Understanding Windows Server Administration …... Understanding Windows Server Administration Level...
Transcript of Understanding Windows Server Administration …... Understanding Windows Server Administration Level...
www.binarytitans.com
Understanding Windows Server AdministrationLevel 100
Ashwin Venugopal
BinaryTitans IT Solutions Pvt. Ltd.
www.binarytitans.com
www.binarytitans.com
What we are going to Learn here?
www.binarytitans.com
Content
Server Overview
Initial Configuration Tasks
Managing Storage
Essential Services
File and Print Services
Popular Windows Network Services and Applications
Monitoring and Troubleshooting Servers
www.binarytitans.com
Server Overview
www.binarytitans.com
Server Overview
Server - A computer that is a meant to be a dedicated service provider
Client - A computer that requests services.
System Administrators be working on a network that is made up of dedicated servers and clients.
www.binarytitans.com
Server Roles
When you are figuring out the hardware and software needs we need to look at the role the server needs to do and what kind of load does that need to take.
So a server role means the primary duty that the server performs.
A server could have multiple roles.
www.binarytitans.com
Primary Subsystems of a Server
Primary subsystems that make up a server are: Processor
Memory
Network
Storage
If any of these fails or under performs, it can compromise the service.
www.binarytitans.com
Processor
This is also called the brain of the computer.
Intel and AMD produce most of today’s server processors.
Qualcom and MediaTek produce most of the mobile processors.
Processors can be are 32 bit as well 64 bit
Server processors are mostly 64-bit, because it works faster thanthe older 32-bit processors.
www.binarytitans.com
RAM
RAM - random access memory - temporary memory.
It stores instructions and data and the processor accesses themdirectly.
If you have more RAM, you can load more instructions and data,making it faster and more efficient.
Windows Server 2012 R2 or the latest 2016 supports maximum of 4TB of RAM
www.binarytitans.com
Storage
Hard drives are generally half electronic/half mechanical devicesthat store magnetic fields on rotating platters.
Solid-state drives are electronic devices with no mechanicalcomponents.
Storage can be local storage
internal hard drives
external storage
network-attached storage (NAS)
storage area network (SAN).
www.binarytitans.com
Network
A good network connection is necessary for the server tocommunicate with other servers or the clients.
Most servers include more than one network interface cards orNICs.
We can combine multiple network cards together for performanceand redundancy reasons using NIC Teaming.
www.binarytitans.com
Motherboard
Motherboard brings these four subsystems together.
www.binarytitans.com
BIOS
Communication with disks, RAM, monitor etc are kept in theSystem ROM chips known as the BIOS (basic input/outputsystem).
BIOS helps the system to know how to communicate with somebasic components such as a keyboard.
The process of upgrading or updating your system ROM BIOS iscalled flashing the BIOS.
www.binarytitans.com
Power Supply and Cases
A case provides an enclosure that helps protect the systemcomponents that are inside.
A case with the power supplies and additional fans are usuallydesigned to provide a fair amount of airflow through the systemto keep the system cool.
www.binarytitans.com
Ports
Ports are plug sockets that enable you to connect an externaldevice, such as a printer, keyboard, mouse, or external drive, toyour computer.
www.binarytitans.com
Virtualization
Virtualization enables multiple operating systems to runconcurrently on a single physical machine.
This allows for a separation of services so that changes on onevirtual server do not affect the other virtual servers.
In addition, it offers a way to better utilize hardware since mosthardware is sitting idle most of the time.
www.binarytitans.com
Server Room (Data Center)
The server room contains the servers and most of thecommunication devices including switches and routers.
The room should be secure, with only a selected people allowed tohave access to it.
www.binarytitans.com
Windows Server
Windows NT (first released in 1993) is a family of operatingsystems produced by Microsoft.
