SlideShare a Scribd company logo
Mcts Guide To Microsoft Windows Server 2008
Network Infrastructure Configuration Exam 70642
1st Edition Michael Bender download
https://ebookbell.com/product/mcts-guide-to-microsoft-windows-
server-2008-network-infrastructure-configuration-exam-70642-1st-
edition-michael-bender-4071378
Explore and download more ebooks at ebookbell.com
Here are some recommended products that we believe you will be
interested in. You can click the link to download.
Mcts Guide To Configuring Microsoft Windows Server 2008 Active
Directory Exam 70640 Tomsho
https://ebookbell.com/product/mcts-guide-to-configuring-microsoft-
windows-server-2008-active-directory-exam-70640-tomsho-21347424
Mcts Guide To Microsoft Windows 7 Exam 70680 Networking Course
Technology 1st Edition Byron Wright
https://ebookbell.com/product/mcts-guide-to-microsoft-
windows-7-exam-70680-networking-course-technology-1st-edition-byron-
wright-2418096
Mcts Guide To Microsoft Windows Vista 1st Edition Leon Plesniarski
https://ebookbell.com/product/mcts-guide-to-microsoft-windows-
vista-1st-edition-leon-plesniarski-2485076
Mcts Guide To Microsoft Sql Server 2008 Faisal Akkawi
https://ebookbell.com/product/mcts-guide-to-microsoft-sql-
server-2008-faisal-akkawi-4721366
A Podiatrists Guide To Using Research 1st Edition Ian Mathieson
Bschons Phd Mchs
https://ebookbell.com/product/a-podiatrists-guide-to-using-
research-1st-edition-ian-mathieson-bschons-phd-mchs-1745476
Snus The Complete Guide To Brands Manufacturing And Art Of Enjoying
Smokeless Tobacco Mats Jonson
https://ebookbell.com/product/snus-the-complete-guide-to-brands-
manufacturing-and-art-of-enjoying-smokeless-tobacco-mats-
jonson-57689818
Strategic Internal Communication A Practitioners Guide To Implementing
Cuttingedge Methods For Improved Workplace Culture Susanne Dahlman
Mats Heide
https://ebookbell.com/product/strategic-internal-communication-a-
practitioners-guide-to-implementing-cuttingedge-methods-for-improved-
workplace-culture-susanne-dahlman-mats-heide-33573294
Why Group Therapy Works And How To Do It A Guide For Health And Social
Care Professionals 1st Edition Christer Sandahl
https://ebookbell.com/product/why-group-therapy-works-and-how-to-do-
it-a-guide-for-health-and-social-care-professionals-1st-edition-
christer-sandahl-38301100
Windows 7 Portable Command Guide Mcts 70680 70685 And 70686 1st
Edition Darril Gibson
https://ebookbell.com/product/windows-7-portable-command-guide-
mcts-70680-70685-and-70686-1st-edition-darril-gibson-2217592
Mcts Guide To Microsoft Windows Server 2008 Network Infrastructure Configuration Exam 70642 1st Edition Michael Bender
Mcts Guide To Microsoft Windows Server 2008 Network Infrastructure Configuration Exam 70642 1st Edition Michael Bender
MCTS Guide to Microsoft
Windows Server 2008 Network
Infrastructure Configuration
MCTS Guide to Microsoft
Windows Server 2008 Network
Infrastructure Configuration
Michael Bender
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
MCTS Guide to Microsoft Windows
Server 2008 Network Infrastructure
Configuration
Michael Bender
Vice President, Career and Professional
Editorial: Dave Garza
Executive Editor: Stephen Helba
Managing Editor: Marah Bellegarde
Acquisitions Editor: Nick Lombardi
Senior Product Manager: Michelle
Ruelos Cannistraci
Developmental Editor: Lisa Ruffolo
Editorial Assistant: Sarah Pickering
Vice President, Career and Professional
Marketing: Jennifer McAvey
Marketing Director: Deborah S. Yarnell
Senior Marketing Manager: Erin Coffin
Marketing Coordinator: Shanna Gibbs
Production Director: Carolyn Miller
Production Manager: Andrew Crouth
Content Project Manager: Jessica
McNavich
Design Assistant: Hannah Wellman
Cover designer: Robert Pehlke
Cover photo or illustration: Getty
Images
Manufacturing Coordinator: Denise
Powers
Copyeditor: Bruce Owens
Proofreader: Amy Ford
Compositor: Cadmus/KGL
© 2010 Course Technology, Cengage Learning
ALL RIGHTS RESERVED. No part of this work covered by the copyright
herein may be reproduced, transmitted, stored or used in any form or by any
means graphic, electronic, or mechanical, including but not limited to photo-
copying, recording, scanning, digitizing, taping, Web distribution, information
networks, or information storage and retrieval systems, except as permitted
under Section 107 or 108 of the 1976 United States Copyright Act, without the
prior written permission of the publisher.
For product information and technology assistance, contact us at
Cengage Learning Customer & Sales Support, 1-800-354-9706
For permission to use material from this text or product, submit all
requests online at cengage.com/permissions
Further permissions questions can be emailed to
permissionrequest@cengage.com
Example: Microsoft® is a registered trademark of the Microsoft Corporation.
Library of Congress Control Number: 2009922095
ISBN-13: 978-1-423-90236-2
ISBN-10: 1-423-90236-X
Course Technology
20 Channel Center
Boston, MA 02210
USA
Cengage Learning is a leading provider of customized learning solutions with
office locations around the globe, including Singapore, the United Kingdom,
Australia, Mexico, Brazil, and Japan. Locate your local office at:
international.cengage.com/region
Cengage Learning products are represented in Canada by Nelson
Education, Ltd.
For your lifelong learning solutions, visit course.cengage.com
Visit our corporate website at cengage.com.
Some of the product names and company names used in this book have been
used for identification purposes only and may be trademarks or registered
trademarks of their respective manufacturers and sellers.
Microsoft and the Office logo are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries. Course
Technology, a part of Cengage Learning, is an independent entity from the
Microsoft Corporation, and not affiliated with Microsoft in any manner.
Any fictional data related to persons or companies or URLs used throughout this
book is intended for instructional purposes only. At the time this book was printed,
any such data was fictional and not belonging to any real persons or companies.
Course Technology and the Course Technology logo are registered trade-
marks used under license.
Course Technology, a part of Cengage Learning, reserves the right to revise this
publication and make changes from time to time in its content without notice.
The programs in this book are for instructional purposes only. They have been
tested with care, but are not guaranteed for any particular intent beyond educa-
tional purposes. The author and the publisher do not offer any warranties or
representations, nor do they accept any liabilities with respect to the programs.
Printed in the United States of America
1 2 3 4 5 6 7 12 11 10 09
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
iii
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
CHAPTER 1
Introduction to Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
CHAPTER 2
Installing Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
CHAPTER 3
Networking with Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
CHAPTER 4
Installing and Configuring the Dynamic Host Configuration Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
CHAPTER 5
Introduction to DNS in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
CHAPTER 6
Managing and Administering DNS in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
CHAPTER 7
Configuring File Services in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
CHAPTER 8
Introduction to Printers in a Windows Server 2008 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
CHAPTER 9
Network Policy and Access Services in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
CHAPTER 10
Securing Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
CHAPTER 11
Managing and Monitoring a Windows Server 2008 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
APPENDIX A
MCTS 70-642 Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
APPENDIX B
A Step-by-Step Guide to Using Server Virtualization Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Brief Table of Contents
Brief Table of Contents
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
This page intentionally left blank
v
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
CHAPTER 1
Introduction to Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Clients, Servers, and Windows Network Models ......................................................................................................................... 2
Workgroup Model.................................................................................................................................................................. 2
Domain Model with Active Directory .................................................................................................................................... 3
Windows Server 2008 Editions .................................................................................................................................................... 4
Windows Server 2008, Standard Edition ................................................................................................................................ 5
Windows Server 2008, Enterprise Edition .............................................................................................................................. 5
Windows Server 2008, Datacenter Edition ............................................................................................................................. 5
Windows Web Server 2008..................................................................................................................................................... 5
Windows HPC Server 2008.................................................................................................................................................... 6
Windows Server 2008, Without Hyper-V ............................................................................................................................... 6
Windows Server 2008 for Itanium-Based Systems .................................................................................................................. 6
Windows Server 2008 Hardware Requirements........................................................................................................................... 6
32-Bit and 64-Bit Processors................................................................................................................................................... 7
New Technologies in Windows Server 2008 ................................................................................................................................ 7
Improved Installation Process............................................................................................................................................... 11
Hyper-V................................................................................................................................................................................ 13
Server Core........................................................................................................................................................................... 13
Network Access Protection................................................................................................................................................... 14
TCP/IP Improvements........................................................................................................................................................... 14
Server Manager..................................................................................................................................................................... 14
PowerShell............................................................................................................................................................................ 15
Windows Remote Management............................................................................................................................................ 16
Group Policy Preferences...................................................................................................................................................... 16
New Roles and Features in Windows Server 2008..................................................................................................................... 16
New Roles in Server 2008 .................................................................................................................................................... 17
Active Directory Roles.......................................................................................................................................................... 17
Network Roles...................................................................................................................................................................... 19
Infrastructure Roles .............................................................................................................................................................. 20
New Features........................................................................................................................................................................ 21
Roles and Features Management .......................................................................................................................................... 22
Server Manager Command................................................................................................................................................... 24
Windows Server 2008 User Interface ......................................................................................................................................... 25
Start Menu............................................................................................................................................................................ 25
Network and Sharing Center................................................................................................................................................ 27
Windows Desktop Experience .............................................................................................................................................. 28
Chapter Summary ...................................................................................................................................................................... 29
Key Terms.................................................................................................................................................................................. 29
Review Questions....................................................................................................................................................................... 32
Case Projects.............................................................................................................................................................................. 35
CHAPTER 2
Installing Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Deployment Improvements in Windows Server 2008................................................................................................................. 38
Process Improvements........................................................................................................................................................... 38
Tool and Technologies Improvements................................................................................................................................... 39
Windows Deployment Services ............................................................................................................................................. 39
Windows Automated Installation Kit ................................................................................................................................... 41
Windows System Image Manager......................................................................................................................................... 42
ImageX................................................................................................................................................................................. 43
Windows Preinstallation Environment.................................................................................................................................. 43
Windows Recovery Environment.......................................................................................................................................... 44
Sysprep ................................................................................................................................................................................. 45
Table of Contents
Table of Contents
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Table of Contents
vi
Preparing to Install Windows Server 2008 ................................................................................................................................. 47
Installation Types.................................................................................................................................................................. 47
Installing Windows Server 2008 with Server Core ..................................................................................................................... 50
Imaging Options with ImageX.............................................................................................................................................. 51
Modifying an Image ............................................................................................................................................................. 52
Applying an Image................................................................................................................................................................ 54
Configuring Windows Server 2008 ............................................................................................................................................ 54
Product Activation and Licensing in Windows Server 2008 ................................................................................................. 56
Introduction to Windows Server 2008 Server Core.................................................................................................................... 60
Basics of Server Core ............................................................................................................................................................ 60
Configuring Server Core....................................................................................................................................................... 64
Chapter Summary ...................................................................................................................................................................... 67
Key Terms.................................................................................................................................................................................. 68
Review Questions....................................................................................................................................................................... 71
Case Projects.............................................................................................................................................................................. 74
CHAPTER 3
Networking with Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Introduction to Networking....................................................................................................................................................... 78
Basics of Networking............................................................................................................................................................ 78
Types of Networks................................................................................................................................................................ 78
Basic Network Components ................................................................................................................................................. 81
Network Addressing with TCP/IP ............................................................................................................................................. 86
IPv4 ...................................................................................................................................................................................... 86
Subnetting............................................................................................................................................................................. 89
Public and Private Addresses ................................................................................................................................................ 92
Introduction to IPv6 ............................................................................................................................................................. 93
IPv6 Address Types.................................................................................................................................................................... 95
Configuring Clients for IPv4 and IPv6 ....................................................................................................................................... 97
IPv4 Client Configuration..................................................................................................................................................... 97
Manual Configuration Through the GUI............................................................................................................................ 103
Manual Configuration with Netsh...................................................................................................................................... 104
Upgrading Your Network to IPv6............................................................................................................................................ 105
Dual-Layer IP Stack............................................................................................................................................................ 105
IPv6 over IPv4 .................................................................................................................................................................... 106
ISATAP ............................................................................................................................................................................... 106
6to4.................................................................................................................................................................................... 106
Teredo................................................................................................................................................................................. 107
Using Netsh to Configure Transition Technologies............................................................................................................. 107
Enabling Teredo.................................................................................................................................................................. 108
Disabling IPv6 .................................................................................................................................................................... 109
Troubleshooting TCP/IP Networking ...................................................................................................................................... 110
Troubleshooting Tools in Windows Server 2008 ................................................................................................................ 110
Network Troubleshooting Methodology ............................................................................................................................ 117
Chapter Summary .................................................................................................................................................................... 117
Key Terms................................................................................................................................................................................ 118
Review Questions..................................................................................................................................................................... 120
Case Projects............................................................................................................................................................................ 123
CHAPTER 4
Installing and Configuring the Dynamic Host Configuration Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Basics of DHCP ....................................................................................................................................................................... 126
DHCP Protocol Basics........................................................................................................................................................ 126
Exploring DHCP Components and Processes .......................................................................................................................... 127
Components of DHCP........................................................................................................................................................ 127
DHCP Communication Processes....................................................................................................................................... 133
Using DHCPv6 ................................................................................................................................................................... 137
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Table of Contents vii
Installing DHCP in a Windows Server 2008 Environment....................................................................................................... 137
Authorizing DHCP ............................................................................................................................................................. 140
Configuring the DHCP Server.................................................................................................................................................. 141
Configuring Scopes............................................................................................................................................................. 141
Configuring Exclusions....................................................................................................................................................... 143
Configuring Options........................................................................................................................................................... 145
Creating Reservations......................................................................................................................................................... 146
Using netsh ......................................................................................................................................................................... 147
DHCP Client Configuration ............................................................................................................................................... 147
DHCP Administration.............................................................................................................................................................. 150
Monitoring Reliability and Performance............................................................................................................................. 150
Backup and Recovery ......................................................................................................................................................... 154
Troubleshooting DHCP ........................................................................................................................................................... 156
Reconciling the Database.................................................................................................................................................... 156
Verifying DHCP Services .................................................................................................................................................... 157
Troubleshooting DHCP Clients: IPconfig ........................................................................................................................... 157
Chapter Summary .................................................................................................................................................................... 158
Key Terms................................................................................................................................................................................ 159
Review Questions..................................................................................................................................................................... 160
Case Projects............................................................................................................................................................................ 163
CHAPTER 5
Introduction to DNS in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Domain Name System.............................................................................................................................................................. 166
DNS Terminology............................................................................................................................................................... 167
DNS Queries in Windows Server 2008............................................................................................................................... 172
Configuring DNS Clients ......................................................................................................................................................... 174
DNS Client Settings............................................................................................................................................................ 174
Dynamic Updates................................................................................................................................................................ 181
Installing DNS in Windows Server 2008.................................................................................................................................. 181
Installing Cache-only DNS servers...................................................................................................................................... 181
DNS Zones .............................................................................................................................................................................. 183
Standard Zones................................................................................................................................................................... 184
Standard DNS Zone Types ................................................................................................................................................. 184
Direction of DNS Zones..................................................................................................................................................... 188
DNS Resource Records....................................................................................................................................................... 189
Standard DNS Zone Transfers............................................................................................................................................ 196
Chapter Summary .................................................................................................................................................................... 197
Key Terms................................................................................................................................................................................ 197
Review Questions..................................................................................................................................................................... 199
Case Projects............................................................................................................................................................................ 203
CHAPTER 6
Managing and Administering DNS in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Introduction to Active Directory Domain Services................................................................................................................... 206
Using AD DS ...................................................................................................................................................................... 208
AD-Integrated DNS ............................................................................................................................................................ 214
DNS Zone Layout .............................................................................................................................................................. 215
Dynamic DNS..................................................................................................................................................................... 218
Managing DNS ........................................................................................................................................................................ 223
Using the DNS Console ...................................................................................................................................................... 223
Configuration Settings in the DNS Console........................................................................................................................ 223
Round-Robin DNS ..............................................................................................................................................................230
Conditional Forwarding ......................................................................................................................................................232
Troubleshooting DNS ...............................................................................................................................................................234
DNS Server Logs..................................................................................................................................................................234
Command-Line Utilities.......................................................................................................................................................239
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Table of Contents
viii
WINS ........................................................................................................................................................................................247
WINS...................................................................................................................................................................................249
New DNS Features....................................................................................................................................................................250
DNS on Server Core ............................................................................................................................................................250
Support for IPv6 ..................................................................................................................................................................251
Primary Read-Only Zone.....................................................................................................................................................251
Link-Local Multicast Name Resolution...............................................................................................................................252
DNS Client Changes............................................................................................................................................................252
Background Zone Loading ..................................................................................................................................................253
GNZ....................................................................................................................................................................................253
Chapter Summary .....................................................................................................................................................................253
Key Terms.................................................................................................................................................................................254
Review Questions......................................................................................................................................................................256
Case Projects.............................................................................................................................................................................259
CHAPTER 7
Configuring File Services in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .261
Introduction to File Services......................................................................................................................................................262
Installing the File Server Role ..............................................................................................................................................263
File and Folder Sharing .............................................................................................................................................................263
Public and Standard Sharing................................................................................................................................................263
Access Control.....................................................................................................................................................................265
Deploying Shares .................................................................................................................................................................270
Distributed File System..............................................................................................................................................................278
Introduction to DFS.............................................................................................................................................................278
Configuring DFS..................................................................................................................................................................283
Managing Windows Server 2008 with FSRM ...........................................................................................................................287
Chapter Summary .....................................................................................................................................................................292
Key Terms.................................................................................................................................................................................293
Review Questions......................................................................................................................................................................294
Case Projects.............................................................................................................................................................................298
CHAPTER 8
Introduction to Printers in a Windows Server 2008 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .301
Windows Printer Model for Windows Server 2008...................................................................................................................302
Windows Printer Types........................................................................................................................................................303
Deploying Printers and Print Services........................................................................................................................................305
Installing the Print Services Role..........................................................................................................................................306
Deploying Printers to Clients...............................................................................................................................................311
Configuring Printer Resources...................................................................................................................................................316
Sharing a Stand-Alone Printer..............................................................................................................................................316
Changing Permissions on a Printer ......................................................................................................................................317
Changing the Printer Port....................................................................................................................................................317
Creating a Printer Pool ........................................................................................................................................................319
Creating Multiple Printers for a Single Print Device ............................................................................................................320
Updating a Printer Driver ....................................................................................................................................................324
Managing Printers and Print Services........................................................................................................................................325
Using the PMC ....................................................................................................................................................................325
Working with Print Queues .................................................................................................................................................326
Managing Server Core Print Services ...................................................................................................................................326
Chapter Summary .................................................................................................................................................................... 328
Key Terms................................................................................................................................................................................ 328
Review Questions..................................................................................................................................................................... 329
Case Projects............................................................................................................................................................................ 331
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Table of Contents ix
CHAPTER 9
Network Policy and Access Services in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Configuring Routing in Windows Server 2008 ........................................................................................................................ 334
Configuring RRAS as a Router........................................................................................................................................... 336
Working with Routing Tables............................................................................................................................................. 338
Configuring Routes............................................................................................................................................................. 340
Configuring a DHCP Relay Agent...................................................................................................................................... 342
Configuring Dial-on-Demand Routing ............................................................................................................................... 344
Configuring Remote Access Services in Windows Server 2008 ................................................................................................ 344
Dial-Up Networking........................................................................................................................................................... 344
Using Virtual Private Networks .......................................................................................................................................... 345
Network Address Translation............................................................................................................................................. 348
Introduction to Network Policy Server .................................................................................................................................... 349
Windows Server 2008 Editions and the NPS Console ........................................................................................................ 349
Introduction to RADIUS..................................................................................................................................................... 351
RADIUS Server................................................................................................................................................................... 353
RADIUS Proxy ....................................................................................................................................................................354
NAP.....................................................................................................................................................................................355
Authentication Protocol.......................................................................................................................................................355
Wireless Access Configuration in Windows Server 2008.......................................................................................................... 356
Chapter Summary .................................................................................................................................................................... 357
Key Terms................................................................................................................................................................................ 358
Review Questions..................................................................................................................................................................... 360
Case Projects............................................................................................................................................................................ 362
CHAPTER 10
Securing Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Managing Security in Server 2008 ........................................................................................................................................... 364
Security Configuration Wizard ........................................................................................................................................... 364
Windows Firewall............................................................................................................................................................... 365
Encrypting File Services ...................................................................................................................................................... 375
BitLocker............................................................................................................................................................................ 378
Microsoft Baseline Security Analyzer.................................................................................................................................. 383
Internet Protocol Security......................................................................................................................................................... 386
IPSec Threats ...................................................................................................................................................................... 387
How IPSec Works............................................................................................................................................................... 387
Network Authentication in Windows Server 2008 ............................................................................................................. 393
Introduction to Network Access Protection ............................................................................................................................. 394
NAP Terminology............................................................................................................................................................... 394
NAP Enforcement Methods................................................................................................................................................ 395
Implementing NAP ............................................................................................................................................................. 396
Installing NAP .................................................................................................................................................................... 396
Chapter Summary .................................................................................................................................................................... 397
Key Terms................................................................................................................................................................................ 399
Review Questions..................................................................................................................................................................... 399
Case Projects............................................................................................................................................................................ 402
CHAPTER 11
Managing and Monitoring a Windows Server 2008 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Managing Windows Server 2008 ............................................................................................................................................. 404
Microsoft Management Consoles ....................................................................................................................................... 404
Server Manager Console..................................................................................................................................................... 406
Updating Windows Server 2008 .............................................................................................................................................. 411
Windows Update ................................................................................................................................................................ 411
Windows Server Update Services ........................................................................................................................................ 411
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Table of Contents
x
Microsoft Baseline Security Analyzer 2.1................................................................................................................................. 421
Monitoring Windows Server 2008 ........................................................................................................................................... 424
Working with Event Viewer................................................................................................................................................ 424
Reliability and Performance Console.................................................................................................................................. 429
Network Monitor............................................................................................................................................................... 433
Disk Management............................................................................................................................................................... 436
Backup and Restore in Windows Server 2008 ......................................................................................................................... 441
Windows Server Backup ..................................................................................................................................................... 441
Chapter Summary .................................................................................................................................................................... 445
Key Terms................................................................................................................................................................................ 446
Review Questions..................................................................................................................................................................... 447
Case Projects............................................................................................................................................................................ 449
APPENDIX A
MCTS 70-642 Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
APPENDIX B
A Step-by-Step Guide to Using Server Virtualization Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Microsoft Virtual PC................................................................................................................................................................ 456
Requirements for Microsoft Virtual PC.............................................................................................................................. 456
Virtual Machine Operating Systems Supported .................................................................................................................. 456
How to Download Microsoft Virtual PC ........................................................................................................................... 457
How to Install Microsoft Virtual PC .................................................................................................................................. 457
Creating a Virtual Machine and Installing a Guest OS....................................................................................................... 457
Installing an OS from an ISO Image................................................................................................................................... 460
Configuring Networking and Hardware Options .................................................................................................................... 461
Host Key Options............................................................................................................................................................... 462
Microsoft Virtual Server........................................................................................................................................................... 463
Microsoft Virtual Server Guest Operating Systems Supported............................................................................................ 463
Microsoft Virtual Server Host Operating Systems Supported ............................................................................................. 464
Requirements for Microsoft Virtual Server......................................................................................................................... 464
How to Download Microsoft Virtual Server ...................................................................................................................... 464
How to Install Microsoft Virtual Server ............................................................................................................................. 465
Creating a Virtual Machine and Installing a Guest OS....................................................................................................... 467
Installing an OS from an ISO Image................................................................................................................................... 470
Configuring Networking and Hardware Options............................................................................................................... 470
Configuring Hardware for a Virtual Machine .................................................................................................................... 472
Host Key Options............................................................................................................................................................... 473
VMware Server ........................................................................................................................................................................ 473
VMware Server Guest Operating Systems Supported ......................................................................................................... 474
VMware Server Host Operating Systems Supported........................................................................................................... 475
Requirements for VMware Server....................................................................................................................................... 475
How to Download VMware Server.................................................................................................................................... 476
How to Install VMware Server........................................................................................................................................... 476
Creating a Virtual Machine and Installing a Guest OS ............................................................................................................ 478
Installing an OS from an ISO Image................................................................................................................................... 482
Configuring Networking Options....................................................................................................................................... 482
Configuring Hardware Options.......................................................................................................................................... 483
Installing VMware Tools .................................................................................................................................................... 484
Other Virtual Systems .............................................................................................................................................................. 486
VMware Workstation......................................................................................................................................................... 486
Microsoft Hyper-V ............................................................................................................................................................. 487
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
xi
Table of Contents∞∞xi
INTRODUCTION
INTRODUCTION
MCTS Guide to Microsoft® Windows Server® 2008 Network Infrastructure Configuration provides in-depth
coverage of the 70-642 certification exam objectives and focuses on the skills needed to manage a Windows
Server 2008 network. With more than 100 hands-on activities and dozens of skill-reinforcing case projects, you’ll
be well prepared for the certification exam and learn valuable skills to perform on the job.
After you finish this book, you’ll have an in-depth knowledge of Windows Server 2008, TCP/IP networking,
Domain Name System, and related services, such as Dynamic Host Configuration Protocol, Active Directory
Domain Services, File Services, Printers and Print Services, Network Policy and Access Services, security, and
managing the Windows Server 2008 network infrastructure.
Several new features of Windows Server 2008 are also covered including Server Core, Windows Backup, and
Server Manager.
Intended Audience
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration is intended for people
who want to learn how to configure and manage a Windows Server 2008 network and are considering becom-
ing MCTS and MCITP certified. The focus on network infrastructure configuration gives new and experienced
users alike the opportunity to study in depth the core technologies in Windows Server 2008. This book serves as
an excellent text for classroom teaching, but self-paced learners will also find that the clear explanations and chal-
lenging activities and case projects serve them equally well. Although this book doesn’t assume previous experi-
ence with Windows servers, it does assume a familiarity with current Windows OSs, such as Windows XP or
Vista. Networking knowledge equivalent to an introductory networking course is highly recommended.
This book includes:
• A Windows Server 2008 Enterprise Edition evaluation DVD is bundled with the book. It can be installed
on a computer or in a virtual machine using Microsoft Hyper-V, Microsoft Virtual Server, VMware
Workstation, VMware Player, or VMware Server.
• Step-by-step hands-on activities walk you through tasks ranging from a basic Windows Server 2008 instal-
lation to complex multiserver network configurations involving DHCP, DNS, and many other services. All
activities have been tested by a technical editor, reviewers, and validation experts.
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Introduction
xii
• Extensive review and end-of-chapter materials reinforce your learning.
• Challenging case projects build on one another and require you to apply the concepts and technologies
learned throughout the book.
• Coverage of features new to Windows Server 2008, including Server Core and Server Manager, is provided
as well as new roles and features, such as the Network Policy Server, Windows Backup, and improved
installation options including the Windows Automated Installation Kit and ImageX.
• Abundant screen captures and diagrams visually reinforce the text and hands-on activities.
• A list of 70-642 exam objectives is cross-referenced with chapters and sections that cover each objective.
Chapter Descriptions
This book is organized to familiarize you with Windows Server 2008 features and technologies and then provide
in-depth coverage of network infrastructure configuration and its related services. The book wraps up by dis-
cussing server management and monitoring. The 70-642 exam objectives are covered throughout the book, and
you can find a mapping of objectives and the chapters in which they’re covered on the inside front cover, with a
more detailed mapping in Appendix A.
The following list describes this book’s chapters:
• Chapter 1, “Introduction to Windows Server 2008,” begins by describing the role of clients, servers, and
Windows network models, and compares the Windows Server 2008 editions. Next, you’re given an
overview of Windows Server 2008 new technologies, such as Network Access Protection, Windows
Remote Management, and Group Policy preferences. New server roles and features in Windows Server
2008 are also described. Finally, the chapter introduces the Windows Server 2008 interface.
• Chapter 2, “Installing Windows Server 2008,” discusses the details of preparing to install the Full version
of a Windows Server 2008 installation, including deployment improvements in Windows Server 2008.
Next, the chapter shows how to install Windows Server 2008 with Server Core, the newest installation
option. The chapter also discusses how to configure Full and Server Core versions of Windows Server 2008
for initial use.
• Chapter 3, “Networking with Windows Server 2008,” begins by introducing networking and then dis-
cusses network addressing with TCP/IP. The chapter compares how to configure clients for IPv4 and IPv6
and how to upgrade your network to IPv6. It also explains troubleshooting considerations on a TCP/IP
network.
• Chapter 4, “Installing and Configuring the Dynamic Host Configuration Protocol,” explores the basics of
DHCP, including its components and processes. The chapter explains how to install DHCP in a Windows
Server 2008 environment and configure a DHCP server. DHCP administration and troubleshooting DHCP
are also discussed.
• Chapter 5, “Introduction to DNS in Windows Server 2008,” introduces the Domain Name System. The
chapter explains how to configure DNS clients and install DNS in Windows Server 2008. Finally, the chap-
ter examines the role of DNS zones on a Windows Server 2008 network.
• Chapter 6, “Managing and Administering DNS in Windows Server 2008,” introduces Active Directory
Domain Services. It examines how to manage and troubleshoot DNS in detail. It also explores the
Windows Internet Name Service and new DNS features, including DNS on Server Core, support for IPv6,
and link-local multicast name resolution.
• Chapter 7, “Configuring File Services in Windows Server 2008” provides a detailed look at File Services.
After introducing the topic, the chapter explains how to install the File Server role. Access Control and its
role in File Services are also explored. The chapter also discusses the Distributed File System and explains
how to manage Windows Server 2008 with the File System Resource Manager.
• Chapter 8, “Introduction to Printers in a Windows Server 2008 Network,” focuses on Windows Server
2008 printing services. The chapter begins by examining the Windows Printer model for Windows Server
2008. It then explains how to deploy printers and print services and configure printer resources. Finally,
the chapter discusses managing printers and print services.
• Chapter 9, “Network Policy and Access Services in Windows Server 2008,” provides an overview of con-
figuring routing in Windows Server 2008. It also discusses how to configure Remote Access Services in
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Introduction xiii
Windows Server 2008. The chapter also introduces you to Network Policy Server and explains wireless
access configuration in Windows Server 2008.
• Chapter 10, “Securing Windows Server 2008,” surveys security management in Windows Server 2008. The
chapter explores the Encrypting File Services and using BitLocker. It also discusses using the Microsoft
Baseline Security Analyzer as a basic security tool. Internet Protocol security is also discussed along with
network authentication. The chapter also provides an introduction to Network Access Protection.
• Chapter 11, “Managing and Monitoring a Windows Server 2008 Network Infrastructure,” explains how
to manage Windows Server 2008. The chapter explains how to update Windows Server 2008 and use the
Microsoft Baseline Security Analyzer 2.1 to measure network performance. Monitoring Windows Server
2008 is also discussed. Finally, the chapter explains how to back up and restore data in Windows Server
2008.
• Appendix A, “MCTS 70-642 Exam Objectives,” maps each 70-642 exam objective to the chapter and sec-
tion where you can find information on that objective.
• Appendix B, “Virtual Machine Instructions for Selected Activities,” provides instructions for performing
selected activities in VMware Workstation or Microsoft Virtual PC.
Features
This book includes the following learning features to help you master configuring a Windows Server 2008 net-
work and the 70-642 exam objectives:
• Chapter objectives—Each chapter begins with a detailed list of the concepts to be mastered. This list is a
quick reference to the chapter’s contents and a useful study aid.
• Hands-on activities—More than 100 hands-on activities are incorporated in the book, giving you practice
in setting up, managing, and troubleshooting a Windows Server 2008 server, with emphasis on network
infrastructure configuration. The activities give you a strong foundation for carrying out server administra-
tion tasks in the real world.
• Screen captures, illustrations, and tables—Numerous screen captures and illustrations of concepts aid you
in visualizing theories and concepts and seeing how to use tools and software features. In addition, tables
are used often to provide details and comparisons of practical and theoretical information and can be used
for a quick review.
• Chapter summary—Each chapter ends with a summary of the concepts introduced in the chapter. These
summaries are a helpful way to recap and revisit the material covered in the chapter.
• Key terms—All terms in the chapter introduced with bold text are gathered together in the Key Terms list
at the end of the chapter. This list gives you a method for checking your understanding of all terms intro-
duced.
• Review questions—The end-of-chapter assessment begins with review questions that reinforce the concepts
and techniques covered in each chapter. Answering these questions helps ensure that you have mastered
important topics.
• Case projects—Each chapter closes with one or more case projects. Many of the case projects build on one
another, as you take a small startup company to a flourishing enterprise.
• On the DVD—The DVD includes a free 120-day evaluation copy of Windows Server 2008, Enterprise
Edition.
Text and Graphics Conventions
Additional information and exercises have been added to this book to help you better understand what’s being
discussed in the chapter. Icons throughout the text alert you to these additional materials:
Tips offer extra information on resources, how to solve problems, and time-saving short-
cuts.
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Introduction
xiv
Notes present additional helpful material related to the subject being discussed.
The Caution icon identifies important information about potential mistakes or hazards.
Each Hands-on activity in this book is preceded by the Activity icon.
Case Project icons mark the end-of-chapter case projects, which are scenario-based assign-
ments that ask you to apply what you have learned in the chapter.
Test Preparation Software CD
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration includes the exam objec-
tives coverage map from Appendix A as well as CertBlaster test preparation questions that mirror the look and
feel of the MCTS exam 70-642. The unlock code for the CertBlaster questions is c_642. For more information
about dti test prep products, visit the Web site at www.dtipublishing.com
Instructor’s Resources
The following supplemental materials are available when this book is used in a classroom setting. All the supple-
ments available with this book are provided to instructors on a single CD, called the Instructor’s Resource CD
(ISBN 1-423-90269-6).
• Electronic Instructor’s Manual—The Instructor’s Manual that accompanies this book includes additional
instructional material to assist in class preparation, including suggestions for classroom activities, discus-
sion topics, and additional activities.
• Solutions—The instructor’s resources include solutions to all end-of-chapter material, including review
questions, hands-on activities, and case projects.
• ExamView—This textbook is accompanied by ExamView, a powerful testing software package that allows
instructors to create and administer printed, computer (LAN-based), and Internet exams. ExamView
includes hundreds of questions that correspond to the topics covered in this book, enabling students to
generate detailed study guides that include page references for further review. The computer-based and
Internet testing components allow students to take exams at their computers and also save the instructor
time by grading each exam automatically.
• PowerPoint presentations—This book comes with Microsoft PowerPoint slides for each chapter. They are
included as a teaching aid for classroom presentation, to make available to students on the network for
chapter review, or to be printed for classroom distribution. Instructors, please feel free to add your own
slides for additional topics you introduce to the class.
• Figure files—All the figures and tables in the book are reproduced on the Instructor’s Resource CD in
bitmap format. Similar to the PowerPoint presentations, they are included as a teaching aid for classroom
presentation, to make available to students for review, or to be printed for classroom distribution.
