SlideShare a Scribd company logo
1 of 75
MCSA (E)
History of Microsoft certificates
MCSE – MCITP – MCSE
Validity of MCSA certificate
Course Topics
• Windows Management (Installation,
Modifying installation, Core)
• Active Directory
• Accounts (Users, Computers, OUs, and
Groups)
• Group Policy
• Networking (IPv4, IPv6, DHCP, and DNS)
• Managing Storage
• License (Editions)
• Prerequisites (HW, Apps, Storage
Drivers)
• Testing on Virtual Machine
• BACKUP
• Installation Modes
Installing Windows
2012 R2
• Upgrade
https://technet.microsoft.com/en
-us/library/dn303416.aspx
• Migration
https://technet.microsoft.com/en
-us/library/dn486773
Switching between modes
• Full – Core - Minimal
• GUI needs Vs Core advantages
Features on demand
• Security, space
• If we needed it later?
• Online or to an Offline VHD
Adding roles to offline VHDs
• PowerShell
• CMD
• Alias
• SConfig
• RDP
Configuring Core
WinRM (Mostly for monitoring)
RSAT (Useful for desktops)
Another Server With Same Role
Non-domain joined computer
(FW rule, PS script)
Remote Management
Active Directory
Each server has its own password policy (complexity,
expiration, etc.), different companies, and many
users for each server
Domain Vs Workgroup
DC redundancy
Domain naming
Parent, child, tree, and forest
Trust between domains
Active Directory
Domain
Controllers
Installation ADDS + Promoting to DC
Redundancy
Adding extra DCs (Same subnet,
IFM, Script)
Uninstalling (demoting) DC
AD DC Upgrade
FFL
DFL
Global Catalog
SRV Records
Domain
Controllers
User
Computer
Group (types)
Organizational Unit
Sites
AD Objects
What is SID?
Creating Accounts
Creating Template Accounts
Joining a Computer
Online
Offline
Inactive & Disabled Accounts
AD Users & Computers
SID, Username, & PW
Secure Channel
Broken Secure Channel
AD Computers
Accounts
DC Promo
AD AC
Recycle Bin
Fine-grained Passwords
Extra
Automate Accounts
Creation
LDIFDE: Lightweight Data Interchange
Format, Data Exchange
CSVDE: Comma Separated Value Data
Exchange.
LDIFDE:
dn: “cn=Elizabeth Andersen,ou=Research,dc=adatum,dc=com”
changetype: add (or modify, delete)
ObjectClass: user
SAMAccountName: eander
UserPrincipalName: eander@adatum.com
telephoneNumber: 586-555-1234
Then, save it with .ldf and run:
ldifde –i –f <filename.ldf>
CSVDE:
dn,samAccountName,userPrincipalName,telephoneNumber,objectCla
ss
“cn=Elizabeth
Andersen,ou=Research,dc=adatum,dc=com”,eander,eander@adatu
m.com,586-555-1234,user
Then you run the command:
csvde.exe -i -f <filename.csv>
DSADD
DSADD allows adding users to multiple
OU; create OUs, computers, users
dsadd ou ou=test,dc=northwindtraders,dc=com
dsadd user
“cn=test321,ou=sales,dc=dabbas,dc=com” -disable
no
DSquery, Dsmod, DSget, DSMove, DSRm
Check the notes file
PowerShell
CSV file (first line is parameters)
Import-Csv .CSVimport.csv | foreach-object
{$userprincipalname = $_.SamAccountName
+ "@{domainname}.com"
Groups
Why we use Groups?
Are OUs Groups?
Type of Groups
Group Scopes
Group Conversions
Organizational Units
What OU can contain?
Simplifying Administration
Permissions on OUs?
OUs & GPOs?
Users & Computers are Containers
RedirUser & RedirCmp
Accidental Deletion
Delegation
Delegation Templates
Organizational Units
Networking – IPv4
What is IP?
Public Vs Private IPs
Subnetting & Default Gateway
Hosts
IP Assignments
Exercises
Supernetting
Networking – IPv6
Hexadecimal Notation
Addressing – 128 Bits – 8 of 16 Bits
blocks
Shortening Address Rules
The Interface ID
Converting MAC to EUI-64
Addresses Types:
Link Local: Starts with FE80
Unique Local (Site Local): Starts with
FD
Global
Communications Type:
• Unicast: One to One
• Multicast: One to Many
• Anycast: One to Closest
• No Broadcast as in IPv4
Transition to IPv6
• Dual Stack Routers
• Tunneling (6to4 & 4to6)
• Intra-Site Automatic Tunnel
Addressing Protocol ISATAP
• Teredo
Group Policy
What are GPOs & Why we use them?
Where GPO Files are saved?
GPOs Types:
Local GPO
Non-Local GPO
Creating & Managing a Local GPO
