This document provides copyright and publishing information for a book about configuring Windows Server 2008. It includes the copyright date of 2009, lists Microsoft Corporation as the publisher and various divisions and imprints involved in publishing and distributing the book, and provides contact information. It also includes a dedication and acknowledgment section.
This document discusses Fujitsu's cloud platform and how it enables a flexible and efficient cloud foundation using NetApp storage solutions. It provides an overview of Fujitsu's Infrastructure as a Service (IaaS) cloud which allows users to deploy virtual systems using templates from a library. The document also summarizes NetApp's unified storage architecture and how their solutions provide flexible deployment of multiprotocol storage for SAN and NAS environments. Finally, it discusses how NetApp can help organizations transition workloads to private and public clouds through their integrated management capabilities and hybrid cloud solutions.
This document provides an introduction and overview of installing and configuring Apache Cassandra 1.1. It discusses new features in Cassandra 1.1, the Cassandra architecture including data partitioning, replication, client requests, and Hadoop integration. It also provides guidance on planning a Cassandra deployment including hardware selection, disk usage calculations, and configuration options. Finally it covers initializing a single or multi-datacenter Cassandra cluster, generating token assignments, and understanding the Cassandra data model.
Presentation sun storage tek™ 2500 series arrays updatexKinAnx
The document provides an update on the Sun StorageTek 2500 Series Arrays. It summarizes that the ST2500 was heavily quoted in its first quarter and booked over 700 units. It then outlines the ST2500 product lineup, including the ST2540, ST2530 and upcoming ST2510 models. Key highlights are mentioned such as 512MB cache, SAS and SATA drive support. The document recommends focusing on strengths like being the only true redundant RAID array in its class and having one-third greater rack density than competitors.
This document provides guidance on installing and configuring Oracle Database 10g and related components on Linux for IBM zSeries systems. It discusses best practices for system sizing and resource allocation. Chapters cover installing a single instance Oracle database, using the Automatic Storage Management feature, and deploying the Cluster Ready Services and Real Application Clusters technologies.
The IBM® System x® Private Cloud Offering provides solutions that are part of the Microsoft Fast Track for Hyper-V program. This program has requirements for systems management, virtualized management, and fault tolerance through the use of the System Center management platform, clustering, and redundancy in the network and storage...
This document provides an overview of networking concepts in VMware ESX and describes how to view networking information and configure basic networking. It discusses network services, virtual switches, port groups, VLANs, and networking for virtual machines and VMkernel services. It also covers advanced networking topics like IPv6, jumbo frames, and network performance.
This document discusses various Windows configuration settings and policies for customizing the Windows experience, including applying thin window borders, disabling the lock screen, disabling new app notifications, disabling the charms bar and app switcher, setting the desktop as the default start page, enabling kiosk or assigned access mode, and configuring the start screen layout, group policy caching, and logon script delay. It also references reading list, Refs, integrated search, and slide to shutdown features in Windows.
This document discusses Fujitsu's cloud platform and how it enables a flexible and efficient cloud foundation using NetApp storage solutions. It provides an overview of Fujitsu's Infrastructure as a Service (IaaS) cloud which allows users to deploy virtual systems using templates from a library. The document also summarizes NetApp's unified storage architecture and how their solutions provide flexible deployment of multiprotocol storage for SAN and NAS environments. Finally, it discusses how NetApp can help organizations transition workloads to private and public clouds through their integrated management capabilities and hybrid cloud solutions.
This document provides an introduction and overview of installing and configuring Apache Cassandra 1.1. It discusses new features in Cassandra 1.1, the Cassandra architecture including data partitioning, replication, client requests, and Hadoop integration. It also provides guidance on planning a Cassandra deployment including hardware selection, disk usage calculations, and configuration options. Finally it covers initializing a single or multi-datacenter Cassandra cluster, generating token assignments, and understanding the Cassandra data model.
Presentation sun storage tek™ 2500 series arrays updatexKinAnx
The document provides an update on the Sun StorageTek 2500 Series Arrays. It summarizes that the ST2500 was heavily quoted in its first quarter and booked over 700 units. It then outlines the ST2500 product lineup, including the ST2540, ST2530 and upcoming ST2510 models. Key highlights are mentioned such as 512MB cache, SAS and SATA drive support. The document recommends focusing on strengths like being the only true redundant RAID array in its class and having one-third greater rack density than competitors.
This document provides guidance on installing and configuring Oracle Database 10g and related components on Linux for IBM zSeries systems. It discusses best practices for system sizing and resource allocation. Chapters cover installing a single instance Oracle database, using the Automatic Storage Management feature, and deploying the Cluster Ready Services and Real Application Clusters technologies.
The IBM® System x® Private Cloud Offering provides solutions that are part of the Microsoft Fast Track for Hyper-V program. This program has requirements for systems management, virtualized management, and fault tolerance through the use of the System Center management platform, clustering, and redundancy in the network and storage...
This document provides an overview of networking concepts in VMware ESX and describes how to view networking information and configure basic networking. It discusses network services, virtual switches, port groups, VLANs, and networking for virtual machines and VMkernel services. It also covers advanced networking topics like IPv6, jumbo frames, and network performance.
