20410A
20410A
20410A
Course
20410A
Installing and Configuring
Windows Server® 2012
Welcome!
Thank you for taking our training. We’ve worked together with our Microsoft Certified
Partners for Learning Solutions and Microsoft IT Academies to bring you a world-class
learning experience, including:
Customer Satisfaction Guarantee. Our Certified Partners for Learning Solutions offer a
satisfaction guarantee and we hold them accountable for it. At the end of class, please
complete an evaluation of today’s experience. We value your feedback!
Certification Exam Benefits. After training, consider taking a Microsoft Certification exam.
Independent research by IDC concluded that 75% of managers believe certifications are
important to team performance*. Ask your instructor about available exam promotions
and discounts.
* IDC, Value of Certification: Team Certification and Organizational Performance, November 2006
Introduction
• Name
• Company affiliation
• Title/function
• Job responsibility
• Windows 8 experience
• Your expectations for the course
Course Material
http://www.microsoft.com/learning/
How to Use the Course Material
• Use the handbook content as the primary • Use the Companion Content as your extended
resource for reference during the class. learning resource on the job.
• Use the troubleshooting tips and best practices
in the Module Reviews and Takeaways section as
on-the-job references. For this version of the Courseware on
Prerelease Software (Windows 8 Release
In this version of the Courseware on Preview and Windows Server 2012 Release
Prerelease Software (Windows 8 Release Candidate (RC)):
Preview and Windows Server 2012 Release
Candidate (RC)):
• The course content and labs on features that are • The Companion Content will be published when
not included or complete in the prerelease the next (B) version of the course is released.
software may be missing or incomplete.
• Students who attend the current class can
• The Office PowerPoint slides may have fewer download the Companion Content when the
graphics or animations that visually aid in next (‘B) version of the course is released.
illustrating the key learning points.
• The course may contain typographical errors and
other minor editorial issues.
http://www.microsoft.com/learning/
Facilities
• Class hours
• Building hours
• Parking
• Restrooms
• Meals
• Phones
• Messages
• Smoking
• Recycling
Microsoft Learning Program
http://www.microsoft.com/learning/
Microsoft Certification Program
http://www.microsoft.com/learning/
About This Course
Audience
• The primary audience for this course is Information
Technology (IT) Professionals who have good Windows
operating system knowledge and experience and want
to acquire the skills and knowledge necessary to
implement the core infrastructure services in an
existing Windows Server 2012 environment.
• Course Prerequisites
Before attending this course, students must have:
• A good understanding of networking fundamentals
• An understanding and experience configuring security and
administration tasks in an Enterprise environment
• Experience supporting or configuring Windows clients
• Good hands-on Windows Client experience with Windows Vista,
Windows 7, or Windows 8.
Module 1
• On Premises Servers
• What Is Cloud Computing?
• Options for Windows Server 2012
• What Is Server Core?
• Windows Server 2012 Roles
• What Are the Features of Windows Server 2012?
On Premises Servers
Server Core
• Is a more secure, less resource-intensive installation
option
• Can be converted to the full version of Windows
Server 2012
• Is the default installation option for Windows Server
2012
• Is managed locally using sconfig.cmd
• If you enable remote management:
• You will rarely need to log on locally
• You may not miss the graphic user interface
Windows Server 2012 Roles
Functions:
• Web Server
• Domain Controller
• Certificate Server
Roles are:
• Made up of role services components that provide
additional functionality associated with the role
• In Server Manager 2012, console servers with a
similar role are grouped together
• Role deployment also includes the configuration of
dependencies
What Are the Features of Windows Server 2012?
Features:
• Are components that support the server such as
Windows Server Backup or Failover clustering
• Usually do not provide a service directly to clients on
the network
• View events
Administrative tools:
• Active Directory Administrative Center
• Active Directory Users and Computers
• DNS console
• Event Viewer
• Group Policy Management
• IIS Manager
• Performance Monitor
• Resource Monitor
• Task Scheduler
Demonstration: Using Server Manager
• Installation Methods
• Installation Types
• Hardware Requirements for Windows Server 2012
• Installing Windows Server 2012
Installation Methods
Windows Server 2012 deployment method
options include:
Windows
Deployment
Services
Installation Types
Hardware Requirements for Windows Server
2012
Windows Server
2012
Activating Windows Server 2012
Configuring a Server Core Installation
Lesson 5: Introduction to Windows PowerShell
• Service Cmdlets
• Use the Service noun
• Process Cmdlets
• Use the Process noun
• ServerManager Module
• Allows the WindowsFeature noun
What Is Windows PowerShell ISE?
