kaplan school of information systems and technology welcome to unit 3 it278 network administration...

22
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Unit 3 Welcome to Unit 3 IT278 Network IT278 Network Administration Administration Course Name – IT278 Network Administration Instructor – Jan McDanolds, MS Contact Information: AIM – JMcDanolds Email – [email protected]

Post on 18-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY

Welcome to Unit 3Welcome to Unit 3IT278 Network IT278 Network AdministrationAdministration

Course Name – IT278 Network Administration Instructor – Jan McDanolds, MSContact Information: AIM – JMcDanolds Email – [email protected]

UNIT 2 REVIEW

What we learned in UNIT 21. Preparing for installation2. Understanding NTFS and how the file system can be

updated - Features of NTFS: compression, encryption, etc.

3. Deciding how to manage the User Licensing4. Determining the server function and choosing Server

Core or a full version 5. Identifying Server Roles6. The value of Windows Deployment Services7. Taking care when installing Service Packs in a

production environment.

UNIT 3

Configuring the Windows Server 2008 Environment

Chapter 3 - Objectives

Use Server Manager and ServerManagerCmd.exe to manage a serverInstall and remove server rolesConfigure server hardwareConfigure the operating systemUnderstand and configure the RegistryUse the Security Configuration Wizard (SCW) to harden a server Install and use Windows PowerShell

UNIT 3

Configuring the Windows Server 2008 Environment

Server ManagerConsolidates administrative functions to make a server easier to manage

Roles Summary featureDisplays log information to alert you to warnings or problems

UNIT 3

Server ManagerActivity 3-1: Getting to Know Server Manager

Time Required: Approx 15 minutes

Objective: Learn how to start and use Server Manager

UNIT 3

Using ServerManagerCmd.exeServerManagerCmd.exe

Command-line tool for managing server roles Use to manage features that are to be added or removed

Management activitiesInstall a role or feature, remove a role or featureQuery to determine what roles and features are installedUse the whatif option to determine which features and services will be installed by a specific role, before actually installing that roleRestart the computer after installing or removing a role or featureSpecify particular features or services to install with a roleUse an XML-based answer file to have ServerManagerCmd.exe install or remove server roles

UNIT 3

Configuring Server Hardware DevicesHardware devices can include the following:

Disk drives, disk controllersNetwork adaptersCD/DVD drivesKeyboard, pointing devicesMonitor(s)

Plug and Play (PnP)Automatically detects and configures newly installed hardware devices

For this capability to work, PnP must be:Built into the deviceEnabled in the target computer’s BIOSBuilt into the computer operating system kernel

PnP eliminates hours of time that server administrators and computer users once spent installing and configuring hardware

UNIT 3

Using Control Panel and the Add Hardware Wizard

The Add Hardware Wizard is used for the following tasks:Invoke the operating system to use PnP to detect new hardwareInstall new non-PnP hardware and hardware driversTroubleshoot problems you might be having with existing hardware

The Add Hardware Wizard is started from Control PanelWindows Server 2008 provides two Control Panel view options: Control Panel Home and Classic View

UNIT 3

Control PanelDevice Manager:Used to check for a resource conflict and to examine other properties associated with a device

Can also be used to:Verify if hardware installed is working properlyUpdate device driversDisable a deviceUninstall a deviceConfigure the settings for a device

UNIT 3

Configuring Performance OptionsConfiguring processor scheduling and Data Execution Prevention

Processor schedulingAllows you to configure how processor resources are allocated to programs

Data Execution Prevention (DEP)Monitors how programs use memory to ensure they are not causing memory problems

Activity 3-7: Configuring Processor Scheduling and DEPTime Required: Approximately 10 minutesObjective: Learn where to set up processor scheduling and system memory protection

UNIT 3

Configuring Performance Options (cont.)

