The document discusses planning a Windows Server 2008 installation including hardware requirements, installing the server, and post-installation tasks. It also covers expanding networks by adding domain controllers, member servers, or standalone servers. Server Core installations and virtualization with Hyper-V are described.
This document chapter introduces Active Directory, describing its role as a directory service for a network. It explains Active Directory's physical structure of sites and domain controllers and logical structure of organizational units, domains, trees, and forests. It also covers installing Active Directory, the objects and schema that organize its data, and how group policies are used to remotely configure users and computers.
This chapter introduces Windows networking terminology and configuration. It describes the Network and Sharing Center interface and how to use the network map to view device connections. It also summarizes the TCP/IP protocol suite including IPv4 addressing and configuration, and provides an overview of the new IPv6 protocol with a larger address space and automatic configuration.
This document provides guidelines for managing user and group accounts in Active Directory. It discusses managing user accounts, including built-in accounts like Administrator and Guest. It also covers creating and modifying user accounts, using user templates, and understanding user properties. The document discusses managing user profiles, including roaming and mandatory profiles. It also describes different types of groups, including distribution, security, and scope (domain local, global, universal).
This document provides an overview of file systems, permissions, and sharing in Windows Server 2008. It describes the FAT and NTFS file systems, features like disk quotas and shadow copies in NTFS, and how to secure access to files using share and NTFS permissions. It also covers configuring and managing file sharing, default shares, and storage management tools.
This document provides an overview of Active Directory design and security concepts in Windows Server 2008. It discusses organizing users and computers into organizational units and how to delegate control to other users. The document also covers forests, trees, domains and the components of an Active Directory site, including domain controllers and replication. It provides information on permissions, access control lists, and inheritance as they relate to Active Directory security.
This document provides an overview of Windows Server 2008 and Active Directory. It describes the editions of Windows Server 2008, their key features and requirements. It also summarizes the main roles a Windows Server 2008 computer can fulfill like file and printer sharing, DNS, DHCP, Active Directory etc. Finally, it discusses some core technologies of Windows Server 2008 like NTFS, Active Directory, MMC and their functions.
This document provides an overview of managing a Windows Server 2003 environment, including:
1. It describes the different editions of Windows Server 2003 and the roles of standalone servers, member servers, and domain controllers.
2. It explains the goals of Windows Server 2003 network administration and the concepts of workgroups and domains.
3. It provides an introduction to Active Directory, including its logical structure, domains and organizational units, trees and forests, and global catalog.
Learn Windows 2003 with this online training course from experienced consultant and trainer Grant Moyle. In this Windows Server training course, you'll learn the entire gamut from installation all the way to clustering.
http://www.learnitfirst.com/Course/232/Windows-2003.aspx
http://www.learnitfirst.com/PDFs/232-Windows-2003-Training.pdf
This document chapter introduces Active Directory, describing its role as a directory service for a network. It explains Active Directory's physical structure of sites and domain controllers and logical structure of organizational units, domains, trees, and forests. It also covers installing Active Directory, the objects and schema that organize its data, and how group policies are used to remotely configure users and computers.
This chapter introduces Windows networking terminology and configuration. It describes the Network and Sharing Center interface and how to use the network map to view device connections. It also summarizes the TCP/IP protocol suite including IPv4 addressing and configuration, and provides an overview of the new IPv6 protocol with a larger address space and automatic configuration.
This document provides guidelines for managing user and group accounts in Active Directory. It discusses managing user accounts, including built-in accounts like Administrator and Guest. It also covers creating and modifying user accounts, using user templates, and understanding user properties. The document discusses managing user profiles, including roaming and mandatory profiles. It also describes different types of groups, including distribution, security, and scope (domain local, global, universal).
This document provides an overview of file systems, permissions, and sharing in Windows Server 2008. It describes the FAT and NTFS file systems, features like disk quotas and shadow copies in NTFS, and how to secure access to files using share and NTFS permissions. It also covers configuring and managing file sharing, default shares, and storage management tools.
This document provides an overview of Active Directory design and security concepts in Windows Server 2008. It discusses organizing users and computers into organizational units and how to delegate control to other users. The document also covers forests, trees, domains and the components of an Active Directory site, including domain controllers and replication. It provides information on permissions, access control lists, and inheritance as they relate to Active Directory security.
This document provides an overview of Windows Server 2008 and Active Directory. It describes the editions of Windows Server 2008, their key features and requirements. It also summarizes the main roles a Windows Server 2008 computer can fulfill like file and printer sharing, DNS, DHCP, Active Directory etc. Finally, it discusses some core technologies of Windows Server 2008 like NTFS, Active Directory, MMC and their functions.
This document provides an overview of managing a Windows Server 2003 environment, including:
1. It describes the different editions of Windows Server 2003 and the roles of standalone servers, member servers, and domain controllers.
2. It explains the goals of Windows Server 2003 network administration and the concepts of workgroups and domains.
3. It provides an introduction to Active Directory, including its logical structure, domains and organizational units, trees and forests, and global catalog.
Learn Windows 2003 with this online training course from experienced consultant and trainer Grant Moyle. In this Windows Server training course, you'll learn the entire gamut from installation all the way to clustering.
http://www.learnitfirst.com/Course/232/Windows-2003.aspx
http://www.learnitfirst.com/PDFs/232-Windows-2003-Training.pdf
Microsoft Windows Server 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
This document summarizes a presentation about Windows Server 2012 R2. It begins with an agenda that includes trends, challenges, capabilities, and momentum. It then discusses customer challenges around scalability, manageability, applications, and access. Next it outlines capabilities in virtualization, storage, networking, management, web/apps, access/security, and VDI. Examples of customer deployments and testimonials are provided. It concludes by recommending further resources on Windows Server and cloud optimization.
