SlideShare a Scribd company logo
Windows Server
70-740
Intro Server
Intro MCSA Class
MCSA
MCSA
Configuring Windows 10
Syllabus Course 70-697
•Windows server old
-Win 2003 (MCSE)
•New version
-Win 2008 (MCITP)
-Win 2012 (MCSA)
-Win 2016 (MCSA)
-Win 2019 (MCSA)
Configuring Windows 10
Windows 7 editions
•Starter
•Home Basic
•Home Premium
•Professional
•Enterprise
•Ultimate
Configuring Windows 10
Windows 8 editions
•Windows 8
•Windows 8 Pro
•Windows 8 Enterprise
•Windows RT Devices
Configuring Windows 10
Windows 10 editions
•Windows Home
•Windows Pro
•Windows Enterprise
•Windows Education
•Windows 10 Core
•Windows Mobile
•Windows Mobile Enterprise
Configuring Windows 10
Windows 10 Installation
Windows 10 Installation
Configuring Windows 10
Windows 10 Installation
Windows 10 installation methods:
• Upgrade
• Clean
• Dual boot installation
Configuring Windows 10
Upgrade
Upgrade
Configuring Windows 10
Upgrade
•Only 32-bit to 32-bit and 64-bit to 64-bit
–You cannot downgrade editions
Configuring Windows 10
Upgrade
Types of upgrades
-Intra-edition Upgrade
-Previous Windows Version Upgrade
Configuring Windows 10
Windows 10 Installation
Clean Installation types
–Standard installation
–Unattended installation
Configuring Windows 10
Windows 10 installation sources
DVD
USB Flash
WDS (Win Deployment Services )
Imaging
Configuring Windows 10
Windows 10 installation using a USB flash device
Connect the USB storage device 8 GB+ to a computer
Open an CMD type diskpart
DISKPART> list disk
DISKPART> select disk X
DISKPART> clean
DISKPART> create partition primary
DISKPART> format fs=ntfs quick
DISKPART> active
copy all the files located on the Windows 8 installation DVD to
the USB storage device.
Configure the BIOS computer on which you want to install
Windows 10 to boot from the USB storage device
Configuring Windows 10
Using Win Deployment Services as an
Installation
(WDS)
•More efficient than network
•Multicast
•Updates, drivers
•Can be automated
Configuring Windows 10
Dual boot
•You must a new/clean installation or dual boot the
system
•After installation, applications must be reinstalled
Configuring Windows 10
Change Default Operating System
Configuring Windows 10
User Profile and Data Migration
User Profile
Configuring Windows 10
User Profile and Data Migration
User Profiles
Local user profiles include
– Documents
– Custom application settings
– Windows settings
Configuring Windows 10
User Profile and Data Migration
User Profile
User Accounts
Create User Accounts
Account Options
Built-in Accounts
Configuring Windows 10
User Profile and Data Migration
Groups
Create Group
Built-in Groups
Administrators Group
Login
Log off
Switch User
• Server
• Windows Server Editions
• Installing Windows Server
• Management Windows Server
• -Server Management
-RDP
-MMC
• Disk Management
Syllabus
• Print Server
• Active Directory
- Installing Domain
-OU , User , Computer and Group
-Join Workstations to Domain
-Create Home folder
-Shared and NTFS Permission
• File Server
• Backup and Restore
Intro Server
What is Server?
• Hardware
• OS
-Security
-Availability
Intro Server
Important Note
• Power Supply
• Cooler
Intro Server
• Operating System
-No limit
• Server Category
• Application Server
-Mail Server
-Database Server
-Web Server
• Remote Access Server
Intro Server
Infrastructure Server
• DHCP Server
• DNS Server
• Wins Server
• Authentication Server
Intro Server
Management and Monitoring Server
- Limit cost
• Example
- Configuration Manager
- Operation Manager
Intro Server
• Web Edition.
• Standard Edition.
• Enterprise Edition.
• Datacenter Edition.
Windows Server 2003 Edition
• Standard
• Enterprise
• Datacenter
Windows Server 2008 Edition
• Foundation
• Essentials
• Standard
• Datacenter
- All Editions 64bit
Windows Server 2012 Edition
• Essentials
• Standard
• Datacenter
- All Editions 64bit
Windows Server 2016 Edition
• Essentials Edition
Windows Server 2016 Edition
Maximum number of users & Devices 25 - 50
Maximum number of CPU sockets 2 (no limit on CPU cores)
Maximum RAM 64 GB
Hyper-V No
• Standard Edition
Windows Server 2016 Edition
Maximum number of users Unlimited
Maximum number of CPU sockets 64 (no limit on CPU cores)
Maximum RAM 24 TB
Hyper-V Yes
• Datacenter Edition
Windows Server 2016 Edition
Maximum number of users Unlimited
Maximum number of CPU sockets 64 (no limit on CPU cores)
Maximum RAM 24 TB
Hyper-V Yes
• Essentials
• Standard
• Datacenter
- All Editions 64bit
Windows Server 2019 Edition
• Essentials Edition
Windows Server 2019 Edition
Maximum number of users & Devices 25 - 50
Maximum number of CPU sockets 2 (no limit on CPU cores)
Maximum RAM 64 GB
Hyper-V No
• Standard Edition
Windows Server 2019 Edition
Maximum number of users Unlimited
Maximum number of CPU sockets 64 (no limit on CPU cores)
Maximum RAM 24 TB
Hyper-V Yes
• Datacenter Edition
Windows Server 2019 Edition
Maximum number of users Unlimited
Maximum number of CPU sockets 64 (no limit on CPU cores)
Maximum RAM 24 TB
Hyper-V Yes
Installation and Upgrade
Hardware
Component
Minimum
Requirements
Recommended
CPU 1.4 GHz(x64) 2 GHz Or faster
RAM 1 GB 2 GB
Disk Space 32GB 60 GB
Minimum Hardware Requirement
Selecting a Windows Server 2016 edition
• The roles you intend the servers to perform
• The virtualization strategy you intent to
implement
• The licensing strategy you plan to use
Selecting a Windows Server 2016 edition
• GUI (Full Installation)
• Server Core
• Minimal Server Interface
Choosing installation options
• What is Server Core?
- Does not provide a GUI desktop.
- Core version will only have the command shell
-Windows Server 2016 Standard and Datacenter
Server Core mode
The advantages of running servers using Server Core
• Hardware resource conservation
• Reduced disk space
• Reduced patch frequency
• Reduced attack surface
The advantages of running servers using Server Core
Minimal Server Interface
The Minimal Server Interface is a setting that removes some of
the most hardware-intensive elements from the graphical
interface.
Server Manager
MMC applications
Device Manager
PowerShell interface
The advantages of running servers using Server Core
The advantages of running servers using Server Core
Windows Server 2016
Installation and Upgrade
Installation and Upgrade
Preparing to upgrade
• Check hardware compatibility
• Check disk space
• Confirm that software is signed
• Save mass storage drivers on removable media
• Check application compatibility
• Perform a full backup
• Disable virus protection software
• Purchase Windows Server 2016
Windows Server 2016 Edition
• Set Password Administrator Account
• Configure the network connection
• Set the time zone
• Enable Remote Desktop
• Rename the computer
• Active Windows
• Join a domain
• Installing Anti Virus
• Update Windows
Windows Server 2016 Edition
Rename Computer name with Comman:
ntedom renamecomputer %computername% /newname:
<NewComputername>
Then, to join the computer to a domain, use the following
syntax:
netdom join %computername% /domian: <DomainName>
/userd: <UserName> /passwordd:
To enable Remote Desktop connections on the server
Set-Remotedesktop -enable
Windows Server 2016 Edition
Converting between GUI and Server Core
Install -windowsFeature Server-gui-Infra,Server-
gui-shell –restart
unistall -windowsFeature Server-gui-Mgmt-
infra,Server-gui-shell -Restart
Windows Server 2016 Edition
NIC teaming in Windows Server 2016 supports two
modes:
• Switch Independent Mode All of the network
adapters are connected to different switches,
providing alternative routes through the network.
