100% found this document useful (2 votes)
4K views68 pages

WINDOWS SERVER NOTES (Latest)

Notes for students of L4 SOD for Windows Server Administration

Uploaded by

ngenderanj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
4K views68 pages

WINDOWS SERVER NOTES (Latest)

Notes for students of L4 SOD for Windows Server Administration

Uploaded by

ngenderanj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

NEWWS501:INSTALLATION,CONFIGURATION AND MANAGEMENT OF

WINDOWS SERVER

LU1: Prepare to install a server

Learning Outcome1.1: Choose suitable operating system features and network (server)
services

 Current and common used Windows Servers

 Overview
A server is a computer program that provides a service to another computer programs (and
its user).
A server operating system, also called a server OS, is an operating system specifically
designed to run on servers, which are specialized computers that operate within a
client/server architecture to serve the requests of client computers on the network.
Some common examples of server OSs include:
• Windows Server
• Red Hat Enterprise Linux
• Mac OS X Server

Some of the key features of a server operating system include:


• Ability to access the server both in GUI and command-level interface
• Execute all or most processes from OS commands
• Advanced-level hardware, software and network configuration services
• Install/deploy business applications and/or web applications
• Provides central interface to manage users, implement security and other administrative
processes
• Manages and monitors client computers and/or operating systems

Our module will base on windows server


Windows Server is a group of operating systems designed by Microsoft that supports
enterprise- level management, data storage, applications, and communications. Previous
versions of Windows Server have focused on stability, security, networking, and various
improvements to
the file system.
 Server Core
is a minimal installation option introduced in Windows Server 2008 as a way to
run Windows Server with a limited set of features and with support for only
certain server roles. The Server Core installation option is available in the Standard,
Enterprise and Datacenter editions of Windows Server 2008
.
 Windows Server Editions

1
 The Standard edition is designed for small-to-medium-sized organizations. It allows
you to run two instances of the server software in a virtual operating system on the
licensed server. If you need to run additional virtual instances, you can acquire
licenses that are more standard.
 The Essentials edition is designed for small organizations with up to 25 users and 50
devices. It allows only one instance of the server software to be run in the physical.
 The Datacenter edition is optimized for large-scale virtualization; its license allows
one server to run an unlimited number of Windows Server instance

 Windows Server Roles


Server roles refer to the roles that your server can play on your network — roles such :
➢ Active Directory Domain Services (AD DS) : Active Directory Domain Services (AD
DS) is a server role in Active Directory that allows admins to manage computers and end
user

➢ Active Directory Lightweight Directory Services (AD LDS)


➢ DHCP Server : A DHCP Server is a network server that automatically provides and
assigns IP addresses, default gateways and other network parameters to client devices. It
relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to
respond to broadcast queries by clients.
What are the 4 steps of DHCP?

DHCP operations fall into four phases: server discovery, IP lease offer, IP lease request,
and IP lease acknowledgement. These stages are often abbreviated as DORA for
discovery, offer, request, and acknowledgement

➢ DNS Server : A DNS server is a computer server that contains a database of public IP
addresses and their associated hostnames, and in most cases serves to resolve, or translate,
those names to IP addresses as requested.
➢ File Services: file server is a computer responsible for the central storage and
management of data files so that other computers on the same network can access the files.
➢ Hyper-V : VM operating system. Hyper-V is the virtualization platform that is included
in Windows
Server
➢ Print Services: is a server role in Windows Server that enables you to share printers and
scanners on a network, set up print servers and scan servers, and centralize
network printer and scanner management tasks.
➢ Streaming Media Services: is transmitted by a server application and received and
displayed in real-time by a client application called a media player.

2
➢ Web Server Internet Information Server (IIS): is an extensible web server created by
Microsoft for use family. IIS supports HTTP, HTTP/2, HTTPS, FTP, FTPS, SMTP and
NNTP.
➢ Active Directory Certificate Services: is an Active Directory tool that lets administrators
customize services in order to issue and manage public key certificates..
➢ Windows Server Update Server (WSUS): is a free add-on application offered by
Microsoft that can download and manage updates and patches for Windows Server operating
systems.
➢ Active Directory Rights Management Server: is a Microsoft Windows security tool that
provides persistent data protection by enforcing data access policies
➢ Routing and Remote Access Server, including the following sub-roles

• Remote Desktop Services Connection Broker: A remote desktop connection broker is


software that allows clients to access various types of server-hosted desktops and
applications.

• Licensing: A Windows Server client access license (CAL) is a license that allows
customers to access Windows Server..
• Virtualization: means to create a virtual version of a device or resource, such as a server,
storage device, network or even an operating system where the framework divides the
resource into one or more execution environments.

 Definition of Server Core

The Server Core installation eliminates any services and other features that are not
essential for the support of certain commonly used server roles.

 Definition of Windows Server Features

Windows Server Features is something that helps a server perform its primary duty
(Windows Backup, network load balancing).
 Microsoft Windows Features on Demand is a feature that allows system
administrators to add or remove roles and features in Windows 8 and Windows
Server 2012, and later versions of the client and server operating system to alter the
file size of those operating systems.

 RAID configuration

RAID (Redundant Array of Independent Disks, originally Redundant Array of Inexpensive


Disks) is a data storage virtualization technology that combines multiple physical disk drive
components into one or more logical units for the purposes of data redundancy, performance
improvement, or both.
Here is a list of the most used RAID levels:

3
RAID 0 (or) Striping

Striping have a excellent performance. Half of the content will be in one disk and another
half will be written to other disk

In this situation if any one of the drive fails we will loose our data, because with half of
data from one of the disk can’t use to rebuilt the raid. High Performance.

1. There is Zero Capacity Loss in RAID 0


2. Zero Fault Tolerance.
3. Write and Reading will be good performance

RAID 1 (or) Mirroring

Mirroring have a good performance. Mirroring can make a copy of same data what we
have.

If any one of the disk fails in RAID 1, we can get the data from other one as there was a
copy of same content in the other disk. So there is zero data loss.

 Good Performance.
 Here Half of the Space will be lost in total capacity.
 Full Fault Tolerance.
 Rebuilt will be faster.
 Writing Performance will be slow.
 Reading will be good.
 Can be used for operating systems and database for small scale.

RAID 5 (or) Distributed Parity

RAID 5 is mostly used in enterprise levels. RAID 5 works by distributed parity method.
Parity info will be used to rebuild the data. It rebuilds from the information left on the
remaining good drives. This will protect our data from drive failure.

Assume we have 4 drives, if one drive fails and while we replace the failed drive we can
rebuild the replaced drive from equivalence information..

1. Excellent Performance
2. Reading will be extremely very good in speed.
3. Writing will be Average, slow if we won’t use a Hardware RAID Controller.
4. Rebuild from Parity information from all drives.
5. Full Fault Tolerance.
6. 1 Disk Space will be under Parity.
7. Can be used in file servers, web servers, very important backups

4
RAID 6 Two Parity Distributed Disk
RAID 6 is same as RAID 5 with two parity distributed system. Mostly used in a large
number of arrays. We need minimum 4 Drives, even if there 2 Drive fails we can rebuild the
data while replacing new drives.