MCSA Installing & Configuring Windows Server 2012 70-410omardabbas
Highlights of the main topics requested for the 70-410 exam, covering main subjects with some info and details about most points and minor subjects requested
This document summarizes the server configuration and Active Directory setup at a school. It describes the primary and secondary ESXi servers that run domain controllers, file servers, backup servers, and terminal servers. It explains how the domain controllers manage computers and users across different domains, including the staff1, student1, and root ocaat1 domains. It provides instructions for adding user accounts, setting up group policies, configuring the DHCP and DNS servers, and establishing file sharing permissions.
Windows Server 2008 provides improvements in several key areas over previous versions:
- It enables more efficient delivery of web-based experiences through improved administration and development tools, as well as lower infrastructure costs.
- Its virtualization technology allows for cost reductions, increased hardware utilization, optimized infrastructure, and improved server availability.
- Security is enhanced through a hardened operating system and innovations like Network Access Protection and Federated Rights Management that provide unprecedented network and data protection.
This document provides an overview of Windows Server 2008. It describes the editions of Windows Server 2008, including Standard, Enterprise, and Datacenter editions. It explains how to install the Enterprise edition, covering the system requirements and 5 step installation process. It introduces Server Manager, the new console for managing server roles and features. It describes key server roles like Active Directory Domain Services, DHCP Server, and DNS Server. It also outlines some protection and security tools available in Windows Server 2008 like BitLocker, EFS, and NAP. Finally, it lists some command line tools that can be used to manage roles, features, and tasks.
The document provides information about fundamentals of Windows Server 2008-R2 including chapters on installation of Server 2008, planning storage solutions, Active Directory, creating users and groups, FSMO roles, DHCP server, and child domain controllers. The key points discussed are the minimum hardware requirements for Server 2008, different storage technologies and RAID levels, components of Active Directory like objects and domains, commands for creating users and groups, roles of FSMO components, advantages of additional domain controllers, and concepts related to DHCP servers like scopes, address pools, and reservations.
Active Directory Domain Services (AD DS) is an identity and access management solution that stores information about users and groups, authenticates identities using Kerberos authentication, and controls access. It consists of an Active Directory data store, domain controllers that perform authentication and other services, domains, forests, trees, and functional levels. Installing AD DS requires permissions, network configuration, server requirements, and following the installation process which can be done in advanced mode or from installation media. Domain controller roles include global catalog servers and operations masters, and time synchronization is provided by the PDC emulator and Windows Time service.
This document provides an overview of Active Directory Domain Services (AD DS) and instructions for installing domain controllers. It covers the following key points:
- AD DS has both logical components like domains, forests and organizational units, as well as physical components like domain controllers and global catalog servers.
- A domain controller authenticates users, authorizes access, and holds a copy of the domain database. At least two domain controllers are recommended for availability.
- Domain controllers use Kerberos authentication and the global catalog stores partial attributes for objects across forests to enable cross-forest queries.
- Installing a domain controller can be done from Server Manager, on Server Core, by upgrading an existing controller, or using install
Windows Server 2008 R2 provides regular, compatible server releases with targeted innovations. It focuses on improvements to management, virtualization including live migration, scalability up to 256 cores, and reliability. New features include DirectAccess for remote access, BranchCache to improve branch office performance, and expanded remote desktop services.
This document contains training notes for the MCITP Windows Server 2008 Active Directory 70-640 exam. It covers several topics in multiple lectures, including:
- The basics of Active Directory, domains, forests, and domain controllers
- Installing Active Directory on two domain controllers and configuring replication
- Remote desktop configuration on client and server sides
- Active Directory objects like users, groups, and organizational units and how to create them
The notes provide information on key Active Directory concepts and step-by-step instructions for common administrative tasks to help prepare for the 70-640 exam.
The document provides information about configuring and administering a server. It discusses server specifications, compatibility, configuration and testing. It defines what a server and network operating system are. The document outlines different server types including file, print, application, mail, terminal and remote access servers. It also covers client support, communication, users and groups, Windows server editions, UNIX/Linux servers, network computer groups, and items that need to be configured on a server like services, authentication, and authorization.
Trust relationships allow secure communication between domains by authenticating objects in one domain for use in another. There are default trusts between parent and child domains as well as forest root domains. Other trusts can be manually created. Forest-to-forest trusts allow transitive trust relationships between Windows Server 2003 or later forests.
Windows Server 2008 can fulfill various server roles like file/print sharing, web server, DNS, DHCP, and Active Directory. It is available in Standard, Enterprise, and Datacenter editions. The presentation discusses the roles, editions, new features like Server Core, and technologies like Active Directory, DNS, DHCP, and file services.
This document provides an overview of a training module that introduces managing a Windows Server 2008 environment. It covers server roles, Active Directory, and administrative tools for Windows Server 2008. The module contains 4 lessons that discuss server roles, an overview of Active Directory including domains and forests, Windows Server 2008 administrative tools, and using Remote Desktop for administration. It concludes with a lab on administering Windows Server 2008.
This document provides an overview of server management in Windows Server 2008, including primary management tools, initial configuration tasks, alternative management tools, and technical background information. It discusses tools like Server Manager Console, Windows PowerShell, and Remote Management. It also covers managing Server Core installations, centralized application access with Terminal Services, and using a Terminal Services Gateway.
Windows Server 2008 Active Directory Guidewebhostingguy
This document provides guidance for planning and designing an Active Directory infrastructure in Windows Server 2008. It outlines key decisions regarding the forest, domains, organizational units, domain controllers, sites and replication. The guidance aims to clarify the planning process and relate design options to business needs and technical considerations like performance, scalability and security.
This document provides an overview of installing Windows Server 2012, including selecting editions, performing clean installations, using Server Core and the minimal interface, upgrading servers, and migrating roles. Key points covered include the system requirements, editions, roles, and licensing models of Windows Server 2012. Instructions are provided for clean installations, upgrading existing servers, and migrating roles between servers using the Windows Server Migration Tools.