Non-Local Overwrites Local GPOs
Domain (Non-Local) GPOs
Creating a GPO
Linking (Applying) to an OU
Blocking Top GPOs on a specific OU
Enforcing Blocked GPO!
How long GPO takes to be applied?
Templates GPOs
Pre-defined GPOs
Can be downloaded
Multiple OSs?
Central Store
Useful to avoid OSs diff. templates
Found under “PolicyDefinitions”
www.gpanswers.com
Scope of Management
• User (Computer) Should be linked
to Users (Computers) OUs
• Policies are Cumulative
• Computer overwrites User
Processing Order
Local > Site > Domain > OU >
OU
Authenticated Users
Starter GPOs
Policies Vs. Preferences
Policies Preferences
Settings are permanent (greyed
out UI)
User can change settings (drive
map
Applied at startup, logon, refresh Same as policies, option to do not
reapply
Removing policy reverts to
defaults
Does not revert back
automatically
Takes precedence over
preferences
not available for local GPO
Useful for: preventing installing
apps, prevent changing
backgrounds
Useful for: desktop icons,
shortcuts, add URL on desktop,
drive map, file copy, update
GPO Permissions
• Who have Full perm. By default?
• Delegate Permission
GPO Security Settings
Comp. > Policies > Win. > Sec.
User Tokens (Standard & Admin
Tokens)
Security Templates
Security Configuration & Analysis
Software Restriction Policy &
Applocker
Software Restriction Policy Applocker
Designed for legacy Windows
(XP, 2003)
Designed for Win 7/8, 2008 R2,
2012
Fairly easy to bypass Less easy to bypass
All apps are allowed by defaults All apps are denied by defaults
DHCP
What is DHCP?
Why it’s better than Static IP?
Allocation Methods:
• Dynamic
• Automatic
• Manual
DORA
Discover – Offer – Request –
Ack.
Common Parameters
PXE & DHCP
Relay Agent
Extra:
• DB Backup
• Failover Options
DNS
What is DNS?
Zones & Zones Types
How DNS Works?
Type of Queries (Recursive &
Iterative)
Type of Answers (Authoritative &
Non-Authoritative)
Forwarders:
• Root Hints
• Conditional Forwarders
Stub Zones
Manage Cache
Records Types (Resource Records)
Hyper-V
What is Virtualization and Why?
Benefits of Using Virtualization
• Space, Power, Cooling
• Less Management (at least centralized)
• Optimize Resources to the max.
• Greener, easier to backup, easier to
replicate, etc.
Hypervisor
Hypervisor Types:
• Type 1: Native or Bare Metal (Hyper-
V)
• Type 2: Hosted (VMWare
Workstation)
Hyper-V needs 64-Bit processor
BIOS Should Support Virtualization
RAM & Storage Consideration
Enabling Hyper-V on Windows 8 & 8.1
Hyper-V Configuration Settings
• Dynamic Memory
• Smart Paging
• Resource Metering
• Guest Integration Services
• Memory Buffer
• Memory Weight
Storage in Hyper-V
VHD Max. 2 TB, VHDx up to 64 TB
VHDx is more resilient
How to modify VHD files?
How to Change VHD size? Disk Mgmt.?
Differencing drives
Pass through disks
Snapshots
Fiber Channel Adapter
Networking in Hyper-V
Switches Types:
• External
• Internal
• Private
VLAN
Configuring MAC
Gen1 & Gen2
Gen2 can be used on 2012, 8, 8.1 64-
bit only
Hyper-V in R2 uses RDP (supports
copy/paste, audio redirection)
Online VHDx resize / shrink
NIC Teaming:
Teaming
Switch Independent
Static Teaming (Dependent)
LACP (Dependent)
Load Balancing
Address Hash
Hyper-V Port
Dynamic
Local Storage
Disk Types, Basic & Dynamic
Choosing Storage Type Depends on:
• Amount of Storage needed
• Number of Users (at the same time)
• Data Sensitivity
• Data Importance
RAID Types:
Simple
Spanned
Striped (RAID 0)
Mirrored (RAID 1)
Striped Set with Parity (RAID 5)
File Systems (Must know, not directly
required)
File. Allocation Table FAT/FAT32/exFAT
• No Security
New TechFile System NTFS
• Secured using Permissions
• Encryption & Compression
• Quotas
• Auditing, File Tagging, Larger Files
Resilient File System ReFS
• File can have 16 Exabyte size
• File Name Length is up to 32000
char.
• High Resiliency
• Backward Compatible
• No Disk Quotas
Creating VHD & VHDx through Disk
Management
Adding files to VHD & VHDx through
Disk Management
