Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
MCSA (E)
History of Microsoft certificates
MCSE – MCITP – MCSE
Validity of MCSA certificate
MCSA Installing & Configuring Windows Server 2012 70-410
Course Topics
• Windows Management (Installation,
Modifying installation, Core)
• Active Directory
• Accounts (Users, Computers, OUs, and
Groups)
• Group Policy
• Networking (IPv4, IPv6, DHCP, and DNS)
• Managing Storage
• License (Editions)
• Prerequisites (HW, Apps, Storage
Drivers)
• Testing on Virtual Machine
• BACKUP
• Installation Modes
Installing Windows
2012 R2
• Upgrade
https://technet.microsoft.com/en
-us/library/dn303416.aspx
• Migration
https://technet.microsoft.com/en
-us/library/dn486773
Switching between modes
• Full – Core - Minimal
• GUI needs Vs Core advantages
Features on demand
• Security, space
• If we needed it later?
• Online or to an Offline VHD
Adding roles to offline VHDs
• PowerShell
• CMD
• Alias
• SConfig
• RDP
Configuring Core
WinRM (Mostly for monitoring)
RSAT (Useful for desktops)
Another Server With Same Role
Non-domain joined computer
(FW rule, PS script)
Remote Management
Active Directory
Each server has its own password policy (complexity,
expiration, etc.), different companies, and many
users for each server
Domain Vs Workgroup
DC redundancy
Domain naming
Parent, child, tree, and forest
Trust between domains
Active Directory
Domain
Controllers
Installation ADDS + Promoting to DC
Redundancy
Adding extra DCs (Same subnet,
IFM, Script)
Uninstalling (demoting) DC
AD DC Upgrade
FFL
DFL
Global Catalog
SRV Records
Domain
Controllers
User
Computer
Group (types)
Organizational Unit
Sites
AD Objects
What is SID?
Creating Accounts
Creating Template Accounts
Joining a Computer
Online
Offline
Inactive & Disabled Accounts
AD Users & Computers
SID, Username, & PW
Secure Channel
Broken Secure Channel
AD Computers
Accounts
DC Promo
AD AC
Recycle Bin
Fine-grained Passwords
Extra
Automate Accounts
Creation
LDIFDE: Lightweight Data Interchange
Format, Data Exchange
CSVDE: Comma Separated Value Data
Exchange.
LDIFDE:
dn: “cn=Elizabeth Andersen,ou=Research,dc=adatum,dc=com”
changetype: add (or modify, delete)
ObjectClass: user
SAMAccountName: eander
UserPrincipalName: eander@adatum.com
telephoneNumber: 586-555-1234
Then, save it with .ldf and run:
ldifde –i –f <filename.ldf>
CSVDE:
dn,samAccountName,userPrincipalName,telephoneNumber,objectCla
ss
“cn=Elizabeth
Andersen,ou=Research,dc=adatum,dc=com”,eander,eander@adatu
m.com,586-555-1234,user
Then you run the command:
csvde.exe -i -f <filename.csv>
DSADD
DSADD allows adding users to multiple
OU; create OUs, computers, users
dsadd ou ou=test,dc=northwindtraders,dc=com
dsadd user
“cn=test321,ou=sales,dc=dabbas,dc=com” -disable
no
DSquery, Dsmod, DSget, DSMove, DSRm
Check the notes file
PowerShell
CSV file (first line is parameters)
Import-Csv .CSVimport.csv | foreach-object
{$userprincipalname = $_.SamAccountName
+ "@{domainname}.com"
Groups
Why we use Groups?
Are OUs Groups?
Type of Groups
Group Scopes
Group Conversions
Organizational Units
What OU can contain?
Simplifying Administration
Permissions on OUs?
OUs & GPOs?
Users & Computers are Containers
RedirUser & RedirCmp
Accidental Deletion
Delegation
Delegation Templates
Organizational Units
Networking – IPv4
What is IP?
Public Vs Private IPs
Subnetting & Default Gateway
Hosts
IP Assignments
Exercises
MCSA Installing & Configuring Windows Server 2012 70-410
Supernetting
Networking – IPv6
Hexadecimal Notation
Addressing – 128 Bits – 8 of 16 Bits
blocks
Shortening Address Rules
The Interface ID
Converting MAC to EUI-64
Addresses Types:
Link Local: Starts with FE80
Unique Local (Site Local): Starts with
FD
Global
Communications Type:
• Unicast: One to One
• Multicast: One to Many
• Anycast: One to Closest
• No Broadcast as in IPv4
Transition to IPv6
• Dual Stack Routers
• Tunneling (6to4 & 4to6)
• Intra-Site Automatic Tunnel
Addressing Protocol ISATAP
• Teredo
Group Policy
What are GPOs & Why we use them?