Very slower than RAID 5, because it writes data to all 4 drivers at same time. Will be
average in speed while we using a Hardware RAID Controller. If we have 6 numbers of 1TB
hard-drives 4 drives will be used for data and 2 drives will be used for Parity.

 Poor Performance.
 Read Performance will be good.
 Write Performance will be Poor if we not using a Hardware RAID Controller.
 Rebuild from 2 Parity Drives.
 Full Fault tolerance.
 2 Disks space will be under Parity.
 Can be Used in Large Arrays.
 Can be use in backup purpose, video streaming, used in large scale.
RAID 10 (or) Mirror & Stripe
RAID 10 can be called as 1+0 or 0+1. This will do both works of Mirror & Striping. Mirror
will be first and stripe will be the second in RAID 10. Stripe will be the first and mirror will
be the second in RAID 01. RAID 10 is better comparing to 01.

Assume, we have 4 Number of drives. While I’m writing some data to my logical volume it
will be saved under All 4 drives using mirror and stripe methods.

If I’m writing a data “TECMINT” in RAID 10 it will save the data as follow. First “T” will
write to both disks and second “E” will write to both disk, this step will be used for all data
write. It will make a copy of every data to other disk too.
Same time it will use the RAID 0 method and write data as follow “T” will write to first disk
and “E” will write to second disk. Again “C” will write to first Disk and “M” to second disk.
 Good read and write performance.
 Here half of the Space will be lost in total capacity.
 Fault Tolerance.
 Fast rebuild from copying data.
 Can be used in Database storage for high performance and availability

Learning Outcome 1.3: Analyze data migration requirement


Data migration requirements
Data migration is the process of transporting data between computers, storage devices or
formats. It is a key consideration for any system implementation, upgrade or consolidation.

Data migration requirements are:

Operating system
Operating system Your existing physical or virtual target server can have any of the
following Windows operating system editions.

5
• Windows Server 2008 or 2008 R2
• Windows Server 2012 or 2012 R2.
System memory The minimum system memory on each server should be 1 GB. The
recommended amount for each server is 2 GB.
Disk space for program files This is the amount of disk space needed for the
Double-Take program files. For Windows 2012, this is approximately 300 MB. For
Windows 2008, this is approximately 375 MB.
Disk space for data files—This is the amount of disk space needed for the source
data files. This will be dependent on the applications you are running and the amount
of data files you have.

Server name. Your server name must still be in ASCII format. If you have the need
to use a server's fully-qualified domain name, your server cannot start with a numeric
character because that will be interpreted as an IP address.

ASCII (American Standard Code for Information Interchange) is the most


common character encoding format for text data in computers and on the internet.
Protocols and networking—Your servers must meet the following protocol and
networking requirements.
 Your servers must have TCP/IP with static IP addressing..
 By default, Double-Take (is configured for IPv6 and IPv4 environments,

 If you are using IPv6 on your servers, your clients must be run from an IPv6
capable machine.

 In order to properly resolve IPv6 addresses to a hostname, a reverse lookup


entry should be made in DNS.

Cloud: "The cloud" refers to servers that are accessed over the Internet, and the
software and databases that run on those servers. Supported configurations

L.O.1.4. Back up local data in preparation for installation

Windows server backup

o Overview of Windows Server Backup


Data is the most important aspect of your computer. Computer hardware can fail, data can be
corrupted, computers can be lost, stolen, or destroyed. Data backup software can help you
protect and restore your data when something goes wrong.

Windows Server Backup (WSB) is a feature that provides backup and recovery options for
Windows server environments.

Administrators can use Windows Server Backup to back up :

6
- A full server,
-The system state(Windows system files,)
- Selected storage volumes or specific files or folders, as long as the data volume is less
than 2 terabytes

 Schedule Automatic Backups

You can use the Backup Schedule Wizard in Windows Server Backup to schedule backups
that run automatically once or more per day.

An automatic backup will make backing up your information much easier. It eliminates
human error.

You can schedule automatic backups of the data on your company's computers. This can be
done with both an external hard drive and an offsite server.

 Perform a Manual Backup

You can use the Backup Once Wizard in Windows Server Backup to create single
backups of your computer.

You can also create one-time backups using the Wbadmin start backup or
Wbadmin start system state backup commands or the Windows Power Shell
cmdlets for Windows Server Backup.

 Recover Files, Folders, Applications, Volumes, or the Operating System

You can use the following tools to perform recovery tasks:


 Recovery Wizard in Windows Server Backup. This wizard helps you recover files
and folders, applications, volumes, and the system state (Windows system files,).

 Catalog Recovery Wizard in Windows Server Backup. This wizard helps you
recover the backup catalog, a file that stores details about your backups. This
wizard is only available if your backup catalog has become corrupted.

 Windows Recovery Environment and a backup created with Windows


Server Backup.

Windows Recovery Environment can be accessed from a computer running


Windows Server 2008 R2 or a Windows Setup disc. This method helps you recover
your operating system or full server

7
Windows Server Backup 2012 tools installation

To access backup and recovery tools, you must install the Windows Server Backup
Features and subordinate items that are available in the Add Features Wizard in Server
Manager.

To install Windows Server Backup on Windows Server 2012:

 Launch Server Manager.


 Select Manage on the top right menu.
 Select Add Roles and Features.
 Select Role-based or feature-based installation.
 Click Next until you get to the Features selection screen.
 Select Windows Server Backup. Use the scroll bar to locate the item if required.

8
 Click Next.
 Select Install

o Backing Up Your Server

 Types of backup

a. Full backups
A full backup is exactly what the name implies; It is a full copy of your entire data set.

9
Although full backups arguably provide the best protection, most organizations only use
them on a periodic basis because they are time-consuming and often require a lot of disk or
tape capacity.

Because not every organization has the time or storage space for frequent full backups,
other types are often necessary.
b. Incremental backups
Incremental backups only back up the data that has changed since the previous backup.
For example, suppose that you created a full back up on Monday and used incremental
backups for the rest of the week.

Tuesday's scheduled backup would only contain the data that has changed since Monday.

Wednesday's backup would only contain the data that has changed since Tuesday, and so
on.

Incremental backups were introduced as a way to decrease the amount of time and storage
space that it takes to do a full backup.
c. Differential backups
A differential backup is similar to an incremental backup.
The difference is that while an incremental backup only includes the data that has changed
since the previous backup, a differential backup contains all of the data that has changed
since the last full backup.
d. Local back-up
Local backup is probably familiar to many. It simply refers to back up that is stored at close
proximity. In most cases of local backup, the storage device is connected directly to the
source or through a network.
e. Offsite backup
Provided that the backup is stored in a geographically separate location, the type of backup
is offsite.

10
And yes, the backup may be done locally and stored in an external hard disk.
If the storage medium is taken to a different location, then it is an offsite backup.