Demonstration: Using Windows PowerShell ISE
• Review Questions
• Common Issues and Troubleshooting Tips
Microsoft Official Course
®
Module 2
• Overview of AD DS
• Overview of Domain Controllers
• Installing a Domain Controller
Lesson 1: Overview of AD DS
• Overview of AD DS
• AD DS Domains
• What are OUs?
• What Is an AD DS Forest?
• What Is the AD DS Schema?
Overview of AD DS
• Sites
• Organizational Units
• Objects
• Users
• Computers
• OUs
• Containers that can be used
to group objects within a
domain
• Create OUs to:
• Delegate administrative
permissions
• Apply Group Policy
What Is an AD DS Forest?
Forest Root
Domain
Tree Root
Domain
adatum.com
fabrikam.com
atl.adatum.com
What Is the AD DS Schema?
• Attributes • Classes
• objectSID • User
• sAMAccountName • Group
• location • Computer
• manager • Site
• department
Lesson 2: Overview of Domain Controllers
Domain Controllers
• Servers that perform the AD DS role:
• Host the Active Directory database (NTDS.DIT) and
SYSVOL
(replicated between domain controllers)
• Kerberos KDC service performs authentication
• Other Active Directory services
• Best practices:
• Availability: At least two in a domain
• Security: Server Core, RODC and BitLocker
What Is the Global Catalog?
Schema
• Global catalog:
Configuration § Hosts a partial attribute set for
Domain A
other domains in the forest
§ Supports queries for objects
Schema throughout the forest
Configuration Schema
Domain A Configuration
Domain B
Domain B
Global catalog
Server Schema
Configuration
Domain B
The AD DS Logon Process
1. User Account is
authenticated to DC1
2. DC returns Ticket Granting DC1
Ticket (TGT) back to client
3. Client uses TGT to apply for
access to WKS1
4. DC grants access to WKS1
5. Client uses TGT to apply for
access to SVR1
WKS1 SVR1
6. DC returns access to SVR1
Demonstration: Viewing the SRV Records in DNS
Logon Information
• Review Questions
Microsoft Official Course
®
Module 3
• AD DS Administration Tools
• Creating User Accounts
• Configuring User Account Attributes
• Creating User Profiles
• Creating User Accounts with User Account
Templates
• Demonstration: Managing User Accounts by Using
Active Directory Users and Computers
AD DS Administration Tools
• Group Types
• Group Scopes
• Implementing Group Management
• Default Groups and Special Identities
• Demonstration: Managing Groups
Group Types
• Distribution groups
• Used only with email applications
• Not security-enabled (no SID);
cannot be given permissions
• Security groups
• Security principal with an SID;
can be given permissions
• Can also be email-enabled
Group Scopes
Members Members Can be
Members from from domain from trusted assigned
Group scope
same domain in same external permissions to
forest domain resources
Local U, C, U, C, U, C, On the local
GG, DLG, UG GG, UG GG computer only
and local users
U User
C Computer
GG Global Group
DLG Domain Local Group
UG Universal Group
Implementing Group Management
• Special identities
• Groups for which membership is controlled by the operating
system
• The importance of these special identities is that you can use
them to provide access to resources based on the type of
authentication or connection, rather than the user account
Demonstration: Managing Groups
• AD DS Permissions
• Effective AD DS Permissions
• Demonstration: Delegating Administrative Control
AD DS Permissions
Effective AD DS Permissions
Logon Information
• What are the options for modifying the attributes of new and existing
users?
• What types of objects can be members of global groups?
• What are the two credentials that are necessary for any computer to
join a domain?