Storage Spaces in 2012
What is SAN?
• Administration? Cost Wise?
What about NAS?
Virtual Disks (Not VHDs!)
Storage Pools
Virtual Disk Configuration
Layout
• Simple, Two or Three way Mirror,
Parity
Provisioning
• Fixed, Thin
Allocation
• Data Store, Manual, Hot Spare
Storage Spaces Using Enclosures
• Approved JBOD:
www.windowsservercatalog.com
• 2U/4U Rack mounted, up to 70 Drives
• Smart, can send not. to Windows
about temp., storage status)
• Redundant fan, Power
Storage container not a self RAID
Storage Spaces Tiering
• Fast SSD for hot or pinned data
• Slow HDD for cold data
Share & NTFS
Share Vs. NTFS permissions
Share NTFS
Network Only, no control over
local access
Local and Network access
First line of defense Primary tool to control access
Options are: Read, change, Full Much more
Applies to folders only Applies to files & folders
No inheritance Many options available for
inheritance
Share
• Cumulative permissions apply (deny
wins)
• Can be combined with NTFS perms.
• Administrative Share
• Access-Based Enumeration
NTFS
• Change Owner
• Inheritance apply order
• Permission can be either additive or
subtractive (start with all denied then
allow, or start with all allow then deny)
• Effective access: the result of applying
these rules:
•Deny overrides allow
•Allow permissions are cumulative
•Explicit perm takes precedence over
inherited
• Authorizing occurs to SID for users
Offline Files
• Applies to network shares
• Files stay available when
disconnected
• High reliable sync. Mechanism
• Can be configured using Offline
settings or GPO
• Needs to be enabled first, then apply
on folders
Disk Quotas
• Limit disk usage
• Enabled on volume level
• Soft Quota & Hard Quota
• File Server Resource Manager FSRM is handy
• FSRM can apply quotas on folders, Windows
Explorer on volumes only
• File Screening, Data Deduplication
• Storage Reports Management
Volume Shadow Copy
• Used in VM snapshots
• Used by backup operations
(Windows, Acronis)
• Used for File Recovery
In File Recovery:
• Quick restore for accidental deletions
• Scheduled
• Used on the machine not only shares
• VSS is configured under volume
properties
• VSS is replaced with File History,
starting Win. 8
• On servers, enabled under driver
properties under disk management
• VSS by default creates two copies, at
7:00 AM and 12:00 PM
Work Folders
• Similar to Offline Files feature
• Allows access to joined & non-joined
domain workstations
• Enables managing BYOD
• Transparent conflict resolution
• Hub-Spoke topology
• Works with file screening, classification (can
classify documents), quotas
• Security policies for encryption, screen lock
(data security if device was stolen)
Work Folders Configuration
Server Side:
• Define appropriate users and groups
• Add & configure “work folders” role
• DNS (workfolders.domain.com)
• Certificates
• Proxy
Client Side:
• Control panel configuration
• Access using “work folders”
Printers
Definitions:
• Print Device
• Printer
• Print Server
• Printer Driver
Printing workflow:
• PC > Printer > Driver > Print server
> Print device
Network printers & Local printers
• Central Management, drivers,
easier to install, queue
management, less cost
Printer Management MMC
• Printers Filtering
Creating multiple instances
(objects) of a printer, if we want to
give higher priority for managers
Printing Options:
• Direct print
• Locally attached printer sharing
• Network attached printing
• Network attached printer sharing
Printer Pool: Identical devices ONLY
Adding 32-bit driver to a 64-bit
server
Easy Print
Firewall
Why Windows Firewall?
Firewall Interfaces
• Control Panel
• Windows Firewall Advanced
• NetSH
• PowerShell
• GPO
Hardware Firewall & Software Firewall
Firewall Modes:
Domain
• Work
• Home
• Public
Opening port Vs. Allowing Application
Connection security rules
Importing & Exporting Rules
Configuring Firewall under GPO
Computer > Policies > Windows >
Security > Windows FW with Advanced
Security

