Here are the basic steps to troubleshoot a Windows-based service issue:
1. Open the Services Manager (Start > Run > services.msc) and check the status of the service - if it is stopped or stuck in stopping/starting.
2. Note any error messages when the service fails to start.
3. Check the service properties, especially the Dependencies tab, to ensure the services it depends on are running.
4. Review the System Logs for any errors or additional details on why the service failed to start.
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability.
Learn more about:
» What is the Server?
» Server Roles.
» Server Hardware.
» Work groups & Domains.
» Device and printers.
» Windows Server OS Management tools.
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
Windows Server Administration is an advanced computer networking topic that includes server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, and web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability.
Learn more about:
» What is the Server?
» Server Roles.
» Server Hardware.
» Work groups & Domains.
» Device and printers.
» Windows Server OS Management tools.
Hostel management system project report..pdfKamal Acharya
“HOSTEL MANAGEMENT SYSTEM” is a software developed for managing various activities in the hostel. For the past few years the number of educational institutions are increasing rapidly. Thereby the number of hostels are also increasing for the accommodation of the students studying in this institution. And hence there is a lot of strain on the person who are running the hostel and software’s are not usually used in this context. This particular project deals with the problems on managing a hostel and avoids the problems which occur when carried manually.
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docxSHIVA101531
Linux and Windows Server Critique
Team C
POS 420
June 25, 2012
Yevgeniy Tovshteyn
Linux vs. Windows
Both Linux and Windows are operating systems with advantages and differences in functionality and user friendliness. With networking becoming an important part of company operation in this day and age. Kudler will come to depend on networking for availability to the marketplace via the Internet, while requiring their internal systems for email, Voice over Internet Protocol (VoIP) phone systems, and using business data. Linux and Windows are the only 2 operating systems that have grown to the top level in the field of networking. Learning Team C examines these types of strengths and weaknesses regarding security, administration, performance, and programming.
Kudler Fine Foods Current Systems:
3 locations: La Jolla, Del Mar, and Encinitas
La Jolla
Novell 4.11 Server for POS
4 POS Workstations with Pentium II, Windows 9X
1 Standalone UPS (Uninterruptable Power Supply)
1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and
bubble jet printer.
1 Server with NT Server
1 56K modem
Del Mar
Novell 4.11 Server for POS
4 POS Workstations with Pentium II, Windows 9X
1 Standalone UPS (Uninterruptable Power Supply)
1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and
bubble jet printer.
1 Server with NT Server
1 56K modem
Encinitas
Novell 4.11 Server for POS
4 POS Workstations with Pentium II, Windows 9X
1 Standalone UPS (Uninterruptable Power Supply)
1 56K modem
9 Access Databases: Customer, Inventory, Item, Order, Order Line, Store, Supplier, Tax Table, Tender.
It looks like they will need some type of Enterprise Server software and upgrades to their hardware for compatibility purposes.
Security
Overview of Windows Security
Windows security is used in many natural business settings. Windows Server incorporates features such as Encrypting File System (EFS), a feature allowing for encryption/decryption of files and algorithms as well as Access Management and Identity Protection, a feature that protects the policies and processes to control personal and private data. Windows Server uses networking security to combat viruses and provide network stability. Windows Server also uses secure messaging and collaborative solutions, such as SharePoint, for use when dealing with business partners (Adams, 2012).
Overview of Linux Security
Linux is an open platform allowing for users to add to the structure of the system. Strength in numbers helps Linux security in that security threats are often fixed right away and for all to see.
Why we choose Linux over Windows for Kudler Fine Foods, no system can ever be completely secure.
Network Administration
The total network size for the company is not that large, so administration of the network and the associated systems; including all the Point Of Sale (POS) terminals currently associated with the Novell 4.11 servers, Inventory Spreadshee ...
Functions of Operating Systems:
Types of Operating Systems:
Real-Time Operating Systems
Single-User/Single-Tasking Operating Systems
Single-User/Multitasking Operating Systems
Multi-User/Multitasking Operating Systems
User Interface
Graphical User Interface (GUI)
Command-Line Interface
Running Programs
Managing Hardware
Hostel management system project report..pdfKamal Acharya
“HOSTEL MANAGEMENT SYSTEM” is a software developed for managing various activities in the hostel. For the past few years the number of educational institutions are increasing rapidly. Thereby the number of hostels are also increasing for the accommodation of the students studying in this institution. And hence there is a lot of strain on the person who are running the hostel and software’s are not usually used in this context. This particular project deals with the problems on managing a hostel and avoids the problems which occur when carried manually.