Module Review and Takeaways
• Review Questions
• Best Practices
• Real-world Issues and Scenarios
• Tools
Microsoft Official Course
®
Module 4
• CSVDE.exe
Filenamec.sv AD DS
Import
• LDIFDE.exe
Filename.ldf AD DS
Import
Cmdlet Description
New-ADUser Creates user accounts
Set-ADUser Modifies properties of user accounts
Remove-ADUser Deletes user accounts
Set-ADAccountPassword Resets the password of a user account
Set-ADAccountExpiration Modifies the expiration date of a user account
Unlock-ADAccount Unlocks a user account after it has become
locked after too many incorrect login attempts
Enable-ADAccount Enables a user account
Disable-ADAccount Disables a user account
Test-ComputerSecureChannel -Repair
Using Windows PowerShell Cmdlets to Manage
OUs
Cmdlet Description
New-ADOrganizationalUnit Creates organizational units
Set-ADOrganizationalUnit Modifies properties of organizational
units
Get-ADOrganizationalUnit Views properties of organizational units
Remove-ADOrganizationalUnit Deletes organizational units
New-ADOrganizationalUnit Creates organizational units
SearchScope
Show all the userDefines at what
accounts inlevel
thebelow the SearchBase
Marketing a search should
organizational unit be
and all its
subcontainers: performed.
ResultSetSize Defines how many objects to return in response to a query.
Get-ADUser –SearchBase “ou=Marketing,dc=adatum,dc=com”
Properties Defines which object properties to return and display.
–SearchScope subtree
Show all of the user accounts with a last logon date older than a specific
Operator Description
date:
-eq Equal to
Get-ADUser-ne
–Filter ‘lastlogondate
Not equal to –lt “January 1, 2012”’
-lt Less than
Show all of the -le
user accounts Less
in the
thanMarketing
or equal to department that have a last
logon date older than a specific date:
-gt Greater than
Get-ADUser-ge Greater than or
–Filter ‘lastlogondate equal
–lt to
“January 1, 2012” –and
department -like Uses wildcards for pattern matching
–eq “Marketing”’
Modifying Objects with Windows PowerShell
Logon Information
Virtual Machines 20410A-LON-DC1
20410A-LON-CL1
Adatum\Administrator
Pa$$w0rd
User Name
Password
• Review Questions
Microsoft Official Course
®
Module 5
Implementing IPv4
Module Overview
• Overview of TCP/IP
• Understanding IPv4 Addressing
• Subnetting and Supernetting
• Configuring and Troubleshooting IPv4
Lesson 1: Overview of TCP/IP
Application
HTTP FTP SMTP DNS POP3 SNMP
ARP IGMP
Internet IPv4 IPv6
ICMP
SMTP SNMP
Session
ARP IGMP
Network Internet IPv4 IPv6
ICMP
Data Link
Network Token Frame
Ethernet ATM
Interface Ring Relay
Physical
TCP/IP Applications
TCP/UDP
IPv4 IPv6
Lesson 2: Understanding IPv4 Addressing
• IPv4 Addressing
• Public and Private IPv4 Addresses
• How Dotted Decimal Notation Relates to Binary
Numbers
• Simple IPv4 Implementations
• More Complex IPv4 Implementations
IPv4 Addressing
An IPv4 configuration identifies a computer to other computers on a network
IP Address Subnet 1
68.2.180
192.168.2.180
255.255.255.0
55.255.0
IP Address
192.168.2.181
255.255.255.0
Dotted decimal
IP Address
representation
192.168.1.201
of the address 255.255.255.0
and subnet mask IP Address
192.168.1.202
Subnet 2 255.255.255.0
Public and Private IPv4 Addresses
Public Private
8-Bit Octet
Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0
27 26 25 24 23 22 21 20
128 64 32 16 8 4 2 1
Decimal Value
Simple IPv4 Implementations
Network Host ID
Class A (/8) ID
Large Network 0
w x y z
Network ID Host ID
Class B (/16)
Medium Network 10
w x y z
Network ID Host ID
Class C (/24)
Small Network 110
w x y z
More Complex IPv4 Implementations
172.16.16.0/22
172.16.17.1
172.16.17.0/24
172.16.16.1/20
172.16.20.0/22 172.16.17.254
172.16.24.0/22 172.16.18.0/24
172.16.28.0/22
Lesson 3: Subnetting and Supernetting
Number of Subnets 32
2
8
128
64
16
4
0
254
1 0
When you subdivide a network into subnets, you create a unique ID for
each subnet derived from the main network ID
For five locations, the following three subnet bits are required:
• 5 locations = 5 subnets required
• 22 = 4 subnets (not enough)
• 23 = 8 subnets
Calculating Host Addresses
For subnets with 100 hosts, seven host bits are required:
Network Range
192.168.00010000.00000000/24 192.168.16.0-192.168.16.255
192.168.00010001.00000000/24 192.168.17.0-192.168.17.255
192.168.00010000.00000000/23 192.168.16.0-192.168.17.255
Lesson 4: Configuring and Troubleshooting IPv4
Logon Information
Which Windows PowerShell cmdlet can you use to view the local
routing table of a computer instead of using route print?