More Related Content

What's hot

Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directorythoms1i
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy ConceptsRob Dunn
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptxsyedasadraza13
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking ExplainedThomas Graf
 
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...Cisco Canada
 
Ansible presentation
Ansible presentationAnsible presentation
Ansible presentationKumar Y
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and applicationaminpathan11
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16David Pasek
 
Desktop Support Engineer Roles
Desktop Support Engineer Roles Desktop Support Engineer Roles
Desktop Support Engineer Roles Vignesh kumar
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2Vepsun Technologies
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptxmasbulosoke
 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper vHameda Hurmat
 

What's hot (20)

Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy Concepts
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptx
 
Windows server
Windows serverWindows server
Windows server
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking Explained
 
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
 
Ansible presentation
Ansible presentationAnsible presentation
Ansible presentation
 
Windows 2019
Windows 2019Windows 2019
Windows 2019
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16
 
Desktop Support Engineer Roles
Desktop Support Engineer Roles Desktop Support Engineer Roles
Desktop Support Engineer Roles
 
Brkdct 3101
Brkdct 3101Brkdct 3101
Brkdct 3101
 
FILE SERVER
FILE SERVERFILE SERVER
FILE SERVER
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper v
 

Viewers also liked

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenanceanilinvns
 
70-410 Installing and Configuring Windows Server 2012
70-410 Installing and Configuring Windows Server 201270-410 Installing and Configuring Windows Server 2012
70-410 Installing and Configuring Windows Server 2012drakoumu
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologyDavid J Rosenthal
 
What’s new in windows server 2012
What’s new in windows server 2012What’s new in windows server 2012
What’s new in windows server 2012Alex de Jong
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
Microsoft Windows Server 2012 R2 Overview - Presented by Atidan
Microsoft Windows Server 2012 R2 Overview - Presented by AtidanMicrosoft Windows Server 2012 R2 Overview - Presented by Atidan
Microsoft Windows Server 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
 
Active Directory Domain Services Installation & Configuration - Windows Ser...
Active Directory Domain Services  Installation & Configuration  - Windows Ser...Active Directory Domain Services  Installation & Configuration  - Windows Ser...
Active Directory Domain Services Installation & Configuration - Windows Ser...Adel Alghamdi
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012anilinvns
 
Introducing Microsoft SQL Server 2017
Introducing Microsoft SQL Server 2017Introducing Microsoft SQL Server 2017
Introducing Microsoft SQL Server 2017David J Rosenthal
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012 Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012 Sameh AboulDahab
 
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex Microsoft Technet France
 

Viewers also liked (15)

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenance
 
Windows 10
Windows 10Windows 10
Windows 10
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
70-410 Installing and Configuring Windows Server 2012
70-410 Installing and Configuring Windows Server 201270-410 Installing and Configuring Windows Server 2012
70-410 Installing and Configuring Windows Server 2012
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
What’s new in windows server 2012
What’s new in windows server 2012What’s new in windows server 2012
What’s new in windows server 2012
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Microsoft Windows Server 2012 R2 Overview - Presented by Atidan
Microsoft Windows Server 2012 R2 Overview - Presented by AtidanMicrosoft Windows Server 2012 R2 Overview - Presented by Atidan
Microsoft Windows Server 2012 R2 Overview - Presented by Atidan
 
Active Directory Domain Services Installation & Configuration - Windows Ser...
Active Directory Domain Services  Installation & Configuration  - Windows Ser...Active Directory Domain Services  Installation & Configuration  - Windows Ser...
Active Directory Domain Services Installation & Configuration - Windows Ser...
 