It could mean that you have taken the drive home, to your safe deposit box and to another
building.
f. Cloud backup
The location of cloud backup is online servers. It is one of the most effective and preferred
types of backup. Cloud backup can be accessed from anywhere even in the most remote of
places. All that you will be expected to have are login credentials.
g. File Transfer Protocol (FTP) backup

What is basically means is that the backup operation is done through a file transfer protocol
and the data is stored in an FTP server through the internet.
h. Mirror Backup
Mirror backups are as the name suggests a mirror of the source being backed up. With
mirror backups, when a file in the source is deleted, that file is eventually also deleted in the
mirror backup

i. Full PC Backup or Full Computer Backup


In this backup, it is not the individual files that are backed up but entire images of the hard
drives of the computer that is backed up
j. Online Backup
The storage data centers are located away from the source being backed up and the data is
sent from the source to the storage data center securely over the Internet.

k. Remote Backup

Remote backups are a form of offsite backup with a difference being that you can access,
restore or administer the backups while located at your source location or other location.

STEPS TO BACKUP YOUR SERVER

11
After you have installed your windows server backup to backup your server follow the
following steps. You have to connect a backup media or device before doing the steps below
 Server manager
 Administration tools
 Windows server backup
 Backup once (if it is a manual backup) or backup scheduler (if you want automatic
backup)
 Next
 Full server backup
 Next
 Specify the time if it is a scheduler backup
 Specify the destination disk(Hard disk)
 Next
 Wait until the backup will be successifull
 Finish or close

Homework: Write steps to schedule some selected items of a server (steps to schedule
incremental backup)on windows server 2012.

o User Interface: Windows Server Backup

The Windows Server Backup Microsoft Management Console (MMC) snap-in contains the
following wizards to help you schedule and create backups, and perform recoveries:
 Backup Schedule Wizard
 Backup Once
 Wizard Recovery Wizard
 Catalog Recovery Wizard
o Optimizing of Backup and Server Performance

You can use the Optimize Backup Performance dialog box to improve the
performance of backups for full volumes, which can improve server performance.

In the Optimize Backup Performance dialog box, do one of the following:

Recovering Your Server

you can use the backups you have created with Windows Server Backup to recover your
operating system, system state, volumes, applications and application data, backup catalog,
and local files and folders.

To do this, use the following tools:

Tools What you can recover

12
Recovery Wizard (in Windows Server Files, folders, volumes, system state,
Backup) applications, and application data
Windows Setup disc or a separate installation Operating system (critical volumes)
of the Windows Recovery Environment and full server (all volumes)
Catalog Recovery Wizard (in Windows Backup catalog
Server Backup)

Note : The Catalog Recovery Wizard is only available from


Windows Server Backup when the backup catalog is corrupted.

Backup Software Tools

Is completely free software that can be used to manually or automatically back up the
important
data on your computer hard drive to somewhere safe like a disc, flash drive, network drive,
etc.

-EaseUS Todo Backup


-AOMEI Backupper Standard
-Cobian Backup
-FileFort Backup
-BackUp Maker
-DriveImage XML

LU2: Install server Network Operating System

Learning Outcome 2.1: Install network operating system (NOS) and update the NOS
with all required patches.

2.1.1 Windows Server

 Installation Methods

Microsoft distributes Windows Server 2012 on optical media and in an .iso (ISO) image
format. ISO format is becoming more common as organizations acquire software over the
Internet rather than by obtaining physical removable media.

You can install Windows Server 2012 by using a variety of methods, including the
following:
Optical Media
Advantages include:

 Traditional method of deployment.

13
Disadvantages include:

 Requires that the computer have access to a DVD-ROM drive.


 Is typically slower than USB media.
 You cannot update the installation image without replacing the media.
 You can only perform one installation per DVD-ROM at a time.

USB Media
o Advantages include:
 All computers with USB drives allow boot from USB media.
 The image can be updated as new software updates and drivers become available.
 The answer file can be stored on a USB drive, minimizing the amount of interaction
that the administrator must perform.

o Disadvantages include:
 Requires the administrator to perform special steps to prepare USB media from an
ISO file.
 Mounted ISO image o Advantages include:
 With virtualization software, you can mount the ISO image directly and install
Windows Server 2012 on the virtual machine.

Network Share
o Advantages include:
It is possible to boot a server off a boot device (DVD or USB drive) and install from
installation files that are hosted on a network share.
o Disadvantages include: This method is much slower than using Windows Deployment
Services.

Windows Deployment Services


o Advantages include:

You can deploy Windows Server 2012 from .wim image files or specially prepared virtual
hard disk
(.vhd) files.

 You can use the Windows® Automated Installation Kit (AIK) to configure lite-touch
deployment.

 Deployment Services server, and the operating system image is transmitted to the
server over the network.

 Windows Deployment Services allows multiple concurrent installations of Windows


Server 2012 using multicast network transmissions.

14
 Installation Types
The three types are as follows:

1. Clean installation: one where there is no existing operating system on the computer or
you do not want to preserve the existing installation.

The biggest advantage of a clean installation is knowing that nothing remains from a
previous installation, leading to improved performance and stability..

2. Upgrade installation: one in which Windows server is installed over a previous version of
Windows. The biggest advantage of an upgrade is that you can retain application installations
and user settings.

However, this can also be a disadvantage if you would be better off without these
applications and settings.
3.Multiple boot installation: one in which several operating systems are installed on the
same computer and the user can choose which operating system to boot during system
startup.

 Choosing Whether to Upgrade or Migrate


A new version of a software or hardware product designed to replace an older version of the
same product. Typically, software companies sell upgrades at a discount to prevent users
from switching to other products

System migration is a method of installing a system at a different version that is different


from its current version.

Server migration is a technique in which data is positioned from one server to another. The
reasons behind server migration are security concerns, equipment is being replaced and many
other factors.

 Hardware Requirements for Windows Server

15
Hardware requirement for windows server 2012 R2

 Processor: 1.4Ghz 64-bit processor.


 RAM: 512 MB.
 Disk Space: 32 GB.
 Network: Gigabit (10/100/1000baseT) Ethernet adapter.
 Optical Storage: DVD drive (if installing the OS from DVD media),USB
 Video: Super VGA (1024 x 768) or higher-resolution (optional)
 Input Devices: Keyboard and mouse (optional)

Steps to install windows 2012 R2

1- Insert the Windows Server 2012 DVD, and once you get the following message press
Enter to boot from the setup

Or if you install it using USB flash disk step 1 can be replaced by


Insert the USB drive into the PC you want to install Windows Server 2012 R2 on, Power it
off completely and Power on again. Use BIOS settings to select 'boot from USB

16
2- Wait for a while till the setup loads all necessary files (Depending on your machine, it will
take couple of minutes)

3- Once the setup files are loaded, the setup will start with the following screen. You can
change these to meet your needs (the default values should be fine for now)

17
4- Once you click Next, you can start the installation, click "Install now"

5- You will see the following screen, wait until it finishes loading

18
6- In the following setup screen, you will see four options. Select Windows Server 2012
DataCenter Evaluation (Server With GUI=Full installation).