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Introduction xv
System Requirements
Hardware (Without Using Virtualization) Minimum two computers per student that meet the
following requirements:
• 2 GHz or faster CPU
• 512 MB or more RAM (preferably more when using a Vista client for some activities)
• 15 GB or more disk space
• DVD-ROM drive
• Super VGA or higher resolution monitor
• Mouse or pointing device
• Keyboard
• Two Network interface cards including one connected to the classroom, lab, or school network
• Printer (to practice setting up a network printer)
Hardware (Using Virtualization) One computer per student to act as the host machine that meets the
following minimum requirements:
• Windows XP Professional or Windows Vista
• 2.4 GHz CPU
• 2 GB or more RAM (more is always better with virtualization)
• 40 GB or more disk space
• DVD-ROM drive
• Super VGA or higher resolution monitor
• Mouse or pointing device
• Keyboard
• Two Network interface cards including one connected to the classroom, lab, or school network
• Printer (to practice setting up a network printer)
Software
• Windows Server 2008 Standard or Enterprise Edition (included with DVD in the book)
• Windows Vista: Any edition except Home Edition (an evaluation virtual machine can be downloaded from
the Microsoft Web site)
Virtualization Windows Server 2008 and Windows Vista can be loaded into a virtual server environment,
such VMware Workstation or Server, Microsoft Virtual PC, or Microsoft Hyper-V. The use of virtualization is
highly recommended.
Acknowledgments
First, the author would like to thank Nick Lombardi and Michelle Cannistraci at Cengage for the opportunity to
write this book. Thanks go out to Lisa Ruffolo for her super editing skills and keeping me on track. Thanks to
the reviewers for their insight and direction during the writing process. A big thanks goes out to all of my stu-
dents for whom this book is for. Last, but not least, thanks to my wife, Melanie, along with the rest of my friends
and family for their understanding and patience during the writing of this book. Without their support, none of
this would be possible.
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Introduction
xvi
Thanks also to the peer reviewers, who provided thoughtful advice, constructive criticism, and helpful encour-
agement: Mark Allison, Keiser University; Brian Bridson, Baker College of Flint; Robert Sherman, Sinclair
College; and Daniel Ziesmer, San Juan College.
About the Author
Michael Bender is an Information Technology instructor at Madison Area Technical College in Microsoft tech-
nologies. He has taught Windows Workstation (XP/Vista), Windows Server 2003, and Exchange 2003/2007, and
is the lead developer of Windows Server and Exchange curriculum for the Computer Systems Administration
Associate Degree program. Mike's background includes over 10 years of experience in System Administration
and Technical training covering all Microsoft platforms from Windows 95 to Server 2008. Mike is a Microsoft
Certified Trainer, an MCSE on the NT 4.0/2000/2003 platforms, and an MCITP on Windows Server 2008.
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
1
After reading this chapter and completing the
exercises, you will be able to:
• Discuss clients, servers, and Windows network models
• Differentiate among the editions of Windows Server 2008
• Identify Windows Server 2008 hardware requirements
• Discuss the new Windows Server 2008 technologies
• Describe the new roles and features in Windows Server 2008
• Navigate the Windows Server 2008 interface
chapter1
chapter1
Introduction to Windows
Server 2008
Introduction to Windows
Server 2008
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
2
After five years of development, Microsoft released the latest version of
Windows Server: Windows Server 2008. This much-anticipated release includes many new and
innovative features designed for businesses of all sizes. This book explores Windows Server 2008
networking and helps you prepare for the MCTS/MCITP Exam 70-642: Windows Server 2008
Network Infrastructure, Configuring. To prepare for this exam and the job responsibilities
related to it, you need to develop extensive knowledge of Windows Server 2008. This book
focuses on configuring, managing, and troubleshooting networking features and services in a
Windows 2008 Server environment.
This chapter introduces you to Windows networking models to lay a foundation for the rest
of the book. It continues by discussing the editions of Windows Server 2008, identifying the
hardware requirements for installing Windows Server 2008, and describing how to perform a
Full installation and Server Core installation. The chapter also explores the new roles and fea-
tures of Windows Server 2008. Finally, the chapter tours the Windows Server 2008 user inter-
face (UI).
Clients, Servers, and Windows Network Models
You are probably familiar with client computers running operating systems (OSs) such as
Windows XP or Windows Vista. A client operating system is designed as a user interface, usu-
ally graphical, for users to perform tasks such as word processing, researching information on
the Internet, and exchanging e-mail. Clients generally initiate requests for services from a local
or network resource. For example, users in an office use client computers on their desktops to
log onto the network and perform their work. The purpose of a network is to allow users to
access resources using one or more computers. These resources can be printers, applications,
documents, or even the Internet. Servers are the computers that provide these services and
resources to network users and that have an operating system such as Windows Server 2008.
Running in the background, Windows Server 2008 servers wait for requests from clients. When
it receives a request, the server performs its tasks and then returns the information to the client.
Rarely does a user interact directly with a server without a client intermediary. This type of inter-
action is known as client-server computing and is the basis for all types of Microsoft network
models. This chapter examines the following Windows network models:
• Workgroup model
• Domain model with Active Directory
Workgroup Model
A workgroup is a network of computers that allow each other access to their files, printers,
Internet connection, or other resources. Although Microsoft defines a workgroup as a peer-to-
peer computing network, workgroups do share some of the characteristics of a client-server com-
puting network. Even with peers, which are other computers in the workgroup, one computer
often acts as a client and another as a server, such as when two colleagues share a folder of doc-
uments located on a single computer.
Within small environments, usually up to 10 computers, workgroups have a number of ben-
efits. In a workgroup, computers can easily share resources. Also, a workgroup does not require
a server or other network resources to function. Because servers can be quite expensive, the
workgroup model may be a cost-effective solution for small businesses or home environments.
However, workgroups have a few drawbacks, especially for larger networks. Because of the
decentralized nature of workgroups, administering and managing computers and resources can
be a challenge. Each member of a workgroup is responsible for controlling access to its own
resources. For example, if you are managing a company workgroup with five computers and five
users, you have to create 25 user accounts in the network. If a user leaves your company, you
need to remove the user’s account from each computer. Because of these drawbacks, Microsoft
recommends limiting your workgroup environments to a maximum of 10 computers.
By default, all Windows Server 2008 computers are placed in a workgroup named WORK-
GROUP. Each computer accessing a network is defined by name, Internet Protocol (IP) address,
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Clients, Servers, and Windows Network Models 3
and membership status, which is either a single workgroup or a domain (discussed next).
Membership in a workgroup allows users to easily find shared resources, such as files and print-
ers hosted by peers. In addition, a computer can access resources located on computers outside
the workgroup. A network can have more than one workgroup.
Domain Model with Active Directory
In the client-server computing model, a domain is a group of users and computers that are man-
aged by the same security database. In Windows Server 2008, Active Directory Domain Services
(AD DS) is the technology that runs the domain security database. Servers that host this data-
base are called domain controllers (DCs). Domains provide a centralized authentication and
administration for users, groups, and computers, which are generally referred to as objects in
such an Active Directory (AD) environment.
In the domain network model, users and computers can access shared resources only if they
have the appropriate permissions to do so. In addition, access permissions can be defined only
for users and computers that are members of the domain and contained in the central domain
security database.
First introduced with the release of Windows 2000 Server, AD continues the concept of
domains started in Windows NT but improves on it. In Windows NT, DCs were one of two
types: primary or backup. A primary domain controller (PDC) held readable and writable copies
of the security database. A Windows NT network could have only one PDC. This database was
replicated as a read-only copy to backup domain controllers (BDCs). BDCs could process client
requests for authentication; however, they could not make changes, such as deleting or adding a
user. This had to be done at the PDC. Thus, Windows NT had one writable database and a single
point of failure. DCs in Active Directory domains use multimaster replication, which means all
DCs can update and replicate the directory database. This provides higher fault tolerance in a
domain that has more than one DC.
Active Directory domains also use the Domain Name System (DNS) for name resolution.
DNS is a Transmission Control Protocol (TCP)/IP-based standard for resolving computer names
with IP addresses. For example, when you enter www.microsoft.com in your Web browser, your
computer can connect to the Web site by requesting the IP address for www.microsoft.com from
a server running DNS. (DNS is discussed in detail in Chapter 6.)
Along with the use of DNS and multimaster DCs, Active Directory introduced Group
Policy. Group Policy is a way to set up specific configurations for users and computers within
an Active Directory domain. Group Policy settings are contained in Group Policy objects
(GPOs), which are linked to the following Active Directory service containers: sites, domains,
and organizational units. The settings within GPOs are then evaluated by the affected targets
using the hierarchical nature of Active Directory. Consequently, because it allows you to
manage user and computer objects, Group Policy is one of the top reasons to deploy Active
Directory.
A single network can have many domains. However, each domain must maintain an Active
Directory database for managing its member objects. As with workgroups, if you are a user on
a domain network, you can access resources outside your domain, but you will be asked for
credentials—a user ID and password—to access outside systems. If the domain you are access-
ing is in the same forest, your credentials are required only once and follow you as long as you
are logged on. A forest is a network of domains related to each other by relationships known
as trusts. Some domains have a parent-child relationship where they share a contiguous name-
space, such as us.microsoft.com and microsoft.com. These domains are part of the same tree
within a forest. Other domains do not share a contiguous namespace but establish trust rela-
tionships so they can access resources from each other. An example of this is the related com-
panies BenderTechnology.com and BenderResources.com. Each has its own namespace, but
trusts allow them to share resources and information. Trusts between Active Directory domains
in a tree are created automatically when you create domains in Windows Server 2008. These
are called transitive trusts. However, you must create trusts between separate trees in a forest
manually. In Windows NT domains prior to Windows 2000, administrators created all trusts
manually.
1
1
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
4
Windows Server 2008 Editions
From the small business with a few employees to the Fortune 100 multinational company, an
edition of Windows Server 2008 serves every business need. Each edition provides shared and
unique sets of services for administrators. Microsoft offers three general editions of Windows
Server 2008: Enterprise, Datacenter, and Standard. Two additional editions are designed for
special-purpose server applications: Web Server and HPC Server. All these editions are available
for 32-bit and 64-bit computers except HPC Server, which is available only for 64-bit machines.
Standard, Enterprise, and Datacenter editions are also provided in two types of installations: Full
installation (all options and features) or Server Core (minimal options).
Table 1-1 displays the differences among the 32-bit Windows Server 2008 editions. Many of
these features are explored in this book. Each edition is described in more detail in the follow-
ing sections.
Table 1-1 Features in Windows Server 2008 editions
Feature Name Enterprise Datacenter Standard Web
ADFS Web Agent X
Directory uIDM X X X
Desktop Experience X X X X
Windows Clustering X X X X
Windows Server Backup X X X X
Windows Network Load Balancing X X X X
Simple TCP/IP Services X X X X
SMTP X X X X
Subsystem for UNIX-Based Applications X X X X
Telnet Client X X X X
Telnet Server X X X X
Microsoft Message Queuing X X X X
RPC Over HTTP Proxy X X X X
Windows Internet Name Service X X X X
Wireless Client X X X X
Windows System Resource Manager X X X X
Simple SAN Management X X X X
LPR Port Monitor X X X X
Windows Foundation Components for WinFX X X X X
BITS Server Extensions X X X X
iSNS Server Service X X X X
BitLocker Drive Encryption X X X X
Multipath IO X X X X
Removable Storage Management X X X X
TFTP X X X X
SNMP X X X X
Server Admin Pack X X X X
RDC X X X X
Peer-to-Peer Name Resolution Protocol X X X X
Recovery Disk X X X X
Windows PowerShell X X X X
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Windows Server 2008 Editions 5
Windows Server 2008, Standard Edition
Designed for smaller environments and single-purpose installations, Windows Server 2008
Standard edition (SE) is the entry-level server edition that provides everything you most likely need
to run your network. It works as a single domain server for a small business or a single file/appli-
cation server in larger environments. This edition includes most of the features and support of the
other editions, including the file and print services, Internet Information Services (IIS) 7, Active
Directory, the distributed and encrypting file systems, and various management tools. A notable
addition is Network Load Balancing, which was previously available only in Enterprise and
Datacenter editions.
Windows Server 2008, Enterprise Edition
Windows Server 2008 Enterprise edition (EE) provides the following features not available
with SE:
• Significant increase in maximum allowable memory
• Active Directory Federation Services (discussed later in this chapter)
• Failover clustering
• Installation of up to four virtual machines on each physical host
• Hot-add memory
The decision to use the Enterprise edition instead of the Standard edition depends on two
factors: expense and functionality. Small and medium-sized businesses do not often need the
additional features of the Enterprise edition, so Standard is a good choice for them. Also,
large businesses not requiring these features can take advantage of a significant monetary
savings. However, if an organization plans to use failover clustering, Enterprise is the best
choice.
Windows Server 2008, Datacenter Edition
Datacenter edition (DE) includes all the features offered in the Enterprise edition with a few
additions, including the following:
• The ability to run up to 32 processors
• The ability to hot-add and replace processors
• Installation of unlimited virtual machines on each physical host
For most instances where plans include hosting more than four virtual machine guests on a
server, Datacenter is often the most economical choice. Datacenter is also licensed per processor,
so each processor installed in a system needs a Datacenter license, which involves additional
expense.
Microsoft does not currently differentiate among single, dual, and quad-
core processors for licensing. All are considered a single processor. This
might be a factor in hardware decisions when choosing between dual and
quad-core systems.
Windows Web Server 2008
Windows Web Server 2008 continues the Microsoft tradition of providing an OS edition
designed specifically as a single-purpose Web server. Because the purpose of this server is host-
ing Web sites and applications, the functionality of the system is reduced to accommodate these
services. Many server roles, including Dynamic Host Configuration Protocol (DHCP), DNS, and
file server, are not available. Web Server 2008 includes the reengineered IIS 7.0, ASP.NET, and
the .NET Framework as part of the installation. Web Server differs from other editions in that it
does not require client access licenses (CAL) for users. You can also install the database of your
choice without limitations on user access to the Web site and its related data.
1
1
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
6
The Web Server 2008 edition is available only as a 32-bit and a 64-bit OS in the Full ver-
sion only. Server Core does not currently support the .NET Framework and ASP.NET.
Windows HPC Server 2008
Windows HPC Server 2008 is designed for high-performance computing (HPC) applications.
This edition accommodates up to thousands of processing cores because it is built on the Server
2008 64-bit architecture model. For more information on Microsoft HPC Server 2008, see
www.microsoft.com/hpc.
Windows Server 2008, Without Hyper-V
Standard, Enterprise, and Datacenter editions for 64-bit servers are offered with or without
Hyper-V, which lets you consolidate multiple server roles as separate virtual machines running
on a single physical machine. Hyper-V also lets you efficiently run different operating systems—
such as Windows and Linux—in parallel on a single server. Currently, the retail price for
Windows Server 2008 without Hyper-V is slightly less than the price of Server 2008 with Hyper-
V. Note that the 32-bit versions of these SE, EE, and DE do not support Hyper-V.
Windows Server 2008 for Itanium-Based Systems
Standard, Enterprise, and Datacenter editions are available for servers using Intel Itanium
processors. Itanium processors use a different architecture from other 32-bit and 64-bit proces-
sors. For more information on Intel Itanium processors, see www.intel.com.
Windows Server 2008 Hardware Requirements
Microsoft provides minimum and recommended hardware requirements for installing its oper-
ating systems. The minimum requirements let you install and run a system using minimal
resources and services. Table 1-2 lists the Windows Server 2008 hardware requirements, includ-
ing the minimum, recommended, and maximum requirements.
Note the significant differences between memory capabilities in 32-bit processor versions
and 64-bit processor versions.
Table 1-2 Windows Server 2008 hardware requirements
Component Requirement
Processor Minimum: 1 GHz (x86 processor) or 1.4 GHz (x64 processor)
Recommended: 2 GHz or faster
Note: An Intel Itanium 2 processor is required for Windows Server 2008 for
Itanium-based systems
Memory Minimum: 512 MB RAM
Recommended: 2 GB RAM or greater
Maximum (32-bit systems): 4 GB (Standard) or 64 GB (Enterprise and
Datacenter)
Maximum (64-bit systems): 32 GB (Standard) or 2 TB (Enterprise, Datacenter,
and Itanium-based systems)
Available disk space Minimum: 10 GB
Recommended: 40 GB or greater
Note: Computers with more than 16 GB of RAM require more disk space for
paging, hibernation, and dump files
Drive DVD-ROM drive
Display and peripherals Super VGA (800 ⫻ 600) or higher-resolution monitor, keyboard, Microsoft
mouse or compatible pointing device
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
New Technologies in Windows Server 2008 7
32-Bit and 64-Bit Processors
As noted earlier, Windows Server 2008 is available for both 32-bit and 64-bit processor archi-
tectures. Although the role and feature sets of the versions are the same, they have noticeable dif-
ferences in two areas:
• Hardware limits
• Driver and application support
The 64-bit architectures have a greater theoretical limit for processing data. Basically, a
64-bit processor can handle twice the amount of data of a comparable 32-bit product.
Because the 64-bit version of Windows Server 2008 cannot run 16-bit Windows applications
or use 32-bit device drivers, you cannot run some legacy applications and hardware with the
64-bit version. For legacy applications, virtual technologies are an excellent option.
Windows Server 2008 is the last server operating system from Microsoft
available in a 32-bit version.
New Technologies in Windows Server 2008
Besides providing a new user interface, Windows Server 2008 also offers a new way of manag-
ing and securing your Windows network. Built on the same code base as Windows Vista,
Windows Server 2008 includes many improvements to previous server operating systems along
with new functionality. This section introduces the following technologies and enhancements,
which are important to anyone configuring and administering a Windows Server 2008 network:
• Improved installation process
• Hyper-V
• Server Core
• TCP/IP improvements
• Network Access Protection
• Server Manager
• Windows Remote Management
• PowerShell
• Group Policy preferences
Before exploring these technologies, install Windows Server 2008 Enterprise Edition by com-
pleting Activity 1-1. Chapter 2 provides a more detailed description of installing Server 2008.
Activity 1-1: Installing Windows Server 2008, Enterprise Edition
Time Required: 30 to 60 minutes (depending on hardware configuration of lab environment)
Objective: Install a working version of Windows Server 2008.
Description: As the system administrator for your company, you have just received an evalua-
tion copy of Windows Server 2008, Enterprise edition. You want to install the software so you
can review the new features it offers. In this activity, you install Server 2008, Enterprise edition.
In all the activities, your instructor might give you additional steps to per-
form depending on your lab environment. All the activities in this chapter
are appropriate for physical machines and virtual machine applications.
Before completing this activity, verify that your environment meets the
hardware requirements in Table 1-2.
1
1
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
8
1. Place your Windows Server 2008 DVD in the DVD drive of your computer and then restart
or power on your computer.
2. If prompted by the startup screen, press any key to boot from the DVD. You are prompted
only if the computer has an existing operating system. The first part of the installation pro-
gram starts.
3. When the first Install Windows window appears, confirm your time and currency format
and that the keyboard layout is correct, and then click Next. The next Install Windows
window appears, shown in Figure 1-1, to start the installation.
4. Click Install now. The Type your product key for activation window opens. See Figure 1-2.
5. Enter your product key if you have one and are required to enter the key. You might be able
to install Windows Server 2008 without a product key.
Depending on the type of installation media and license model you are
using, you may not be prompted for a product key. Skip to Step 7.
6. Click the Automatically activate Windows when I’m online check box to remove the check-
mark and then click Next. If you did not enter a product key, a message appears asking
whether you want to enter a key. Click No to continue installing without a product key.
7. In the next window, select the version of Server 2008 you will be installing. For this activ-
ity, choose Windows Server 2008 Enterprise (Full Installation) and then check the I have
selected the edition of Windows that I purchased box. See Figure 1-3. Click Next.
Figure 1-1 Preparing to install Windows Server 2008
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
New Technologies in Windows Server 2008 9
1
1
Figure 1-2 Type your product key for activation window
Figure 1-3 Selecting the operating system to install
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
10
8. In the next window, read the Microsoft Software License Terms, check the I accept the
license terms box, and then click Next.
9. In the next window, click Custom to perform a custom installation, which is the appropri-
ate option for performing a new installation. Notice that the choice to upgrade is not
available. (Chapter 2 covers upgrading Windows Server 2008.)
10. If necessary, delete any existing partitions by completing the following steps in the Where do
you want to install Windows? window:
a. Click the partition you want to delete.
b. Click the Drive options (advanced) link to display partitioning options.
c. Click Delete.
d. Click OK to confirm you want to delete the partition and lose all its data.
11. Click Disk 0 Unallocated Space and then click Drive options (advanced) to perform disk par-
titioning operations. Click New. Enter 30000 in the Size text box after ensuring that you
have at least 10 GB of unallocated disk space. Click Apply. Figure 1-4 shows an example of
completing these changes.
12. Select Disk 0 Partition 1 and then click Format. Confirm that you understand that all data
will be lost when you format the partition by clicking OK. Click Next. Windows performs
a number of tasks that do not require your input, as shown in Figure 1-5. This portion of
the installation takes approximately 30 minutes depending on the hardware setup of your
lab computer. The system will reboot one or more times during the installation. If you are
prompted to press a key to start from DVD, ignore the message.
Figure 1-4 Installation location options
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
New Technologies in Windows Server 2008 11
1
1
Figure 1-5 Installing Windows Server 2008
13. When advised that you need to change your password before logging on for the first time,
click OK. Use P@ssw0rd as your new password. Enter the password twice to ensure it is cor-
rect and then click the arrow to submit the new password. When prompted that your pass-
word has changed, click OK.
Windows Server 2008 starts for the first time, checks for and applies any updates, and
then displays the Initial Configuration Tasks window shown in Figure 1-6, which remains
displayed until you complete all the tasks. Then you can check the Do not show this window
at logon box and click the Close button. For now, you only need to set the time zone and
computer name, which you do in Activity 1-2.
14. Leave the window open for the next activity.
Improved Installation Process
Introduced in Windows Vista, the new, streamlined installation process that Windows Server
2008 uses requires minimal user input. You no longer have to wait for the installation program
to ask for networking information, regional settings, and other settings. You now provide this
information using the Initial Configuration Tasks window, which opens by default the first time
you log onto Windows Server 2008.
Activity 1-2: Completing Initial Configuration Tasks
Time Required: 20 minutes
Objective: Perform system configuration tasks after installation of Windows Server 2008.
Description: You just completed installing Windows Server 2008, Enterprise edition. Now you
want to configure the software so you can use it regularly. In this activity, you use the Initial
Configuration Tasks window to change the system time, time zone, and computer name.
1. The Initial Configuration Tasks window should still be open. If it is not, log onto
your system by pressing Ctrl+Alt+Del, enter P@ssw0rd as your password, and then press
Enter.
2. In the Initial Configuration Tasks window, click Set time zone. The Date and Time dialog
box opens. Click Change time zone, select your time zone in the Time zone drop-down list,
and then click OK. If the date and time are incorrect, click Change date and time, change
the time to your local time, and then click OK. Click OK to accept the changes and close the
Date and Time dialog box.
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
12
Ask your instructor if you are not sure of the proper time zone for your
location.
3. In the Initial Configuration Tasks window, click Provide computer name and domain. The
System Properties dialog box opens.
4. On the Computer Name tab, click Change. The Computer Name/Domain Changes dialog
box opens.
5. Replace the current computer name with MSN-SRV-0XX, where XX is a number supplied by
your instructor. Your number should be unique so each student has a different server name.
6. Click OK to accept the new name. A message appears, informing you that a restart is
needed. Click OK to close message box.
7. Click Close to close the System Properties dialog box. When a Microsoft Windows dialog
box appears, click Restart Now to restart your system.
8. After your system restarts, log on by pressing Ctrl+Alt+Del. Enter P@ssw0rd as your pass-
word and then press Enter.
9. When the Initial Configuration Tasks window opens, click the Do not show this window at
logon check box. If you need to open the Initial Configuration Tasks window later, click the
Start button, type OOBE.exe in the Start Search box, and then press Enter.
You can also complete all of the initial configuration tasks using Server
Manager, which you will explore later in this chapter.
(Link to set
your time
zone)
(After
completing
all the setup
tasks, click
this box)
Figure 1-6 Initial Configuration Tasks window
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
New Technologies in Windows Server 2008 13
10. Click Close to close the Initial Configuration Tasks window.
11. Press Ctrl+Alt+Del and then click Log off, as shown in Figure 1-7, to log off.
Hyper-V
Virtualization is a popular topic in information technology because it conserves hardware
resources. Using blade servers, virtual machines, and network storage are ways to consolidate
data centers. In a nutshell, virtualization allows you to run one or more separate instances of an
OS within a single host OS. Before virtualization, many companies had data centers full of
servers that used only 5 to 10 percent of their resources. This occurs because installed applica-
tions often need to run on their own system because of performance or third-party vendor sup-
port requirements. Virtualization allows organizations to consolidate these physical systems onto
high-powered servers (known as the host system). Each OS runs in its own virtual instance to
take advantage of the hardware resources of the host system. Microsoft’s entry into the server
virtualization arena is called Hyper-V (formerly code-named Viridian). It is available with your
initial investment in the 64-bit editions of Windows Server 2008 or as add-on application.
Server Core
For years, Windows administrators have battled to harden systems and roll out implementa-
tions of Windows Server without unnecessary roles and services running. Server Core,
Microsoft’s newest role in the Windows Server family, simplifies this task. Server Core is a
stripped-down installation of Windows Server 2008 with a set of available roles and services
more limited than in the Full version. To minimize the attack surface, or areas of the system
that could expose it to security breaches, much of the UI has been removed. Server Core pro-
vides a single command-line window and tools such as the Registry Editor available for admin-
istration. Although Microsoft considers Server Core to be a role instead of a separate edition,
Server Core can function as a separate entity. Server Core has a base set of installable roles and
services. As a role, Server Core can be installed on Standard, Enterprise, and Datacenter edi-
tions of Windows Server 2008 but only during initial installation of the operating system. You
cannot upgrade from Server Core to the Full version unless you perform a complete operating
system reinstallation.
1
1
Figure 1-7 Ctrl+Alt+Del options screen
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
14
Network Access Protection
Network Access Protection (NAP) is a new platform for Windows Server 2008, Windows Vista,
and Windows XP Service Pack 3 (SP3). NAP helps to protect networks, both public and private,
from malware such as viruses and spyware. Threats come from many sources, including the fol-
lowing typical examples:
• Employees accessing the Internet from work and inadvertently install Trojan horses
• Remote access to connections from external networks that create a gateway for viruses
• Guest computers accessing an internal network that introduce malware to the network
At its core, NAP queries the health state of computers accessing a network, determines whether
this state meets defined corporate health policies, and takes appropriate administrative action.
For example, a host-based stateful firewall such as the Windows Firewall in Windows Server
2008, Windows Vista, Windows XP SP2, and Windows Server 2003 SP1 or SP2 provides a layer
of defense against malicious inbound or outbound traffic. With NAP, you can define a corporate
health policy that enables the Windows Firewall to your specifications. Should a user turn off
the Windows Firewall on a NAP-compatible client computer, the local health policy will turn it
back on to remain compliant. NAP is designed to work with third-party hardware and software.
One important alliance is with Cisco Systems, a leader in networking hardware. Microsoft and
Cisco have created the alliance so that NAP can interact with Network Access Control (NAC),
a feature of Cisco networking products. NAP and its components are discussed throughout the
book and specifically in Chapter 9.
TCP/IP Improvements
Windows Server 2008 includes a number of improvements to its implementation of TCP/IP. The
Next-Generation TCP/IP stack is a new implementation of the TCP/IP protocol stack that con-
tains full support for Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6).
Part of the new stack is the introduction of Teredo, an IPv6 technology that can encapsulate IPv6
packets as IPv4 packets to allow them to traverse IPv4 networks. Included as well is Receive
Window Auto-tuning, a feature of the new stack that optimizes the size of the data packets a
server can accept. Windows Server 2008 computers can optimize network connections on the
basis of whether the data being transmitted is one large packet of data or multiple small pack-
ets of data. Receive-side Scaling works with Receive Window Auto-tuning to optimize traffic
flow. This is especially important for networks with 10-GB (or more) local area network speeds.
Server Manager
One of the most noticeable changes in Windows Server 2008 is the Server Manager console,
shown in Figure 1-8. In previous versions of Windows Server, you had to use various windows
and commands to configure your server. Server Manager centralizes these tools and allows you
to easily manage your server and network.
Activity 1-3: Exploring Server Manager
Time Required: 10 minutes
Objective: Review the features of Server Manager.
Description: After installing Windows Server 2008 for your company, you want to become
familiar with the tools you can use to configure and manage your server and network. You can
explore Server Manager to learn about the tools it provides.
Remember that MSN-SRV-0XX is a placeholder for the name your instruc-
tor assigned you or the name added in Activity 1-2.
1. Log onto your Windows Server 2008 Enterprise computer, if necessary. If Server Manager
does not start, click the Start button and then click Server Manager.
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
New Technologies in Windows Server 2008 15
2. If necessary, click Server Manager (MSN-SRV-0XX) in the left pane. The Server Summary
options appear in the right pane, which are similar to the options provided in the Initial
Configuration Tasks window along with other management resources.
3. Click Roles in the left pane. The Roles Summary options appear in the right pane, where you
manage roles.
4. Click Features in the left pane. The Features Summary options appear in the right pane,
where you manage features.
5. Click Diagnostics in the left pane. The Diagnostics Summary options appear in the right
pane, including tools for analyzing your server and diagnosing problems.
6. Click Configuration in the left pane. The Configuration Summary options appear in the
right pane, including tools for managing specific configuration settings of your server.
7. Click Storage in the left pane. The Storage Summary options appear in the right pane,
including tools for managing disks and backups.
8. Close Server Manager by clicking File on the menu bar and then clicking Exit.
PowerShell
If you are familiar with Linux or UNIX, you have probably noted that Windows operating sys-
tems would benefit from a similar flexible and powerful command-line interface (CLI) with
access to the operating system and its inner workings. Windows Server 2008 provides this inter-
face with PowerShell. First introduced in Microsoft Exchange Server 2007, PowerShell is built
on the Microsoft .NET Framework. PowerShell is becoming the de facto CLI and scripting lan-
guage for Microsoft products. For example, in Exchange 2007, all graphical user interface (GUI)
consoles are built on PowerShell commands. Although PowerShell has its own scripting language
for automation, you can use PowerShell interactively instead of using the GUI-based administra-
tive consoles. PowerShell allows you to string together commands, passing the result of one
1
1
Figure 1-8 Summary view in Server Manager
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
16
command into the next, in a process known as pipelining. Instead of passing the result as text,
PowerShell passes results as .NET objects, which are data packages containing information
applications and services can use and are compatible with .NET Framework. For example,
pipelining allows you to create a list of all the Microsoft Word (.doc) files in a directory that con-
tain a specific character, word, or phrase, and then sort the output according to your preferences.
See Figure 1-9.
Windows Remote Management
As a system administrator, most of your work involves managing servers. Being able to perform
this work remotely decreases your administrative task load and allows you to focus on other
issues. Windows Remote Management (WinRM) is a new feature that lets administrators
manage servers remotely by running management scripts and managing data on remote
machines. All connections are handled via the WS-Management protocol, which is a public stan-
dard for exchanging management data remotely by any device implementing the protocol,
making it non–vendor specific. WinRM has features similar to those of Windows Management
Instrumentation (WMI), which was installed on all computers using Windows Millennium
Edition (Windows Me), Windows 2000, Windows XP, and Windows Server 2003.
WinRM allows you to access, edit, and update data from local and remote computers. You can
obtain hardware data from WS-Management protocol implementations running on non-Windows
operating systems such as Linux. This allows hardware and operating systems from diverse ven-
dors to function together. For example, you can take data from all the computers in a network and
store it in a folder on a single computer, thereby creating a centrally located, comprehensive net-
work event log. Security risks are minimized by the use of encryption and authentication.
Group Policy Preferences
Group Policy preferences are a new feature of the Group Policy Management Console (GPMC).
Group Policy preferences are applied but not enforced, whereas settings in a Group Policy are
enforced, preventing users from making changes. Along with the GPMC and improvements in
the Group Policy Editor, Group Policy preferences will help you effectively implement Group
Policies within your Active Directory environments.
New Roles and Features in Windows Server 2008
Unlike previous versions of Windows Server, Windows Server 2008 makes a distinction between
roles and features. In Windows Server 2008, a role is a major function or service that a server per-
forms. For example, the File Services role allows the server to share files on a network. You can
Figure 1-9 Pipelining in Windows PowerShell
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
New Roles and Features in Windows Server 2008 17
also add features, which enhance or support a role or provide a standalone service. For exam-
ple, the Windows Server Backup feature allows you to back up and restore data.
New Roles in Server 2008
Windows Server 2008 introduces new roles and improves existing roles. Similar to a job role in a
company, a server role defines the specific task that a server is responsible for performing. Depending
on the security requirements, resource availability, and needs of the business, you can install one or
many roles on a single Windows Server 2008 computer. However, some roles are not meant to be
hosted together. For example, the Hyper-V role should be installed only by itself because of its secu-
rity and function requirements as a virtualization platform in Windows Server 2008.
The Full versions of Windows Server 2008 editions (SE, EE, and DC) can have a total of
17 installable roles, 16 roles if you have Server 2008 without Hyper-V. See Figure 1-10. The
Server Core versions have a total of eight installable roles.
Roles can be organized into three groups—Active Directory, Infrastructure, and Network
roles—which are described in the following sections. Table 1-3 shows the 17 roles including the
Windows Server 2008 editions for Full installations and the available roles for Server Core.
Active Directory Roles
Active Directory roles and services provide an integrated way to manage resources, both inter-
nal and external. Windows Server 2008 includes five Active Directory roles:
• Active Directory Certificate Services
• Active Directory Domain Services
• Active Directory Federation Services
• Active Directory Lightweight Directory Services
• Active Directory Rights Management Services
1
1
Figure 1-10 Server roles you can install on Full versions of Windows Server 2008
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
18
Active Directory Certificate Services Active Directory Certificate Services (AD CS)
provides digital certificate services for users, computers, and organizations. As a security tech-
nology, it provides customizable services for creating and managing public key certificates used
in software security systems that employ public key technologies. AD CS is often used in tandem
with IP, Internet Protocol Security (IPSec), and Encrypting File System (EFS) when these security
technologies are deployed in a Windows network.