• Switch Dependent Mode All of the network
adapters are connected to the same switch,
providing a single interface with their combined
bandwidth.
Windows Server 2016 Edition
Services
• Network Load Balancing (NLB)
• Fail over Clustering
Windows Server 2016 Edition
Storage Type
• Basic
Primary
- Partition
Extended
Disk Management
Storage Type
• Dynamic
Simple
Spanned
Volume Striped
Mirrored
RAID-5
Disk Management
• Mirrored
Break Mirror
- Mirror Association
Remove Mirror
Disk Management
• Spanned Uses space from multiple disks
appearing as single volume
• Striped (RAID-0) Uses space from multiple disks
appearing as single volume
• Mirrored (RAID-1) An identical copy of a volume
is created on another physical disk, for fault
tolerance.
• RAID-5 Striped set with parity allows the system
to continue running in the event of a single disk
failure
Disk Management
RAID-5
Disk Management
CHOOSING A RAID TECHNOLOGY
Disk Management
M
Mi
ir
rr
ro
or
re
ed
dV
Vo
ol
lu
um
me
es
s(
(R
RA
AI
ID
D-
-1
1)
) S
St
tr
ri
ip
pe
ed
dV
Vo
ol
lu
um
me
es
sw
wi
it
th
hP
Pa
ar
ri
it
ty
y(
(R
RA
AI
ID
D-
-5
5)
)
Can protect system
or boot partition
Cannot protect system or boot
partition
Requires two hard disks Requires a minimum of three
hard disks and allows a
maximum of 32 hard disks
Has a higher cost per MB Has a lower cost per MB
50 percent redundancy 33 percent maximum
redundancy
Has good read and write
performance
Has excellent read and
moderate write performance
Uses less system memory Requires more system memory
Hardware RAID
RAID Controller
- RAID 0
- RAID 1
- RAID 5
- RAID 6
- RAID 1+0
Disk Management
RAID-1+0
Disk Management
Active Directory
- Active Directory thus acts as an identity store, providing a
single trusted list of Who’s Who in the domain.
that contains logon scripts and group policy information.
that support and use the database, including
• Lightweight Directory Access Protocol (LDAP)
• Kerberos security protocol
• replication processes, and the File Replication Service (FRS)
Active Directory
Chapter 1: INTRODUCING
MICROSOFT WINDOWS
SERVER 2003
63
DOMAINS AND DOMAIN
CONTROLLERS
Domain Controller
.
contoso.com
Domains:
Provide administrative and security boundaries
Allow resources to be grouped logically
Can contain Organizational Units
(OU
's) to further organize resources
Active Directory
Trees
Multiple domain models create logical structures called trees
For example
Contoso.com
us.contoso.com
en.contoso.com
share contiguous DNS namespace
Active Directory
Chapter 1: INTRODUCING
MICROSOFT WINDOWS
SERVER 2003
65
contoso.com
us.contoso.com en.contoso.com
Active Directory
Forests
A forest may contain multiple domains in multiple trees, or just
one domain
Active Directory
ACTIVE DIRECTORY FOREST
contoso.com
us.contoso.com en.contoso.com
kahkeshan.com
Qazvin.kahkeshan.com Shiraz.kahkeshan.com
OBJECTS AND ATTRIBUTES
• Objects
– Users, groups, printers, computers
• Attributes
– Names, phone numbers, locations
Active Directory
69
CONTAINERS
• Containers
– Domains, organizational units (OUs), groups
• Leaves
– Users, printers, computers
Active Directory
Objects and Organizational Units (OUs)
allow you to group objects that share common administration
or configuration.
Active Directory
Delegation
Administrative delegation relates to the simple idea that you
might want able to change the password for a certain subset
of users
Resetting user passwords is just one example of
administrative delegation
Active Directory
Group Policy
• Group policy objects
– Collections of hundreds of possible configuration settings.
– Can be applied to users, computers
Active Directory
Schema
• Object classes
– User accounts
– Computer accounts
– Printers
– Groups
• Object Attributes
– Name
– Location (for printer)
– E-mail address (for users)
Active Directory
• The Microsoft Management Console
• Managing Computers Remotely with the MMC
• Managing Servers with Remote Desktop for Administration
-Enabling and Configuring Remote Desktop for Administration
- The Terminal Services service enables Remote Desktop, Remote
Assistance, and Terminal Server for application sharing
Win 2016 Environment
Network failures
-If DNS is not functioning
-If routing is not functioning
-Terminal Services port (by default, port 3389)
Change port Number RDP
HKEY_LOCAL_MACHINE > System >
CurrentControlSet > Control > TerminalServer >
WinStations > RDP-Tcp>port number
Terminal Services Troubleshooting
Credentials Users must belong to the
Administrators or Remote Desktop Users
group to successfully connect to the server
using Remote Desktop for Administration.
Too many concurrent connections
Terminal Services Troubleshooting
- Making the Request for Assistance
• Offering Remote Assistance to a User
gpedit.msc  Administrative Templates System
Remote Assistance
Double-click Offer Remote Assistance and then select Enabled
Next, click Show, then specify the individual users
that will be allowed to offer assistance by assigning
helpers within the context of this policy
Using Remote Assistance
Install Active Directory
DCPROMO Command
The Active Directory database store, Extensible Storage Engine (ESE) and is
limited to 16 terabytes and 2 billion Objects. This data base Called
NTDS.DIT
In Windows Server 2008 a third main table was
• Schema information
definitional details about objects and attributes that Replicates to all
domain controllers.
• Configuration information
configuration data about forest and trees. Replicates to all domain
controllers.
• Domain information
object information for a domain. Replicates to all domain controllers
within a domain.
User Accounts
User Accounts
User Accounts
• Creating and Managing User Objects
• Creating User Objects with Active Directory Users and
Computers
- Start  Administrative Tools  Active Directory Users and
Computers
OR
RUN DSA.MSC
User Accounts
User Properties in the First Page of the New Object–User
• First Name The user’s first name. Not required.
• Initials The middle initials of the user’s name. Not required.
• Last Name The user’s last name. Not required.
• Full Name The field is required. The name entered here must
be unique relative to all other objects in the OU.
• User Logon Name The User Principal Name (UPN) consists of
a logon name and a UPN suffix
• User Logon This logon name is used to log on from down-level
clients, such as Microsoft Name (Pre– Win 95, Win98, Win
Millennium ), Win 2000 , Win NT 4, or Win NT 3.51. This field
is required and must be unique within the domain.
User Accounts
The second page of the dialog box
The default account policies in a Windows Server 2008
domain, set in the Default Domain Policy GPO, requires
complex passwords :
that have a minimum of seven characters.
password must contain three of four character types:
uppercase, lower-case, numeric, and non-alphanumeric.
User Accounts
Password : The password that is used to authenticate the user.
For security reasons, you should always assign a password
Confirm Password : Confirm the password by typing it a second
time to make sure you typed it correctly.
User Must Change Pass At Next Logon
Password Never Expires
Account Is Disabled
User Accounts
Managing User Objects with Active Directory Users And
Computers
• Account properties: the Account tab These properties
include those that are configured when you create a user
object, including logon names, password and account flags.
• Personal information: the General, Address, Telephones,
and Organization tabs The General tab exposes the name
properties that are configured when you create a user
object.
• User configuration management: the Profile tab Here you
can configure the user’s profile path, logon script, and
home folder locations.
User Accounts
• Group membership: the Member Of tab You can add and
remove user groups, and set the user’s primary group.
• Terminal services: the Terminal Services Profile,
Environment, Remote Control, and Sessions tabs These four
tabs allow you to configure and manage the user’s
experience when they are connected to a Terminal Services
session.
• Remote access: the Dial-in tab Allows you to enable and
configure remote access permission for a user.
• Applications: the COM+(Component Object Model) tab
Assigns Active Directory COM+ partition sets to the user.
This feature, facilitates the management of distributed
applications.