7- After you click Next from previous screen, Read the License terms, tick the "I accept the
license terms" and click Next

19
8-Click Custom: Install Windows only (advanced)

9- Now It will ask you for the drive (or partition) you want to install Windows on. Here I'm
installing it on the one partition I have here. NOTE: This will remove the content of the
partition. Either you create a partition to install windows on, or you can test this on a testing
machine

20
10- Now once we picked our partition, clicking on next from previous screen will start the
setup. This process might take a while.

11- Once the setup is done, it will restart and start your Windows Server 2012 for the first
time. It will set up a password for the Administrator user ask you then to

21
12- The setup will finalize your settings, might take a couple of minutes

13- Once the setup is done, you can log in for the first time to your Windows Server, as the
screen says, press Ctrl+Alt+Delete to log in, and use the password you set in the setup
process

22
14 - once you log in, windows server 2012 will show the server manager

Using Windows Server Migration Tools

Installing the Windows Server Migration Tools on the DESTINATION Server


First we have to install the on the DESTINATION host .

For this we launch Server Manager and on the dashboard select Manage and choose Add
Roles & Feature.

 Using Windows Server Migration Tools

 Installing the Windows Server Migration Tools on the SOURCE Server

Data migration is simply the process of moving data from a source system to a target
system.

Companies have many different reasons for migrating data. You may want to migrate
data when you acquire another company and you need to integrate that company’s data
.
There are three primary types of data migration tools to consider when migrating your
data:

23
On-premise tools. Designed to migrate data within the network of a large or medium
Enterprise installation.

Open Source tools. Community-supported and developed data migration tools that can
be free or very low cost.

Cloud-based tools. Designed to move data to the cloud from various sources and
streams, including on- premise and cloud-based data stores, applications, services, etc.

The biggest difference between On-premise tools and Cloud-based tools systems is
how they are deployed. Cloud-based software is hosted on the vendor's servers and
accessed through a web browser. On-premise software is installed locally, on a
company's own computers and servers

How to select a data migration tool

Here are a few questions to help you choose the right tool for you.

Location. Do you want to migrate data on-premise (in the same environment)? Or, do you
want to move data from on-premise to the cloud? Or from one cloud store to another cloud
store?

Cost. Using open source tools can be free or significantly cheaper than commercial solutions,
assuming you have the right expertise in place. Using a cloud-based data migration tool can
save you significantly on infrastructure and manpower costs, freeing up resources for other
projects.

Data model. Do you need to change your data model? You may be moving from an on-
premise data warehouse to a cloud-based data warehouse.

Data transformation. Because you will be adding or changing data sources. All migration
tools can transform data, but cloud- based systems tend to be the most flexible, supporting
the widest range of data types.

Security. Is any of the data you are migrating sensitive?


Cloud-based tools are likely to be extremely secure and compliance certified. On-premise
solutions depend on the security of your overall infrastructure. And security may vary widely
for open source tools.

 Installing the Windows Server Migration Tools on the DESTINATION Server


 Server Manager and on the dashboard
 select Manage
 choose Add Roles & Feature.
24
Navigate through the wizard until you get to Features. Find and select Windows Server
Migration Tools.
Click Next.

Click Next

25
Click Install

After a while your patience will be rewarded.

26
Learning Outcome 2.2: Post-Install and Configure the Server

Overview of Post-Installation Configuration

Configuration of server network settings (Configure the IP address)

Navigate to Start > Network. Windows Explorer for Network appears

27
Click Network and Sharing Center.

Click Change adapter settings. The Network Connections appear.

28
Right-click the network connection and select Properties.

The Properties screen appears.

29
Highlight Internet Protocol Version 4 (TCP/IPv4) and click Properties

30
The Internet Protocol Version 4 (TCP/IPv4) Properties screen appears

31
The Internet Protocol Version 4 (TCP/IPv4) Properties screen appears.

IP Address: Pick an address within the same subnet as the router. For example, if your
router is
192.168.8.1 (subnet 255.255.255.0), you could go with anything between 192.168.8.2 and
192.168.8.255

Subnet Mask: This would be the same as your router, probably 255.255.255.0.

Default Gateway: This is your router's IP address.

Preferred DNS: You can either enter a DNS server's IP address, if you know it, or simply
enter your router's IP address.

Set the computer name

2 methods can be used.


i. GUI
ii. Powershell.

32
a. Using GUI

Rename Windows Server 2016 from the GUI

i. Right-click the Start icon,


ii. Control panel
iii. Click System.
iv. Advanced system settings
v. Change settings
vi. Computer name

vii. In the Computer name field, type the new computer name you want your server to
have and click OK

viii. Click change then ok

33
b. Rename Windows Server 2016 from Powershell

Open Powershell with Administrator privileges. Here, we will use the Rename-Computer
cmdlet that will have the following format.

Rename-Computer -NewName <new computer name> -Restart

That is, in our case, it will be something like that. Rename-Computer -NewName SRV01 -
Restart

Join a domain

What is Domain?
Is a collection of computers & servers that are part of the same centralized database in
general, a domain is an area of control.

 Windows server domains provide network administrators with a way to manage a


large number of PCs and control them from one place.

 One or more servers known as domain controllers have control over the domain and
the computers on it.

 Domains are generally made up of computers on the same local network. However,
computers

 joined to a domain can continue communicating with their domain controller over
VPN or

34
 Internet connection. This allows businesses and schools to remotely manage laptops
they provide to their employees and students.

In a domain:

1.One or more computers are servers.

2. Network administrators use servers to control the security and permissions for all
computers on the domain.

3.This makes it easy to make changes because the changes are automatically made to all
computers.

4. If you have a user account on the domain, you can log on to any computer on the domain
without needing an account on that computer.

5. There can be hundreds or thousands of computers.

6. The computers can be on different local networks.

Workgroup and Domain

Workgroup is Microsoft's term for peer-to-peer local area network..


.
In a workgroup:

1. All computers are peers; no computer has control over another computer.
2 .Each computer has a set of user accounts.
3. To use any computer in the workgroup, you must have an account on that computer..
4. All computers must be on the same local network or subnet.

Types domains are :


Single Domain,
Parent Domain,
Child Domain,
Domain tree,
Forest domain.

Many domains are available like: Single Domain, Parent Domain, Child Domain,
Domain tree, and Forest domain.

35
Parent domain - One domain above another in a domain tree.

Child domain - One domain below another in a domain tree. The child inherits the domain
name of its parent in a DNS hierarchical naming convention. Example:
"sales.cohowinery.com

What is a domain tree?

A domain tree exists when one domain is the child of another domain that we called Domain
tree. A domain tree must have a contiguous names rate.

A child domain name always includes the complete parent domainname. A child domain
and its parent share a two-way transitive trust.

What is a domain forest?