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docxSHIVA101531
Linux and Windows Server Critique
Team C
POS 420
June 25, 2012
Yevgeniy Tovshteyn
Linux vs. Windows
Both Linux and Windows are operating systems with advantages and differences in functionality and user friendliness. With networking becoming an important part of company operation in this day and age. Kudler will come to depend on networking for availability to the marketplace via the Internet, while requiring their internal systems for email, Voice over Internet Protocol (VoIP) phone systems, and using business data. Linux and Windows are the only 2 operating systems that have grown to the top level in the field of networking. Learning Team C examines these types of strengths and weaknesses regarding security, administration, performance, and programming.
Kudler Fine Foods Current Systems:
3 locations: La Jolla, Del Mar, and Encinitas
La Jolla
Novell 4.11 Server for POS
4 POS Workstations with Pentium II, Windows 9X
1 Standalone UPS (Uninterruptable Power Supply)
1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and
bubble jet printer.
1 Server with NT Server
1 56K modem
Del Mar
Novell 4.11 Server for POS
4 POS Workstations with Pentium II, Windows 9X
1 Standalone UPS (Uninterruptable Power Supply)
1 Server with Inventory Spreadsheet with Pentium II, 64mg Ram, Windows 9X, external CD burner and
bubble jet printer.
1 Server with NT Server
1 56K modem
Encinitas
Novell 4.11 Server for POS
4 POS Workstations with Pentium II, Windows 9X
1 Standalone UPS (Uninterruptable Power Supply)
1 56K modem
9 Access Databases: Customer, Inventory, Item, Order, Order Line, Store, Supplier, Tax Table, Tender.
It looks like they will need some type of Enterprise Server software and upgrades to their hardware for compatibility purposes.
Security
Overview of Windows Security
Windows security is used in many natural business settings. Windows Server incorporates features such as Encrypting File System (EFS), a feature allowing for encryption/decryption of files and algorithms as well as Access Management and Identity Protection, a feature that protects the policies and processes to control personal and private data. Windows Server uses networking security to combat viruses and provide network stability. Windows Server also uses secure messaging and collaborative solutions, such as SharePoint, for use when dealing with business partners (Adams, 2012).
Overview of Linux Security
Linux is an open platform allowing for users to add to the structure of the system. Strength in numbers helps Linux security in that security threats are often fixed right away and for all to see.
Why we choose Linux over Windows for Kudler Fine Foods, no system can ever be completely secure.
Network Administration
The total network size for the company is not that large, so administration of the network and the associated systems; including all the Point Of Sale (POS) terminals currently associated with the Novell 4.11 servers, Inventory Spreadshee ...
Functions of Operating Systems:
Types of Operating Systems:
Real-Time Operating Systems
Single-User/Single-Tasking Operating Systems
Single-User/Multitasking Operating Systems
Multi-User/Multitasking Operating Systems
User Interface
Graphical User Interface (GUI)
Command-Line Interface
Running Programs
Managing Hardware
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
1. Basics of Windows Server & Active Directory
14th – 17th March 2022
Trainer: Arif Malik
2. Chapters
1. IT Infrastructure
2. Windows Client Operating System
3. Windows Server Operating System
4. Basic Troubleshooting of Server OS
5. Active Directory
6. Networking Basics
7. DNS
8. DHCP
9. Virtualization
10. Overview of Windows related issues and
tickets.
3. Chapter 1: IT Infrastructure
Lesson 1: Overview of IT Infra
Lesson 2: Infrastructure Management
Lesson 3: Layers of IT Infrastructure
4. Lesson 1: Overview of IT Infra
What is IT infrastructure?
Information technology (IT) infrastructure are the
components required to operate and manage enterprise IT
environments. IT infrastructure can be deployed within a
cloud computing system, or within an organization's own
facilities.
These components include hardware, software,
networking components, an operating system (OS), and
data storage, all of which are used to deliver IT services
and solutions.