User Accounts
• Create OU
• Moving a User
• Creating Multiple User Objects
- Creating and Utilizing User Object Templates
• Importing User Objects Using CSVDE
• Utilizing Active Directory Command-Line Tools
- DSADD Adds. The DSADD you to create objects in Active
Directory.
- DSGET The DSGET command gets, and outputs, selected
properties of one or more existing objects.
- DSMOD Modifies select attributes of an existing object in
the directory.
User Accounts
• DSMOVE Moves an object from its current container to a
new location.
• DSRM Removes an object, the complete sub tree under
an object, or both.
• DSQUERY The DSQUERY command queries Active Directory
for objects that match a specific criteria set.
DS Command
Managing User Profiles
User Profiles: A user profile is a collection of folders
and data files that contain the elements of your
desktop environment that make it uniquely yours
User Profile Types
-Local
-Roaming
-Mandatory
User Profile Types
• By default, user profiles are stored locally on the system in the
%Systemdrive% Users%Username% folder.
• When a user logs on to a system for the first time, the system
creates a profile for the user by copying the Default User
profile
Local Profile
• By default, user profiles are stored locally on the system in the
%Systemdrive% Users%Username% folder.
• When a user logs on to a system for the first time, the system
creates a profile for the user by copying the Default User
profile
Local Profile
If users work at more than one computer, you can configure
roaming user profiles (RUPs)
Mandatory User Profiles
To specify a profile for individuals or an entire group of
users.
Roaming & madatory User Profiles
• Home Folders
A home folder is an additional folder that you can
provide for users to store personal documents
- Users can access to their home folders from any client
computer on the network.
- The backing up and administration of user documents
is centralized.
- The home folders are accessible from a client
computer running any Microsoft operating system
(including MS-DOS, Windows 95, Windows 98,
Windows Me, Windows 2000, and Windows Server
2003).
User Accounts
Installing Windows Server 2016
Server Core
Installing Server Core
• What is Server Core?
- Server Core is a version of Windows Server 2008
which does not provide a GUI desktop.
- Core version will only have the command shell
available and can only do very basic configuration tasks
locally.
- All additional management must be done remotely.
Installing Server Core
• When should I use Server Core?
-Server Core should be used when you have
limited hardware
increased security.
Installing Server Core
A Server Core installation provides a minimal environment for
running specific server roles
• Active Directory Domain Services (AD DS)
• Active Directory Certificate Services (AD CS)
• Active Directory Lightweight Directory Services (AD LDS)
• DHCP Server
• DNS Server
• File Services
• Print Services
• Streaming Media Services
• Internet Information Services (IIS)
• Hyper-V
Installing Server Core
Remote Management
• There are 2 general choices when it comes to
remote management:
• Remote Server Administration Tools (RSAT)
• Remote Desktop
Installing Server Core
Computer Accounts
Computer Accounts
UNDERSTANDING COMPUTER OBJECTS
• Can be granted permissions to other objects and be subject
to group policy
• Can be made a member of a group
Computer Accounts
ADDING COMPUTERS TO A DOMAIN
• Step 1: Create a computer account in Active Directory
• Step 2: Join the computer to the domain
Computer Accounts
CREATING COMPUTER OBJECTS
• Computer object must exist in Active Directory before
computer can be log on to the domain.
• Computer object can be created using Active Directory Users
and Computers or a command-line tool such as Dsadd.
dsadd computer "cn=pc5,ou=sales,dc=test,dc=com"
• Computer account can also be created during the domain
joining process.
Computer Accounts
CREATING COMPUTER OBJECTS USING NETDOM.EXE
• Command-line utility
• Simpler to use than Dsadd
Computer Accounts
JOINING A DOMAIN USING NETDOM.EXE
Allows computers to be joined to the domain
from a command line
Computer Accounts
LOCATING OTHER COMPUTER OBJECTS
• domain-controller computer accounts are
placed in the Computers system-created
container by default.
• Container does not support group policy
Computer Accounts
DELETING COMPUTER OBJECTS
• Manually through Active Directory Users and
Computers
• Using a command-line tool such as Dsrm
Computer Accounts
RESETTING A COMPUTER OBJECT
• Necessary when replacing or upgrading a computer
system
• Allows an appropriately named new system to use
an existing computer account
Computer Accounts
TROUBLESHOOTING COMPUTER ACCOUNTS:
SOLUTIONS
• Reset the computer account in Active Directory.
• If the computer account is missing, create a
computer account.
• If the computer still belongs to the domain, you
must remove it from the domain by changing its
membership to a workgroup.
• Rejoin the computer to the domain.
Computer Accounts
Finding and Connecting to Objects in Active Directory
Computer Accounts
Group Accounts
Group Accounts
LOCAL GROUPS
• Can be used only on the system on which they are
created
• In a workgroup environment, can contain only users
from the local system
• In a domain environment, can contain users and
global groups
• Cannot be created on a domain controller
Group Accounts
Local Group:
Administrators
Backup Operators
Guests
Network Configuration Operators
Power Users
Remote Desktop Users
Users
Group Accounts
WINDOWS SERVER 2016 DEFAULT GROUPS
• Built-in local groups
• Predefined Active Directory groups
• Built-in Active Directory groups
• Special identities
Installation and Implement Active Directory
BUILT-IN LOCAL GROUPS
Installation and Implement Active Directory
PREDEFINED ACTIVE DIRECTORY GROUPS
Installation and Implement Active Directory
BUILT-IN ACTIVE DIRECTORY GROUPS
Installation and Implement Active Directory
Special Identities
Installation and Implement Active Directory
Special Identities
That are managed by the operating system.
Special identities cannot be created or deleted
Installation and Implement Active Directory
• Everyone
• Network
• Interactive
• Anonymous Logon
• Authenticated Users
• Creator Owner
• Dialup
Installation and Implement Active Directory
USING ACTIVE DIRECTORY GROUPS
• Types
– Security
– Distribution
• Scopes
– Domain Local
– Global
– Universal
Group Accounts
SECURITY GROUPS
• Used to assign access permissions for network resources.
• Can also be used as a distribution group.
• The most common type of group created and used in Active
Directory.
Group Accounts
Distribution Group
Used to combine users for e-mail distribution lists
Group Accounts
Finding the Domain Groups to Which a User Belongs
dsget user "cn=user1,ou=sales,dc=test,dc=com" -memberof
dsget group "cn=administrators,cn=builtin,dc=test,dc=com" -members
"CN=Domain Admins,CN=Users,DC=test,DC=com"
"CN=Enterprise Admins,CN=Users,DC=test,DC=com"
"CN=Administrator,CN=Users,DC=test,DC=com“
dsget group "cn=group manage,ou=staff,dc=test,dc=com" -members
Group Accounts
Delegation of Control
Delegation of Control
We are going to work in the kahkeshan.com
domain
• 3 – Management
• 2– Sales
• 4 – Staff
• 4 – R & D
• 3 – IT
Delegation of Control
Goals:
The company help desk has determined that supervisor if they
forget their password and need it reset.
• Staff need to be given the Active Directory privileges to reset
passwords for the users on their OU.
• A custom tool needs to be designed for the managers to use
when resetting passwords. This tool must be very simple to
use since the Staff are not IT trained.
Delegation of Control
• Setting permissions in Active Directory
• Delegation of Control Wizard
• Create a Custom MMC
Delegation of Control
Sharing
Sharing
Configuring Permissions
• Permissions can be set as an allow or deny permission.
Sharing
RESTRICTIONS ON CREATING FILE SHARES
• On a domain controller: Administrators, Server Operators,
Enterprise Admins , Domain Admins groups only
• On a domain member server or workstation: Administrators,
Server Operators, or Power Users groups only
• On a workgroup or standalone computer: Administrators or
Power Users groups only
Files and Folders
CREATING A FILE SYSTEM SHARE
USING NET.EXE
• Allows shares to be created from a command line
• you need to create a very large number of shares,
using the Net command
Files and Folders
Configuring Share Permissions
• Read : Users can display folder names, file names, file
data and attributes. Users can also run program files and
access other folders within the shared folder.