Windows Server 2012 R2
Windows Server 2012 R2Windows Server 2012 R2
Windows Server 2012 R2
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
Introducing Microsoft SQL Server 2017
Introducing Microsoft SQL Server 2017Introducing Microsoft SQL Server 2017
Introducing Microsoft SQL Server 2017
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012 Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012
 
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
 

Similar to MCSA Installing & Configuring Windows Server 2012 70-410

70-410 Practice Test
70-410 Practice Test70-410 Practice Test
70-410 Practice Testwrailebo
 
Azure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun AnlatımAzure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun AnlatımMustafa
 
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...monsonc
 
Securing Windows with Group Policy
Securing Windows with Group PolicySecuring Windows with Group Policy
Securing Windows with Group PolicyJosh Rickard
 
GWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
GWAVACon 2015: Microsoft MVP - Exchange Architecture & SizingGWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
GWAVACon 2015: Microsoft MVP - Exchange Architecture & SizingGWAVA
 
HDFS- What is New and Future
HDFS- What is New and FutureHDFS- What is New and Future
HDFS- What is New and FutureDataWorks Summit
 
HDFS_architecture.ppt
HDFS_architecture.pptHDFS_architecture.ppt
HDFS_architecture.pptvijayapraba1
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesSam Bowne
 
Windows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsWindows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsSimon May
 
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication SystemCSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication SystemHendrik van Run
 
How to Build a Compute Cluster
How to Build a Compute ClusterHow to Build a Compute Cluster
How to Build a Compute ClusterRamsay Key
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesSam Bowne
 
LESSON 1 - Windows Server 2008 R2 Configuration.pptx
LESSON 1 - Windows Server 2008 R2 Configuration.pptxLESSON 1 - Windows Server 2008 R2 Configuration.pptx
LESSON 1 - Windows Server 2008 R2 Configuration.pptxJoeyOrale2
 
Managing Remote Teams
Managing Remote TeamsManaging Remote Teams
Managing Remote TeamsDell World
 
Double-Take for Migrations - thinkASG University Series
Double-Take for Migrations - thinkASG University SeriesDouble-Take for Migrations - thinkASG University Series
Double-Take for Migrations - thinkASG University SeriesthinkASG
 

Similar to MCSA Installing & Configuring Windows Server 2012 70-410 (20)

70-410 Practice Test
70-410 Practice Test70-410 Practice Test
70-410 Practice Test
 
Azure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun AnlatımAzure IaaS Tanıtım - Uzun Anlatım
Azure IaaS Tanıtım - Uzun Anlatım
 
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
Teradata Partners 2011 - Utilizing Teradata Express For Development And Sandb...
 
Securing Windows with Group Policy
Securing Windows with Group PolicySecuring Windows with Group Policy
Securing Windows with Group Policy
 
GWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
GWAVACon 2015: Microsoft MVP - Exchange Architecture & SizingGWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
GWAVACon 2015: Microsoft MVP - Exchange Architecture & Sizing
 
Dns firewalls null-may2020
Dns firewalls null-may2020Dns firewalls null-may2020
Dns firewalls null-may2020
 
HDFS- What is New and Future
HDFS- What is New and FutureHDFS- What is New and Future
HDFS- What is New and Future
 
HDFS_architecture.ppt
HDFS_architecture.pptHDFS_architecture.ppt
HDFS_architecture.ppt
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
Windows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in LeedsWindows Server 2012 R2 at VMUG.org in Leeds
Windows Server 2012 R2 at VMUG.org in Leeds
 
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication SystemCSD-2881 - Achieving System Production Readiness for IBM PureApplication System
CSD-2881 - Achieving System Production Readiness for IBM PureApplication System
 
Cl212
Cl212Cl212
Cl212
 
How to Build a Compute Cluster
How to Build a Compute ClusterHow to Build a Compute Cluster
How to Build a Compute Cluster
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
TenT-Day01.pptx
TenT-Day01.pptxTenT-Day01.pptx
TenT-Day01.pptx
 
TenT-Day01.pptx
TenT-Day01.pptxTenT-Day01.pptx
TenT-Day01.pptx
 
LESSON 1 - Windows Server 2008 R2 Configuration.pptx
LESSON 1 - Windows Server 2008 R2 Configuration.pptxLESSON 1 - Windows Server 2008 R2 Configuration.pptx
LESSON 1 - Windows Server 2008 R2 Configuration.pptx
 
Managing Remote Teams
Managing Remote TeamsManaging Remote Teams
Managing Remote Teams
 
Hyper-v Best Practices
Hyper-v Best PracticesHyper-v Best Practices
Hyper-v Best Practices
 