36
A forest is a collection of trees that don’t necessarily form a contiguous namespace
(although
each tree must be closest)

 How to join a computer to a domain.


 On the Start screen, type Control Panel, and then press ENTER.
System and Security,

 click System.
Under Computer name, domain, and workgroup settings, click Change settings.

 On the Computer Name tab, click Change.



Under Member of, click Domain, type the name of the domain that you wish this
computer to join, and then
 click OK.
Click OK, and then restart the computer.

Configure the time zone


A time zone is a region where the same standard time is used.

37
Importance of Correct Computer Date & Time

1. Scheduled Tasks
An incorrectly set computer clock effectively prevents your system from knowing when to
do its work.

2. File Information
Your computer uses its system clock to apply a date and time stamp to every file you
create and edit, including the documents you save from your applications and the email
messages you send or receive.

3. Software and Access Authorization

If your computer clock strays too far from the correct time, software that relies on Internet-
based authorization schemes and Web-based services that require access information may
reject your attempts to use these resources.

4. Set time, date, and time zone settings from the graphical interface

The process is very simple. Right-click the time field in the lower right corner and then click
the Adjust date/time option

In the settings window, you can change the time, date, and time zones of each Windows
Server. I do not think there is a need for further guidance as it is a simple process.

38
Add roles and features
A server role is a set of software programs that, when they are installed and properly
configured, lets a computer perform a specific function for multiple users or other computers
within a network.

Generally, roles share the following characteristics.

1. They describe the primary function, purpose, or use of a computer.

2.They supply users during an organization access to resources managed by other computers,
such as Web sites, printers, or files that are stored on different computers.

3. They typically include their own databases that can line user or computer requests, or
record information about network users and computers that relates to the role.

39
4.Role services

Role services are software programs that provide the functionality of a role. When you install
a role, you can choose which role services the role provides for other users and computers in
your enterprise.

Installing the role means installing one or more of its role services.

5.Features

Features are software programs that, although they are not directly parts of roles, can
support or augment the functionality of one or more roles, or improve the functionality of the
server, regardless of which roles are installed.

Enable remote desktop

Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which


provides a user with a graphical interface to connect to another computer over a network
connection.

Remote Desktop Services (RDS), is one of the components of Microsoft Windows that
allow a user to take control of a remote computer or virtual machine over a network
connection.

Configure Windows Firewall settings

Types of Firewalls

There are many different types of firewall you can implement in order to control various
activities in different places and operating systems.

The two main types of firewall are :


 Host based and
 Network-based firewall

A. Host-based firewall.
This type of firewall runs on individual systems, physical or virtual.

It is a piece of software installed on an operating system which stands between the host and
other network devices.

Same as any other firewall, it controls and filters incoming and outgoing network traffic, but
only for a single host.

40
The benefit of this type

 It can protect from both external and internal attacks.


 This allows organizations to tightly control how people use the network.

B. Network-based firewalls.

 These are network devices built into the IT infrastructure and they stand between
public and internal networks.

 A network-based firewall can be a hardware device or a virtual solution.

 Most modern routers have this firewall built into them and it can range from basic to
a firewall with advanced security settings.

Benefit of Network-based firewalls.

The benefit is that every network device behind it is protected, not only a single host.

 Access the Windows Firewall


.
Check your current Firewall settings

Step 1

Open your firewall, you will see the firewall overview, this shows what the current settings
are for each profile (Domain, Private and Public).

Below is a brief description of each profile.

 Domain
Traffic to and from a network on which it can detect a domain controller of the
domain to which the computer is joined.

 Private
Traffic to and from the local server or the local network to which it is attached.

 Public
Traffic to and from non-local sources such as the World Wide Web.

Step2 2
To check your Inbound or Outbound rules select either one from the left hand pane.

41
Rules with a green tick next to them are active, if they are greyed out this means they are
inactive rules.An inactive rule does not mean that a service is blocked.

Benefits of a Server Core installation


The Server Core installation option provides the following benefits:

 Reduced maintenance: Because the Server Core installation option installs only
what is required to have a manageable server less maintenance is required than a full
Windows Server installation with a graphical interface.

 Reduced attack surface: Because Server Core installations are minimal, there are
fewer applications running on the server, which decreases the attack surface.

 Reduced management: Because fewer applications and services are installed on a


server running the Server Core installation, there is less to manage.

 Less disk space required: A Server Core installation requires only about 1 GB of
disk space to install and approximately 2 GB for operations after the installation

Server Core has the following advantages over Server Full:

 Smaller footprint (disk and memory).


 It is more secure because the smaller attack surface. For example the Server core
version has no Internet Explorer included.

Server Core disadvantages over Server Full:

 Configuration, management and troubleshooting can be more complex. For example


when you want to change the binding order and NIC order you need to use
PowerShell or Netsh commands.

Server Core installation supports the following server roles:

42
 Active Directory Domain Services (AD DS)

 Active Directory Lightweight Directory Services (AD LDS)

 DHCP Server

 DNS Server

 File Services

 Print Services

 Streaming Media Services

 Web Server (IIS)

Manually install a Server Core installation


1. Install Server Core.
2. Set the administrative password.
3. Set a static IP address.
4. Join a domain.
5. Rename the server.
6. Activate the server.
7. Configure the firewall.
8. Administrative credentials

 Activation of Windows Server

To activate windows server 2012R use the following command:

1. Step 1: Click Start, All Programs, Accessories. Right-click Command Prompt and
choose Run As Administrator.
2. Enter your administrator password.
3. Step 2: Type the following command and press Enter: slmgr -rearm (note the space
after slmgr and the hyphen in front of rearm.)
4. Step 3: Restart Windows
Note: You can rearm the period 6 times. (180 days * 6 = 3 years). When the period comes
to an end, run slmgr -rearm to extend it by another 180 days.

or use the following

43
ate Windows Server 2012, either offline by calling Microsoft Call Center or online by activating Windows through Internet.

ver 2012, you are given a grace period to test it and then to activate it. As you can see, the wallpaper of Windows Server 201

44
45
Learning unit 3 : Configure and administer the server

Learning Outcome 3.1: Install and administer active


directory, Organizational units (OUs).

Learning Outcome 3.1.1 Overview of Windows Server Management

 Definition of Server Manager


Microsoft Windows Server Manager is a tool to view and manage server roles and
make configuration changes. Server Manager allows administrators to manage local
and remote servers without requiring physical access to the servers or enabling
Remote Desktop Protocol connections
 Tools available from Server Manager.
1. Basic system configuration tasks
2. Performance monitoring
3. Device management
4. Viewing the roles and features that are installed on a server
5. Viewing the Windows event logs
6. PowerShell based management

 View role-related events

Microsoft Windows Server Event Viewer is a monitoring tool that shows a log
of events that can be used to troubleshoot issues on a Windows-based system. ...
The event log displays information such as the source or the software or service that
generated the log event, the event ID and the level or severity of the event.