• Change : Users can create folders, add files to folders,
change data in files, delete folders and files, and perform
actions permitted by the Read permission.
• Full Control: Users can change file permissions, take
ownership of files, and perform all tasks allowed by the
Change permission.
Files and Folders
The effective set of share permissions is the cumulative
result of the Allow permissions granted to a user and
all groups to which that user belongs.
Ali member Group A = Read
+
Ali member Group B = Change
----------
Effective permissions = Change
Files and Folders
However, a Deny permission will override an Allow permission.
Ali member Group A = Read
+
Ali member Group B = Denied Full Control
----------
Effective permissions = Unable to read the files or folders in that share
Files and Folders
SHARE PERMISSION DEFAULTS
• When a new share is created, the following
permissions are granted:
– Everyone special identity: Read
Files and Folders
File and Folder Access
File and Folder NTFS Permissions
There are six standard permissions
• Full Control: When applied to folders, allows the reading,
writing, changing, and Delete of files and subfolders Allows
modification of permissions on files and folders.
• Modify : When applied to folders, allows the reading, writing,
changing, and deletion of files and subfolders.
• Read & Execute : When applied to folders, allows the content
of the folder to be accessed and executed. When applied to a
file, allows the file to be accessed and executed.
File and Folder Access
NTFS Permissions
• List Folder Contents : Can be applied only to folders,
allows the contents of the folder to be viewed.
• Read: When applied to folders, allows content to be
accessed. When applied to a file, allows the contents to
be accessed. Differs from Read & Execute in that it does
not Allow files to be executed.
• Write: When applied to folders, allows adding of files and
subfolders. When applied to a file, allows a user to modify,
but not delete, a file.
Real-World Use of Share Permissions
A drive volume is FAT32, which then does not support NTFS
permissions.
Real-world rule is: Configure shares with Everyone: Allow Full
Control share permissions, and lock down, using NTFS
permissions.
Both Share and NTFS Permissions apply to resource
Restrictive effective permission set to resource
Files and Folders
Inheritance
Understanding Inheritance
Files and Folders
Files and Folders
Overriding Inheritance
Files and Folders
• Reinstating Inheritance
Files and Folders
Understanding Effective Permissions
• File permissions override folder permissions
• Allow permissions are cumulative
Group Sales Allowed Group Sales Manager allowed
write Read & Execute
Read & Execute Deletes permissions
Effective permissions = Modify permissions
Read & Execute, Write and Delete.
Files and Folders
Understanding Effective Permissions
• Deny permissions take precedence over Allow permissions
• Explicit permissions take precedence over inherited
permissions
- Explicit Allow permission will override an inherited Deny
permission.
Files and Folders
Files and Folders
• Resource Ownership: Creator Owner
• Creator Owner: Creator Owner Full Control
• Ownership: If Owner managed to modify the ACL and deny
herself Full Control, could modify the ACL
Files and Folders
Take Ownership
• Administrators can
• Allowed Take Ownership permission
• Restore Files And Directories user right enables the
transfer of ownership
It possible for administrators and backup operators to
manage
Files and Folders
Auditing File System Access
• You are able to audit for successes, failures
- Successes
• To log resource access for reporting.
• To monitor for access
- Auditing for failed access
• To monitor for malicious attempts to access a resource to
which access has been denied.
• To identify failed attempts to access a file or folder to
which a user does require access.
Files and Folders
• Enabling Auditing
enable auditing (GPO).
The Audit Policy node is located under:
Computer Configuration, Windows Settings,
Security Settings, Local Policies, Audit Policy
,Audit object access
Files and Folders
Scenario
All of the users’ staff Documents folders will be redirected to a
shared location on the file server.
Users must be limited to 100 MB of data which they can store
on the file server.
A printer will be installed and shared so that users can quickly
access and install the printer on their client computers.
File and Print Server
• Installing the File Services Role
• NTFS File & Folder Permissions
• Setting Group Policy
• Setting up Disk Quotas Using the File System Resource
Manager
• Installing the Print Services Role
• Installing a Printer
• Sharing a Printer
• Printer Permissions
File and Print Server
Troubleshooting
- Out of paper
-Out of toner
-Paper jam
-Not turned on (Offline)
-Not plugged in
-Networking Problem
-Restart Spooler Service
File and Print Server
Backup and Recovery
Backup and Recovery
-system protection
-Backup and Restore
Backup and Recovery
r
system protection
-What is system protection?
• Is a feature that regularly creates and saves information about your
computer's system files and settings , also saves previous versions of files
that you've modified.
• They're created automatically once every seven days
• you can create restore points manually at any time.
• Is automatically on for the drive that Windows is installed on.
• can only be turned on for drives NTFS file system.
- Advantage of system protection:
• If your computer is running slowly or isn't working properly
• If you accidentally modify or delete a file or folder
Backup and Recovery
• Backup and Restore
- Create a system image
- Create a system repair disk
Backup and Recovery
Determining a Backup Strategy
BACKUP TYPES:
• Normal
• Incremental
Backing Up Data
BACKUP JOB TYPES: NORMAL
• Backs up all files
• Clears the archive bit
• Can require large data storage capacity
Backing Up Data
BACKUP JOB TYPES: INCREMENTAL
• Backs up only files that have been modified or
created since the last full or incremental
backup
• Clears the archive bit
• Can require considerably less storage space
than a normal backup
Backing Up Data
Combining Backup Types
-Normal and incremental backups
Backing Up Data
Normal and Incremental backups
On Sunday a normal backup is performed
On Monday through Friday incremental backups are
performed
If data becomes corrupt on Friday, you need to restore
the normal backup from Sunday and each of the
incremental backups from Monday through Friday
This strategy takes less time to back up but more time
to restore.
Backing Up Data
Understanding VSS
Volume Shadow Copy Service allows taking manual or automatic
backup copies
Windows Server 2008 offers VSS, also referred to as “snap
backup.”
VSS allows the backing up of databases and other files that are
held open
Backing Up Data
Shadow Copies of Shared Folders
Enabling and Configuring Shadow Copies
Backing Up Data
How to Configure the Shadow Copy Service
• Setting up the Schedule
• Picking a Storage Location
• Previous Versions
Backup and Recovery

More Related Content

PPTX
Windows Server 2019.pptx
PPTX
Understanding the Windows Server Administration Fundamentals (Part-1)
PPT
Chapter03 Creating And Managing User Accounts
PDF
Windows Server 2019 -InspireTech 2019
PPTX
History of Windows Server
PPTX
Understanding the Windows Server Administration Fundamentals (Part-2)
PPTX
Windows server
PDF
Install active directory on windows server 2016 step by step
Windows Server 2019.pptx
Understanding the Windows Server Administration Fundamentals (Part-1)
Chapter03 Creating And Managing User Accounts
Windows Server 2019 -InspireTech 2019
History of Windows Server
Understanding the Windows Server Administration Fundamentals (Part-2)
Windows server
Install active directory on windows server 2016 step by step

What's hot (20)

PPTX
Backup & restore in windows
PPTX
Introduction 2 linux
PPTX
Introduction to Linux
PDF
Microsoft Windows Server 2022 Overview
PPTX
What is Virtualization
PPT
Linux seminar
PPT
Intro to linux
PPTX
What is active directory
PPT
active-directory-domain-services
PPT
System Administration: Introduction to system administration
PPTX
Microsoft Active Directory.pptx
PDF
Windows Server 2012
PDF
An Introduction to VMware NSX
PPT
comparing windows and linux ppt
PDF
Linux Presentation
PPTX
WINDOWS SERVER 2008
PPT
Active Directory
PDF
What’s New in VMware vSphere 7?
PPTX
Linux file system
PPTX
IBM Spectrum Scale Authentication for File Access - Deep Dive
Backup & restore in windows
Introduction 2 linux
Introduction to Linux
Microsoft Windows Server 2022 Overview
What is Virtualization
Linux seminar
Intro to linux
What is active directory
active-directory-domain-services
System Administration: Introduction to system administration
Microsoft Active Directory.pptx
Windows Server 2012
An Introduction to VMware NSX
comparing windows and linux ppt
Linux Presentation
WINDOWS SERVER 2008
Active Directory
What’s New in VMware vSphere 7?