The IT infrastructure consists of all elements that support
the management and usability of data and information.
These include the physical hardware and facilities
(including data centers), data storage and retrieval,
network systems, legacy interfaces, and software to
support the business goals of an enterprise. The structure
also includes hiring, training, policy, testing, process,
upgrades, and repairs.
5. Lesson 2: Infrastructure Management
What Is Infrastructure Management?
The purpose of IT infrastructure management is to provide
structure and control of the functions responsible for diverse
technical operations which generally involve hardware,
software, and networking in both physical and virtual
environments.
Additionally, an enterprise IT infrastructure management team is
typically responsible for the following essential IT elements and
services:
Applications Hardware Software
Asset
Lifecycle Servers Storage Network
Tools and
Services
6. Lesson 3: Layers of IT Infrastructure
APPLICATIONS:
An IT infrastructure supports the deliverv of
enterprise applications.
INFRASTRUCTURE MANAGEMENT
TOOLS AND SERVICES :
Key infrastructure services at This layer
include Dynamic Host Configuration (DHCP)
and Domain Name System (DNS). To
manage all elements of the infrastructure
efficiently, admins use tools for
configuration management, monitoring,
authentication etc.
SERVERS
The server layer consists of physical and
virtual servers for On-Premise
Datacenter/Cloud environment
STORAGE
At this layer, systems Such as network-
attached Storage (NAS) or storage area
networks (SAN) enable data storage.
NETWORK
The network layer includes Such as routers,
switches, firewalls and load balancers.
FACILITIES
The physical data center facility houses IT
equipment and includes necessary power,
cooling and security components.
7. Chapter 2: Windows Client Operating System
Lesson 1: What is a Windows Client Operating System
Lesson 2: Various versions of Client OS
Lesson 3: Installing Client Operating System
Lesson 4: Managing Client OS
8. Lesson 1: What is a Windows Client Operating System
Client Operating System:
The Client Operating System is the system that works within computer desktops and various portable devices. This system is
different from centralized servers because it only supports a single user.
It is an operating system that operates within desktop. It is used to obtain services from a server. It run on the client devices
like laptop, computer and is very simple operating system.
It runs on the client devices like laptop, computer etc.
It provides less security and has less processing power in comparison with Server Operating System.
Some computers can use multiple operating systems. This is considered a dual boot configuration. When a computer is built
in this manner, it can be configured to run specific devices for each operating system configuration. This provides flexibility
for software that is operating-system specific. Having two operating systems gives the user more access to complex
software programs.
10. Lesson 3: Installing Client Operating System
How to install Windows 10 from a DVD, USB memory stick, or ISO file
Windows 10 is used on more than 1 billion computers and devices, and many users want to install it on their own.
One way is to use a USB memory stick with the Windows 10 setup, a disc (like a DVD or CD), or an ISO file with the
installation.
The installation process is the same no matter the source you use, just booting from a different source involves different
selections.
Attached guide shows you how to make a clean install of Windows 10, using DVD.
11. Lesson 4: Managing Client Operating System
Administrative Tools in Windows
Administrative Tools is a folder in Control Panel that contains tools for system administrators and advanced users.
12. Chapter 3: Windows Server Operating System
Lesson 1: What is Windows Server Operating System
Lesson 2: 32-bit vs 64-bit architecture
Lesson 3: List out the various versions of Windows Server
Lesson 4: Installing Windows Server
Lesson 5: Server Manager in Windows Server
Lesson 6: Responsibilities of a System Administrator
Lesson 7: Role and Features in Windows Server
Lesson 8: Remote Desktop of Windows Server
13. Lesson 1: Windows Server Operating System
What is Operating System.
An operating system is the most important software that runs on a computer. It manages the computer's memory and
processes, as well as all of its software and hardware. It also allows you to communicate with the computer without
knowing how to speak the computer's language.
Your computer's operating system (OS) manages all of the software and hardware on the computer. Most of the time, there
are several different computer programs running at the same time, and they all need to access your computer's central
processing unit (CPU), memory, and storage. The operating system coordinates all of this to make sure each program gets
what it needs.
Windows is a graphical operating system developed by Microsoft and does the below:
• Memory Management. Deals with the transfer of programs in and out of memory.