Module Review and Takeaways
• Review Questions
• Best Practices
• Common Issues and Troubleshooting Tips
• Tools
Microsoft Official Course
®
Module 6
Implementing DHCP
Module Overview
DHCP Client2:
Non-DHCP Client: IP configuration
Static IP from DHCP server
configuration
Lease Renewal
Lease Generation
DHCP Server
DHCP Client1: DHCP
Database
IP configuration
from DHCP server
IP Address1: Leased to DHCP Client1
IP Address2: Leased to DHCP Client2
IP Address3: Available for lease
How DHCP Lease Generation Works
DHCP
Server2
DHCP
Server1 DHCP
Client
1 DHCP
DHCPclient
clientbroadcasts
broadcastsaaDHCPDISCOVER
DHCPDISCOVERpacket
packet
2 DHCP
DHCPservers
serversbroadcast
broadcastaaDHCPOFFER
DHCPOFFERpacket
packet
3 DHCP
DHCPclient
clientbroadcasts
broadcastsaaDHCPREQUEST
DHCPREQUESTpacket
packet
4 DHCP
DHCPServer1
Server1broadcasts
broadcastsaaDHCPACK
DHCPACKpacket
packet
How DHCP Lease Renewal Works
DHCP
DHCP
Server2
Server2
DHCP
Client
DHCP Client
DHCP
DHCP
Server1
Server1
50%
50%of oflease
lease
87.5%
100% of
of
duration lease
lease
has
durationhas
duration
duration has
has
expired
expired
expired
expired
Unicast
Broadcast Broadcast
Subnet A Subnet B
Routers
(Non–RFC
1542
Compliant)
Client Client Client Client
DHCP Server Authorization
DHCP Server2
DHCP Client Unauthorized
Does not service
DHCP
If DHCP Server2
Server2checks
does with the its
not find domain
IP address on DHCP requests
DHCP client receives IP address
the list, thetoservice
controller obtain does
listnot
aServer1 start and support
of authorized DHCP
from
DHCP authorized DHCP
serversclients
Demonstration: Adding the DHCP Server Role
LAN A LAN B
Scope A Scope B
Scope Properties
• Network ID • Lease duration • Scope name
Subnet A Subnet B
DHCP Offline
Server Storage
DHCP
DHCP Restore
Back up Restore
DHCP
Back up
Inthe
If theoriginal
event that
database
the server
is unable
hardware
to load,
fails,the
theDHCP
administrator
service
The administrator
DHCP service moves
automatically
a copy backs
of theupbacked
the DHCP
up
automatically
can restore therestores
DHCP database
from the only
backupfrom
directory
an offline
on storage
the
database
DHCP to the backup directory on the
database to an offline storage location local drive
local drive
location
Reconciling a DHCP Database
DHCP Detailed IP
Database address lease Compares and
information reconciles
inconsistencies in the
Registry Summary IP DHCP database
address lease
information
DHCP Server
Example
DHCP
Database
Backup
Media
DHCP
Database
Old DHCP
Server
New DHCP
Server
Lesson 4: Securing and Monitoring DHCP
Rogue DHCP
server
DHCP
Clients
Legitimate
DHCP
server
• Add users who need read-only access to the DHCP console, to the
DHCP Users group
Account Permissions
DHCP Administrators Can view and modify any data about
group the DHCP server
Has read-only DHCP console access
DHCP Users group
to the server
What Are DHCP Statistics?
DHCP Server
What Is DHCP Audit Logging?