Where GPO Files are saved?
GPOs Types:
Local GPO
Non-Local GPO
Creating & Managing a Local GPO
Non-Local Overwrites Local GPOs
Domain (Non-Local) GPOs
Creating a GPO
Linking (Applying) to an OU
Blocking Top GPOs on a specific OU
Enforcing Blocked GPO!
How long GPO takes to be applied?
Templates GPOs
Pre-defined GPOs
Can be downloaded
Multiple OSs?
Central Store
Useful to avoid OSs diff. templates
Found under “PolicyDefinitions”
www.gpanswers.com
Scope of Management
• User (Computer) Should be linked
to Users (Computers) OUs
• Policies are Cumulative
• Computer overwrites User
Processing Order
Local > Site > Domain > OU >
OU
Authenticated Users
Starter GPOs
Policies Vs. Preferences
Policies Preferences
Settings are permanent (greyed
out UI)
User can change settings (drive
map
Applied at startup, logon, refresh Same as policies, option to do not
reapply
Removing policy reverts to
defaults
Does not revert back
automatically
Takes precedence over
preferences
not available for local GPO
Useful for: preventing installing
apps, prevent changing
backgrounds
Useful for: desktop icons,
shortcuts, add URL on desktop,
drive map, file copy, update
GPO Permissions
• Who have Full perm. By default?
• Delegate Permission
GPO Security Settings
Comp. > Policies > Win. > Sec.
User Tokens (Standard & Admin
Tokens)
Security Templates
Security Configuration & Analysis
Software Restriction Policy &
Applocker
Software Restriction Policy Applocker
Designed for legacy Windows
(XP, 2003)
Designed for Win 7/8, 2008 R2,
2012
Fairly easy to bypass Less easy to bypass
All apps are allowed by defaults All apps are denied by defaults
DHCP
What is DHCP?
Why it’s better than Static IP?
Allocation Methods:
• Dynamic
• Automatic
• Manual
DORA
Discover – Offer – Request –
Ack.
Common Parameters
PXE & DHCP
Relay Agent
Extra:
• DB Backup
• Failover Options
DNS
What is DNS?
Zones & Zones Types
How DNS Works?
Type of Queries (Recursive &
Iterative)
Type of Answers (Authoritative &
Non-Authoritative)
Forwarders:
• Root Hints
• Conditional Forwarders
Stub Zones
Manage Cache
Records Types (Resource Records)
Hyper-V
What is Virtualization and Why?
Benefits of Using Virtualization
• Space, Power, Cooling
• Less Management (at least centralized)
• Optimize Resources to the max.
• Greener, easier to backup, easier to
replicate, etc.
Hypervisor
Hypervisor Types:
• Type 1: Native or Bare Metal (Hyper-
V)
• Type 2: Hosted (VMWare
Workstation)
Hyper-V needs 64-Bit processor
BIOS Should Support Virtualization
RAM & Storage Consideration
Enabling Hyper-V on Windows 8 & 8.1
Hyper-V Configuration Settings
• Dynamic Memory
• Smart Paging
• Resource Metering
• Guest Integration Services
• Memory Buffer
• Memory Weight
Storage in Hyper-V
VHD Max. 2 TB, VHDx up to 64 TB
VHDx is more resilient
How to modify VHD files?
How to Change VHD size? Disk Mgmt.?
Differencing drives
Pass through disks
Snapshots
Fiber Channel Adapter
Networking in Hyper-V
Switches Types:
• External
• Internal
• Private
VLAN
Configuring MAC
Gen1 & Gen2
Gen2 can be used on 2012, 8, 8.1 64-
bit only
Hyper-V in R2 uses RDP (supports
copy/paste, audio redirection)
Online VHDx resize / shrink
NIC Teaming:
Teaming
Switch Independent
Static Teaming (Dependent)
LACP (Dependent)
Load Balancing
Address Hash
Hyper-V Port
Dynamic
Local Storage
Disk Types, Basic & Dynamic
Choosing Storage Type Depends on:
• Amount of Storage needed
• Number of Users (at the same time)
• Data Sensitivity
• Data Importance
RAID Types:
Simple
Spanned
Striped (RAID 0)
Mirrored (RAID 1)
Striped Set with Parity (RAID 5)
File Systems (Must know, not directly
required)
File. Allocation Table FAT/FAT32/exFAT
• No Security
New TechFile System NTFS
• Secured using Permissions
• Encryption & Compression
• Quotas
• Auditing, File Tagging, Larger Files
Resilient File System ReFS
• File can have 16 Exabyte size
• File Name Length is up to 32000
char.
• High Resiliency
• Backward Compatible
• No Disk Quotas
Creating VHD & VHDx through Disk
Management
