Planning windows server® 2008 deployment
Upcoming SlideShare
Loading in...5

Planning windows server® 2008 deployment







Total Views
Slideshare-icon Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.


11 of 1

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • really good
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • Presentation: 60 minutes Lab: 60  minutes NOTES: This module is very theoretical. Preparation for Demos To prepare for demos in this module, you should launch the virtual machine 6430B-SEA-DC1 . Preparation for Labs The lab at the end of this module is paper based and requires no virtual machines in order to complete it. NOTE: If you are using student computers with 2 GB RAM, you should boot up the virtual machines used in this lab at the start of the module, or at the start of the last lesson, as boot times may be significant and slow the class down. Also, you should inform students that the virtual machine file names in the Lab launcher and in the documentation will contain the prefix “ 6430B-…”. This is to differentiate between similar named virtual machines in different courses on the same computer. However the actual computer names do not have this prefix, i.e. they will be called SEA-DC1 etc as such they will see both terms use din the documentation depending on what the task being done. The documentation uses the correct term at the correct time and there will be no issues but this is just informational for students in case there are questions around this during the course.
  • Some students may have little experience with change management. Be sure that they understand the benefits of a formal change management process and don’t just view it as a paperwork burden. Use the following answers to guide the discussion. Question : What is change? Answer: Change is any deliberate modification, introduction, or elimination of an information technology component that may impact an information technology service level or affect the environment’s ability to function. Question : How does your organization address change management? Answer: Answers will vary. Some student organizations will have a formal change management process. These are typically larger organizations. Students from smaller organizations may not have a formal process. Question : Are there some situations in which change management is more important than others? Answer : Change management is important for all changes, to prevent unintended consequences. However, for those changes that are likely to impact many users or high-profile users, change management is even more critical. Changes to mission-critical software, such as a messaging system, also tend to be more critical than changes to non-critical software, such as for a backup server. Question : What are the benefits of a formal change management process? Answer : The following are the benefits of a formal change management process: Other organizational stakeholders are aware of changes and can gauge the impact on their systems and staff. Multiple changes are coordinated to ensure that they do not conflict. Formalizing the change process ensures that it is consistent so that mistakes are not made. Change management provides additional review of changes and allows time for additional planning, if required. Changes without a formal review are often poorly thought out. Not every alternative is considered. For an IT professional, using the change management process can serve to deflect blame in situations in which there are problems during a change. Recovering from change problems can be simplified because a formal back-out plan can be included as part of the change management process. Question : Are there situations in which the normal change process cannot be followed? Answer : Yes, there are emergency situations in which services are broken and the full change management process cannot be followed. However, there should be an emergency change process in place to handle those situations. For example, if a critical service is down, it is not realistic for a detailed technical plan for troubleshooting and repair to be documented and approved. The first priority is repairing the failed service. However, the changes made when repairing the service should be documented and evaluated afterwards to ensure there will be no negative effects on other services.
  • When mentioning that change management should be a consistent process, stress that the details of the process are not the important part. The important part is that everyone knows what is going on to avoid unexpected results from changes. For example, there should be designated people for each department who are always informed of upcoming changes. It does not matter whether these people are VPs, department heads, managers, or staff, as long as they understand their role. Ensure that students understand that change management must be mandatory for everyone in the organization, or eventually it will not be used by anyone. For example, first the high-level server support staff start skipping the change management procedures, and then other, lower-level staff start following that example. Question for students : Do you like using change management procedures? Question for students : Do you see value in using change management procedures in your organization?
  • Discuss the basics of ITIL as the most common way IT services are managed today. Most organizations are using ITIL principles in some way. For this course, the details of ITIL are not important. ITIL is provided as an example of a formal methodology used to manage information systems. Check with the local training center to see if they provide ITIL training. If so, direct the students to resources available at the local training center for more information. Question for students : Does your organization use ITIL?
  • Describe the content of each of the five core books of ITIL and why these books are important to running a successful IT organization. When any one of these elements is missing, there is a lack of customer focus in the IT department. Mention that there are additional books with more detailed topics related to the five core books. These core books are listed because they describe generic tasks that are an important part of any formal IT management process. If any students in your class have ITIL training, consider getting them to explain a little bit more about these books and how they are implementing ITIL in their organization. Formalization of processes is a big part of ITIL.
