MCITP Course Overview and Details
MCITP Course Overview and Details
Password: pakistan
Lecturer no-1
First module is related to Windows 7. In this course there are mainly two
operating systems one is Windows 7 and second one is Windows 2008 Server R2.
Windows 2008 Server R2 is the most recent release of Microsoft in the market at
this time. On client side first Windows Vista were used but there were some
issues in Windows Vista that is why Windows 7 is released in October 2009. It is a
fact that new products in a market fulfill the requirements of industries better
than old ones.
First lecture is about Windows 7 deployment but before going to this we will
discuss another module called operating system fundamentals. Precisely you can
say Windows 7 fundamentals.
Being a system administrator what the industry will expect from you or what is
the work of a system administrator and which tools in the operating system you
can use to run it properly in any environments?
Some companies business is not IT oriented but their business process needs the
work of IT department. For example Banks does not give IT services but for their
processes to run properly they need IT department, because their data bases will
run on a computer their account system is stored in a computer their billing
system is on computer so if the computer will not work then their business will
not continue.
Down time means when the business is out of service. For example if computer
stop working for an hour on which billing system or credit cards are available then
billing system or credit card process will not work. Sometimes we see that ATM
machine is out of service means it’s the down time of that computer then you
cannot make any transaction. Down time suffer the customers and the company
will lose trust of customers. All these issue will handle a person called system
administrator which is responsible for business continuity.
It is a very good tool you can say it is a laboratory of a computer where all
kinds of tests can be done. You can also check system summary by click on
the system summary option. You can also check basic information of
hardware by clicking on the hardware resources option. This tool tells you a
big picture about the devices and also about the services.
Eventvwr is another tool which gives more detail about a problem. It also
gives information about new problems like if new viruses are come. Events
Viewer means events can show and events are simply messages. For
example if you boot your system sometimes message display that certain
services are failed to start. These messages are saved in a place called
windows log files.
Steps:
Steps:
Lecture no-2
Windows 7 deployment
Installation Types
The industry in which you will work as a system administrator can be of two
types. On is vendor company and the other is customer company.
Vendor Company is that company which provides computers and their services to
the customers, for example Dell.
Customer Company is that company which uses that compute for their business,
for example banks.
For example if there are 200 brand new machines are you are asked to install
windows 7 on all. Then automatic installation is the best method to use because it
is time saving you can install windows 7 only in one day.
But the question is how brand new systems will boot because there is no
operating system on it, their hard disk in blank.
Second question when you normally install OS then you provide source of
operating system that is inserting operating system CD in the CD ROM. Now for
200 machines will you need 200 operating system CD’s? Of course no. Let us
assume that your installation process will perform from one location and it only
requires one operating system CD and this location is called Distribution Server
which distribute windows 7 to client computers.
Requirements of WDS
We need three services which are required or you can say that these are the pre-
requisites of WDS.
Remember that every Microsoft operating system is running in one of the two
environments i.e. Workgroup (decentralize management of resources) and
Domain (centralize management of resources).
If you want to use Windows Deployment Services (WDS) then environment must
be domain. You can make domain environment by installing Active Directory.
Technically you can use WDS for a single system also but Microsoft recommend
that if you have 50 or more machines then use WDS otherwise do manual
installation.
Bootable NIC (Inside bootable NIC there is chip called Boot Rom or PXE
boot Rom. It means Pre Boot Execution Environment; if this chip is available
then it is bootable NIC).
Now a day all desktop computers come with this support. If there is no PXE
ROM on client computer then you cannot use WDS. When you boot client
computer press F12 for boot menu and then select boot from network
adapter.
Note: Bootable CD is one for which you don’t need operating system to run while
for non bootable CD to run you need an operating system.
First of all you will install Windows 2008 Server R2 on your computer. Then you
will install network services (ADS, DNS, DHCP etc) from Server Manager in
administrative tools. In windows 2008 server DNS, DHCP etc are called Roles.
If you are using Windows 2008 Server R1 then the confirmation option will not be
visible at that time when you don’t disable DHCP IPv6 stateless mode.
Now we have to install WDS. It is not necessary that WDS, DHCP, ADS, DNS must
be installed on the same systems. You can install WDS on one system and ADS,
DHCP, DNS on other system but the domain must be the same. But you require
NTFS partition on that machine on which WDS is install. The main advantage of
using WDS is time saving.
Microsoft has developed a new file format which is .WIM (Windows Imaging
Format) available in Windows 7 CD. The sole purpose of making this format is
remote installation. There are two files with this format within the sources folder
of windows 7 CD. One is [Link] and other is [Link]. In this case [Link]
is that file which starts the machine and the actual windows is installing by
[Link].
Configuration of WDS
Click next
Now in the hierarchy there will be two folders one is boot image and
another one is install image.
Right click on boot image and select add boot image then browse for
windows 7 CD and click on [Link] file.
Right click on install image folder then select add install image browse for
windows 7 CD and click on [Link] file.
After creating these two images now in DHCP you will give IP addresses
that can be assigned to client computers during installation.
Now boot your client computer and press F12 to go to boot menu and from
this menu select boot from network adapter installation will start.
Open WDS
Right click and select All Tasks
Click on new
Click on start services
If you want to modify some options of WDS then open WDS right click on it and
select properties.
Lecture no-3
Disk Management
1. Basic Disk
2. Dynamic Disk
There are two types of partitions on Basic Disk i.e. primary partition and
extended partition.