Linux file system
IBM Spectrum Scale Authentication for File Access - Deep Dive
Ad

Similar to windows-server- 2019 installing and configuring (20)

PPTX
1 introduction to windows server 2016
PPTX
Windows Server 2016 MCSA Module1 - Introduction
PPTX
Chapter 1 Installing Windows Server 2016(1).pptx
PPTX
Instalacion de windows server 2012
PPTX
Best MCSA - SQL SERVER 2012 Training Institute in Delhi
PPTX
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
PPTX
70-410 Practice Test
PPTX
Windows Server 2008 R2
PPTX
Win08 R2 It Pro Overview
PPT
Mcts chapter 2
PPTX
Windows 2008 R2 Overview
PPTX
Microsoft Offical Course 20410C_01
PPTX
Deploying and managing windows server 2012.pptx
PPT
1517307.ppt
PDF
Windows Server 2019 vs. 2016 & Standard vs. Datacenter.pdf
PPTX
70-410 Installing and Configuring Windows Server 2012
PPTX
What's New In Windows Server 2008 R2 For IT Pros - Extended Edition
PPTX
Chapter Two.pptx
PDF
Upgrading from WinS 2008/2008 R2 to WinS 2012
PPTX
Server 2016 sneak peek
1 introduction to windows server 2016
Windows Server 2016 MCSA Module1 - Introduction
Chapter 1 Installing Windows Server 2016(1).pptx
Instalacion de windows server 2012
Best MCSA - SQL SERVER 2012 Training Institute in Delhi
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
70-410 Practice Test
Windows Server 2008 R2
Win08 R2 It Pro Overview
Mcts chapter 2
Windows 2008 R2 Overview
Microsoft Offical Course 20410C_01
Deploying and managing windows server 2012.pptx
1517307.ppt
Windows Server 2019 vs. 2016 & Standard vs. Datacenter.pdf
70-410 Installing and Configuring Windows Server 2012
What's New In Windows Server 2008 R2 For IT Pros - Extended Edition
Chapter Two.pptx
Upgrading from WinS 2008/2008 R2 to WinS 2012
Server 2016 sneak peek
Ad

Recently uploaded (20)

PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Institutional Correction lecture only . . .
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
master seminar digital applications in india
PDF
Pre independence Education in Inndia.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Sports Quiz easy sports quiz sports quiz
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
102 student loan defaulters named and shamed – Is someone you know on the list?
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Institutional Correction lecture only . . .
Microbial disease of the cardiovascular and lymphatic systems
master seminar digital applications in india
Pre independence Education in Inndia.pdf
PPH.pptx obstetrics and gynecology in nursing
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
human mycosis Human fungal infections are called human mycosis..pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

windows-server- 2019 installing and configuring

  • 3. Configuring Windows 10 Syllabus Course 70-697 •Windows server old -Win 2003 (MCSE) •New version -Win 2008 (MCITP) -Win 2012 (MCSA) -Win 2016 (MCSA) -Win 2019 (MCSA)
  • 4. Configuring Windows 10 Windows 7 editions •Starter •Home Basic •Home Premium •Professional •Enterprise •Ultimate
  • 5. Configuring Windows 10 Windows 8 editions •Windows 8 •Windows 8 Pro •Windows 8 Enterprise •Windows RT Devices
  • 6. Configuring Windows 10 Windows 10 editions •Windows Home •Windows Pro •Windows Enterprise •Windows Education •Windows 10 Core •Windows Mobile •Windows Mobile Enterprise
  • 7. Configuring Windows 10 Windows 10 Installation Windows 10 Installation
  • 8. Configuring Windows 10 Windows 10 Installation Windows 10 installation methods: • Upgrade • Clean • Dual boot installation
  • 10. Configuring Windows 10 Upgrade •Only 32-bit to 32-bit and 64-bit to 64-bit –You cannot downgrade editions
  • 11. Configuring Windows 10 Upgrade Types of upgrades -Intra-edition Upgrade -Previous Windows Version Upgrade
  • 12. Configuring Windows 10 Windows 10 Installation Clean Installation types –Standard installation –Unattended installation
  • 13. Configuring Windows 10 Windows 10 installation sources DVD USB Flash WDS (Win Deployment Services ) Imaging
  • 14. Configuring Windows 10 Windows 10 installation using a USB flash device Connect the USB storage device 8 GB+ to a computer Open an CMD type diskpart DISKPART> list disk DISKPART> select disk X DISKPART> clean DISKPART> create partition primary DISKPART> format fs=ntfs quick DISKPART> active copy all the files located on the Windows 8 installation DVD to the USB storage device. Configure the BIOS computer on which you want to install Windows 10 to boot from the USB storage device
  • 15. Configuring Windows 10 Using Win Deployment Services as an Installation (WDS) •More efficient than network •Multicast •Updates, drivers •Can be automated
  • 16. Configuring Windows 10 Dual boot •You must a new/clean installation or dual boot the system •After installation, applications must be reinstalled
  • 17. Configuring Windows 10 Change Default Operating System
  • 18. Configuring Windows 10 User Profile and Data Migration User Profile
  • 19. Configuring Windows 10 User Profile and Data Migration User Profiles Local user profiles include – Documents – Custom application settings – Windows settings
  • 20. Configuring Windows 10 User Profile and Data Migration User Profile User Accounts Create User Accounts Account Options Built-in Accounts
  • 21. Configuring Windows 10 User Profile and Data Migration Groups Create Group Built-in Groups Administrators Group Login Log off Switch User
  • 22. • Server • Windows Server Editions • Installing Windows Server • Management Windows Server • -Server Management -RDP -MMC • Disk Management Syllabus
  • 23. • Print Server • Active Directory - Installing Domain -OU , User , Computer and Group -Join Workstations to Domain -Create Home folder -Shared and NTFS Permission • File Server • Backup and Restore Intro Server
  • 24. What is Server? • Hardware • OS -Security -Availability Intro Server
  • 25. Important Note • Power Supply • Cooler Intro Server
  • 26. • Operating System -No limit • Server Category • Application Server -Mail Server -Database Server -Web Server • Remote Access Server Intro Server
  • 27. Infrastructure Server • DHCP Server • DNS Server • Wins Server • Authentication Server Intro Server
  • 28. Management and Monitoring Server - Limit cost • Example - Configuration Manager - Operation Manager Intro Server
  • 29. • Web Edition. • Standard Edition. • Enterprise Edition. • Datacenter Edition. Windows Server 2003 Edition
  • 30. • Standard • Enterprise • Datacenter Windows Server 2008 Edition
  • 31. • Foundation • Essentials • Standard • Datacenter - All Editions 64bit Windows Server 2012 Edition
  • 32. • Essentials • Standard • Datacenter - All Editions 64bit Windows Server 2016 Edition
  • 33. • Essentials Edition Windows Server 2016 Edition Maximum number of users & Devices 25 - 50 Maximum number of CPU sockets 2 (no limit on CPU cores) Maximum RAM 64 GB Hyper-V No
  • 34. • Standard Edition Windows Server 2016 Edition Maximum number of users Unlimited Maximum number of CPU sockets 64 (no limit on CPU cores) Maximum RAM 24 TB Hyper-V Yes
  • 35. • Datacenter Edition Windows Server 2016 Edition Maximum number of users Unlimited Maximum number of CPU sockets 64 (no limit on CPU cores) Maximum RAM 24 TB Hyper-V Yes
  • 36. • Essentials • Standard • Datacenter - All Editions 64bit Windows Server 2019 Edition
  • 37. • Essentials Edition Windows Server 2019 Edition Maximum number of users & Devices 25 - 50 Maximum number of CPU sockets 2 (no limit on CPU cores) Maximum RAM 64 GB Hyper-V No
  • 38. • Standard Edition Windows Server 2019 Edition Maximum number of users Unlimited Maximum number of CPU sockets 64 (no limit on CPU cores) Maximum RAM 24 TB Hyper-V Yes
  • 39. • Datacenter Edition Windows Server 2019 Edition Maximum number of users Unlimited Maximum number of CPU sockets 64 (no limit on CPU cores) Maximum RAM 24 TB Hyper-V Yes
  • 40. Installation and Upgrade Hardware Component Minimum Requirements Recommended CPU 1.4 GHz(x64) 2 GHz Or faster RAM 1 GB 2 GB Disk Space 32GB 60 GB Minimum Hardware Requirement
  • 41. Selecting a Windows Server 2016 edition • The roles you intend the servers to perform • The virtualization strategy you intent to implement • The licensing strategy you plan to use Selecting a Windows Server 2016 edition
  • 42. • GUI (Full Installation) • Server Core • Minimal Server Interface Choosing installation options
  • 43. • What is Server Core? - Does not provide a GUI desktop. - Core version will only have the command shell -Windows Server 2016 Standard and Datacenter Server Core mode
  • 44. The advantages of running servers using Server Core • Hardware resource conservation • Reduced disk space • Reduced patch frequency • Reduced attack surface The advantages of running servers using Server Core