• Address conflicts
• Failure to obtain a DHCP address
• Address obtained from an incorrect scope
• DHCP database suffered data corruption or loss
• DHCP server has exhausted its IP address pool
10 minutes
Lab: Implementing DHCP
Logon Information
Virtual Machine 20410A-LON-DC1
20410A-LON-SVR1
20410A-LON-RTR
20410A-LON-CL1
20410A-LON-CL2
User Name Adatum\Administrator
Password Pa$$w0rd
• Review Questions
• Best Practices
• Tools
Microsoft Official Course
®
Module 7
Implementing DNS
Module Overview
Name Description
Microsoft.com
DNS server
207.46.230.219
Workstation
What Is Link-Local Multicast Name Resolution?
7. Lmhosts File
2. DNS Resolver
Cache / Hosts file 6. Broadcast
content
Root “.”
Resource
Record
.com
Resource
Record
.edu
DNS Resolvers DNS Servers DNS Servers on the Internet
What Are Root Hints?
DNS Servers
Root Hints
com
DN
DNS Server
Client microsoft
What Are DNS Queries?
An iterative query directed to a DNS server may be
A DNS query is a request
answered for name
with a referral toresolution thatserver
another DNS is directed to a
DNS server
Local DNS server Iterative query Root hint (.)
• Queries are recursive or iterative
Ask .com
A recursive query is sent to a DNS
• DNS clients and DNS servers initiate server and requires
queries
a complete answer .com
• DNS servers are authoritative or nonauthoritative for a namespace
mail1.contoso.com
• An authoritative DNS server for the namespace will either:
• Return the requested IP address
• Return an authoritative “No” contoso.com
Database
• A nonauthoritative DNS server for the namespace will either:
• Check its cache 172.16.64.11
• Use forwarders
DNS client client Local DNS server
• Use root hints
What Is Forwarding?
AConditional
forwarder is a DNS server
forwarding designated
forwards to using
requests resolvea external
domain or
name condition
offsite DNS domain names
All Iterative
other DNS domains
query
Forwarder Root hint (.)
Local DNS ISP DNS
Ask .com
.com
contoso.com
Local DNS server client
Client contoso.com DNS
computer
How DNS Server Caching Works
ServerA is at
Where’s
131.107.0.44
ServerA?
ServerA
Client1
ServerA
Where’sis at
Client2 131.107.0.44
ServerA?
How to Install the DNS Server Role
Zones Description
Resource
7. Client sends secured
DNS Server
Records update to DNS server
What Are Active Directory-Integrated Zones?
• DNS zone data is stored in AD DS
• Allows multimaster writes to zone
• Replicates DNS zone information by using AD DS
replication
• Leverages efficient replication topology
• Uses efficient Active Directory replication processes:
Incremental updates
• Enables secure dynamic updates
• Security: Can delegate zones, domains, contoso.com
resource records • hqdc01
• filesvr01
• desktop101
zone
Demonstration: Creating an Active Directory–
Integrated Zone
Logon Information
Virtual Machine 20410A-LON-DC1
20410A-LON-SVR1
20410A-LON-CL1
User Name Adatum\Administrator
Password Pa$$w0rd
Can you install DNS server role on the server that is not a
domain controller? If yes, are there any limitations?
• Review Questions
• Best Practices
• Common Issues and Troubleshooting Tips
• Tools
Microsoft Official Course
®
Module 8
Implementing IPv6
Module Overview
• Overview of IPv6
• IPv6 Addressing
• Coexistence with IPv4
• IPv6 Transition Technologies
Lesson 1: Overview of IPv6
• Benefits of IPv6
• Differences Between IPv4 and IPv6
• IPv6 Address Space
Benefits of IPv6
Source and
32 bits (4 bytes) in length 128 bits (16 bytes) in length
destination addresses
Uses host (A) resource records in Uses IPv6 host (AAAA) resource
