IT 442 First Exam Review

•Lecture 1

–Stanek, 2012. Chapter 1

–3 different installation types:

•With GUI, provides full functionalities

•Server core: minimal installation that provide a fixed subset of roles, but not the server graphical shell, management console, or desktop experience

•Minimal interface: mmc, server manager and a subset of control panel for local management

–Windows Server types: Standalone, member, DC

–Windows 2012 only provides 64-bit system design

–Network the server & the need of IP address. Network has 4 different types

•Domain: connected to the corporate domain

•Work: a private network and sometimes call a workgroup

•Home: a private network in which computers are members of a home group, not connect directly to the public internet

•Public: computers are connected to a network in public place

–Windows 2012 can be configured with IPv4 or IPV6.

•IPv4 has 32 bit addresses and expressed as four separate decimal values.

•IPv6 has 128 bit addresses and divided into eight 16-block delimited by colons

–What is DNS and how it is structured

•Used to resolve computer names to IP address.

•DNS organizes groups of computers into domain; domains are organized into a hierarchical structure

•Top level domains are called root domain

•Parent domain can be divided into subdomains that can be used for groups or departments within an organization

•Subdomain are also called child domains

•Active directory needs DNS to implement their naming structure. AD and DNS can be fully integrated or partial integrated

–Type of storage: FAT, NTFS, ReFS

•ReFS is designed to work with extremely large storage capacity; new local filesystem introduced in server 2012. ReFS is used with storage space, storage pool.

–Network teaming.

–Hyper-V: private VLAN, migration, snapshot, SAN support

•PVLAN provide isolation between 2 VM on the same LAN

•Port ACL controls which network traffic passes to VM based on IP and MAC

•Lecture 2: Installing Windows Server 2012

–Stanek, 2012. Chapter 2

•Installing Windows server 2012

•Performing additional administration tasks during installation

•Changing the installation type

–How many editions:

•Data center

•Standard

•Essential

•Foundations

–Resource needs: processor, memory, DVD, keyboard & mouse

•Recommended: 3.1GHz, 16GB RAM, 60GB HD, DVD, Super VGA

–Disk configuration: raid 0, 1, 5, 10

•RAID 0 – striping

•RAID 1 – mirroring

•RAID 5 - Parity

•RAID 10 – combination of RAID1 & 0

–Upgrade from previous version

–Workgroup vs. domain

–Changing installation types:

•Full server have Graphical management tool, infrastructure feature and server graphical shell feature

•Minimal have only graphical management tools and infrastructure feature

•Core has none of the above features

–IP address, windows update, firewall

–Server core vs. server GUI. Switching between options

–Changing computer name, device driver, pagefile, application performance & remote desktop connection

–What is server manager dashboard

•Can be used to add role to local and remote servers

•Add servers to manage

•Create server group

•Events: provides summary information about warning and error events from the server’s event log.

•Services: lists the services running on the server by name, status, and start type

–Navigating server core (from command prompt)

–Managing system properties – over view of:

•Windows edition

•System

•Computer name, domain and workgroup settings

•Windows activation

•Computer Name tab: display or modify computer network identification; display FQDN, join computer to domain or workgroup

•Hardware tab: provide device manager and driver installation settings

•Advanced tab: used to configure:

•Application performance – Program and background services

•Virtual memory – use disk space to extend the amount of memory available on a system

•Data execution prevention

•System and user environment variables

•System startup and recovery – display the startup configuration menu for 30 seconds by default. Write an event to the system log and automatically restart the server when a fatal system error occurs

–Computer management: task scheduler, event viewer, shared folder, local users & groups, device manager, disk management, services and applications

•Lecture 3

–Stanek (2012)

•Chapter 6, Introducing AD

•Chapter 6 Working with domain structures

–What is AD? AD & DNS.