Adding files to VHD & VHDx through
Disk Management
Storage Spaces in 2012
What is SAN?
• Administration? Cost Wise?
What about NAS?
Virtual Disks (Not VHDs!)
Storage Pools
Virtual Disk Configuration
Layout
• Simple, Two or Three way Mirror,
Parity
Provisioning
• Fixed, Thin
Allocation
• Data Store, Manual, Hot Spare
Storage Spaces Using Enclosures
• Approved JBOD:
www.windowsservercatalog.com
• 2U/4U Rack mounted, up to 70 Drives
• Smart, can send not. to Windows
about temp., storage status)
• Redundant fan, Power
Storage container not a self RAID
Storage Spaces Tiering
• Fast SSD for hot or pinned data
• Slow HDD for cold data
Share & NTFS
Share Vs. NTFS permissions
Share NTFS
Network Only, no control over
local access
Local and Network access
First line of defense Primary tool to control access
Options are: Read, change, Full Much more
Applies to folders only Applies to files & folders
No inheritance Many options available for
inheritance
Share
• Cumulative permissions apply (deny
wins)
• Can be combined with NTFS perms.
• Administrative Share
• Access-Based Enumeration
NTFS
• Change Owner
• Inheritance apply order
• Permission can be either additive or
subtractive (start with all denied then
allow, or start with all allow then deny)
• Effective access: the result of applying
these rules:
•Deny overrides allow
•Allow permissions are cumulative
•Explicit perm takes precedence over
inherited
• Authorizing occurs to SID for users
Offline Files
• Applies to network shares
• Files stay available when
disconnected
• High reliable sync. Mechanism
• Can be configured using Offline
settings or GPO
• Needs to be enabled first, then apply
on folders
Disk Quotas
• Limit disk usage
• Enabled on volume level
• Soft Quota & Hard Quota
• File Server Resource Manager FSRM is handy
• FSRM can apply quotas on folders, Windows
Explorer on volumes only
• File Screening, Data Deduplication
• Storage Reports Management
Volume Shadow Copy
• Used in VM snapshots
• Used by backup operations
(Windows, Acronis)
• Used for File Recovery
In File Recovery:
• Quick restore for accidental deletions
• Scheduled
• Used on the machine not only shares
• VSS is configured under volume
properties
• VSS is replaced with File History,
starting Win. 8
• On servers, enabled under driver
properties under disk management
• VSS by default creates two copies, at
7:00 AM and 12:00 PM
Work Folders
• Similar to Offline Files feature
• Allows access to joined & non-joined
domain workstations
• Enables managing BYOD
• Transparent conflict resolution
• Hub-Spoke topology
• Works with file screening, classification (can
classify documents), quotas
• Security policies for encryption, screen lock
(data security if device was stolen)
Work Folders Configuration
Server Side:
• Define appropriate users and groups
• Add & configure “work folders” role
• DNS (workfolders.domain.com)
• Certificates
• Proxy
Client Side:
• Control panel configuration
• Access using “work folders”
Printers
Definitions:
• Print Device
• Printer
• Print Server
• Printer Driver
Printing workflow:
• PC > Printer > Driver > Print server
> Print device
Network printers & Local printers
• Central Management, drivers,
easier to install, queue
management, less cost
Printer Management MMC
• Printers Filtering
Creating multiple instances
(objects) of a printer, if we want to
give higher priority for managers
Printing Options:
• Direct print
• Locally attached printer sharing
• Network attached printing
• Network attached printer sharing
Printer Pool: Identical devices ONLY
Adding 32-bit driver to a 64-bit
server
Easy Print
Firewall
Why Windows Firewall?
Firewall Interfaces
• Control Panel
• Windows Firewall Advanced
• NetSH
• PowerShell
• GPO
Hardware Firewall & Software Firewall
Firewall Modes:
Domain
• Work
• Home
• Public
Opening port Vs. Allowing Application
Connection security rules
Importing & Exporting Rules
Configuring Firewall under GPO
Computer > Policies > Windows >
Security > Windows FW with Advanced
Security