Resource records DNS to map host names to IPv4 records in DNS to map host names
addresses to IPv6 addresses
IPv6 Address Space
[0010][1111][0011][1011]
• 128-bit address in binary:
8 4 2 10010000000000001000011011011100000000000000000000010111
[0 0 1 0]1001110110000001010101010000000001111111111111110001010
001001110001011010
0+0+2+0=2
• 128-bit address divided into 16-bit blocks:
[1 1 1 1]00100000000000010000110110111000 0000000000000000
8+4+2+1=F00101111001110110000001010101010 0000000011111111
1111111000101000 1001110001011010
[0 0 1 1]
• Each 16-bit block converted to HEX (base 16):
0+0+2+1=3
2001:0DB8:0000:2F3B:02AA:00FF:FE28:9C5A
[1 •0 Further
1 1] simplify by removing leading zeros:
8+0+2+1=B2001:DB8:0:2F3B:2AA:FF:FE28:9C5A
= 2F3B
Lesson 2: IPv6 Addressing
• IPv6 Prefixes
• Unicast IPv6 Address Types
• Zone IDs
• Address Autoconfiguration for IPv6
• Demonstration: Configuring IPv6 Client Settings
IPv6 Prefixes
Global unicast
001 2 or 3 1/8
addresses
Link-local unicast
1111 1110 1000 FE8 1/1024
addresses
• A zone ID:
• Is a unique identifier that is added to link-local
addresses
• Is based on the interface index
• Must be included when communicating with a link-
local address
• Examples:
• fe80::2b0:d0ff:fee9:4143%3
• fe80::94bd:21cf:4080:e612%2
Address Autoconfiguration for IPv6
Check
Check
IfAdd for
for aaddress
Managed router
or Otheron theset,
conflicts
flag
3
2
4
1
5 Check
6 check the
prefixes
Derive
network router
Link-Local
usingDHCPv6 for prefixes
Address
neighbor solicitation
Autoconfigured IP Timeline
IPv6 Client
Valid
Valid Lifetime
fe80::d593:e1e:e612:53e4%10
Router configuration information
Additional router prefixes
IPv4/IPv6 Node
IPv4 Network
IPv6 IPv4
Packet Packet
cket IPv6 over IPv4 tunneling
allows IPv6 to
communicate through an
IPv4 network
IPv6
IPv6 Packet
IPv4 Packet
Lesson 4: IPv6 Transition Technologies
• What Is ISATAP?
• What Is 6to4?
• What Is Teredo?
• What Is PortProxy?
• Process for Transitioning to IPv6–Only
What Is ISATAP?
How ISATAP Tunneling Works
ISATAP Router
DNS Server
•• Advertises subnet prefixes
Address assignment that are assigned
and automatic totechnology
tunneling the logical ISATAP
for unicast
subnet on which
IPv6 traffic ISATAP
between hosts are
IPv6/IPv4 located
nodes across an IPv4 intranet
• ISATAP hosts use the advertised subnet prefixes to configure global
ISATAP Router
• ISATAP
ISATAPaddresses
addresses: IPv4-only IPv6-capable
intranet
• [64-bit unicast prefix]:0:5EFE:w.x.y.z – private network
• Forwards packets between ISATAP hosts and hosts on other IPv6
• [64-bit unicast prefix]:200:5EFE:w.x.y.z 3 – public
subnets (optional)
ISATAP Host
• Example: FE80::5EFE:192.168.137.133
1 2 1 DNS query for ISATAP
• The other subnets can be subnets in an IPv6-capable portion of the
• ISATAP treats an IPv4 infrastructure as a single link IPv4-encapsulated router
organization's
IPv4 traffic
network or the IPv6 Internet 2 solicitation
IPv6 tunneled IPv4-encapsulated router
with IPv4 3 advertisement
ISATAP Host
What Is 6to4?
Field Value
IPv6 Source Address 2002:9D3C:5B7B:1::1
IPv6 host D
• Address assignment and IPv6 Destination
automatic tunneling Address
technology2002:836B:D231:2::3
for unicast
IPv6-only 6to4 relay
traffic between IPv6/IPv4
IPv6/IPv4
nodes across the IPv4 Internet
IPv4 Source Address 157.60.91.123
IPv4 Destination Address 131.107.210.49
• 6to4 address:
IPv6 Internet 6to4 router
2002:WWXX:YYZZ:Subnet_ID:Interface_ID
IPv6/IPv4
• 6to4 treats the IPv4 Internet as a single link IPv6 host C Site 2
IPv4 Internet IPv6/IPv4
IPv6 host A
IPv6/IPv4
What Is Teredo?