  • Present MOF as an enhancement of ITIL that incorporates the experience of Microsoft operations groups, partners, and customers. Detailed MOF information is also freely available from Microsoft. ITIL information is expensive to obtain. As you explain MOF, draw parallels between MOF quadrants and the five core ITIL books, to show how they are related. For this course, the details of MOF are not important. MOF is provided as an example of a formal methodology used to manage information systems. Question for students : Would you be more likely to use ITIL or MOF?
  • When you describe this topic, do it in the context of a relevant technical topic--for example, a server migration. Initiation. Determine scope of migrating a server from Windows Server 2003 to Windows Server 2008 Planning . Evaluate need for new physical server, Windows 2008 licensing, person to perform the installation; schedule tasks to avoid user impact Executing . Perform tasks Monitoring and controlling. Ensure that resources are available, ensure that all tasks are completed on time Closing. Verify that all services migrated correctly, document processes, discuss any unexpected issues and their resolution You can mention to students that the core principles of project management are consistent regardless of the type of project being performed. In fact, project management methodology was not created specifically for IT projects. It is also relevant for industries such as construction.
  • Many organizations do not have formal SLAs internally. Many students will view this as a good thing, thinking that they are then not accountable. Explain to them that an informal SLA exists even if they have never agreed to it, and the terms may not be reasonable. Students are better off knowing what terms they are being held to. You can mention to students that the penalties provided in the SLAs of many service providers are limited to a refund for the time period when a service outage was experienced. For example, a provider of a T1 line would provide a refund equal to 1/30 of the monthly fee if the line is unavailable for one day. Question for students : Does your organization have SLAs in place for some services?
  • Explain that these tools are freely downloadable from the Microsoft TechNet Web site. Using guidance provided by Microsoft means that students can learn from the experience of others, which reduces the mistakes they will make in their own implementations. This slide includes the solution accelerators that are likely to be relevant for implementing Windows Server 2008. Other solution accelerators are available on the Microsoft Web site. Question for students : Have you ever used Microsoft Solution Accelerators before? When?
  • One of the primary differences between 32-bit editions of Windows Server 2003 was the amount of memory supported. With a 64-bit version of Windows Server 2008, this is not as relevant. The main differences between the editions are now the features and server roles that are supported. Make sure to note relevant differences between the editions. Question for students : Which edition of Windows Server 2008 do you use in your organization? Why? For more detailed information about the various editions of Windows Server 2008, see the Overview of Edition page on the Microsoft Web site at
  • Discuss the benefits and drawbacks of each way of obtaining a server license. Retail is seldom used because it is most expensive. OEM ties the license to a specific physical server. Some type of volume license is used in most cases. This licensing information was valid at the time of writing, but is subject to change. Questions for students: What type of licensing does your organization use? How does your organization track license usage?
  • Many students who are technically proficient are not knowledgeable about licensing. Be sure that they understand when Windows Server 2008 CALs are required. In addition to the points listed on the slide, discuss the situations in which a CAL is not required. To help students understand when to use each type of CAL, be sure to give an example of when each is best used. For example, a small office with two file servers and a print server will want per-seat licensing, because a single CAL allows access to all three servers.
  • Determine whether you students are familiar with virtualization before starting this topic. If they are not, provide a brief overview of server virtualization so that they can understand what role Hyper-V plays in network infrastructure. You can also name products that are competitive with Hyper-V, to provide context. Explain to students that the virtual image licenses apply when virtualization platforms other than Hyper-V are used. Also, the number of virtual machines on a Hyper-V host running Windows Server 2008 Datacenter will still be limited by the physical resources of that server, such as memory and disk I/O. Question for students : Do you use Hyper-V for virtualization in your environment? 
  • Begin this topic with a brief overview of what activation is. This may lead to students going off topic and complaining about activation being an annoyance. Explain to students that activation is just a fact of life and is typically a minor inconvenience. Mention that unlicensed systems continue to function, so if you make a mistake and do not activate a system, users will not lose data and will still be able to work. Discuss the methods for activating: phone, Internet, and KMS. Activation by phone is a slow process. So most activation is done over the Internet or by using a KMS. Question for students : Does your organization use KMS ?  