This document discusses various Windows configuration settings and policies for customizing the Windows experience, including applying thin window borders, disabling the lock screen, disabling new app notifications, disabling the charms bar and app switcher, setting the desktop as the default start page, enabling kiosk or assigned access mode, and configuring the start screen layout, group policy caching, and logon script delay. It also references reading list, Refs, integrated search, and slide to shutdown features in Windows.
This document provides guidance for deploying NComputing L-series and vSpace software on virtual machines hosted on a VMware ESXi hypervisor. It discusses considerations for sizing the host server's processor, memory, storage, and network to support a given number of virtual desktop users. The document provides optimization tips for implementing virtual machines in ESXi and windows virtual machines. It aims to help users deploy NComputing solutions with server virtualization infrastructure in a scalable and manageable way.
Software Defined Everything infrastructure that virtualizes compute, network, and storage resources and delivers it as a service. Rather than by the hardware components of the infrastructure, the management and control of the compute, network, and storage infrastructure are automated by intelligent software that is running on the Lenovo x86 platform.
This document provides guidance on setting up a high availability SAP NetWeaver environment using SUSE Linux Enterprise Server and the SUSE Linux Enterprise High Availability Extension. It includes installing SAP NetWeaver with the Enqueue Replication Server and integrating the sap_suse_cluster_connector to provide application-level redundancy. The described configuration has passed all SAP certification tests for high availability.
Tivoli Personalized Services Manager 1.1 supports pervasive devices, creates personalized service environments, and provides self care. It introduces new features including web hosting, a portal toolkit, Radius support, DB2 database support, localization, an improved device manager, and integration with IBM's WebSphere Everyplace suite. The document provides an overview of Tivoli Personalized Services Manager and its features for subscriber authentication, access control, customer care, personalized services, integration with third party tools, and support for emerging Internet business models.
VxWorks - Holistic Security (Art of Testing)Aditya K Sood
The document discusses security issues related to the VxWorks operating system and firmware. It provides an overview of the VxWorks architecture and fault management system. It then analyzes vulnerabilities in the VxWorks OS security model, network stack, debugging interface, and firmware configuration. Finally, it discusses threats facing embedded devices like weak security practices.
This document provides instructions for installing and configuring Perceptive Nolij Web, a document management system. It discusses prerequisites like installing Java and Tomcat, downloading Nolij Web, obtaining a license, and configuring settings. The document also covers authentication methods, upgrading to newer versions, and rebranding the interface.
This document provides an abstract for Suman Srinivasan's 2015 PhD dissertation from Columbia University titled "Improving Content Delivery and Service Discovery in Networks". The dissertation aims to provide clarity on usage of core networking protocols and multimedia consumption on mobile and wireless networks as well as the network core. It presents research prototypes for potential solutions to problems caused by increased multimedia consumption on the Internet. The dissertation contains four main contributions: 1) Studies measuring data usage and protocols on networks; 2) New software architectures and implementations for service discovery on wireless networks; 3) On-path content delivery networks and a new distributed CDN architecture; 4) Research prototypes for content-centric networking.
This document provides instructions for installing and configuring a two-node Oracle RAC cluster using virtual machines on a single laptop or desktop computer. It details the necessary hardware requirements, including a minimum of 8GB RAM and 40GB free disk space. The software components needed are Windows 7 64-bit as the host operating system, along with VirtualBox for virtualization, Putty and VNC Viewer for remote access, and Oracle Grid Infrastructure and database software. The document provides a step-by-step guide to setting up the virtualized environment, installing Linux on the virtual machines, configuring the Grid Infrastructure and database software, and testing the overall cluster configuration.
This document provides instructions for setting up and configuring IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 in both single-server and clustered environments. It discusses installing and configuring the necessary software components like DB2, WebSphere Application Server, IBM HTTP Server, and the IMS server. It also covers steps for configuration of these components as well as the IMS server for single sign-on functionality. The document is intended as a guide for carrying out an end-to-end installation and configuration of the IBM Tivoli Access Manager single sign-on solution.
This document provides step-by-step instructions for setting up and configuring IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 on both a single Windows server and in a clustered environment. It covers installing and configuring required components like the database, WebSphere Application Server, IBM HTTP Server, and the IMS Server. The document also discusses applying fix packs, configuring the IMS Server, and installing additional components like AccessAgent and AccessStudio.
This user manual provides instructions for using Scrivener 2.1 software. It includes sections on installation and interface overview, project management, outlining and organizing documents, writing and editing tools, compiling drafts into final formats like PDF and HTML, and customizing preferences. The manual contains over 400 pages with detailed explanations and screenshots to help users maximize the power of Scrivener for drafting, organizing, and compiling a variety of creative works and documents.
This document provides a 3-page overview of managing WebSphere Application Server for z/OS using Tivoli products. It introduces the automation blueprint for comprehensive management of WebSphere from performance, availability, and security. The document is organized to describe the WebSphere environment, IBM Tivoli Monitoring for Web Infrastructure for inside-out monitoring, and IBM Tivoli Monitoring for Transaction Performance for outside-in monitoring.