Components of Teredo
Teredo: Restricted NAT Tunneling
• Address-assignment and automatic tunneling technology for
IPv6 over IPv4 traffic
When How Teredo
Teredo
unicast works:
is behind
traffic a restricted
between NAT, nodes that
IPv6/IPv4 Teredoare
Server 1
located behind
Teredo Server 2
initial communication involves several
one or more IPv4 NATs on the IPv4 Internet
additional steps IPv6 or IPv6
1 Communicate with TeredoTeredo server
• 6to4 relies on public IPv4 address and host-IPv6 router functionality in
over IPv4 traffic
an edge device specific relay NAT
Restricted 2
1
2 Discover
Bubble the
packet to Teredo X
kind of NAT running at a given host 3
Client B IPv4
• Automatically adjusts behavior based on the type of the Internet
local
Bubble packet to
3 Establish Teredo
communications between Teredo clients
NAT
2 Server 2 X Teredo server
4
IPv6-only
1 host
NAT
Forwarded bubble packet
3 to Teredo Client B IPv4 Internet IPv6 Internet
Teredo relay
Bubble packet to Teredo Teredo 5 Restricted NAT X
4 Client A NAT XClient A
IPv6 traffic
Direct packet to Teredo
5 Client B
Teredo client Teredo Client B
What Is PortProxy?
Logon Information
• Review Questions
• Best Practices
Microsoft Official Course
®
Module 9
• Overview of Storage
• Managing Disks and Volumes
• Implementing Storage Spaces
Lesson 1: Overview of Storage
SAS
Performance
SCSI
SATA
EIDE Cost
What Is Direct Attached Storage?
Advantages: Disadvantages:
• Easy to configure • Isolated because it is only
• Inexpensive solution attached to a single server
• Slower
Advantages:
NAS Device
• Relatively inexpensive
• Easy to configure
LAN (Ethernet)
Disadvantages:
• Slower access times File-level access
(CIFS, NFS)
• Not an enterprise solution
Advantages:
• Fastest access times
Servers
• Easily expandable
• Centralized storage
• High level of redundancy
Switches
Disadvantages:
• More expensive
• Requires specialized skills
Storage Device
Use MBR for disks smaller 2 terabytes, and GPT for disks
larger 2 terabytes
MBR
• Standard Partition table format since early 1980s
• Supports a maximum of 4 primary partitions per drive
• Can partition a disk up to 2 terabytes
GPT
• GPT is the successor of MBR partition table format
• Supports a maximum of 128 partitions per drive
• Can partition a disk up to 18 exabytes
Selecting a Disk Type
Basic disks:
• Are disks initialized for basic storage
• Are the default storage for Windows
Dynamic disks:
Virtual drives are not virtual hard disks (VHDs); they should
be considered as a drive in Disk Manager
Virtual Disk Configuration Options
Feature Options
• Simple
Storage Layout • Two-way or three-way mirror
• Parity
• Data store
Drive allocation • Manual
• Hot Spare
• On disk failure:
§ Do not use chkdsk or scan disk
§ Remove the drive and add a new one
Logon Information
• Review Questions
• Best Practices
• Tools
Microsoft Official Course
®
Module 10
NTFS Permissions:
• Are assigned to files or folders
• Can be allowed or denied
• Are inherited from parent folders
Blocking inheritance:
• You can block permission inheritance
• You can apply blocking at the file or folder level
• You can set blocking on a folder to propagate the new
permissions to child objects
Effective Permissions
Both the share and the NTFS file and folder permissions
must have the correct permissions, otherwise the user or
group will be denied access to the resource
What Is Access-Based Enumeration?
Offline file settings allow client computer to cache network files locally for
offline use when they are disconnected from the network
Demonstration: Creating and Configuring a
Shared Folder
Shadow copies:
• Allow access to previous versions of files
• Are based on tracking disk changes
• Disk space is allocated on the same volume
• When the space is full, older shadow copies
are removed
• Are not a replacement for backups
• Default schedule is
7:00 A.M. and noon
• Create a shadow copy
schedule based on:
• Volume of changes
• Importance of changes
• Storage limitations
Restoring Data from a Shadow Copy
• Centralized management
• Simplified troubleshooting
• Listing in AD DS
What Is Enhanced Point and Print?
A printer pool:
• Increases availability and scalability
Print Server
Print request
Print redirect
Branch Office
• Manual installation
Lab: Implementing File and Print Services
Logon Information
Virtual Machine 20410A-LON-CL1
20410A-LON-DC1
20410A-LON-SVR1
User Name Adatum\Administrator
Password Pa$$w0rd
Is there another way you could recover the file in the shadow copy
exercise? What benefit do shadow copies provide in comparison?