Active Directory Domain Services AD DS stores information on objects such as users
and groups on the network. This information is available so users can effectively access resources
Table 1-3 Roles in each edition in Windows Server 2008 (including Server Core)
Server Role Enterprise Datacenter Standard Server Core Description
Active Directory X X X Allows the server to create certificate
Certificate Services authorities
Active Directory X X X X Stores information about users,
Domain Services computers, and other resources on the
network; helps administrators manage this
information securely and facilitates resource
sharing and collaboration between users
Active Directory X X Provides Web single-sign-on capabilities
Federation Services to authenticate a user to multiple, related
Web applications over the life of a single
online session
Active Directory X X X X Provides data storage and retrieval for
Lightweight Directory directory-enabled applications, without
Services the dependencies that are required for Active
Directory Domain Services
Active Directory X X X Allows you to protect information with
Rights Management Directory Rights Management
Services
Application Server X X X Provides an environment for deploying and
running custom business applications that are
built with Microsoft .NET Framework 3.0
DHCP Server X X X X Automatically provides client computers and
other TCP/IP-based network devices with IP
addresses
DNS Server X X X X Provides name resolution services
Fax Server X X X Enables the users in your network to send
and receive faxes
File Services X X X X Adds file serving capabilities to your server,
including replication, shared folder
management, file searching, and more
Hyper-V X X X X Provides a hypervisor-based virtualization
layer
Network Policy X X X Helps to protect your network by making
and Access Services sure client computers are healthy
Print Services X X X X Allows you to share printers among client
computers
Terminal Services X X X Provides users with the ability to centrally
access a desktop and individual applications
UDDI Services X X X Provides Universal Description, Discovery, and
Integration (UDDI) capabilities for sharing
information about Web services
Web Services X X X X Provides a Web-serving platform based on
the new IIS 7
Windows Deployment X X X Provides a simplified and secure way to
Services deploy Windows desktops
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
New Roles and Features in Windows Server 2008 19
on the network and collaborate with other users. Network administrators can use AD CS to
secure information and resources and to facilitate the sharing of these resources to users. Adding
AD DS provides the base for managing your AD objects.
Active Directory Federation Services Active Directory Federation Services (AD FS)
is a secure framework for allowing simplified identity federation and single sign-on for Web ser-
vices, both internal and external. Administrators can use AD FS to secure internal applications
and provide single sign-on for users or to provide external business partners access to Web appli-
cations and data.
Active Directory Lightweight Directory Services You use Active Directory
Lightweight Directory Services (AD LDS) to deploy directory-enabled applications, without the
dependencies that are required for AD DS.
AD LDS allows you to create and manage computer, user, and group objects that appli-
cations can use with a DC. Multiple instances of AD LDS directories can exist on a single
server.
Active Directory Rights Management Services You use Active Directory Rights
Management Services (AD RMS) to deploy rights technologies to your network. Used in connec-
tion with rights management-aware applications and clients such as Microsoft Office 2007 and
Windows Vista, users and administrators can protect intellectual property and data within an
organization.
Network Roles
The network roles, which are covered in detail throughout this text, cover the major network-
ing protocols and services provided by Windows Server 2008. You can install the following three
Active Directory roles in Server 2008:
• DHCP
• DNS
• Network Policy and Access Services
DHCP DHCP is a network standard protocol used to dynamically allocate and track IP
addresses for clients on a network. Within a Windows network, DHCP eases the administrative
burden of assigning IP addresses to clients, along with helping to populate DNS names via
Dynamic DNS. DHCP and its implementation are discussed in depth in Chapter 5.
DNS The main goal of DNS is to match a domain name to an IP address based on a client
query for information. Basically, DNS acts as a phone book for the Internet by translating easy-
to-remember host names such as www.MyExample.com into IP addresses such as
202.76.190.166, a numbering format required by networks to communicate. Besides providing
domain names, DNS provides information necessary for services such as e-mail to route elec-
tronic messages to the proper destination. These records are called mail exchanger (MX) records.
In an Active Directory environment, DNS provides information to clients so they can connect
with necessary network services such as domain controllers and global catalog servers. DNS is
discussed in detail in Chapter 6.
Network Policy and Access Services Network Policy and Access Services (NPAS)
provides networking technologies for deploying virtual private networking, dial-up networking,
and 802.11-protected wireless access in Windows Server 2008. NPAS allows you to implement
the following services on your network:
• Network Policy Server
• Routing and Remote Access Service
• Health Registration Authority
• Host Credential Authorization Protocol
All these technologies are covered in depth in later chapters.
1
1
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
20
Infrastructure Roles
Finally, the infrastructure roles provide the major services for clients. Following are the eight
Active Directory roles that can be installed in Server 2008:
• Terminal Services
• Fax Services
• Print Services
• File Services
• Hyper-V
• UDDI Services
• Web Server (IIS 7)
• Windows Deployment Services
Terminal Services Terminal Services in Windows Server 2008 provides technologies that
enable users to access Windows programs that are installed on a terminal server or to access
the Windows desktop itself from almost any computing device. Originally designed as a thin-
client terminal to present a working desktop to users, Terminal Services now delivers applica-
tions using this same technology, often referred to as remote desktop, remote desktop
connection, or remote desktop protocol. Along with application and desktop presentation,
Windows Server 2008 allows administrators to publish these services to the Internet using
Secure Sockets Layer, or https. This is an excellent security alternative, as administrators have
been wary for years of opening TCP port 3389, the Terminal Services default port assignment,
to the Internet.
Fax Services The Fax Services role in Windows Server 2008 allows administrators to create
a fax gateway on their network. This gateway allows clients to send, receive, and manage faxes.
Print Services The Print Services role in Windows Server 2008 allows you to create
networked printer resources for clients. Also, it provides a central administrative point for
printer management. You install the Print Services role in Activity 1-6. It is covered in depth in
Chapter 8.
File Services The File Services role allows you to share and manage file resources on a net-
work. It includes technologies such as the distributed file system, EFS, and the core functional-
ity of creating network file shares. You install the File Services role in Activity 1-5. It is covered
in depth in Chapter 7.
Hyper-V Discussed previously, Hyper-V is the newest virtualization technology from
Microsoft. It allows you to deploy multiple virtual machine instances, or guests, within a single
Windows Server 2008 server. Hyper-V uses hypervisor architecture. A hypervisor is a lightweight
layer of software that separates hardware and the operating system. It performs simple partition-
ing tasks and maintains strong isolation between partitions. Within these partitions, the hyper-
visor hosts virtual machines. Microsoft’s implementation is inherently secure, as it contains no
third-party device drivers. This minimizes the attack surface of the host machines.
UDDI Services Universal Description, Discovery, and Integration (UDDI) services are an
industry specification for publishing and locating information about Web services. In Windows
Server 2008, UDDI capabilities are provided for enterprise networks or between business part-
ners. With UDDI, developers can publish and interact with Web services directly via their devel-
opment tools and business applications.
Web Server/Internet Information Services 7.0 Internet Information Services 7.0
(IIS 7) is the latest version of a Web services platform from Microsoft. More than an ordinary
Web server, the IIS 7 platform unifies a number of Web-based technologies including Windows
Communication Foundation Web services and Windows SharePoint Services. With IIS 7,
Microsoft has completely changed the way the product works, including new configuration,
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
New Roles and Features in Windows Server 2008 21
delegated administration, security enhancements, and real-time diagnostic and troubleshooting
features.
Windows Deployment Services Windows Deployment Services (WDS) is the updated
and reengineered implementation of Remote Installation Services. It is a suite of deployment
tools managing your computer deployment processes. WDS assists with the deployment of
Microsoft Windows operating systems, particularly Windows Server 2008 and Windows Vista.
You can use WDS to set up new computers through a network-based installation without being
physically present at each computer and without the use of CD or DVD media. WDS is discussed
in more detail in Chapter 2.
Activity 1-4: Exploring the Available Roles in Server Manager
Time Required: 15 minutes
Objective: Identify the roles that can be installed in Server Manager using the Add Roles
Wizard.
Description: As part of your company’s evaluation of Windows Server 2008, your manager asks
you to research the type of roles available on the Windows Server 2008 computer recently added
into your test environment. You need to access the server and note the roles that are available
through the Server Manager console.
1. Log onto your Windows Server 2008 Enterprise computer, if necessary.
2. If Server Manager does not start, click Start and then click Server Manager.
3. In the left pane of the Server Manager console, click Roles and then click Add Roles in the
right pane. The Add Roles Wizard starts.
4. In the Before You Begin window, review the information, and then click Next. Click each
role to read a description of each role.
5. Click More about Server Roles and read the Windows Help information on server roles.
When you are finished reading, close the Help window.
6. If you are continuing to the next activity, leave Server Manager open. Otherwise, click
Cancel and then click Yes to close the Add Roles Wizard.
New Features
Whereas a role is similar to a job role with a company, a feature is similar to a job responsibil-
ity performed by a specific role. Many of the features of Server 2008 are required for certain
roles to function properly. When installing some roles, you may be prompted to include specific
features during your installation. Following are the new features available in Server 2008:
• .NET 3.0 Framework
• Windows Desktop Experience
• Network Load Balancing
• Group Policy Management
• Remote Server Administration Tools
• Windows PowerShell
• Windows Server Backup Features
.NET Framework 3.0 This is the latest revision of the .NET Framework included in
Windows Server 2008 and Windows Vista, though newer updates might be available by the time
you read this. Formerly named WinFX and built on the 2.0 version, the 3.0 version includes new
managed code application programming interfaces that provide the foundation for Windows
Server 2008. The four components added to create the .NET Framework 3.0 include Windows
Communication Foundation, Windows CardSpace, Windows Presentation Foundation, and
Windows Workflow Foundation.
1
1
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
22
Windows Desktop Experience Not installed by default, the Windows Desktop
Experience is available in Windows Server 2008. This includes many of the features of Windows
Vista such as Aero Glass (with capable hardware), live thumbnails, and desktop themes.
Although not important from the administrative standpoint of working on a Windows Server
2008, the Windows Desktop Experience allows you to provide these features in remote desktop
connections users have established with a server. This feature lets you run remote Vista-like desk-
tops and applications on servers for users. The Terminal Services role in Windows Server 2008
takes advantage of this feature.
Network Load Balancing Clusters Improved in Windows Server 2008, Network
Load Balancing (NLB) clusters provide a cluster solution for implementing high TCP/IP avail-
ability for Web services and network-based applications. Traffic is balanced among servers using
NLB so no one server receives all the traffic. A good example of where to use NLB is with mul-
tiple Web servers with static content. Through NLB, users and applications can see the multiple
servers as a single server. Besides increasing availability and improving performance, NLB can
help with performing maintenance on servers that must provide services around the clock. A
server needing maintenance can be removed from the cluster, repaired, and returned to the clus-
ter without loss of service.
Remote Server Administration Tools Remote Server Administration Tools (RSAT)
allows you to remotely manage Windows Server 2008 and Windows Server 2003 from a com-
puter running Windows Server 2008 or Windows Vista with SP1. It allows you to use manage-
ment tools and snap-ins on remote machines. You can use RSAT to manage both the Full version
and Server Core installation of Windows Server 2008. RSAT and other management tools are
further discussed in Chapter 10.
Windows PowerShell Discussed previously, PowerShell is a CLI shell and scripting lan-
guage that administrators can use in Windows Server 2008. Much like a UNIX/Linux shell,
PowerShell provides administrators and developers greater flexibility and power within
Windows Server 2008 and other operating systems that support PowerShell. Currently,
PowerShell is available for Server 2003, Windows XP SP2, and Windows Vista, though all fea-
tures and cmdlets may not be available.
PowerShell uses a verb–noun pairing syntax for its commands, which are called cmdlets
(pronounced commandlets). An example of a common PowerShell cmdlet is get-service. The fol-
lowing code example retrieves all the services that are stopped on a server:
get-service | where-object { $_.status —eq “stopping”}
Figure 1-11 shows the output for the get-service cmdlet.
Windows Server Backup Features The backup tool has been updated in Windows
Server 2008. The Windows Server Backup feature consists of a Microsoft Management Console
(MMC) snap-in and command-line tools that provide a complete solution for your day-to-day
backup and recovery needs. You can create backups from the GUI, the command line, scripts,
or a regular schedule. Four wizards are available in the GUI to guide you through backing up
and recovering data. Windows Server Backup can back up a full server (all volumes), selected
volumes, or the system state. You can recover volumes, folders, files, certain applications, and
the system state. More information on Windows Server Backup is provided in Chapter 11.
Roles and Features Management
Previous versions of Windows Server had a few options for installing roles and features other
than the Manage Your Server Wizard. This provided a step-by-step installation process for
specific server roles but did not allow for easy customization. Most administrators used the
second choice of adding roles and features through the Add Windows Components tool in the
Control Panel. In Windows Server 2008, you can use the Server Manager console and Server
Manager command-line utility to manage roles and features. They are covered in more depth
in Chapter 10.
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
New Roles and Features in Windows Server 2008 23
Server Manager As you’ve seen, Server Manager is the new management console for
Windows Server 2008. Based on the MMC 3.0, it provides a single location for managing a local
machine.
Following are all of the major areas of information within Server Manager:
• Server Summary—Displays system information when you start Server Manager
• Roles—Displays all installed roles and administrative consoles for installed roles and
includes links to add and remove roles
• Features—Displays all installed features and includes links to add and remove features
• Diagnostics—Allows you to view and manage server status with built-in tools including
Event Viewer, Reliability and Performance, and Device Manager
• Configuration—Allows you to manage system configurations with built-in tools including
Windows Firewall with Advanced security, Services, and Local Users and Groups
• Storage—Allows you to manage storage on a server via Disk Management and manage
backup and recovery via Windows Server Backup
You can manage system properties and computer information in the Server Summary
window. Roles and features can be added, modified, or removed within their respective areas.
Diagnostics, Configuration, and Storage provide many of the tools previously found in the
Computer Management snap-in in Server 2000/2003 such as Event Viewer, Disk Management,
and Local Users and Computers. Server Manager is covered more in depth in future chapters.
Each of these areas is covered in depth in Chapter 10.
1
1
Figure 1-11 Output for the get-service cmdlet
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
24
Activity 1-5: Adding the File Services Role and Windows Server
Backup Feature
Time Required: 15 minutes
Objective: Install the File Services role and the Windows Server Backup feature using Server
Manager.
Description: Your company has elected to use Windows Server 2008. You want to start by set-
ting up a file server and installing Windows Server Backup on the new Windows Server 2008
server.
1. Log onto your Windows Server 2008 Enterprise computer, if necessary. If Server Manager
does not start, click Start and then click Server Manager.
2. In the left pane of the Server Manager console, click Roles and then click Add Roles in the
right pane. The Add Roles Wizard starts.
3. In the Before You Begin window, review the information and then click Next.
4. Click the File Services role and then click Next twice. Choose to install the default file server
and do not add any role services at this time. Click Next, and then click Install.
5. Click Close when the File Services role is installed.
6. In the left pane of the Server Manager console, click Features and then click Add Features
in the right pane. The Add Features Wizard starts.
7. Click the Windows Server Backup feature listed under Windows Server Backup Features and
then click Next to review the features being installed on the next screen.
8. Click Install to install this feature. Click Close when the Windows Server Backup feature is
installed.
9. In Server Manager, verify that the File Services role and Windows Server Backup feature are
installed.
10. If you are continuing to the next activity, leave Server Manager open. Otherwise, close it.
Server Manager Command
While having a UI is great for new administrators and performing certain tasks, using the CLI
in Windows Server 2008 can be quicker, easier, and necessary to complete certain tasks. Server
Manager Command is a new CLI-based management tool that allows you to effectively install,
configure, and remove roles and features in Server 2008. For example, to install the Print
Services role, you enter the following command in the Command Prompt window:
servermanagercmd.exe –install print-server
Server Manager Command is useful if you want to create an unattended installation script
for your servers. This is especially true in the Server Core environment, as this is the only way
to install roles and features.
Activity 1-6: Adding the Print Services Role and PowerShell
Feature using Server Manager Command
Time Required: 15 minutes
Objective: Install the Print Services role and the PowerShell feature using Server Manager
Command.
Description: You have already installed the File Server role and the Windows Server Backup fea-
ture using the Server Manager console. Now you want to install a role and feature from the
command prompt. This prepares you to install other roles and features without attending the
installation.
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Windows Server 2008 User Interface 25
1. Log onto your Windows Server 2008 Enterprise computer, if necessary.
2. Click Start and then type cmd in the Start Search text box.
3. In the list of search results, click Cmd.exe to open a Command Prompt window.
4. Type the following command and then press Enter to install the print Services:
Servermanagercmd.exe -install print-server
5. Type the following command and then press Enter to install PowerShell:
Servermanagercmd.exe -install PowerShell
6. Type the following command and then press Enter to verify the roles and features installed:
Servermanagercmd.exe -query
All installed features and roles are highlighted in green in the command prompt.
7. Type Exit and then press Enter to close the Command Prompt window.
Windows Server 2008 User Interface
If you have used Windows Vista, you will note some similarities between it and the Windows
Server 2008 UI. When Microsoft began developing Windows Vista and Windows Server 2008,
both were built on the same code base. It is estimated that the two OSs share 70 to 90 percent
of their code. The following benefits are realized by sharing the code base:
• Because the OSs share the same management consoles, you can quickly learn to
navigate the Windows Server 2008 UI if you have already worked with Windows Vista
and vice versa.
• Through the Windows Desktop Experience and Terminal Services, Windows Server 2008
can deliver remote desktop experiences that come close to matching a user’s desktop
experience.
• Many applications and hardware drivers that work on Windows Vista also work on
Windows Server 2008.
• Organizations that upgrade to Windows Vista and Windows Server 2008 have less
administration costs in the long run because of the similarities between the operating
systems.
• Shared code allows Microsoft to more quickly develop patches and updates. You are likely
to see a benefit in quicker patch testing as well.
• With the release of SP1 for Windows Vista, Windows Server 2008 and Windows Vista have
the same kernel code. Thus, performance between the two operating systems is similar.
Following are some new or improved features in Windows Server 2008:
• Start menu
• Network and Sharing Center
• Help and Support
• Windows Desktop Experience
Start Menu
Windows Server 2008 incorporates the redesigned Start menu into its UI. This Start menu was first
introduced in Windows Vista. The most efficient way to use the Windows Server 2008 Start menu
is to use the Start Search text box. When you open the Start menu, the insertion point appears in
1
1
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
26
the Start Search text box. See Figure 1-12. You can begin typing the name of the application, con-
sole, or document you are looking for, and Windows Server 2008 begins displaying files whose
names start with the characters you typed. In addition, instead of using cascading menus that take
up a lot of desktop space, the Start menu is now more compact. The search results, for example,
are displayed in a single vertical column. After searching for a program or navigating the Start
menu, you can click the Back button to return to the previous view, such as the initial Start menu.
Activity 1-7: Using the Start Menu and Start Search Text Box
Time Required: 15 minutes
Objective: Use the Start Search text box to find and open a program.
Description: Your company has just upgraded to Windows Server 2008, and you want to start
Notepad to create a text file. In this activity, you start Notepad using the Start Search text box
on the Start menu.
1. Log onto your Windows Server 2008 Enterprise computer, if necessary.
2. Click Start or press the Windows key (lower-left corner of keyboard) or Ctrl+Esc to open
the Start menu.
Figure 1-12 Windows Server 2008 Start menu
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Windows Server 2008 User Interface 27
3. With the insertion point in the Start Search text box, type note. See Figure 1-13. The search
results change with each letter you type.
4. When Notepad appears in the search results list, make sure it is selected and then press Enter
to start the program. You can also click Notepad in the search results list. The Notepad
window opens.
5. Close Notepad.
Network and Sharing Center
Another redesigned feature first introduced in Windows Vista is the Network and Sharing Center
shown in Figure 1-14. This console provides a central location for administering many network
tasks in Windows Server 2008 including network connections, sharing settings, and network dis-
covery options. Like many of the new consoles, you will notice links to features that appear in
multiple consoles. Instead of being in one location only, tools are available within the relevant
area in which you are working. For example, you can access the Windows Firewall from the
Network and Sharing window and the Security window. This makes sense since Windows
Firewall affects both areas. As you explore Windows networking with Windows Server 2008,
you will continue to use the Network and Sharing Center.
1
1
Figure 1-13 Using the Start Search text box on the Start menu
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
28
Windows Desktop Experience
The Desktop Experience is a new feature in Windows Server 2008. The Desktop Experience pro-
vides a number of applications that were introduced in Windows Vista such as Windows Media
Player, Sync Center, and Disk Cleanup. This means that Windows Server 2008 feels more like
your primary operating system, and provides less of a server-based desktop experience.
Following are the applications Windows Desktop Experience makes available:
• Windows Mail
• Windows Media Player
• Windows Aero and other desktop themes
• Video for Windows (AVI support)
• Windows Photo Gallery
• Windows SideShow
• Windows Defender
• Disk Cleanup
• Sync Center
• Sound Recorder
• Character Map
For more information on the Windows Desktop Experience features, browse the Windows
Vista product site at www.microsoft.com.
Figure 1-14 Network and Sharing Center
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Key Terms 29
Chapter Summary
■ Over the years, network models have evolved, providing administrators with better ways
to manage their networks. Most modern networks are based on client-server computing
where one computer requests resources and another computer responds to those requests.
Windows networks use two models: workgroup and domain. Current Windows Server
2008 networks have evolved from the Windows NT domain model, which is based on
PDC/BDC domain security databases, to an AD domain model that uses multimaster repli-
cation of the domain security database between DCs.
■ Windows Server 2008 offers three general editions and two special-purpose editions:
Windows Server 2008 Standard, Windows Server 2008 Enterprise, Windows Server 2008
Datacenter, Windows Web Server 2008, and Windows HPC Server 2008. Along with these
new editions, you can install Windows Server 2008 as a Full installation or a limited func-
tionality installation called Server Core.
■ Windows Server 2008 is available for both 32-bit and 64-bit hardware architectures. Like
any OS, Windows Server 2008 has a minimum level of hardware requirements for its
installation. Commonly, these requirements might not meet the functional needs of all
environments, so you need to review the recommended and maximum hardware values
when deploying Windows Server 2008.
■ New technologies in Windows Server 2008 focus on improving the performance, manage-
ability, and security of networks. The improved installation process allows you to quickly
deploy Windows Server 2008 servers with limited administrator input. Management tools
such as Server Manager and WinRM help you easily manage network servers. Server Core
provides a limited functionality server that improves network security by reducing the
attack surface. Improvements to the TCP/IP implementation and the addition of NAP pro-
vide a number of performance, management, and security benefits to your networks.
■ Windows Server 2008 lets you organize server services into roles and features. Roles pro-
vide servers with a specific job that it provides to the network. Common roles include File
services, Print services, and DNS services. The Full installation of Windows Server 2008
has 17 roles, and the Server Core installation has eight roles. Servers also provide features,
or job duties, to networks. Common features include Windows Server Backup, PowerShell,
and the .NET 3.0 Framework.
■ Server Manager provides administrators with a GUI console for managing roles and fea-
tures, along with other aspects of the servers. Server Manager Command, or serverman-
agercmd.exe, is a CLI utility that allows for command line or scripted management of
roles and features. This is helpful for automated installation of roles and features or for
remote management of features and roles.
■ Windows Server 2008 has a look and feel similar to Windows Vista. They are similar
because both OSs are built on the same secure code base. Sharing code helps you in many
ways including patch deployment and application compatibility. Along with sharing code,
many of the features are included in both OSs. The Start menu includes an integrated
search tool for quickly finding information and applications. You can also apply the
Windows Desktop Experience to Windows Server 2008 to make the OS seem more like
Windows Vista, including features such as Windows Media Player and various desktop
themes.
Key Terms
Active Directory (AD) Represents the suite of roles in Windows Server 2008 domain
networks for providing directory-based management, security, and authentication. Prior to
Windows Server 2008, AD represented Microsoft’s version of a directory services database
that provided centralized security and object management.
1
1
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
30
Active Directory Domain Services (AD DS) Stores information about objects such as users
and groups on the network. This information is available so users can effectively access
resources on the network and collaborate with other users. For network administrators, AD DS
provides a framework for securing information and resources, along with facilitating the
sharing of these resources to users.
application programming interface (API) A set of rules and conditions created by the code
writers of an operating system. Outside programmers use APIs so their applications can
connect to a specific portion of the operating system. Companies such as Microsoft publish
APIs for their operating systems to allow third parties to write complementary applications for
their software.
attack surface In computer networking, the available ports or services a network client or
server makes available to other network clients. In network security, the goal is to reduce the
attack surface to the minimum allowable level.
backup domain controller (BDC) A domain controller in a Windows NT/pre-AD
environment that is responsible for storing a read-only copy of the domain security database.
client An entity that requests information or resources from another entity on a network. A
client can be a computer, application, process, or hardware device.
client access licenses (CAL) Software licenses that allow clients to access resources on a
Microsoft network.
client-server computing A network model that describes the relationship between two
computer programs in which one program, the client, makes a service request from another
program, the server, which fulfills the request.
command-line interface (CLI) An administrative interface that requires the use of typed
commands or scripted commands. After ending a command, a response is received from the
system. The command prompt and Windows PowerShell are examples of CLIs in Windows
Server 2008.
domain In the client-server computing model, a group of users and computers that are
managed by the same security database.
domain controller (DC) A server responsible for holding a domain security database in an
AD domain environment.
Domain Name System (DNS) A system that matches a domain name to an Internet Protocol
(IP) address based on a client query for information. Besides providing domain names, DNS
provides information necessary for services such as e-mail to route mail to the proper
destination. In an AD environment, DNS provides information to clients so they can connect
with necessary network services.
feature A function that enhances or supports a role or provides a stand-alone service.
forest One or more domains with noncontiguous namespaces that are related to each other
by trust relationships.
global catalog A domain controller that holds a master searchable database of information
about every object in every domain in a forest. The global catalog contains a complete replica
of all objects in AD for its host domain and contains a partial replica of all objects in AD for
every other domain in the forest.
Group Policy A method for implementing specific configurations for users and computers
within an AD domain. Group Policy settings are contained in Group Policy objects, which are
linked to the following AD service containers: sites, domains, and organizational units.
high-performance computing (HPC) The use of supercomputers and computer clusters, or
computing systems made of multiple processors linked together in a single system, to perform
computing tasks requiring large amounts of resources.
host-based stateful firewall A local application that blocks incoming and outgoing
connections based on its configuration.
mail exchanger (MX) record A record containing DNS and IP information specifically
designed to allow Internet mail servers to relay electronic messages.
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Key Terms 31
managed code Computer program code that executes under the management of a virtual
machine, unlike unmanaged code, which is executed directly by the computer’s central
processing unit.
membership status A setting indicating whether a network computer belongs to a
workgroup or a domain.
multimaster replication A form of replication used by domain controllers (DCs) that allows
them to maintain the same read and write security databases. With multimaster replication, no
DC is more authoritative than any other, and all DCs can respond to client requests.
.NET object A data package containing information useable by applications and services that
are compatible with .NET.
Network Access Protection (NAP) A service that protects networks, both public and private,
from malware such as viruses and spyware.
Network Access Control (NAC) A computer networking concept and set of protocols used to
explain how to secure network clients before the clients access the network.
Next-Generation TCP/IP stack A new implementation of the Transmission Control Protocol
(TCP)/IP protocol by Microsoft that contains full support for Internet Protocol version 4
(IPv4) and Internet Protocol version 6 (IPv6).
primary domain controller (PDC) A central domain controller in a Windows NT/pre-AD
environment that has a readable and writable copy of the domain security database. There can
be only one PDC.
Receive Window Auto-tuning A feature of TCP that allows the network interface receive
window to be optimized based on the type of traffic that it is receiving.
role A major function or service that a server performs.
Secure Sockets Layer (SSL) An established industry standard that encrypts the channel
between a Web browser and Web server to ensure the privacy and reliability of data
transmitted over this channel. SSL does not, however, provide ways to validate the identities or
banking accounts of the parties exchanging this data.
server An entity that responds to requests for information and resources on a network. A
server can be a computer, application, process, or hardware device.
Server Core Available in Windows Server 2008, Server Core is a minimal server installation
option designed to run a limited set of server roles and features and to provide a reduced
attack surface.
Teredo An IPv6 transition technology that provides address assignment and host-to-host
automatic tunneling for unicast IPv6 traffic when IPv6/IPv4 hosts are located behind one or
more IPv4 network address translators.
Terminal Services A group of technologies that enable users to access Windows-based
programs that are installed on a terminal server or to access the Windows desktop itself from
almost any computing device.
thin client A client computer or client software in a client-server network that depends
primarily on a network server for processing activities and focuses mainly on conveying input
and output between the user and the remote server.
tree One or more domains related to each other by trust relationships and a shared
namespace.
transitive trust A trust between domains in a tree, which is automatically created during the
domain creation process.
virtualization A broad term that refers to presenting computing resources to users by hiding
the physical characteristics of computing resources. This is done by providing an intermediary
program responsible for managing communication between users and resources.
Web server A network resource that hosts applications and information available through a
Web browser or Web-based application.
Windows Remote Management (WinRM) A new feature in Windows Server 2008 that
provides administrators with remote system management capabilities. WinRM allows
1
1
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Chapter 1 Introduction to Windows Server 2008
32
administrators to remotely run management scripts and manage data on remote machines. All
connections are handled via the WS-Management protocol.
workgroup A network model where each member has its own locally stored Security
Account Manager database, which controls user and group membership and access to its local
resources.
WS-Management protocol A public standard for exchanging management data remotely by
any device implementing the protocol, making it non–vendor specific.
Review Questions
1. The Server Core version of Windows Server 2008 Enterprise edition can be upgraded to the
Full installation without a complete reinstallation of the OS. True or False?
2. ______________ is Microsoft’s newest server virtualization platform. It requires a(n) _____
version of Server 2008.
3. There is only one domain controller in an Active Directory domain that is writeable. The
rest are read-only. True or False?
4. Which of the following Windows network models is a good choice for an environment
with no IT staff, limited need for network-available resources, and a total of five
computers?
a. Domain
b. Workgroup
c. Ad hoc
d. Mesh
5. You are an administrator for a small company running a Windows Web Server 2008 as a
Full installation on your network. Your boss has asked you to add the following items to the
Web server:
• Simple company Web page
• Financial application based on ASP.NET
• Fax server
However, you cannot complete all of your boss’s requests. Why?
a. Server Manager is not installed on Windows Web Server.
b. Windows Web Server 2008 does not support ASP.NET.
c. A fax server is not supported on Windows Web Server 2008.
d. Windows Web Server 2008 requires PowerShell for Web pages to run.
6. All of the following Active Directory service containers can be linked to a Group Policy
object except:
a. Domains
b. Organizational units
c. Groups
d. Sites
7. Hyper-V can be installed on which two of following editions of Windows Server 2008?
a. Windows Server 2008 Standard, 64-bit
b. Windows Web Server 2008, 64-bit
c. Windows Server 2008 Enterprise, 32-bit
d. Windows Server 2008 Datacenter, 64-bit
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Review Questions 33
8. How do 64-bit versions of Windows Server 2008 differ from 32-bit versions?
a. 64-bit versions do not support 16-bit drivers.
b. 32-bit versions support twice the memory as 64-bit versions.
c. 64-bit versions do not support 32-bit bit device drivers.
d. All of the above
e. None of the above
9. Which three of the following technologies are new to Windows Server 2008?
a. Windows SkyDrive
b. Hyper-V
c. Server Hard Core
d. PowerShell
e. Windows FolderShare
f. Network Access Protection
10. You must have a valid Windows Server 2008 product key to install Windows Server 2008
Datacenter. True or False?
11. Which one of the following technologies improves the installation process in Windows
Server 2008?
a. Windows Image Format (WIM)
b. Active-X
c. Windows ME
d. Windows PE
12. _________________ allows clients using computers with IPv6 to communicate over IPv4 net-
works. This is done by encapsulating the IPv__ packet inside of an IPv__ packet.
13. _________________ is the new scripting and command-line interface for Windows Server
2008.
14. Group Policy preferences are enforced by computers and users, whereas Group Policy
objects are not strictly enforced. True or False?
15. You are an administrator for a medium-sized business called Terrapin Technologies.
Currently, you are running a Windows Server 2003 environment with Windows Server 2003
Active Directory. Your boss has asked you to look into using the Windows Server 2008
Standard edition with the Server Core installation as a solution for minimal attack surface
computers at your remote locations. The following roles are required at the remote locations:
• DNS for name resolution
• Print Services for network printers
• Web Server for a Web application based on ASP.NET
• Active Directory Domain Services
Based on what you know of Server Core, can you deploy all these roles to your remote loca-
tions? Why or why not?
a. Yes, all of the roles can be installed on Server Core as long as you are running the 64-
bit version of Windows Server 2008.
b. No, Active Directory Domain Services and domain controllers are not supported on
Server Core.
c. No. Because of the command-line nature of Server Core, you cannot install print driv-
ers for network printers.
d. No, Server Core does not support ASP.NET.
1
1
Copyright 2010 Cengage Learning. All Rights Reserved.
May not be copied, scanned, or duplicated, in whole or in part.
Another Random Scribd Document
with Unrelated Content
There is another reason too why the bird may prefer the drone.
The honey bee usually flies low, where the flowers are, while the
drone isn't after flowers and flies higher in the air. The kingbird sits
higher than the honey bee flies, and the drones are the ones that
come near him.
Another insect that the kingbird is fond of is the robber fly, which
destroys hundreds of honey bees. That should make every bee-
keeper his friend.
These things have been found out in the way I told you, by
shooting the birds to see what they had been eating.
Mr. Bryant, who knows birds well, tells of a bee-keeper in
California who saw a great many kingbirds among his bees. Of
course he thought they were eating them, and he killed one hundred
of them. On looking into their stomachs to see if they had eaten
honey bees, he found them filled with drones. They had been
working for him all the time, for every bee-keeper likes to have
drones killed.
It has been said that the kingbird is annoying to other birds, and
he is called a tyrant. I wanted to know if this was true. I did not go
to books to find out, for many people—as I have told you—do not
study for themselves, but repeat what some one else has said. The
way I took to find out was to notice the ways of every kingbird I
could see. For many years I have watched them hours at a time, for
weeks together. I spend every summer among the birds, and almost
everywhere I go I find kingbirds.
In this way I have found out that the kingbird is one of the most
peaceable of birds. He drives strangers away from the tree where his
nest is, and so does every other bird. The crow he seems to consider
his enemy, and often flies after him, but excepting that, I have never
seen a kingbird disturb any bird who was minding his own business.
He is not half so much of a tyrant as the robin or the hummingbird.
The kingbird is quiet and devoted to his family. He seems never to
tire of catching insects. While young ones are in the nest, he may
usually be seen from morning till night, sitting very straight upon a
low perch, looking for flies of many kinds.
Let me tell you a little story of a kingbird which I can assure you
is true, for a gentleman whose word may be relied upon saw it near
enough to be perfectly sure of the facts.
A big bird, he did not notice what kind, was flying off with a
nestling robin in his claws. All at once a kingbird flew at him so
fiercely that he had to drop the young one to defend himself. The
youngster could not fly, and of course began to fall. When the
kingbird saw that, he left the thief and flew under the little bird. He
held it up on his back, and flew carefully to the ground, where it
slipped off safely.
When a kingbird has been tamed and kept in a house, he has
been found to be a very knowing fellow. One that I heard of saw
that the people were friendly, and he lost all fear of them. His
greatest pleasure seemed to be to keep warm. He would cuddle up
to a lighted lamp, and dearly liked to crawl under the bedclothes.
This pet was quiet and dignified, never a chatterbox. The only
sounds he made were a few low notes like thanks, when he was fed.
The nest of the kingbird is usually placed in a low tree like the
apple-tree. It is made of anything that comes handy. I have seen
one of white wool where sheep were kept, and one of gray moss on
the seashore where it is found in plenty.