• Organizes the use of memory between programs.
• Organizes processing time between programs and users.
• Maintains security and access rights of users.
• Processor Management.
• Device Management.
• File Management.
• Security.
• Control over system performance.
14. Lesson 1: Windows Server Operating System … contd
Windows Server is a group of operating systems designed by Microsoft that supports enterprise-level management, data
storage, applications, and communications.
Versions of Windows Server have focused on stability, security, networking, and various improvements to the file system.
Other improvements also have included improvements to deployment technologies, as well as increased hardware support.
Windows Server Standard is a server operating system that enables a computer to handle network roles such as print
server, domain controller, web server, application server etc.
Servers are extremely powerful machines that are designed to run constantly and provide resources for other computers.
This means in almost all cases; Windows Server is only used in business settings.
15. Lesson 2: 32-bit vs 64-bit architecture
What are 32-Bit and 64-Bit?
The difference between 32-bit and a 64-bit is all about processing power. Computers with 32-bit processors are older,
slower, and less secure, while a 64-bit processor is newer, faster, and more secure.
Your computer’s central processing unit (CPU) functions like the brain of your computer. It controls all the communication
and the flow of data to and from the other parts of your computer. Some computers use two or more processors. However,
there are only two main categories of processors now: 32-bit processors and 64-bit processors. The type of processor that
your computer uses affects its overall performance and what kind of software it can utilize.
If you want your computer to be fast, you should probably choose a 64-bit processor. You can even use this processor if
you’re going to run 32-bit programs since most applications are backward compatible. This means 64-bit computers will run
most 32-bit programs. However, a 32-bit computer will not run any 64-bit applications.
32-bit system can address a maximum of 4 GB (4,294,967,296 bytes) of RAM, whereas a 64-bit computer (which means it
has a 64-bit processor) can access more than 4 GB of RAM. If a computer has 8 GB of RAM, it better has a 64-bit processor.
Otherwise, at least 4 GB of the memory will be inaccessible by the CPU.
64-bit processors can come in dual-core, quad-core, six-core, and eight-core versions for home computing. Multiple cores
allow for an increased number of calculations per second that can be performed, which can increase the processing power
and help make a computer run faster. Software programs that require many calculations to function smoothly can operate
faster and more efficiently on the multi-core 64-bit processors, for the most part.
16. Lesson 2: 32-bit vs 64-bit architecture … contd
How to Find Out if Your Windows Server is 64-Bit
Open the File Explorer window by pressing the
Windows icon key + E.
In the left sidebar of the File Explorer window,
right-click on “This PC.”
Choose Properties from the context menu.
Find the “System type” information. This is
where you will see what type of operating system
and processor you have.
19. Lesson 3: Various versions of Windows Server … contd
Difference between Windows Server 2008 and Windows Server 2012 R2
Windows Server 2008 had two releases i.e., 32 bit and 64 bit but Windows Server 2012 is only 64 but Operating System.
The Active directory in Windows Server 2012 has a new feature that allows you to add personal devices like tablets to the domain.
The Active directory recycle bin is another feature of windows Server which allows us to restore deleted AD objects using a GUI.
Windows Server 2012 has IIS version 8.0.
Windows Server 2012 uses PowerShell version 3.0.
Server core was introduced in Windows Server 2008. Windows Server has additional feature that allows you to switch between
Server core and GUI and vice versa.
Hyper-V in Windows Server 2012 has a feature called live migration which allows you to move virtual machine from one Hyper-V
server to another Hyper-V Server while virtual machine is running. This feature was there in Windows Server 2008, but the virtual
machine had to be clustered for migration to happen.
In Windows Server 2008 Hyper-V the merging of a snapshot in the virtual machine required the virtual machine to be turned off
whereas in windows Server 2012 it can be done while the machine is running.
In Windows Server 2008 Hyper-V the dynamic memory can’t be given to the virtual machine is its running whereas in Windows
Server 2012 the running virtual machine can take dynamic memory from host while its running.
20. Lesson 4: Installing Windows Server
System requirements
Processor: Minimum - 1.4 GHz 64-bit processor
RAM: Minimum - 512 MB
Disk space requirements: Minimum - 32 GB
Be aware that 32 GB should be considered an absolute minimum value for successful installation. The system partition will need extra space for any of
the following circumstances: If you install the system over a network. Computers with more than 16 GB of RAM will require more disk space for paging,
hibernation, and dump files.