This course is designed for IT professionals who need training on Microsoft Windows 2003 and 2008 networks in order to obtain certifications like MCITP and MCTS. It will cover topics like Active Directory, DNS, DHCP, IIS and other server technologies. Students will learn how to design, implement and support Windows networks through lectures from experienced engineers and hands-on labs and demos.
This document introduces Active Directory Domain Services (AD DS) and discusses key concepts related to identity and access management. It explains that AD DS provides identity and access solutions for enterprises by storing user and system identity information, authenticating identities, and authorizing access to resources. The document outlines the authentication process and how access tokens and security descriptors are used to determine authorization. It positions Active Directory as centralizing the identity store to create a trusted domain model that solves management issues in a workgroup configuration.
A domain controller is a server that authenticates users and enforces security policies on a network domain. It stores user account information and allows access to domain resources. The primary responsibilities of a domain controller are to authenticate users when they log in and check their credentials to grant or deny network access. Domain controllers are typically deployed in clusters to ensure high availability. In Microsoft Windows environments, one domain controller acts as the primary domain controller while others act as backup domain controllers.
The document discusses darknet, which is an anonymous network that connects trusted peers using non-standard protocols and ports. It was originally used for military communications and is based on assumptions about the distribution and sharing of online objects. Darknet provides advantages like privacy and independence but also enables disadvantages like illegal drugs, weapons, pornography, and human trafficking. It may impact e-commerce through security and traceability issues and hackers targeting financial information. Trends over the next two years may include more anonymous groups helping or harming businesses and illegal virtual transactions.
This document is the first part of a software testing guide book. It was written by 38 authors and provides fundamentals on software testing. It is copyrighted by SofTReL in 2004 and can be copied and modified under the GNU Free Documentation license.
Microsoft Windows Server 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
This document summarizes a presentation about Windows Server 2012 R2. It begins with an agenda that includes trends, challenges, capabilities, and momentum. It then discusses customer challenges around scalability, manageability, applications, and access. Next it outlines capabilities in virtualization, storage, networking, management, web/apps, access/security, and VDI. Examples of customer deployments and testimonials are provided. It concludes by recommending further resources on Windows Server and cloud optimization.
MCSA Installing & Configuring Windows Server 2012 70-410omardabbas
Highlights of the main topics requested for the 70-410 exam, covering main subjects with some info and details about most points and minor subjects requested
This document summarizes the server configuration and Active Directory setup at a school. It describes the primary and secondary ESXi servers that run domain controllers, file servers, backup servers, and terminal servers. It explains how the domain controllers manage computers and users across different domains, including the staff1, student1, and root ocaat1 domains. It provides instructions for adding user accounts, setting up group policies, configuring the DHCP and DNS servers, and establishing file sharing permissions.
Windows Server 2008 provides improvements in several key areas over previous versions:
- It enables more efficient delivery of web-based experiences through improved administration and development tools, as well as lower infrastructure costs.
- Its virtualization technology allows for cost reductions, increased hardware utilization, optimized infrastructure, and improved server availability.
- Security is enhanced through a hardened operating system and innovations like Network Access Protection and Federated Rights Management that provide unprecedented network and data protection.
This document provides an overview of Windows Server 2008. It describes the editions of Windows Server 2008, including Standard, Enterprise, and Datacenter editions. It explains how to install the Enterprise edition, covering the system requirements and 5 step installation process. It introduces Server Manager, the new console for managing server roles and features. It describes key server roles like Active Directory Domain Services, DHCP Server, and DNS Server. It also outlines some protection and security tools available in Windows Server 2008 like BitLocker, EFS, and NAP. Finally, it lists some command line tools that can be used to manage roles, features, and tasks.
The document provides information about fundamentals of Windows Server 2008-R2 including chapters on installation of Server 2008, planning storage solutions, Active Directory, creating users and groups, FSMO roles, DHCP server, and child domain controllers. The key points discussed are the minimum hardware requirements for Server 2008, different storage technologies and RAID levels, components of Active Directory like objects and domains, commands for creating users and groups, roles of FSMO components, advantages of additional domain controllers, and concepts related to DHCP servers like scopes, address pools, and reservations.
Active Directory Domain Services (AD DS) is an identity and access management solution that stores information about users and groups, authenticates identities using Kerberos authentication, and controls access. It consists of an Active Directory data store, domain controllers that perform authentication and other services, domains, forests, trees, and functional levels. Installing AD DS requires permissions, network configuration, server requirements, and following the installation process which can be done in advanced mode or from installation media. Domain controller roles include global catalog servers and operations masters, and time synchronization is provided by the PDC emulator and Windows Time service.
This document provides an overview of Active Directory Domain Services (AD DS) and instructions for installing domain controllers. It covers the following key points:
- AD DS has both logical components like domains, forests and organizational units, as well as physical components like domain controllers and global catalog servers.
- A domain controller authenticates users, authorizes access, and holds a copy of the domain database. At least two domain controllers are recommended for availability.
- Domain controllers use Kerberos authentication and the global catalog stores partial attributes for objects across forests to enable cross-forest queries.
- Installing a domain controller can be done from Server Manager, on Server Core, by upgrading an existing controller, or using install
Windows Server 2008 R2 provides regular, compatible server releases with targeted innovations. It focuses on improvements to management, virtualization including live migration, scalability up to 256 cores, and reliability. New features include DirectAccess for remote access, BranchCache to improve branch office performance, and expanded remote desktop services.
This document contains training notes for the MCITP Windows Server 2008 Active Directory 70-640 exam. It covers several topics in multiple lectures, including:
- The basics of Active Directory, domains, forests, and domain controllers
- Installing Active Directory on two domain controllers and configuring replication
- Remote desktop configuration on client and server sides
- Active Directory objects like users, groups, and organizational units and how to create them
The notes provide information on key Active Directory concepts and step-by-step instructions for common administrative tasks to help prepare for the 70-640 exam.