•AD use DNS. DNS domains are organized into a hierarchical structure

•DNS used to map host names to TCIP/IP address

–AD recycle bin: used to undo the accidental deletion of AD objects

–Windows 2012 improvements include: offline domain join, AD module for Windows PowerShell, AD administrative center, AD web service

–First level domain and sub-domain

–Domain overview: uniqueness, security policies, trust, sites, objects

•Each domain as its own security policies and trust relationships with other domains

•Domain can span more than 1 physical location

•Win 2003 functional level supports DC running Win 2003 and later

•Win 2008 supports DC running Win 2008 and later

•Win 2008 R2 supports DC running Win 2008R2 and Win 2012

•Win 2012 supports DC running Win 2012

–DC and AD domain services, directory data replication, number of DC, number of sites, and number of DC per site, Bridgehead

–OU, domain tree, domain forest.

•OU are subgroups. Object placed in OU can come only from the parent domain

•OU allows you to assign group policies to a small set of resources

•OU recreate more manageable views of objects in a domain

•OU allows you to delegate authority

–What is sites and subnets

•Site is a group of computers in 1 or more IP subnet

•You can have multiple sites in one domain

•You can have multiple domains in 1 site

•Lecture 4

–Stanek (2012). Chapter 6

•Working with Active Directory domains

•Understanding the directory structure

•Using the Active Directory Recycle Bin

–Member servers, DC & responsibility of DC

•Promoting member servers to DC by installing AD domain services

•Demoting domain controllers by uninstalling AD domain services

•Domain can have 1 or more DC.

•DC automatically replicate directory data with one another

•All DC have equal responsibility by default

–Computer accounts are stored in AD as objects. Computer accts are authenticated before they can access the network

–Raising domain level & lowering functional level: cannot lower the domain functional level once you raise it. However, when you raise the domain functional level to Windows Server 2008 R2 or Windows Server 2012 and the forest functional level is Windows Server 2008 or lower, you have the option of rolling the domain functional level back to Windows Server 2008 or Windows Server 2008 R2. You cannot roll the domain functional level back to Windows Server 2003 or lower

–What is GC and why you need it: enable network logon by providing universal group membership info when a logon process is initiated. GC enables directory searches throughout the domains in a forest. GC stores a full replica of all objects in the directory

–GC helps improve response time for logon and search requests

–if the domain has only one global catalog and the catalog isn’t available, and there’s no local caching of universal group membership, standard users can’t log on and those who are logged on can’t search the directory.

–What is Operation Master role (FSMO): schema, domain name, RID, infra & PDC

•Schema master Controls updates and modifications to directory schema

•Domain naming master Controls the addition or removal of domains in the forest

•Relative ID master Allocates relative IDs to domain controllers

•PDC emulator When you use mixed-mode or interim-mode operations, the PDC emulator acts as a Windows NT PDC.

•Infrastructure master Updates object references by comparing its directory data with that of a global catalog

–Schema & DNS

•Schema master and domain master should NOT be separated

–Recycle Bin

•Lecture 5

–Stanek, 2012. Chapter 7

–Active directory administration tools

–Active directory command-line tools

–Using active directory users and computers

–Managing sites

–Managing domain controllers, roles, and catalogs

–Seizing Roles

•AD administration tools

•Active Directory Administrative Center for performing management tasks.

•Active Directory Domains and Trusts for working with domains, domain trees, and domain forests.

•Active Directory Module for Windows PowerShell for managing Active Directory when you are working with Windows PowerShell.

•Active Directory Sites and Services For managing sites and subnets.

•Active Directory Users and Computers For managing users, groups, computers, and organizational units.

•Group Policy Management for managing the way Group Policy is used in the organization. It provides access to Resultant Set of Policy (RSoP) for modeling and logging.

–Command-line tools

•Adprep Allows you to manually prepare a Windows forest or domain for installation of Windows domain controllers

•Dsadd Adds computers, contacts, groups, organizational units, and users to Active Directory.

•Dsget Displays properties of computers, contacts, groups, organizational units, users, sites

•Dsmod Modifies properties of computers, contacts, groups, organizational units, users, and servers

•Dsquery Uses search criteria to find computers, contacts, groups, organizational units, users, sites, subnets, and servers in Active Directory.

–Managing domain controllers

•You can use Active Directory Users And Computers to view or change the location of domainwide operations master roles

•You use Active Directory Schema to view or change the schema master’s location – register schmmgmt.dll at an elevated admin command prompt, use MMC snap-in to add AD schema and make changes.

–Managing sites

•Lecture 6 : Powershell

–Review the powerpoint