  • 45. Minimal Server Interface The Minimal Server Interface is a setting that removes some of the most hardware-intensive elements from the graphical interface. Server Manager MMC applications Device Manager PowerShell interface The advantages of running servers using Server Core
  • 46. The advantages of running servers using Server Core
  • 47. Windows Server 2016 Installation and Upgrade Installation and Upgrade
  • 48. Preparing to upgrade • Check hardware compatibility • Check disk space • Confirm that software is signed • Save mass storage drivers on removable media • Check application compatibility • Perform a full backup • Disable virus protection software • Purchase Windows Server 2016 Windows Server 2016 Edition
  • 49. • Set Password Administrator Account • Configure the network connection • Set the time zone • Enable Remote Desktop • Rename the computer • Active Windows • Join a domain • Installing Anti Virus • Update Windows Windows Server 2016 Edition
  • 50. Rename Computer name with Comman: ntedom renamecomputer %computername% /newname: <NewComputername> Then, to join the computer to a domain, use the following syntax: netdom join %computername% /domian: <DomainName> /userd: <UserName> /passwordd: To enable Remote Desktop connections on the server Set-Remotedesktop -enable Windows Server 2016 Edition
  • 51. Converting between GUI and Server Core Install -windowsFeature Server-gui-Infra,Server- gui-shell –restart unistall -windowsFeature Server-gui-Mgmt- infra,Server-gui-shell -Restart Windows Server 2016 Edition
  • 52. NIC teaming in Windows Server 2016 supports two modes: • Switch Independent Mode All of the network adapters are connected to different switches, providing alternative routes through the network. • Switch Dependent Mode All of the network adapters are connected to the same switch, providing a single interface with their combined bandwidth. Windows Server 2016 Edition
  • 53. Services • Network Load Balancing (NLB) • Fail over Clustering Windows Server 2016 Edition
  • 54. Storage Type • Basic Primary - Partition Extended Disk Management
  • 55. Storage Type • Dynamic Simple Spanned Volume Striped Mirrored RAID-5 Disk Management
  • 56. • Mirrored Break Mirror - Mirror Association Remove Mirror Disk Management
  • 57. • Spanned Uses space from multiple disks appearing as single volume • Striped (RAID-0) Uses space from multiple disks appearing as single volume • Mirrored (RAID-1) An identical copy of a volume is created on another physical disk, for fault tolerance. • RAID-5 Striped set with parity allows the system to continue running in the event of a single disk failure Disk Management
  • 59. CHOOSING A RAID TECHNOLOGY Disk Management M Mi ir rr ro or re ed dV Vo ol lu um me es s( (R RA AI ID D- -1 1) ) S St tr ri ip pe ed dV Vo ol lu um me es sw wi it th hP Pa ar ri it ty y( (R RA AI ID D- -5 5) ) Can protect system or boot partition Cannot protect system or boot partition Requires two hard disks Requires a minimum of three hard disks and allows a maximum of 32 hard disks Has a higher cost per MB Has a lower cost per MB 50 percent redundancy 33 percent maximum redundancy Has good read and write performance Has excellent read and moderate write performance Uses less system memory Requires more system memory
  • 60. Hardware RAID RAID Controller - RAID 0 - RAID 1 - RAID 5 - RAID 6 - RAID 1+0 Disk Management
  • 62. Active Directory - Active Directory thus acts as an identity store, providing a single trusted list of Who’s Who in the domain. that contains logon scripts and group policy information. that support and use the database, including • Lightweight Directory Access Protocol (LDAP) • Kerberos security protocol • replication processes, and the File Replication Service (FRS) Active Directory
  • 63. Chapter 1: INTRODUCING MICROSOFT WINDOWS SERVER 2003 63 DOMAINS AND DOMAIN CONTROLLERS Domain Controller . contoso.com Domains: Provide administrative and security boundaries Allow resources to be grouped logically Can contain Organizational Units (OU 's) to further organize resources Active Directory
  • 64. Trees Multiple domain models create logical structures called trees For example Contoso.com us.contoso.com en.contoso.com share contiguous DNS namespace Active Directory
  • 65. Chapter 1: INTRODUCING MICROSOFT WINDOWS SERVER 2003 65 contoso.com us.contoso.com en.contoso.com Active Directory
  • 66. Forests A forest may contain multiple domains in multiple trees, or just one domain Active Directory
  • 67. ACTIVE DIRECTORY FOREST contoso.com us.contoso.com en.contoso.com kahkeshan.com Qazvin.kahkeshan.com Shiraz.kahkeshan.com
  • 68. OBJECTS AND ATTRIBUTES • Objects – Users, groups, printers, computers • Attributes – Names, phone numbers, locations Active Directory
  • 69. 69 CONTAINERS • Containers – Domains, organizational units (OUs), groups • Leaves – Users, printers, computers Active Directory
  • 70. Objects and Organizational Units (OUs) allow you to group objects that share common administration or configuration. Active Directory
  • 71. Delegation Administrative delegation relates to the simple idea that you might want able to change the password for a certain subset of users Resetting user passwords is just one example of administrative delegation Active Directory
  • 72. Group Policy • Group policy objects – Collections of hundreds of possible configuration settings. – Can be applied to users, computers Active Directory
  • 73. Schema • Object classes – User accounts – Computer accounts – Printers – Groups • Object Attributes – Name – Location (for printer) – E-mail address (for users) Active Directory
  • 74. • The Microsoft Management Console • Managing Computers Remotely with the MMC • Managing Servers with Remote Desktop for Administration -Enabling and Configuring Remote Desktop for Administration - The Terminal Services service enables Remote Desktop, Remote Assistance, and Terminal Server for application sharing Win 2016 Environment
  • 75. Network failures -If DNS is not functioning -If routing is not functioning -Terminal Services port (by default, port 3389) Change port Number RDP HKEY_LOCAL_MACHINE > System > CurrentControlSet > Control > TerminalServer > WinStations > RDP-Tcp>port number Terminal Services Troubleshooting
  • 76. Credentials Users must belong to the Administrators or Remote Desktop Users group to successfully connect to the server using Remote Desktop for Administration. Too many concurrent connections Terminal Services Troubleshooting
  • 77. - Making the Request for Assistance • Offering Remote Assistance to a User gpedit.msc  Administrative Templates System Remote Assistance Double-click Offer Remote Assistance and then select Enabled Next, click Show, then specify the individual users that will be allowed to offer assistance by assigning helpers within the context of this policy Using Remote Assistance
  • 78. Install Active Directory DCPROMO Command The Active Directory database store, Extensible Storage Engine (ESE) and is limited to 16 terabytes and 2 billion Objects. This data base Called NTDS.DIT In Windows Server 2008 a third main table was • Schema information definitional details about objects and attributes that Replicates to all domain controllers. • Configuration information configuration data about forest and trees. Replicates to all domain controllers. • Domain information object information for a domain. Replicates to all domain controllers within a domain. User Accounts
  • 80. • Creating and Managing User Objects • Creating User Objects with Active Directory Users and Computers - Start  Administrative Tools  Active Directory Users and Computers OR RUN DSA.MSC User Accounts
  • 81. User Properties in the First Page of the New Object–User • First Name The user’s first name. Not required. • Initials The middle initials of the user’s name. Not required. • Last Name The user’s last name. Not required. • Full Name The field is required. The name entered here must be unique relative to all other objects in the OU. • User Logon Name The User Principal Name (UPN) consists of a logon name and a UPN suffix • User Logon This logon name is used to log on from down-level clients, such as Microsoft Name (Pre– Win 95, Win98, Win Millennium ), Win 2000 , Win NT 4, or Win NT 3.51. This field is required and must be unique within the domain. User Accounts
  • 82. The second page of the dialog box The default account policies in a Windows Server 2008 domain, set in the Default Domain Policy GPO, requires complex passwords : that have a minimum of seven characters. password must contain three of four character types: uppercase, lower-case, numeric, and non-alphanumeric. User Accounts