Top 11 Windows Events You Should Monitor


1. User Rights Changes. You want to know when users are added, deleted, or if
their access rights change. ...
2. Group Settings.
3. Account Lockouts.
4. Event Log Clearing.
5. Firewall Rule Changes.
6. Failure to Load Group Policy.
7. New Software Installation.

46
8. New Device Attachment.
9. New Processes or Services Created
10. Powershell Logging

11. User Login/Authentication Events

 Administrative Tools and Remote Server Administration Tools

Remote Server Administration Tools (RSAT) for Windows operating systems


Remote Server Administration Tools (RSAT) enables IT administrators to remotely manage
roles and features in Windows Server from a computer that is running Windows 10,
Windows8.1, Windows 8, Windows 7, or Windows Vista.

 Active Directory Domain Services

 Overview of AD DS

Active Directory (AD) is a Microsoft technology used to manage computers and other
devices on a network. As a network grows, Active Directory provides a way to organize a
large number of users into logical groups and subgroups, while providing access control at
each level

 What Services are Provided in Active Directory Domain Services?


Here are the services that AD DS provides as the core functionality required by a
centralized user management system.

Domain Services: Stores data and manages communications between the users and
the DC. This is the primary functionality of AD DS.
Certificate Services: Allows your DC to serve digital certificates, signatures, and
public key cryptography.
Lightweight Directory Services: Supports LDAP for cross platform domain
services, like any Linux computers in your network.
Directory Federation Services: Provides SSO authentication for multiple
applications in the same session, so users don’t have to keep providing the same
credentials.
Rights Management: Controls information rights and data access policies. For
example, Rights.

Role of Domain Controllers with Active Directory Domain Services

47
 Domain Controllers (DC) are the servers in your network that host AD DS.
 It is a server on a Microsoft Windows or Windows NT network that is responsible
for allowing host access to Windows domain resources.
 DCs respond to authentication requests and store AD DS data.
 DCs host other services that are complementary to AD DS as well. Those are:

1.Kerberos Key Distribution Center (KDC): ActiveDirectory uses Kerberos version


5 as authentication protocol in order to provide authentication between server and client.
.Kerberos protocol is built to protect authentication between server and client in an open
network where other systems also connected

2.NetLogon: . Netlogon is leveraged by Microsoft to maintain a secure channel between


domain-joined machines and Domain Controllers to authenticate users and services..
3.Windows Time (W32time): The Windows Time service (W32Time) synchronizes
the date and time for all computers running in Active Directory Domain Services
(AD DS). The Windows Time service uses the Network Time Protocol (NTP) to
synchronize computer clocks on the network.
4.Intersite Messaging (IsmServ): Intersite messaging allows DCs to communicate with
each otherfor replication and site-routing.

 Overviews Domain Controllers

A domain controller is a server that responds to authentication requests


and verifies users on computer networks.

Domains are a hierarchical way of organizing users and computers that


work together on the same network.

The domain controller keeps all of that data organized and secured.

While attackers have all sorts of tricks to gain elevated access on


networks, use DCs to detect cyber attacks in progress.

 Installing Domain Controller

1. Server Manager

2. Manage

3. Add role and features

4. Role-based of featured-based installation

48
5. select the server from the server pool

6. Click the server you need ( Eg: Giheke)

All server need static Ip address if it hasn’t it you have to set it.

7 .Next

8.Select the Active Directory Domain Services role

9. Add features

10. Next

11. Next
12. Restart destination server automatically
13. Install
14 .Promote this server to a domain controller
15. Add a new forest
16. Root domain name E g: giheketvet.com

17. Type the directory services restore Mode (DSRM)

18. Password: GIHEKE@12

19. Confirm password: GIHEKE@12

20. Next

21. Next

22. Next

23. Next

24. Install

25. Close

How to add user in a domain

1. Tools
2. Active Directory user and computers
3. GIHEKETVET.COM expand it
4. Users
5. Right click users

49
6. New
7. Users
8. First name eg: L5NET
9. User logon name L5NET

10.User name: Domain name of the server \ User name

11. Next
12. Password: GIHEKE@12
13. Confirm password: GIHEKE@12

14. Select user can not change password

15. Select password never expires

16.Next

17. Finish

NOTE: TO add another user go users, new user and continue

Client must be assigned IP addresses statically.

 To add a computer on a domain


1. MY Computer
2. Properties
3. Change settings
4. Change
5. Click domain
6. Ok
7. Computer Name

8. They welcome you

50
9. OK

How to open the computer joined on a domain

10. Restart the computer

11. Switch user

12. Other user

13. Username

 Active Directory Domain Services Objects

Managing User Accounts


A user account represents you to the Active Directory your computer account.
Managing Groups: The Active Directory groups are a collection of Active
Directory objects. The group can include users, computers, other groups, and other
AD objects. The administrator manages the group as a single object
Managing Computer Accounts:
A computer account represents your desktop or laptop computer to the Active
Directory. There is an account name and an account ID number associated with
Delegating Administration: Delegation is the ability for the domain administrator to
grant a non-domain administrator the ability to control a portion of the Active
Directory environment. This control could be as large as creating user accounts in a
specified organizational unit (OU) to as small as modifying the phone number for a
single user

Learning Outcome 3.2: Deploy and configure server roles

Dynamic Host Configuration Protocol

Overview of the DHCP Server Role

51
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to
automatically assign an IP address to a computer from a defined range of numbers (that is, a
scope) configured for a given network.

DHCP Server is a network server that automatically provides and assigns IP addresses,
default
gateways and other network parameters to client devices.

DCHP Lease Generation Process

The DHCP lease generation process is the process by which the DHCP client
receives IP addressing configuration data from the DHCP server

DHCP Lease generation process is a four step process. It is also known as

D O R A process. It’s
very simple and easy to understand. Let’s see how this DHCP Lease generation process
works.
D- Discover
O- Offer
R- Request
A- Acknowledge

How Dhcp Works?


Answer :

DHCP works on DORA Process (DISCOVER - OFFER - REQUEST -


ACKNOWLEDGEMENT).

Discover

1. When a Client needs an IP configuration, it tries to locate a DHCP server by sending a


broadcast called a DHCP DISCOVER. This message will have a Destination IP of
255.255.255.255 and Destination MAC of ff:ff:ff:ff:ff:ff.[Source
IP - 0.0.0.0 , Destination IP - 255.255.255.255, Source Mac - Mac address of
Host, Destination Mac -FF:FF:FF:FF:FF:FF]

OFFER

2. On Receiving DHCP Discover, Server sends a DHCP OFFER message to the client. The
DHCPOFFER is a proposed configuration that may include IP address, DNS server

52
address, and lease time. This message will be unicast and have the destination mac address
of DHCP client's mac address. The source mac address will be that of the DHCP
server.[S.Mac - Mac address of Server , D.Mac - Mac address of Host]

REQUEST

3. If the Client finds the Offer agreeable, it sends DHCP REQUEST Message requesting
those particular IP parameters. This message will be a Broadcast message. [Source Mac -
Mac address of Host, Destination Mac - FF:FF:FF:FF:FF:FF]

ACKNOWLEDGMENT

4. The Server on receiving the DHCP REQUEST makes the configuration official by sending
a unicast DHCP acknowledgment [Source Mac - Mac address of Server, Destination Mac -
Mac address of Host]

DHCP server can provide following information:

• IP address
• Subnet mask
• Default gateway
• Domain Name Server
• WINS information

DHCP Scope
A DHCP scope is a collection of IP address settings that are configured for devices such as a
computer to use. You can create multiple scopes for different device types and subnets. For
example, I have a scope for computers and different scopes for IP phones.
When you setup a scope, you will need to configure the following:

 Scope name – This is the name of the scope. Give it a descriptive name so it is easy
to identify which devices it is for.
 IP address range – This is the IP range that you want the devices to use. For
example
10.2.2.0/24
 IP address exclusions – You can specify to exclude IP address from the scope. This
is useful if
you have devices on the subnet that need a static IP like a router or server.