• Review Questions
• Tools
Microsoft Official Course
®
Module 11
• Non-Administrator
• User-specific
Storage of Domain GPOs
What Are Group Policies and Preferences?
A starter GPO:
• Has preconfigured administrative template settings upon which
new GPOs can be based
• Can be exported to .cab files
• Can be imported into other areas of the enterprise
Exported to Imported to
.cab file GPMC
.cab Load
Starter GPO
file .cab file
Delegating Management of GPOs
• Creating GPOs
• Editing GPOs
• GPO Links
• Applying GPOs
• Group Policy Processing Order
• What Are the Default GPOs?
• GPO Security Filtering
• Discussion: Identifying Group Policy Application
• Demonstration: Using Group Policy Diagnostic
Tools
GPO Links
GPO1
Site
GPO3
GPO4
Domain
GPO5
OU
OU OU
What Are the Default GPOs?
GPO3 configures
power options for
Laptops OU client laptops
Demonstration: Using Group Policy Diagnostic
Tools
ADMX files
.admx
x
.adml Registry
How Administrative Templates Work
Administrative Templates
• Managed policy setting
• UI is locked; user cannot make a change to the setting
• Changes are made in one of four reserved registry keys
• Change and UI locks are released when the
user/computer falls out of scope
• Unmanaged policy setting
• UI is not locked
• Changes made are persistent: tattoos the registry
• Only managed settings are shown by default
• Set Filter Options to view unmanaged settings
Preferences
• Effects vary
Lab: Implementing Group Policy
Logon Information
• Review Questions
• Best Practices
• Common Issues and Troubleshooting Tips
• Tools
Microsoft Official Course
®
Module 12
Examples:
• Add workstations to a domain
• Allow log on locally
• Back up files and directories
• Change the system time
• Force shutdown from a remote computer
• Shut down the system
Configuring Security Options
Examples:
• Prompt user to change password before expiration
• Do not display last user name
• Rename administrator account
• Restrict CD-ROM access to locally logged-on user only
Configuring User Account Control
Logon Information
Benefits of AppLocker:
• Controls how users can access and run all types of applications
Rule actions
• Allow or Deny conditions
• Enforce or Audit Only policies
Demonstration: Creating AppLocker Rules
Logon Information
• Review Questions
• Common Issues and Troubleshooting Tips
• Tools
Microsoft Official Course
®
Module 13
Benefits of App-V
Application isolation
• Applications that are not compatible with the
server’s operating system or with one another can
be run on the same server
Application streaming
• Application deployment is quicker because only those
parts of the application that are being used are
transmitted across the network to the client computer
Application portability
• Applications can follow users across multiple
computers, without requiring a traditional installation
on those client computers
Lesson 2: Implementing Hyper-V
• About Hyper-V
• Hardware Requirements for Hyper-V
• Virtual Machine Hardware
• Configuring Dynamic Memory
• Configuring Virtual Machine Integration Services
• Configuring Virtual Machine Start and Stop
Actions
• Hyper-V Resource Metering
About Hyper-V
Hyper-V
• Is the hardware virtualization role in Windows Server 2012
• Gives virtual machine guests direct access to the host's
hardware
Terminology
• Server also known as parent partition
• Virtual machines also known as child partitions
Startup RAM
Dynamic Memory
• Minimum RAM
• Maximum RAM
• Memory buffer
Memory weight
Configuring Virtual Machine Integration Services
Pass-through disks
VLAN IDs
Used to extend VLANs within the host's network switch to VLANS on
the external network
Hyper-V Network Virtualization
Blue
Red virtual Blue Red
virtual
machine network network
machine
Virtualization
Top of
rack
switches
Physical Physical
server network Servers
Network virtualization
Server virtualization
• Run multiple virtual networks on
• Run multiple virtual servers on a
a physical network
physical server
• Each virtual network operates as
• Each virtual server operates as if
if it is running as a physical
it is running as a physical server
network
Managing Virtual Machine MAC Addresses
Configuring Virtual Network Adapters
What type of virtual network switch would you create if you wanted to
allow the virtual machine to communicate with the local area network
connected to the Hyper-V host?
How can you ensure that no one single virtual machine uses all available
bandwidth provided by the Hyper-V host?
• Review Questions
• Common Issues and Troubleshooting Tips
• Best Practices
• Tools
Course Evaluation