Double-Take for Migrations - thinkASG University Series
Double-Take for Migrations - thinkASG University SeriesDouble-Take for Migrations - thinkASG University Series
Double-Take for Migrations - thinkASG University Series
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

MCSA Installing & Configuring Windows Server 2012 70-410

  • 1. MCSA (E) History of Microsoft certificates MCSE – MCITP – MCSE Validity of MCSA certificate
  • 2.
  • 3. Course Topics • Windows Management (Installation, Modifying installation, Core) • Active Directory • Accounts (Users, Computers, OUs, and Groups) • Group Policy • Networking (IPv4, IPv6, DHCP, and DNS) • Managing Storage
  • 4. • License (Editions) • Prerequisites (HW, Apps, Storage Drivers) • Testing on Virtual Machine • BACKUP • Installation Modes Installing Windows 2012 R2
  • 6. Switching between modes • Full – Core - Minimal • GUI needs Vs Core advantages Features on demand • Security, space • If we needed it later? • Online or to an Offline VHD Adding roles to offline VHDs
  • 7. • PowerShell • CMD • Alias • SConfig • RDP Configuring Core
  • 8. WinRM (Mostly for monitoring) RSAT (Useful for desktops) Another Server With Same Role Non-domain joined computer (FW rule, PS script) Remote Management
  • 9. Active Directory Each server has its own password policy (complexity, expiration, etc.), different companies, and many users for each server
  • 10. Domain Vs Workgroup DC redundancy Domain naming Parent, child, tree, and forest Trust between domains Active Directory
  • 11. Domain Controllers Installation ADDS + Promoting to DC Redundancy Adding extra DCs (Same subnet, IFM, Script) Uninstalling (demoting) DC
  • 12. AD DC Upgrade FFL DFL Global Catalog SRV Records Domain Controllers
  • 14. What is SID? Creating Accounts Creating Template Accounts Joining a Computer Online Offline Inactive & Disabled Accounts AD Users & Computers
  • 15. SID, Username, & PW Secure Channel Broken Secure Channel AD Computers Accounts
  • 16. DC Promo AD AC Recycle Bin Fine-grained Passwords Extra
  • 17. Automate Accounts Creation LDIFDE: Lightweight Data Interchange Format, Data Exchange CSVDE: Comma Separated Value Data Exchange.
  • 18. LDIFDE: dn: “cn=Elizabeth Andersen,ou=Research,dc=adatum,dc=com” changetype: add (or modify, delete) ObjectClass: user SAMAccountName: eander UserPrincipalName: eander@adatum.com telephoneNumber: 586-555-1234 Then, save it with .ldf and run: ldifde –i –f <filename.ldf> CSVDE: dn,samAccountName,userPrincipalName,telephoneNumber,objectCla ss “cn=Elizabeth Andersen,ou=Research,dc=adatum,dc=com”,eander,eander@adatu m.com,586-555-1234,user Then you run the command: csvde.exe -i -f <filename.csv>
  • 19. DSADD DSADD allows adding users to multiple OU; create OUs, computers, users dsadd ou ou=test,dc=northwindtraders,dc=com dsadd user “cn=test321,ou=sales,dc=dabbas,dc=com” -disable no DSquery, Dsmod, DSget, DSMove, DSRm Check the notes file
  • 20. PowerShell CSV file (first line is parameters) Import-Csv .CSVimport.csv | foreach-object {$userprincipalname = $_.SamAccountName + "@{domainname}.com"
  • 21. Groups Why we use Groups? Are OUs Groups? Type of Groups
  • 23. Organizational Units What OU can contain? Simplifying Administration Permissions on OUs? OUs & GPOs?
  • 24. Users & Computers are Containers RedirUser & RedirCmp Accidental Deletion Delegation Delegation Templates Organizational Units
  • 25. Networking – IPv4 What is IP? Public Vs Private IPs
  • 26. Subnetting & Default Gateway Hosts IP Assignments Exercises
  • 27.
  • 29. Networking – IPv6 Hexadecimal Notation Addressing – 128 Bits – 8 of 16 Bits blocks Shortening Address Rules
  • 31. Addresses Types: Link Local: Starts with FE80 Unique Local (Site Local): Starts with FD Global
  • 32. Communications Type: • Unicast: One to One • Multicast: One to Many • Anycast: One to Closest • No Broadcast as in IPv4
  • 33. Transition to IPv6 • Dual Stack Routers • Tunneling (6to4 & 4to6) • Intra-Site Automatic Tunnel Addressing Protocol ISATAP • Teredo
  • 34. Group Policy What are GPOs & Why we use them? Where GPO Files are saved? GPOs Types: Local GPO Non-Local GPO Creating & Managing a Local GPO Non-Local Overwrites Local GPOs