We make primary partition because it starts our machine. Boot files are stored on
primary partition. You can only mark primary partition as active by right clicking
on that partition and you cannot make an extended partition as active.
There are total number of partitions are four. It means that maximum numbers of
partitions are 4. You cannot make more than four partitions because of
architectural limitations. If you want to make only primary partitions then only
four drive letters will be display in the computer. But if you want to dedicate
separate drives for marketing, finance, HR, IT, support, security, means for seven
departments. Then you can make extended partition. Extended partition gives
you the ability to make more than four drives (not partition)
It is not necessary that only operating system can reside on a primary partition
which is active. On active partition only boot sector on which boot configuration
data is stored. You can install operating system on other logical drives also. BASIC
Disk cannot give some advance or enterprise features. That features are
improved performance and fault tolerance (ability of a system to continue work
of one of the system component failure).
Dynamic disk were introduced in windows 2000. Dynamic Disk provides these
two features one is improved performance and second one is fault tolerance. In
dynamic disk volume information is stored in 1 MB data base. It is for larger than
64 bytes.
For hard disk or storage administration there are two tools. One is Disk
Management and the other is Diskpart command.
Disk management is a graphical tool while diskpart is a command line tool for disk
administration. Disk part gives advance administration of storage devices it is
introduced in windows 2003.
You can convert BASIC Disk to DYNAMIC Disk without loss of data but all data will
be lost when you convert Dynamic disk into Basic disk. Because you can
accommodate 64 bytes in 1 MB. But you cannot store 1 MB data into 64 bytes.
By graphical tool you can make three primary partition and one extended
partition in Basic Disk. If you want to deviate from this structure then you will use
Diskpart tool.
In order to run the OS or to make the hard disk usable you must make primary
partition. It means that primary partition is necessary while extended is not
necessary.
1. Simple volume is just like partition. Right click on the allocated space and
select make new simple volume follow the steps and click finish.
2. Spanned volume requires at least two dynamic disks. Right click on the disk
and select spanned volume. Add disks for spanned volume then select
space first from one disk then select space from another disk for spanned
volume. It will show this combined space with one drive letter. Spanned
volume is the only volume that combines unequal spaces. It will neither
give improved performance nor fault tolerance. It gives only the ability to
use scattered space on different disks. If you remove one hard disk then the
whole drive become un accessible.
3. Stripe volume gives improved performance in read and writes operation.
Strip volume takes equal space from each disk. For example if you want to
copy a file of 5 MB on stripe volume of two disks then first 64 KB will store
on disk 1 and next 64 KB will be stored on disk 2 and so on until the whole
file is copied. It means that 2.5 MB is stored on disk 1 and 2.5 MB is stored
on disk 2. Both hard disks are independent of each other both hard disks
head is used in reading and writing in a file that is why it will give fast read
and write response.
4. Mirror volume gives fault tolerance feature and improved performance
only in read operations. Mirror volume requires only two dynamic disks.
One file will be copied in both hard disks that is why if one hard disk is
failed the file is still available on other hard disk that is why it is called fault
tolerance.
Mirror volume uses 50% size for fault tolerance. When you right click on
the dynamic disk and select new mirror volume. Then select both disk and
give space for example 500 MB from one and 500 MB from other but it will
show only 500 MB in the total volume because it use another 500 MB for
fault tolerance. Both disks will have same drive letter for mirror volume.
Mirror volume can be made by two ways. One method is to create mirror
by simply click on one dynamic disk and select create mirror volume.
Second method is right click on already created volume with data and
select add to mirror. Either both disks will have unallocated space (for
creating mirror) or one disk has unallocated space (add to mirror) for mirror
volume.
Diskpart Commands
Diskpart> select disk 1 (press ok. Desk 1 will be selected because for
spanned volume first we take simple volume and then extend it to
spanned volume. You cannot make spanned volume directly.)
Diskpart> detail disk (press ok. It will display detail information about
disk 1 because in first command we have selected disk 1)
Diskpart> select volume 2 (press ok. In this command we have
selected volume 2 on disk 1 because it is a simple volume)
Diskpart> extend size 500 disk 0 (press ok. This command will create
spanned volume from disk 1 and disk 0. Disk 1 is already selected and
we extend it on disk 0.)
Diskpart> assign letter J (press enter. It will assign drive letter J to the
selected volume.)
Diskpart> detail volume (press enter. This command will show
information about select volume)
Diskpart> create partition primary size 500 (press enter. It will create
primary partition of 500 MB on BASIC disk)
Diskpart> create partition extended size 400 (press enter. It will
create extended partition on basic disk of size 400 MB.)
Diskpart> create partition logical size 200 (press enter. It will create
a logical partition within extended space of size 200 MB)
Note: if drive letters is finished then instead of assigning letter you will use mount
point as (Diskpart>assign mount c:\ folder name (enter)
Lectuer-4
Scripting: - Diskpart is basically used for scripting. Script is a file in which
commands are written together and saved as a batch file with .bat extension.
Steps:
You can expand a partition by assigning more space from other drives unallocated
space by using shrinking without loss of data.