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
This document provides a guide for setting up a LAMP server running phpBB on CentOS 5. It discusses installing and configuring the core LAMP components of CentOS, Apache, MySQL, and PHP. It then covers additional applications like phpMyAdmin, vsftpd, iptables, and DNS. Finally, it addresses installing and configuring phpBB3, including creating forums, templates, and moderators. The guide is intended to help others wishing to set up a similar environment.
This document provides a guide for setting up a LAMP server running phpBB on CentOS 5. It discusses installing and configuring the core LAMP components of CentOS, Apache, MySQL, and PHP. It then covers additional applications like phpMyAdmin, vsftpd, iptables, and DNS. Finally, it addresses installing and configuring phpBB3, including creating forums, templates, and moderators. The guide is intended to help others wishing to set up a similar environment.
This document provides an overview and introduction to installing and migrating to IBM Tivoli Workload Scheduler V8.3. It covers prerequisites, a new installation process using a wizard, upgrading from previous versions, and new features such as an improved infrastructure using WebSphere and DB2/Oracle databases. The document is intended to help users get started with V8.3 and provide best practices for installation and migration.
This document provides an installation and configuration guide for IBM Tivoli Directory Server version 6.3. It contains information about installing the server, clients, language packs, and other components across various platforms like Windows, Linux, AIX, Solaris, and HP-UX. The guide also describes how to create and administer directory server instances, configure databases, tune performance, back up and restore data, and more.
This document provides step-by-step instructions for configuring the Kerio WinRoute Firewall version 6.7 to set up the local network and headquarters configuration for a company. It describes selecting IP addresses for the LAN, configuring the network interfaces for the internet gateway and LAN, installing WinRoute, setting up basic traffic policies, DHCP server, DNS, user accounts and groups, access rules, VPN connectivity between headquarters and branch offices, and more. The configuration guides a realistic network example and addresses all essential aspects for deploying WinRoute in a company network.
This document summarizes key points about installing and managing workstations and client machines on a network. It discusses various methods for installing operating systems, such as locally, using Windows Automated Installation Kit (AIK), or deploying images via the network or servers. Maintaining consistency across workstations is important. The document also outlines the life cycle of a workstation and challenges around configuring systems and addressing entropy over time. Integrating Linux clients is briefly addressed.
In a vSphere 5.0 environment, virtual network switches provide connectivity for virtual machines running on VMware® ESXi™ hosts to communicate with each other as well as connectivity to the external physical infrastructure. Network administrators want more visibility into this traffic that is flowing in the virtual infrastructure. This visibility will help them monitor and troubleshoot network issues. VMware vSphere 5.0 introduces two new features in the Distributed Switch that provide the required monitoring and troubleshooting capability to the virtual infrastructure.
Dell EMC PowerEdge R240 Installation and Service Manualwuyingwei
The document provides an overview and installation instructions for the Dell EMC PowerEdge R240 system. It includes:
- A front and rear view of the system and descriptions of its components.
- Instructions for initial setup, iDRAC configuration, installing operating systems, and downloading firmware.
- Procedures for installing and removing internal components like drives, memory, expansion cards, and power supplies.
- Technical specifications and troubleshooting information.
More Related Content
Similar to 70 648 70-649 transitioning your mcsa mcse to windows server 2008
This document provides guidance for deploying NComputing L-series and vSpace software on virtual machines hosted on a VMware ESXi hypervisor. It discusses considerations for sizing the host server's processor, memory, storage, and network to support a given number of virtual desktop users. The document provides optimization tips for implementing virtual machines in ESXi and windows virtual machines. It aims to help users deploy NComputing solutions with server virtualization infrastructure in a scalable and manageable way.
Software Defined Everything infrastructure that virtualizes compute, network, and storage resources and delivers it as a service. Rather than by the hardware components of the infrastructure, the management and control of the compute, network, and storage infrastructure are automated by intelligent software that is running on the Lenovo x86 platform.
This document provides guidance on setting up a high availability SAP NetWeaver environment using SUSE Linux Enterprise Server and the SUSE Linux Enterprise High Availability Extension. It includes installing SAP NetWeaver with the Enqueue Replication Server and integrating the sap_suse_cluster_connector to provide application-level redundancy. The described configuration has passed all SAP certification tests for high availability.
Tivoli Personalized Services Manager 1.1 supports pervasive devices, creates personalized service environments, and provides self care. It introduces new features including web hosting, a portal toolkit, Radius support, DB2 database support, localization, an improved device manager, and integration with IBM's WebSphere Everyplace suite. The document provides an overview of Tivoli Personalized Services Manager and its features for subscriber authentication, access control, customer care, personalized services, integration with third party tools, and support for emerging Internet business models.
VxWorks - Holistic Security (Art of Testing)Aditya K Sood
The document discusses security issues related to the VxWorks operating system and firmware. It provides an overview of the VxWorks architecture and fault management system. It then analyzes vulnerabilities in the VxWorks OS security model, network stack, debugging interface, and firmware configuration. Finally, it discusses threats facing embedded devices like weak security practices.
This document provides instructions for installing and configuring Perceptive Nolij Web, a document management system. It discusses prerequisites like installing Java and Tomcat, downloading Nolij Web, obtaining a license, and configuring settings. The document also covers authentication methods, upgrading to newer versions, and rebranding the interface.