  • 35. Domain (Non-Local) GPOs Creating a GPO Linking (Applying) to an OU Blocking Top GPOs on a specific OU Enforcing Blocked GPO! How long GPO takes to be applied?
  • 36. Templates GPOs Pre-defined GPOs Can be downloaded Multiple OSs? Central Store Useful to avoid OSs diff. templates Found under “PolicyDefinitions” www.gpanswers.com
  • 37. Scope of Management • User (Computer) Should be linked to Users (Computers) OUs • Policies are Cumulative • Computer overwrites User Processing Order Local > Site > Domain > OU > OU Authenticated Users
  • 38. Starter GPOs Policies Vs. Preferences Policies Preferences Settings are permanent (greyed out UI) User can change settings (drive map Applied at startup, logon, refresh Same as policies, option to do not reapply Removing policy reverts to defaults Does not revert back automatically Takes precedence over preferences not available for local GPO Useful for: preventing installing apps, prevent changing backgrounds Useful for: desktop icons, shortcuts, add URL on desktop, drive map, file copy, update
  • 39. GPO Permissions • Who have Full perm. By default? • Delegate Permission GPO Security Settings Comp. > Policies > Win. > Sec. User Tokens (Standard & Admin Tokens) Security Templates Security Configuration & Analysis
  • 40. Software Restriction Policy & Applocker Software Restriction Policy Applocker Designed for legacy Windows (XP, 2003) Designed for Win 7/8, 2008 R2, 2012 Fairly easy to bypass Less easy to bypass All apps are allowed by defaults All apps are denied by defaults
  • 41. DHCP What is DHCP? Why it’s better than Static IP? Allocation Methods: • Dynamic • Automatic • Manual
  • 42. DORA Discover – Offer – Request – Ack. Common Parameters PXE & DHCP Relay Agent Extra: • DB Backup • Failover Options
  • 43. DNS What is DNS? Zones & Zones Types How DNS Works? Type of Queries (Recursive & Iterative) Type of Answers (Authoritative & Non-Authoritative)
  • 44. Forwarders: • Root Hints • Conditional Forwarders Stub Zones Manage Cache Records Types (Resource Records)
  • 45. Hyper-V What is Virtualization and Why? Benefits of Using Virtualization • Space, Power, Cooling • Less Management (at least centralized) • Optimize Resources to the max. • Greener, easier to backup, easier to replicate, etc.
  • 46. Hypervisor Hypervisor Types: • Type 1: Native or Bare Metal (Hyper- V) • Type 2: Hosted (VMWare Workstation) Hyper-V needs 64-Bit processor BIOS Should Support Virtualization RAM & Storage Consideration
  • 47. Enabling Hyper-V on Windows 8 & 8.1 Hyper-V Configuration Settings • Dynamic Memory • Smart Paging • Resource Metering • Guest Integration Services • Memory Buffer • Memory Weight
  • 48. Storage in Hyper-V VHD Max. 2 TB, VHDx up to 64 TB VHDx is more resilient How to modify VHD files? How to Change VHD size? Disk Mgmt.? Differencing drives Pass through disks Snapshots Fiber Channel Adapter
  • 49. Networking in Hyper-V Switches Types: • External • Internal • Private VLAN Configuring MAC
  • 50. Gen1 & Gen2 Gen2 can be used on 2012, 8, 8.1 64- bit only Hyper-V in R2 uses RDP (supports copy/paste, audio redirection) Online VHDx resize / shrink
  • 51. NIC Teaming: Teaming Switch Independent Static Teaming (Dependent) LACP (Dependent) Load Balancing Address Hash Hyper-V Port Dynamic
  • 52. Local Storage Disk Types, Basic & Dynamic Choosing Storage Type Depends on: • Amount of Storage needed • Number of Users (at the same time) • Data Sensitivity • Data Importance
  • 53. RAID Types: Simple Spanned Striped (RAID 0) Mirrored (RAID 1) Striped Set with Parity (RAID 5)
  • 54. File Systems (Must know, not directly required) File. Allocation Table FAT/FAT32/exFAT • No Security New TechFile System NTFS • Secured using Permissions • Encryption & Compression • Quotas • Auditing, File Tagging, Larger Files
  • 55. Resilient File System ReFS • File can have 16 Exabyte size • File Name Length is up to 32000 char. • High Resiliency • Backward Compatible • No Disk Quotas
  • 56. Creating VHD & VHDx through Disk Management Adding files to VHD & VHDx through Disk Management