More Related Content

What's hot

Hardware virtualization basic
Hardware virtualization basicHardware virtualization basic
Hardware virtualization basic
Sanoj Kumar
 
Virtualization
VirtualizationVirtualization
Virtualization
Utkarsh Soni
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptx
RiyaBatool
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material cc
Ankit Gupta
 
Fedora Linux
Fedora LinuxFedora Linux
Fedora Linux
Icko Legaspi
 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
Hitesh Gupta
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
Gaurav Suri
 
Window server editions
Window server editionsWindow server editions
Window server editions
Fiji National University
 
DFS PPT.pptx
DFS PPT.pptxDFS PPT.pptx
DFS PPT.pptx
VMahesh5
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
Tuan Yang
 
Xen Hypervisor
Xen HypervisorXen Hypervisor
Xen Hypervisor
Susheel Thakur
 
Server virtualization by VMWare
Server virtualization by VMWareServer virtualization by VMWare
Server virtualization by VMWare
sgurnam73
 
Linux
Linux Linux
Linux
Teja Babu
 
Paravirtualization
ParavirtualizationParavirtualization
Paravirtualization
Shahbaz Sidhu
 
Virtualization Questions
Virtualization QuestionsVirtualization Questions
Virtualization Questions
Trupti Jethva
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
Mark Wilson
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
IGZ Software house
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
Shashi soni
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
Hameda Hurmat
 
Linux
LinuxLinux

What's hot (20)

Hardware virtualization basic
Hardware virtualization basicHardware virtualization basic
Hardware virtualization basic
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Xen Hypervisor.pptx
Xen Hypervisor.pptxXen Hypervisor.pptx
Xen Hypervisor.pptx
 
Week 3 lecture material cc
Week 3 lecture material ccWeek 3 lecture material cc
Week 3 lecture material cc
 
Fedora Linux
Fedora LinuxFedora Linux
Fedora Linux
 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
Window server editions
Window server editionsWindow server editions
Window server editions
 
DFS PPT.pptx
DFS PPT.pptxDFS PPT.pptx
DFS PPT.pptx
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
 
Xen Hypervisor
Xen HypervisorXen Hypervisor
Xen Hypervisor
 
Server virtualization by VMWare
Server virtualization by VMWareServer virtualization by VMWare
Server virtualization by VMWare
 
Linux
Linux Linux
Linux
 
Paravirtualization
ParavirtualizationParavirtualization
Paravirtualization
 
Virtualization Questions
Virtualization QuestionsVirtualization Questions
Virtualization Questions
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
 
Linux
LinuxLinux
Linux
 

Viewers also liked

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenance
anilinvns
 
Windows 10
Windows 10Windows 10
Windows 10
omardabbas
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
Muhibullah Malyar
 
70-410 Installing and Configuring Windows Server 2012
70-410 Installing and Configuring Windows Server 201270-410 Installing and Configuring Windows Server 2012
70-410 Installing and Configuring Windows Server 2012
drakoumu
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
David J Rosenthal
 
What’s new in windows server 2012
What’s new in windows server 2012What’s new in windows server 2012
What’s new in windows server 2012
Alex de Jong
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
David J Rosenthal
 
Microsoft Windows Server 2012 R2 Overview - Presented by Atidan
Microsoft Windows Server 2012 R2 Overview - Presented by AtidanMicrosoft Windows Server 2012 R2 Overview - Presented by Atidan
Microsoft Windows Server 2012 R2 Overview - Presented by Atidan
David J Rosenthal
 
Active Directory Domain Services Installation & Configuration - Windows Ser...
Active Directory Domain Services  Installation & Configuration  - Windows Ser...Active Directory Domain Services  Installation & Configuration  - Windows Ser...
Active Directory Domain Services Installation & Configuration - Windows Ser...
Adel Alghamdi
 
Windows Server 2012 R2
Windows Server 2012 R2Windows Server 2012 R2
Windows Server 2012 R2
Microsoft Technet France
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
anilinvns
 
Introducing Microsoft SQL Server 2017
Introducing Microsoft SQL Server 2017Introducing Microsoft SQL Server 2017
Introducing Microsoft SQL Server 2017
David J Rosenthal
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
Zeshan Sattar
 
Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012 Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012
Sameh AboulDahab
 
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Microsoft Technet France
 

Viewers also liked (15)

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenance
 
Windows 10
Windows 10Windows 10
Windows 10
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
70-410 Installing and Configuring Windows Server 2012
70-410 Installing and Configuring Windows Server 201270-410 Installing and Configuring Windows Server 2012
70-410 Installing and Configuring Windows Server 2012
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
What’s new in windows server 2012
What’s new in windows server 2012What’s new in windows server 2012
What’s new in windows server 2012
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Microsoft Windows Server 2012 R2 Overview - Presented by Atidan
Microsoft Windows Server 2012 R2 Overview - Presented by AtidanMicrosoft Windows Server 2012 R2 Overview - Presented by Atidan
Microsoft Windows Server 2012 R2 Overview - Presented by Atidan
 
Active Directory Domain Services Installation & Configuration - Windows Ser...
Active Directory Domain Services  Installation & Configuration  - Windows Ser...Active Directory Domain Services  Installation & Configuration  - Windows Ser...
Active Directory Domain Services Installation & Configuration - Windows Ser...
 