Since then, Microsoft has released Windows 2000 Server, WindowsServer 2003, Windows Server 2003 R2, Windows Server 2008,Windows Server 2008 R2, Windows Server 2012, Windows Server2012 R2, Windows Server 2016.
www.binarytitans.com
Windows Server 2016
Similar to previous Windows Servers, Windows Server 2008 R2 willbe released with six editions. These are the most commoneditions:
Windows Server 2016 Standard edition
Windows Server 2016 Datacenter edition
Windows Server 2016 Foundation edition
Microsoft Hyper-V Server 2016
Windows Storage Server 2016 Workgroup edition
Windows Storage Server 2016 Standard edition
Windows Server 2016 is only available in 64-bit version.
.
www.binarytitans.com
Windows Server Roles
A server is designed to provide services.
Windows Server has organized the most common services intoserver roles.
Windows Server features are software programs that are notdirectly part of a role, but they can provide additionalfunctionality.
www.binarytitans.com
Full VersionServer CoreNano Server
You can install Windows Server 2016 in one of three modes: Full Version
Server Core
Nano Server
The full version is the normal version that you would expect fromWindows with a fully functional GUI interface.
Server Core installation provides a minimal environment with noWindows Explorer shell for running specific server roles and noStart button.
Nano Server is a remotely administered server operating systemand is optimized for private clouds and datacenters. This issignificantly smaller than Core Server and has no local logoncapability.
This Nano Server installation option is available for Standard andDatacenter editions of Windows Server 2016.
www.binarytitans.com
Windows Server 2016 System Requirements
Processor Minimum
1.4 GHz 64-bit processor
RAM Minimum
512 MB
ECC (Error Correcting Code) type or similar technology (Recommended)
Disk space requirements Minimum
32 GB
Network adapter requirements An Ethernet adapter capable of at least gigabit throughput
www.binarytitans.com
Different Installation Options
Clean Installation
A clean installation is installing the software from scratch on a newdrive or on newly reformatted drive.
The disadvantage is that the system and all of its software needsto be reinstalled, patched, and configured and data copied over,something that may take hours or even days.
www.binarytitans.com
Different Installation Options
Performing an Upgrade
Upgrade from an older version of Windows to Windows Server2016.
You cannot perform an in-place upgrade from 32-bit to 64-bitarchitecture.
You also cannot upgrade from one language to another.
www.binarytitans.com
Different Installation Options
Cloning
One way to install Windows Server 2008 R2 is to clone an already installed system in to an image file.
Create new servers using this cloned image.
www.binarytitans.com
Different Installation Options
Unattended Installation
An unattended installation is an installation that requires littleinteraction to install.
All the inputs required during the Installation are written on ananswer file.
An answer file is an XML file that stores the answers for a series ofgraphical user interface (GUI) dialog boxes.
You can use any text editor such as notepad to create and modifythe answer file.
www.binarytitans.com
Different Installation Options
Windows Deployment Services (WDS)
Windows Deployment Services (WDS) is a technology fromMicrosoft for network-based installation of Windows operatingsystem including Windows XP, Windows Vista, Windows Server2003, Windows Server 2008, Windows Server 2008 R2, WindowsServer 2012, Windows Server 2012 R2, Windows Server 2016.
The deployment of Windows can be fully automated andcustomized through the use of unattended installation scriptingfiles.
www.binarytitans.com
Windows Licensing
A software license is given to you from a software company likeMicrosoft that gives you permission to use a specific softwarepackage.
Most licenses from corporations such as Microsoft work more likea lease rather than a purchase of the actual software.
www.binarytitans.com
Windows Activation
Microsoft product activation, including Windows activation, is ananti-piracy technology designed to verify that software products arelegitimately licensed. If the server is not activated, it could restartevery hour.
www.binarytitans.com
Windows Updates
After installing Windows, we need to check whether Microsoft hasany Windows updates. This will include fixes, patches, service packs,and device drivers..
By adding fixes and patches, you will keep Windows stable andsecure.
