`q?ʯ??N??6C:
Computer-To-Computer Destinations
Internal (displayed first): Use if the computers are on the same network or at
the same location
Public: Use this address if the computers are on different networks or at
different location
Using Telnet
Once you have the IP address, open a command prompt on the source
computer:
Page 98 of 123
telnet IP_address_of_destination_computer 4242
Example:
Trying 54.162.1.10…
??d???t”??Y+???+|???Ø‘?d6#?еW?{?????6߉?D!@g?????l?????>?]??b6`Û›??g
ֲ$d?c΋?
Telnet is not installed by default in Windows Vista or newer; so if you try to run
it you will get the message "'Telnet' is not recognized as an operable program or
batch file." To install Telnet, please follow these instructions:
Page 99 of 123
Self-Check CO3.2-6
Testing Network Services
Following are key planning steps before installing Active Directory Domain
Services (AD DS) and DNS on AD-DNS-01.
A first step in the AD DS design process is to determine how many forests your
organization requires. A forest is the top-level AD DS container, and consists of
one or more domains that share a common schema and global catalog. An
organization can have multiple forests, but for most organizations, a single forest
design is the preferred model and the simplest to administer.
When you create the first domain controller in your organization, you are
creating the first domain (also called the forest root domain) and the first forest.
Before you take this action using this guide, however, you must determine the
best domain name for your organization. In most cases, the organization name
is used as the domain name, and in many cases this domain name is registered.
If you are planning to deploy Web servers for your customers or partners, choose
a domain name and ensure that the domain name is not already in use.
While installing AD DS, you must choose the forest functional level that you want
to use. Domain and forest functionality, introduced in Windows Server 2003
Active Directory, provides a way to enable domain- or forest-wide Active Directory
features within your network environment. Different levels of domain
functionality and forest functionality are available, depending on your
environment. Forest functionality enables features across all the domains in
your forest. The following forest functional levels are available:
Windows Server 2008. This forest functional level supports only domain
controllers that are running Windows Server 2008 and later versions of
the Windows Server operating system.
If you are deploying a new domain in a new forest and all of your domain
controllers will be running Windows Server 2008 R2, it is recommended that you
configure AD DS with the Windows Server 2008 R2 forest functional level during
AD DS installation.
Before configuring each computer with a static IP address, you must plan your
subnets and IP address ranges. In addition, you must determine the IP addresses
of your DNS and WINS servers. If you plan to install a router that provides access
to other networks, such as additional subnets or the Internet, you must know
the IP address of the router, also called a default gateway, for static IP address
configuration.
The following table provides example values for static IP address configuration.
IP address 192.168.0.3
Because DHCP messages are broadcast messages, they are not forwarded
between subnets by routers. If you have multiple subnets and want to provide
DHCP service for each subnet, you must do one of the following:
Each subnet must have its own unique IP address range. These ranges are
represented on a DHCP server with scopes.
A scope is an administrative grouping of IP addresses for computers on a subnet
that use the DHCP service. The administrator first creates a scope for each
physical subnet and then uses the scope to define the parameters used by
clients.
A scope has the following properties:
Lease duration values, which are assigned to DHCP clients that receive
dynamically allocated IP addresses.
Any DHCP scope options configured for assignment to DHCP clients, such
as DNS server IP address, router/default gateway IP address, and WINS
server IP address.
Before deploying your servers, list your subnets and the IP address range you
want to use for each subnet.
Network IDs and host IDs within an IP address are distinguished by using a
subnet mask. Each subnet mask is a 32-bit number that uses consecutive bit
groups of all ones (1) to identify the network ID and all zeroes (0) to identify the
host ID portions of an IP address.
For example, the subnet mask normally used with the IP address
131.107.16.200 is the following 32-bit binary number:
11111111 11111111 00000000 00000000
Address
Bits for subnet mask Subnet mask
class
The following table displays subnet masks for the Internet address classes.
When you create a scope in DHCP and you enter the IP address range for the
scope, DHCP provides these default subnet mask values. Typically, default
subnet mask values (as shown in the preceding table) are acceptable for most
networks with no special requirements and where each IP network segment
corresponds to a single physical network.
You can exclude IP addresses from distribution by the DHCP server by creating
an exclusion range for each scope. You should use exclusions for all devices that
are configured with a static IP address. The excluded addresses should include
all IP addresses that you assigned manually to other servers, non-DHCP clients,
diskless workstations, or Routing and Remote Access and PPP clients. It is
recommended that you configure your exclusion range with extra addresses to
accommodate future network growth. The following table provides an example
exclusion range for a scope with an IP address range of
192.168.0.1 - 192.168.0.254.