The Western kingbird differs in color from the Eastern. He is more
gray, with under parts bright yellow. He is said to be more social and
more noisy than the sober Eastern bird. But in other respects they
are much alike.
This bird has been called quarrelsome, but persons who look
closely at birds have said that what careless observers have called
quarrels are really play. For the Western kingbird, the Arkansas
Kingbird of the books, is a rather jolly fellow, says Major Bendire.
All flycatchers are useful and should be carefully protected, says
the same well-informed writer.
The Wood Pewee is another common flycatcher. He is not generally
seen about houses like the phœbe, who calls from the peak of the
barn. He may be found in the orchard or the edge of the woods.
There he will stand on a fence or low branch and sing or call by the
hour, every few minutes flying out to catch a passing insect.
This bird is in dark colors, with whitish breast and two white
wing-bars. His common call is a plaintive, long-drawn-out "pee-u-ee"
and sometimes "pee-ay," but he can sing a droll little song. One lady
who watched a wood pewee build her nest heard her sing to herself
as she worked what sounded like "O-wee-wee-wee."
The nest made by this little mother is very pretty. It is most often
on a dead limb where a branch starts out, making a broad
foundation. For this reason the bird is called in the South, the dead-
limb bird. The nests are not all alike. I have seen many closely
covered with lichen, and some made of gray moss so thin that the
eggs could be seen through it. Whatever it is made of, it is low and
flat like a saucer, and so much like the branch it is on that it is not
easy to see.
Like other bird mothers, the wood pewee is devoted to her
nestlings. She will shield them from the rain by sitting close on the
nest and making an umbrella of herself. And when the sun comes
down very hot on them, she has been seen to perch on the edge of
the nest and spread her wings to act as a shade for them. It is
pretty to see this bird with her little family when they have left the
nest and are being taught to take care of themselves. She makes
many sweet little noises which sound like talk, or a sort of
whispering.
The Western Wood Pewee looks like his Eastern brother, but he is a
very different bird. His dress is about the same, and he catches his
flies in pewee fashion, but his voice is not in the least like that we
hear on the Atlantic side of the country.
The Eastern wood pewee has a low, sweet voice, of which one
cannot get tired. But the bird of the West has loud, harsh notes, so
dismal in tone that they are painful to listen to. His song is almost
the only really unpleasant bird song I know.
The nest of this bird is a rather deep cup saddled on to a large
limb. When it is in a cottonwood grove, it is covered with the sticky
white cotton from the trees. It is very pretty when fresh, but it soon
gets soiled, and then it is not nice to look at or to handle.
FOOTNOTE:
[19] See Appendix, 18.
XXVI
THE HUMMING FAMILY
(Trochilidæ)[20]
This is an American family, and no country in the world can show
a more beautiful one. There are more than four hundred species,
and some of them hardly bigger than a bee. All of these birds have
brilliant colors that are called metallic. That is, they glitter like metal,
and they show different colors when they are turned different ways.
All hummingbirds fly very swiftly. You know how they go,—not
straight like most birds, but darting one way and another so quickly
they can hardly be seen. As they fly, their wings move so fast they
look almost like little clouds, and we hear the low noise we call
humming.
Hummingbirds eat nothing but tiny insects, and the honey of
flowers, which they suck up through their long bill. They take their
food without alighting, for they can hold themselves still before a
flower, with the wonderful wings, as long as they choose.
The bill of a hummingbird is much longer than his head. It is
something like a pair of tubes through which he can draw up the
sweet juices he likes. The tongue is long too, and it can be pushed
out far beyond the end of the bill. It looks like a stiff white thread.
We have in the Eastern States but one species, the ruby-throat,
but there are several in California.
No bird is more charming than our common Ruby-throated
Hummingbird. He is most often seen flitting about among the flowers.
But now and then one may catch him sitting demurely on a dead
twig, dressing his tiny feathers.
This bird is all in green, with a brilliant ruby-colored throat, which
looks like a gem as he darts about. His mate is in green also, but her
throat is white.
You would not think this pretty midget could be a fighter, but he
is. When a hummingbird finds a vine full of sweet blossoms, or a
bed of bright nasturtiums, or any good place to feed in, he claims
the whole of it for himself. He tries to drive away every other
hummingbird who comes near it. Sometimes two of them will carry
on a quarrel over a honeysuckle vine for days.
The hummingbird is the most pugnacious bird in America. If he
were as big as a crow, he would be a terror to man and beast, for he
is afraid of nothing. This spirited mite of a bird will even attack an
eagle, who is big enough to eat him at a mouthful. He beats him
too, for he comes down on top of his head, where the big, clumsy
fellow cannot get at him. There he pecks and pulls out feathers till
the eagle is glad to get out of his clutches.
A hummingbird's nest is one of the prettiest things in the world. It
is not much bigger than a walnut, and is made of soft plant down,
usually of a yellowish gray color.
Perhaps you don't see how plant down can be made to keep in
shape, without twigs or grasses to hold it. If you could see the bird
make it, you would understand at once. She brings her stuff in small
mouthfuls, and works it into a solid mass by strong efforts with beak
and feet. She pokes and prods each tiny bunch as she brings it, till
she makes it all hold together. It is a sort of felt.
Then the little worker covers the outside with bits of lichen picked
off the trees, and held on, it is said, by cobwebs. This makes the
nest look exactly like the branch it is on. So it is very hard to see.
It takes a hummingbird several days of hard work to make a nest,
because she can bring only a little at a time. She does it alone too;
her mate has not been seen to help her at all.
I think the male ruby-throat does not help in the nest-building
because the little mother will not let him. She knows just how the
cradle is to be made, and she doesn't want him to bother her. She
likes to have her nest to herself just as she likes to have her
honeysuckle to herself. I don't say positively that is the reason, you
know; I only guess it is.
After the nest is made, and two eggs about as big as small beans
are laid, the hummingbird begins to sit. When the nestlings come
out of the egg, they are about the size of honey bees, with bills no
larger than the head of a common pin. Twenty-one days they stay in
the nest and are fed by their hard-working little mother.
When the twins get their feathers, and their bills are growing
longer and longer, they sit up across the top of the nest, side by
side. Then they are very pretty, and not at all afraid of people. They
will let one gently stroke their backs. They will even answer in a soft
murmur one who talks to them.
Hummingbirds are never so afraid of people as other birds. They
are easily tamed. But they should never be caged, for they will not
live long in a house. They need food that we cannot give them.
A man had a hummingbird whom he kept alive a long time by
letting him go free when he seemed to need change of food. He
would fly off, but always came back. After the bird got to be very
tame, the man brought two young hummingbirds and put them in
the cage with him. He did not notice them much till they began to
droop. Then the man opened the door to let them out.
At once the elder bird took the little ones in charge, and coaxed
them to fly out with him. He led them to a place where he had found
the tiny spiders these birds like, and showed them how to get what
they wanted. They all ate their fill and then came back to the house,
where they were well contented to be.
The way the mother hummingbird feeds her babies is curious.
When she comes with food, she alights on the edge of the nest, and
pulls a little one up so that she can get at it. Then she runs her long,
slim bill down its throat, and pokes the food in with little jerks. It
looks as if it would kill the youngster, but he seems to like it.
Anyway, he grows very fast, and—as I said—in three weeks he is
beautifully feathered, with a bill as long as his mother's, and ready
to fly.
A lady who had two young hummingbirds told me that they slept
so soundly they were like dead birds. One could take them up and
carry them about, and they would not wake. In cold weather she
often wrapped one up in a piece of flannel and laid him in a soft,
warm place, and he never stirred till morning.
The way she got this pair of birds was interesting. She was
walking in the woods and broke a dead branch from a tree, to use
for something. On turning it over she saw a nest, and strange to say
two little birds in it. She had been holding it upside down, but they
had held on so tightly that they did not fall out.
The lady did not know what to do. She did not want baby
hummingbirds, but she couldn't put the branch back, and she was
afraid their mother would not find them if she left them. So she took
them home. She had no trouble to feed them, and they lived with
her six weeks, and died by accident at last.
It is thought that the male ruby-throat does not come to the nest
at all, but he must have some way of knowing how things are going
on. At Mrs. Wright's summer home a mother hummingbird was killed
in a hailstorm, while young were in the nest. At once the father, or
at least a male bird, came and fed and took care of the nestlings till
they flew.
In California one of the most common of this family is Anna's
Hummingbird. He is green, with a throat and crown of changeable
colors, lilac and red.
The nest of this bird is usually, like the ruby-throat's, of plant
down covered with lichens. But some have been found made of the
blossoms of the eucalyptus, or gum-tree. This bird is as easily tamed
as the ruby-throat, and seems to act a good deal like him.
Mrs. Grinnell found a nest in her yard in California. The mother
allowed herself to be photographed in many positions. The young
ones were never afraid, and did not mind the camera in the least.
Hummingbirds never seem to have any fear of people.
FOOTNOTE:
[20] See Appendix, 19.
XXVII
THE SWIFT FAMILY
(Micropodidæ)[21]
Swifts are curious birds, with strange habits. The one we know by
sight in the East is the chimney swift. Most like him in the West is
Vaux's swift. His ways are like the common chimney swift's, and his
looks nearly the same.
The Chimney Swift is often called the chimney swallow, but it is
very easy to tell one from a swallow. One way is, that when a swift
is flying about over our heads, he looks as if he had no tail. The tail
is very short, not half so long as the wing. He looks more like a bat
than a bird.
Then the swift flies in a different way. A swallow soars a good
deal, that is, moves without beating the wings, a sort of gliding
through the air. But a swift beats the wings much more frequently. A
swallow will often alight on a telegraph-wire or a roof. A swift is said
never to alight except to sleep.
This bird is so much at home on wing that he even gets the twigs
to make the nest while flying. These twigs are the smallest ones on
the ends of dead branches, and are easily snapped off. The bird flies
at them, snatches one in beak or feet, breaks it off, and goes right
on, without stopping.
When he gets his twig, he carries it to a dark, sooty chimney. A
queer place for a home, surely. They used to choose a hollow tree or
a cave to live in, and that seems much nicer. But chimneys are now
more plentiful than hollow trees. And besides, they are nearer the
bird's food. So chimney homes are now the fashion in the swift
family.
To make a swift nest, the twigs are glued to the chimney in the
shape of a little bracket. The glue is the saliva of the bird, which is
gummy, and gets hard as it dries, and looks like isinglass.
The mouth of a chimney swift is very odd. You have heard of
"stretching a mouth from ear to ear." That's just what the swift does
every time he opens his. It needs to be big, for he gathers up his
food in it. While he is flying around in the air, he is busy catching
tiny flying creatures, such as flies and beetles, and thus keeping the
air clear for us.
The tail of this bird is another queer thing. It has no soft feathery
tips like most birds' tails. It ends in sharp spines, like needles. These
are most useful to brace him against the rough chimney where he
sleeps. These spines are really the stiff shafts or stems of the
feathers, sticking out beyond the plumey part.
The chimney swift hangs himself up to sleep. He fastens his sharp
claws into the rough bricks, and props himself firmly with his spiny
tail. Even when the young swift is but two weeks old, he crawls out
of the nest and hangs himself up under it. He seems to like that for
a change from forever lying in a narrow bracket.
Chimney swifts are social birds. They can't bear to be alone. They
are almost always seen flying about in small parties, and calling to
each other as they go, a strange, chattering cry. They are of a sooty
color suitable to their sooty home, and the pair are alike. Vaux's
swift is a little smaller and paler than the common chimney swift.
The young swift is longer in his nursery than any bird of his size
in the United States. He is four weeks old before he ventures out of
his grimy home, though before that he will come up to the door to
be fed.
A late writer in a newspaper tells a little story showing the
affection of a chimney swift for her little one. The writer had
watched all summer a party of swifts who lived in one of his
chimneys. A month or more after he supposed that all had flown
away to the South beyond our southern boundary, where they spend
the winter, he heard the twittering of one in the chimney. He took
out the fireboard and found there a young bird. He was full grown
and able to fly, but he was fastened by a horsehair to the nest. This
had been pulled off by his weight, and lay on the hearth, holding
him prisoner.
The little fellow seemed to know he was to be helped, for he lay
still while the man looked to see what was the matter. His mother
soon came into the chimney with food. She took her place beside
the man and waited, while he cut the strong hair and set the
nestling free.
Then the old bird went to work to teach him to fly. It was an hour
or more before he learned to use his wings. As soon as he did, the
two started off on their lonely journey to the far South, to join their
friends who had been gone so long. How I wish we could know that
they reached them.
Insects were about gone when this happened, and this swift
mother would have died if she had stayed, but she would not leave
her little one to starve.
It is a beautiful thing to see a large flock of swifts go to bed. If
they all rushed in pell-mell, they might hurt one another. They begin
by flying around high above the chimney in great circles. As they go
around they sink lower, and the circles get smaller till it looks like an
immense whirling funnel. When the birds forming the lower part of
the funnel reach the top of the chimney, they plunge in. So in a
short time the whole flock is in and no one hurt.
FOOTNOTE:
[21] See Appendix, 20.
XXVIII
THE GOATSUCKER FAMILY
(Caprimulgidæ)[22]
These are queer-looking birds, having their front toes tied together
by a kind of webbing, and almost no hind toe at all. The mouth, too,
is almost as odd as the toes. It has a short beak, but is very wide,
and it opens from ear to ear like the swift's. The plumage is so soft
that the birds can fly without making the least sound.
The two most common goatsuckers are the whip-poor-will and
the nighthawk. They are both as large as a robin, and stouter. They
are dressed in dull brown, and black and white, mottled all over. If
you just glanced at the two, you might think them alike. But they are
not marked alike, and all their ways are so different that there is no
trouble in telling them apart.
The Whip-poor-will has broad white tailmarks, with stripes on the
back, and a narrow white band across the breast. He comes out only
in the evening, and he flies low, without making a sound. He rests
lengthwise of a log or fence, not across it as most birds do. His feet
are too short to clasp a perch.
On his log or fence the whip-poor-will sits and sings while he
waits for his supper. You all know his song, his lively "whip-poor-will"
over and over many times. It is a delightful evening sound, which I
love to hear. It is said that his notes have been counted, and he has
been found to repeat them several hundred times without stopping.
When moths or other creatures which fly in the night come along,
he catches them in his big mouth. But he is not obliged always to
wait. Sometimes he flies near the ground like a shadow, looking for
prey, and he often hops awkwardly along the road, for the same
purpose. He picks up straggling insects, and in the West locusts.
The whip-poor-will mother makes no nest. She finds a little hollow
in the ground, among leaves or near bushes in the woods, and that's
good enough for her nestlings. She lays two eggs, speckled and
mottled so that they look like the ground and leaves around them.
She looks almost the same herself. You might walk close to her and
not see her.
When young whip-poor-wills come out of the egg, they are
dressed in speckled gray down. They cuddle down quietly by their
mother, and the whole family is hard to see. When their eyes are
shut, they look almost exactly like the earth and leaves among which
they lie.
If a whip-poor-will nest is disturbed, the mother will pretend to be
badly hurt. She will tumble about on the ground and cry like the
whine of a young puppy, trying to coax away the one she fears. If
she is too much alarmed, she will clasp her young one between her
feet and fly away with it.
Instead of the common whip-poor-will of the Northern and Middle
States, the South has the Chuck-will's-widow, who is somewhat
larger. The West has the Poor-will, or the Nuttall's Whip-poor-will,
who is rather smaller and paler than either. The habits of all are
about the same. They are called solitary birds. That is, they are not
found in parties like swallows or crows. They do not sing or call
when flying.
NIGHTHAWK
These birds are hard to watch because they come out in the dark,
and can then see so much better than we can. So we know little
about their ways.
The Nighthawk's looks, and all his ways, are different. He wears
the same colors that the whip-poor-will does, but they are arranged
in another way. They are put in bars running across the back and
tail, and there is a great deal of white on his upper breast. On the
wing is a large white spot that looks like a hole across it, when you
see him flying away up in the air. You can always know him by this.
Then
he does
not act
like the
whip-
poor-will.
He is a
high flyer,
sailing
about
over our
heads in
the
afternoon
or
evening.
He is not
silent on
the wing.
Now and
then he
gives a strange sharp cry like "peent." He is busy catching flies and
mosquitoes as he goes. Sometimes you will see him dive head first
toward the earth as if he would dash himself against it. At the same
time he makes a loud sound, like blowing into the bunghole of an
empty barrel. But before he touches, he turns and skims along just
above the ground.
The mother nighthawk, like the whip-poor-will, makes no nest.
She chooses a sunny spot in a pasture or on a hillside to put her
eggs. Sometimes in the cities, where flies and other things to eat are
so plentiful, she takes a flat house-roof for her nursery. Many pairs
of down-covered baby night hawks are brought up over our heads,
and we do not know it.
The family name of Goatsuckers was given to the birds from the
foolish notion that they took milk from the goats. By watching them,
it has been found that when they are so busy around the goats or
cattle, they are really catching the insects which torment them. So
they are doing a kindness to the beasts, instead of an injury.
FOOTNOTE:
[22] See Appendix, 21.
XXIX
THE WOODPECKER FAMILY
(Picidæ)[23]
You may generally know a woodpecker the moment you see him
on a tree. He will—if he follows woodpecker fashions—be clinging to
the trunk, or a big branch, propped up by his stiff tail, and not
perched crosswise like most other birds.
There are a good many of this family in the world. We have
twenty-four species in North America. They differ from other birds in
two or three ways. First their toes are always in pairs, two turned
forward and two turned backward, except in one genus, which has
but three toes. So they can hold on better than anybody else.
Then again the tails of woodpeckers are not like most birds' tails.
They are strong and stiff, so that they can be used as props to hold
the bird in the queer position he likes so well.
Oddest of all are the woodpecker tongues. They are round,
worm-shaped it is called, and except in the genus of sapsuckers,
very long. They can be pushed out far beyond the end of the beak.
That is so that they can reach into a deep hole for the insects they
eat. They have little barbs or sharp points on the tip, to catch their
prey, and they are sticky besides. The tongue of the sapsucker has a
brush at the end and is not barbed.
One of the most notable things about a woodpecker is his bill,
which he uses as a drill and also to drum with.
Woodpeckers are made to take care of the large limbs and trunks
of trees, to get out from under the bark the grubs which would kill
them. They are perfectly fitted for the work.
As you learn more about birds and beasts, you will see that every
one is exactly fitted for his work in life. A worm is as well fitted to be
a worm as a bird is to be a bird. How this came to be so has long
been a study of the wise men, and they have not found out all about
it yet.
The largest of this family that is common is the Golden-winged
Woodpecker, or Flicker. He is as large as a pigeon. In the Eastern
States is the golden-wing, in the West and California the red-
shafted, who differs merely in the dress.
The gold-winged woodpecker has a brown back with black bars,
and a light breast with heavy black spots. His wings and tail are
yellow on the inside. He has a bright red collar on the back of his
neck, a heavy black crescent on his breast, and black cheek patches
or bars running down from the corners of his mouth.
The Red-shafted Flicker has red cheek patches instead of black,
and omits the red collar altogether. His breast is a little grayer, and
the wing and tail linings are scarlet. Both flickers have large white
spots on the back, above the tail, which show very plainly when they
fly.
These two varieties of the flicker are found from the Atlantic to
the Pacific. Their ways of living are the same, and what is said of
one will do as well for the other.
A flicker hangs himself up to sleep. He takes a good hold of a tree
trunk, or upright limb, with his grapnel-shaped toes, presses his stiff
tail against the bark, and hangs there all night. When he flies, he
goes in great waves, as if he were galloping through the air.
The nest of this woodpecker is a snug little room in a tree trunk,
or sometimes a telegraph-pole. He usually selects a tree that is
dead, or partly so, but sometimes he takes a solid one. The little
room is cut out by the strong, sharp beaks of the pair. The door of
this home is just a round hole rather high up on the trunk. A
passage is cut straight in for a little way and then turns down, and
there the room is made. It has to be of pretty good size, for the bird
is fond of a large family. Five or six and occasionally more young
flickers have been found in a nest.
Fashions change in the bird world as well as in the human.
Woodpeckers more than any others are changing their habits, and
improving their condition. They have found an easier way to get a
home than to chisel it out of wood. Nowadays woodpeckers often
cut a hole through a board which admits them into a garret, a
church tower, or the walls of an unused building, and make the nest
there. Thus they save themselves much labor. One even cut out a
home in a haystack.
These birds have changed too, it is said, in their notions about
eating. They do not think it necessary to dig out every mouthful
from under tree bark. The flicker feeds on the ground. He eats many
insects, but mostly ants. When insects are scarce, he eats many wild
berries—dogwood, black alder, poke-berries, and others—and the
seeds of weeds.
Young woodpeckers in the nest are fed mostly upon insects.
When they get big enough to climb up to the door of their snug
home, they stick their heads out and call for something to eat. Then
one can hardly pass through the woods without hearing them, for
they have good loud voices. And of course they are always hungry.
The way they are fed is by regurgitation. That is, the old bird
swallows the food she gets, and when she wants to feed, she jerks it
up again. She thrusts her bill far down the little one's throat, as I
told you the hummingbird does. Then she gives three or four pokes
as if she were hammering it down. A young flicker does not seem to
know how to swallow. A lady once picked up a nestling who was
hurt, and to get him to eat anything she had to poke it down his
throat herself.
The gold-winged woodpecker is a lively bird, most interesting to
know. He makes so many strange noises that I can't tell you half of
them, and his ways are as queer as his notes. He does not sing
much, but he is a great drummer. When he finds a tin roof, or eaves
gutter that pleases him, he will drum on it till he drives the family
nearly crazy. He seems particularly to delight in waking them all up
in the morning.
He can sing, too. I have heard a flicker sing a droll little song, not
very loud, swinging his body from side to side as he did it.
Another thing this bird can do is dance. Two flickers will stand
opposite one another and take funny little steps, forward and back,
and sideways. Then they will touch their bills together and go
through several graceful figures. This has been seen several times
by persons whose truthfulness can be relied upon.
The Red-headed Woodpecker is another common one of the family,
especially in the Middle States. He is a little smaller than the flicker.
No one can mistake this bird, he is so plainly marked. His whole
head is bright red. The rest of him is black, or bluish black, with a
large mass of white on the body and wings.
This woodpecker, too, has partly given up getting food from under
the bark. He takes a good deal on the wing, like a flycatcher.
Sometimes he goes to the ground for a large insect like a cricket or
grasshopper, and he is fond of nuts, especially the little three-
cornered beech-nut.
The red-head is beginning to store food for winter use, for most
woodpeckers do not migrate. When beech-nuts are ripe, he gets
great quantities of them, and packs them away in queer places,
where he can find them when he wants them.
Some of his nuts the red-head puts in cavities in trees, others in
knot-holes or under bark that is loose. Many he fits into cracks in the
bark, and hammers in tight. He has been known to fill the cracks in
a gate-post, and in railroad ties, and even to poke his nuts between
the shingles on a roof. Any place where he can wedge a nut in he
seems to think is a good one.
A woodpecker can eat almost anything. Besides insects and nuts,
he likes wild berries of all kinds—dogwood, cedar, and others that he
finds in the woods.
The nest of the red-headed woodpecker is usually cut out in the
dead top or limb of a tree. In prairie lands, where trees are scarce,
he contents himself with telegraph-poles and fence-posts.
This bird is rather a dainty feeder. He does not swallow his food
wherever he finds it, as many birds do. He likes a regular dining-
table. So he takes it to some place on top of a fence-post or an old
stump, where he has found or made a little hollow. There he puts
his nut or acorn, picks it to pieces, and eats it in bits.
The young red-head is a good deal like his father, only his head is
brown instead of red. A queer thing happened to a baby red-head in
Indiana one summer. He was found on the ground, hopping about in
a pitiful way, unable to fly. The parents and others of the
woodpecker tribe were flying about him, much troubled, and trying
to help him. But this young one had been hurt, or was not yet strong
enough to get about. He acted as if he were half paralyzed, and he
was wholly helpless. Once while the little bird was hobbling about
DOWNY WOODPECKER
and calling for something to
eat, and no one was there
to feed him, a robin
happened to notice him. He
took pity on the hungry
baby, and brought him a
nice worm, which he took
very gladly.
But still more strange
was the way the family cat
acted toward the little
stranger. When she saw him
on the ground, she started
for him. No doubt she
meant to catch him, for she
was a great bird hunter.
When she got almost up to
the little fellow, she seemed
suddenly to notice that he
was a baby, and helpless. At
once her manner changed.
She went up to him, and
actually played with him in
the gentlest way, not
hurting him in the least.
She did this several times
before the bird got strong
enough to fly. This is a true
story.
The Californian Woodpecker takes the place of the red-head in
California. He is most interesting because of one habit which gives
him the common name of "carpenter woodpecker." This habit is of
storing sweet acorns for winter use.
Other birds store acorns, but this bird has found out a new way.
He drills a hole in the bark of a tree for each acorn by itself. It is
generally a soft pine or cedar, and sometimes thousands of acorns
are put in one tree. Often a trunk will be filled from near the ground
up forty feet. The acorns are driven in point first, and so tightly that
they have to be cut out with a knife. When a tree is filled, it is
carefully guarded till they are needed.
Many people think they lay up these acorns for the worms that
sometimes come into them. But Mr. John Muir, who lives right there,
and knows them as well as anybody in the world, says the birds eat
the sound acorns themselves. Sometimes, when food is scarce,
Indians go to these trees and steal the poor birds' store. They have
to chop the acorns out with hatchets. They often take a bushel from
one tree.
These birds are more social than most woodpeckers. Often a
party of them will be seen together. In his flight and his ways of
eating this bird is like the red-headed woodpecker. Like him also, he
is fond of clinging to a dead limb, and drumming, hours at a time.
But in looks the Californian and the red-headed woodpeckers are
very different. The Western bird has only a cap of bright red. His
back is glossy blue-black, and he has the same color on the breast.
His other under parts are white, and he has a white patch on the
wings, and another just above the tail.
The smallest of our woodpeckers is the Downy Woodpecker, who
is not much bigger than an English sparrow. The picture shows two
of these birds. In "The First Book of Birds" there is a picture of a
flicker at his nest-hole.
FOOTNOTE:
[23] See Appendix, 22.
XXX
THE KINGFISHER FAMILY
(Alcedinidæ)[24]
Most of the Kingfisher family belong to the tropics, but we have
one who is found all over the United States. This is the Belted
Kingfisher.
The belted kingfisher is large and rather chunky. He is dark blue
above and white below, with a bluish band across the breast. He has
a fine crest and a big head, and he sits up straight as a hawk.
The tail of the kingfisher is short, and square at the end. His
plumage is thick and oily, so that it does not hold wet. This is very
important to him in the way he gets his food, for he is an expert
fisherman. He lives alone, or with his mate, near the water,—a lake,
or pond, or small stream.
This bird's way of getting fish is to dive for them. You may have
seen him splash into the water out of sight, and in a moment come
up with a small fish in his beak. Then he goes back to his perch and
beats the fish to death, before he swallows it. He swallows it whole
and head first, because the fins might stick in his throat if he took it
tail first. After a while he throws up a little ball of the bones, scales,
and skin of the fish he has eaten. It is said that the kingfisher can
take a very large fish. One was shot who had swallowed a fish so
long that the tail stuck out of his mouth, and could not get down.
The nest of the kingfisher is in the bank of a river or lake. The
birds first cut a passage or hallway. Sometimes this is only four feet
long, and straight. But when stones or roots are in the way, it will be
BELTED KINGFISHER
much longer and
have many turns.
At the end of this
passage is the
kingfisher nursery.
This is a round
room nearly a foot
across, with a roof
rounded up over it.
It is a little higher
than the
passageway so that
water will not run
into it.
Sometimes it
takes the birds two
or three weeks to
make one of these
nests, as we might
expect when we
think they have
only beaks and feet
to work with.
Usually it does not
take so long. If the
pair are not
disturbed, they will
use the same nest
year after year. Sometimes the bed for the nestlings is of dry grass.
One was found in which the bed was entirely of the bones and
scales of fish.
Mr. Baily has told us about a family of kingfisher little folk whom
he studied and photographed. He dug down to the nest from above,
and was careful not to hurt them and to put them back safely. First
Mr. Baily took a picture of them when two days old. They were
queer-looking objects, with eyes not open, and not a feather to their
backs. They were not so young but that they had one notion in their
little round heads. That was to cuddle up close together. They were
not used to much room in their dark cradle.
When Mr. Baily laid them out on the ground, they at once crawled
up together and made themselves into a sort of ball. They put their
bare wings and their bills over one another, and held on so that one
could not be moved without the others. After they had sat for their
picture they were carefully put back, and the nest was covered up
again.
When the nestlings were nine days old, the nest was opened
again, and another picture taken. The little ones had grown a good
deal in these few days. Their eyes were open, and they were fast
getting their feather coats on. But they were just as fond of being
close together as before.
After this the birds were left in their home till they were twenty-
three days old, and it seemed about time for them to come out.
When the nest was opened this time, it was found that the family
had moved. The old room was filled up with earth, and a new one
made farther up. No doubt the old birds thought the man too
curious about their babies. The young birds were ready to fly, and
two of them did take to their wings when they came to daylight.
There is a very old fable about the kingfisher, who was called the
halcyon. It is told in the first book that was ever written about birds
(so far as I know). The author was Aristotle, a Greek who lived three
hundred years before Christ. The story is, that the bird builds a nest
that floats on the sea, and for seven days before and seven days
after the shortest winter day, the sea stays calm, so that the nest
may not be hurt. During the first seven days she builds her nest, and
in the second seven she hatches out the young. These fourteen days
were called halcyon days. You may find more about this curious
story in the encyclopædias.
FOOTNOTE:
[24] See Appendix, 23.
XXXI
THE CUCKOO FAMILY
(Cuculidæ)[25]
Most of the cuckoo family live in a hotter climate than ours, but
we have a few of them. They are beautiful birds, with some peculiar
ways.
Cuckoos are rather slim in form, with very long tails, and bills a
little curved. Their toes are divided like woodpeckers' toes, two
turned forward and two back. In the Eastern States we have but
two, the yellow-billed and the black-billed. Best known in the East is
the Yellow-billed Cuckoo, and in California the Western Yellow-billed,
or California, Cuckoo.
This bird has several names. In some places he is called the rain
crow, and in other places the wood pigeon; but of course he is
neither a crow nor a pigeon. He is a graceful bird, with plumage like
satin. He is a soft brown above and white below, but he is so shy
that he is not so often seen as heard. His call or song is a loud, yet
not harsh "kuk-kuk-kuk" many times repeated. Sometimes it begins
slow and grows faster till the notes run into each other, and then
grows slow again, ending in a sort of "cow-cow-cow;" but it does not
always do so.
The cuckoo does not manage her nursery affairs as other birds
do. Most birds lay an egg a day, or every other day, so that they
hatch about the same time; but this bird doesn't mind if several days
come between. Thus it happens that one or more little cuckoos
hatch out before the rest are ready, and it is common to find little
ones of several ages in the same nest. There may be one nearly
YELLOW-BILLED CUCKOO
grown,
another
just
beginning
to get
feathers,
and a third
one not
yet out of
the egg.
There is
another
droll thing
that may
be found
in a
cuckoo's
nest.
When the
feathers
begin to
grow out
on young
birds, they
come wrapped in little sheaths. In most cases these sheaths burst
open and the feathers show, when they are a little way out. But in
this family it is different. The sheath does not open, says Mr.
Dugmore, till the feathers have grown their full length. Till that
happens, the youngster looks as if he were stuck all over with white
pins on his black body.
You have heard, or read, that the cuckoo lays eggs in other birds'
nests, and leaves her young to be brought up by others. Do not
forget that the bird who does that is the European cuckoo—not ours.
Our cuckoos build nests, though very poor ones, sometimes hardly
more than a platform of sticks.
This bird is useful to us, for he eats some of our most
troublesome insects,—such as tent caterpillars, which few birds like
to eat because they are so hairy, and other insects with spines that
are poisonous, and so generally avoided.
The cuckoo is graceful in flight. He goes swiftly, without noise,
and seems to glide through the thickest foliage with ease.
I once found a young bird tumbling about on the ground. He was
trying to fly, but was not able to go much more than a foot at a
time. He was giving strange calls, which were answered from the
woods beside the road by a low tapping sound. I thought of course
the little one was a woodpecker and his mother was doing the
knocking. It was so dark I could not see him well. After some trouble
I caught him and was going to take a good look at him to see who
he was before I let him go. As I grasped him he gave a shriek, and
out from the thick trees popped a cuckoo. She alighted on a low
branch outside and gave such a cry of distress that I knew at once it
was her baby I held in my hand.
I suppose the poor mother thought I wanted to carry the
youngster off. I couldn't bear to have a bird think that for a minute;
so I opened my hands and away he went, half flying, half scrambling
up the road, while the mother slipped back into the woods. In a
moment she began again her hollow-sounding calls, which I had
thought were woodpecker tappings.
FOOTNOTE:
[25] See Appendix, 24.
Mcts Guide To Microsoft Windows Server 2008 Network Infrastructure Configuration Exam 70642 1st Edition Michael Bender
XXXII
THE OWL FAMILY
(Bubonidæ)[26]
Owls differ from all other birds in having eyes that look forward
like ours. They have also a broad face, which is made to look even
wider by the feathers which stand out around the eyes.
Owls cannot turn their eyes in the sockets, so they have to turn
the whole head to see to one side. Many of them have tufts of
feathers like horns, which they can stand up or lay down as they
choose. These are called horned owls. An owl's legs are covered
with feathers, sometimes down to the toes. The whole plumage of
this bird is soft and fluffy, so that he can fly without making any
noise. This is important to him, for he lives mostly on mice, and he
never could catch one if he made much noise getting about.
The owl's mate looks like him, and—what is unusual among birds
—she is larger than he. Because they come out in the evening, when
we cannot see them well, we know very little of their ways. They are
more often heard than seen. Their voices are generally mournful,
but that is no reason why they should be feared.
All birds have control over some of their feathers, that is, they can
make them stand up or lie down as they choose. But owls have
more than any other bird. An owl can alter his shape or size so that
he will look like another bird.
Mr. Bolles says that a large owl can change from a mass of
bristling feathers a yard wide, to a slim, sleek brown post only a few
inches wide. When he does this, one cannot see him, though he may
be in plain sight. His colors blend with a tree trunk, or stump, and he
can stand without stirring for an hour, and likes to do it.
Mr. Bolles had owls in the house, and watched them closely. He
has told us some curious things about their ways. He says that when
one steps daintily across the floor, his feathers tuck themselves up
as a lady holds up her gown.
This moving of the feathers sometimes looks very droll. When
eating, the feathers around the mouth, which might get soiled, draw
back out of the way. And when an owl wants to hide his food, he
stands over it, and the feathers droop down like a curtain to screen
it from view. When Mrs. Bolles wanted to sketch an owl, he kept
changing his shape all the time, though he did not seem to move at
all.
Another man who had a pet owl says that the bird would stand
before him and throw back his breast feathers each side, just as a
man throws open his coat.