  • 83. Password : The password that is used to authenticate the user. For security reasons, you should always assign a password Confirm Password : Confirm the password by typing it a second time to make sure you typed it correctly. User Must Change Pass At Next Logon Password Never Expires Account Is Disabled User Accounts
  • 84. Managing User Objects with Active Directory Users And Computers • Account properties: the Account tab These properties include those that are configured when you create a user object, including logon names, password and account flags. • Personal information: the General, Address, Telephones, and Organization tabs The General tab exposes the name properties that are configured when you create a user object. • User configuration management: the Profile tab Here you can configure the user’s profile path, logon script, and home folder locations. User Accounts
  • 85. • Group membership: the Member Of tab You can add and remove user groups, and set the user’s primary group. • Terminal services: the Terminal Services Profile, Environment, Remote Control, and Sessions tabs These four tabs allow you to configure and manage the user’s experience when they are connected to a Terminal Services session. • Remote access: the Dial-in tab Allows you to enable and configure remote access permission for a user. • Applications: the COM+(Component Object Model) tab Assigns Active Directory COM+ partition sets to the user. This feature, facilitates the management of distributed applications. User Accounts
  • 86. • Create OU • Moving a User • Creating Multiple User Objects - Creating and Utilizing User Object Templates • Importing User Objects Using CSVDE • Utilizing Active Directory Command-Line Tools - DSADD Adds. The DSADD you to create objects in Active Directory. - DSGET The DSGET command gets, and outputs, selected properties of one or more existing objects. - DSMOD Modifies select attributes of an existing object in the directory. User Accounts
  • 87. • DSMOVE Moves an object from its current container to a new location. • DSRM Removes an object, the complete sub tree under an object, or both. • DSQUERY The DSQUERY command queries Active Directory for objects that match a specific criteria set. DS Command
  • 88. Managing User Profiles User Profiles: A user profile is a collection of folders and data files that contain the elements of your desktop environment that make it uniquely yours User Profile Types
  • 90. • By default, user profiles are stored locally on the system in the %Systemdrive% Users%Username% folder. • When a user logs on to a system for the first time, the system creates a profile for the user by copying the Default User profile Local Profile
  • 91. • By default, user profiles are stored locally on the system in the %Systemdrive% Users%Username% folder. • When a user logs on to a system for the first time, the system creates a profile for the user by copying the Default User profile Local Profile
  • 92. If users work at more than one computer, you can configure roaming user profiles (RUPs) Mandatory User Profiles To specify a profile for individuals or an entire group of users. Roaming & madatory User Profiles
  • 93. • Home Folders A home folder is an additional folder that you can provide for users to store personal documents - Users can access to their home folders from any client computer on the network. - The backing up and administration of user documents is centralized. - The home folders are accessible from a client computer running any Microsoft operating system (including MS-DOS, Windows 95, Windows 98, Windows Me, Windows 2000, and Windows Server 2003). User Accounts
  • 94. Installing Windows Server 2016 Server Core Installing Server Core
  • 95. • What is Server Core? - Server Core is a version of Windows Server 2008 which does not provide a GUI desktop. - Core version will only have the command shell available and can only do very basic configuration tasks locally. - All additional management must be done remotely. Installing Server Core
  • 96. • When should I use Server Core? -Server Core should be used when you have limited hardware increased security. Installing Server Core
  • 97. A Server Core installation provides a minimal environment for running specific server roles • Active Directory Domain Services (AD DS) • Active Directory Certificate Services (AD CS) • Active Directory Lightweight Directory Services (AD LDS) • DHCP Server • DNS Server • File Services • Print Services • Streaming Media Services • Internet Information Services (IIS) • Hyper-V Installing Server Core
  • 98. Remote Management • There are 2 general choices when it comes to remote management: • Remote Server Administration Tools (RSAT) • Remote Desktop Installing Server Core
  • 100. UNDERSTANDING COMPUTER OBJECTS • Can be granted permissions to other objects and be subject to group policy • Can be made a member of a group Computer Accounts
  • 101. ADDING COMPUTERS TO A DOMAIN • Step 1: Create a computer account in Active Directory • Step 2: Join the computer to the domain Computer Accounts
  • 102. CREATING COMPUTER OBJECTS • Computer object must exist in Active Directory before computer can be log on to the domain. • Computer object can be created using Active Directory Users and Computers or a command-line tool such as Dsadd. dsadd computer "cn=pc5,ou=sales,dc=test,dc=com" • Computer account can also be created during the domain joining process. Computer Accounts
  • 103. CREATING COMPUTER OBJECTS USING NETDOM.EXE • Command-line utility • Simpler to use than Dsadd Computer Accounts
  • 104. JOINING A DOMAIN USING NETDOM.EXE Allows computers to be joined to the domain from a command line Computer Accounts
  • 105. LOCATING OTHER COMPUTER OBJECTS • domain-controller computer accounts are placed in the Computers system-created container by default. • Container does not support group policy Computer Accounts
  • 106. DELETING COMPUTER OBJECTS • Manually through Active Directory Users and Computers • Using a command-line tool such as Dsrm Computer Accounts
  • 107. RESETTING A COMPUTER OBJECT • Necessary when replacing or upgrading a computer system • Allows an appropriately named new system to use an existing computer account Computer Accounts
  • 108. TROUBLESHOOTING COMPUTER ACCOUNTS: SOLUTIONS • Reset the computer account in Active Directory. • If the computer account is missing, create a computer account. • If the computer still belongs to the domain, you must remove it from the domain by changing its membership to a workgroup. • Rejoin the computer to the domain. Computer Accounts
  • 109. Finding and Connecting to Objects in Active Directory Computer Accounts
  • 111. LOCAL GROUPS • Can be used only on the system on which they are created • In a workgroup environment, can contain only users from the local system • In a domain environment, can contain users and global groups • Cannot be created on a domain controller Group Accounts
  • 112. Local Group: Administrators Backup Operators Guests Network Configuration Operators Power Users Remote Desktop Users Users Group Accounts
  • 113. WINDOWS SERVER 2016 DEFAULT GROUPS • Built-in local groups • Predefined Active Directory groups • Built-in Active Directory groups • Special identities Installation and Implement Active Directory
  • 114. BUILT-IN LOCAL GROUPS Installation and Implement Active Directory
  • 115. PREDEFINED ACTIVE DIRECTORY GROUPS Installation and Implement Active Directory
  • 116. BUILT-IN ACTIVE DIRECTORY GROUPS Installation and Implement Active Directory
  • 117. Special Identities Installation and Implement Active Directory
  • 118. Special Identities That are managed by the operating system. Special identities cannot be created or deleted Installation and Implement Active Directory
  • 119. • Everyone • Network • Interactive • Anonymous Logon • Authenticated Users • Creator Owner • Dialup Installation and Implement Active Directory
  • 120. USING ACTIVE DIRECTORY GROUPS • Types – Security – Distribution • Scopes – Domain Local – Global – Universal Group Accounts
  • 121. SECURITY GROUPS • Used to assign access permissions for network resources. • Can also be used as a distribution group. • The most common type of group created and used in Active Directory. Group Accounts
  • 122. Distribution Group Used to combine users for e-mail distribution lists Group Accounts
  • 123. Finding the Domain Groups to Which a User Belongs dsget user "cn=user1,ou=sales,dc=test,dc=com" -memberof dsget group "cn=administrators,cn=builtin,dc=test,dc=com" -members "CN=Domain Admins,CN=Users,DC=test,DC=com" "CN=Enterprise Admins,CN=Users,DC=test,DC=com" "CN=Administrator,CN=Users,DC=test,DC=com“ dsget group "cn=group manage,ou=staff,dc=test,dc=com" -members Group Accounts