This document provides an abstract for Suman Srinivasan's 2015 PhD dissertation from Columbia University titled "Improving Content Delivery and Service Discovery in Networks". The dissertation aims to provide clarity on usage of core networking protocols and multimedia consumption on mobile and wireless networks as well as the network core. It presents research prototypes for potential solutions to problems caused by increased multimedia consumption on the Internet. The dissertation contains four main contributions: 1) Studies measuring data usage and protocols on networks; 2) New software architectures and implementations for service discovery on wireless networks; 3) On-path content delivery networks and a new distributed CDN architecture; 4) Research prototypes for content-centric networking.
This document provides instructions for installing and configuring a two-node Oracle RAC cluster using virtual machines on a single laptop or desktop computer. It details the necessary hardware requirements, including a minimum of 8GB RAM and 40GB free disk space. The software components needed are Windows 7 64-bit as the host operating system, along with VirtualBox for virtualization, Putty and VNC Viewer for remote access, and Oracle Grid Infrastructure and database software. The document provides a step-by-step guide to setting up the virtualized environment, installing Linux on the virtual machines, configuring the Grid Infrastructure and database software, and testing the overall cluster configuration.
This document provides instructions for setting up and configuring IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 in both single-server and clustered environments. It discusses installing and configuring the necessary software components like DB2, WebSphere Application Server, IBM HTTP Server, and the IMS server. It also covers steps for configuration of these components as well as the IMS server for single sign-on functionality. The document is intended as a guide for carrying out an end-to-end installation and configuration of the IBM Tivoli Access Manager single sign-on solution.
This document provides step-by-step instructions for setting up and configuring IBM Tivoli Access Manager for Enterprise Single Sign-On 8.1 on both a single Windows server and in a clustered environment. It covers installing and configuring required components like the database, WebSphere Application Server, IBM HTTP Server, and the IMS Server. The document also discusses applying fix packs, configuring the IMS Server, and installing additional components like AccessAgent and AccessStudio.
This user manual provides instructions for using Scrivener 2.1 software. It includes sections on installation and interface overview, project management, outlining and organizing documents, writing and editing tools, compiling drafts into final formats like PDF and HTML, and customizing preferences. The manual contains over 400 pages with detailed explanations and screenshots to help users maximize the power of Scrivener for drafting, organizing, and compiling a variety of creative works and documents.
This document provides a 3-page overview of managing WebSphere Application Server for z/OS using Tivoli products. It introduces the automation blueprint for comprehensive management of WebSphere from performance, availability, and security. The document is organized to describe the WebSphere environment, IBM Tivoli Monitoring for Web Infrastructure for inside-out monitoring, and IBM Tivoli Monitoring for Transaction Performance for outside-in monitoring.
Customers are using NSX to drive business benefits as show in the figure below. The main themes for NSX deployments are Security, IT automation and Application Continuity.
Figure 3: NSX Use Cases
• Security:
NSX can be used to create a secure infrastructure, which can create a zero-trust security model. Every virtualized workload can be protected with a full stateful firewall engine at a very granular level. Security can be based on constructs such as MAC, IP, ports, vCenter objects and tags, active directory groups, etc. Intelligent dynamic security grouping can drive the security posture within the infrastructure.
NSX can be used in conjunction with 3rd party security vendors such as Palo Alto Networks, Checkpoint, Fortinet, or McAffee to provide a complete DMZ like security solution within a cloud infrastructure.
NSX has been deployed widely to secure virtual desktops to secure some of the most vulnerable workloads, which reside in the data center to prohibit desktop-to-desktop hacking.
• Automation:
VMware NSX provides a full RESTful API to consume networking, security and services, which can be used to drive automation within the infrastructure. IT admins can reduce the tasks and cycles required to provision workloads within the datacenter using NSX.
NSX is integrated out of the box with automation tools such as vRealize automation, which can provide customers with a one-click deployment option for an entire application, which includes the compute, storage, network, security and L4-L7 services.
6
Developers can use NSX with the OpenStack platform. NSX provides a neutron plugin that can be used to deploy applications and topologies via OpenStack
• Application Continuity:
NSX provides a way to easily extend networking and security up to eight vCenters either within or across data center In conjunction with vSphere 6.0 customers can easily vMotion a virtual machine across long distances and NSX will ensure that the network is consistent across the sites and ensure that the firewall rules are consistent. This essentially maintains the same view across sites.
NSX Cross vCenter Networking can help build active – active data centers. Customers are using NSX today with VMware Site Recovery Manager to provide disaster recovery solutions. NSX can extend the network across data centers and even to the cloud to enable seamless networking and security.
This document provides a guide for setting up a LAMP server running phpBB on CentOS 5. It discusses installing and configuring the core LAMP components of CentOS, Apache, MySQL, and PHP. It then covers additional applications like phpMyAdmin, vsftpd, iptables, and DNS. Finally, it addresses installing and configuring phpBB3, including creating forums, templates, and moderators. The guide is intended to help others wishing to set up a similar environment.