The document provides information about configuring and administering a server. It discusses server specifications, compatibility, configuration and testing. It defines what a server and network operating system are. The document outlines different server types including file, print, application, mail, terminal and remote access servers. It also covers client support, communication, users and groups, Windows server editions, UNIX/Linux servers, network computer groups, and items that need to be configured on a server like services, authentication, and authorization.
Trust relationships allow secure communication between domains by authenticating objects in one domain for use in another. There are default trusts between parent and child domains as well as forest root domains. Other trusts can be manually created. Forest-to-forest trusts allow transitive trust relationships between Windows Server 2003 or later forests.
Windows Server 2008 can fulfill various server roles like file/print sharing, web server, DNS, DHCP, and Active Directory. It is available in Standard, Enterprise, and Datacenter editions. The presentation discusses the roles, editions, new features like Server Core, and technologies like Active Directory, DNS, DHCP, and file services.
This document provides an overview of a training module that introduces managing a Windows Server 2008 environment. It covers server roles, Active Directory, and administrative tools for Windows Server 2008. The module contains 4 lessons that discuss server roles, an overview of Active Directory including domains and forests, Windows Server 2008 administrative tools, and using Remote Desktop for administration. It concludes with a lab on administering Windows Server 2008.
This document provides an overview of server management in Windows Server 2008, including primary management tools, initial configuration tasks, alternative management tools, and technical background information. It discusses tools like Server Manager Console, Windows PowerShell, and Remote Management. It also covers managing Server Core installations, centralized application access with Terminal Services, and using a Terminal Services Gateway.
Windows Server 2008 Active Directory Guidewebhostingguy
This document provides guidance for planning and designing an Active Directory infrastructure in Windows Server 2008. It outlines key decisions regarding the forest, domains, organizational units, domain controllers, sites and replication. The guidance aims to clarify the planning process and relate design options to business needs and technical considerations like performance, scalability and security.
This document provides an overview of installing Windows Server 2012, including selecting editions, performing clean installations, using Server Core and the minimal interface, upgrading servers, and migrating roles. Key points covered include the system requirements, editions, roles, and licensing models of Windows Server 2012. Instructions are provided for clean installations, upgrading existing servers, and migrating roles between servers using the Windows Server Migration Tools.
This course is designed for IT professionals who need training on Microsoft Windows 2003 and 2008 networks in order to obtain certifications like MCITP and MCTS. It will cover topics like Active Directory, DNS, DHCP, IIS and other server technologies. Students will learn how to design, implement and support Windows networks through lectures from experienced engineers and hands-on labs and demos.
This document introduces Active Directory Domain Services (AD DS) and discusses key concepts related to identity and access management. It explains that AD DS provides identity and access solutions for enterprises by storing user and system identity information, authenticating identities, and authorizing access to resources. The document outlines the authentication process and how access tokens and security descriptors are used to determine authorization. It positions Active Directory as centralizing the identity store to create a trusted domain model that solves management issues in a workgroup configuration.
A domain controller is a server that authenticates users and enforces security policies on a network domain. It stores user account information and allows access to domain resources. The primary responsibilities of a domain controller are to authenticate users when they log in and check their credentials to grant or deny network access. Domain controllers are typically deployed in clusters to ensure high availability. In Microsoft Windows environments, one domain controller acts as the primary domain controller while others act as backup domain controllers.
The document discusses darknet, which is an anonymous network that connects trusted peers using non-standard protocols and ports. It was originally used for military communications and is based on assumptions about the distribution and sharing of online objects. Darknet provides advantages like privacy and independence but also enables disadvantages like illegal drugs, weapons, pornography, and human trafficking. It may impact e-commerce through security and traceability issues and hackers targeting financial information. Trends over the next two years may include more anonymous groups helping or harming businesses and illegal virtual transactions.
This document is the first part of a software testing guide book. It was written by 38 authors and provides fundamentals on software testing. It is copyrighted by SofTReL in 2004 and can be copied and modified under the GNU Free Documentation license.
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSForgeRock
The document discusses new innovations in identity relationship management, consent, privacy, and user-managed access. It introduces UMA, a draft standard for authorization that profiles OAuth 2.0 and includes a set of authorization, privacy, and consent APIs. UMA allows for interoperable, RESTful authorization-as-a-service and outsources protection to a centralized authorization server while respecting user policies for selective sharing. The OpenUMA community project aims to advance UMA and invites participation.
This document provides an agenda for an introductory course on T-SQL. The course will cover topics such as null values, distinct, having vs where clauses, data types, creating and modifying tables, joins, subqueries, functions, errors, variables, control flow and stored procedures. It provides background that SQL was first introduced in 1970 and was developed by Donald Chamberlin and Raymond Boyce at IBM as SEQUEL, later changed to SQL. The next session will cover writing basic queries.
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
Eve Maler, VP Innovation & Emerging Technology, ForgeRock:
Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and people
have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are
recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. The
User-Managed Access (UMA) standard and ForgeRock’s OpenUMA project are stepping into the
breach to give individuals a convenient central hub for proactively authorizing who and what can get
access to their personal data and content.
This document provides an agenda for a T-SQL training session. It discusses selecting a database management system (SQL Server) and database (PUBS) to use. It introduces basic SQL concepts like databases, tables, connecting to a database. It demonstrates simple SELECT queries, concatenating columns, using aliases. It also covers filtering queries using WHERE clauses with comparison operators, compound criteria with AND/OR, ranges, wildcards, escape characters and pattern matching. Negation is also introduced using NOT and comparison operators.
This document provides an overview of the deep web and dark web. It defines the deep web as parts of the internet not indexed by traditional search engines, while the dark web can only be accessed through tools like Tor and cannot be accessed by normal browsers. It explains how to access the dark web safely using Tor, discusses staying secure by avoiding JavaScript, updating browsers daily, and using secure passwords. Overall, the document aims to explain what the deep/dark web are and how to safely explore the dark web.