Network setting:
IPV4 is a 32 bit address and IPV6 is 128 bit address. IPV4 structure is represented
in doted decimal format while IPV6 structure is represented in hexadecimal
format. In IPV4 each octate is separated by dot (.) while in IPV6 each 16 bits block
is separated by colon (:)
If in IPV6 contiguous 0’s are present then it is represented by colon only. For
example
Network properties -> select IPV6 if you are using windows meeting space.
If multiple network connections are available then you can set priority. For this
press ALT key on the keyboard menu will be displayed then click on advance
option then click on advance setting and use arrow keys to move up the
connection in the priority list.
You can view basic information about a network by selecting network properties
you will see the following things.
Subnet Mask: It is used to find out network. In subnet mask all the network bits
are 1 and host bits are 0.
Device Management: There are two categories of devices. One is called Plug and
Play devices and the other is called Non Plug and Play devices. Type [Link]
(Microsoft console) in run window to enter into device manager.
Plug and Play devices has the quality that there drivers are already installed in
the operating system. If you run [Link] then a list of plug and play devices
will be displayed. Right click on each drive and select properties, then you can
perform some operations like update driver, rollback or disable driver etc.
Non Plug and Play devices need drivers to be installed for working. These are not
already installed you have to install them when you plug it. To view non plug and
play devices click on the view option in the menu and then select show hidden
devices. After this non plug and play devices will be displayed in the device
manager. Click on any non plug and play device select properties then click on
drivers and then click stop if you want to stop the device.
Remote Management
First of all you will check connectivity of two systems by using ping command.
Disable fire wall on target computer. For remote logging you will need to know IP
address or name of the target computer. You will enable the option of allowing
remote access option on the target computer. You can go to the remote setting
by pressing windows key+ Pause break key then click on remote settings then
check either second option or third option for allowing access.
Now type mstsc (Microsoft terminal services client) in the computer from where
you want to establish remote session. After this you will give IP address or name
of the target computer. Then click on options then click on experienced tab then
select LAN (10 mega bits per second) then click on advance tab and select
connect and don’t warn me for fast logging then click on connect button. When
you enter to the target computer it will be log off.
If you want to remotely log on to server machine and the other user is also logged
in then you will do this by clicking by administrative tools then select remote
desktop services then click on remote desktop session host configuration then
click restrict each user to a single session and select it No.
You can copy and paste files from remote computer to your computer because in
windows 2008 clipboard is shared.
Lecture no-5
BranchCache: It is a new feature of Windows 2008 Server R2 that speeds up
branch office access to files hosted on remote networks by using a local cache.
This feature is not available in previous version of Windows 2008 Server R1 and in
other operating systems like windows server 2003.
For example if a company have a central office in Karachi and branch office in
Peshawar. Branch office users wants to access some data from central office, then
a request is sent by one of the branch office computers to the central office
server. The data is delivered to the branch office computer by central office.
Now if another computer wants the same data from central office then he will not
sent a request to the central office server instead the client checks the cache on
the branch office LAN to determine whether the requested data is already
cached.
If the data is cached already, a check is made to see if the data is up to date and
whether the client has permission to access it.
If the data is not already cached, the data is retrieved from the server and placed
in the cache on the branch office LAN. This technique is called BrachCache. But in
BranchCache only internet data is stored.
BranchCache reduces traffic on WAN link and speeds up the response time.
BrachCache for network file is another feature of BranchCache that stores non
web related data i.e. only stores internal network files and folders.
BranchCache cover web data in branch office. In order to cache (store) central
side data two Cache Modes are used in branch office:
1. Distributed Cache Mode: In distributed Cache Mode the central office data
is stored only on client computers running windows 7 on the branch office
network. When a client running Windows 7 retrieves content over the
WAN, it places that content into its own cache. If another BranchCache
client running Windows 7 attempts to access the same content, it is able to
access that content directly from the first client rather than having to
retrieve it over the WAN link. When it accesses the file from its peer, it also
copies that file into its own cache. The advantage of distributed cache
mode is that you can deploy it without having to deploy a server running
Windows Server 2008 R2 locally in each branch office.
2. Hosted Cache Mode: In hosted Cache Mode the central office data is only
stored in the hard disk of a dedicated server in branch office. Hosted Cache
mode uses a centralized local cache that hosted on a branch office server
running Windows Server 2008 [Link] clients needs that data they will
only request to the dedicated server instead of sending requests to the
central office. The advantage of Hosted Cache mode over Distributed
Cache mode is that the cache is centralized and always available. Hosted
Cache mode requires a computer running Windows Server 2008 R2 be
present and configured properly in each branch office. You must configure
each BranchCache client with the address of the BranchCache host server
running Windows Server 2008 R2.
Go to Server Manager
Click on Role then click on add Role (for installing file services and
BranchCache for network files)
Check File Services in the list and click next
Select BranchCache for network files
Click finish
Now for installing BranchCache click on Features
Click on Add Feature
Select BranchCache and click on Install
Type [Link] (this is a utility which is used to modify group policy) in run
window and press enter
After applying this command group policy management snap in will be
displayed expand it.
Click on domain then click on group policy objects
Now right click on default domain policy and choose edit
Click on computer configurations
Click on Policies
Click on Administrative Templates
Click on network
Click on BranchCache
Now at the right hand side window five options will be displayed
Right Click on Turn on BranchCache and choose edit
Select the enable radio button to enable it
Now right click on set BranchCache distributed cache mode and choose
edit
Prepared By: Muhammad zubair Corvit Lahore Page 25
Course: MCITP
Firewall
For security of the system we normally use three tools. One is Anti Virus,
second one is windows defender and third one is firewall.