If there are many fixes or patches, Microsoft releases them togetheras a service pack or a cumulative package.
www.binarytitans.com
Windows Updates
www.binarytitans.com
Initial Configuration Tasks
www.binarytitans.com
Initial Configuration Tasks
Configure the IP address
Set the computer name
Join an Active Directory domain
Configure the time zone
Enable automatic updates
Add roles and features
Enable Remote Desktop
Configure Windows Firewall settings
www.binarytitans.com
IP address classes and Ranges
www.binarytitans.com
Managing Storage
www.binarytitans.com
The first HDD (1956)
IBM 305 RAMAC
Random Access Method ofAccounting and control.
4 MB
50x24” disks
1200 rpm
www.binarytitans.com
The first HDD (1956)
Play
www.binarytitans.com
The internal look of HDD (Current HDD)
www.binarytitans.com
Data access of HDD
Access Time = Seek Time + Rotational Delay + Transfer Time
www.binarytitans.com
RAID introduction
A RAID is a Redundant Array of Inexpensive Disks. “I” can also be called as“Independent”
Disks are small and cheap, so it’s easy to put lots of disks (10s to100s) in one box for increased storage, performance, and availability.
www.binarytitans.com
RAID 0
Level 0 is non-redundant disk array
Files are Striped across disks, no redundant info
High read throughput
Best write throughput (no redundant info to write)
Any disk failure results in data loss
Stripe 0
Stripe 4
Stripe 3Stripe 1 Stripe 2
Stripe 8 Stripe 10 Stripe 11
Stripe 7Stripe 6Stripe 5
Stripe 9
data disks
www.binarytitans.com
RAID 10RAID 1
Level 0 is non-redundant disk array
Mirrored Disks, data is written to two places
On failure, just use surviving disk
On read, choose fastest to read
Write performance is same as single drive, read performance is 2x better
Expensive
data disks mirror copies
Stripe 0
Stripe 4
Stripe 3Stripe 1 Stripe 2
Stripe 8 Stripe 10 Stripe 11
Stripe 7Stripe 6Stripe 5
Stripe 9
Stripe 0
Stripe 4
Stripe 3Stripe 1 Stripe 2
Stripe 8 Stripe 10 Stripe 11
Stripe 7Stripe 6Stripe 5
Stripe 9
www.binarytitans.com
RAID 4
Block-level parity with Stripes
A read accesses all the data disks
A write accesses all data disks plus the parity disk
Heavy load on the parity disk
data disks
Parity disk
Stripe 0 Stripe 3Stripe 1 Stripe 2 P0-3
Stripe 4
Stripe 8 Stripe 10 Stripe 11
Stripe 7Stripe 6Stripe 5
Stripe 9
P4-7
P8-11
www.binarytitans.com
RAID 5
Block Interleaved Distributed Parity
Like parity scheme, but distribute the parity info over all disks (aswell as data over all disks)
Better read performance, large write performance
data and parity disks
Stripe 0 Stripe 3Stripe 1 Stripe 2 P0-3
Stripe 4
Stripe 8 P8-11 Stripe 10
P4-7Stripe 6Stripe 5
Stripe 9
Stripe 7
Stripe 11
www.binarytitans.com
RAID 6
Level 5 with an extra parity
Can tolerate two failures
data and parity disks
Stripe 0 Stripe 3Stripe 1 Stripe 2 P0-3
Stripe 4
Stripe 8 P8-11 Q8-11
P4-7Stripe 6Stripe 5
Stripe 9
Q4-7
Stripe 10
Q0-3
Stripe 7
Stripe 11
www.binarytitans.com
NAS(Network Attached Storage)
Network attached storage (NAS) is a file-level data storage devicethat is connected to a network and provide shared drives or folders.