The owlets come out of the egg dressed in soft, fluffy down. In
some of the family it is gray, in others it is snowy white. They are
carefully fed and reared by their loving parents.
A funny story is told by a man who wanted to see what was in an
owl's nest. He lifted the mother bird out, and to his surprise the
whole family came out with her. She held on to one little one, and
each one held on to the next, and so he had the whole owl family in
a cluster, like a bunch of grapes.
The Screech Owl is the best known of this family. He is found,
under slightly different forms, all over our country. In Florida he is
smaller and darker than in the Middle States. In California he is
larger and grayer, and in the Rocky Mountains somewhat lighter. But
he acts in about the same way, wherever he lives.
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
ebookbell.com

More Related Content

PDF
Certification guide series ibm tivoli netcool webtop v2.0 implementationsg247754
PDF
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
PDF
Microsoft Sharepoint 2007 Development Unleashed 1st Edition Kevin Hoffman
PDF
Windows Server 2003 best practices for enterprise deployments 1st Edition Dan...
PDF
Introducing tivoli personalized services manager 1.1 sg246031
DOC
Lync Powershell - Ls admin windows_power_shell_supplement
PDF
Deployment guide series ibm total storage productivity center for data sg247140
PDF
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...
Certification guide series ibm tivoli netcool webtop v2.0 implementationsg247754
Certification guide series ibm tivoli netcool impact v4.0 implementation sg24...
Microsoft Sharepoint 2007 Development Unleashed 1st Edition Kevin Hoffman
Windows Server 2003 best practices for enterprise deployments 1st Edition Dan...
Introducing tivoli personalized services manager 1.1 sg246031
Lync Powershell - Ls admin windows_power_shell_supplement
Deployment guide series ibm total storage productivity center for data sg247140
Certification guide series ibm tivoli netcool omn ibus v7.2 implementation sg...

Similar to Mcts Guide To Microsoft Windows Server 2008 Network Infrastructure Configuration Exam 70642 1st Edition Michael Bender (20)

PDF
Ibm web sphere datapower b2b appliance xb60 revealed
PDF
Yii2 guide
PDF
Designing Enterprise Applications With The J2ee Platform 2nd Edition 2nd Edit...
PDF
Ws deployment guide
PDF
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
PDF
Ppm7.5 web services
PDF
Deployment guide series ibm tivoli composite application manager for web reso...
PDF
Deployment guide series ibm tivoli composite application manager for web reso...
PDF
Ibm tivoli web access for information management sg246823
PDF
Mysql To Db2 Conversion Guide Ibm Redbooks
PDF
Extending sap solutions to the mobile enterprise with ibm mobile first platfo...
PDF
Perceptive nolij web installation and upgrade guide 6.8.x
PDF
Ibm tivoli intelligent think dynamic orchestrator pre proof of-concept cookbo...
PDF
Certification guide series ibm tivoli provisioning manager v5.1 sg247262
PDF
BOOK - IBM tivoli netcool service quality manager data mediation gateway deve...
PDF
connectivity_service.pdf
PDF
Certification study guide ibm tivoli access manager for e business 6.0 sg247202
PDF
Managing disk subsystems using ibm total storage productivity center sg247097
PDF
Code in the Cloud 1st Edition Mark C. Chu-Carroll
PDF
Rst4userguide
Ibm web sphere datapower b2b appliance xb60 revealed
Yii2 guide
Designing Enterprise Applications With The J2ee Platform 2nd Edition 2nd Edit...
Ws deployment guide
OpenScape Contact Center Enterprise V10 Manager Administration Guide Administ...
Ppm7.5 web services
Deployment guide series ibm tivoli composite application manager for web reso...
Deployment guide series ibm tivoli composite application manager for web reso...
Ibm tivoli web access for information management sg246823
Mysql To Db2 Conversion Guide Ibm Redbooks
Extending sap solutions to the mobile enterprise with ibm mobile first platfo...
Perceptive nolij web installation and upgrade guide 6.8.x
Ibm tivoli intelligent think dynamic orchestrator pre proof of-concept cookbo...
Certification guide series ibm tivoli provisioning manager v5.1 sg247262
BOOK - IBM tivoli netcool service quality manager data mediation gateway deve...
connectivity_service.pdf
Certification study guide ibm tivoli access manager for e business 6.0 sg247202
Managing disk subsystems using ibm total storage productivity center sg247097
Code in the Cloud 1st Edition Mark C. Chu-Carroll
Rst4userguide
Ad

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Pre independence Education in Inndia.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Lesson notes of climatology university.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
VCE English Exam - Section C Student Revision Booklet
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
RMMM.pdf make it easy to upload and study
Pharmacology of Heart Failure /Pharmacotherapy of CHF
TR - Agricultural Crops Production NC III.pdf
O7-L3 Supply Chain Operations - ICLT Program
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Pre independence Education in Inndia.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Insiders guide to clinical Medicine.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
FourierSeries-QuestionsWithAnswers(Part-A).pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Lesson notes of climatology university.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
VCE English Exam - Section C Student Revision Booklet
Ad

Mcts Guide To Microsoft Windows Server 2008 Network Infrastructure Configuration Exam 70642 1st Edition Michael Bender

  • 1. Mcts Guide To Microsoft Windows Server 2008 Network Infrastructure Configuration Exam 70642 1st Edition Michael Bender download https://ebookbell.com/product/mcts-guide-to-microsoft-windows- server-2008-network-infrastructure-configuration-exam-70642-1st- edition-michael-bender-4071378 Explore and download more ebooks at ebookbell.com
  • 2. Here are some recommended products that we believe you will be interested in. You can click the link to download. Mcts Guide To Configuring Microsoft Windows Server 2008 Active Directory Exam 70640 Tomsho https://ebookbell.com/product/mcts-guide-to-configuring-microsoft- windows-server-2008-active-directory-exam-70640-tomsho-21347424 Mcts Guide To Microsoft Windows 7 Exam 70680 Networking Course Technology 1st Edition Byron Wright https://ebookbell.com/product/mcts-guide-to-microsoft- windows-7-exam-70680-networking-course-technology-1st-edition-byron- wright-2418096 Mcts Guide To Microsoft Windows Vista 1st Edition Leon Plesniarski https://ebookbell.com/product/mcts-guide-to-microsoft-windows- vista-1st-edition-leon-plesniarski-2485076 Mcts Guide To Microsoft Sql Server 2008 Faisal Akkawi https://ebookbell.com/product/mcts-guide-to-microsoft-sql- server-2008-faisal-akkawi-4721366
  • 3. A Podiatrists Guide To Using Research 1st Edition Ian Mathieson Bschons Phd Mchs https://ebookbell.com/product/a-podiatrists-guide-to-using- research-1st-edition-ian-mathieson-bschons-phd-mchs-1745476 Snus The Complete Guide To Brands Manufacturing And Art Of Enjoying Smokeless Tobacco Mats Jonson https://ebookbell.com/product/snus-the-complete-guide-to-brands- manufacturing-and-art-of-enjoying-smokeless-tobacco-mats- jonson-57689818 Strategic Internal Communication A Practitioners Guide To Implementing Cuttingedge Methods For Improved Workplace Culture Susanne Dahlman Mats Heide https://ebookbell.com/product/strategic-internal-communication-a- practitioners-guide-to-implementing-cuttingedge-methods-for-improved- workplace-culture-susanne-dahlman-mats-heide-33573294 Why Group Therapy Works And How To Do It A Guide For Health And Social Care Professionals 1st Edition Christer Sandahl https://ebookbell.com/product/why-group-therapy-works-and-how-to-do- it-a-guide-for-health-and-social-care-professionals-1st-edition- christer-sandahl-38301100 Windows 7 Portable Command Guide Mcts 70680 70685 And 70686 1st Edition Darril Gibson https://ebookbell.com/product/windows-7-portable-command-guide- mcts-70680-70685-and-70686-1st-edition-darril-gibson-2217592
  • 6. MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Michael Bender Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 7. MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Michael Bender Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Acquisitions Editor: Nick Lombardi Senior Product Manager: Michelle Ruelos Cannistraci Developmental Editor: Lisa Ruffolo Editorial Assistant: Sarah Pickering Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Content Project Manager: Jessica McNavich Design Assistant: Hannah Wellman Cover designer: Robert Pehlke Cover photo or illustration: Getty Images Manufacturing Coordinator: Denise Powers Copyeditor: Bruce Owens Proofreader: Amy Ford Compositor: Cadmus/KGL © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photo- copying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit all requests online at cengage.com/permissions Further permissions questions can be emailed to permissionrequest@cengage.com Example: Microsoft® is a registered trademark of the Microsoft Corporation. Library of Congress Control Number: 2009922095 ISBN-13: 978-1-423-90236-2 ISBN-10: 1-423-90236-X Course Technology 20 Channel Center Boston, MA 02210 USA Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: international.cengage.com/region Cengage Learning products are represented in Canada by Nelson Education, Ltd. For your lifelong learning solutions, visit course.cengage.com Visit our corporate website at cengage.com. Some of the product names and company names used in this book have been used for identification purposes only and may be trademarks or registered trademarks of their respective manufacturers and sellers. Microsoft and the Office logo are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Course Technology, a part of Cengage Learning, is an independent entity from the Microsoft Corporation, and not affiliated with Microsoft in any manner. Any fictional data related to persons or companies or URLs used throughout this book is intended for instructional purposes only. At the time this book was printed, any such data was fictional and not belonging to any real persons or companies. Course Technology and the Course Technology logo are registered trade- marks used under license. Course Technology, a part of Cengage Learning, reserves the right to revise this publication and make changes from time to time in its content without notice. The programs in this book are for instructional purposes only. They have been tested with care, but are not guaranteed for any particular intent beyond educa- tional purposes. The author and the publisher do not offer any warranties or representations, nor do they accept any liabilities with respect to the programs. Printed in the United States of America 1 2 3 4 5 6 7 12 11 10 09 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 8. iii INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi CHAPTER 1 Introduction to Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 CHAPTER 2 Installing Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 CHAPTER 3 Networking with Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 CHAPTER 4 Installing and Configuring the Dynamic Host Configuration Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 CHAPTER 5 Introduction to DNS in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 CHAPTER 6 Managing and Administering DNS in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 CHAPTER 7 Configuring File Services in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 CHAPTER 8 Introduction to Printers in a Windows Server 2008 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 CHAPTER 9 Network Policy and Access Services in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 CHAPTER 10 Securing Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 CHAPTER 11 Managing and Monitoring a Windows Server 2008 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 APPENDIX A MCTS 70-642 Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451 APPENDIX B A Step-by-Step Guide to Using Server Virtualization Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455 GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503 Brief Table of Contents Brief Table of Contents Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 10. v INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi CHAPTER 1 Introduction to Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Clients, Servers, and Windows Network Models ......................................................................................................................... 2 Workgroup Model.................................................................................................................................................................. 2 Domain Model with Active Directory .................................................................................................................................... 3 Windows Server 2008 Editions .................................................................................................................................................... 4 Windows Server 2008, Standard Edition ................................................................................................................................ 5 Windows Server 2008, Enterprise Edition .............................................................................................................................. 5 Windows Server 2008, Datacenter Edition ............................................................................................................................. 5 Windows Web Server 2008..................................................................................................................................................... 5 Windows HPC Server 2008.................................................................................................................................................... 6 Windows Server 2008, Without Hyper-V ............................................................................................................................... 6 Windows Server 2008 for Itanium-Based Systems .................................................................................................................. 6 Windows Server 2008 Hardware Requirements........................................................................................................................... 6 32-Bit and 64-Bit Processors................................................................................................................................................... 7 New Technologies in Windows Server 2008 ................................................................................................................................ 7 Improved Installation Process............................................................................................................................................... 11 Hyper-V................................................................................................................................................................................ 13 Server Core........................................................................................................................................................................... 13 Network Access Protection................................................................................................................................................... 14 TCP/IP Improvements........................................................................................................................................................... 14 Server Manager..................................................................................................................................................................... 14 PowerShell............................................................................................................................................................................ 15 Windows Remote Management............................................................................................................................................ 16 Group Policy Preferences...................................................................................................................................................... 16 New Roles and Features in Windows Server 2008..................................................................................................................... 16 New Roles in Server 2008 .................................................................................................................................................... 17 Active Directory Roles.......................................................................................................................................................... 17 Network Roles...................................................................................................................................................................... 19 Infrastructure Roles .............................................................................................................................................................. 20 New Features........................................................................................................................................................................ 21 Roles and Features Management .......................................................................................................................................... 22 Server Manager Command................................................................................................................................................... 24 Windows Server 2008 User Interface ......................................................................................................................................... 25 Start Menu............................................................................................................................................................................ 25 Network and Sharing Center................................................................................................................................................ 27 Windows Desktop Experience .............................................................................................................................................. 28 Chapter Summary ...................................................................................................................................................................... 29 Key Terms.................................................................................................................................................................................. 29 Review Questions....................................................................................................................................................................... 32 Case Projects.............................................................................................................................................................................. 35 CHAPTER 2 Installing Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Deployment Improvements in Windows Server 2008................................................................................................................. 38 Process Improvements........................................................................................................................................................... 38 Tool and Technologies Improvements................................................................................................................................... 39 Windows Deployment Services ............................................................................................................................................. 39 Windows Automated Installation Kit ................................................................................................................................... 41 Windows System Image Manager......................................................................................................................................... 42 ImageX................................................................................................................................................................................. 43 Windows Preinstallation Environment.................................................................................................................................. 43 Windows Recovery Environment.......................................................................................................................................... 44 Sysprep ................................................................................................................................................................................. 45 Table of Contents Table of Contents Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 11. Table of Contents vi Preparing to Install Windows Server 2008 ................................................................................................................................. 47 Installation Types.................................................................................................................................................................. 47 Installing Windows Server 2008 with Server Core ..................................................................................................................... 50 Imaging Options with ImageX.............................................................................................................................................. 51 Modifying an Image ............................................................................................................................................................. 52 Applying an Image................................................................................................................................................................ 54 Configuring Windows Server 2008 ............................................................................................................................................ 54 Product Activation and Licensing in Windows Server 2008 ................................................................................................. 56 Introduction to Windows Server 2008 Server Core.................................................................................................................... 60 Basics of Server Core ............................................................................................................................................................ 60 Configuring Server Core....................................................................................................................................................... 64 Chapter Summary ...................................................................................................................................................................... 67 Key Terms.................................................................................................................................................................................. 68 Review Questions....................................................................................................................................................................... 71 Case Projects.............................................................................................................................................................................. 74 CHAPTER 3 Networking with Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Introduction to Networking....................................................................................................................................................... 78 Basics of Networking............................................................................................................................................................ 78 Types of Networks................................................................................................................................................................ 78 Basic Network Components ................................................................................................................................................. 81 Network Addressing with TCP/IP ............................................................................................................................................. 86 IPv4 ...................................................................................................................................................................................... 86 Subnetting............................................................................................................................................................................. 89 Public and Private Addresses ................................................................................................................................................ 92 Introduction to IPv6 ............................................................................................................................................................. 93 IPv6 Address Types.................................................................................................................................................................... 95 Configuring Clients for IPv4 and IPv6 ....................................................................................................................................... 97 IPv4 Client Configuration..................................................................................................................................................... 97 Manual Configuration Through the GUI............................................................................................................................ 103 Manual Configuration with Netsh...................................................................................................................................... 104 Upgrading Your Network to IPv6............................................................................................................................................ 105 Dual-Layer IP Stack............................................................................................................................................................ 105 IPv6 over IPv4 .................................................................................................................................................................... 106 ISATAP ............................................................................................................................................................................... 106 6to4.................................................................................................................................................................................... 106 Teredo................................................................................................................................................................................. 107 Using Netsh to Configure Transition Technologies............................................................................................................. 107 Enabling Teredo.................................................................................................................................................................. 108 Disabling IPv6 .................................................................................................................................................................... 109 Troubleshooting TCP/IP Networking ...................................................................................................................................... 110 Troubleshooting Tools in Windows Server 2008 ................................................................................................................ 110 Network Troubleshooting Methodology ............................................................................................................................ 117 Chapter Summary .................................................................................................................................................................... 117 Key Terms................................................................................................................................................................................ 118 Review Questions..................................................................................................................................................................... 120 Case Projects............................................................................................................................................................................ 123 CHAPTER 4 Installing and Configuring the Dynamic Host Configuration Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Basics of DHCP ....................................................................................................................................................................... 126 DHCP Protocol Basics........................................................................................................................................................ 126 Exploring DHCP Components and Processes .......................................................................................................................... 127 Components of DHCP........................................................................................................................................................ 127 DHCP Communication Processes....................................................................................................................................... 133 Using DHCPv6 ................................................................................................................................................................... 137 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 12. Table of Contents vii Installing DHCP in a Windows Server 2008 Environment....................................................................................................... 137 Authorizing DHCP ............................................................................................................................................................. 140 Configuring the DHCP Server.................................................................................................................................................. 141 Configuring Scopes............................................................................................................................................................. 141 Configuring Exclusions....................................................................................................................................................... 143 Configuring Options........................................................................................................................................................... 145 Creating Reservations......................................................................................................................................................... 146 Using netsh ......................................................................................................................................................................... 147 DHCP Client Configuration ............................................................................................................................................... 147 DHCP Administration.............................................................................................................................................................. 150 Monitoring Reliability and Performance............................................................................................................................. 150 Backup and Recovery ......................................................................................................................................................... 154 Troubleshooting DHCP ........................................................................................................................................................... 156 Reconciling the Database.................................................................................................................................................... 156 Verifying DHCP Services .................................................................................................................................................... 157 Troubleshooting DHCP Clients: IPconfig ........................................................................................................................... 157 Chapter Summary .................................................................................................................................................................... 158 Key Terms................................................................................................................................................................................ 159 Review Questions..................................................................................................................................................................... 160 Case Projects............................................................................................................................................................................ 163 CHAPTER 5 Introduction to DNS in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Domain Name System.............................................................................................................................................................. 166 DNS Terminology............................................................................................................................................................... 167 DNS Queries in Windows Server 2008............................................................................................................................... 172 Configuring DNS Clients ......................................................................................................................................................... 174 DNS Client Settings............................................................................................................................................................ 174 Dynamic Updates................................................................................................................................................................ 181 Installing DNS in Windows Server 2008.................................................................................................................................. 181 Installing Cache-only DNS servers...................................................................................................................................... 181 DNS Zones .............................................................................................................................................................................. 183 Standard Zones................................................................................................................................................................... 184 Standard DNS Zone Types ................................................................................................................................................. 184 Direction of DNS Zones..................................................................................................................................................... 188 DNS Resource Records....................................................................................................................................................... 189 Standard DNS Zone Transfers............................................................................................................................................ 196 Chapter Summary .................................................................................................................................................................... 197 Key Terms................................................................................................................................................................................ 197 Review Questions..................................................................................................................................................................... 199 Case Projects............................................................................................................................................................................ 203 CHAPTER 6 Managing and Administering DNS in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Introduction to Active Directory Domain Services................................................................................................................... 206 Using AD DS ...................................................................................................................................................................... 208 AD-Integrated DNS ............................................................................................................................................................ 214 DNS Zone Layout .............................................................................................................................................................. 215 Dynamic DNS..................................................................................................................................................................... 218 Managing DNS ........................................................................................................................................................................ 223 Using the DNS Console ...................................................................................................................................................... 223 Configuration Settings in the DNS Console........................................................................................................................ 223 Round-Robin DNS ..............................................................................................................................................................230 Conditional Forwarding ......................................................................................................................................................232 Troubleshooting DNS ...............................................................................................................................................................234 DNS Server Logs..................................................................................................................................................................234 Command-Line Utilities.......................................................................................................................................................239 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 13. Table of Contents viii WINS ........................................................................................................................................................................................247 WINS...................................................................................................................................................................................249 New DNS Features....................................................................................................................................................................250 DNS on Server Core ............................................................................................................................................................250 Support for IPv6 ..................................................................................................................................................................251 Primary Read-Only Zone.....................................................................................................................................................251 Link-Local Multicast Name Resolution...............................................................................................................................252 DNS Client Changes............................................................................................................................................................252 Background Zone Loading ..................................................................................................................................................253 GNZ....................................................................................................................................................................................253 Chapter Summary .....................................................................................................................................................................253 Key Terms.................................................................................................................................................................................254 Review Questions......................................................................................................................................................................256 Case Projects.............................................................................................................................................................................259 CHAPTER 7 Configuring File Services in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .261 Introduction to File Services......................................................................................................................................................262 Installing the File Server Role ..............................................................................................................................................263 File and Folder Sharing .............................................................................................................................................................263 Public and Standard Sharing................................................................................................................................................263 Access Control.....................................................................................................................................................................265 Deploying Shares .................................................................................................................................................................270 Distributed File System..............................................................................................................................................................278 Introduction to DFS.............................................................................................................................................................278 Configuring DFS..................................................................................................................................................................283 Managing Windows Server 2008 with FSRM ...........................................................................................................................287 Chapter Summary .....................................................................................................................................................................292 Key Terms.................................................................................................................................................................................293 Review Questions......................................................................................................................................................................294 Case Projects.............................................................................................................................................................................298 CHAPTER 8 Introduction to Printers in a Windows Server 2008 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .301 Windows Printer Model for Windows Server 2008...................................................................................................................302 Windows Printer Types........................................................................................................................................................303 Deploying Printers and Print Services........................................................................................................................................305 Installing the Print Services Role..........................................................................................................................................306 Deploying Printers to Clients...............................................................................................................................................311 Configuring Printer Resources...................................................................................................................................................316 Sharing a Stand-Alone Printer..............................................................................................................................................316 Changing Permissions on a Printer ......................................................................................................................................317 Changing the Printer Port....................................................................................................................................................317 Creating a Printer Pool ........................................................................................................................................................319 Creating Multiple Printers for a Single Print Device ............................................................................................................320 Updating a Printer Driver ....................................................................................................................................................324 Managing Printers and Print Services........................................................................................................................................325 Using the PMC ....................................................................................................................................................................325 Working with Print Queues .................................................................................................................................................326 Managing Server Core Print Services ...................................................................................................................................326 Chapter Summary .................................................................................................................................................................... 328 Key Terms................................................................................................................................................................................ 328 Review Questions..................................................................................................................................................................... 329 Case Projects............................................................................................................................................................................ 331 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 14. Table of Contents ix CHAPTER 9 Network Policy and Access Services in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 Configuring Routing in Windows Server 2008 ........................................................................................................................ 334 Configuring RRAS as a Router........................................................................................................................................... 336 Working with Routing Tables............................................................................................................................................. 338 Configuring Routes............................................................................................................................................................. 340 Configuring a DHCP Relay Agent...................................................................................................................................... 342 Configuring Dial-on-Demand Routing ............................................................................................................................... 344 Configuring Remote Access Services in Windows Server 2008 ................................................................................................ 344 Dial-Up Networking........................................................................................................................................................... 344 Using Virtual Private Networks .......................................................................................................................................... 345 Network Address Translation............................................................................................................................................. 348 Introduction to Network Policy Server .................................................................................................................................... 349 Windows Server 2008 Editions and the NPS Console ........................................................................................................ 349 Introduction to RADIUS..................................................................................................................................................... 351 RADIUS Server................................................................................................................................................................... 353 RADIUS Proxy ....................................................................................................................................................................354 NAP.....................................................................................................................................................................................355 Authentication Protocol.......................................................................................................................................................355 Wireless Access Configuration in Windows Server 2008.......................................................................................................... 356 Chapter Summary .................................................................................................................................................................... 357 Key Terms................................................................................................................................................................................ 358 Review Questions..................................................................................................................................................................... 360 Case Projects............................................................................................................................................................................ 362 CHAPTER 10 Securing Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 Managing Security in Server 2008 ........................................................................................................................................... 364 Security Configuration Wizard ........................................................................................................................................... 364 Windows Firewall............................................................................................................................................................... 365 Encrypting File Services ...................................................................................................................................................... 375 BitLocker............................................................................................................................................................................ 378 Microsoft Baseline Security Analyzer.................................................................................................................................. 383 Internet Protocol Security......................................................................................................................................................... 386 IPSec Threats ...................................................................................................................................................................... 387 How IPSec Works............................................................................................................................................................... 387 Network Authentication in Windows Server 2008 ............................................................................................................. 393 Introduction to Network Access Protection ............................................................................................................................. 394 NAP Terminology............................................................................................................................................................... 394 NAP Enforcement Methods................................................................................................................................................ 395 Implementing NAP ............................................................................................................................................................. 396 Installing NAP .................................................................................................................................................................... 396 Chapter Summary .................................................................................................................................................................... 397 Key Terms................................................................................................................................................................................ 