  • Explain to students that there are no clearly defined rules for combining server roles on a single server. There is too much variability in scenarios. For example, an organization with only 50 users can have a single server performing all roles, including e-mail server. An organization with thousands of users will have servers dedicated as domain controllers. Question for students : What server roles are commonly combined in your organization?   
  • Explain to students that MAP is a tool that can perform analysis for many different scenarios, including Windows Server 2008 deployment. The scenarios potentially relevant to Windows Server 2008 are listed on the slide. Others are on the companion CD. Question for students : How will you use MAP when deploying Windows Server 2008 ?
  • Explain to students that an upgrade to Windows Server 2008 uses a different process than previous versions of Windows. A parallel installation is performed, and then settings are migrated to the new installation. This has ramifications for unrecognized applications. Mention the downtime required to perform an upgrade and the fact that you cannot test it ahead of time, which makes it relatively high risk. Discuss why these considerations are important.
  • Stress to students that a clean installation and migration are the recommended way to deploy Windows Server 2008. One of the primary benefits is the ability to implement the new server in parallel with the old for testing. In some organizations, older servers have been running so long that the original staff members who installed the applications are no longer there. In such a case, a migration may be difficult, because no one remembers how the applications work. However, a vendor can be contacted for help with the migration. In the case of custom-built applications, internal or by vendor, there may be no one available who truly understands how the applications work and how they can be moved to a new server. Question for students : Do you prefer to do server upgrades or migrations? Why?   
  • BitLocker is a new feature in Windows Server 2008 that many students think of as relevant mostly for laptops. Discuss why it is a benefit on servers: The operating system is protected from rootkits. Data is protected on stolen servers. It provides a measure of data protection for disposal of old hard drives. Question for students : Do you see a need for BitLocker in your organization?   
  • Stress to students that a 64-bit version of Windows Server 2008 requires 64-bit drivers. Most recent servers use 64-bit processors, but 64-bit drivers may not be available for all hardware components. Provide examples of drivers that may be impacted, such as network, video, and storage drivers. Question for students : Is your organization implementing 64-bit operating systems?
  • Stress to students that the vendor of an application should be contacted to verify compatibility with Windows Server 2008 before an upgrade or migration is performed. To obtain support for Windows Server 2008, you may need to upgrade to the latest version of the application or apply the most recent updates. The lack of support for 16-bit applications on a 64-bit version of Windows Server 2008 will only be a concern for legacy applications. You should also note that this is relevant only for server-side applications. If client software is 16-bit, it can communicate with a server application running on Windows Server 2008. Questions for students How does your organization verify that an application is suitable for a new operating system? How do you ensure that applications developed in house will work with a new operating system?
  • In general, automated deployment only makes sense in larger organizations with many servers. Because you are deploying many servers, the time investment in developing the process is justified. Question for students: Do you automate any server deployments in your organization?
  • Make sure that students understand the concept of an answer file to automate system installation before discussing WSIM. The answer file provides any required information during installation rather than prompting at the console. Before discussing ImageX, make sure that students understand the concept of generalizing an operating system by running sysprep. If necessary, explain to students how generalizing an operating system forces SID numbers to be regenerated so that they are unique between computers in the domain. The answer files created by WSIM can be used to automate the configuration process of a generalized operating system image. Question for students: Does your organization use WAIK to automate deployments?   