Certain devices, such as routers, DHCP servers, and DNS servers, must be
configured with a static IP address. In addition, you might have additional
devices, such as printers, that you want to ensure always have the same IP
address. List the devices that you want to configure statically for each subnet,
and then plan the exclusion range you want to use on the DHCP server to ensure
that the DHCP server does not lease the IP address of a statically configured
device. An exclusion range is a limited sequence of IP addresses within a scope,
excluded from DHCP service offerings. Exclusion ranges assure that any
addresses in these ranges are not offered by the server to DHCP clients on your
network.
For example, if the IP address range for a subnet is 192.168.0.1 through
192.168.0.254 and you have ten devices that you want to configure with a static
IP address, you can create an exclusion range for the 192.168.0.x scope that
includes ten or more IP addresses: 192.168.0.1 through 192.168.0.15.
In this example, you use ten of the excluded IP addresses to configure servers
and other devices with static IP addresses and five additional IP addresses are
Applies To: Windows 7, Windows 8, Windows Server 2008 R2, Windows Server
2012
Services are often run with default settings — for example, a service might be
disabled automatically at startup. You can use the Services snap-in to change
the default settings for a service. This is useful if you are troubleshooting
service failures or if you need to change the security account under which a
service runs.
1. Click Start , click in the Start Search box, type services.msc , and then
press ENTER.
2. Optionally, export and save a list of the existing settings. To do this, right-
click Services , select Export List , and save the settings list.
3. In the details pane, right-click the service that you want to configure, and
then click Properties .
5. To specify the user account that the service can use to log on, click the Log
On tab, and then do one of the following:
o To specify that the service uses the Local System account,
click Local System account .
o To specify that the service uses the Local Service account, click This
account , and then type NT AUTHORITY\LocalService .
6. Type the password for the user account in Password and in Confirm
password , and then click OK . If you select the Local Service account or
Network Service account, do not type a password.
You can also manage services using the sc config command. For more
information about the options available, open a command prompt and
type sc config /? . For examples and detailed descriptions of the
command-line options, see the command-line reference
at http://go.microsoft.com/fwlink/?linkid=53528.
Additional considerations
Changing the default service settings might prevent key services from
running correctly. It is especially important to use caution when changing
the Startup Type and Log On As settings of services that are configured
to start automatically.
In most cases, we recommend that you do not change the Allow service
to interact with desktop setting. If you allow the service to interact with
the desktop, any information that the service displays on the desktop will
also be displayed on an interactive user's desktop. A malicious user could
then take control of the service or attack it from the interactive desktop.
The Local Service account and Network Service account are configured
with a null password. The password information you supply is ignored.
If account lockout policy is enabled and the account is locked out, the
service will not start.
True or False.
To configure services in Windows 2008 server, The command line tool to
execute the services window is services.mmc?
Supplies/Materials :
Steps/Procedure:
1. In Windows 2008 server click Start and Run or click
window key + R
2. then type services.msc
3. Disable Remote Desktop Services
CRITERIA
YES NO
Did you….
1. Did the student successfully click RUN?
The Configuration Storage server stores the configuration information for all of
the arrays in the enterprise. This procedure describes how to install the
Configuration Storage server. Perform this procedure on the computer that you
have designated as the Configuration Storage server, CS-1 in this walk-through.
2. Insert the ISA Server CD into the CD drive, or run ISAautorun.exe from
the shared network drive.
4. After the setup program prompts that it has completed determining the
system configuration, on the Welcome page, click Next.
5. If you accept the terms and conditions stated in the user license
agreement, click I accept the terms in the license agreement, and then
click Next.
8. On the Component Selection page, you can review the settings, and then
click Next.
15. In the ISA Server console, expand the Enterprise node, and expand
the Enterprise Policies node. Note that there is one policy listed,
the Default Policy. Click Default Policy and look at the rules in the
details pane. There is one enterprise policy rule, a rule that denies all
traffic, that is applied after array level rules. This rule ensures that unless
access is specifically allowed, ISA Server denies it. Other than this
enterprise policy rule, in the Default Policy, only array rules will apply.
16. Click the Enterprise Networks node. The details pane displays the
default enterprise networks. Note that there are no networks defined that
are specific to the IP address ranges in your enterprise. Click
the Arrays node. Note that this node is empty, because an array has not
yet been created.