Windows Server 2012 R2
Windows Server 2012 R2Windows Server 2012 R2
Windows Server 2012 R2
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
Introducing Microsoft SQL Server 2017
Introducing Microsoft SQL Server 2017Introducing Microsoft SQL Server 2017
Introducing Microsoft SQL Server 2017
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012 Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012
 
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
 

Similar to MCSA Installing & Configuring Windows Server 2012 70-410

70-410 Practice Test
70-410 Practice Test70-410 Practice Test
70-410 Practice Test
wrailebo
 
Azure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun AnlatımAzure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun Anlatım
Mustafa
 
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
monsonc
 
Securing Windows with Group Policy
Securing Windows with Group PolicySecuring Windows with Group Policy
Securing Windows with Group Policy
Josh Rickard
 
GWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
GWAVACon 2015: Microsoft MVP - Exchange Architecture & SizingGWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
GWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
GWAVA
 
Dns firewalls null-may2020
Dns firewalls null-may2020Dns firewalls null-may2020
Dns firewalls null-may2020
n|u - The Open Security Community
 
HDFS- What is New and Future
HDFS- What is New and FutureHDFS- What is New and Future
HDFS- What is New and Future
DataWorks Summit
 
HDFS_architecture.ppt
HDFS_architecture.pptHDFS_architecture.ppt
HDFS_architecture.ppt
vijayapraba1
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
Sam Bowne
 
Windows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsWindows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in Leeds
Simon May
 
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication SystemCSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
Hendrik van Run
 
Cl212
Cl212Cl212
How to Build a Compute Cluster
How to Build a Compute ClusterHow to Build a Compute Cluster
How to Build a Compute Cluster
Ramsay Key
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
Sam Bowne
 
TenT-Day01.pptx
TenT-Day01.pptxTenT-Day01.pptx
TenT-Day01.pptx
Johan Myburgh
 
TenT-Day01.pptx
TenT-Day01.pptxTenT-Day01.pptx
TenT-Day01.pptx
JohanMyburgh15
 
LESSON 1 - Windows Server 2008 R2 Configuration.pptx
LESSON 1 - Windows Server 2008 R2 Configuration.pptxLESSON 1 - Windows Server 2008 R2 Configuration.pptx
LESSON 1 - Windows Server 2008 R2 Configuration.pptx
JoeyOrale2
 
Managing Remote Teams
Managing Remote TeamsManaging Remote Teams
Managing Remote Teams
Dell World
 
Hyper-v Best Practices
Hyper-v Best PracticesHyper-v Best Practices
Hyper-v Best Practices
Darshana Sampath Jayathilake
 
cloud service management.Details of classic data center
cloud service management.Details of classic data centercloud service management.Details of classic data center
cloud service management.Details of classic data center
shamaparveen503126
 

Similar to MCSA Installing & Configuring Windows Server 2012 70-410 (20)

70-410 Practice Test
70-410 Practice Test70-410 Practice Test
70-410 Practice Test
 
Azure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun AnlatımAzure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun Anlatım
 
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
 
Securing Windows with Group Policy
Securing Windows with Group PolicySecuring Windows with Group Policy
Securing Windows with Group Policy
 
GWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
GWAVACon 2015: Microsoft MVP - Exchange Architecture & SizingGWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
GWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
 
Dns firewalls null-may2020
Dns firewalls null-may2020Dns firewalls null-may2020
Dns firewalls null-may2020
 
HDFS- What is New and Future
HDFS- What is New and FutureHDFS- What is New and Future
HDFS- What is New and Future
 
HDFS_architecture.ppt
HDFS_architecture.pptHDFS_architecture.ppt
HDFS_architecture.ppt
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
Windows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsWindows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in Leeds
 
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication SystemCSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
 
Cl212
Cl212Cl212
Cl212
 
How to Build a Compute Cluster
How to Build a Compute ClusterHow to Build a Compute Cluster
How to Build a Compute Cluster
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
TenT-Day01.pptx
TenT-Day01.pptxTenT-Day01.pptx
TenT-Day01.pptx
 
TenT-Day01.pptx
TenT-Day01.pptxTenT-Day01.pptx
TenT-Day01.pptx
 
LESSON 1 - Windows Server 2008 R2 Configuration.pptx
LESSON 1 - Windows Server 2008 R2 Configuration.pptxLESSON 1 - Windows Server 2008 R2 Configuration.pptx
LESSON 1 - Windows Server 2008 R2 Configuration.pptx
 
Managing Remote Teams
Managing Remote TeamsManaging Remote Teams
Managing Remote Teams
 
Hyper-v Best Practices
Hyper-v Best PracticesHyper-v Best Practices
Hyper-v Best Practices
 
cloud service management.Details of classic data center
cloud service management.Details of classic data centercloud service management.Details of classic data center
cloud service management.Details of classic data center
 

Recently uploaded

@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
kantakumariji156
 
@Call @Girls Thiruvananthapuram 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
@Call @Girls Thiruvananthapuram  🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...@Call @Girls Thiruvananthapuram  🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
@Call @Girls Thiruvananthapuram 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
kantakumariji156
 
HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)
Alpen-Adria-Universität
 
What's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdfWhat's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdf
SeasiaInfotech2
 
Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024
The Digital Insurer
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
5G bootcamp Sep 2020 (NPI initiative).pptx
5G bootcamp Sep 2020 (NPI initiative).pptx5G bootcamp Sep 2020 (NPI initiative).pptx
5G bootcamp Sep 2020 (NPI initiative).pptx
SATYENDRA100
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
uuuot
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024
The Digital Insurer
 
AC Atlassian Coimbatore Session Slides( 22/06/2024)
AC Atlassian Coimbatore Session Slides( 22/06/2024)AC Atlassian Coimbatore Session Slides( 22/06/2024)
AC Atlassian Coimbatore Session Slides( 22/06/2024)
apoorva2579
 
How to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory ModelHow to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory Model
ScyllaDB
 
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design ApproachesKnowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Earley Information Science
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 

Recently uploaded (20)

@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
 
@Call @Girls Thiruvananthapuram 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
@Call @Girls Thiruvananthapuram  🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...@Call @Girls Thiruvananthapuram  🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
@Call @Girls Thiruvananthapuram 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
 
HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)
 
What's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdfWhat's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdf
 
Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
5G bootcamp Sep 2020 (NPI initiative).pptx
5G bootcamp Sep 2020 (NPI initiative).pptx5G bootcamp Sep 2020 (NPI initiative).pptx
5G bootcamp Sep 2020 (NPI initiative).pptx
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024
 
AC Atlassian Coimbatore Session Slides( 22/06/2024)
AC Atlassian Coimbatore Session Slides( 22/06/2024)AC Atlassian Coimbatore Session Slides( 22/06/2024)
AC Atlassian Coimbatore Session Slides( 22/06/2024)
 
How to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory ModelHow to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory Model
 
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design ApproachesKnowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 