Anti Virus is used to protect the system from viruses while windows defender
protects the system from spyware (unwanted software) and firewall control
access to your computer from outside.
Click on windows firewall in control panel and you can make it off or on in the
settings.
You can create two types of rules in firewall. One is called Inbound Rule and
the other is called Outbound Rule. The process for configuring inbound rules
and outbound rules is essentially the same.
Select Inbound rule and then click New Rule. This opens the New
Inbound Rule Wizard.
Now select the type of rule you want create. You can select between a
program, port, predefined, or custom rule.
You would create a custom rule if you wanted a rule that applied to a
particular service rather than a program or port. You can also use a
custom rule if you want to create a rule that involves both a specific
program and a set of ports. For example, if you wanted to allow
communication to a specific program on a certain port but not other
ports, you would create a custom rule.
If you decide to create a program rule, you then need to specify a
program for which the rule applies. If you choose a port rule, you must
choose whether the rule applies to the TCP or the UDP protocol. You
must also specify port numbers.
In the next step, you specify what action to take when the firewall
encounters traffic that meets the rule conditions.
Allow the connection allows the connection if the traffic meets the rule
conditions.
Block the connection blocks the connection if the traffic meets the rule
conditions.
Next set to All IP addresses and finish it
Lecture no-6
BitLocker:
Before BitLocker EFS (Encryption File System) were used, this is a part of
the NTFS. But EFS only provides file level encryption while BitLocker
provides drive or volume level encryption.
BitLocker handles these problems if you lost a computer your data will
be un accessible to other persons if they want to retrieve it. It prevents
an attacker from recovering data from a stolen computer.
Without the BitLocker encryption key, the data stored on the volume is
inaccessible. BitLocker stores the encryption key for the volume in a
separate safe location.
Steps:
Click on BitLocker Drive Encryption in Control Panel
Click Turn On BitLocker wizard will be started
Now it will ask a method how to unlock the drive that is by using a
password or Use Smart card or Automatically unlock the drive on
this computer.
Select any one of the above options and click next
Now it will ask how do you want to store your recovery key. The
following options will be available.
o Save the recovery key to a USB Flash drive
o Save the recovery key to a file
o Print the recovery key
Select any one of the above and click on save
Click next
Start encrypting
DirectAccess
DirectAccess is an automatic connectivity solution that allows clients running
Windows 7 to connect seamlessly to the corporate intranet the moment they
establish a connection to the global Internet. It is the feature of windows server
2008 R2 on server side and windows 7 on client side.
The connection process is automatic and does not require user intervention
or logon. Traditionally, users must initiate VPN connections to the
corporate intranet manually.
The following four steps must be keep in mind while using DirectAccess
Now if you want to check whether the certificate is assigned or not. To check click
on start button then select Certificate Authority and then click on certificate
issued, now at the right side you will see the computer name.
Provide two consecutive Live Public IP’s and multiple network Connection
For DirectAccess company need to purchase two live public IP’s from any
ISP.
Now install two network adapters because DirectAccess will not work on
single network adapter. (for practice you can install loop back adapter. To
install loopback adapter go to device manager by typing [Link]
command in the run window. Now right click and select legacy hardware
and click on network adapter click on next then select Microsoft and then
select loopback adapter and install it)
Now right click on one connection and assign one live public IP and then
click on the advance button and give another live public IP. This connection
will be used for internet.
Now right click on the other connection and give static IP. This connection
will be used for company own network.
Turn On Firewall
For DirectAccess you need to turn on the firewall in the computer. Click on
control panel then select firewall and turn it on if not enabled.
Click on start button and select Active Directory Users and Computers
Click on computer and at the right side right click and select new
Give name to the compute and click next then finish
Similarly add required number of computer
Now right click and select new group
Give name to the group and click ok
Now right click on the group and select properties
Click on members
Click on Find Now and select the members from the list and add them
Offline Files is a feature relevant to portable computers that allows content that is
stored on shared folders to be cached temporarily on mobile computers so that it
can still be accessed and worked on when the mobile computer is no longer
connected to the office environment. When the computer reconnects to the
environment that hosts the shared folder, the offline content is synced, updating
the content on servers and clients as necessary.
You can use the Offline Files feature to ensure access when a client computer is
out of the office or when a temporary disruption, such as a wide area network
(WAN) link failing between a branch office and a head office, blocks access to
specially configured shared folders.
When a user makes a file available for offline access, Windows 7 stores a copy of
that file within a local cache. When the file server that hosts the file is no longer
available, such as when a user disconnects from the network, the user can
continue to work with the file stored within the local cache. When the file server
that hosts the file becomes available, Windows 7 synchronizes the copy of the file
in the cache with the copy of the file hosted on the shared folder .
Steps:
The Windows Update control panel is the primary tool you use to manage
software updates on clients running Windows 7. Through this control panel, a
user with Administrator privileges is able to check for updates, change update
settings, review installed updates, and review hidden updates.
Steps:
Click on windows updates in control panel
Click on turn on windows updates which is recommended
Now click on change settings the following options will be displayed
Install Updates Automatically (Recommended) Windows Update installs
updates automatically at the time specified. This is the default setting for
Windows Update.
Download Updates But Let Me Choose Whether To Install Them Updates
are downloaded to the computer, and the user is notified that the updates
are available for installation.