53
 Lease duration – The lease specifies how long a client has an IP address before
returning it to the pool.
 DHCP options – There are a number of different options you can include when
DHCP assigns an IP address. More on this below
 DHCP options
There are many DCHP options, below are the most commonly used options in a
Windows domain.

 Router The default gateway of the subnet


b. DNS server – The IP address of the DNS server clients should use for name
resolution.
c. DNS Domain Name – The DNS suffix the client should use, often the same as the
domain
name.
 DHCP filtering
DHCP filtering can be used to deny or allow devices based on their MAC address.
For example ,I use it to block mobile devices from connecting to our secure wifi.

 Super scopes
A super scope is a collection of individual DHCP scopes. This can be used when you
want to join to scopes together. Honestly, I’ve never used this.
Split Scopes
This is a method of providing fault tolerance for a DHCP scope. Using DHCP
failover is not thepreferred method for fault tolerance.
DHCP Failover: DCHP failover was a new feature starting in server version 2012. It
allows two DHCP servers to share lease information providing high availability for
DCHP services. If one server becomes unavailable the other server takes over.

 DHCP INSTALLATION
1. Manage
2. Add role and feature
3. Next
4. Next
5. Next
6. Next
7. Next
8. Next
9. Restart
10. Install
11. Complete DHCP configuration

54
12. Next
13. Commit
14. Close

 Configuring of DHCP

Tools

DHCP

Click the domain eg: GIHEKETVET.COM

Click IPV4

Right click IPV4

New scope

Next

Scope name: eg : ICT

Start IP address 192.168.8.2

End IP address Start IP address 192.168.8.254

Next

Add exclusive and delay

Start IP address 192.168.8.10

End IP address 192.168.8.13

Add

Next

Lease duration

Days Hours Minutes

0 24 0
h
Next

Yes
55
Router default gataway

IP address 192.168.8.1

Domain name and DNS server 192.168.8.10 Add


Next

Next

Yes ,I want to activate this scope(pool)

Next

Finish

Note: To view the IP address which the DHCP has given to the computer Expand IPV4
and Scope, Address scope

Notice that the server node and scope node still has a red arrow pointing down. These
red arrows pointing down mean that the server and scope are not “turned on”.

The concept of “turning on” the scope is called “activating” and the concept of
“turning on” the server for DHCP service is called “authorizing”.

Managing a DHCP Database

The DHCP database is a dynamic database that is updated when DHCP clients are assigned
or as they release their Transmission Control Protocol/Internet Protocol (TCP/IP) address
leases. The DHCP database contains the DHCP configuration data (such as information
about scopes, reservations, options, leases, etc.).

Managing DHCP Databases.

Managing a DHCP server database involves backing up the database, restoring the database
and reconciling the database. You can do all of these from within the DHCP manager by
right-clicking on the DHCP server (see below) or they can be done from the command line.

56
Backing up the database manually is as simple as right-clicking on the server and selecting
backup. You will be prompted for the location for storing the backup file. The default is
\windows\system32\dhcp\backup.

Restoring the DHCP database is as straightforward as backing it up. If the DHCP server is
already running, you need to stop the DHCP Server Service, restore the database and then
restart the DHCP Server Service.

Securing and Monitoring DHCP

The DHCP server role is responsible for dynamically assigning IP addresses to DHCP
clients, and for assigning additional TCP/IP configuration information to DHCP clients as
well. This includes subnet mask information, default gateway IP addresses, Domain Name
System (DNS) server IP addresses, and Windows Internet Naming Service (WINS) server IP
addresses.

57
The common threats to DHCP servers are listed here:

1. Denial-of-service An unauthorized user could start a denial-of-service (DoS) attack by


requesting and obtaining a large number of IP addresses.

2. An unauthorized user could use a rogue DHCP server to provide incorrect IP addresses to
your DHCP clients.

3. Assigning DNS IP addresses and WINS IP addresses through the DHCP server increases
the likelihood of an unauthorized user accessing this information and then using it to attack
your DNS servers and WINS servers

Basic Security Measures for DHCP Servers


Basic security measures for securing the DHCP server role are listed here:
1.Physically secure your DHCP servers.
The NTFS file system should be utilized to protect data on the system volume.
2. Apply and maintain a strong virus protection solution.
3. Software patches should be kept up to date.
4. All services and applications not being utilized on your DHCP servers should be deleted or
uninstalled.
5. Your DHCP servers should be located behind a firewall.

6. Close all open unused ports.


7.To further secure the DHCP server, you can use VPN tunnels to secure DHCP traffic.
8.You can also use MAC address filters.

 Installing and configuring DNS server


DNS is the internet’s system that convert domain name into IP address.Eg when a
web address (URL) is typed into a browser ,DNS server returns the IP address of the
web server associated with that name.

Before installing and configuring DNS on our server we have to perform some
preliminary tasks. Specifically, we have to configure the server with a static IP address
and a DNS suffix. The suffix will be used to fully-qualify the server name. To begin:

1. Go to Start > Control Panel > Network and sharing center , Change adapter
settings right-click Local Area Connection or Ethernet and choose Properties .

2. When the Local Area Connection Properties window comes up, select Internet
Protocol (TCP/IP) and click Properties . When the Internet Protocol (TCP/IP) window

58
comes up, enter an IP address , subnet mask and default gateway IP addresses that are
all compatible with your LAN.