399 Review Questions..................................................................................................................................................................... 399 Case Projects............................................................................................................................................................................ 402 CHAPTER 11 Managing and Monitoring a Windows Server 2008 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Managing Windows Server 2008 ............................................................................................................................................. 404 Microsoft Management Consoles ....................................................................................................................................... 404 Server Manager Console..................................................................................................................................................... 406 Updating Windows Server 2008 .............................................................................................................................................. 411 Windows Update ................................................................................................................................................................ 411 Windows Server Update Services ........................................................................................................................................ 411 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 15. Table of Contents x Microsoft Baseline Security Analyzer 2.1................................................................................................................................. 421 Monitoring Windows Server 2008 ........................................................................................................................................... 424 Working with Event Viewer................................................................................................................................................ 424 Reliability and Performance Console.................................................................................................................................. 429 Network Monitor............................................................................................................................................................... 433 Disk Management............................................................................................................................................................... 436 Backup and Restore in Windows Server 2008 ......................................................................................................................... 441 Windows Server Backup ..................................................................................................................................................... 441 Chapter Summary .................................................................................................................................................................... 445 Key Terms................................................................................................................................................................................ 446 Review Questions..................................................................................................................................................................... 447 Case Projects............................................................................................................................................................................ 449 APPENDIX A MCTS 70-642 Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451 APPENDIX B A Step-by-Step Guide to Using Server Virtualization Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455 Microsoft Virtual PC................................................................................................................................................................ 456 Requirements for Microsoft Virtual PC.............................................................................................................................. 456 Virtual Machine Operating Systems Supported .................................................................................................................. 456 How to Download Microsoft Virtual PC ........................................................................................................................... 457 How to Install Microsoft Virtual PC .................................................................................................................................. 457 Creating a Virtual Machine and Installing a Guest OS....................................................................................................... 457 Installing an OS from an ISO Image................................................................................................................................... 460 Configuring Networking and Hardware Options .................................................................................................................... 461 Host Key Options............................................................................................................................................................... 462 Microsoft Virtual Server........................................................................................................................................................... 463 Microsoft Virtual Server Guest Operating Systems Supported............................................................................................ 463 Microsoft Virtual Server Host Operating Systems Supported ............................................................................................. 464 Requirements for Microsoft Virtual Server......................................................................................................................... 464 How to Download Microsoft Virtual Server ...................................................................................................................... 464 How to Install Microsoft Virtual Server ............................................................................................................................. 465 Creating a Virtual Machine and Installing a Guest OS....................................................................................................... 467 Installing an OS from an ISO Image................................................................................................................................... 470 Configuring Networking and Hardware Options............................................................................................................... 470 Configuring Hardware for a Virtual Machine .................................................................................................................... 472 Host Key Options............................................................................................................................................................... 473 VMware Server ........................................................................................................................................................................ 473 VMware Server Guest Operating Systems Supported ......................................................................................................... 474 VMware Server Host Operating Systems Supported........................................................................................................... 475 Requirements for VMware Server....................................................................................................................................... 475 How to Download VMware Server.................................................................................................................................... 476 How to Install VMware Server........................................................................................................................................... 476 Creating a Virtual Machine and Installing a Guest OS ............................................................................................................ 478 Installing an OS from an ISO Image................................................................................................................................... 482 Configuring Networking Options....................................................................................................................................... 482 Configuring Hardware Options.......................................................................................................................................... 483 Installing VMware Tools .................................................................................................................................................... 484 Other Virtual Systems .............................................................................................................................................................. 486 VMware Workstation......................................................................................................................................................... 486 Microsoft Hyper-V ............................................................................................................................................................. 487 GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 16. xi Table of Contents∞∞xi INTRODUCTION INTRODUCTION MCTS Guide to Microsoft® Windows Server® 2008 Network Infrastructure Configuration provides in-depth coverage of the 70-642 certification exam objectives and focuses on the skills needed to manage a Windows Server 2008 network. With more than 100 hands-on activities and dozens of skill-reinforcing case projects, you’ll be well prepared for the certification exam and learn valuable skills to perform on the job. After you finish this book, you’ll have an in-depth knowledge of Windows Server 2008, TCP/IP networking, Domain Name System, and related services, such as Dynamic Host Configuration Protocol, Active Directory Domain Services, File Services, Printers and Print Services, Network Policy and Access Services, security, and managing the Windows Server 2008 network infrastructure. Several new features of Windows Server 2008 are also covered including Server Core, Windows Backup, and Server Manager. Intended Audience MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration is intended for people who want to learn how to configure and manage a Windows Server 2008 network and are considering becom- ing MCTS and MCITP certified. The focus on network infrastructure configuration gives new and experienced users alike the opportunity to study in depth the core technologies in Windows Server 2008. This book serves as an excellent text for classroom teaching, but self-paced learners will also find that the clear explanations and chal- lenging activities and case projects serve them equally well. Although this book doesn’t assume previous experi- ence with Windows servers, it does assume a familiarity with current Windows OSs, such as Windows XP or Vista. Networking knowledge equivalent to an introductory networking course is highly recommended. This book includes: • A Windows Server 2008 Enterprise Edition evaluation DVD is bundled with the book. It can be installed on a computer or in a virtual machine using Microsoft Hyper-V, Microsoft Virtual Server, VMware Workstation, VMware Player, or VMware Server. • Step-by-step hands-on activities walk you through tasks ranging from a basic Windows Server 2008 instal- lation to complex multiserver network configurations involving DHCP, DNS, and many other services. All activities have been tested by a technical editor, reviewers, and validation experts. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 17. Introduction xii • Extensive review and end-of-chapter materials reinforce your learning. • Challenging case projects build on one another and require you to apply the concepts and technologies learned throughout the book. • Coverage of features new to Windows Server 2008, including Server Core and Server Manager, is provided as well as new roles and features, such as the Network Policy Server, Windows Backup, and improved installation options including the Windows Automated Installation Kit and ImageX. • Abundant screen captures and diagrams visually reinforce the text and hands-on activities. • A list of 70-642 exam objectives is cross-referenced with chapters and sections that cover each objective. Chapter Descriptions This book is organized to familiarize you with Windows Server 2008 features and technologies and then provide in-depth coverage of network infrastructure configuration and its related services. The book wraps up by dis- cussing server management and monitoring. The 70-642 exam objectives are covered throughout the book, and you can find a mapping of objectives and the chapters in which they’re covered on the inside front cover, with a more detailed mapping in Appendix A. The following list describes this book’s chapters: • Chapter 1, “Introduction to Windows Server 2008,” begins by describing the role of clients, servers, and Windows network models, and compares the Windows Server 2008 editions. Next, you’re given an overview of Windows Server 2008 new technologies, such as Network Access Protection, Windows Remote Management, and Group Policy preferences. New server roles and features in Windows Server 2008 are also described. Finally, the chapter introduces the Windows Server 2008 interface. • Chapter 2, “Installing Windows Server 2008,” discusses the details of preparing to install the Full version of a Windows Server 2008 installation, including deployment improvements in Windows Server 2008. Next, the chapter shows how to install Windows Server 2008 with Server Core, the newest installation option. The chapter also discusses how to configure Full and Server Core versions of Windows Server 2008 for initial use. • Chapter 3, “Networking with Windows Server 2008,” begins by introducing networking and then dis- cusses network addressing with TCP/IP. The chapter compares how to configure clients for IPv4 and IPv6 and how to upgrade your network to IPv6. It also explains troubleshooting considerations on a TCP/IP network. • Chapter 4, “Installing and Configuring the Dynamic Host Configuration Protocol,” explores the basics of DHCP, including its components and processes. The chapter explains how to install DHCP in a Windows Server 2008 environment and configure a DHCP server. DHCP administration and troubleshooting DHCP are also discussed. • Chapter 5, “Introduction to DNS in Windows Server 2008,” introduces the Domain Name System. The chapter explains how to configure DNS clients and install DNS in Windows Server 2008. Finally, the chap- ter examines the role of DNS zones on a Windows Server 2008 network. • Chapter 6, “Managing and Administering DNS in Windows Server 2008,” introduces Active Directory Domain Services. It examines how to manage and troubleshoot DNS in detail. It also explores the Windows Internet Name Service and new DNS features, including DNS on Server Core, support for IPv6, and link-local multicast name resolution. • Chapter 7, “Configuring File Services in Windows Server 2008” provides a detailed look at File Services. After introducing the topic, the chapter explains how to install the File Server role. Access Control and its role in File Services are also explored. The chapter also discusses the Distributed File System and explains how to manage Windows Server 2008 with the File System Resource Manager. • Chapter 8, “Introduction to Printers in a Windows Server 2008 Network,” focuses on Windows Server 2008 printing services. The chapter begins by examining the Windows Printer model for Windows Server 2008. It then explains how to deploy printers and print services and configure printer resources. Finally, the chapter discusses managing printers and print services. • Chapter 9, “Network Policy and Access Services in Windows Server 2008,” provides an overview of con- figuring routing in Windows Server 2008. It also discusses how to configure Remote Access Services in Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 18. Introduction xiii Windows Server 2008. The chapter also introduces you to Network Policy Server and explains wireless access configuration in Windows Server 2008. • Chapter 10, “Securing Windows Server 2008,” surveys security management in Windows Server 2008. The chapter explores the Encrypting File Services and using BitLocker. It also discusses using the Microsoft Baseline Security Analyzer as a basic security tool. Internet Protocol security is also discussed along with network authentication. The chapter also provides an introduction to Network Access Protection. • Chapter 11, “Managing and Monitoring a Windows Server 2008 Network Infrastructure,” explains how to manage Windows Server 2008. The chapter explains how to update Windows Server 2008 and use the Microsoft Baseline Security Analyzer 2.1 to measure network performance. Monitoring Windows Server 2008 is also discussed. Finally, the chapter explains how to back up and restore data in Windows Server 2008. • Appendix A, “MCTS 70-642 Exam Objectives,” maps each 70-642 exam objective to the chapter and sec- tion where you can find information on that objective. • Appendix B, “Virtual Machine Instructions for Selected Activities,” provides instructions for performing selected activities in VMware Workstation or Microsoft Virtual PC. Features This book includes the following learning features to help you master configuring a Windows Server 2008 net- work and the 70-642 exam objectives: • Chapter objectives—Each chapter begins with a detailed list of the concepts to be mastered. This list is a quick reference to the chapter’s contents and a useful study aid. • Hands-on activities—More than 100 hands-on activities are incorporated in the book, giving you practice in setting up, managing, and troubleshooting a Windows Server 2008 server, with emphasis on network infrastructure configuration. The activities give you a strong foundation for carrying out server administra- tion tasks in the real world. • Screen captures, illustrations, and tables—Numerous screen captures and illustrations of concepts aid you in visualizing theories and concepts and seeing how to use tools and software features. In addition, tables are used often to provide details and comparisons of practical and theoretical information and can be used for a quick review. • Chapter summary—Each chapter ends with a summary of the concepts introduced in the chapter. These summaries are a helpful way to recap and revisit the material covered in the chapter. • Key terms—All terms in the chapter introduced with bold text are gathered together in the Key Terms list at the end of the chapter. This list gives you a method for checking your understanding of all terms intro- duced. • Review questions—The end-of-chapter assessment begins with review questions that reinforce the concepts and techniques covered in each chapter. Answering these questions helps ensure that you have mastered important topics. • Case projects—Each chapter closes with one or more case projects. Many of the case projects build on one another, as you take a small startup company to a flourishing enterprise. • On the DVD—The DVD includes a free 120-day evaluation copy of Windows Server 2008, Enterprise Edition. Text and Graphics Conventions Additional information and exercises have been added to this book to help you better understand what’s being discussed in the chapter. Icons throughout the text alert you to these additional materials: Tips offer extra information on resources, how to solve problems, and time-saving short- cuts. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 19. Introduction xiv Notes present additional helpful material related to the subject being discussed. The Caution icon identifies important information about potential mistakes or hazards. Each Hands-on activity in this book is preceded by the Activity icon. Case Project icons mark the end-of-chapter case projects, which are scenario-based assign- ments that ask you to apply what you have learned in the chapter. Test Preparation Software CD MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration includes the exam objec- tives coverage map from Appendix A as well as CertBlaster test preparation questions that mirror the look and feel of the MCTS exam 70-642. The unlock code for the CertBlaster questions is c_642. For more information about dti test prep products, visit the Web site at www.dtipublishing.com Instructor’s Resources The following supplemental materials are available when this book is used in a classroom setting. All the supple- ments available with this book are provided to instructors on a single CD, called the Instructor’s Resource CD (ISBN 1-423-90269-6). • Electronic Instructor’s Manual—The Instructor’s Manual that accompanies this book includes additional instructional material to assist in class preparation, including suggestions for classroom activities, discus- sion topics, and additional activities. • Solutions—The instructor’s resources include solutions to all end-of-chapter material, including review questions, hands-on activities, and case projects. • ExamView—This textbook is accompanied by ExamView, a powerful testing software package that allows instructors to create and administer printed, computer (LAN-based), and Internet exams. ExamView includes hundreds of questions that correspond to the topics covered in this book, enabling students to generate detailed study guides that include page references for further review. The computer-based and Internet testing components allow students to take exams at their computers and also save the instructor time by grading each exam automatically. • PowerPoint presentations—This book comes with Microsoft PowerPoint slides for each chapter. They are included as a teaching aid for classroom presentation, to make available to students on the network for chapter review, or to be printed for classroom distribution. Instructors, please feel free to add your own slides for additional topics you introduce to the class. • Figure files—All the figures and tables in the book are reproduced on the Instructor’s Resource CD in bitmap format. Similar to the PowerPoint presentations, they are included as a teaching aid for classroom presentation, to make available to students for review, or to be printed for classroom distribution. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 20. Introduction xv System Requirements Hardware (Without Using Virtualization) Minimum two computers per student that meet the following requirements: • 2 GHz or faster CPU • 512 MB or more RAM (preferably more when using a Vista client for some activities) • 15 GB or more disk space • DVD-ROM drive • Super VGA or higher resolution monitor • Mouse or pointing device • Keyboard • Two Network interface cards including one connected to the classroom, lab, or school network • Printer (to practice setting up a network printer) Hardware (Using Virtualization) One computer per student to act as the host machine that meets the following minimum requirements: • Windows XP Professional or Windows Vista • 2.4 GHz CPU • 2 GB or more RAM (more is always better with virtualization) • 40 GB or more disk space • DVD-ROM drive • Super VGA or higher resolution monitor • Mouse or pointing device • Keyboard • Two Network interface cards including one connected to the classroom, lab, or school network • Printer (to practice setting up a network printer) Software • Windows Server 2008 Standard or Enterprise Edition (included with DVD in the book) • Windows Vista: Any edition except Home Edition (an evaluation virtual machine can be downloaded from the Microsoft Web site) Virtualization Windows Server 2008 and Windows Vista can be loaded into a virtual server environment, such VMware Workstation or Server, Microsoft Virtual PC, or Microsoft Hyper-V. The use of virtualization is highly recommended. Acknowledgments First, the author would like to thank Nick Lombardi and Michelle Cannistraci at Cengage for the opportunity to write this book. Thanks go out to Lisa Ruffolo for her super editing skills and keeping me on track. Thanks to the reviewers for their insight and direction during the writing process. A big thanks goes out to all of my stu- dents for whom this book is for. Last, but not least, thanks to my wife, Melanie, along with the rest of my friends and family for their understanding and patience during the writing of this book. Without their support, none of this would be possible. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 21. Introduction xvi Thanks also to the peer reviewers, who provided thoughtful advice, constructive criticism, and helpful encour- agement: Mark Allison, Keiser University; Brian Bridson, Baker College of Flint; Robert Sherman, Sinclair College; and Daniel Ziesmer, San Juan College. About the Author Michael Bender is an Information Technology instructor at Madison Area Technical College in Microsoft tech- nologies. He has taught Windows Workstation (XP/Vista), Windows Server 2003, and Exchange 2003/2007, and is the lead developer of Windows Server and Exchange curriculum for the Computer Systems Administration Associate Degree program. Mike's background includes over 10 years of experience in System Administration and Technical training covering all Microsoft platforms from Windows 95 to Server 2008. Mike is a Microsoft Certified Trainer, an MCSE on the NT 4.0/2000/2003 platforms, and an MCITP on Windows Server 2008. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 22. 1 After reading this chapter and completing the exercises, you will be able to: • Discuss clients, servers, and Windows network models • Differentiate among the editions of Windows Server 2008 • Identify Windows Server 2008 hardware requirements • Discuss the new Windows Server 2008 technologies • Describe the new roles and features in Windows Server 2008 • Navigate the Windows Server 2008 interface chapter1 chapter1 Introduction to Windows Server 2008 Introduction to Windows Server 2008 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 23. Chapter 1 Introduction to Windows Server 2008 2 After five years of development, Microsoft released the latest version of Windows Server: Windows Server 2008. This much-anticipated release includes many new and innovative features designed for businesses of all sizes. This book explores Windows Server 2008 networking and helps you prepare for the MCTS/MCITP Exam 70-642: Windows Server 2008 Network Infrastructure, Configuring. To prepare for this exam and the job responsibilities related to it, you need to develop extensive knowledge of Windows Server 2008. This book focuses on configuring, managing, and troubleshooting networking features and services in a Windows 2008 Server environment. This chapter introduces you to Windows networking models to lay a foundation for the rest of the book. It continues by discussing the editions of Windows Server 2008, identifying the hardware requirements for installing Windows Server 2008, and describing how to perform a Full installation and Server Core installation. The chapter also explores the new roles and fea- tures of Windows Server 2008. Finally, the chapter tours the Windows Server 2008 user inter- face (UI). Clients, Servers, and Windows Network Models You are probably familiar with client computers running operating systems (OSs) such as Windows XP or Windows Vista. A client operating system is designed as a user interface, usu- ally graphical, for users to perform tasks such as word processing, researching information on the Internet, and exchanging e-mail. Clients generally initiate requests for services from a local or network resource. For example, users in an office use client computers on their desktops to log onto the network and perform their work. The purpose of a network is to allow users to access resources using one or more computers. These resources can be printers, applications, documents, or even the Internet. Servers are the computers that provide these services and resources to network users and that have an operating system such as Windows Server 2008. Running in the background, Windows Server 2008 servers wait for requests from clients. When it receives a request, the server performs its tasks and then returns the information to the client. Rarely does a user interact directly with a server without a client intermediary. This type of inter- action is known as client-server computing and is the basis for all types of Microsoft network models. This chapter examines the following Windows network models: • Workgroup model • Domain model with Active Directory Workgroup Model A workgroup is a network of computers that allow each other access to their files, printers, Internet connection, or other resources. Although Microsoft defines a workgroup as a peer-to- peer computing network, workgroups do share some of the characteristics of a client-server com- puting network. Even with peers, which are other computers in the workgroup, one computer often acts as a client and another as a server, such as when two colleagues share a folder of doc- uments located on a single computer. Within small environments, usually up to 10 computers, workgroups have a number of ben- efits. In a workgroup, computers can easily share resources. Also, a workgroup does not require a server or other network resources to function. Because servers can be quite expensive, the workgroup model may be a cost-effective solution for small businesses or home environments. However, workgroups have a few drawbacks, especially for larger networks. Because of the decentralized nature of workgroups, administering and managing computers and resources can be a challenge. Each member of a workgroup is responsible for controlling access to its own resources. For example, if you are managing a company workgroup with five computers and five users, you have to create 25 user accounts in the network. If a user leaves your company, you need to remove the user’s account from each computer. Because of these drawbacks, Microsoft recommends limiting your workgroup environments to a maximum of 10 computers. By default, all Windows Server 2008 computers are placed in a workgroup named WORK- GROUP. Each computer accessing a network is defined by name, Internet Protocol (IP) address, Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 24. Clients, Servers, and Windows Network Models 3 and membership status, which is either a single workgroup or a domain (discussed next). Membership in a workgroup allows users to easily find shared resources, such as files and print- ers hosted by peers. In addition, a computer can access resources located on computers outside the workgroup. A network can have more than one workgroup. Domain Model with Active Directory In the client-server computing model, a domain is a group of users and computers that are man- aged by the same security database. In Windows Server 2008, Active Directory Domain Services (AD DS) is the technology that runs the domain security database. Servers that host this data- base are called domain controllers (DCs). Domains provide a centralized authentication and administration for users, groups, and computers, which are generally referred to as objects in such an Active Directory (AD) environment. In the domain network model, users and computers can access shared resources only if they have the appropriate permissions to do so. In addition, access permissions can be defined only for users and computers that are members of the domain and contained in the central domain security database. First introduced with the release of Windows 2000 Server, AD continues the concept of domains started in Windows NT but improves on it. In Windows NT, DCs were one of two types: primary or backup. A primary domain controller (PDC) held readable and writable copies of the security database. A Windows NT network could have only one PDC. This database was replicated as a read-only copy to backup domain controllers (BDCs). BDCs could process client requests for authentication; however, they could not make changes, such as deleting or adding a user. This had to be done at the PDC. Thus, Windows NT had one writable database and a single point of failure. DCs in Active Directory domains use multimaster replication, which means all DCs can update and replicate the directory database. This provides higher fault tolerance in a domain that has more than one DC. Active Directory domains also use the Domain Name System (DNS) for name resolution. DNS is a Transmission Control Protocol (TCP)/IP-based standard for resolving computer names with IP addresses. For example, when you enter www.microsoft.com in your Web browser, your computer can connect to the Web site by requesting the IP address for www.microsoft.com from a server running DNS. (DNS is discussed in detail in Chapter 6.) Along with the use of DNS and multimaster DCs, Active Directory introduced Group Policy. Group Policy is a way to set up specific configurations for users and computers within an Active Directory domain. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory service containers: sites, domains, and organizational units. The settings within GPOs are then evaluated by the affected targets using the hierarchical nature of Active Directory. Consequently, because it allows you to manage user and computer objects, Group Policy is one of the top reasons to deploy Active Directory. A single network can have many domains. However, each domain must maintain an Active Directory database for managing its member objects. As with workgroups, if you are a user on a domain network, you can access resources outside your domain, but you will be asked for credentials—a user ID and password—to access outside systems. If the domain you are access- ing is in the same forest, your credentials are required only once and follow you as long as you are logged on. A forest is a network of domains related to each other by relationships known as trusts. Some domains have a parent-child relationship where they share a contiguous name- space, such as us.microsoft.com and microsoft.com. These domains are part of the same tree within a forest. Other domains do not share a contiguous namespace but establish trust rela- tionships so they can access resources from each other. An example of this is the related com- panies BenderTechnology.com and BenderResources.com. Each has its own namespace, but trusts allow them to share resources and information. Trusts between Active Directory domains in a tree are created automatically when you create domains in Windows Server 2008. These are called transitive trusts. However, you must create trusts between separate trees in a forest manually. In Windows NT domains prior to Windows 2000, administrators created all trusts manually. 1 1 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 25. Chapter 1 Introduction to Windows Server 2008 4 Windows Server 2008 Editions From the small business with a few employees to the Fortune 100 multinational company, an edition of Windows Server 2008 serves every business need. Each edition provides shared and unique sets of services for administrators. Microsoft offers three general editions of Windows Server 2008: Enterprise, Datacenter, and Standard. Two additional editions are designed for special-purpose server applications: Web Server and HPC Server. All these editions are available for 32-bit and 64-bit computers except HPC Server, which is available only for 64-bit machines. Standard, Enterprise, and Datacenter editions are also provided in two types of installations: Full installation (all options and features) or Server Core (minimal options). Table 1-1 displays the differences among the 32-bit Windows Server 2008 editions. Many of these features are explored in this book. Each edition is described in more detail in the follow- ing sections. Table 1-1 Features in Windows Server 2008 editions Feature Name Enterprise Datacenter Standard Web ADFS Web Agent X Directory uIDM X X X Desktop Experience X X X X Windows Clustering X X X X Windows Server Backup X X X X Windows Network Load Balancing X X X X Simple TCP/IP Services X X X X SMTP X X X X Subsystem for UNIX-Based Applications X X X X Telnet Client X X X X Telnet Server X X X X Microsoft Message Queuing X X X X RPC Over HTTP Proxy X X X X Windows Internet Name Service X X X X Wireless Client X X X X Windows System Resource Manager X X X X Simple SAN Management X X X X LPR Port Monitor X X X X Windows Foundation Components for WinFX X X X X BITS Server Extensions X X X X iSNS Server Service X X X X BitLocker Drive Encryption X X X X Multipath IO X X X X Removable Storage Management X X X X TFTP X X X X SNMP X X X X Server Admin Pack X X X X RDC X X X X Peer-to-Peer Name Resolution Protocol X X X X Recovery Disk X X X X Windows PowerShell X X X X Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 26. Windows Server 2008 Editions 5 Windows Server 2008, Standard Edition Designed for smaller environments and single-purpose installations, Windows Server 2008 Standard edition (SE) is the entry-level server edition that provides everything you most likely need to run your network. It works as a single domain server for a small business or a single file/appli- cation server in larger environments. This edition includes most of the features and support of the other editions, including the file and print services, Internet Information Services (IIS) 7, Active Directory, the distributed and encrypting file systems, and various management tools. A notable addition is Network Load Balancing, which was previously available only in Enterprise and Datacenter editions. Windows Server 2008, Enterprise Edition Windows Server 2008 Enterprise edition (EE) provides the following features not available with SE: • Significant increase in maximum allowable memory • Active Directory Federation Services (discussed later in this chapter) • Failover clustering • Installation of up to four virtual machines on each physical host • Hot-add memory The decision to use the Enterprise edition instead of the Standard edition depends on two factors: expense and functionality. Small and medium-sized businesses do not often need the additional features of the Enterprise edition, so Standard is a good choice for them. Also, large businesses not requiring these features can take advantage of a significant monetary savings. However, if an organization plans to use failover clustering, Enterprise is the best choice. Windows Server 2008, Datacenter Edition Datacenter edition (DE) includes all the features offered in the Enterprise edition with a few additions, including the following: • The ability to run up to 32 processors • The ability to hot-add and replace processors • Installation of unlimited virtual machines on each physical host For most instances where plans include hosting more than four virtual machine guests on a server, Datacenter is often the most economical choice. Datacenter is also licensed per processor, so each processor installed in a system needs a Datacenter license, which involves additional expense. Microsoft does not currently differentiate among single, dual, and quad- core processors for licensing. All are considered a single processor. This might be a factor in hardware decisions when choosing between dual and quad-core systems. Windows Web Server 2008 Windows Web Server 2008 continues the Microsoft tradition of providing an OS edition designed specifically as a single-purpose Web server. Because the purpose of this server is host- ing Web sites and applications, the functionality of the system is reduced to accommodate these services. Many server roles, including Dynamic Host Configuration Protocol (DHCP), DNS, and file server, are not available. Web Server 2008 includes the reengineered IIS 7.0, ASP.NET, and the .NET Framework as part of the installation. Web Server differs from other editions in that it does not require client access licenses (CAL) for users. You can also install the database of your choice without limitations on user access to the Web site and its related data. 1 1 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 27. Chapter 1 Introduction to Windows Server 2008 6 The Web Server 2008 edition is available only as a 32-bit and a 64-bit OS in the Full ver- sion only. Server Core does not currently support the .NET Framework and ASP.NET. Windows HPC Server 2008 Windows HPC Server 2008 is designed for high-performance computing (HPC) applications. This edition accommodates up to thousands of processing cores because it is built on the Server 2008 64-bit architecture model. For more information on Microsoft HPC Server 2008, see www.microsoft.com/hpc. Windows Server 2008, Without Hyper-V Standard, Enterprise, and Datacenter editions for 64-bit servers are offered with or without Hyper-V, which lets you consolidate multiple server roles as separate virtual machines running on a single physical machine. Hyper-V also lets you efficiently run different operating systems— such as Windows and Linux—in parallel on a single server. Currently, the retail price for Windows Server 2008 without Hyper-V is slightly less than the price of Server 2008 with Hyper- V. Note that the 32-bit versions of these SE, EE, and DE do not support Hyper-V. Windows Server 2008 for Itanium-Based Systems Standard, Enterprise, and Datacenter editions are available for servers using Intel Itanium processors. Itanium processors use a different architecture from other 32-bit and 64-bit proces- sors. For more information on Intel Itanium processors, see www.intel.com. Windows Server 2008 Hardware Requirements Microsoft provides minimum and recommended hardware requirements for installing its oper- ating systems. The minimum requirements let you install and run a system using minimal resources and services. Table 1-2 lists the Windows Server 2008 hardware requirements, includ- ing the minimum, recommended, and maximum requirements. Note the significant differences between memory capabilities in 32-bit processor versions and 64-bit processor versions. Table 1-2 Windows Server 2008 hardware requirements Component Requirement Processor Minimum: 1 GHz (x86 processor) or 1.4 GHz (x64 processor) Recommended: 2 GHz or faster Note: An Intel Itanium 2 processor is required for Windows Server 2008 for Itanium-based systems Memory Minimum: 512 MB RAM Recommended: 2 GB RAM or greater Maximum (32-bit systems): 4 GB (Standard) or 64 GB (Enterprise and Datacenter) Maximum (64-bit systems): 32 GB (Standard) or 2 TB (Enterprise, Datacenter, and Itanium-based systems) Available disk space Minimum: 10 GB Recommended: 40 GB or greater Note: Computers with more than 16 GB of RAM require more disk space for paging, hibernation, and dump files Drive DVD-ROM drive Display and peripherals Super VGA (800 ⫻ 600) or higher-resolution monitor, keyboard, Microsoft mouse or compatible pointing device Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 28. New Technologies in Windows Server 2008 7 32-Bit and 64-Bit Processors As noted earlier, Windows Server 2008 is available for both 32-bit and 64-bit processor archi- tectures. Although the role and feature sets of the versions are the same, they have noticeable dif- ferences in two areas: • Hardware limits • Driver and application support The 64-bit architectures have a greater theoretical limit for processing data. Basically, a 64-bit processor can handle twice the amount of data of a comparable 32-bit product. Because the 64-bit version of Windows Server 2008 cannot run 16-bit Windows applications or use 32-bit device drivers, you cannot run some legacy applications and hardware with the 64-bit version. For legacy applications, virtual technologies are an excellent option. Windows Server 2008 is the last server operating system from Microsoft available in a 32-bit version. New Technologies in Windows Server 2008 Besides providing a new user interface, Windows Server 2008 also offers a new way of manag- ing and securing your Windows network. Built on the same code base as Windows Vista, Windows Server 2008 includes many improvements to previous server operating systems along with new functionality. This section introduces the following technologies and enhancements, which are important to anyone configuring and administering a Windows Server 2008 network: • Improved installation process • Hyper-V • Server Core • TCP/IP improvements • Network Access Protection • Server Manager • Windows Remote Management • PowerShell • Group Policy preferences Before exploring these technologies, install Windows Server 2008 Enterprise Edition by com- pleting Activity 1-1. Chapter 2 provides a more detailed description of installing Server 2008. Activity 1-1: Installing Windows Server 2008, Enterprise Edition Time Required: 30 to 60 minutes (depending on hardware configuration of lab environment) Objective: Install a working version of Windows Server 2008. Description: As the system administrator for your company, you have just received an evalua- tion copy of Windows Server 2008, Enterprise edition. You want to install the software so you can review the new features it offers. In this activity, you install Server 2008, Enterprise edition. In all the activities, your instructor might give you additional steps to per- form depending on your lab environment. All the activities in this chapter are appropriate for physical machines and virtual machine applications. Before completing this activity, verify that your environment meets the hardware requirements in Table 1-2. 1 1 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 29. Chapter 1 Introduction to Windows Server 2008 8 1. Place your Windows Server 2008 DVD in the DVD drive of your computer and then restart or power on your computer. 2. If prompted by the startup screen, press any key to boot from the DVD. You are prompted only if the computer has an existing operating system. The first part of the installation pro- gram starts. 3. When the first Install Windows window appears, confirm your time and currency format and that the keyboard layout is correct, and then click Next. The next Install Windows window appears, shown in Figure 1-1, to start the installation. 4. Click Install now. The Type your product key for activation window opens. See Figure 1-2. 5. Enter your product key if you have one and are required to enter the key. You might be able to install Windows Server 2008 without a product key. Depending on the type of installation media and license model you are using, you may not be prompted for a product key. Skip to Step 7. 6. Click the Automatically activate Windows when I’m online check box to remove the check- mark and then click Next. If you did not enter a product key, a message appears asking whether you want to enter a key. Click No to continue installing without a product key. 7. In the next window, select the version of Server 2008 you will be installing. For this activ- ity, choose Windows Server 2008 Enterprise (Full Installation) and then check the I have selected the edition of Windows that I purchased box. See Figure 1-3. Click Next. Figure 1-1 Preparing to install Windows Server 2008 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 30. New Technologies in Windows Server 2008 9 1 1 Figure 1-2 Type your product key for activation window Figure 1-3 Selecting the operating system to install Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 31. Chapter 1 Introduction to Windows Server 2008 10 8. In the next window, read the Microsoft Software License Terms, check the I accept the license terms box, and then click Next. 9. In the next window, click Custom to perform a custom installation, which is the appropri- ate option for performing a new installation. Notice that the choice to upgrade is not available. (Chapter 2 covers upgrading Windows Server 2008.) 10. If necessary, delete any existing partitions by completing the following steps in the Where do you want to install Windows? window: a. Click the partition you want to delete. b. Click the Drive options (advanced) link to display partitioning options. c. Click Delete. d. Click OK to confirm you want to delete the partition and lose all its data. 11. Click Disk 0 Unallocated Space and then click Drive options (advanced) to perform disk par- titioning operations. Click New. Enter 30000 in the Size text box after ensuring that you have at least 10 GB of unallocated disk space. Click Apply. Figure 1-4 shows an example of completing these changes. 12. Select Disk 0 Partition 1 and then click Format. Confirm that you understand that all data will be lost when you format the partition by clicking OK. Click Next. Windows performs a number of tasks that do not require your input, as shown in Figure 1-5. This portion of the installation takes approximately 30 minutes depending on the hardware setup of your lab computer. The system will reboot one or more times during the installation. If you are prompted to press a key to start from DVD, ignore the message. Figure 1-4 Installation location options Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 32. New Technologies in Windows Server 2008 11 1 1 Figure 1-5 Installing Windows Server 2008 13. When advised that you need to change your password before logging on for the first time, click OK. Use P@ssw0rd as your new password. Enter the password twice to ensure it is cor- rect and then click the arrow to submit the new password. When prompted that your pass- word has changed, click OK. Windows Server 2008 starts for the first time, checks for and applies any updates, and then displays the Initial Configuration Tasks window shown in Figure 1-6, which remains displayed until you complete all the tasks. Then you can check the Do not show this window at logon box and click the Close button. For now, you only need to set the time zone and computer name, which you do in Activity 1-2. 14. Leave the window open for the next activity. Improved Installation Process Introduced in Windows Vista, the new, streamlined installation process that Windows Server 2008 uses requires minimal user input. You no longer have to wait for the installation program to ask for networking information, regional settings, and other settings. You now provide this information using the Initial Configuration Tasks window, which opens by default the first time you log onto Windows Server 2008. Activity 1-2: Completing Initial Configuration Tasks Time Required: 20 minutes Objective: Perform system configuration tasks after installation of Windows Server 2008. Description: You just completed installing Windows Server 2008, Enterprise edition. Now you want to configure the software so you can use it regularly. In this activity, you use the Initial Configuration Tasks window to change the system time, time zone, and computer name. 1. The Initial Configuration Tasks window should still be open. If it is not, log onto your system by pressing Ctrl+Alt+Del, enter P@ssw0rd as your password, and then press Enter. 2. In the Initial Configuration Tasks window, click Set time zone. The Date and Time dialog box opens. Click Change time zone, select your time zone in the Time zone drop-down list, and then click OK. If the date and time are incorrect, click Change date and time, change the time to your local time, and then click OK. Click OK to accept the changes and close the Date and Time dialog box. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 33. Chapter 1 Introduction to Windows Server 2008 12 Ask your instructor if you are not sure of the proper time zone for your location. 3. In the Initial Configuration Tasks window, click Provide computer name and domain. The System Properties dialog box opens. 4. On the Computer Name tab, click Change. The Computer Name/Domain Changes dialog box opens. 5. Replace the current computer name with MSN-SRV-0XX, where XX is a number supplied by your instructor. Your number should be unique so each student has a different server name. 6. Click OK to accept the new name. A message appears, informing you that a restart is needed. Click OK to close message box. 7. Click Close to close the System Properties dialog box. When a Microsoft Windows dialog box appears, click Restart Now to restart your system. 8. After your system restarts, log on by pressing Ctrl+Alt+Del. Enter P@ssw0rd as your pass- word and then press Enter. 9. When the Initial Configuration Tasks window opens, click the Do not show this window at logon check box. If you need to open the Initial Configuration Tasks window later, click the Start button, type OOBE.exe in the Start Search box, and then press Enter. You can also complete all of the initial configuration tasks using Server Manager, which you will explore later in this chapter. (Link to set your time zone) (After completing all the setup tasks, click this box) Figure 1-6 Initial Configuration Tasks window Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 34. New Technologies in Windows Server 2008 13 10. Click Close to close the Initial Configuration Tasks window. 11. Press Ctrl+Alt+Del and then click Log off, as shown in Figure 1-7, to log off. Hyper-V Virtualization is a popular topic in information technology because it conserves hardware resources. Using blade servers, virtual machines, and network storage are ways to consolidate data centers. In a nutshell, virtualization allows you to run one or more separate instances of an OS within a single host OS. Before virtualization, many companies had data centers full of servers that used only 5 to 10 percent of their resources. This occurs because installed applica- tions often need to run on their own system because of performance or third-party vendor sup- port requirements. Virtualization allows organizations to consolidate these physical systems onto high-powered servers (known as the host system). Each OS runs in its own virtual instance to take advantage of the hardware resources of the host system. Microsoft’s entry into the server virtualization arena is called Hyper-V (formerly code-named Viridian). It is available with your initial investment in the 64-bit editions of Windows Server 2008 or as add-on application. Server Core For years, Windows administrators have battled to harden systems and roll out implementa- tions of Windows Server without unnecessary roles and services running. Server Core, Microsoft’s newest role in the Windows Server family, simplifies this task. Server Core is a stripped-down installation of Windows Server 2008 with a set of available roles and services more limited than in the Full version. To minimize the attack surface, or areas of the system that could expose it to security breaches, much of the UI has been removed. Server Core pro- vides a single command-line window and tools such as the Registry Editor available for admin- istration. Although Microsoft considers Server Core to be a role instead of a separate edition, Server Core can function as a separate entity. Server Core has a base set of installable roles and services. As a role, Server Core can be installed on Standard, Enterprise, and Datacenter edi- tions of Windows Server 2008 but only during initial installation of the operating system. You cannot upgrade from Server Core to the Full version unless you perform a complete operating system reinstallation. 