This document provides a guide for setting up a LAMP server running phpBB on CentOS 5. It discusses installing and configuring the core LAMP components of CentOS, Apache, MySQL, and PHP. It then covers additional applications like phpMyAdmin, vsftpd, iptables, and DNS. Finally, it addresses installing and configuring phpBB3, including creating forums, templates, and moderators. The guide is intended to help others wishing to set up a similar environment.
This document provides an overview and introduction to installing and migrating to IBM Tivoli Workload Scheduler V8.3. It covers prerequisites, a new installation process using a wizard, upgrading from previous versions, and new features such as an improved infrastructure using WebSphere and DB2/Oracle databases. The document is intended to help users get started with V8.3 and provide best practices for installation and migration.
This document provides an installation and configuration guide for IBM Tivoli Directory Server version 6.3. It contains information about installing the server, clients, language packs, and other components across various platforms like Windows, Linux, AIX, Solaris, and HP-UX. The guide also describes how to create and administer directory server instances, configure databases, tune performance, back up and restore data, and more.
This document provides step-by-step instructions for configuring the Kerio WinRoute Firewall version 6.7 to set up the local network and headquarters configuration for a company. It describes selecting IP addresses for the LAN, configuring the network interfaces for the internet gateway and LAN, installing WinRoute, setting up basic traffic policies, DHCP server, DNS, user accounts and groups, access rules, VPN connectivity between headquarters and branch offices, and more. The configuration guides a realistic network example and addresses all essential aspects for deploying WinRoute in a company network.
This document summarizes key points about installing and managing workstations and client machines on a network. It discusses various methods for installing operating systems, such as locally, using Windows Automated Installation Kit (AIK), or deploying images via the network or servers. Maintaining consistency across workstations is important. The document also outlines the life cycle of a workstation and challenges around configuring systems and addressing entropy over time. Integrating Linux clients is briefly addressed.
In a vSphere 5.0 environment, virtual network switches provide connectivity for virtual machines running on VMware® ESXi™ hosts to communicate with each other as well as connectivity to the external physical infrastructure. Network administrators want more visibility into this traffic that is flowing in the virtual infrastructure. This visibility will help them monitor and troubleshoot network issues. VMware vSphere 5.0 introduces two new features in the Distributed Switch that provide the required monitoring and troubleshooting capability to the virtual infrastructure.
Similar to 70 648 70-649 transitioning your mcsa mcse to windows server 2008 (20)
Dell EMC PowerEdge R240 Installation and Service Manualwuyingwei
The document provides an overview and installation instructions for the Dell EMC PowerEdge R240 system. It includes:
- A front and rear view of the system and descriptions of its components.
- Instructions for initial setup, iDRAC configuration, installing operating systems, and downloading firmware.
- Procedures for installing and removing internal components like drives, memory, expansion cards, and power supplies.
- Technical specifications and troubleshooting information.
This document provides a troubleshooting guide for Dell EMC PowerEdge servers. It contains diagnostic indicator codes for various server components, instructions for running diagnostics tools, and troubleshooting guides for common hardware issues. Safety instructions and documentation resources are also referenced. Diagnostic indicators are provided for status LEDs, system health, iDRAC components, NICs, power supplies, hard drives, and other components. Steps are outlined for running hardware diagnostics and debugging mini crash dumps. Troubleshooting guides address issues starting the system, external connections, video, USB, serial I/O, NICs, water damage, expansion cards, processors, storage controllers, cooling, and other components.
This document outlines career paths for IT professionals including:
1. Enterprise Administrator focusing on Windows Server 2008 administration and security certifications.
2. Server Administrator specializing in Windows Server 2008 configuration and support with networking certifications.
3. Systems Engineer obtaining design and networking certifications along with programming coursework.
3. This book is dedicated to my lovely, loving, and long-suffering wife, Anne. I have dedicated
books to her before, but not as many as she deserves.
—Ian McLean
For my good mates Michael Herold (Microworld, Denmark), Rocky Heckman, Jeff Alexander,
Jamie Sharp, and Michael Kleef (Microsoft, Australia).
—Orin Thomas
4.
5. Contents at a Glance
Introduction xxi
Chapter 1 Configuring Internet Protocol Addressing 1
Chapter 2 Configuring IP Services 59
Chapter 3 Network Access Configuration 119
Chapter 4 Network Access Security 165
Chapter 5 Configuring Active Directory Lightweight Directory
Services and Read-Only Domain Controllers 225
Chapter 6 Active Directory Federation Services and Active Directory
Rights Management Services Server Roles 281
Chapter 7 Active Directory Certificate Services 347
Chapter 8 Maintaining the Active Directory Environment 391
Chapter 9 Managing Software Updates and Monitoring
Network Data 469
Chapter 10 Monitoring Performance and Events 505
Chapter 11 Server Deployment and Activation 561
Chapter 12 Terminal Services 585
Chapter 13 Configuring a Web Services Infrastructure 633
Chapter 14 Configuring FTP and SMTP Services 729
Chapter 15 Hyper-V and Virtualization 777
Chapter 16 High Availability and Storage 807
Answers 843
Index 903
6.