  • As you perform this demonstration, be sure to explain the configuration passes that are described in the student book. On SEA-DC1, log on as Administrator with a password of Pa$$w0rd . Click Start , point to All Programs , click Microsoft Windows AIK , and then click Windows System Image Manager . In the Windows System Image Manager window, right-click Select a Windows image or catalog file , and then click Select Windows Image . In the Select a Windows Image window, in the Files of type box, select Catalog files . Browse to the D:\\Labfiles\\Mod01 folder, click INSTALL_WINDOWS LONGHORN SERVERENTERPRISE.CLG , and then click Open . These catalog files are included on the Windows Server 2008 installation media. You can also create a catalog from a WIM file. In the Answer File area, right-click Create or open an answer file , and then click New Answer File . The seven components listed correspond with passes during Windows setup. Settings must be added to the correct pass to be effective. For example, you can partition a disk only during the windowsPE pass. In the Windows Image area, expand Components , expand x86_Microsoft-Windows-Setup , expand DiskConfiguration , right-click Disk , and click Add Setting to Pass 1 windowPE . Notice that these settings now appear in the answer file. In the Disk Properties area, in the DiskID box, type 0 . This specifies that actions will be performed on the first disk on the primary IDE channel. In the WillWipeDisk box, select true . This specifies that all existing partitions will be erased from the disk. In the Answer File area, Expand Disk[DiskID=”0”] , right-click Create Partitions , and click Insert New CreatePartition . <>
  • In the CreatePartition Properties area, in the Order box, type 1 . This specifies the order of operations for creating partitions. In the Size box, type 40960 . This setting is in megabytes (MB). In the Type box, select Primary . In the Windows Image area, right-click x86_Microsoft-Windows-Shell-Setup , and then click Add Setting to Pass 4 specialize . In the Microsoft-Windows-Shell-Setup Properties area, in the ProductKey box, type 12345-12345-12345-12345-12345 . In the ComputerName box, type * . This generates a randomized computer name that can be changed after installation. Click the File menu, and then click Save Answer File . In the Save As window, in the File name box, type unattend.xml , and then click Save . Close Windows System Image Manager.
  • Before discussing the considerations for using WDS, ensure that students understand what it is and how it works. Images are stored on a WDS server in a format similar to that created by ImageX. The client boots and uses PXE to connect to the WDS server. The WDS server provides a boot image with Windows PE to the client. windowsPE starts on the client, and the image is placed on the local hard drive of the client. After imaging is complete, the client restarts the operating system is specialized by redetecting drivers and randomly generating a computer name. WDS is primarily used as a method for deploying desktop operating systems. However, it can also be used to deploy servers and provides Question for students : Does your organization use WDS to deploy images?   
  • The Microsoft Deployment Toolkit provides additional tools and guidance for automating the deployment of Windows Server 2008. If SCCM 2007 or SMS 2003 is used, the deployment can be completely automated. Otherwise, a Lite Touch Installation can be used to minimize manual intervention. Mention to students that this is one of the solution accelerators mentioned earlier.
  • As Mentioned earlier, this lab is paper based and no virtual machines are required.

Planning windows server® 2008 deployment Planning windows server® 2008 deployment Presentation Transcript

  • Module 1 Planning Windows Server ® 2008 Deployment
  • Module Overview
    • Overview of Change Management
    • Planning a Single-Server Installation
    • Performing a Single-Server Installation
    • Automating Windows Server 2008 Deployment
  • Lesson 1: Overview of Change Management
    • Discussion: What Is Change Management?
    • Considerations for Managing Change
    • What Is ITIL?
    • What Are ITIL Books?
    • What Is MOF?
    • What Is Project Management?
    • What Are Service-Level Agreements?
    • What Are Microsoft Solution Accelerators?
  • Discussion: What Is Change Management?
    • What is change?
    • How does your organization address change management?
    • Are there some situations in which change management is more important than others?
    • What are the benefits of change management?
    • Are there situations in which the normal change process cannot be followed?
  • Considerations for Managing Change Change management should:
    • Use a consistent process
    • Be supported by the organization
    • Not be optional
    Máy bộ đàm cầm tay | May bo dam cam tay
  • What Is ITIL? ITIL is the de facto standard for IT service management. Characteristics of ITIL:
    • Is process oriented
    • Strives for continual improvement
    • Focuses on customers
    • Includes best practices for IT management
    • Is technology independent
    • Provides high-level guidance
  • What Are ITIL Books? ITIL has five core books:
    • Service Strategy – What services to offer
    • Service Design – How to offer services
    • Service Transition – Implementing services
    • Service Operation – Using and maintaining services
    • Continual Service Improvement – Creating additional value
  • What Is MOF? MOF describes a life cycle that can be applied to systems of any size. The quadrants of MOF are:
    • Changing
    • Operating
    • Supporting
    • Optimizing
  • What Is Project Management? A set of techniques used to achieve a desired result on time, within budget, and according to specification
    • Initiation (scoping)
    • Planning and design
    • Executing
    • Monitoring and controlling
    • Closing
  • What Are Service-Level Agreements?