DVD drive
Super VGA (800 x 600) or higher-resolution monitor
Keyboard and Microsoft® mouse (or other compatible pointing device)
Internet access
Please refer to the attached document with the steps for Windows Server 2012 – Installation
Installing
windows Server 2012
21. Lesson 5: Server Manager in Windows Server 2012
System requirements
Server Manager is a management console (MMC) in Windows Server 2012 that allows you to add server roles / features,
manage and deploy server remotely.
In the attached document we’ll show you 5 ways to launch Server Manager in Windows Server 2012.
22. Lesson 6: Responsibilities of a System Administrator
System Administrator responsibilities include:
Installing and configuring software, hardware and networks
Monitoring system performance and troubleshooting issues
Ensuring security and efficiency of IT infrastructure
Manage network servers and technology tools
Set up accounts and workstations
Monitor performance and maintain systems according to requirements
Troubleshoot issues and outages
Ensure security through access controls, backups and firewalls
Upgrade systems with new releases and models
Develop expertise to train staff on new technologies
Build an internal wiki with technical documentation, manuals and IT policies
23. Lesson 7: Roles and Features in Windows Server
What is role in Windows Server?
Server roles refer to the roles that your server can play on your network — roles such as a file server, a web server, or a
DHCP or DNS server.
Few examples of the roles are as below:
24. Lesson 7: Role and Features in Windows Server
What is features in Windows Server?
Features refer to additional capabilities of the Windows operating system itself, such as the .NET Framework or Windows
Backup.
Few examples of the features are as below:
25. Lesson 8: Remote Desktop of Windows Server
What is an RDP connection?
Microsoft Remote Desktop Connection allows you to access a Windows computer from a different location as if you were
sitting in front of it.
RDP or Remote Desktop Protocol is a Microsoft protocol that enables remote connections to a local server (or network), to a
desktop or a server over the Internet. Remote Desktop Protocol makes this connection using a graphic interface.
Please follow the attached word document to Enable RDP in Windows Server as below:
26. Chapter 4: Basic Troubleshooting of Server OS
Lesson 1: Introduction
Lesson 2: Application and System Logs understanding
Lesson 3: Troubleshooting for Windows-based service issue
Lesson 4: Troubleshooting for Windows-based computer freeze
Lesson 5: Introduction to page file and appropriate page file size
27. Lesson 1: Introduction
Introduction:
The first thing you will want to do is gather as many details about the issue as you can. Each time that the issue occurs, take
note of the following things:
• Specific Error Messages – Take a screen shot or write down the specific error messages. Make sure you get the full error
codes and other details as they may be important for troubleshooting.
• Event Logs – In addition to the main error message that is displayed, browse to the server’s event log through the Event
Viewer and copy down the information provided.
• Steps Leading to Problem – Document what is happening that leads to the problem occurring. If this is during the bootup
sequence of the server, write down what is displayed on the screen just prior to the errors (if any).
• Task Manager for performance issue: Take a quick look at the Task Manager and make a note of the process consuming high
CPU and or Memory. Also check the Disk usage.
• Alerts from Monitoring Tool: Check the alerts for any issue related to Service Failure, Disk Space, Power and Network etc.
• With all the above details engage your L3/SME for next steps.
28. Lesson 2: Application and System Logs understanding
Windows Logging Basics
Logs are records of events that happen in your computer, either by a person or by a running process. They help you track
what happened and troubleshoot problems.
Windows Event Viewer displays the Windows event logs. Use this application to view and navigate the logs, search and filter
particular types of logs, export logs for analysis, and more.
Windows Server 2012/2016 and 2019 Event Viewer can be accessed in several ways:
29. Lesson 2: Application and System Logs understanding … contd
Also, Event you can open the Event Viewer directly from a command prompt:
• Open a Command Prompt
• Type: eventvwr
Lastly, you can open the Event Viewer through Start > Run > eventvwr
By default, there are five categories of Windows logs:
• Application – Information logged by applications hosted on the local machine.
• Security – Information related to login attempts (success and failure), elevated privileges, and other audited events.