7. Contents
Introduction xxi
Practice Setup Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii
Hardware Requirements xxii
Preparing the Computer Running Windows Server
2008 Enterprise xxiii
Preparing the Computer Running Windows Vista xxv
Using the DVD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi
How to Install the Practice Tests xxvi
How to Use the Practice Tests xxvii
How to Uninstall the Practice Tests xxviii
Microsoft Certified Professional Program . . . . . . . . . . . . . . . . . . . . . . . . . xxviii
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix
Chapter 1 Configuring Internet Protocol Addressing 1
Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
.
Lesson 1: Configuring IPv4 and IPv6 Addressing . . . . . . . . . . . . . . . . . . . . . . 3
Configuring IPv4 Addressing 4
Configuring IPv6 Addressing 8
Implementing IPv4-to-IPv6 Compatibility 17
Using IPv6 Tools 21
Configuring IP Settings 27
Lesson Summary 32
Lesson Review 33
Lesson 2: Configuring DHCP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Summarizing DHCP Features 36
What do you think of this book? We want to hear from you!
Microsoft is interested in hearing your feedback so we can continually improve our
books and learning resources for you. To participate in a brief online survey, please visit:
www.microsoft.com/learning/booksurvey/ vii
20. Managing Fabrics with Storage Explorer 833
Lesson Summary 837
Lesson Review 837
Chapter Review. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
Chapter Summary 839
Case Scenarios 839
Suggested Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840
Configure High Availability 840
Configure Storage 841
Take a Practice Test. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841
Answers 843
Index 903
What do you think of this book? We want to hear from you!
Microsoft is interested in hearing your feedback so we can continually improve our
books and learning resources for you. To participate in a brief online survey, please visit:
www.microsoft.com/learning/booksurvey/
xx Contents
21. Introduction
T his training kit is designed for Windows Server 2003 MCSEs and MCSAs who want to
update their current certification credentials to reflect their experience with the Windows
Server 2008 operating system . As an MCSE or an MCSA, you are a server administrator who
has at least three years of experience managing Windows servers and infrastructure in an
environment with between 250 and 5,000 or more users in three or more physical locations .
You are likely responsible for supporting network services and resources such as messaging,
database servers, file and print servers, a proxy server, a firewall, Internet connectivity, an
intranet, remote access, and client computers . You will also be responsible for implementing
connectivity requirements such as connecting branch offices and individual users in remote
locations to the corporate network and connecting corporate networks to the Internet .
By using this training kit, you will learn how to do the following:
n Configure additional Active Directory server roles
n Maintain an Active Directory environment
n Configure Active Directory certificate services
n Configure IP addressing and services
n Configure network access
n Monitor and manage a network infrastructure
n Deploy servers
n Configure Terminal Services
n Configure a Web services infrastructure
MORE INFO FIND aDDItIONaL CONteNt ONLINe
As new or updated material that complements your book becomes available, it will be
posted on the Microsoft Press Online Windows Server and Client Web site. The type of
material you might find includes articles, links to companion content, errata, sample chap-
ters, updates to book content, and more. This Web site is available at www.microsoft.com
/learning/books/online/serverclient and will be updated periodically.
xxi
22. Practice Setup Instructions
The exercises in this training kit require a minimum of three computers or virtual machines:
n One Windows Server 2008 Enterprise server configured as a domain controller
n One Windows Server 2008 Enterprise server configured as a member server
n One computer running Windows Vista (Enterprise, Business, or Ultimate)
An evaluation version of both the x86 and x64 versions of Windows Server 2008 Enterprise
are included with this textbook. You can also download an evaluation version of Windows
Server 2008 from the Microsoft download center at http://www.microsoft.com/Downloads
/Search.aspx. If you want to carry out the optional exercises in Chapter 16, you need two
additional Windows Server 2008 member servers. These servers can be virtual machines. The
practices in Chapter 15 require you to install an x64 evaluation version of Windows Server
2008 on physical hardware because Hyper-V cannot be deployed within a virtual machine.
All computers must be physically connected to the same network. We recommend that
you use an isolated network that is not part of your production network to perform the
practices in this book. To minimize the time and expense of configuring physical computers,
we recommend that you use virtual machines. To run computers as virtual machines within
Windows, you can use Hyper-V, Virtual PC 2007, Virtual Server 2005 R2, or third-party virtual
machine software. To download Virtual PC 2007, visit http://www.microsoft.com/windows
/downloads/virtualpc/default.mspx. To download an evaluation version of Virtual Server 2005
R2, visit http://www.microsoft.com/technet/virtualserver/evaluation/default.mspx. Some virtual
machine software does not support x64 editions of Windows Server 2008.
Hardware Requirements
You can complete almost all practices in this book other than those in Chapter 16, using
virtual machines rather than server hardware. The minimum and recommended hardware
requirements for Windows Server 2008 are listed in Table 1.
Table 1 Windows Server 2008 Minimum Hardware Requirements
Hardware Component Minimum Requirements Recommended
Processor 1GHz (x86), 1.4GHz (x64) 2 GHz or faster
RAM 512 MB 2 GB or greater
Disk Space 15 GB 40 GB or greater
xxii Introduction
23. If you intend to implement several virtual machines on the same computer (recom-
mended), a higher specification will enhance your user experience . In particular, a computer
with 4 GB RAM and 60 GB free disk space can host all the virtual machines specified for all the
practices in this book .