This document provides information about an upcoming SQL Saturday Night event on March 30, 2013 that will focus on using T-SQL. The presentation will be recorded so that those unable to attend can view it later. Attendees are asked to change their virtual cards to a specific color if they are unable to hear the presenter. The presentation will be free and begin in 1 minute.
Knowing how to say NO with positive results is a big boost in career development, management excellence, time management and stress release ... resulting in better performance at work and higher personal satisfaction. A work-life balance best practice.
The document discusses the deep web and dark web, including that the deep web contains content not indexed by standard search engines and comprises over 97% of all web content. It notes various types of content found in the deep web, both legal like government databases and private sites, as well as illegal uses like drug dealing, human trafficking, and criminal activities. The document lists several example dark web sites related to these activities and warns to beware when exploring the hidden secrets of the deep and dark web.
I2P is an anonymous network layer that provides stronger privacy protections than Tor. It uses garlic routing, message bundling and end-to-end encryption over short-lived tunnels to obscure a user's location and activities. Sites hosted on I2P, called eepsites, can only be accessed by other users on the network. While smaller than Tor currently, I2P offers increased security through its fully distributed architecture with no centralized points of control or surveillance.
The document discusses the deep/dark web and its history. It defines the deep web as content not indexed by standard search engines, comprising 96% of the digital universe. The surface web is the visible web accessed through sites like Google and Facebook. The dark web requires tools like TOR to access and aims to conceal users' identities and activities. It describes the deep web's early use for military communication and research and how sites like Silk Road later used bitcoin for anonymous transactions of illegal goods.
The document discusses the dark web and deep web. It explains that the deep web refers to internet content not indexed by search engines, while the dark web specifically refers to illicit online activities accessible through tools providing anonymity. It outlines how to access the dark web using technologies like Tor and "onion" pages. Some reasons for accessing it include anonymity, freedom of access, and circumventing censorship, though illicit activity also takes place. Examples of dark web sites providing various services are listed.
The document discusses the software development life cycle (SDLC), including its objectives, main phases, and models. The key phases are requirements analysis, design, coding, testing, and operation/maintenance. Common models include waterfall, prototyping, spiral, and rapid application development (RAD). Waterfall is classical but inflexible, while prototyping allows customer feedback. Spiral reduces risks through iterations. RAD emphasizes reuse and rapid iterations. The conclusion recommends the RAD model for mashup development due to its speed, customer involvement, and support for modularized, multi-platform work.
Saudi Arabia Vision 2030 رؤية المملكه العربيه السعوديه للإستغناء عن البترول ...Ashraf Osman
The document presents Saudi Arabia's Vision 2030, which aims to reduce the country's dependence on oil and diversify its economy. The vision is built on three pillars - Saudi Arabia's position as the heart of the Arab and Islamic worlds, its status as a global investment powerhouse, and its strategic geographic location connecting three continents. It outlines goals such as increasing non-oil revenues, improving living standards, and enhancing quality of life for all citizens. The vision also emphasizes promoting Saudi culture and heritage. It aims to transform the country into a global hub for tourism and entertainment, while staying true to Islamic values.
This document discusses upgrading to SQL Server 2012. It begins by stating the goals of modernizing platforms, discovering SQL Server 2012 resources, and helping businesses grow. It then discusses SQL Server 2012's abilities to improve availability, speed, compliance, productivity and other factors. Specific editions of SQL Server 2012 are presented as solutions to challenges around scaling, performance, accessibility and reducing costs. Real world examples are provided of companies benefiting from SQL Server 2012 capabilities like AlwaysOn, Power View and Data Quality Services. Licensing models are also summarized.
It's the summary of the book "The power of a positive No" -A positive No balance power and relationship in the service of your interests.
The presentation will tell you 1> Prepare-Uncover your core interests 2>Deliver a positive No 3>Follow through
This document provides an overview of Windows Server 2008, including its editions, core technologies, roles, and new features. It describes the function of a server operating system and lists common server roles like file/print sharing, web server, and Active Directory. The editions of Windows Server 2008 - Standard, Enterprise, and Datacenter - are explained in terms of licensing and hardware support. Core technologies like NTFS, Active Directory, MMC, disk management, and networking concepts are introduced. New features in Windows Server 2008 such as Server Manager, Server Core, Hyper-V, storage improvements, and new Active Directory roles are also highlighted.
Upgrading from WinS 2008/2008 R2 to WinS 2012iTawy Community
- Why Upgrade to Windows Server 2012?
- Operating System Hardware and Disk Space Requirements
- Supported Windows Clients and Servers
- Supported In-Place Upgrade Paths
- Functional Levels, Operation Master Roles, Active Directory Considerations
- Migration Tools for Windows Server 2012
- Hyper-V and Virtual Machines Considerations
- Summary
Modern Operating System Windows Server 2008Sneha Chopra
Windows Server 2008 shares the same code base as Windows Vista, bringing many of the same technical, security, management and administrative features to servers. It includes improvements to installation, deployment, recovery, diagnostics, monitoring, firewall security, and virtualization capabilities. A Server Core installation provides a minimal interface for remote administration via command line. Active Directory is expanded with additional identity, rights and certificate management services.
This document provides information about configuring and administering a server. It begins by outlining the steps for configuring and testing a server, including confirming server specifications, verifying compatibility and interoperability, and configuring and testing the server. It then defines what a server and network operating system are. The document discusses different types of servers like file servers, print servers, application servers, and more. It also covers topics like client support, client/server communication, users and groups, Windows Server 2003 and 2008 editions. Finally, it discusses servers in UNIX/Linux environments and network computer groups.
The document provides information about configuring and administering a server. It discusses server specifications, compatibility, and testing. It defines what a server and network operating system are. The document outlines types of servers including file, print, application, mail, terminal, remote access, domain controller, and DHCP servers. It also discusses client support, communication, users and groups, Windows Server 2003 and 2008 editions, UNIX/Linux, network computer groups, and configuring server software and items.