• Setup – Messages generated when installing and upgrading the Windows operating system. If the Windows system is a
domain controller, those messages are also logged here.
• System – Messages generated by the Windows operating system.
• Forwarded Events – Events forwarded by other computers when the local machine is functioning as a central
subscriber.
For detailed information on Using the Windows Event Viewer Interface, refer the file attached:
Windows Event
Viewer Interface
30. Lesson 3: Troubleshooting for Windows-based service issue
Issue Description: Windows Service is not starting.
Basic Troubleshooting steps:
• Launch Windows Services Manager > Start > Run > services.msc
• Check the status of the failed service is it stopped or stuck in stopping/starting phase
• Capture the error message when the affected service failed to start
• Check the properties of the failed service > Dependencies Tab / and confirm that the status of the service listed under
“This Service depends on the following system components” is “Running”
• Check the System Logs for the corresponding logs
• With all the above details engage your L3/SME for next steps.
31. Lesson 4: Troubleshooting for Windows-based computer freeze
There are several reasons why a computer may freeze or start to perform poorly. Typically, it will be a software-related
issue, or your computer has too many programs operating at any once, causing it to freeze.
Additional issues such as insufficient hard-disk space or ‘driver’-related issues also can cause a computer to freeze.
First off, give your computer some time to recover from the freeze automatically. Usually, a few minutes will be sufficient to
see if a computer can resolve the issue itself.
Basic Troubleshooting steps:
1) Check if your computer is completely dead-locked. There are a couple of ways to check if your computer is completely
frozen, often referred to as ‘dead-locked’.
a) Try to move your mouse cursor on the screen. If it won’t move, it is likely that your computer is dead-locked and will
require rebooting.
a) Try to click the ‘Caps Lock’ button on the keyboard. If the Caps Lock light shows it is working, it is very likely a software
issue, and this can be resolved using the Windows task Manager. If the Caps Lock light does not work, it is likely your
computer is dead-locked and you will need to reboot.
32. Lesson 4: Troubleshooting for Windows-based computer freeze
2) If your computer is freezing randomly when using different software applications, it could be due to a few different reasons.
Here are the most common reasons for a computer to randomly freeze.
• Not enough processing power: Often caused by programs that demand heavy Central Processing Unit (CPU) power
such as video editing or 3D rendering software. Try to limit multiple programs open at the same time when using
programs that demand high CPU processing.
• Not enough hard-disk space: It’s always a good idea to keep as much hard-disk space available for your computer to
run optimally. The best way to do this is by regularly removing any unused or unwanted files.
• Driver issues: There may be a ‘driver’-related issue causing the problem. You can check for any driver issues by using
the Windows Device Manager.
• Hardware issues: A more serious issue is that of a hardware issue, where a component of the computer is not working
correctly or is malfunctioning
33. Lesson 5: Introduction to page file and appropriate page file size
Introduction to page files:
Windows uses a page file to store data that can’t be held by your computer’s random-access memory when it fills up.
A page file (also known as a "paging file") is an optional, hidden system file on a hard disk.
The page file, also known as the swap file, pagefile, or paging file, is a file on your hard drive. It’s located at C:pagefile.sys
by default, but you won’t see it unless you tell Windows Explorer not to hide protected operating system files.
Physical extension of RAM: Page files enable the system to remove infrequently accessed modified pages from physical
memory to let the system use physical memory more efficiently for more frequently accessed pages
How The Page File Works
Your computer stores files, programs, and other data you’re using in your RAM (random access memory) because it’s much
faster to read from RAM than it is to read from a hard drive. For example, when you open Firefox, Firefox’s program files are
read from your hard drive and placed into your RAM. The computer uses the copies in RAM rather than repeatedly reading
the same files from your hard drive.
Programs store the data they’re working with here. When you view a web page, the web page is downloaded and stored in
your RAM. When you watch a YouTube video, the video is held in your RAM.
When your RAM becomes full, Windows moves some of the data from your RAM back to your hard drive, placing it in the
page file. This file is a form of virtual memory. While writing this data to your hard disk and reading it back later is much
slower than using RAM, it’s back-up memory — rather than throwing potentially important data away or having programs
crash, the data is stored on your hard drive.