    • An SLA:
    • Is an agreement that defines service expectations
    • Includes a regular time for maintenance
    Types of SLAs
    • Internal
    • External
    • Informal
  • What Are Microsoft Solution Accelerators? Microsoft Solution Accelerators are free tools and guidance on how to implement Microsoft technologies. They include:
    • Microsoft Assessment and Planning Toolkit
    • Infrastructure Planning and Design Guides for Windows Server
    • Microsoft Deployment Toolkit
    • Windows Server 2008 Security Compliance Management Toolkit
    • Hyper-V™ Security Guide
  • Lesson 2: Planning a Single-Server Installation
    • Windows Server 2008 Editions
    • Ways to Obtain Licenses
    • Considerations for Client Access Licenses
    • Considerations for Virtualization
    • Considerations for Server Activation
    • Considerations for Consolidating Server Roles
    • What Is the Microsoft Assessment and Planning Toolkit?
  • Windows Server 2008 Editions Windows Server 2008 Editions
    • Windows Web Server 2008
    • Windows Server 2008 Foundation
    • Windows Server 2008 Standard
    • Windows Server 2008 Enterprise
    • Windows Server 2008 Datacenter
  • Ways to Obtain Licenses Note: Downgrade rights are included in all cases. You can obtain server licenses via:
    • Retail: These licenses are purchase from an online or physical retailer
    • OEM: These licenses are purchased with new hardware
    • Volume license: Microsoft has a variety of volume license programs for purchasing multiple copies of Microsoft software
  • Considerations for Client Access Licenses You should consider the following points:
    • All users or devices accessing Windows Server 2008 require a Windows Server 2008 CAL
    • Choose per-server or per-seat licensing
    • Chose user or device CALs
    • Be aware of other types of CALs:
      • Terminal Services CALs
      • Rights Management Services CALs
      • External Connector licenses
  • Considerations for Virtualization
    • You should consider the following points:
    • Hyper-V is part of Standard, Enterprise, and Datacenter editions
    • Windows Server 2008 CALs are required to access virtual machines running on a Hyper-V host
    Edition Virtual Image Licenses Standard 1 Enterprise 4 Datacenter Unlimited
  • Considerations for Server Activation You should consider the following points:
    • Activation prevents a product key from being used on an unauthorized computer
    • An unactivated computer becomes unlicensed after 60 days
    • Hardware changes may force reactivation within three days
    • A Key Management Service (KMS) can be used to proxy activation for servers without Internet access
    • A multiple activation key can be used more than one time but is still limited
  • Considerations for Consolidating Server Roles You should:
    • Avoid resource bottlenecks when combining server roles
    • Avoid combining server roles with different security requirements
    • Avoid combining server roles that experience peak usage at the same time
    • Consider combining domain controllers and DNS servers to take advantage of Active Directory – enabled zones
    • Consider giving each application a separate server to simplify server maintenance
    • Monitor performance to ensure that server role combinations will not cause a problem
  • What Is the Microsoft Assessment and Planning Toolkit? A solution accelerator that is free for download MAP scenarios for Windows Server 2008 deployment
    • Windows Server 2008 Hardware Assessment
    • Security Assessment
    • Performance Monitoring
    • Server Consolidation and Virtualization
  • Lesson 3: Performing a Single-Server Installation
    • Considerations for Performing Server Upgrades
    • Considerations for Migrating to Windows Server 2008
    • Considerations for Implementing BitLocker ®
    • Considerations for Device Drivers
    • Considerations for Application Compatibility
  • Considerations for Performing Server Upgrades You should consider that:
    • Only recognized settings are migrated
    • Upgrades are possible only for Windows Server 2003 SP1 or later and Windows Server 2003 R2
    • Itanium and Web editions cannot be upgraded
    • Upgrades must be to the same or an upgraded edition
    • The processor architecture must remain the same
    • The language must remain the same
    • You cannot upgrade to server core
  • Considerations for Migrating to Windows Server 2008 Considerations:
    • Microsoft recommends a clean installation whenever possible
    • The source server can be maintained for rollback
    • There are no limitations on:
      • The source operating system
      • The processor architecture
      • The language
    • Applications must be reinstalled
    • Clients must be redirected to the new server
  • Considerations for Implementing BitLocker Bitlocker provides:
    • Strong protection for data
    • Protection for the operating system
    Bitlocker requires:
    • Separate boot and system volumes
    • A Trusted Platform Module (TPM) version 1.2
    Sàn gỗ công nghiệp | Sàn gỗ giá rẻ | San go cong nghiep | Cân ô tô 6 đến 15 tấn | Phần mềm điều khiển trạm trộn bê tông
  • Considerations for Device Drivers Considerations:
    • Most 32-bit drivers that work with Windows Server 2003 will also work with Windows Server 2008
    • You must use 64-bit drivers for a 64-bit operating system
    • By default, unsigned 64-bit drivers will not load
    Túi vải | Tui vai | Túi vải không dệt | Tui vai khong det | Túi môi trường | Tui moi truong | Túi tự hủy | Tui tu huy
  • Considerations for Application Compatibility Considerations
    • Contact the vendor to ensure that applications are supported on Windows Server 2008
    • Remember that the User Account Control (UAC) feature may prevent some applications from running on Windows Server 2008
    • Directory junctions may prevent some applications from running on Windows Server 2008
    • The application compatibility check during an upgrade is limited
    • A 16-bit application cannot run a 64-bit version of Windows Server 2008
  • Lesson 4: Automating Windows Server 2008 Deployment
    • Considerations for Automated Deployment
    • What Is WAIK?
    • Demonstration: Creating an Answer File
    • Considerations for Using Windows Deployment Services (WDS)
    • What Is the Microsoft Deployment Toolkit?
  • Considerations for Automated Deployment You should consider that automated deployment:
    • Limits user input during installation
    • Creates a consistent configuration
    • Makes deployment faster
    • May make customization more difficult
    • Requires a long lead time for testing
  • What Is WAIK? The main WAIK tools are:
    • Windows System Image Manager (WSIM)
    • ImageX
    • WAIK documentation, which includes:
      • Windows Setup Technical Reference
      • Windows System Image Manager Technical Reference
      • ImageX Technical Reference
      • Sysprep Technical Reference
  • Demonstration: Creating an Answer File
    • In this demonstration, you see how to:
    • Create an answer file
  • Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
  • Considerations for Using Windows Deployment Services (WDS) Considerations:
    • WDS provides centralized management of installation
    • Pre-Boot Execution Environment (PXE) is used to start the installation process
    • WDS can use multicasts to minimize network traffic
    • The WindowsPE boot image must support the network adapter in your server
  • What Is the Microsoft Deployment Toolkit? Tools and guidance for deploying Microsoft operating systems, including Windows Server 2008
    • Deployment approaches:
    • Zero Touch Installation for System Center Configuration Manager (SCCM) 2007
    • Zero Touch Installation for Systems Management Server (SMS) 2003
    • Lite Touch Installation
  • Lab: Planning a Windows Server 2008 Deployment
    • Exercise 1: Creating a Planning Flowchart for a Windows Server 2008 Deployment
    • Exercise 2: Planning a Windows Server 2008 Deployment
    Estimated time: 60 minutes Trạm trộn bê tông tự động 60m3/h | Trạm trộn bê tông tự động 90m3/h | Trạm trộn bê tông tự động 120m3/h
  • Lab Scenario
    • A. Datum Corporation has a single head office with a single datacenter that hosts all servers. The servers in the datacenter are running a mix of Windows 2000 Server, Windows Server 2003, and Windows Server 2003 R2. The organization has entered into a new volume licensing agreement with Microsoft that allows all servers to be updated to Windows Server 2008.
    • You have been tasked with creating a flowchart to help the IT staff in A. Datum Corporation decide how to upgrade or migrate individual servers to Windows Server 2008. This flowchart needs to help determine how the process is accomplished and which edition of Windows Server 2008 will be used.
    • Several servers in the A. Datum Corporation datacenter have been identified as the first candidates for migration to Windows Server 2008. For each of these servers, you must determine the process to be used .
  • Module Review and Takeaways
    • Review Questions
    Máy pha cafe | Máy pha cafe ngon nhất | Máy pha cafe tốt nhất | Máy pha cafe nhiều người dùng nhất