Check For Updates But Let Me Choose Whether To Download And Install
Them The user is notified that updates are available for download and
install.
Lecture no-7
There are some terminologies associated with performance monitoring. They are:
Object: Major components of a system is called object. For example RAM, Hard
Disk, Processor is objects. Objects can be hardware or software.
1. Real Time Monitoring: - Real time monitoring means to monitor the system
objects at the present moment. It is similar when you are watching a live
match. Type Perfmon in the run window then click on + sign to open
counters in the performance monitor. Click on processor and select %
processor time click on add and then ok.
Now again run memory object with processor object in the following
command
You can also enter instance number of processor if there are multiple
processor in your system instead of total. For example
The log file is by default in stop mode you will start it in command prompt as
These log files will be stored in the root directory of logs files.
A System Image is a copy of all the files and folders on the system disk (and
other specified hard disks) on a computer. You can use a System Image backup
to restore the computer to exactly what its configuration was when the
System Image backup was created.
Backup source and destination can’t be same. You can select the following as
backup destination.
Lecture no-1
For the first time when a computer needs IP address from DHCP that has no
IP address of DHCP nor does it have its own IP address then it broadcast
DHCP Discover packet on the network.
These DHCP discover packet is reached to all the devices on the network. if
the DHCP server lies in the broadcast domain of the client then it will accept
the client request and assign IPv4 IP address to the client.
Communication between client and DHCP sever occurs in four steps which is
also called DORA (Discovery, Offer, Request, Acknowledgment)
Note: Now a question arises that how the DHCP server knows that this
packet is for me? The answer is that when a client sends a request to the
DHCP server it sends also port number 68 which is used for DHCP request.
One server side port 68 is used. Both are well known port numbers.
IP Lease: - Lease means for a specific amount of time. The default time for
leasing IP addresses is 8 days but you can increase or decrease the lease
time. Lease time means that after this time client will release the current IP
address and will request for new IP address from DHCP server.
If the DHCP server is online then it will again assign IP address to the client
but if the DHCP server is not available then again it will wait for half time
then wait for 87.5 % less time expires. After this if client did not find the
DHCP server then it starts searching of another DHCP server on the
network.
If your computer fulfills these two criteria then you can install DHCP server on
your computer.
Activate Scope
By default the scope is disable you have to activate it because without activation
DHCP will be unable to assign IP addresses to the clients.
Right click on the scope
Select activate
If you want to check whether DHCP server has assigned IP address or not
click on the leases folder.
Reservations
If you want to assign the same IP address to the client every time when he
requests for renewal then you will define reservations.
Select client reservations
Right click and select new reservation
Give name
Assign IP and MAC addresses.
If you want to release the IP address by force from the client then give the
following command in command prompt:
Ipconfig /release
If you want to renew IP address of a client use the following command
Ipconfig /renew
To show all details of the computer on the network then use the command
Ipconfig /all
DHCP Options
DHCP Database
DHCP database is stored in windows system32 dhcp [Link]
In every database log files is must stored with it. There are two advantages of log
file. One it improve performance and the second one is the recovery. The log file
is [Link]. DHCP stores information first in log files then transfer it to the
database.
[Link]: It is a check point file in which the DHCP checks the file that how many is
transferred and how many remains from log file to the database.
.JRS: It is a reserved log file. If the log file is full then it uses the reserved file for
saving information.
It is very easy in 2008 server. You can only write the following command
C: netsh dhcp server backup dhcpbackup (press enter)
After restoring the dhcp backup you have to stop the dhcp and again start the
dhcp in order to function properly as:
If you want to check which IP is assigned to which computer then you can check it
from audit log which is placed in the dhcp folder in system32.
MAC Filtering: It is the feature of server 2008 R2 in which you can filter the
computers by MAC address. If that computer is comes in the allow list then dhcp
will assign IP address otherwise dhcp will not assign any IP address to this
computer. If you want to stop a compute from being assigning an IP address then
add the MAC address in the deny list of filtering.
Steps:
Click on Filtering. There are two options one is Allow and the other is Deny
Right click on Allow and select new filter
Give MAC address of the computer you want to allow and also give
description
Press ok
Now right click on the Deny and select new filter
Give MAC address of the computer you want to deny
Click ok
Super Scope: - if your DHCP IP pool is finished then you can create another pool
and combine them with the help of super scope.
Lecture no-2
Domain Name System is used for name translation into IP address or you can say
that it is used for name resolution.
Active Directory cannot work without DNS. DNS convert name of the computer
into IP address. DNS works in a hierarchy. DNS use FQDN (Fully Qualified Domain
Name). DNS only tells the IP to others.
This name is only for the benefit of the human. It is translated into an IP address
to reach the destination. The translation process of a name is called Name
Resolution.
Name resolution starts from right to left. There is another “.” After com but it is
hidden. This dot is called root level domain. When a request is sent to the root
domain for translation it forwards this request to com domain which is called top
level domain. Com passes the request to yahoo domain which is called 2nd level
domain. Yahoo then sends the request to www which is called host name.
Structure of the DNS is distributed over the internet. It means that the name
resolution task is not assigned to only computer rather it is distributed over the
internet.
DNS Queries
1. Recursive Query: - It goes from DNS client to DNS server. Its answer is
complete means processing is complete.