Configuring virtual memoryVirtual memory - Disk storage used to expand the capacity of the physical RAM installed in the computerVirtual memory works through a technique called paging

Blocks of information, called pages, are moved from RAM into virtual memory on the hard disk

The area of the disk that is allocated for this purpose is called the paging fileTips for placement of the paging file:

Server performance is better if the paging file is not placed on the boot partitionIf there are multiple disks, performance can be improved by placing a paging file on each disk. In a mirrored set or volume, place the paging file on the main disk - Do not place the paging file on a stripe set, striped volume, stripe set with parity, or RAID-5 volume

Activity 3-8: Configuring the Paging FileTime Required: Approximately 5 minutesObjective: Learn where to configure the paging file

UNIT 3

Understanding the Windows Server 2008 Registry

Windows Server 2008 RegistryA very complex database containing all information the operating system needs about the entire serverThe Registry is the coordinating center for a specific server

Data contained in the Registry include:Information about all hardware componentsInformation about Windows Server 2008 services that are installedData about user profiles and Windows Server 2008 group policiesData on the last current/last known setup used to boot the computerConfiguration information about all software in useSoftware licensing informationServer Manager and Control Panel parameter configurations

The Registry Editor is launched from the Start button Run option as either regedt32 or regedit

UNIT 3

Understanding the Server 2008 RegistryPrecautions when working with the Registry:- Establish a specific group of administrators who have privileges to modify the Registry - Only make changes to the Registry as a last resort- Regularly back up the Registry- Never copy the Registry from one Windows-based system over the Registry of a different system

UNIT 3

Registry ContentsThe Registry is hierarchical in structure

Made up of keys, subkeys, and entriesRegistry key

A category or division of information within the RegistryRegistry subkeys

A single key may contain one or more lower-level keysRegistry entry

A data parameter associated with a software or hardware characteristic under a key (or subkey)

UNIT 3

Registry ContentsRegistry entryA data parameter associated with a software or hardware characteristic under a key (or subkey)

UNIT 3

Registry Contents

HKEY_LOCAL_ MACHINE root keyContains information on every hardware component in the serverIncluding information about what drivers are loaded and their version levels, what IRQ lines are used, setup configurations, the BIOS version, and more

A few subkeys are stored as a set, called hives, because they hold related information

UNIT 3

Registry ContentsHKEY_LOCAL_ MACHINE root key

HKEY_CURRENT_USER key

Contains information about the desktop setup for the account presently logged on to the server console

HKEY_USERS keyContains profile settings for all users who have logged onto the server

UNIT 3

Registry ContentsRegistry entryA data parameter associated with a software or hardware characteristic under a key (or subkey)

UNIT 3

Using the Security Configuration WizardSecurity Configuration Wizard (SCW) – used to harden the server

Steps you through analyzing and configuring security settings on a server

SCW examines the roles a server plays and adjusts security to match rolesThrough the SCW, you can:

Disable unnecessary services and softwareClose network communication ports and other communication resources that aren’t in useExamine shared files and folders to help manage network access through access protocolsConfigure firewall rules

SCW has three components: GUI interactive wizard, database and Command-line tool called scwcmd

The Security Configuration Database (SCD) is a group of XML files that establish a security policy

UNIT 3

Using the Security Configuration Wizard

UNIT 3

Windows PowerShellWindows PowerShell is a command-line interface or shellA shell is a customized environment for executing commands and scripts. A script is a file of commands that is run when you run the script. cmdlets are specialized commands for completing common tasks in PowerShellTasks you can complete using Windows PowerShell:

Manage files and foldersManage network tasksManage fixed and removable storageConfigure printing servicesManage software applications and updatesManage Terminal ServicesManage server services and featuresManage Web server servicesWork with the Registry

UNIT 3

Assignments for UNIT 3Read Chapter 3

Post to the Discussion

Complete the Unit 3 Project

In this assignment you will use server manager to configure all device hardware (drives and ports) on your Windows 2008 server.1. Use server manager to configure/verify existing hardware is working properly. (take screenshot)2. Use server manager to configure/verify page file has been created and the state of DEP (take screenshot)3. Use server manager to install DNS role (graphical method) then (take screenshot)4. Use servermanagercmd.exe to install print server (take screenshot)

3. No spelling or grammar errors4. Title and reference page