  • 57. Storage Spaces in 2012 What is SAN? • Administration? Cost Wise? What about NAS? Virtual Disks (Not VHDs!) Storage Pools
  • 58. Virtual Disk Configuration Layout • Simple, Two or Three way Mirror, Parity Provisioning • Fixed, Thin Allocation • Data Store, Manual, Hot Spare
  • 59. Storage Spaces Using Enclosures • Approved JBOD: www.windowsservercatalog.com • 2U/4U Rack mounted, up to 70 Drives • Smart, can send not. to Windows about temp., storage status) • Redundant fan, Power
  • 60. Storage container not a self RAID Storage Spaces Tiering • Fast SSD for hot or pinned data • Slow HDD for cold data
  • 61. Share & NTFS Share Vs. NTFS permissions Share NTFS Network Only, no control over local access Local and Network access First line of defense Primary tool to control access Options are: Read, change, Full Much more Applies to folders only Applies to files & folders No inheritance Many options available for inheritance
  • 62. Share • Cumulative permissions apply (deny wins) • Can be combined with NTFS perms. • Administrative Share • Access-Based Enumeration NTFS • Change Owner • Inheritance apply order
  • 63. • Permission can be either additive or subtractive (start with all denied then allow, or start with all allow then deny) • Effective access: the result of applying these rules: •Deny overrides allow •Allow permissions are cumulative •Explicit perm takes precedence over inherited • Authorizing occurs to SID for users
  • 64. Offline Files • Applies to network shares • Files stay available when disconnected • High reliable sync. Mechanism • Can be configured using Offline settings or GPO • Needs to be enabled first, then apply on folders
  • 65. Disk Quotas • Limit disk usage • Enabled on volume level • Soft Quota & Hard Quota • File Server Resource Manager FSRM is handy • FSRM can apply quotas on folders, Windows Explorer on volumes only • File Screening, Data Deduplication • Storage Reports Management
  • 66. Volume Shadow Copy • Used in VM snapshots • Used by backup operations (Windows, Acronis) • Used for File Recovery In File Recovery: • Quick restore for accidental deletions • Scheduled • Used on the machine not only shares
  • 67. • VSS is configured under volume properties • VSS is replaced with File History, starting Win. 8 • On servers, enabled under driver properties under disk management • VSS by default creates two copies, at 7:00 AM and 12:00 PM
  • 68. Work Folders • Similar to Offline Files feature • Allows access to joined & non-joined domain workstations • Enables managing BYOD • Transparent conflict resolution • Hub-Spoke topology • Works with file screening, classification (can classify documents), quotas • Security policies for encryption, screen lock (data security if device was stolen)
  • 69. Work Folders Configuration Server Side: • Define appropriate users and groups • Add & configure “work folders” role • DNS (workfolders.domain.com) • Certificates • Proxy Client Side: • Control panel configuration • Access using “work folders”
  • 70. Printers Definitions: • Print Device • Printer • Print Server • Printer Driver Printing workflow: • PC > Printer > Driver > Print server > Print device
  • 71. Network printers & Local printers • Central Management, drivers, easier to install, queue management, less cost Printer Management MMC • Printers Filtering Creating multiple instances (objects) of a printer, if we want to give higher priority for managers
  • 72. Printing Options: • Direct print • Locally attached printer sharing • Network attached printing • Network attached printer sharing Printer Pool: Identical devices ONLY Adding 32-bit driver to a 64-bit server Easy Print
  • 73. Firewall Why Windows Firewall? Firewall Interfaces • Control Panel • Windows Firewall Advanced • NetSH • PowerShell • GPO
  • 74. Hardware Firewall & Software Firewall Firewall Modes: Domain • Work • Home • Public Opening port Vs. Allowing Application Connection security rules
  • 75. Importing & Exporting Rules Configuring Firewall under GPO Computer > Policies > Windows > Security > Windows FW with Advanced Security