MCSA Installing & Configuring Windows Server 2012 70-410

  • 1. MCSA (E) History of Microsoft certificates MCSE – MCITP – MCSE Validity of MCSA certificate
  • 3. Course Topics • Windows Management (Installation, Modifying installation, Core) • Active Directory • Accounts (Users, Computers, OUs, and Groups) • Group Policy • Networking (IPv4, IPv6, DHCP, and DNS) • Managing Storage
  • 4. • License (Editions) • Prerequisites (HW, Apps, Storage Drivers) • Testing on Virtual Machine • BACKUP • Installation Modes Installing Windows 2012 R2
  • 6. Switching between modes • Full – Core - Minimal • GUI needs Vs Core advantages Features on demand • Security, space • If we needed it later? • Online or to an Offline VHD Adding roles to offline VHDs
  • 7. • PowerShell • CMD • Alias • SConfig • RDP Configuring Core
  • 8. WinRM (Mostly for monitoring) RSAT (Useful for desktops) Another Server With Same Role Non-domain joined computer (FW rule, PS script) Remote Management
  • 9. Active Directory Each server has its own password policy (complexity, expiration, etc.), different companies, and many users for each server
  • 10. Domain Vs Workgroup DC redundancy Domain naming Parent, child, tree, and forest Trust between domains Active Directory
  • 11. Domain Controllers Installation ADDS + Promoting to DC Redundancy Adding extra DCs (Same subnet, IFM, Script) Uninstalling (demoting) DC
  • 12. AD DC Upgrade FFL DFL Global Catalog SRV Records Domain Controllers
  • 14. What is SID? Creating Accounts Creating Template Accounts Joining a Computer Online Offline Inactive & Disabled Accounts AD Users & Computers
  • 15. SID, Username, & PW Secure Channel Broken Secure Channel AD Computers Accounts
  • 16. DC Promo AD AC Recycle Bin Fine-grained Passwords Extra
  • 17. Automate Accounts Creation LDIFDE: Lightweight Data Interchange Format, Data Exchange CSVDE: Comma Separated Value Data Exchange.
  • 18. LDIFDE: dn: “cn=Elizabeth Andersen,ou=Research,dc=adatum,dc=com” changetype: add (or modify, delete) ObjectClass: user SAMAccountName: eander UserPrincipalName: eander@adatum.com telephoneNumber: 586-555-1234 Then, save it with .ldf and run: ldifde –i –f <filename.ldf> CSVDE: dn,samAccountName,userPrincipalName,telephoneNumber,objectCla ss “cn=Elizabeth Andersen,ou=Research,dc=adatum,dc=com”,eander,eander@adatu m.com,586-555-1234,user Then you run the command: csvde.exe -i -f <filename.csv>
  • 19. DSADD DSADD allows adding users to multiple OU; create OUs, computers, users dsadd ou ou=test,dc=northwindtraders,dc=com dsadd user “cn=test321,ou=sales,dc=dabbas,dc=com” -disable no DSquery, Dsmod, DSget, DSMove, DSRm Check the notes file
  • 20. PowerShell CSV file (first line is parameters) Import-Csv .CSVimport.csv | foreach-object {$userprincipalname = $_.SamAccountName + "@{domainname}.com"
  • 21. Groups Why we use Groups? Are OUs Groups? Type of Groups
  • 23. Organizational Units What OU can contain? Simplifying Administration Permissions on OUs? OUs & GPOs?
  • 24. Users & Computers are Containers RedirUser & RedirCmp Accidental Deletion Delegation Delegation Templates Organizational Units
  • 25. Networking – IPv4 What is IP? Public Vs Private IPs
  • 26. Subnetting & Default Gateway Hosts IP Assignments Exercises
  • 29. Networking – IPv6 Hexadecimal Notation Addressing – 128 Bits – 8 of 16 Bits blocks Shortening Address Rules
  • 31. Addresses Types: Link Local: Starts with FE80 Unique Local (Site Local): Starts with FD Global
  • 32. Communications Type: • Unicast: One to One • Multicast: One to Many • Anycast: One to Closest • No Broadcast as in IPv4
  • 33. Transition to IPv6 • Dual Stack Routers • Tunneling (6to4 & 4to6) • Intra-Site Automatic Tunnel Addressing Protocol ISATAP • Teredo
  • 34. Group Policy What are GPOs & Why we use them? Where GPO Files are saved? GPOs Types: Local GPO Non-Local GPO Creating & Managing a Local GPO Non-Local Overwrites Local GPOs
  • 35. Domain (Non-Local) GPOs Creating a GPO Linking (Applying) to an OU Blocking Top GPOs on a specific OU Enforcing Blocked GPO! How long GPO takes to be applied?
  • 36. Templates GPOs Pre-defined GPOs Can be downloaded Multiple OSs? Central Store Useful to avoid OSs diff. templates Found under “PolicyDefinitions” www.gpanswers.com
  • 37. Scope of Management • User (Computer) Should be linked to Users (Computers) OUs • Policies are Cumulative • Computer overwrites User Processing Order Local > Site > Domain > OU > OU Authenticated Users
  • 38. Starter GPOs Policies Vs. Preferences Policies Preferences Settings are permanent (greyed out UI) User can change settings (drive map Applied at startup, logon, refresh Same as policies, option to do not reapply Removing policy reverts to defaults Does not revert back automatically Takes precedence over preferences not available for local GPO Useful for: preventing installing apps, prevent changing backgrounds Useful for: desktop icons, shortcuts, add URL on desktop, drive map, file copy, update
  • 39. GPO Permissions • Who have Full perm. By default? • Delegate Permission GPO Security Settings Comp. > Policies > Win. > Sec. User Tokens (Standard & Admin Tokens) Security Templates Security Configuration & Analysis
  • 40. Software Restriction Policy & Applocker Software Restriction Policy Applocker Designed for legacy Windows (XP, 2003) Designed for Win 7/8, 2008 R2, 2012 Fairly easy to bypass Less easy to bypass All apps are allowed by defaults All apps are denied by defaults
  • 41. DHCP What is DHCP? Why it’s better than Static IP? Allocation Methods: • Dynamic • Automatic • Manual
  • 42. DORA Discover – Offer – Request – Ack. Common Parameters PXE & DHCP Relay Agent Extra: • DB Backup • Failover Options
  • 43. DNS What is DNS? Zones & Zones Types How DNS Works? Type of Queries (Recursive & Iterative) Type of Answers (Authoritative & Non-Authoritative)
  • 44. Forwarders: • Root Hints • Conditional Forwarders Stub Zones Manage Cache Records Types (Resource Records)