Active Directory is a directory service that stores information about users, groups, and computers on a network. Domain controllers host Active Directory and perform identity and access management. Administrators can create and manage user accounts locally or through a centralized Active Directory. User accounts must be properly planned, created, maintained, and secured to manage network access.
70-410 Installing and Configuring Windows Server 2012stowofro
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam.http://www.pass4suredumps.in/70-410.html
This document discusses servers and services in a network. It describes domain controllers, file and print servers, and server roles like Windows Internet Name Service (WINS) and Domain Name System (DNS). It also discusses Windows Server 2008 editions, reasons for using servers over desktops, best practices for running servers, and provides a case study of Nottingham Trent University's network infrastructure.
windows-server- 2019 installing and configuringapel7
- The document discusses Windows server editions from Windows Server 2003 to Windows Server 2019. It covers the different editions available and their key features like the number of users and CPUs supported.
- It also discusses installing and upgrading Windows Server, including methods like GUI installation, server core, and minimal server interface. Steps covered include preparing for upgrade, selecting editions, and post-installation configuration.
- Additional sections cover storage and disk management in Windows Server, including different storage types like basic, dynamic, mirrored and RAID configurations. It also discusses Active Directory and its role in providing identity services and organizing users and computers in a domain.
Windows Server 2016 introduces several new features including software defined storage, Hyper-V improvements, automation enhancements, and Nano Server. Storage Spaces Direct enables hyper-converged infrastructure, Storage Replica allows for volume replication, and Resilient File System provides improved integrity and performance. Hyper-V gains features like cluster rolling upgrades and shielded VMs. Automation is focused on a graphical authoring experience and Linux/Azure support. Nano Server offers a headless deployment optimized for cloud workloads.
A network operating system (NOS) is software that enhances a basic operating system with networking features to support workstations and PCs on a local area network. Examples include Novell Netware, Microsoft Windows Server, and Linux servers. A NOS provides features for security, file/print sharing, directories, and remote access. Common tasks involve user administration, backups, and security monitoring. A client accesses services from a server. Windows Server is designed for enterprise management while Linux servers offer flexibility and cost advantages. Peer-to-peer networks allow direct sharing while client/server uses centralized file servers.
This document provides an overview of the topics that will be covered in a two-day Microsoft Virtual Academy course on installing and configuring Windows Server 2012. Day one will cover deploying and managing Windows Server 2012, Active Directory Domain Services, networking, and DNS. Day two will cover local storage, file and print services, Group Policy, server virtualization, and security. The document also introduces the two presenters, Rick Claus and Ed Liberman, and provides expectations and objectives for the course.
This document provides an overview of a Microsoft Official Course on deploying and managing Windows Server 2012. The course contains 5 lessons: 1) an overview of Windows Server 2012, 2) installing Windows Server 2012, 3) post-installation configuration, 4) Windows Server 2012 management, and 5) an introduction to Windows PowerShell. It describes the objectives and topics that will be covered in each lesson, including Windows Server editions, roles, features, installation methods, domain joining, and using Windows PowerShell for administration.
Keynote talk on Windows 8 - Jeff StokesJeff Stokes
Windows 8 contains several enhancements including support for Windows 8 and Windows Server 2012 applications, limiting 3G/4G downloads to prevent unwanted data charges, and Windows To Go. It addresses challenges of managing mobile devices across platforms through integration with Configuration Manager 2012 SP1 to manage both corporate and personal devices from a single console. The Windows Intune service is now available in 87 countries worldwide. Client Hyper-V allows staging VMs on desktops that can then be transferred to Windows Server 2012 Hyper-V hosts.
Virtualization Uses - Server Consolidation Rubal Sagwal
Server Consolidation.
Why do we need Server Consolidation and what are the outcomes?
Benefits of Server consolidation
How to do server consolidation?
Server product architecture:
1. Virtual Machine
2. Guest OS
3. Host OS
What are server consolidation consideration?
Types of server consolidation.
Benefits of VMware over Server Consolidation.
VMware infrastructure.
Disaster recovery and backup plan.
RightScale discussed best practices for operating applications in the cloud based on their own experience running their PaaS platform in the cloud. Key practices included: using ServerTemplates to keep environments consistent, changing configurations rather than servers, monitoring efficiently with off-the-shelf and custom metrics, automating processes, and backing up databases across clouds. The presentation provided examples of how RightScale applies these practices in their own operations.
Moving Windows Applications to the CloudRightScale
This document summarizes a webinar about moving Windows to the cloud. It discusses:
- Key differences between Windows in the cloud vs on-premises like dynamic IP addresses, ephemeral instances, and bringing your own licenses.
- Challenges of Windows in the cloud like inconsistent images, inflexible pre-installed software, and lack of automation.
- How RightScale addresses these with consistent "RightImages", scriptable and versioned "ServerTemplates", and automation of deployments using "RightLink".
- A demonstration of automating user creation across servers using RightLink tags and remote execution.
- Next steps involve scripting application installation, enabling existing Windows images with Right
M.Ashokkumar has over 4 years of experience as a VMware and Windows administrator. He has expertise installing, configuring, and managing VMware ESX, vSphere, and Virtual Center as well as Windows servers, Active Directory, DHCP, and Group Policies. He is proficient in virtualization technologies, server administration, storage solutions, and ticketing tools.
The more components a system has, the more challenging its maintenance becomes. Oracle Exadata marries storage with computation through a fast, reliable network, and patching all of these seems daunting. Many companies seem to struggle with it, with some even avoiding it altogether by keeping it “pending.” This session presents tested, applied, and working tips to make the Oracle Exadata patching experience smooth as silk, like vacationing in Hawaii.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Mcts chapter 2
1. MCTS Guide to Configuring
Microsoft Windows Server 2008
Active Directory
Chapter 2: Installing Windows Server
2008
2. Objectives
• Plan a Windows Server 2008 installation
• Work with Server Core systems
• Use Hyper-V server virtualization
MCTS Windows Server 2008 Active Directory 2
3. Planning a Windows Server 2008
Installation
• Some networks require more planning than others
– Smaller networks will most likely only require a few decisions
before install can begin
– Larger networks will require more planning to ensure a
productive integration of the new server
• It is important to consider the environment and the
roles a server will play on the network prior to
beginning an install of Windows Server 2008
MCTS Windows Server 2008 Active Directory 3
4. Installing the First Server in a New Network
• Hardware is key, so consider:
– CPU architecture; AMD or Intel?