1 1 Figure 1-7 Ctrl+Alt+Del options screen Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 35. Chapter 1 Introduction to Windows Server 2008 14 Network Access Protection Network Access Protection (NAP) is a new platform for Windows Server 2008, Windows Vista, and Windows XP Service Pack 3 (SP3). NAP helps to protect networks, both public and private, from malware such as viruses and spyware. Threats come from many sources, including the fol- lowing typical examples: • Employees accessing the Internet from work and inadvertently install Trojan horses • Remote access to connections from external networks that create a gateway for viruses • Guest computers accessing an internal network that introduce malware to the network At its core, NAP queries the health state of computers accessing a network, determines whether this state meets defined corporate health policies, and takes appropriate administrative action. For example, a host-based stateful firewall such as the Windows Firewall in Windows Server 2008, Windows Vista, Windows XP SP2, and Windows Server 2003 SP1 or SP2 provides a layer of defense against malicious inbound or outbound traffic. With NAP, you can define a corporate health policy that enables the Windows Firewall to your specifications. Should a user turn off the Windows Firewall on a NAP-compatible client computer, the local health policy will turn it back on to remain compliant. NAP is designed to work with third-party hardware and software. One important alliance is with Cisco Systems, a leader in networking hardware. Microsoft and Cisco have created the alliance so that NAP can interact with Network Access Control (NAC), a feature of Cisco networking products. NAP and its components are discussed throughout the book and specifically in Chapter 9. TCP/IP Improvements Windows Server 2008 includes a number of improvements to its implementation of TCP/IP. The Next-Generation TCP/IP stack is a new implementation of the TCP/IP protocol stack that con- tains full support for Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6). Part of the new stack is the introduction of Teredo, an IPv6 technology that can encapsulate IPv6 packets as IPv4 packets to allow them to traverse IPv4 networks. Included as well is Receive Window Auto-tuning, a feature of the new stack that optimizes the size of the data packets a server can accept. Windows Server 2008 computers can optimize network connections on the basis of whether the data being transmitted is one large packet of data or multiple small pack- ets of data. Receive-side Scaling works with Receive Window Auto-tuning to optimize traffic flow. This is especially important for networks with 10-GB (or more) local area network speeds. Server Manager One of the most noticeable changes in Windows Server 2008 is the Server Manager console, shown in Figure 1-8. In previous versions of Windows Server, you had to use various windows and commands to configure your server. Server Manager centralizes these tools and allows you to easily manage your server and network. Activity 1-3: Exploring Server Manager Time Required: 10 minutes Objective: Review the features of Server Manager. Description: After installing Windows Server 2008 for your company, you want to become familiar with the tools you can use to configure and manage your server and network. You can explore Server Manager to learn about the tools it provides. Remember that MSN-SRV-0XX is a placeholder for the name your instruc- tor assigned you or the name added in Activity 1-2. 1. Log onto your Windows Server 2008 Enterprise computer, if necessary. If Server Manager does not start, click the Start button and then click Server Manager. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 36. New Technologies in Windows Server 2008 15 2. If necessary, click Server Manager (MSN-SRV-0XX) in the left pane. The Server Summary options appear in the right pane, which are similar to the options provided in the Initial Configuration Tasks window along with other management resources. 3. Click Roles in the left pane. The Roles Summary options appear in the right pane, where you manage roles. 4. Click Features in the left pane. The Features Summary options appear in the right pane, where you manage features. 5. Click Diagnostics in the left pane. The Diagnostics Summary options appear in the right pane, including tools for analyzing your server and diagnosing problems. 6. Click Configuration in the left pane. The Configuration Summary options appear in the right pane, including tools for managing specific configuration settings of your server. 7. Click Storage in the left pane. The Storage Summary options appear in the right pane, including tools for managing disks and backups. 8. Close Server Manager by clicking File on the menu bar and then clicking Exit. PowerShell If you are familiar with Linux or UNIX, you have probably noted that Windows operating sys- tems would benefit from a similar flexible and powerful command-line interface (CLI) with access to the operating system and its inner workings. Windows Server 2008 provides this inter- face with PowerShell. First introduced in Microsoft Exchange Server 2007, PowerShell is built on the Microsoft .NET Framework. PowerShell is becoming the de facto CLI and scripting lan- guage for Microsoft products. For example, in Exchange 2007, all graphical user interface (GUI) consoles are built on PowerShell commands. Although PowerShell has its own scripting language for automation, you can use PowerShell interactively instead of using the GUI-based administra- tive consoles. PowerShell allows you to string together commands, passing the result of one 1 1 Figure 1-8 Summary view in Server Manager Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 37. Chapter 1 Introduction to Windows Server 2008 16 command into the next, in a process known as pipelining. Instead of passing the result as text, PowerShell passes results as .NET objects, which are data packages containing information applications and services can use and are compatible with .NET Framework. For example, pipelining allows you to create a list of all the Microsoft Word (.doc) files in a directory that con- tain a specific character, word, or phrase, and then sort the output according to your preferences. See Figure 1-9. Windows Remote Management As a system administrator, most of your work involves managing servers. Being able to perform this work remotely decreases your administrative task load and allows you to focus on other issues. Windows Remote Management (WinRM) is a new feature that lets administrators manage servers remotely by running management scripts and managing data on remote machines. All connections are handled via the WS-Management protocol, which is a public stan- dard for exchanging management data remotely by any device implementing the protocol, making it non–vendor specific. WinRM has features similar to those of Windows Management Instrumentation (WMI), which was installed on all computers using Windows Millennium Edition (Windows Me), Windows 2000, Windows XP, and Windows Server 2003. WinRM allows you to access, edit, and update data from local and remote computers. You can obtain hardware data from WS-Management protocol implementations running on non-Windows operating systems such as Linux. This allows hardware and operating systems from diverse ven- dors to function together. For example, you can take data from all the computers in a network and store it in a folder on a single computer, thereby creating a centrally located, comprehensive net- work event log. Security risks are minimized by the use of encryption and authentication. Group Policy Preferences Group Policy preferences are a new feature of the Group Policy Management Console (GPMC). Group Policy preferences are applied but not enforced, whereas settings in a Group Policy are enforced, preventing users from making changes. Along with the GPMC and improvements in the Group Policy Editor, Group Policy preferences will help you effectively implement Group Policies within your Active Directory environments. New Roles and Features in Windows Server 2008 Unlike previous versions of Windows Server, Windows Server 2008 makes a distinction between roles and features. In Windows Server 2008, a role is a major function or service that a server per- forms. For example, the File Services role allows the server to share files on a network. You can Figure 1-9 Pipelining in Windows PowerShell Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 38. New Roles and Features in Windows Server 2008 17 also add features, which enhance or support a role or provide a standalone service. For exam- ple, the Windows Server Backup feature allows you to back up and restore data. New Roles in Server 2008 Windows Server 2008 introduces new roles and improves existing roles. Similar to a job role in a company, a server role defines the specific task that a server is responsible for performing. Depending on the security requirements, resource availability, and needs of the business, you can install one or many roles on a single Windows Server 2008 computer. However, some roles are not meant to be hosted together. For example, the Hyper-V role should be installed only by itself because of its secu- rity and function requirements as a virtualization platform in Windows Server 2008. The Full versions of Windows Server 2008 editions (SE, EE, and DC) can have a total of 17 installable roles, 16 roles if you have Server 2008 without Hyper-V. See Figure 1-10. The Server Core versions have a total of eight installable roles. Roles can be organized into three groups—Active Directory, Infrastructure, and Network roles—which are described in the following sections. Table 1-3 shows the 17 roles including the Windows Server 2008 editions for Full installations and the available roles for Server Core. Active Directory Roles Active Directory roles and services provide an integrated way to manage resources, both inter- nal and external. Windows Server 2008 includes five Active Directory roles: • Active Directory Certificate Services • Active Directory Domain Services • Active Directory Federation Services • Active Directory Lightweight Directory Services • Active Directory Rights Management Services 1 1 Figure 1-10 Server roles you can install on Full versions of Windows Server 2008 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 39. Chapter 1 Introduction to Windows Server 2008 18 Active Directory Certificate Services Active Directory Certificate Services (AD CS) provides digital certificate services for users, computers, and organizations. As a security tech- nology, it provides customizable services for creating and managing public key certificates used in software security systems that employ public key technologies. AD CS is often used in tandem with IP, Internet Protocol Security (IPSec), and Encrypting File System (EFS) when these security technologies are deployed in a Windows network. Active Directory Domain Services AD DS stores information on objects such as users and groups on the network. This information is available so users can effectively access resources Table 1-3 Roles in each edition in Windows Server 2008 (including Server Core) Server Role Enterprise Datacenter Standard Server Core Description Active Directory X X X Allows the server to create certificate Certificate Services authorities Active Directory X X X X Stores information about users, Domain Services computers, and other resources on the network; helps administrators manage this information securely and facilitates resource sharing and collaboration between users Active Directory X X Provides Web single-sign-on capabilities Federation Services to authenticate a user to multiple, related Web applications over the life of a single online session Active Directory X X X X Provides data storage and retrieval for Lightweight Directory directory-enabled applications, without Services the dependencies that are required for Active Directory Domain Services Active Directory X X X Allows you to protect information with Rights Management Directory Rights Management Services Application Server X X X Provides an environment for deploying and running custom business applications that are built with Microsoft .NET Framework 3.0 DHCP Server X X X X Automatically provides client computers and other TCP/IP-based network devices with IP addresses DNS Server X X X X Provides name resolution services Fax Server X X X Enables the users in your network to send and receive faxes File Services X X X X Adds file serving capabilities to your server, including replication, shared folder management, file searching, and more Hyper-V X X X X Provides a hypervisor-based virtualization layer Network Policy X X X Helps to protect your network by making and Access Services sure client computers are healthy Print Services X X X X Allows you to share printers among client computers Terminal Services X X X Provides users with the ability to centrally access a desktop and individual applications UDDI Services X X X Provides Universal Description, Discovery, and Integration (UDDI) capabilities for sharing information about Web services Web Services X X X X Provides a Web-serving platform based on the new IIS 7 Windows Deployment X X X Provides a simplified and secure way to Services deploy Windows desktops Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 40. New Roles and Features in Windows Server 2008 19 on the network and collaborate with other users. Network administrators can use AD CS to secure information and resources and to facilitate the sharing of these resources to users. Adding AD DS provides the base for managing your AD objects. Active Directory Federation Services Active Directory Federation Services (AD FS) is a secure framework for allowing simplified identity federation and single sign-on for Web ser- vices, both internal and external. Administrators can use AD FS to secure internal applications and provide single sign-on for users or to provide external business partners access to Web appli- cations and data. Active Directory Lightweight Directory Services You use Active Directory Lightweight Directory Services (AD LDS) to deploy directory-enabled applications, without the dependencies that are required for AD DS. AD LDS allows you to create and manage computer, user, and group objects that appli- cations can use with a DC. Multiple instances of AD LDS directories can exist on a single server. Active Directory Rights Management Services You use Active Directory Rights Management Services (AD RMS) to deploy rights technologies to your network. Used in connec- tion with rights management-aware applications and clients such as Microsoft Office 2007 and Windows Vista, users and administrators can protect intellectual property and data within an organization. Network Roles The network roles, which are covered in detail throughout this text, cover the major network- ing protocols and services provided by Windows Server 2008. You can install the following three Active Directory roles in Server 2008: • DHCP • DNS • Network Policy and Access Services DHCP DHCP is a network standard protocol used to dynamically allocate and track IP addresses for clients on a network. Within a Windows network, DHCP eases the administrative burden of assigning IP addresses to clients, along with helping to populate DNS names via Dynamic DNS. DHCP and its implementation are discussed in depth in Chapter 5. DNS The main goal of DNS is to match a domain name to an IP address based on a client query for information. Basically, DNS acts as a phone book for the Internet by translating easy- to-remember host names such as www.MyExample.com into IP addresses such as 202.76.190.166, a numbering format required by networks to communicate. Besides providing domain names, DNS provides information necessary for services such as e-mail to route elec- tronic messages to the proper destination. These records are called mail exchanger (MX) records. In an Active Directory environment, DNS provides information to clients so they can connect with necessary network services such as domain controllers and global catalog servers. DNS is discussed in detail in Chapter 6. Network Policy and Access Services Network Policy and Access Services (NPAS) provides networking technologies for deploying virtual private networking, dial-up networking, and 802.11-protected wireless access in Windows Server 2008. NPAS allows you to implement the following services on your network: • Network Policy Server • Routing and Remote Access Service • Health Registration Authority • Host Credential Authorization Protocol All these technologies are covered in depth in later chapters. 1 1 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 41. Chapter 1 Introduction to Windows Server 2008 20 Infrastructure Roles Finally, the infrastructure roles provide the major services for clients. Following are the eight Active Directory roles that can be installed in Server 2008: • Terminal Services • Fax Services • Print Services • File Services • Hyper-V • UDDI Services • Web Server (IIS 7) • Windows Deployment Services Terminal Services Terminal Services in Windows Server 2008 provides technologies that enable users to access Windows programs that are installed on a terminal server or to access the Windows desktop itself from almost any computing device. Originally designed as a thin- client terminal to present a working desktop to users, Terminal Services now delivers applica- tions using this same technology, often referred to as remote desktop, remote desktop connection, or remote desktop protocol. Along with application and desktop presentation, Windows Server 2008 allows administrators to publish these services to the Internet using Secure Sockets Layer, or https. This is an excellent security alternative, as administrators have been wary for years of opening TCP port 3389, the Terminal Services default port assignment, to the Internet. Fax Services The Fax Services role in Windows Server 2008 allows administrators to create a fax gateway on their network. This gateway allows clients to send, receive, and manage faxes. Print Services The Print Services role in Windows Server 2008 allows you to create networked printer resources for clients. Also, it provides a central administrative point for printer management. You install the Print Services role in Activity 1-6. It is covered in depth in Chapter 8. File Services The File Services role allows you to share and manage file resources on a net- work. It includes technologies such as the distributed file system, EFS, and the core functional- ity of creating network file shares. You install the File Services role in Activity 1-5. It is covered in depth in Chapter 7. Hyper-V Discussed previously, Hyper-V is the newest virtualization technology from Microsoft. It allows you to deploy multiple virtual machine instances, or guests, within a single Windows Server 2008 server. Hyper-V uses hypervisor architecture. A hypervisor is a lightweight layer of software that separates hardware and the operating system. It performs simple partition- ing tasks and maintains strong isolation between partitions. Within these partitions, the hyper- visor hosts virtual machines. Microsoft’s implementation is inherently secure, as it contains no third-party device drivers. This minimizes the attack surface of the host machines. UDDI Services Universal Description, Discovery, and Integration (UDDI) services are an industry specification for publishing and locating information about Web services. In Windows Server 2008, UDDI capabilities are provided for enterprise networks or between business part- ners. With UDDI, developers can publish and interact with Web services directly via their devel- opment tools and business applications. Web Server/Internet Information Services 7.0 Internet Information Services 7.0 (IIS 7) is the latest version of a Web services platform from Microsoft. More than an ordinary Web server, the IIS 7 platform unifies a number of Web-based technologies including Windows Communication Foundation Web services and Windows SharePoint Services. With IIS 7, Microsoft has completely changed the way the product works, including new configuration, Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 42. New Roles and Features in Windows Server 2008 21 delegated administration, security enhancements, and real-time diagnostic and troubleshooting features. Windows Deployment Services Windows Deployment Services (WDS) is the updated and reengineered implementation of Remote Installation Services. It is a suite of deployment tools managing your computer deployment processes. WDS assists with the deployment of Microsoft Windows operating systems, particularly Windows Server 2008 and Windows Vista. You can use WDS to set up new computers through a network-based installation without being physically present at each computer and without the use of CD or DVD media. WDS is discussed in more detail in Chapter 2. Activity 1-4: Exploring the Available Roles in Server Manager Time Required: 15 minutes Objective: Identify the roles that can be installed in Server Manager using the Add Roles Wizard. Description: As part of your company’s evaluation of Windows Server 2008, your manager asks you to research the type of roles available on the Windows Server 2008 computer recently added into your test environment. You need to access the server and note the roles that are available through the Server Manager console. 1. Log onto your Windows Server 2008 Enterprise computer, if necessary. 2. If Server Manager does not start, click Start and then click Server Manager. 3. In the left pane of the Server Manager console, click Roles and then click Add Roles in the right pane. The Add Roles Wizard starts. 4. In the Before You Begin window, review the information, and then click Next. Click each role to read a description of each role. 5. Click More about Server Roles and read the Windows Help information on server roles. When you are finished reading, close the Help window. 6. If you are continuing to the next activity, leave Server Manager open. Otherwise, click Cancel and then click Yes to close the Add Roles Wizard. New Features Whereas a role is similar to a job role with a company, a feature is similar to a job responsibil- ity performed by a specific role. Many of the features of Server 2008 are required for certain roles to function properly. When installing some roles, you may be prompted to include specific features during your installation. Following are the new features available in Server 2008: • .NET 3.0 Framework • Windows Desktop Experience • Network Load Balancing • Group Policy Management • Remote Server Administration Tools • Windows PowerShell • Windows Server Backup Features .NET Framework 3.0 This is the latest revision of the .NET Framework included in Windows Server 2008 and Windows Vista, though newer updates might be available by the time you read this. Formerly named WinFX and built on the 2.0 version, the 3.0 version includes new managed code application programming interfaces that provide the foundation for Windows Server 2008. The four components added to create the .NET Framework 3.0 include Windows Communication Foundation, Windows CardSpace, Windows Presentation Foundation, and Windows Workflow Foundation. 1 1 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 43. Chapter 1 Introduction to Windows Server 2008 22 Windows Desktop Experience Not installed by default, the Windows Desktop Experience is available in Windows Server 2008. This includes many of the features of Windows Vista such as Aero Glass (with capable hardware), live thumbnails, and desktop themes. Although not important from the administrative standpoint of working on a Windows Server 2008, the Windows Desktop Experience allows you to provide these features in remote desktop connections users have established with a server. This feature lets you run remote Vista-like desk- tops and applications on servers for users. The Terminal Services role in Windows Server 2008 takes advantage of this feature. Network Load Balancing Clusters Improved in Windows Server 2008, Network Load Balancing (NLB) clusters provide a cluster solution for implementing high TCP/IP avail- ability for Web services and network-based applications. Traffic is balanced among servers using NLB so no one server receives all the traffic. A good example of where to use NLB is with mul- tiple Web servers with static content. Through NLB, users and applications can see the multiple servers as a single server. Besides increasing availability and improving performance, NLB can help with performing maintenance on servers that must provide services around the clock. A server needing maintenance can be removed from the cluster, repaired, and returned to the clus- ter without loss of service. Remote Server Administration Tools Remote Server Administration Tools (RSAT) allows you to remotely manage Windows Server 2008 and Windows Server 2003 from a com- puter running Windows Server 2008 or Windows Vista with SP1. It allows you to use manage- ment tools and snap-ins on remote machines. You can use RSAT to manage both the Full version and Server Core installation of Windows Server 2008. RSAT and other management tools are further discussed in Chapter 10. Windows PowerShell Discussed previously, PowerShell is a CLI shell and scripting lan- guage that administrators can use in Windows Server 2008. Much like a UNIX/Linux shell, PowerShell provides administrators and developers greater flexibility and power within Windows Server 2008 and other operating systems that support PowerShell. Currently, PowerShell is available for Server 2003, Windows XP SP2, and Windows Vista, though all fea- tures and cmdlets may not be available. PowerShell uses a verb–noun pairing syntax for its commands, which are called cmdlets (pronounced commandlets). An example of a common PowerShell cmdlet is get-service. The fol- lowing code example retrieves all the services that are stopped on a server: get-service | where-object { $_.status —eq “stopping”} Figure 1-11 shows the output for the get-service cmdlet. Windows Server Backup Features The backup tool has been updated in Windows Server 2008. The Windows Server Backup feature consists of a Microsoft Management Console (MMC) snap-in and command-line tools that provide a complete solution for your day-to-day backup and recovery needs. You can create backups from the GUI, the command line, scripts, or a regular schedule. Four wizards are available in the GUI to guide you through backing up and recovering data. Windows Server Backup can back up a full server (all volumes), selected volumes, or the system state. You can recover volumes, folders, files, certain applications, and the system state. More information on Windows Server Backup is provided in Chapter 11. Roles and Features Management Previous versions of Windows Server had a few options for installing roles and features other than the Manage Your Server Wizard. This provided a step-by-step installation process for specific server roles but did not allow for easy customization. Most administrators used the second choice of adding roles and features through the Add Windows Components tool in the Control Panel. In Windows Server 2008, you can use the Server Manager console and Server Manager command-line utility to manage roles and features. They are covered in more depth in Chapter 10. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 44. New Roles and Features in Windows Server 2008 23 Server Manager As you’ve seen, Server Manager is the new management console for Windows Server 2008. Based on the MMC 3.0, it provides a single location for managing a local machine. Following are all of the major areas of information within Server Manager: • Server Summary—Displays system information when you start Server Manager • Roles—Displays all installed roles and administrative consoles for installed roles and includes links to add and remove roles • Features—Displays all installed features and includes links to add and remove features • Diagnostics—Allows you to view and manage server status with built-in tools including Event Viewer, Reliability and Performance, and Device Manager • Configuration—Allows you to manage system configurations with built-in tools including Windows Firewall with Advanced security, Services, and Local Users and Groups • Storage—Allows you to manage storage on a server via Disk Management and manage backup and recovery via Windows Server Backup You can manage system properties and computer information in the Server Summary window. Roles and features can be added, modified, or removed within their respective areas. Diagnostics, Configuration, and Storage provide many of the tools previously found in the Computer Management snap-in in Server 2000/2003 such as Event Viewer, Disk Management, and Local Users and Computers. Server Manager is covered more in depth in future chapters. Each of these areas is covered in depth in Chapter 10. 1 1 Figure 1-11 Output for the get-service cmdlet Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 45. Chapter 1 Introduction to Windows Server 2008 24 Activity 1-5: Adding the File Services Role and Windows Server Backup Feature Time Required: 15 minutes Objective: Install the File Services role and the Windows Server Backup feature using Server Manager. Description: Your company has elected to use Windows Server 2008. You want to start by set- ting up a file server and installing Windows Server Backup on the new Windows Server 2008 server. 1. Log onto your Windows Server 2008 Enterprise computer, if necessary. If Server Manager does not start, click Start and then click Server Manager. 2. In the left pane of the Server Manager console, click Roles and then click Add Roles in the right pane. The Add Roles Wizard starts. 3. In the Before You Begin window, review the information and then click Next. 4. Click the File Services role and then click Next twice. Choose to install the default file server and do not add any role services at this time. Click Next, and then click Install. 5. Click Close when the File Services role is installed. 6. In the left pane of the Server Manager console, click Features and then click Add Features in the right pane. The Add Features Wizard starts. 7. Click the Windows Server Backup feature listed under Windows Server Backup Features and then click Next to review the features being installed on the next screen. 8. Click Install to install this feature. Click Close when the Windows Server Backup feature is installed. 9. In Server Manager, verify that the File Services role and Windows Server Backup feature are installed. 10. If you are continuing to the next activity, leave Server Manager open. Otherwise, close it. Server Manager Command While having a UI is great for new administrators and performing certain tasks, using the CLI in Windows Server 2008 can be quicker, easier, and necessary to complete certain tasks. Server Manager Command is a new CLI-based management tool that allows you to effectively install, configure, and remove roles and features in Server 2008. For example, to install the Print Services role, you enter the following command in the Command Prompt window: servermanagercmd.exe –install print-server Server Manager Command is useful if you want to create an unattended installation script for your servers. This is especially true in the Server Core environment, as this is the only way to install roles and features. Activity 1-6: Adding the Print Services Role and PowerShell Feature using Server Manager Command Time Required: 15 minutes Objective: Install the Print Services role and the PowerShell feature using Server Manager Command. Description: You have already installed the File Server role and the Windows Server Backup fea- ture using the Server Manager console. Now you want to install a role and feature from the command prompt. This prepares you to install other roles and features without attending the installation. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 46. Windows Server 2008 User Interface 25 1. Log onto your Windows Server 2008 Enterprise computer, if necessary. 2. Click Start and then type cmd in the Start Search text box. 3. In the list of search results, click Cmd.exe to open a Command Prompt window. 4. Type the following command and then press Enter to install the print Services: Servermanagercmd.exe -install print-server 5. Type the following command and then press Enter to install PowerShell: Servermanagercmd.exe -install PowerShell 6. Type the following command and then press Enter to verify the roles and features installed: Servermanagercmd.exe -query All installed features and roles are highlighted in green in the command prompt. 7. Type Exit and then press Enter to close the Command Prompt window. Windows Server 2008 User Interface If you have used Windows Vista, you will note some similarities between it and the Windows Server 2008 UI. When Microsoft began developing Windows Vista and Windows Server 2008, both were built on the same code base. It is estimated that the two OSs share 70 to 90 percent of their code. The following benefits are realized by sharing the code base: • Because the OSs share the same management consoles, you can quickly learn to navigate the Windows Server 2008 UI if you have already worked with Windows Vista and vice versa. • Through the Windows Desktop Experience and Terminal Services, Windows Server 2008 can deliver remote desktop experiences that come close to matching a user’s desktop experience. • Many applications and hardware drivers that work on Windows Vista also work on Windows Server 2008. • Organizations that upgrade to Windows Vista and Windows Server 2008 have less administration costs in the long run because of the similarities between the operating systems. • Shared code allows Microsoft to more quickly develop patches and updates. You are likely to see a benefit in quicker patch testing as well. • With the release of SP1 for Windows Vista, Windows Server 2008 and Windows Vista have the same kernel code. Thus, performance between the two operating systems is similar. Following are some new or improved features in Windows Server 2008: • Start menu • Network and Sharing Center • Help and Support • Windows Desktop Experience Start Menu Windows Server 2008 incorporates the redesigned Start menu into its UI. This Start menu was first introduced in Windows Vista. The most efficient way to use the Windows Server 2008 Start menu is to use the Start Search text box. When you open the Start menu, the insertion point appears in 1 1 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 47. Chapter 1 Introduction to Windows Server 2008 26 the Start Search text box. See Figure 1-12. You can begin typing the name of the application, con- sole, or document you are looking for, and Windows Server 2008 begins displaying files whose names start with the characters you typed. In addition, instead of using cascading menus that take up a lot of desktop space, the Start menu is now more compact. The search results, for example, are displayed in a single vertical column. After searching for a program or navigating the Start menu, you can click the Back button to return to the previous view, such as the initial Start menu. Activity 1-7: Using the Start Menu and Start Search Text Box Time Required: 15 minutes Objective: Use the Start Search text box to find and open a program. Description: Your company has just upgraded to Windows Server 2008, and you want to start Notepad to create a text file. In this activity, you start Notepad using the Start Search text box on the Start menu. 1. Log onto your Windows Server 2008 Enterprise computer, if necessary. 2. Click Start or press the Windows key (lower-left corner of keyboard) or Ctrl+Esc to open the Start menu. Figure 1-12 Windows Server 2008 Start menu Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 48. Windows Server 2008 User Interface 27 3. With the insertion point in the Start Search text box, type note. See Figure 1-13. The search results change with each letter you type. 4. When Notepad appears in the search results list, make sure it is selected and then press Enter to start the program. You can also click Notepad in the search results list. The Notepad window opens. 5. Close Notepad. Network and Sharing Center Another redesigned feature first introduced in Windows Vista is the Network and Sharing Center shown in Figure 1-14. This console provides a central location for administering many network tasks in Windows Server 2008 including network connections, sharing settings, and network dis- covery options. Like many of the new consoles, you will notice links to features that appear in multiple consoles. Instead of being in one location only, tools are available within the relevant area in which you are working. For example, you can access the Windows Firewall from the Network and Sharing window and the Security window. This makes sense since Windows Firewall affects both areas. As you explore Windows networking with Windows Server 2008, you will continue to use the Network and Sharing Center. 1 1 Figure 1-13 Using the Start Search text box on the Start menu Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 49. Chapter 1 Introduction to Windows Server 2008 28 Windows Desktop Experience The Desktop Experience is a new feature in Windows Server 2008. The Desktop Experience pro- vides a number of applications that were introduced in Windows Vista such as Windows Media Player, Sync Center, and Disk Cleanup. This means that Windows Server 2008 feels more like your primary operating system, and provides less of a server-based desktop experience. Following are the applications Windows Desktop Experience makes available: • Windows Mail • Windows Media Player • Windows Aero and other desktop themes • Video for Windows (AVI support) • Windows Photo Gallery • Windows SideShow • Windows Defender • Disk Cleanup • Sync Center • Sound Recorder • Character Map For more information on the Windows Desktop Experience features, browse the Windows Vista product site at www.microsoft.com. Figure 1-14 Network and Sharing Center Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 50. Key Terms 29 Chapter Summary ■ Over the years, network models have evolved, providing administrators with better ways to manage their networks. Most modern networks are based on client-server computing where one computer requests resources and another computer responds to those requests. Windows networks use two models: workgroup and domain. Current Windows Server 2008 networks have evolved from the Windows NT domain model, which is based on PDC/BDC domain security databases, to an AD domain model that uses multimaster repli- cation of the domain security database between DCs. ■ Windows Server 2008 offers three general editions and two special-purpose editions: Windows Server 2008 Standard, Windows Server 2008 Enterprise, Windows Server 2008 Datacenter, Windows Web Server 2008, and Windows HPC Server 2008. Along with these new editions, you can install Windows Server 2008 as a Full installation or a limited func- tionality installation called Server Core. ■ Windows Server 2008 is available for both 32-bit and 64-bit hardware architectures. Like any OS, Windows Server 2008 has a minimum level of hardware requirements for its installation. Commonly, these requirements might not meet the functional needs of all environments, so you need to review the recommended and maximum hardware values when deploying Windows Server 2008. ■ New technologies in Windows Server 2008 focus on improving the performance, manage- ability, and security of networks. The improved installation process allows you to quickly deploy Windows Server 2008 servers with limited administrator input. Management tools such as Server Manager and WinRM help you easily manage network servers. Server Core provides a limited functionality server that improves network security by reducing the attack surface. Improvements to the TCP/IP implementation and the addition of NAP pro- vide a number of performance, management, and security benefits to your networks. ■ Windows Server 2008 lets you organize server services into roles and features. Roles pro- vide servers with a specific job that it provides to the network. Common roles include File services, Print services, and DNS services. The Full installation of Windows Server 2008 has 17 roles, and the Server Core installation has eight roles. Servers also provide features, or job duties, to networks. Common features include Windows Server Backup, PowerShell, and the .NET 3.0 Framework. ■ Server Manager provides administrators with a GUI console for managing roles and fea- tures, along with other aspects of the servers. Server Manager Command, or serverman- agercmd.exe, is a CLI utility that allows for command line or scripted management of roles and features. This is helpful for automated installation of roles and features or for remote management of features and roles. ■ Windows Server 2008 has a look and feel similar to Windows Vista. They are similar because both OSs are built on the same secure code base. Sharing code helps you in many ways including patch deployment and application compatibility. Along with sharing code, many of the features are included in both OSs. The Start menu includes an integrated search tool for quickly finding information and applications. You can also apply the Windows Desktop Experience to Windows Server 2008 to make the OS seem more like Windows Vista, including features such as Windows Media Player and various desktop themes. Key Terms Active Directory (AD) Represents the suite of roles in Windows Server 2008 domain networks for providing directory-based management, security, and authentication. Prior to Windows Server 2008, AD represented Microsoft’s version of a directory services database that provided centralized security and object management. 1 1 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 51. Chapter 1 Introduction to Windows Server 2008 30 Active Directory Domain Services (AD DS) Stores information about objects such as users and groups on the network. This information is available so users can effectively access resources on the network and collaborate with other users. For network administrators, AD DS provides a framework for securing information and resources, along with facilitating the sharing of these resources to users. application programming interface (API) A set of rules and conditions created by the code writers of an operating system. Outside programmers use APIs so their applications can connect to a specific portion of the operating system. Companies such as Microsoft publish APIs for their operating systems to allow third parties to write complementary applications for their software. attack surface In computer networking, the available ports or services a network client or server makes available to other network clients. In network security, the goal is to reduce the attack surface to the minimum allowable level. backup domain controller (BDC) A domain controller in a Windows NT/pre-AD environment that is responsible for storing a read-only copy of the domain security database. client An entity that requests information or resources from another entity on a network. A client can be a computer, application, process, or hardware device. client access licenses (CAL) Software licenses that allow clients to access resources on a Microsoft network. client-server computing A network model that describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. command-line interface (CLI) An administrative interface that requires the use of typed commands or scripted commands. After ending a command, a response is received from the system. The command prompt and Windows PowerShell are examples of CLIs in Windows Server 2008. domain In the client-server computing model, a group of users and computers that are managed by the same security database. domain controller (DC) A server responsible for holding a domain security database in an AD domain environment. Domain Name System (DNS) A system that matches a domain name to an Internet Protocol (IP) address based on a client query for information. Besides providing domain names, DNS provides information necessary for services such as e-mail to route mail to the proper destination. In an AD environment, DNS provides information to clients so they can connect with necessary network services. feature A function that enhances or supports a role or provides a stand-alone service. forest One or more domains with noncontiguous namespaces that are related to each other by trust relationships. global catalog A domain controller that holds a master searchable database of information about every object in every domain in a forest. The global catalog contains a complete replica of all objects in AD for its host domain and contains a partial replica of all objects in AD for every other domain in the forest. Group Policy A method for implementing specific configurations for users and computers within an AD domain. Group Policy settings are contained in Group Policy objects, which are linked to the following AD service containers: sites, domains, and organizational units. high-performance computing (HPC) The use of supercomputers and computer clusters, or computing systems made of multiple processors linked together in a single system, to perform computing tasks requiring large amounts of resources. host-based stateful firewall A local application that blocks incoming and outgoing connections based on its configuration. mail exchanger (MX) record A record containing DNS and IP information specifically designed to allow Internet mail servers to relay electronic messages. Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 52. Key Terms 31 managed code Computer program code that executes under the management of a virtual machine, unlike unmanaged code, which is executed directly by the computer’s central processing unit. membership status A setting indicating whether a network computer belongs to a workgroup or a domain. multimaster replication A form of replication used by domain controllers (DCs) that allows them to maintain the same read and write security databases. With multimaster replication, no DC is more authoritative than any other, and all DCs can respond to client requests. .NET object A data package containing information useable by applications and services that are compatible with .NET. Network Access Protection (NAP) A service that protects networks, both public and private, from malware such as viruses and spyware. Network Access Control (NAC) A computer networking concept and set of protocols used to explain how to secure network clients before the clients access the network. Next-Generation TCP/IP stack A new implementation of the Transmission Control Protocol (TCP)/IP protocol by Microsoft that contains full support for Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). primary domain controller (PDC) A central domain controller in a Windows NT/pre-AD environment that has a readable and writable copy of the domain security database. There can be only one PDC. Receive Window Auto-tuning A feature of TCP that allows the network interface receive window to be optimized based on the type of traffic that it is receiving. role A major function or service that a server performs. Secure Sockets Layer (SSL) An established industry standard that encrypts the channel between a Web browser and Web server to ensure the privacy and reliability of data transmitted over this channel. SSL does not, however, provide ways to validate the identities or banking accounts of the parties exchanging this data. server An entity that responds to requests for information and resources on a network. A server can be a computer, application, process, or hardware device. Server Core Available in Windows Server 2008, Server Core is a minimal server installation option designed to run a limited set of server roles and features and to provide a reduced attack surface. Teredo An IPv6 transition technology that provides address assignment and host-to-host automatic tunneling for unicast IPv6 traffic when IPv6/IPv4 hosts are located behind one or more IPv4 network address translators. Terminal Services A group of technologies that enable users to access Windows-based programs that are installed on a terminal server or to access the Windows desktop itself from almost any computing device. thin client A client computer or client software in a client-server network that depends primarily on a network server for processing activities and focuses mainly on conveying input and output between the user and the remote server. tree One or more domains related to each other by trust relationships and a shared namespace. transitive trust A trust between domains in a tree, which is automatically created during the domain creation process. virtualization A broad term that refers to presenting computing resources to users by hiding the physical characteristics of computing resources. This is done by providing an intermediary program responsible for managing communication between users and resources. Web server A network resource that hosts applications and information available through a Web browser or Web-based application. Windows Remote Management (WinRM) A new feature in Windows Server 2008 that provides administrators with remote system management capabilities. WinRM allows 1 1 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 53. Chapter 1 Introduction to Windows Server 2008 32 administrators to remotely run management scripts and manage data on remote machines. All connections are handled via the WS-Management protocol. workgroup A network model where each member has its own locally stored Security Account Manager database, which controls user and group membership and access to its local resources. WS-Management protocol A public standard for exchanging management data remotely by any device implementing the protocol, making it non–vendor specific. Review Questions 1. The Server Core version of Windows Server 2008 Enterprise edition can be upgraded to the Full installation without a complete reinstallation of the OS. True or False? 2. ______________ is Microsoft’s newest server virtualization platform. It requires a(n) _____ version of Server 2008. 3. There is only one domain controller in an Active Directory domain that is writeable. The rest are read-only. True or False? 4. Which of the following Windows network models is a good choice for an environment with no IT staff, limited need for network-available resources, and a total of five computers? a. Domain b. Workgroup c. Ad hoc d. Mesh 5. You are an administrator for a small company running a Windows Web Server 2008 as a Full installation on your network. Your boss has asked you to add the following items to the Web server: • Simple company Web page • Financial application based on ASP.NET • Fax server However, you cannot complete all of your boss’s requests. Why? a. Server Manager is not installed on Windows Web Server. b. Windows Web Server 2008 does not support ASP.NET. c. A fax server is not supported on Windows Web Server 2008. d. Windows Web Server 2008 requires PowerShell for Web pages to run. 6. All of the following Active Directory service containers can be linked to a Group Policy object except: a. Domains b. Organizational units c. Groups d. Sites 7. Hyper-V can be installed on which two of following editions of Windows Server 2008? a. Windows Server 2008 Standard, 64-bit b. Windows Web Server 2008, 64-bit c. Windows Server 2008 Enterprise, 32-bit d. Windows Server 2008 Datacenter, 64-bit Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 54. Review Questions 33 8. How do 64-bit versions of Windows Server 2008 differ from 32-bit versions? a. 64-bit versions do not support 16-bit drivers. b. 32-bit versions support twice the memory as 64-bit versions. c. 64-bit versions do not support 32-bit bit device drivers. d. All of the above e. None of the above 9. Which three of the following technologies are new to Windows Server 2008? a. Windows SkyDrive b. Hyper-V c. Server Hard Core d. PowerShell e. Windows FolderShare f. Network Access Protection 10. You must have a valid Windows Server 2008 product key to install Windows Server 2008 Datacenter. True or False? 11. Which one of the following technologies improves the installation process in Windows Server 2008? a. Windows Image Format (WIM) b. Active-X c. Windows ME d. Windows PE 12. _________________ allows clients using computers with IPv6 to communicate over IPv4 net- works. This is done by encapsulating the IPv__ packet inside of an IPv__ packet. 13. _________________ is the new scripting and command-line interface for Windows Server 2008. 14. Group Policy preferences are enforced by computers and users, whereas Group Policy objects are not strictly enforced. True or False? 15. You are an administrator for a medium-sized business called Terrapin Technologies. Currently, you are running a Windows Server 2003 environment with Windows Server 2003 Active Directory. Your boss has asked you to look into using the Windows Server 2008 Standard edition with the Server Core installation as a solution for minimal attack surface computers at your remote locations. The following roles are required at the remote locations: • DNS for name resolution • Print Services for network printers • Web Server for a Web application based on ASP.NET • Active Directory Domain Services Based on what you know of Server Core, can you deploy all these roles to your remote loca- tions? Why or why not? a. Yes, all of the roles can be installed on Server Core as long as you are running the 64- bit version of Windows Server 2008. b. No, Active Directory Domain Services and domain controllers are not supported on Server Core. c. No. Because of the command-line nature of Server Core, you cannot install print driv- ers for network printers. d. No, Server Core does not support ASP.NET. 1 1 Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
  • 55. Another Random Scribd Document with Unrelated Content
  • 56. There is another reason too why the bird may prefer the drone. The honey bee usually flies low, where the flowers are, while the drone isn't after flowers and flies higher in the air. The kingbird sits higher than the honey bee flies, and the drones are the ones that come near him. Another insect that the kingbird is fond of is the robber fly, which destroys hundreds of honey bees. That should make every bee- keeper his friend. These things have been found out in the way I told you, by shooting the birds to see what they had been eating. Mr. Bryant, who knows birds well, tells of a bee-keeper in California who saw a great many kingbirds among his bees. Of course he thought they were eating them, and he killed one hundred of them. On looking into their stomachs to see if they had eaten honey bees, he found them filled with drones. They had been working for him all the time, for every bee-keeper likes to have drones killed. It has been said that the kingbird is annoying to other birds, and he is called a tyrant. I wanted to know if this was true. I did not go to books to find out, for many people—as I have told you—do not study for themselves, but repeat what some one else has said. The way I took to find out was to notice the ways of every kingbird I could see. For many years I have watched them hours at a time, for weeks together. I spend every summer among the birds, and almost everywhere I go I find kingbirds. In this way I have found out that the kingbird is one of the most peaceable of birds. He drives strangers away from the tree where his nest is, and so does every other bird. The crow he seems to consider his enemy, and often flies after him, but excepting that, I have never seen a kingbird disturb any bird who was minding his own business. He is not half so much of a tyrant as the robin or the hummingbird.