2. Iterative Query: - It goes from DNS server to DNS server. Its answer is not
complete means its reply is referral. Iterative query is used to reach from
one DNS to another DNS. It keeps the reply for 60 minutes in his cache
Zone
When you click on Zone then you will see two zones one is Forward Lookup Zone
and Reverse Lookup Zone.
Forward Lookup Zone sends name and get IP address of the computer.
While Reverse Lookup Zone sends IP address and get name of the computer. Now
the question arises that if we know IP address of the computer then why we need
name of the computer. The answer is that if firewall is installed on the computer
then firewall stop or allow traffic on the basis of name that is why reverse lookup
zone is used to convert IP address in the name.
Resource Records
Resource records are the DNS database entries to answer DNS client queries.
Name, type and data. The client query is always shown under the name title; DNS
server answer always shown under the data title, in type different types of
records is shown. Common records in DNS are A (Name to IP), PTR (reverse of A),
SRV, MX, MS, SOA etc.
Zone Types
4. Stub Zone: It is by nature secondary. It has no database of its own. Its loads
the database from master DNS. It only takes selective records not the
complete database. Three records NS, SOA and Glue A will transfer into
stub zone. Stub is read only.
DNS uses port 53 for communication and it uses both TCP and UDP protocols.
Dynamic DNS (DDNS) is used to automatically update IP addresses in DNS when
changed by DHCP. You will enable DDNS option in the Zone properties to secure
only.
Lecture No-3
Domain Name System (DNS) servers can enable clients to determine the DNS
name of a host based on the host's IP address by providing a special zone called a
reverse lookup zone. A reverse lookup zone contains pointer (PTR) resource
records that map IP addresses to the host name. Some applications, such as
secure Web applications, rely on reverse lookups.
A reverse lookup takes the form of a question, such as "Can you tell me the DNS
name of the computer that uses the IP address [Link]?"
A special domain, the [Link] domain, was defined in the DNS standards and
reserved in the Internet DNS namespace to provide a practical and reliable way to
perform reverse queries. In reverse lookup zone the IP address is written in
reverse order.
With Windows Server 2008, a DHCP server can enable dynamic updates in the
DNS namespace for any one of its clients that support these updates.
If the clients are belong to the pre-2000 family of computers then they are
unaware of the dynamic updates therefore DHCP can do this work.
You have to enable this option in the DHCP properties. Then click on DNS tab in
the DHCP properties and mark the checkbox of dynamic update DNS.
NSLOOKUP:
Displays information that you can use to diagnose Domain Name System (DNS)
infrastructure. There are two mode of Nslookup they are
Interactive and noninteractive.
Record Types: MX record type is responsible for resolving mail server name. In
MX we give domain name as input and MX resolve that into mail server.
CNAME record type resolves name into name. This helps when running multiple
services (like an FTP and a web server; each running on different ports) from a
single IP address. Each service can then have its own entry in DNS (like
[Link]. and [Link].)
When an A record lookup for [Link] is done, the resolver will see a
CNAME record and restart the checking at [Link] and will then
return [Link].
It is used for Name resolution like DNS. But DNS is only concerned with FQDN
(Fully Qualified Domain Name: [Link]) while WINS concern with flat
records such us pc1, mcitp or Corvit etc. it was used for NetBIOS for backward
compatibility.
On the client computers right click on the adapter select properties then click on
advance and select wins tab, now give IP address of wins server and press ok.
Now open wins server click active registration and then display registration.
Wins server is needed in two cases:
Security
Security is the degree of protection against danger, damage, loss, and criminal
activity. There are a number of security concerns which are
The main job of ESP is to provide the privacy we seek for IP datagrams by
encrypting them. An encryption algorithm combines the data in the
datagram with a key to transform it into an encrypted form. This is then
repackaged using a special format, and transmitted to the destination,
which decrypts it using the same algorithm.
Lecture no-4 :
Phase 1/Main Mode: Main Mode is also called Phase 1 in which a secure
negotiation established called (SA) between two computers. The ISAKMP SA is
used to protect security negotiations.
Phase 2/Quick Mode: Quick mode is also called Phase 2 establishes a secure
channel between two computers to protect data.
Steps
Type mmc in run window and press enter
Click on file select Add Remove Snap-in
Click on IPSec policy management and click on add button
Click on IP Security Monitor and click add button
Now make a policy (there are rules inside policy then there are filters or
conditions inside a rules)
Right click on IP Security Policy
Click on create IP Security
Click next then give any name to the policy
Click next and then finish
Now right click on the newly created policy and select properties
Click on rules then click on Add
Click on next then select All network connections
Click on next
Now click on Add button to create filter
Give any name to the filter
Click on add then click on next
Select a specific IP address
Select my IP address in destination
Click on protocol any and click on next
Click on finish and click ok
Select the newly created filter and click on filter action
Click on add and give any name to the filter action
Click on next and select negotiate security
Click on next and select don’t allow unsecured communication
Click on next and select integrity and encryption
Active policy
Main mode
Security association
Quick mode
Security association
Note: In Transport mode the communication peers and IPSec peers are
computers while in Tunnel mode the communication peers are computers and
the IPSec peers are routers.
Remote Access
There are two ways through which we can communicate in a network. One is
internet and the other is PSTN (Public Switch Telephone Network).
PSTN is secure as compared to internet but it is more costly.
Routing and remote access is a utility in windows for remote access.