– Workstation or Server line processor; Server supports more
features
– Total number of physical processors
– Number of cores in each processor; Extra cores aren’t
necessarily as good as multiple physical processors
– 32-bit versus 64-bit
– Virtualization extensions
– Disk subsystem
– Hot-add/hot-replace features; ability to add memory or CPU
without shutting down the system
MCTS Windows Server 2008 Active Directory 4
5. Installing the First Server in a New Network
(cont.)
• Other things to consider:
– Name of the server
• Important for name resolution on the network
– Network protocols
• Some networks may use older protocols, such as IPX/SPX
– IP Address
• Having an efficient addressing scheme helps identify what a device might
be doing just by it’s address
– Time zone
• Important for authentication
– Workgroup or domain
• Workgroup is more suitable for smaller environments, domain provides
more advantages
– Server roles
• Will determine how the server is used
MCTS Windows Server 2008 Active Directory 5
6. Ready, Set, Install
• No longer a text portion of Windows install
• Choose which edition you want to install
– Full or core?
• Accept license terms and determine whether you
will upgrade or do a clean install
• Select disk to install to
– If you do not go to “Advanced” when selecting disks, the
installer will use NTFS by default for the file system.
• Set Administrator password after install
MCTS Windows Server 2008 Active Directory 6
9. Postinstallation Tasks
• Activate Windows Server 2008
– Activation should take place automatically, but if it doesn’t, it
must be done within 60 days after installation, or logons will be
disabled
• Set the correct date, time, and time zone
• Assign a static IP address
• Assign a computer name
• Configure automatic updates
• Download and install available updates
• Add and configure roles and features
MCTS Windows Server 2008 Active Directory 9
10. Installing Updates
• Patches
– Fix bugs and security issues
– Can be installed through Windows Update
• Service pack
– Collection of bug fixes and security updates
– May also add features and performance enhancements or
change the functionality of existing features
• Under default settings, Windows Update runs every
day at 3:00 a.m. to download and install new
updates
MCTS Windows Server 2008 Active Directory 10
12. Expanding Your Network
• When adding a new server, you must decide
whether the server will be one of the following:
– A domain controller (DC) in the existing domain
• Adding a second domain controller can reduce server load and
provide fault tolerance
– A read only domain controller (RODC) in the existing domain
• Can provide benefits similar to a DC’s, but is more suited for
branch offices
– A member server in the existing domain
• Falls under domain management but doesn’t run Active Directory
– A stand-alone server
• Doesn’t fall under domain management, but is part of a workgroup
MCTS Windows Server 2008 Active Directory 12
13. Expanding Your Network
• Reasons to add servers to a network:
– Company growth
• Ideal to plan for growth before server is overloaded
– Excessive load on existing servers
• Performance will gradually degrade on servers
– Need to isolate an application
• Adding new applications to an unused machine reduces the
workload of servers providing critical services
– Need for Fault tolerance
• Loss of access to server resources = reduction in productivity and
increase in costs. Enterprise Edition provides failover clustering to
ensure high availability
– Addition of branch offices
• Placing a server in a branch office can reduce WAN traffic
MCTS Windows Server 2008 Active Directory 13
14. Upgrading to Windows Server 2008
• The only previous Windows version supported for
upgrade is Windows Server 2003
• You can’t upgrade to a Server Core installation
• Cross-platform upgrades aren’t supported, so you
can upgrade only 32-bit to 32-bit, or 64-bit to 64-bit
• There’s no upgrade path to Windows Server 2008
Itanium Edition or Windows Web Server 2008
• You can’t upgrade to a different language
MCTS Windows Server 2008 Active Directory 14
15. Upgrading to Windows Server 2008 (cont.)
Current version Server 2008 upgrade path
Windows Server 2003 Standard Windows Server 2008 Standard or
Edition SP1, SP2, or R2 Enterprise Edition
Windows Server 2003 Enterprise Windows Server 2008 Enterprise
Edition SP1, SP2 or R2 Edition
Windows Server 2003 Datacenter Windows Server 2008 Datacenter
Edition SP1, SP2, or R2 Edition
MCTS Windows Server 2008 Active Directory 15
16. Upgrading to Windows Server 2008 (cont.)
• Microsoft recommends a clean installation instead
of an upgrade
• Upgrade is similar to clean install, with some
exceptions
– Instead of booting to the install media, the upgrade install
begins within the operating system to be upgraded
• Upgrading on a domain controller
– Consider changing Active Directory’s functional level
MCTS Windows Server 2008 Active Directory 16
17. Server Core: Windows That Doesn’t Do
Windows
• Server Core is suited for the following situations:
– Acting as a secondary DC to provide redundancy for Active
Directory
– Branch office servers when remote administration is likely
– RODC server role for a branch office server
– As a virtual machine to reduce the amount of resources used
– Specialized single role server providing services such as DNS,
DHCP, Web, or File Services
– Departmental server
MCTS Windows Server 2008 Active Directory 17
18. Windows Server Installation and
Postinstallation tasks
• Server Core installation is identical to a full
installation
• Command-line is the only option for configuring
many aspects of Server Core
• Server Core can be managed to some extent by
MMC on a remote machine
• Many network related tasks are handled in Server
Core by the net and netsh commands
MCTS Windows Server 2008 Active Directory 18
19. When Not to Use Server Core
• When it’s the first server in a network
• When you need to install server roles and features that
Server Core doesn’t support
• When the server administrator isn’t well versed in using
command-line programs
• When you need to run applications that require the Microsoft
.NET framework
• When you’re upgrading from Windows Server 2003 (No
upgrade path)
• When you want to run Windows Web Server 2008 (No
Server Core option)
• When you cannot live without a GUI running on your server
MCTS Windows Server 2008 Active Directory 19
20. Virtualize Your Server with Hyper-V
• A virtual machine (VM) is a collection of files
• Snapshots
– A set of files containing a virtual machine’s state at a particular
moment in time
– Can be useful in testing the stability of a server after installing
patches / applications
• A hypervisor is a layer of software between the
hardware and OSs that allows multiple OSs or
instances of the same OS to share physical
hardware resources.