NAS devices usually contain multiple drives in a form of RAID.
www.binarytitans.com
SAN(Storage Area Network)
A storage-area network (SAN) is a dedicated high-speed network (orsubnetwork) that interconnects and presents shared pools ofstorage devices to multiple servers.
www.binarytitans.com
Host Bus Adapter(HBA)
A host bus adapter (HBA) connects a computer to a network orstorage device.
www.binarytitans.com
LUN(Logical unit numbers)
LUN (Logical unit numbers) allow a SAN to break its storage downinto manageable pieces, each LUN can be assigned to one or moreservers in the SAN.
www.binarytitans.com
Fibre Channel
Optic fibre cabling gives you a higher bandwidth and also can beused over longer distances compared to copper cabling.
Fibre Channel or FC is a gigabit-speed technology heavily used forstorage networking.
It uses a Fibre Channel Protocol (FCP) as its transport protocol.
www.binarytitans.com
iSCSI
Internet Small Computing System Interface or iSCSI is an InternetProtocol (IP)-based storage networking standard for linking datastorage facilities.
iSCSI allows clients to send SCSI commands over a TCP/IP networkusing TCP port 3260.
www.binarytitans.com
File System A file system is a method of storing and organizing data.
Windows Server supports FAT16, FAT32, and NTFS file systems onhard drives.
www.binarytitans.com
FAT16 and FAT32
FAT16 or File Allocation Table (FAT) 16, is a simple file system thatuses minimum memory and was used with DOS.
FAT 16 can only support volumes up to 2 GB.
FAT32 was released with the second major release of Windows 95. FAT 32 can only support volumes up to 32 GB.
www.binarytitans.com
NTFS File System
New Technology File System (NTFS) is the preferred file system,largely because it supports a much larger hard disk (up to 16exabytes) and longer file names.
NTFS offers better security through permissions and encryption.
www.binarytitans.com
Essential Services
www.binarytitans.com
Naming Resolution
In today’s networks, you assign logical addresses, such as with IPaddressing.
Unfortunately, these addresses tend to be hard to remember,especially in the case of newer, more complicated IPv6 addresses.
Therefore, you need to use some form of naming service that willallow you to translate logical names, which are easier to remember,into logical addresses.
The most common naming service is Domain Name System, orDNS.
www.binarytitans.com
DNS
DNS is short for Domain Name System.
DNS is a hierarchical client/server-based distributed databasemanagement system that translates domain/hosts names to IPaddresses.
The top of the tree is known as the root domain.
Below the root domain, you will find top-level domains, such as.com, .edu, .org, and .net, as well as two-letter country codes, suchas .uk, .ca, and .us.
www.binarytitans.com
DNS Zones Zone is a collection of records which share similar naming pattern.
www.binarytitans.com
DNS Zones Types
When you define DNS zones, you create the zone as either: Forward lookup zone
A forward lookup zone is the most common type of zone. DNS clients canuse this zone to obtain such information as IP addresses that correspondto DNS domain names or services that is stored in the zone.
Reverse lookup zone.
Provides mapping from IP addresses back to DNS domain names.
www.binarytitans.com
DNS Round Robin
DNS servers use a mechanism called round-robin to share anddistribute loads for a network resource.
Round-robin rotates the order of resource records with the samename that point to different IP addresses.
www.binarytitans.com
DNS Queries&DNS Transfers
DNS queries and DNS transfers occur over TCP/UDP port 53.
So, if you have any firewall between servers (including firewallsrunning on the servers), you will need to open port 53.
www.binarytitans.com
DHCP
Dynamic Host Configuration Protocol (DHCP) services automaticallyassign IP addresses and related parameters (including subnet maskand default gateway and length of the lease) to a host.
A DHCP server maintains a pool which will have the list of IPaddresses.
When a DHCP client starts and needs an IP address assigned to it, itbroadcasts to a DHCP server asking for a leased address.
The client sends messages to UDP port 67, and the server sendsmessages to UDP port 68.
www.binarytitans.com
DORA Process
www.binarytitans.com
Active Directory
Active Directory is Microsoft’s answer to directory services and itdoes a lot more than just locating resources.