  • 45. Hyper-V What is Virtualization and Why? Benefits of Using Virtualization • Space, Power, Cooling • Less Management (at least centralized) • Optimize Resources to the max. • Greener, easier to backup, easier to replicate, etc.
  • 46. Hypervisor Hypervisor Types: • Type 1: Native or Bare Metal (Hyper- V) • Type 2: Hosted (VMWare Workstation) Hyper-V needs 64-Bit processor BIOS Should Support Virtualization RAM & Storage Consideration
  • 47. Enabling Hyper-V on Windows 8 & 8.1 Hyper-V Configuration Settings • Dynamic Memory • Smart Paging • Resource Metering • Guest Integration Services • Memory Buffer • Memory Weight
  • 48. Storage in Hyper-V VHD Max. 2 TB, VHDx up to 64 TB VHDx is more resilient How to modify VHD files? How to Change VHD size? Disk Mgmt.? Differencing drives Pass through disks Snapshots Fiber Channel Adapter
  • 49. Networking in Hyper-V Switches Types: • External • Internal • Private VLAN Configuring MAC
  • 50. Gen1 & Gen2 Gen2 can be used on 2012, 8, 8.1 64- bit only Hyper-V in R2 uses RDP (supports copy/paste, audio redirection) Online VHDx resize / shrink
  • 51. NIC Teaming: Teaming Switch Independent Static Teaming (Dependent) LACP (Dependent) Load Balancing Address Hash Hyper-V Port Dynamic
  • 52. Local Storage Disk Types, Basic & Dynamic Choosing Storage Type Depends on: • Amount of Storage needed • Number of Users (at the same time) • Data Sensitivity • Data Importance
  • 53. RAID Types: Simple Spanned Striped (RAID 0) Mirrored (RAID 1) Striped Set with Parity (RAID 5)
  • 54. File Systems (Must know, not directly required) File. Allocation Table FAT/FAT32/exFAT • No Security New TechFile System NTFS • Secured using Permissions • Encryption & Compression • Quotas • Auditing, File Tagging, Larger Files
  • 55. Resilient File System ReFS • File can have 16 Exabyte size • File Name Length is up to 32000 char. • High Resiliency • Backward Compatible • No Disk Quotas
  • 56. Creating VHD & VHDx through Disk Management Adding files to VHD & VHDx through Disk Management
  • 57. Storage Spaces in 2012 What is SAN? • Administration? Cost Wise? What about NAS? Virtual Disks (Not VHDs!) Storage Pools
  • 58. Virtual Disk Configuration Layout • Simple, Two or Three way Mirror, Parity Provisioning • Fixed, Thin Allocation • Data Store, Manual, Hot Spare
  • 59. Storage Spaces Using Enclosures • Approved JBOD: www.windowsservercatalog.com • 2U/4U Rack mounted, up to 70 Drives • Smart, can send not. to Windows about temp., storage status) • Redundant fan, Power
  • 60. Storage container not a self RAID Storage Spaces Tiering • Fast SSD for hot or pinned data • Slow HDD for cold data
  • 61. Share & NTFS Share Vs. NTFS permissions Share NTFS Network Only, no control over local access Local and Network access First line of defense Primary tool to control access Options are: Read, change, Full Much more Applies to folders only Applies to files & folders No inheritance Many options available for inheritance
  • 62. Share • Cumulative permissions apply (deny wins) • Can be combined with NTFS perms. • Administrative Share • Access-Based Enumeration NTFS • Change Owner • Inheritance apply order
  • 63. • Permission can be either additive or subtractive (start with all denied then allow, or start with all allow then deny) • Effective access: the result of applying these rules: •Deny overrides allow •Allow permissions are cumulative •Explicit perm takes precedence over inherited • Authorizing occurs to SID for users
  • 64. Offline Files • Applies to network shares • Files stay available when disconnected • High reliable sync. Mechanism • Can be configured using Offline settings or GPO • Needs to be enabled first, then apply on folders
  • 65. Disk Quotas • Limit disk usage • Enabled on volume level • Soft Quota & Hard Quota • File Server Resource Manager FSRM is handy • FSRM can apply quotas on folders, Windows Explorer on volumes only • File Screening, Data Deduplication • Storage Reports Management
  • 66. Volume Shadow Copy • Used in VM snapshots • Used by backup operations (Windows, Acronis) • Used for File Recovery In File Recovery: • Quick restore for accidental deletions • Scheduled • Used on the machine not only shares
  • 67. • VSS is configured under volume properties • VSS is replaced with File History, starting Win. 8 • On servers, enabled under driver properties under disk management • VSS by default creates two copies, at 7:00 AM and 12:00 PM
  • 68. Work Folders • Similar to Offline Files feature • Allows access to joined & non-joined domain workstations • Enables managing BYOD • Transparent conflict resolution • Hub-Spoke topology • Works with file screening, classification (can classify documents), quotas • Security policies for encryption, screen lock (data security if device was stolen)
  • 69. Work Folders Configuration Server Side: • Define appropriate users and groups • Add & configure “work folders” role • DNS (workfolders.domain.com) • Certificates • Proxy Client Side: • Control panel configuration • Access using “work folders”
  • 70. Printers Definitions: • Print Device • Printer • Print Server • Printer Driver Printing workflow: • PC > Printer > Driver > Print server > Print device
  • 71. Network printers & Local printers • Central Management, drivers, easier to install, queue management, less cost Printer Management MMC • Printers Filtering Creating multiple instances (objects) of a printer, if we want to give higher priority for managers
  • 72. Printing Options: • Direct print • Locally attached printer sharing • Network attached printing • Network attached printer sharing Printer Pool: Identical devices ONLY Adding 32-bit driver to a 64-bit server Easy Print
  • 73. Firewall Why Windows Firewall? Firewall Interfaces • Control Panel • Windows Firewall Advanced • NetSH • PowerShell • GPO
  • 74. Hardware Firewall & Software Firewall Firewall Modes: Domain • Work • Home • Public Opening port Vs. Allowing Application Connection security rules
  • 75. Importing & Exporting Rules Configuring Firewall under GPO Computer > Policies > Windows > Security > Windows FW with Advanced Security