Preparing the Computer Running Windows Server 2008
Enterprise
To install the computer running Windows Server 2008 Enterprise that you use for the prac-
tices in this book, perform the following steps:
1. Boot the computer or virtual machine on which you will install the operating system
from the Windows Server 2008 Enterprise installation media .
2. On the Install Windows page, select your language, time, currency format, and key-
board or input method and click Next .
3. Click Install Now .
4. On the Type Your Product Key For Activation page, enter the Windows Server 2008
Enterprise product key .
NOTE aUtOMatIC aCtIVatION
Because the practice exercises in this book assume that the computer you are install-
ing is not connected either directly or indirectly to the Internet, clear the Automatic
Activation check box during installation and then perform activation at a convenient
time later.
5. Click Next . On the Select The Operating System You Want To Install page, click
Windows Server 2008 Enterprise (Full Installation) and then click Next .
6. On the Please Read The License Terms page, review the license and then select the I
Accept The License Terms check box . Click Next .
7. On the Which Type of Installation Do You Want page, click Custom (Advanced) .
8. On the Where Do You Want To Install Windows page, select the partition on which you
want to install Windows Server 2008 and then click Next .
The installation process will commence . This process can take up to 20 minutes,
depending on the speed of the hardware upon which you are installing the operating
system . The computer will automatically reboot twice during this period .
You will be asked to change the password prior to logging on for the first time . This is
where you set the password for the Administrator account .
Introduction xxiii
24. 9. Click OK and then enter P@ssw0rd twice in the dialog box shown. Press Enter. Click
OK when you are informed that your password has been changed and you will be
logged on.
10. On the Initial Configuration Tasks page, click Set Time Zone and configure the server to
use your local time zone.
11. Click Configure Networking. Right-click Local Area Connection and click Properties.
12. Click Internet Protocol Version 4 (TCP/IPv4) and then click Properties.
13. Configure the Internet Protocol Version 4 (TCP/IPv4) properties so that the computer
has an IP address of 10.0.0.11 with a subnet mask of 255.255.255.0 and then click OK.
Click Close to close the Local Area Connection Properties. Close the Network Connec-
tions window to return to the Initial Configuration Tasks page.
14. On the Initial Configuration Tasks page, click Provide Computer Name And Domain.
This opens the System Properties dialog box.
15. On the Computer Name tab, click Change.
16. In the Computer Name/Domain Changes dialog box, set the computer name to
Glasgow and click OK. Click OK when informed that it will be necessary to restart the
computer and click Close to close the System Properties dialog box. Click Restart Now
to restart the computer.
17. After the computer has rebooted, log on using the Administrator account and the
password configured in step 9.
18. Click Start and then click Run. In the Run dialog box, type dcpromo and then click OK.
19. On the Welcome To The Active Directory Domain Services Installation Wizard page,
click Next.
20. On the Choose A Deployment Configuration page, select Create A New Domain In A
New Forest and then click Next.
21. On the Name The Forest Root Domain page, enter contoso.internal and click Next.
22. On the Set Forest Functional Level page, leave the default Forest Functional level in
place and then click Next.
23. On the Additional Domain Controller Options page, click Next.
24. In the Static IP Assignment warning dialog box, click Yes, The Computer Will Use A
Dynamically Assigned IP Address (Not Recommended).
25. When presented with the delegation warning, click Yes.
26. On the Location For Database, Log Files, And SYSVOL page, accept the default settings
and then click Next.
xxiv Introduction
25. 27. Click OK to dismiss the blank password warning dialog box and enter P@ssw0rd twice
for the Directory Services Restore Mode Administrator account. Click Next.
28. On the Summary page, review the selections and then click Next.
Active Directory Domain Services (AD DS) will now be configured on the computer.
29. When this process is complete, click Finish and then click Restart Now.
30. When the computer reboots, open Active Directory Users And Computers from the
Administrative Tools menu and make a copy of the built-in Administrator account with
the name Kim_Akers. Set the password to P@ssw0rd.
Instructions for installing and configuring the Windows Server 2008 Enterprise member
server are given in Chapter 2, “Configuring IP Services.” The required server roles are added in
the practices in subsequent chapters.
Preparing the Computer Running Windows Vista
Perform the following actions to prepare the computer running Windows Vista for the exer-
cises in this training kit.
n Check operating system version requirements In System Control Panel (found in
the System And Maintenance category), verify that the operating system version is
W
indows Vista Enterprise, Windows Vista Business, or Windows Vista Ultimate. If
n
ecessary, choose the option to upgrade to one of these versions.
n Name the computer In System Control Panel, specify the computer name as
Melbourne.
n Configure networking To configure networking, carry out the following tasks:
• In Control Panel, click Set Up File Sharing. In Network And Sharing Center, verify
that the network is configured as a private network and that File Sharing is enabled.
• In Network And Sharing Center, click Manage Network Connections. In Network
Connections, open the properties of the Local Area Connection. Specify a static
IPv4 address that is on the same subnet as the domain controller. For example, the
setup instructions for the domain controller specify an IPv4 address of 10.0.0.11.