Active Directory take care of this by using Kerberos Authenticationand Single Sign-On (SSO). SSO means ability of Kerberos to providea user with one set of credentials and grant them access across arange of resources and services with that same set of credentials.Kerberos authenticates the credentials and issues the user a ticketwith which the user gains access to the resources and services thatsupport Kerberos.
Active Directory also makes user management more easier as it actsas a single repository for all of this user and computer relatedinformation.
More Details available here
Part 1
Part 2
www.binarytitans.com
File and Print Services
www.binarytitans.com
NTFS Permissions
www.binarytitans.com
Using Groups with NTFS Permissions
By assigning NTFS permissions to a group, you are grantingpermissions to one or more people simultaneously, reducing thenumber of entries in each access list, as well as the amount of effortrequired to grant multiple people access to certain files or folders
www.binarytitans.com
Types of NTFS Permissions
There are two types of permissions used in NTFS: Explicit permissions: Permissions granted directly to a file or folder.
Inherited permissions: Permissions that are granted to a folder (parent object or container) that flow into a child objects (subfolders or files inside the parent folder).
Besides granting the Allow permissions, you can also grant the Deny permission.
www.binarytitans.com
Effective Permissions
www.binarytitans.com
Copying and Moving Files
When copying and moving files, the following threescenarios can result:
If a folder or file is copied, the new folder or file willautomatically acquire the permissions of the driveor folder to which it is being copied.
If a folder or file is moved within the same volume,the folder or file will retain the same permissionsthat were already assigned.
If a folder or file is moved from one volume toanother volume, the folder or file will automaticallyacquire the permissions of the drive to which it isbeing moved.
www.binarytitans.com
File and Folder Owners
The owner of an object controls how permissions areset on the object and to whom permissions aregranted.
All administrators automatically have the Takeownership permission of all NTFS objects.
www.binarytitans.com
Encryption
Encryption is the process of converting data into aformat that cannot be read by another user.
Decryption is the process of converting data from anencrypted format back to its original format.
www.binarytitans.com
Encrypting File System (EFS)
Encrypting File System (EFS) is used to store encryptedfiles on NTFS file system volumes.
Encrypted files cannot be used unless a user has accessto the keys required to decrypt the information.
After a file has been encrypted, you do not have tomanually decrypt that file before you can use it.
Rather, once you encrypt a file or folder, you canwork with that file or folder just as you would withany other file or folder.
www.binarytitans.com
Encrypting File System (EFS)
www.binarytitans.com
Sharing Folders
Most users are not going to log onto a server directly to access their data files.
Instead, a drive or folder will be shared (known as a shared folder), and they will access the data files over a network.
To help protect against unauthorized drive or folder access, you should use share permissions along with NTFS permissions.
When a user needs to access a network share, he or she will use the UNC, which is \\servername\sharename.
www.binarytitans.com
Sharing Folders
www.binarytitans.com
Share Permissions
The share permissions that are available are as follows: Full control
Change
Read
Because users can be members of several groups, it ispossible for them to have several sets of explicitpermissions for a particular folder or file.
When this occurs, the permissions are combined toform the effective permissions, which are the actualpermissions when logging in and accessing a file orfolder.
www.binarytitans.com
Network Discovery and Browsing
www.binarytitans.com
Administrative Shares
An administrative share is a shared folder typicallyused for administrative purposes and usually hidden.
To make any shared folder or drive hidden, the sharename must have a $ at the end of it.
Because the share folder or drive cannot be seenduring browsing, you have to use a UNC name to findthe folder or drive, which includes the share name(including the $).
By default, all hard drive volumes with drive lettersautomatically have administrative shares (C$, D$, E$,and so on).
Other hidden shares can be created as needed forindividual folders.
www.binarytitans.com
Network Printing
Using network printing multiple users can share thesame printer.
This is a cost-effective solution when you have multipleemployees in different locations.