MCTS Windows Server 2008 Active Directory 20
21. Virtualize Your Server with Hyper-V (cont.)
• Hyper-V manages CPU, memory, timer, and
interrupt hardware, and Windows Server 2008
manages the balance of hardware devices
• Host computer
– The physical server on which Windows Server 2008 is installed
• Host operating system
– Windows Server 2008 running Hyper-V
• Guest operating systems
– The virtual machines running on the host
MCTS Windows Server 2008 Active Directory 21
22. Virtualize Your Server with Hyper-V (cont.)
• Prerequisites for installing Hyper-V
– You must be running a 64-bit version of Windows Server 2008
Standard, Enterprise, or Datacenter Edition
– CPU must support virtualization extensions (AMD-V and Intel-
VT)
– Must have free disk space at least equal to the minimum
requirement for the OS you’re going to install
– Amount of RAM must be at least equal to the minimum amount
required for Windows Server 2008 plus the minimum amount
required for the OS you’re installing
MCTS Windows Server 2008 Active Directory 22
23. Reviewing the Benefits of Virtualization
• Solving server sprawl
– Server sprawl can occur when servers are added to a network
to host special applications
– Also happens when new servers are purchased to supplement
existing servers
• Virtual machines can be stopped, started, and
reconfigured without affecting the VM host
• Programs exist to convert physical machines to
virtual machines capable of being run on a host
MCTS Windows Server 2008 Active Directory 23
24. Reviewing the Benefits of Virtualization
(cont.)
• Simplifying training, testing, and Development
– VM’s supply a convenient venue for using several different
operating systems at once, without having to add additional
hard drives or remove an existing operating system
– Virtual machines can act as a test bed for new updates and
patches, so that administrators can monitor any issues that
might be involved
– Installing new applications that could potentially cause conflicts
on a production machine can be tested within a virtual
environment
– Software developers no longer need to run operating systems
on multiple machines to test compatibility; software can be
tested on several different operating systems simultaneously
with virtualization
MCTS Windows Server 2008 Active Directory 24
25. Creating Virtual Machines with Hyper-V
• Hyper-V Manager MMC
– Used to create virtual machines
• Virtual machine must first be created
– Steps required:
• Start the New Virtual Machine Wizard from Hyper-V Manager
• Give the new VM a descriptive name, such as “Read Only Domain
Controller 1”
• Choose a location for the VM
• Assign the amount of memory this VM requires
• Configure networking
• Create a virtual hard disk
• Install an OS
MCTS Windows Server 2008 Active Directory 25
27. Basic Virtual Machine Management with
Hyper-V Manager
• Running VM’s do no require a logged on user,
because they run in the background until you
connect to them
• To configure and manage a VM or access it locally,
you need to run Hyper-V manager
• If a snapshot exists for a virtual machine, a
screenshot will be shown to give a preview of the
saved state
MCTS Windows Server 2008 Active Directory 27
28. Basic Virtual Machine Management with
Hyper-V Manager (cont.)
MCTS Windows Server 2008 Active Directory 28
29. Basic Virtual Machine Management with
Hyper-V Manager (cont.)
• To connect to a VM, you can use the following
methods:
– Right-click the VM and click Connect
– Double-click the VM
– Select the VM and double-click its screen shot in the bottom
section
– Select the VM and click Connect in the Actions pane
MCTS Windows Server 2008 Active Directory 29
30. Basic Virtual Machine Management with
Hyper-V Manager (cont.)
• Virtual Machine Connection console
– Toolbar icons from left to right:
• Ctrl+Alt+Delete (Sends Ctrl+Alt+Delete keystroke to the VM)
• Start (Starts the VM)
• Turn off (turns off the VM)
• Shut Down (sends a signal to the OS to perform a shutdown)
• Save (saves the VM’s state, similar to Windows hibernation mode)
• Pause (pauses the VM, similar to Windows sleep mode)
• Reset (resets the VM)
• Snapshot (creates a snapshot of a VM)
• Revert (reverts to a snapshot of a VM)
MCTS Windows Server 2008 Active Directory 30
31. Basic Virtual Machine Management with
Hyper-V Manager (cont.)
MCTS Windows Server 2008 Active Directory 31
32. Chapter Summary
• Most of the work involved with Windows Server 2008 takes
place in the planning phase.
• A DVD is a common media from which to install Windows
Server 2008
• Postinstallation configuration tasks include giving the server
a name, configuring network protocols, setting time zone
information, selecting a network model, and installing and
configuring Windows Updates
• When adding new servers to an existing network, you must
decide whether the server will be: a domain controller, read
only domain controller, member server, or a stand-alone
server
MCTS Windows Server 2008 Active Directory 32
33. Chapter Summary (cont.)
• You can upgrade to Windows Server 2008 only if the existing
OS is Windows Server 2003
• Windows Server Core is a new installation option in
Standard, Enterprise, and Datacenter editions. Server Core
lacks the traditional Windows GUI, requiring most tasks to be
done via command-line
• Hyper-V server role can be installed only on 64-bit versions
of Windows Server 2008. Additional support must be
available from your processor.
• Virtual machines are managed in Hyper-V Manager, and
otherwise run in the background until connected to.
MCTS Windows Server 2008 Active Directory 33