  • 125. We are going to work in the kahkeshan.com domain • 3 – Management • 2– Sales • 4 – Staff • 4 – R & D • 3 – IT Delegation of Control
  • 126. Goals: The company help desk has determined that supervisor if they forget their password and need it reset. • Staff need to be given the Active Directory privileges to reset passwords for the users on their OU. • A custom tool needs to be designed for the managers to use when resetting passwords. This tool must be very simple to use since the Staff are not IT trained. Delegation of Control
  • 127. • Setting permissions in Active Directory • Delegation of Control Wizard • Create a Custom MMC Delegation of Control
  • 129. Configuring Permissions • Permissions can be set as an allow or deny permission. Sharing
  • 130. RESTRICTIONS ON CREATING FILE SHARES • On a domain controller: Administrators, Server Operators, Enterprise Admins , Domain Admins groups only • On a domain member server or workstation: Administrators, Server Operators, or Power Users groups only • On a workgroup or standalone computer: Administrators or Power Users groups only Files and Folders
  • 131. CREATING A FILE SYSTEM SHARE USING NET.EXE • Allows shares to be created from a command line • you need to create a very large number of shares, using the Net command Files and Folders
  • 132. Configuring Share Permissions • Read : Users can display folder names, file names, file data and attributes. Users can also run program files and access other folders within the shared folder. • Change : Users can create folders, add files to folders, change data in files, delete folders and files, and perform actions permitted by the Read permission. • Full Control: Users can change file permissions, take ownership of files, and perform all tasks allowed by the Change permission. Files and Folders
  • 133. The effective set of share permissions is the cumulative result of the Allow permissions granted to a user and all groups to which that user belongs. Ali member Group A = Read + Ali member Group B = Change ---------- Effective permissions = Change Files and Folders
  • 134. However, a Deny permission will override an Allow permission. Ali member Group A = Read + Ali member Group B = Denied Full Control ---------- Effective permissions = Unable to read the files or folders in that share Files and Folders
  • 135. SHARE PERMISSION DEFAULTS • When a new share is created, the following permissions are granted: – Everyone special identity: Read Files and Folders
  • 136. File and Folder Access File and Folder NTFS Permissions There are six standard permissions • Full Control: When applied to folders, allows the reading, writing, changing, and Delete of files and subfolders Allows modification of permissions on files and folders. • Modify : When applied to folders, allows the reading, writing, changing, and deletion of files and subfolders. • Read & Execute : When applied to folders, allows the content of the folder to be accessed and executed. When applied to a file, allows the file to be accessed and executed.
  • 137. File and Folder Access NTFS Permissions • List Folder Contents : Can be applied only to folders, allows the contents of the folder to be viewed. • Read: When applied to folders, allows content to be accessed. When applied to a file, allows the contents to be accessed. Differs from Read & Execute in that it does not Allow files to be executed. • Write: When applied to folders, allows adding of files and subfolders. When applied to a file, allows a user to modify, but not delete, a file.
  • 138. Real-World Use of Share Permissions A drive volume is FAT32, which then does not support NTFS permissions. Real-world rule is: Configure shares with Everyone: Allow Full Control share permissions, and lock down, using NTFS permissions. Both Share and NTFS Permissions apply to resource Restrictive effective permission set to resource Files and Folders
  • 143. Understanding Effective Permissions • File permissions override folder permissions • Allow permissions are cumulative Group Sales Allowed Group Sales Manager allowed write Read & Execute Read & Execute Deletes permissions Effective permissions = Modify permissions Read & Execute, Write and Delete. Files and Folders
  • 144. Understanding Effective Permissions • Deny permissions take precedence over Allow permissions • Explicit permissions take precedence over inherited permissions - Explicit Allow permission will override an inherited Deny permission. Files and Folders
  • 146. • Resource Ownership: Creator Owner • Creator Owner: Creator Owner Full Control • Ownership: If Owner managed to modify the ACL and deny herself Full Control, could modify the ACL Files and Folders
  • 147. Take Ownership • Administrators can • Allowed Take Ownership permission • Restore Files And Directories user right enables the transfer of ownership It possible for administrators and backup operators to manage Files and Folders
  • 148. Auditing File System Access • You are able to audit for successes, failures - Successes • To log resource access for reporting. • To monitor for access - Auditing for failed access • To monitor for malicious attempts to access a resource to which access has been denied. • To identify failed attempts to access a file or folder to which a user does require access. Files and Folders
  • 149. • Enabling Auditing enable auditing (GPO). The Audit Policy node is located under: Computer Configuration, Windows Settings, Security Settings, Local Policies, Audit Policy ,Audit object access Files and Folders
  • 150. Scenario All of the users’ staff Documents folders will be redirected to a shared location on the file server. Users must be limited to 100 MB of data which they can store on the file server. A printer will be installed and shared so that users can quickly access and install the printer on their client computers. File and Print Server
  • 151. • Installing the File Services Role • NTFS File & Folder Permissions • Setting Group Policy • Setting up Disk Quotas Using the File System Resource Manager • Installing the Print Services Role • Installing a Printer • Sharing a Printer • Printer Permissions File and Print Server
  • 152. Troubleshooting - Out of paper -Out of toner -Paper jam -Not turned on (Offline) -Not plugged in -Networking Problem -Restart Spooler Service File and Print Server
  • 153. Backup and Recovery Backup and Recovery
  • 154. -system protection -Backup and Restore Backup and Recovery
  • 155. r system protection -What is system protection? • Is a feature that regularly creates and saves information about your computer's system files and settings , also saves previous versions of files that you've modified. • They're created automatically once every seven days • you can create restore points manually at any time. • Is automatically on for the drive that Windows is installed on. • can only be turned on for drives NTFS file system. - Advantage of system protection: • If your computer is running slowly or isn't working properly • If you accidentally modify or delete a file or folder Backup and Recovery
  • 156. • Backup and Restore - Create a system image - Create a system repair disk Backup and Recovery
  • 157. Determining a Backup Strategy BACKUP TYPES: • Normal • Incremental Backing Up Data
  • 158. BACKUP JOB TYPES: NORMAL • Backs up all files • Clears the archive bit • Can require large data storage capacity Backing Up Data
  • 159. BACKUP JOB TYPES: INCREMENTAL • Backs up only files that have been modified or created since the last full or incremental backup • Clears the archive bit • Can require considerably less storage space than a normal backup Backing Up Data
  • 160. Combining Backup Types -Normal and incremental backups Backing Up Data
  • 161. Normal and Incremental backups On Sunday a normal backup is performed On Monday through Friday incremental backups are performed If data becomes corrupt on Friday, you need to restore the normal backup from Sunday and each of the incremental backups from Monday through Friday This strategy takes less time to back up but more time to restore. Backing Up Data
  • 162. Understanding VSS Volume Shadow Copy Service allows taking manual or automatic backup copies Windows Server 2008 offers VSS, also referred to as “snap backup.” VSS allows the backing up of databases and other files that are held open Backing Up Data
  • 163. Shadow Copies of Shared Folders Enabling and Configuring Shadow Copies Backing Up Data
  • 164. How to Configure the Shadow Copy Service • Setting up the Schedule • Picking a Storage Location • Previous Versions Backup and Recovery