As an administrator, you can install two types ofprinters: local and network.
www.binarytitans.com
Printing in Windows
When you create or install the printer, you also load aprint driver that acts as a translator for Windows andthe programs running on Windows so that they do nothave to worry about the specifics of the printer’shardware and printer language.
www.binarytitans.com
Installing Printers
You can use the Add Printer Wizard to install theprinter.
After the printer is installed, it will appear in theDevices and Printers folder as well as in the DeviceManager.
www.binarytitans.com
Adding Printers
www.binarytitans.com
Adding Printers
When the Add Printer dialog box appears, specify theport to which the printer is connected.
If a printer is connected directly on the network, youwill have to create a Standard TCP/IP Port.
The TCP/IP printer port uses host port 9100 to communicate.
www.binarytitans.com
Adding Printer Drivers
www.binarytitans.com
Printer Pools
Network printers are usually used by more than oneuser.
If you have a high volume of print jobs, the printer canbecome congested and users will have to wait for thedocuments to print.
Either you can purchase a faster printer or you cancreate a group of printers called a printer pool that actsas a single virtual printer with a single print queue.
Users print to a single printer, and the print jobs aredistributed among the printers within the pool.
www.binarytitans.com
Printer Properties
With most printers, youhave a wide range ofoptions.
These options vary fromprinter to printer and theyare easily accessible byright-clicking the printer inthe Devices and Printersfolder and selecting PrinterProperties.
www.binarytitans.com
Printer Permissions
Printers are consideredobjects.
Therefore, you can assignpermissions to a printer sothat you can specify whocan use the printer, who canmanage the printer, andwho can manage the printjobs.
www.binarytitans.com
Managing Print Jobs
www.binarytitans.com
Print Spooler Folder
When the print device is available, the spooler retrieves the next printjob and sends it to the print device.
By default, the spool folder is located at C:\Windows\System32\Spool\Printers.
If you have a server that handles a large number of print jobs orseveral large print jobs, make sure the drive where the spool folder ishas sufficient disk space.
www.binarytitans.com
Popular Windows Network Services and Applications
www.binarytitans.com
World Wide Web and Web Pages
The World Wide Web is a system of web pages that can be viewedwith a web browser such as Internet Explorer, Chrome etc.
Web pages may contain text, images, videos, and othermultimedia that you can navigate between by using hyperlinks,and they are usually found by using a search engine such as Bingor Google.
When you fetching a web pages, you are connecting to the webserver using TCP port 80.
www.binarytitans.com
FTP
File Transfer Protocol (FTP) is a standard networkprotocol used to transfer a file from one host toanother over a TCP/IP-based network.
Different from HTTP, it uses two TCP ports to operate—ports 20 and 21.
FTP can be used with user-based passwordauthentication or with anonymous user access.
www.binarytitans.com
SMTP Email servers (or any server or client that sends email directly out)
use Simple Mail Transfer Protocol (SMTP) as an outgoing mailtransport.
SMTP uses TCP port 25.
www.binarytitans.com
Creating a Website
When IIS is installed, the server will only have a default Web site.
IIS is designed to handle multiple Web sites.
www.binarytitans.com
Multiple Websites
The default Web site is made to respond to all IP addressesassigned to server port 80 and port 443.
To support multiple Web sites: You can assign additional IP addresses and assign a Web site
to each IP address.
You can also define a different port instead of port 80 or 443.When a user tries to access http://acme.com, they are reallyaccessing http://acme.com:80.
The :80 means port 80.
One method that allows you to share the same IP addressand port is to use host headers, which are used to specify aname that the Web site will respond to rather than all namesthat point to the address.
www.binarytitans.com
Web Server Folders
When you create a Web site, you specify a folder thatrepresents the root of the Web site.
Within that folder, you can create subfolders.
www.binarytitans.com
Application Pool
An application pool is a set of resources (a workerprocess or a set of worker processes) used by a Web siteor application that defines the memory boundaries forthe Web site.