If you use this address, you can configure the client computer with an IP address
of 10.0.0.21. The subnet mask is 225.225.225.0, and the DNS address is the IPv4
address of the domain controller. You do not require a default gateway. You can
choose other network addresses if you want to, provided that the client and server
are on the same subnet.
Introduction xxv
26. Using the DVD
The companion DVD included with this training kit contains the following:
n practice tests You can reinforce your understanding of how to configure Windows
Vista by using electronic practice tests you customize to meet your needs from the
pool of Lesson Review questions in this book, or you can practice for the 70-648/9 cer-
tification exam by using tests created from a pool of approximately 400 realistic exam
questions, which give you many practice exams to ensure that you are prepared .
n an ebook An electronic version (eBook) of this book is included for when you do not
want to carry the printed book with you . The eBook is in Portable Document Format
(PDF), and you can view it by using Adobe Acrobat or Adobe Reader .
n Sample chapters This DVD includes sample chapters from other Microsoft Press titles
on Windows Server 2008 . These chapters are in PDF format .
DIGITAL CONTENT FOR DIGITAL BOOK READERS
If you bought a digital-only edition of this book, you can enjoy select content from the
print edition’s companion DVD. Visit http://go.microsoft.com/fwlink/?LinkId=142001 to get
your downloadable content. This content is always up-to-date and available to all readers.
How to Install the Practice Tests
To install the practice test software from the companion DVD to your hard disk, perform the
following steps:
1. Insert the companion DVD into your DVD drive and accept the license agreement . A
DVD menu appears .
NOTE IF the DVD MeNU DOeS NOt appear
If the DVD menu or the license agreement does not appear, AutoRun might be disabled
on your computer. Refer to the Readme.txt file on the DVD for alternate installation
instructions.
2. Click Practice Tests and follow the instructions on the screen .
xxvi Introduction
27. How to Use the Practice Tests
To start the practice test software, follow these steps:
1. Click Start, click All Programs, and then select Microsoft Press Training Kit Exam Prep .
A window appears that shows all the Microsoft Press training kit exam prep suites
installed on your computer .
2. Double-click the lesson review or practice test you want to use .
NOTE LeSSON reVIeWS VerSUS praCtICe teStS
Select (70-648 or 70-649) Windows Server 2008, Server Administration Lesson Review
to use the questions from the “Lesson Review” sections of this book. Select (70-648 or
70-649) Windows Server 2008, Server Administration Practice Test to use a pool of 200
questions (per exam) similar to those that appear on the 70-648 and 70-649 certifica-
tion exams.
Lesson Review Options
When you start a lesson review, the Custom Mode dialog box appears so that you can con-
figure your test . You can click OK to accept the defaults, or you can customize the number of
questions you want, how the practice test software works, which exam objectives you want
the questions to relate to, and whether you want your lesson review to be timed . If you are
retaking a test, you can select whether you want to see all the questions again or only the
questions you missed or did not answer .
After you click OK, your lesson review starts .
n To take the test, answer the questions and use the Next and Previous buttons to move
from question to question .
n After you answer an individual question, if you want to see which answers are
correct—along with an explanation of each correct answer—click Explanation .
n If you prefer to wait until the end of the test to see how you did, answer all the ques-
tions and then click Score Test . You will see a summary of the exam objectives you
chose and the percentage of questions you got right overall and per objective . You can
print a copy of your test, review your answers, or retake the test .
Practice Test Options
When you start a practice test, you choose whether to take the test in Certification Mode,
Study Mode, or Custom Mode:
Introduction xxvii
28. n Certification Mode Closely resembles the experience of taking a certification exam .
The test has a set number of questions . It is timed, and you cannot pause and restart
the timer .
n Study Mode Creates an untimed test during which you can review the correct
answers and the explanations after you answer each question .
n Custom Mode Gives you full control over the test options so that you can customize
them as you like .
In all modes, the user interface when you are taking the test is basically the same but with
different options enabled or disabled depending on the mode . The main options are dis-
cussed in the previous section, “Lesson Review Options .”
When you review your answer to an individual practice test question, a “References” sec-
tion is provided that lists where in the training kit you can find the information that relates to
that question and provides links to other sources of information . After you click Test Results
to score your entire practice test, you can click the Learning Plan tab to see a list of references
for every objective .
How to Uninstall the Practice Tests
To uninstall the practice test software for a training kit, use the Program And Features option
in Windows Control Panel .
Microsoft Certified professional program
The Microsoft certifications provide the best method to prove your command of cur-
rent Microsoft products and technologies . The exams and corresponding certifications are
developed to validate your mastery of critical competencies as you design and develop, or
implement and support, solutions with Microsoft products and technologies . Computer
professionals who become Microsoft-certified are recognized as experts and are sought after
industry-wide . Certification brings a variety of benefits to the individual and to employers and
organizations .
MORE INFO aLL the MICrOSOFt CertIFICatIONS
For a full list of Microsoft certifications, go to www.microsoft.com/learning/mcp
/default.asp.
xxviii Introduction