5. For the Preferred DNS Server , enter the loopback address 127.0.0.1 . This tells the
server to
use its own DNS server service for name resolution, rather than using a separate
server. After filling out those fields , click the Advanced button.
4. When the Advanced TCP/IP Settings window comes up, click the DNS tab, enter
firewall.test on the DNS suffix for this connection text field, check Register this
connection's address in DNS , check Use this connection's DNS suffix in DNS
registration , and click OK , OK , and then Close:

59
Now that we have configured our server with a static IP address and a DNS suffix.

 Installing DNS Server in windows server 2012


1. Manage
2. Add role and features
3. Next
4. Next
5. DNS
6. Next
7. Next
8. Install
9. Close
 Configuring DNS Server in windows server 2012

Tools

DNS

Expand the Name of the server: eg: giheke ( This is the name that you have given your
server=computer name of the server)

Right click forward lookup zone

Click zone

Next

Primary zone

Next

60
To all server

Next

Zone name: eg giheketvet.com

Allow both non secured and secured updates

Next

Finish

Right click on the domain created: eg : giheketvet.com

New host

Name:www

IP address of the web server : eg:192.168.8.10

Add host: www

Done then

Right click Reverse lookup Zone

New Zone

Next

Primary zone

Next

Next

IPV4

Network IP: 192.168.8 (here you write ony 3 numbers separated by dot)

Next

Allow both non and secured

Finish

Then configure PTR

Right click 8.168.192 in addr

61
New pointer(PTR)

Host IP ( IP of the web server): 192.168.8.10

HostName:www.giheketvet.com

The zone types include:

Primary zone: Creates a copy of a zone that can be updated directly on this server. This zone
information is stored in.dns text file.

Secondary zone: A standard secondary zone copies all of the information from its master
DNS server. A master DNS server can be an Active Directory, primary, or secondary zone
that is configured for zone transfers. Note that you cannot modify the zone data on a
secondary DNS server. All of its data is copied from its master DNS server.

Stub zone: A Stub zone contains only those resource records that are necessary to identify
the authoritative DNS servers for that zone. Those resource records include Name Server
(NS), Start of Authority (SOA), and possibly glue Host (A) records.

Note: The name of the zone must be the same as the name of the Active Directory-based
domain, or be a logical DNS container for that name. For example, if the Active Directory-
based domain is named"support.microsoft.com", valid zone names are
"support.microsoft.com" only

A forward lookup zone is a DNS zone in which hostname to IP address relations are stored.
When a computer asks the IP address of a specific hostname, the forward lookup zone is
checked and the desired result is returned

62
Learning Outcome 3.3: Configure the server roles and features : file and share access
services

To configure file and folder security:

Log on by using your domain user name and password.


Start Windows Explorer.
Expand My Computer,click the drive that contains the folder that you want to configure.
Right-click the folder that you want to configure,click Properties.
Click the Security tab.
Click Advanced.
Click to clear the Allow inheritable permissions from parent to propagate to this object
andall child objects. Include these with entries explicitly defined here check box.

click Copy

Click OK.

Protecting Shared Files and Folders by Using Shadow Copies

Shadow Copy (also known as Volume Snapshot Service, Volume Shadow Copy Service or
VSS)
is a technology included in Microsoft Windows that allows taking manual or automatic
backup copies or snapshots of computer files or volumes, even when they are in use.

1. To configure shadow copies, follow these steps:

2. Click Start,
3. right-click My Computer,

63
4. and then click Manage.
Right-click Shared Folders point to All Tasks,
5. Click Configure Shadow Copies.
In the Select a volume list, click the drive that contains the file share resource that
you want to create a shadow copy for. For example, click drive R.

6. Click Settings, and then click the destination drive for the shadow copy in the
Located on this volume list.
7. click No limit.
8. Click OK, and then click Enable.
9. Click Yes to enable shadow copies.

 Configuring Work Folders

Work Folders is a feature in Windows Server 2012 R2 that allows Windows users to store
and access work files on personal PCs and Windows devices as well as corporate PCs.

Work Folders can be deployed alongside existing deployments of Folder Redirection, Offline
Files and home folders.

A print server is a computer that can process print-related jobs on a network of computers.
Print servers are connected to a computer network in order to serve the need for printing jobs
in a network that may contain more than one printer

Configuring Network Printing

Open Server Manager, by clicking on the Start button and selecting Server Manager
Click on Dashboard,

Add roles and features


Next

Next.
Next.
Print and Document Services

Next

64
Next

Next.
Select the Print Server and Internet Printing options from Role Services.

Install

When the Print Server role has been installed, you can access the Print Management
console from the tools tab on Server Manager.

Learning Outcome 4: Monitor and test the server


Learning Outcome 4.1: Test the server performance

Monitoring of Server

CPU Usage

Task Manager: This tab provides details about processor usage such as Name, PID,
Description, Status, Threads, CPU, and Average CPU.

Use the Performance tab in Task Manager to view how your computer's central processing
unit (CPU) is

65
being used by Windows and other programs running on your computer
1. Open Task Manager

2. Clicking Task Manager.


3. Click the Performance tab.

Hard drive
A hard disk drive (sometimes abbreviated as hard drive, HD, or HDD) is a non-volatile
memory hardware device that permanently stores and retrieves data on a computer.
Non-volatile means data is retained when the computer is turned off. A hard drive is also
known as a hard disk drive.

Memory Consumption

The lower graph on the left side of the window shows the Page File usage. This value will
increase along with your RAM usage.

66
If your Available Physical Memory value is very low, you may also notice your Page File
increasing

I/O Network
Network monitoring is a critical IT process where all networking components like routers,
switches, firewalls, servers, and VMs are monitored for fault and performance and evaluated
continuously to maintain and optimize their availability.

.
So why is it important to monitor networks?

The network is the life line of the IT infrastructure. When networks fail, the flow of
information required by applications and business operations .Network Admins are
continually asked to add new users,technologies and applications to their networks. These
changes can impact their ability to deliver consistent, expected network performance.

Disk I/O Monitoring


Disk I/O monitoring allows you to monitor Read and Write operations of logical disks on
your
machine and set thresholds so that you get alerted if any of the below metrics reaches some
critical level preset by you:
Reads/sec – the rate of read operations on the disk.
Writes/sec – the rate of write operations on the disk.

Response Time
If your server response time is slow, then your whole site will be slow, no matter how
optimized
your other resources are. According to Google and other speed test tools such as GTmetrix,
you
should aim for a server response time of less than 200ms.
Why Monitor Response Time?
1) If a webpage is slow the experience for the visitor is usually bad. Many users simply leave
a site if it doesn't respond within a few seconds.
2) When a site has a high response time it is usually an indication that the server is
struggling.
Slow response times are really common when servers are overloaded, and the information
can be used to identify server problems or to explain that there is a problem when contacting
a web host.
3) Slow response times and high levels of downtime are linked. A site that has a high
response time is more likely to suffer from downtime than a site that is running quickly.
Learning Outcome 4.4: install, configure and maintain the antivirus for the proper

67
protection of the systems

Anti-viruses on windows server


Antivirus - A proactive antivirus engine that automatically detects and eliminates different
types of malware including viruses, worms and trojans. Defense - A unique collection of
prevention based security technologies that help preserve the integrity, security and privacy
of the serveroperating system and data.

Antivirus software, or anti-virus software (abbreviated to AV software), also known as


antimalware, is a computer program used to prevent, detect, and remove malware. Antivirus
software was originally developed to detect and remove computer viruses, hence the name

Windows server built-in monitoring tools:


 Task Manager
 Event Viewer
 Reliability and Performance Monitor
 Performance monitor
 Reliability Monitor
 Data collector sets

68

You might also like