Forcing each application to have its own applicationpool ensures that one Web site does not interfere withanother Web site on the same server, which ensuresapplication performance and improved applicationavailability.
Therefore, if one application has a memory leak orcrashes, it will not affect the other sites.
www.binarytitans.com
Default Files
By default, when you type in a Web site’s URL such ashttp://acme.com, it will go to the root folder designedfor acme.com and first look for one of the followingfiles:
1. Default.htm
2. Default.asp
3. Index.htm
4. Index.html
5. Isstart.htm
6. Default.aspx
www.binarytitans.com
IIS Security
Since Web sites are designed to provide information,some of which may be sensitive, there will be timeswhen you have to protect that data.
You can protect it by limiting who can access the Website, how users authenticate, and/or by encrypting thecontent when a request is made.
You can grant or deny specific computers, groups ofcomputers, or domains access to sites, applications,directories, or files on your server by usingAuthorization rules.
www.binarytitans.com
IIS Authentication
Authentication is used to confirm the identity of clientswho request access to your sites and applications.
www.binarytitans.com
SSL
When you use SSL to encrypt web traffic, you are usingasymmetric encryption, which involves a private key and a publickey.
The public key is provided to anyone who wants to access the webserver, and the private key is kept secret, usually by the web serverthat you are trying to protect.
The public key is used to encrypt data, which only the private keycan decrypt.
www.binarytitans.com
Remote Access Server
RAS enables users to connect remotely to a network.
By connecting to the RAS over the Internet, users canconnect to their organization’s network so that theycan access data files, read email, and access otherapplications just as if they were sitting at officenetwork.
www.binarytitans.com
VPN
Virtual private networks (VPNs) links two computersthrough a wide-area network such as the Internet.
To keep the connection secure, the data sent betweenthe two computers is encapsulated and encrypted.
This is an improvement to RAS.
www.binarytitans.com
Split Tunneling
By default, when you connect to a VPN using theprevious configuration, all web browsing and networktraffic goes through the default gateway on theRemote Network unless you are communicating withlocal home computers.
If you wish to route your Internet browsing throughyour home Internet connection rather than goingthrough the corporate network, you can do so. Suchconnection is called split tunnel.
www.binarytitans.com
Remote Desktop Services
Earlier days, users utilized dumb terminals (systemsconsisting of a monitor and keyboard without aprocessor) to connect to a mainframe.
Remote Desktop Services, earlier known as TerminalServices, is one of the components of MicrosoftWindows that allows a user to access applications anddata on a remote computer over a network.
www.binarytitans.com
RemoteApp
RemoteApp enables you to make programs that areaccessed remotely through Remote Desktop Servicesappear as if they are running on the end user's localcomputer.
www.binarytitans.com
Remote Desktop Gateway
As an alternate to VPN tunnel, you can use a RemoteDesktop Gateway (RD Gateway) role service to enableauthorized remote users to connect to resources on aninternal private network over the Internet using aRemote Desktop Connection (RDC) client.
RD Gateway uses the Remote Desktop Protocol (RDP)over HTTPS to establish a secure, encryptedconnection between remote users on the Internet andthe internal network resources on which theirproductivity applications run.
www.binarytitans.com
Virtualization
By using virtualization, you can run multiple operatingsystems concurrently on a single machine, whichallows separation of services while keeping cost to aminimum.
It can also be used to create Windows test systems in asafe, self-contained environment.
www.binarytitans.com
Microsoft Hyper-V
Microsoft Hyper-V is a hypervisor-based virtualizationsystem for x64 computers starting with WindowsServer 2008.
The hypervisor is installed between the hardware andthe operating system and is the main component thatmanages the virtual computers.
To run several virtual machines on a single computer,you need to have sufficient processing power andmemory to handle the load.