Allow users
Go to the Active Directory Services
Click on user properties and select Dial in
Click on allow access and click on apply then ok
Call back
Go to the Active Directory Services
Click on user properties
Select dial in
Click on callback option
Select set by caller
Click on apply then ok
Callback security
Go to the Active Directory Services
Click on user properties
Select dial in
Select always call back to
Give your telephone number
Click on apply and then ok
Lecture no-5
VPN is used for long distance connectivity. It is cheaper than Remote access
because the medium is internet not PSTN.
Registered live public IP is needed for VPN server but there is no compulsion of
live IP on client side. Static IP is the basic requirement of VPN.
You can connect multiple users on the same link in VPN which is not possible in
remote access. In remote access you need a separate line for each user.
In VPN the connections are made on virtual ports. Multiple connections per
physical medium is the advantage of VPN and it is possible due to the virtual ports
of VPN.
Less secure as compared to remote access because the medium is internet but
you can say that VPN is secure because it uses IPSec for security. It is cleared that
VPN is inherently insecure because medium is the internet.
VPN is the only way to connect private networks using internet.
[Link]/8
[Link]/12
[Link]/16
For example if there are two networks of Corvit one in Lahore and the other is in
Islamabad. If these two networks have private addresses and want to
communicate through internet. Then it is not possible without VPN because VPN
make it possible that private networks can communicate using internet.
Installation of VPN
Go to server manager
Click on Roles then add roles
Select Network policy and access services
Click next
Select routing and remote access server
Click on next
Click install
Now give a live public IP to VPN server
Give IP to client and assume that both are on internet
Now open Routing and Remote Access from administrative tools
Right click on it and select configure and enable
Click on next and choose custom configuration
Click on next select VPN access
Select a connection and then select from a specified range option
Give IPs range and click next
Now select no, use routing and remote access option
Click on ok and then finish
Allow users permissions
Click on Active Directory users and computer in the administrative tools
Right click on user and select properties
Select dial-in and click on Allow access
Click on apply and then ok
Now if you try to ping the system it will give no reply from the host. Therefore
open the routing and remote access select IPv4 and click on general now right
click on connection and press delete. The interface will be deleted
VPN protocols
1. IKEV2
2. SSTP
3. PPTP
4. L2TP
Connect on PPTP
Go to the properties of the client adapter
Click on security tab and select PPTP in type of VPN
Click ok and then connect
Connect on L2TP
Right click on network connection and select properties
Select security tab
Select L2TP
Click on advance setting
Give shared key MCITP2008
Click on connect
Sharing
When you put a dollar sign ($) at the end, it is called hidden sharing.
Command:
When you type \\pc1\ishaq in run window and press enter it will give an error
message because this folder is hidden shared. If you want to open it place a dollar
sign ($) after the folder name as: \\pc1\ishaq$ (press enter). It means that the
person who knows the name of the hidden shared folder can open it otherwise
computer will not show hidden shared folders.
Some folders are hidden shared by default which is called administrative hidden
but administrator cannot give permissions to other users. It is just a facility for the
administrator like C$, D$ etc. Administrator can give client only the permission of
print$.
Note: if you want to shutdown the client computers remotely then the following
command is used but you must be the administrator of those clients
shutdown –i (press enter) now add the computers like pc1, pc2 etc and press ok.
Lecture no-1
Domain Types
1. Root Domain: first domain of a forest is called root domain. Only one root
domain is possible in a forest. Installation of root domain creates a forest.
Root domain is also a parent domain. When root domain crashed then the
forest is also crashed but if other domain crashed then it will not affect
forest.
3. Child Domain:
Root domain
Parent domain
[Link]
[Link] Child domain
Forest
Tree
[Link] [Link]
[Link]
No of forest= 1
Not of trees= 3
No of domains= 5
Types of Domain:
Forest
Tree
Domain
OU
Sites
Subnets
Domain Controllers
Lecture no-2
Active Directory: - AD is the centralize repository that store information
about objects.
All the trees in one forest have same schema. A collection of trees or
domains have same configuration, schema and global catalog is called
forest.
Note: when user logs in on the client system he enters username and
password. The username is sent to the DC where it is checked with a
password and encrypt with some number and send it to the client to
decrypt it. If the client decrypts that password then it is allowed for log
on.
In Global Catalog values are stored while in Schema only attributes are
stored.
If you run dcpromo command then it will neither remain stand alone
server nor member server.
Select the last option create a new domain in a forest and click on
next
Before the installation of AD all the user accounts are stored in the
computer management. You can go to computer management by using
[Link] command. After installing AD all the user accounts are
transferred to the Active Directory by clicking Active Directory Services
and the click on users to view the users account. Active Directory
database file is [Link] (C:windows\ntds\[Link]) where dit stands for
directory information tree and has 10MB size. Log file is edb, [Link] is
checkpoint file and res1, res2 are reserved files. Some services are also
created like AD Domain services and AD web services after AD
installation.
In windows server 2008 R2 you don’t need to reboot to offline ADS like
windows server 2003.
Lecture no-3
Active Directory Maintenance:
C:\net stop ntds (click enter) then click on yes (it will stop database services
of AD)
C: ntdsutil (press enter)
Ntdsutil: activate instance ntds (press enter)
Ntdsutil: files (press enter)
File maintenance: move db to j: (press enter. This will move database to j
drive)
File maintenance: move logs to j: (press enter. It will move log files to j
drive)
File maintenance: quit (press enter)
C: net start ntds (press enter. After movement again start AD database
services)
Restore of AD
There are two types of restore. One is called authoritative restore and the other is
called non authoritative restore. When two DC’s are working in the same domain
then authoritative issue comes.