  • 57. The kingbird is quiet and devoted to his family. He seems never to tire of catching insects. While young ones are in the nest, he may usually be seen from morning till night, sitting very straight upon a low perch, looking for flies of many kinds. Let me tell you a little story of a kingbird which I can assure you is true, for a gentleman whose word may be relied upon saw it near enough to be perfectly sure of the facts. A big bird, he did not notice what kind, was flying off with a nestling robin in his claws. All at once a kingbird flew at him so fiercely that he had to drop the young one to defend himself. The youngster could not fly, and of course began to fall. When the kingbird saw that, he left the thief and flew under the little bird. He held it up on his back, and flew carefully to the ground, where it slipped off safely. When a kingbird has been tamed and kept in a house, he has been found to be a very knowing fellow. One that I heard of saw that the people were friendly, and he lost all fear of them. His greatest pleasure seemed to be to keep warm. He would cuddle up to a lighted lamp, and dearly liked to crawl under the bedclothes. This pet was quiet and dignified, never a chatterbox. The only sounds he made were a few low notes like thanks, when he was fed. The nest of the kingbird is usually placed in a low tree like the apple-tree. It is made of anything that comes handy. I have seen one of white wool where sheep were kept, and one of gray moss on the seashore where it is found in plenty. The Western kingbird differs in color from the Eastern. He is more gray, with under parts bright yellow. He is said to be more social and more noisy than the sober Eastern bird. But in other respects they are much alike.
  • 58. This bird has been called quarrelsome, but persons who look closely at birds have said that what careless observers have called quarrels are really play. For the Western kingbird, the Arkansas Kingbird of the books, is a rather jolly fellow, says Major Bendire. All flycatchers are useful and should be carefully protected, says the same well-informed writer. The Wood Pewee is another common flycatcher. He is not generally seen about houses like the phœbe, who calls from the peak of the barn. He may be found in the orchard or the edge of the woods. There he will stand on a fence or low branch and sing or call by the hour, every few minutes flying out to catch a passing insect. This bird is in dark colors, with whitish breast and two white wing-bars. His common call is a plaintive, long-drawn-out "pee-u-ee" and sometimes "pee-ay," but he can sing a droll little song. One lady who watched a wood pewee build her nest heard her sing to herself as she worked what sounded like "O-wee-wee-wee." The nest made by this little mother is very pretty. It is most often on a dead limb where a branch starts out, making a broad foundation. For this reason the bird is called in the South, the dead- limb bird. The nests are not all alike. I have seen many closely covered with lichen, and some made of gray moss so thin that the eggs could be seen through it. Whatever it is made of, it is low and flat like a saucer, and so much like the branch it is on that it is not easy to see. Like other bird mothers, the wood pewee is devoted to her nestlings. She will shield them from the rain by sitting close on the nest and making an umbrella of herself. And when the sun comes down very hot on them, she has been seen to perch on the edge of the nest and spread her wings to act as a shade for them. It is
  • 59. pretty to see this bird with her little family when they have left the nest and are being taught to take care of themselves. She makes many sweet little noises which sound like talk, or a sort of whispering. The Western Wood Pewee looks like his Eastern brother, but he is a very different bird. His dress is about the same, and he catches his flies in pewee fashion, but his voice is not in the least like that we hear on the Atlantic side of the country. The Eastern wood pewee has a low, sweet voice, of which one cannot get tired. But the bird of the West has loud, harsh notes, so dismal in tone that they are painful to listen to. His song is almost the only really unpleasant bird song I know. The nest of this bird is a rather deep cup saddled on to a large limb. When it is in a cottonwood grove, it is covered with the sticky white cotton from the trees. It is very pretty when fresh, but it soon gets soiled, and then it is not nice to look at or to handle. FOOTNOTE: [19] See Appendix, 18.
  • 60. XXVI THE HUMMING FAMILY (Trochilidæ)[20] This is an American family, and no country in the world can show a more beautiful one. There are more than four hundred species, and some of them hardly bigger than a bee. All of these birds have brilliant colors that are called metallic. That is, they glitter like metal, and they show different colors when they are turned different ways. All hummingbirds fly very swiftly. You know how they go,—not straight like most birds, but darting one way and another so quickly they can hardly be seen. As they fly, their wings move so fast they look almost like little clouds, and we hear the low noise we call humming. Hummingbirds eat nothing but tiny insects, and the honey of flowers, which they suck up through their long bill. They take their food without alighting, for they can hold themselves still before a flower, with the wonderful wings, as long as they choose. The bill of a hummingbird is much longer than his head. It is something like a pair of tubes through which he can draw up the sweet juices he likes. The tongue is long too, and it can be pushed out far beyond the end of the bill. It looks like a stiff white thread. We have in the Eastern States but one species, the ruby-throat, but there are several in California.
  • 61. No bird is more charming than our common Ruby-throated Hummingbird. He is most often seen flitting about among the flowers. But now and then one may catch him sitting demurely on a dead twig, dressing his tiny feathers. This bird is all in green, with a brilliant ruby-colored throat, which looks like a gem as he darts about. His mate is in green also, but her throat is white. You would not think this pretty midget could be a fighter, but he is. When a hummingbird finds a vine full of sweet blossoms, or a bed of bright nasturtiums, or any good place to feed in, he claims the whole of it for himself. He tries to drive away every other hummingbird who comes near it. Sometimes two of them will carry on a quarrel over a honeysuckle vine for days. The hummingbird is the most pugnacious bird in America. If he were as big as a crow, he would be a terror to man and beast, for he is afraid of nothing. This spirited mite of a bird will even attack an eagle, who is big enough to eat him at a mouthful. He beats him too, for he comes down on top of his head, where the big, clumsy fellow cannot get at him. There he pecks and pulls out feathers till the eagle is glad to get out of his clutches. A hummingbird's nest is one of the prettiest things in the world. It is not much bigger than a walnut, and is made of soft plant down, usually of a yellowish gray color. Perhaps you don't see how plant down can be made to keep in shape, without twigs or grasses to hold it. If you could see the bird make it, you would understand at once. She brings her stuff in small mouthfuls, and works it into a solid mass by strong efforts with beak and feet. She pokes and prods each tiny bunch as she brings it, till she makes it all hold together. It is a sort of felt. Then the little worker covers the outside with bits of lichen picked off the trees, and held on, it is said, by cobwebs. This makes the nest look exactly like the branch it is on. So it is very hard to see.
  • 62. It takes a hummingbird several days of hard work to make a nest, because she can bring only a little at a time. She does it alone too; her mate has not been seen to help her at all. I think the male ruby-throat does not help in the nest-building because the little mother will not let him. She knows just how the cradle is to be made, and she doesn't want him to bother her. She likes to have her nest to herself just as she likes to have her honeysuckle to herself. I don't say positively that is the reason, you know; I only guess it is. After the nest is made, and two eggs about as big as small beans are laid, the hummingbird begins to sit. When the nestlings come out of the egg, they are about the size of honey bees, with bills no larger than the head of a common pin. Twenty-one days they stay in the nest and are fed by their hard-working little mother. When the twins get their feathers, and their bills are growing longer and longer, they sit up across the top of the nest, side by side. Then they are very pretty, and not at all afraid of people. They will let one gently stroke their backs. They will even answer in a soft murmur one who talks to them. Hummingbirds are never so afraid of people as other birds. They are easily tamed. But they should never be caged, for they will not live long in a house. They need food that we cannot give them. A man had a hummingbird whom he kept alive a long time by letting him go free when he seemed to need change of food. He would fly off, but always came back. After the bird got to be very tame, the man brought two young hummingbirds and put them in the cage with him. He did not notice them much till they began to droop. Then the man opened the door to let them out. At once the elder bird took the little ones in charge, and coaxed them to fly out with him. He led them to a place where he had found the tiny spiders these birds like, and showed them how to get what
  • 63. they wanted. They all ate their fill and then came back to the house, where they were well contented to be. The way the mother hummingbird feeds her babies is curious. When she comes with food, she alights on the edge of the nest, and pulls a little one up so that she can get at it. Then she runs her long, slim bill down its throat, and pokes the food in with little jerks. It looks as if it would kill the youngster, but he seems to like it. Anyway, he grows very fast, and—as I said—in three weeks he is beautifully feathered, with a bill as long as his mother's, and ready to fly. A lady who had two young hummingbirds told me that they slept so soundly they were like dead birds. One could take them up and carry them about, and they would not wake. In cold weather she often wrapped one up in a piece of flannel and laid him in a soft, warm place, and he never stirred till morning. The way she got this pair of birds was interesting. She was walking in the woods and broke a dead branch from a tree, to use for something. On turning it over she saw a nest, and strange to say two little birds in it. She had been holding it upside down, but they had held on so tightly that they did not fall out. The lady did not know what to do. She did not want baby hummingbirds, but she couldn't put the branch back, and she was afraid their mother would not find them if she left them. So she took them home. She had no trouble to feed them, and they lived with her six weeks, and died by accident at last. It is thought that the male ruby-throat does not come to the nest at all, but he must have some way of knowing how things are going on. At Mrs. Wright's summer home a mother hummingbird was killed in a hailstorm, while young were in the nest. At once the father, or at least a male bird, came and fed and took care of the nestlings till they flew.
  • 64. In California one of the most common of this family is Anna's Hummingbird. He is green, with a throat and crown of changeable colors, lilac and red. The nest of this bird is usually, like the ruby-throat's, of plant down covered with lichens. But some have been found made of the blossoms of the eucalyptus, or gum-tree. This bird is as easily tamed as the ruby-throat, and seems to act a good deal like him. Mrs. Grinnell found a nest in her yard in California. The mother allowed herself to be photographed in many positions. The young ones were never afraid, and did not mind the camera in the least. Hummingbirds never seem to have any fear of people. FOOTNOTE: [20] See Appendix, 19.
  • 65. XXVII THE SWIFT FAMILY (Micropodidæ)[21] Swifts are curious birds, with strange habits. The one we know by sight in the East is the chimney swift. Most like him in the West is Vaux's swift. His ways are like the common chimney swift's, and his looks nearly the same. The Chimney Swift is often called the chimney swallow, but it is very easy to tell one from a swallow. One way is, that when a swift is flying about over our heads, he looks as if he had no tail. The tail is very short, not half so long as the wing. He looks more like a bat than a bird. Then the swift flies in a different way. A swallow soars a good deal, that is, moves without beating the wings, a sort of gliding through the air. But a swift beats the wings much more frequently. A swallow will often alight on a telegraph-wire or a roof. A swift is said never to alight except to sleep. This bird is so much at home on wing that he even gets the twigs to make the nest while flying. These twigs are the smallest ones on the ends of dead branches, and are easily snapped off. The bird flies at them, snatches one in beak or feet, breaks it off, and goes right on, without stopping.
  • 66. When he gets his twig, he carries it to a dark, sooty chimney. A queer place for a home, surely. They used to choose a hollow tree or a cave to live in, and that seems much nicer. But chimneys are now more plentiful than hollow trees. And besides, they are nearer the bird's food. So chimney homes are now the fashion in the swift family. To make a swift nest, the twigs are glued to the chimney in the shape of a little bracket. The glue is the saliva of the bird, which is gummy, and gets hard as it dries, and looks like isinglass. The mouth of a chimney swift is very odd. You have heard of "stretching a mouth from ear to ear." That's just what the swift does every time he opens his. It needs to be big, for he gathers up his food in it. While he is flying around in the air, he is busy catching tiny flying creatures, such as flies and beetles, and thus keeping the air clear for us. The tail of this bird is another queer thing. It has no soft feathery tips like most birds' tails. It ends in sharp spines, like needles. These are most useful to brace him against the rough chimney where he sleeps. These spines are really the stiff shafts or stems of the feathers, sticking out beyond the plumey part. The chimney swift hangs himself up to sleep. He fastens his sharp claws into the rough bricks, and props himself firmly with his spiny tail. Even when the young swift is but two weeks old, he crawls out of the nest and hangs himself up under it. He seems to like that for a change from forever lying in a narrow bracket. Chimney swifts are social birds. They can't bear to be alone. They are almost always seen flying about in small parties, and calling to each other as they go, a strange, chattering cry. They are of a sooty color suitable to their sooty home, and the pair are alike. Vaux's swift is a little smaller and paler than the common chimney swift. The young swift is longer in his nursery than any bird of his size in the United States. He is four weeks old before he ventures out of
  • 67. his grimy home, though before that he will come up to the door to be fed. A late writer in a newspaper tells a little story showing the affection of a chimney swift for her little one. The writer had watched all summer a party of swifts who lived in one of his chimneys. A month or more after he supposed that all had flown away to the South beyond our southern boundary, where they spend the winter, he heard the twittering of one in the chimney. He took out the fireboard and found there a young bird. He was full grown and able to fly, but he was fastened by a horsehair to the nest. This had been pulled off by his weight, and lay on the hearth, holding him prisoner. The little fellow seemed to know he was to be helped, for he lay still while the man looked to see what was the matter. His mother soon came into the chimney with food. She took her place beside the man and waited, while he cut the strong hair and set the nestling free. Then the old bird went to work to teach him to fly. It was an hour or more before he learned to use his wings. As soon as he did, the two started off on their lonely journey to the far South, to join their friends who had been gone so long. How I wish we could know that they reached them. Insects were about gone when this happened, and this swift mother would have died if she had stayed, but she would not leave her little one to starve. It is a beautiful thing to see a large flock of swifts go to bed. If they all rushed in pell-mell, they might hurt one another. They begin by flying around high above the chimney in great circles. As they go around they sink lower, and the circles get smaller till it looks like an immense whirling funnel. When the birds forming the lower part of the funnel reach the top of the chimney, they plunge in. So in a short time the whole flock is in and no one hurt.
  • 69. XXVIII THE GOATSUCKER FAMILY (Caprimulgidæ)[22] These are queer-looking birds, having their front toes tied together by a kind of webbing, and almost no hind toe at all. The mouth, too, is almost as odd as the toes. It has a short beak, but is very wide, and it opens from ear to ear like the swift's. The plumage is so soft that the birds can fly without making the least sound. The two most common goatsuckers are the whip-poor-will and the nighthawk. They are both as large as a robin, and stouter. They are dressed in dull brown, and black and white, mottled all over. If you just glanced at the two, you might think them alike. But they are not marked alike, and all their ways are so different that there is no trouble in telling them apart. The Whip-poor-will has broad white tailmarks, with stripes on the back, and a narrow white band across the breast. He comes out only in the evening, and he flies low, without making a sound. He rests lengthwise of a log or fence, not across it as most birds do. His feet are too short to clasp a perch. On his log or fence the whip-poor-will sits and sings while he waits for his supper. You all know his song, his lively "whip-poor-will" over and over many times. It is a delightful evening sound, which I love to hear. It is said that his notes have been counted, and he has been found to repeat them several hundred times without stopping.
  • 70. When moths or other creatures which fly in the night come along, he catches them in his big mouth. But he is not obliged always to wait. Sometimes he flies near the ground like a shadow, looking for prey, and he often hops awkwardly along the road, for the same purpose. He picks up straggling insects, and in the West locusts. The whip-poor-will mother makes no nest. She finds a little hollow in the ground, among leaves or near bushes in the woods, and that's good enough for her nestlings. She lays two eggs, speckled and mottled so that they look like the ground and leaves around them. She looks almost the same herself. You might walk close to her and not see her. When young whip-poor-wills come out of the egg, they are dressed in speckled gray down. They cuddle down quietly by their mother, and the whole family is hard to see. When their eyes are shut, they look almost exactly like the earth and leaves among which they lie. If a whip-poor-will nest is disturbed, the mother will pretend to be badly hurt. She will tumble about on the ground and cry like the whine of a young puppy, trying to coax away the one she fears. If she is too much alarmed, she will clasp her young one between her feet and fly away with it. Instead of the common whip-poor-will of the Northern and Middle States, the South has the Chuck-will's-widow, who is somewhat larger. The West has the Poor-will, or the Nuttall's Whip-poor-will, who is rather smaller and paler than either. The habits of all are about the same. They are called solitary birds. That is, they are not found in parties like swallows or crows. They do not sing or call when flying.
  • 71. NIGHTHAWK These birds are hard to watch because they come out in the dark, and can then see so much better than we can. So we know little about their ways. The Nighthawk's looks, and all his ways, are different. He wears the same colors that the whip-poor-will does, but they are arranged in another way. They are put in bars running across the back and tail, and there is a great deal of white on his upper breast. On the wing is a large white spot that looks like a hole across it, when you see him flying away up in the air. You can always know him by this. Then he does not act like the whip- poor-will. He is a high flyer, sailing about over our heads in the afternoon or evening. He is not silent on the wing. Now and then he
  • 72. gives a strange sharp cry like "peent." He is busy catching flies and mosquitoes as he goes. Sometimes you will see him dive head first toward the earth as if he would dash himself against it. At the same time he makes a loud sound, like blowing into the bunghole of an empty barrel. But before he touches, he turns and skims along just above the ground. The mother nighthawk, like the whip-poor-will, makes no nest. She chooses a sunny spot in a pasture or on a hillside to put her eggs. Sometimes in the cities, where flies and other things to eat are so plentiful, she takes a flat house-roof for her nursery. Many pairs of down-covered baby night hawks are brought up over our heads, and we do not know it. The family name of Goatsuckers was given to the birds from the foolish notion that they took milk from the goats. By watching them, it has been found that when they are so busy around the goats or cattle, they are really catching the insects which torment them. So they are doing a kindness to the beasts, instead of an injury. FOOTNOTE: [22] See Appendix, 21.
  • 73. XXIX THE WOODPECKER FAMILY (Picidæ)[23] You may generally know a woodpecker the moment you see him on a tree. He will—if he follows woodpecker fashions—be clinging to the trunk, or a big branch, propped up by his stiff tail, and not perched crosswise like most other birds. There are a good many of this family in the world. We have twenty-four species in North America. They differ from other birds in two or three ways. First their toes are always in pairs, two turned forward and two turned backward, except in one genus, which has but three toes. So they can hold on better than anybody else. Then again the tails of woodpeckers are not like most birds' tails. They are strong and stiff, so that they can be used as props to hold the bird in the queer position he likes so well. Oddest of all are the woodpecker tongues. They are round, worm-shaped it is called, and except in the genus of sapsuckers, very long. They can be pushed out far beyond the end of the beak. That is so that they can reach into a deep hole for the insects they eat. They have little barbs or sharp points on the tip, to catch their prey, and they are sticky besides. The tongue of the sapsucker has a brush at the end and is not barbed. One of the most notable things about a woodpecker is his bill, which he uses as a drill and also to drum with.
  • 74. Woodpeckers are made to take care of the large limbs and trunks of trees, to get out from under the bark the grubs which would kill them. They are perfectly fitted for the work. As you learn more about birds and beasts, you will see that every one is exactly fitted for his work in life. A worm is as well fitted to be a worm as a bird is to be a bird. How this came to be so has long been a study of the wise men, and they have not found out all about it yet. The largest of this family that is common is the Golden-winged Woodpecker, or Flicker. He is as large as a pigeon. In the Eastern States is the golden-wing, in the West and California the red- shafted, who differs merely in the dress. The gold-winged woodpecker has a brown back with black bars, and a light breast with heavy black spots. His wings and tail are yellow on the inside. He has a bright red collar on the back of his neck, a heavy black crescent on his breast, and black cheek patches or bars running down from the corners of his mouth. The Red-shafted Flicker has red cheek patches instead of black, and omits the red collar altogether. His breast is a little grayer, and the wing and tail linings are scarlet. Both flickers have large white spots on the back, above the tail, which show very plainly when they fly. These two varieties of the flicker are found from the Atlantic to the Pacific. Their ways of living are the same, and what is said of one will do as well for the other.
  • 75. A flicker hangs himself up to sleep. He takes a good hold of a tree trunk, or upright limb, with his grapnel-shaped toes, presses his stiff tail against the bark, and hangs there all night. When he flies, he goes in great waves, as if he were galloping through the air. The nest of this woodpecker is a snug little room in a tree trunk, or sometimes a telegraph-pole. He usually selects a tree that is dead, or partly so, but sometimes he takes a solid one. The little room is cut out by the strong, sharp beaks of the pair. The door of this home is just a round hole rather high up on the trunk. A passage is cut straight in for a little way and then turns down, and there the room is made. It has to be of pretty good size, for the bird is fond of a large family. Five or six and occasionally more young flickers have been found in a nest. Fashions change in the bird world as well as in the human. Woodpeckers more than any others are changing their habits, and improving their condition. They have found an easier way to get a home than to chisel it out of wood. Nowadays woodpeckers often cut a hole through a board which admits them into a garret, a church tower, or the walls of an unused building, and make the nest there. Thus they save themselves much labor. One even cut out a home in a haystack. These birds have changed too, it is said, in their notions about eating. They do not think it necessary to dig out every mouthful from under tree bark. The flicker feeds on the ground. He eats many insects, but mostly ants. When insects are scarce, he eats many wild berries—dogwood, black alder, poke-berries, and others—and the seeds of weeds. Young woodpeckers in the nest are fed mostly upon insects. When they get big enough to climb up to the door of their snug home, they stick their heads out and call for something to eat. Then one can hardly pass through the woods without hearing them, for they have good loud voices. And of course they are always hungry.
  • 76. The way they are fed is by regurgitation. That is, the old bird swallows the food she gets, and when she wants to feed, she jerks it up again. She thrusts her bill far down the little one's throat, as I told you the hummingbird does. Then she gives three or four pokes as if she were hammering it down. A young flicker does not seem to know how to swallow. A lady once picked up a nestling who was hurt, and to get him to eat anything she had to poke it down his throat herself. The gold-winged woodpecker is a lively bird, most interesting to know. He makes so many strange noises that I can't tell you half of them, and his ways are as queer as his notes. He does not sing much, but he is a great drummer. When he finds a tin roof, or eaves gutter that pleases him, he will drum on it till he drives the family nearly crazy. He seems particularly to delight in waking them all up in the morning. He can sing, too. I have heard a flicker sing a droll little song, not very loud, swinging his body from side to side as he did it. Another thing this bird can do is dance. Two flickers will stand opposite one another and take funny little steps, forward and back, and sideways. Then they will touch their bills together and go through several graceful figures. This has been seen several times by persons whose truthfulness can be relied upon. The Red-headed Woodpecker is another common one of the family, especially in the Middle States. He is a little smaller than the flicker. No one can mistake this bird, he is so plainly marked. His whole head is bright red. The rest of him is black, or bluish black, with a large mass of white on the body and wings. This woodpecker, too, has partly given up getting food from under the bark. He takes a good deal on the wing, like a flycatcher.
  • 77. Sometimes he goes to the ground for a large insect like a cricket or grasshopper, and he is fond of nuts, especially the little three- cornered beech-nut. The red-head is beginning to store food for winter use, for most woodpeckers do not migrate. When beech-nuts are ripe, he gets great quantities of them, and packs them away in queer places, where he can find them when he wants them. Some of his nuts the red-head puts in cavities in trees, others in knot-holes or under bark that is loose. Many he fits into cracks in the bark, and hammers in tight. He has been known to fill the cracks in a gate-post, and in railroad ties, and even to poke his nuts between the shingles on a roof. Any place where he can wedge a nut in he seems to think is a good one. A woodpecker can eat almost anything. Besides insects and nuts, he likes wild berries of all kinds—dogwood, cedar, and others that he finds in the woods. The nest of the red-headed woodpecker is usually cut out in the dead top or limb of a tree. In prairie lands, where trees are scarce, he contents himself with telegraph-poles and fence-posts. This bird is rather a dainty feeder. He does not swallow his food wherever he finds it, as many birds do. He likes a regular dining- table. So he takes it to some place on top of a fence-post or an old stump, where he has found or made a little hollow. There he puts his nut or acorn, picks it to pieces, and eats it in bits. The young red-head is a good deal like his father, only his head is brown instead of red. A queer thing happened to a baby red-head in Indiana one summer. He was found on the ground, hopping about in a pitiful way, unable to fly. The parents and others of the woodpecker tribe were flying about him, much troubled, and trying to help him. But this young one had been hurt, or was not yet strong enough to get about. He acted as if he were half paralyzed, and he was wholly helpless. Once while the little bird was hobbling about
  • 78. DOWNY WOODPECKER and calling for something to eat, and no one was there to feed him, a robin happened to notice him. He took pity on the hungry baby, and brought him a nice worm, which he took very gladly. But still more strange was the way the family cat acted toward the little stranger. When she saw him on the ground, she started for him. No doubt she meant to catch him, for she was a great bird hunter. When she got almost up to the little fellow, she seemed suddenly to notice that he was a baby, and helpless. At once her manner changed. She went up to him, and actually played with him in the gentlest way, not hurting him in the least. She did this several times before the bird got strong enough to fly. This is a true story. The Californian Woodpecker takes the place of the red-head in California. He is most interesting because of one habit which gives
  • 79. him the common name of "carpenter woodpecker." This habit is of storing sweet acorns for winter use. Other birds store acorns, but this bird has found out a new way. He drills a hole in the bark of a tree for each acorn by itself. It is generally a soft pine or cedar, and sometimes thousands of acorns are put in one tree. Often a trunk will be filled from near the ground up forty feet. The acorns are driven in point first, and so tightly that they have to be cut out with a knife. When a tree is filled, it is carefully guarded till they are needed. Many people think they lay up these acorns for the worms that sometimes come into them. But Mr. John Muir, who lives right there, and knows them as well as anybody in the world, says the birds eat the sound acorns themselves. Sometimes, when food is scarce, Indians go to these trees and steal the poor birds' store. They have to chop the acorns out with hatchets. They often take a bushel from one tree. These birds are more social than most woodpeckers. Often a party of them will be seen together. In his flight and his ways of eating this bird is like the red-headed woodpecker. Like him also, he is fond of clinging to a dead limb, and drumming, hours at a time. But in looks the Californian and the red-headed woodpeckers are very different. The Western bird has only a cap of bright red. His back is glossy blue-black, and he has the same color on the breast. His other under parts are white, and he has a white patch on the wings, and another just above the tail. The smallest of our woodpeckers is the Downy Woodpecker, who is not much bigger than an English sparrow. The picture shows two of these birds. In "The First Book of Birds" there is a picture of a flicker at his nest-hole.
  • 81. XXX THE KINGFISHER FAMILY (Alcedinidæ)[24] Most of the Kingfisher family belong to the tropics, but we have one who is found all over the United States. This is the Belted Kingfisher. The belted kingfisher is large and rather chunky. He is dark blue above and white below, with a bluish band across the breast. He has a fine crest and a big head, and he sits up straight as a hawk. The tail of the kingfisher is short, and square at the end. His plumage is thick and oily, so that it does not hold wet. This is very important to him in the way he gets his food, for he is an expert fisherman. He lives alone, or with his mate, near the water,—a lake, or pond, or small stream. This bird's way of getting fish is to dive for them. You may have seen him splash into the water out of sight, and in a moment come up with a small fish in his beak. Then he goes back to his perch and beats the fish to death, before he swallows it. He swallows it whole and head first, because the fins might stick in his throat if he took it tail first. After a while he throws up a little ball of the bones, scales, and skin of the fish he has eaten. It is said that the kingfisher can take a very large fish. One was shot who had swallowed a fish so long that the tail stuck out of his mouth, and could not get down. The nest of the kingfisher is in the bank of a river or lake. The birds first cut a passage or hallway. Sometimes this is only four feet long, and straight. But when stones or roots are in the way, it will be
  • 82. BELTED KINGFISHER much longer and have many turns. At the end of this passage is the kingfisher nursery. This is a round room nearly a foot across, with a roof rounded up over it. It is a little higher than the passageway so that water will not run into it. Sometimes it takes the birds two or three weeks to make one of these nests, as we might expect when we think they have only beaks and feet to work with. Usually it does not take so long. If the pair are not disturbed, they will use the same nest year after year. Sometimes the bed for the nestlings is of dry grass. One was found in which the bed was entirely of the bones and scales of fish. Mr. Baily has told us about a family of kingfisher little folk whom he studied and photographed. He dug down to the nest from above, and was careful not to hurt them and to put them back safely. First
  • 83. Mr. Baily took a picture of them when two days old. They were queer-looking objects, with eyes not open, and not a feather to their backs. They were not so young but that they had one notion in their little round heads. That was to cuddle up close together. They were not used to much room in their dark cradle. When Mr. Baily laid them out on the ground, they at once crawled up together and made themselves into a sort of ball. They put their bare wings and their bills over one another, and held on so that one could not be moved without the others. After they had sat for their picture they were carefully put back, and the nest was covered up again. When the nestlings were nine days old, the nest was opened again, and another picture taken. The little ones had grown a good deal in these few days. Their eyes were open, and they were fast getting their feather coats on. But they were just as fond of being close together as before. After this the birds were left in their home till they were twenty- three days old, and it seemed about time for them to come out. When the nest was opened this time, it was found that the family had moved. The old room was filled up with earth, and a new one made farther up. No doubt the old birds thought the man too curious about their babies. The young birds were ready to fly, and two of them did take to their wings when they came to daylight. There is a very old fable about the kingfisher, who was called the halcyon. It is told in the first book that was ever written about birds (so far as I know). The author was Aristotle, a Greek who lived three hundred years before Christ. The story is, that the bird builds a nest that floats on the sea, and for seven days before and seven days after the shortest winter day, the sea stays calm, so that the nest may not be hurt. During the first seven days she builds her nest, and
  • 84. in the second seven she hatches out the young. These fourteen days were called halcyon days. You may find more about this curious story in the encyclopædias. FOOTNOTE: [24] See Appendix, 23.
  • 85. XXXI THE CUCKOO FAMILY (Cuculidæ)[25] Most of the cuckoo family live in a hotter climate than ours, but we have a few of them. They are beautiful birds, with some peculiar ways. Cuckoos are rather slim in form, with very long tails, and bills a little curved. Their toes are divided like woodpeckers' toes, two turned forward and two back. In the Eastern States we have but two, the yellow-billed and the black-billed. Best known in the East is the Yellow-billed Cuckoo, and in California the Western Yellow-billed, or California, Cuckoo. This bird has several names. In some places he is called the rain crow, and in other places the wood pigeon; but of course he is neither a crow nor a pigeon. He is a graceful bird, with plumage like satin. He is a soft brown above and white below, but he is so shy that he is not so often seen as heard. His call or song is a loud, yet not harsh "kuk-kuk-kuk" many times repeated. Sometimes it begins slow and grows faster till the notes run into each other, and then grows slow again, ending in a sort of "cow-cow-cow;" but it does not always do so. The cuckoo does not manage her nursery affairs as other birds do. Most birds lay an egg a day, or every other day, so that they hatch about the same time; but this bird doesn't mind if several days come between. Thus it happens that one or more little cuckoos hatch out before the rest are ready, and it is common to find little ones of several ages in the same nest. There may be one nearly
  • 86. YELLOW-BILLED CUCKOO grown, another just beginning to get feathers, and a third one not yet out of the egg. There is another droll thing that may be found in a cuckoo's nest. When the feathers begin to grow out on young birds, they come wrapped in little sheaths. In most cases these sheaths burst open and the feathers show, when they are a little way out. But in this family it is different. The sheath does not open, says Mr. Dugmore, till the feathers have grown their full length. Till that happens, the youngster looks as if he were stuck all over with white pins on his black body. You have heard, or read, that the cuckoo lays eggs in other birds' nests, and leaves her young to be brought up by others. Do not forget that the bird who does that is the European cuckoo—not ours.
  • 87. Our cuckoos build nests, though very poor ones, sometimes hardly more than a platform of sticks. This bird is useful to us, for he eats some of our most troublesome insects,—such as tent caterpillars, which few birds like to eat because they are so hairy, and other insects with spines that are poisonous, and so generally avoided. The cuckoo is graceful in flight. He goes swiftly, without noise, and seems to glide through the thickest foliage with ease. I once found a young bird tumbling about on the ground. He was trying to fly, but was not able to go much more than a foot at a time. He was giving strange calls, which were answered from the woods beside the road by a low tapping sound. I thought of course the little one was a woodpecker and his mother was doing the knocking. It was so dark I could not see him well. After some trouble I caught him and was going to take a good look at him to see who he was before I let him go. As I grasped him he gave a shriek, and out from the thick trees popped a cuckoo. She alighted on a low branch outside and gave such a cry of distress that I knew at once it was her baby I held in my hand. I suppose the poor mother thought I wanted to carry the youngster off. I couldn't bear to have a bird think that for a minute; so I opened my hands and away he went, half flying, half scrambling up the road, while the mother slipped back into the woods. In a moment she began again her hollow-sounding calls, which I had thought were woodpecker tappings. FOOTNOTE: [25] See Appendix, 24.
  • 89. XXXII THE OWL FAMILY (Bubonidæ)[26] Owls differ from all other birds in having eyes that look forward like ours. They have also a broad face, which is made to look even wider by the feathers which stand out around the eyes. Owls cannot turn their eyes in the sockets, so they have to turn the whole head to see to one side. Many of them have tufts of feathers like horns, which they can stand up or lay down as they choose. These are called horned owls. An owl's legs are covered with feathers, sometimes down to the toes. The whole plumage of this bird is soft and fluffy, so that he can fly without making any noise. This is important to him, for he lives mostly on mice, and he never could catch one if he made much noise getting about. The owl's mate looks like him, and—what is unusual among birds —she is larger than he. Because they come out in the evening, when we cannot see them well, we know very little of their ways. They are more often heard than seen. Their voices are generally mournful, but that is no reason why they should be feared. All birds have control over some of their feathers, that is, they can make them stand up or lie down as they choose. But owls have more than any other bird. An owl can alter his shape or size so that he will look like another bird. Mr. Bolles says that a large owl can change from a mass of bristling feathers a yard wide, to a slim, sleek brown post only a few inches wide. When he does this, one cannot see him, though he may
  • 90. be in plain sight. His colors blend with a tree trunk, or stump, and he can stand without stirring for an hour, and likes to do it. Mr. Bolles had owls in the house, and watched them closely. He has told us some curious things about their ways. He says that when one steps daintily across the floor, his feathers tuck themselves up as a lady holds up her gown. This moving of the feathers sometimes looks very droll. When eating, the feathers around the mouth, which might get soiled, draw back out of the way. And when an owl wants to hide his food, he stands over it, and the feathers droop down like a curtain to screen it from view. When Mrs. Bolles wanted to sketch an owl, he kept changing his shape all the time, though he did not seem to move at all. Another man who had a pet owl says that the bird would stand before him and throw back his breast feathers each side, just as a man throws open his coat. The owlets come out of the egg dressed in soft, fluffy down. In some of the family it is gray, in others it is snowy white. They are carefully fed and reared by their loving parents. A funny story is told by a man who wanted to see what was in an owl's nest. He lifted the mother bird out, and to his surprise the whole family came out with her. She held on to one little one, and each one held on to the next, and so he had the whole owl family in a cluster, like a bunch of grapes. The Screech Owl is the best known of this family. He is found, under slightly different forms, all over our country. In Florida he is smaller and darker than in the Middle States. In California he is larger and grayer, and in the Rocky Mountains somewhat lighter. But he acts in about the same way, wherever he lives.
  • 91. Welcome to our website – the perfect destination for book lovers and knowledge seekers. We believe that every book holds a new world, offering opportunities for learning, discovery, and personal growth. That’s why we are dedicated to bringing you a diverse collection of books, ranging from classic literature and specialized publications to self-development guides and children's books. More than just a book-buying platform, we strive to be a bridge connecting you with timeless cultural and intellectual values. With an elegant, user-friendly interface and a smart search system, you can quickly find the books that best suit your interests. Additionally, our special promotions and home delivery services help you save time and fully enjoy the joy of reading. Join us on a journey of knowledge exploration, passion nurturing, and personal growth every day! ebookbell.com