However, since most servers often sit idle,virtualization utilizes the server’s hardware moreefficiently.
www.binarytitans.com
Installing Hyper-V
To install Hyper-V, you need: An x64 version of Windows.
64-bit processors and BIOS that support hardware-assisted virtualization (Intel VT or AMD-V)technology.
www.binarytitans.com
Hyper-V Manager
www.binarytitans.com
Integration Services
Some of the older Windows built-in drivers do not run efficientlyunder a virtual environment. Therefore, you need to installIntegration Services, which includes some basic drivers.
Hyper-V integration services, are a bundled set of software which,when installed in the virtual machine improves integrationbetween the host server and the virtual machine.
www.binarytitans.com
Consolidation
In many organizations, we may want to consolidateseveral physical servers to one machine runningmultiple virtual servers.
Microsoft System Center Virtual Machine Manager(VMM) allows you to convert existing physicalcomputers into virtual machines through a processknown as physical-to-virtual (P2V) conversion.
www.binarytitans.com
Managing Disks
When you create a virtual hard drive, you can create: Fixed size virtual hard disks
Take up the full amount of disk space whencreated, even if there is no data using parts ofthe hard disk.
Dynamically expanding hard disks
Expands as it needs space up to its full space.
www.binarytitans.com
Snapshots
One of the strengths of virtual servers is the ability totake snapshots.
A snapshot is a point in time image of a virtual machinethat you can return to.
So if you make a change to the system, such as loadinga component or installing an update, and later foundthat it is causing problems, you can use the snapshotto quickly revert back to the point before the changewas made.
www.binarytitans.com
Monitoring and Troubleshooting Servers
www.binarytitans.com
ITIL
Information Technology Infrastructure Library
ITIL (Information Technology Infrastructure Library) is aset of practices for IT service management (ITSM) thatfocuses on aligning IT services with the needs ofbusiness.
www.binarytitans.com
ITIL
Information Technology Infrastructure Library
www.binarytitans.com
Implementing a Project
www.binarytitans.com
Troubleshooting Methodology
1. Discover the problem
2. Evaluate system configuration
3. List or track possible solutions and try to isolate the problem by removing or disabling hardware or software components
4. Execute a plan
5. Check results
6. Take a proactive approach
www.binarytitans.com
Troubleshooting Tools
Device Manager
System Information
Event Viewer
Task Manager
Resource Monitor
Performance Monitor
System Configuration
Memory Diagnostics tool
Troubleshooting Wizard
Boot Menu including Safe mode
Windows Repair
www.binarytitans.com
System Information
www.binarytitans.com
Event Viewer
www.binarytitans.com
System Configuration
www.binarytitans.com
Virtual Memory and Paging File
www.binarytitans.com
Task Manager
www.binarytitans.com
Performance Monitor
www.binarytitans.com
Resource Monitor
www.binarytitans.com
Advanced Boot Options
www.binarytitans.com
High Availability
www.binarytitans.com
System State
The Windows system state is a collection of systemcomponents that are not contained in a simple file butcan be backed up easily. It includes:
Boot files
DLLScache folder
Registry
SYSVOL
Active Directory NTDS.DIT
Certificate Store
User profiles
COM+ and WMI information
IIS metabase
www.binarytitans.com
Windows Server Administrator Jobs
www.binarytitans.com
Windows Server Administrator Jobs
Lets take a look at the leading Job Portals.
Naukri.com
Monster.com
Shine.com
www.binarytitans.com
Now willing to learn more?
Want this document offline? Click here.
Add your review here.
Ready To Deploy Training from BinaryTitans. Here we cover the following:
a. Installing and Configuring Windows Server 2012
b. Administering Windows Server 2012
c. Configuring Advanced Windows Server 2012 Services
d. Designing and Deploying Microsoft Exchange Server 2016
e. Cisco Certified Network Associate
To enroll, reach out to BinaryTitans Administration Team
+91 80 50158271
www.binarytitans.com
Thank you for reading