For example if two Dc’s DC1 and DC2 are working in a domain. There are 95 user
accounts on DC1 suddenly boss called you that I have fired 5 persons that is why
delete the accounts of these persons therefore you have deleted but before that
you have taken a backup yesterday.
After 2 hours Boss again call you and told you that I have taken my decision back
so again add these 5 persons accounts. You will restore the backup on DC1 but in
this case the version Id’s of DC1 are older and DC2 have latest version Id’s. The DC
who have latest version Id’s are in full power. Now to give back the power to DC1
you will raise the version Id’s of DC1 through a method called Authoritative
restore.
For restoring the AD you will reboot your system then press F8 and select
directory services restore mode then select other user.
Type [Link] in the run window and press ok then click on Restore then
select this server press next then select system state then click on confirmation
and then click on restore. This method is called non authoritative restore. In this
case there is only one DC in the domain so there is no need of authority.
Operation Master
Some changes will only be performed on a specific DC not on all. That is why
Active Directory is single master generally. Single master operation can be
performed on a single DC. There are certain roles with that DC.
Roles:
Root domain has the first two roles while on ADC there will 0 roles.
1. Schema Master: There are classes and their attributes in schema. Schema
master is responsible for schema updates. Schema is available on all DC’s
but writeable schema is only available in schema master.
2. Domain Naming Master: It is responsible for the addition or removal of
domains in a forest
3. PDC Emulator: It performs clock or time synchronization. It is responsible
for group policy modification. It tells password reset information to all. It
minimizes password change latency.
4. Infrastructure Master: It stores user to group references
5. RID Master: Permission to a user is given on the basis of SID (Security
Identifier). It is a number which is generated when we create a user
account. It is not changeable and not reusable it is unique.
Object SID=Domain ID + RID
RID Master gives a block of RID to other DC’s. RID master is responsible for
SID generation or it allocates blocks of RID to other domain controllers of
the domain.
In order to view which computer has these roles go to command line and type
fsmo (flexible single master operation) command.
Now to check schema master first run regsvr32 [Link] in run window then
run mmc click on add remove snap in from file menu then click on active directory
schema and then click on add now right click on operation master.
1. Transfer of role: only possible if role holder is online. In this case no loss of
information occurs.
2. Seize of role: only possible, if role holder is down (offline). In this case loss
of information occurs.
These two operations can be performed on the successor means on which you
want to transfer the roles.
Seize of roles
Seize means by force assign the role to other DC when one is crashed or down.
When you click on operation master and check the first field it will show an error
there when DC1 is down.
Fsmo maintenance: connections (press enter. Here you will connect to the pc to
which you are making a role holder)
Fsmo maintenance: seize naming master (press ok and then yes to continue)
Fsmo maintenance: seize PDC master (press ok and then yes to continue)
Fsmo maintenance: seize RID master (press ok and then yes to continue)
Lecture no-4
Managing user accounts:
Note: you can change the password policy by typing [Link] command in the
run window then click on domain then right click on default domain policy and
select edit then click on policies windows setting security setting account
policies password policies
You can create user accounts through bulk import process. There are three
methods that can be used.
1. CSVDE (Comma Separated Value Data Exchange): It is used for only adding
user accounts.
2. LDIFDE (Lightweight data interchange format data exchange): It is used to
add, modify and delete user accounts.
3. Windows Scripting Host
Steps of CSVDE
Open a notepad
Write dn,objectclass,samaccountname,useraccountcontrol in the first line.
Note: In the above line dn represent distinguish name for display; new
naming convention called LDAP used by AD that uses distinguish name to
make the name unique in the domain. objectclass represent the type of
object you are creating. Samaccountname represent the logon name of the
user. Useraccountcontrol represent to enable or disable the account 512 is
used for enabled and 514 used for disable account.
Note: the above four lines will create four users named ishaq, imran,
arshad and izzat in the organizational unit mcitp on [Link] domain
Save this file with .csv ([Link]) extension and select all files in D drive for
example
Go to cmd and import the file by typing D: csvde –i –f [Link] (press
enter)
You can also export file as d: csvde –f [Link] (press enter). It will create a
file with the name of file1 on D drive.
(the above lines will create two users named kashif and amir in the mcitp OU
on the [Link] domain)
Save the file with .ldf extension ([Link]) and select all files.
Open cmd and import the file by using the command d:ldifde –i –f [Link]
(press enter)
Lecture no-5
Steps for Windows Scripting Host
Managing Groups
Making groups provides flexibility. For example if you are applying some
permissions on 1000 users on the same nature then you manually apply the
permissions on each user means you have to modify 1000 users. Instead create a
group and place the users of the same nature in this group and apply permissions
on this group which will be applied to all 1000 users.
1. Security group: In Security group everything is possible means you can use
it for permissions and also for email system.
2. Distribution group: It is only used for mailing system and cannot be used
for permissions. That is why you right click on the folder and then click on
permissions you will only see security groups not the distribution group.
Go to active directory users and computers right click and select new then
click on group.
Give name to the group and select the type of this group security. Similarly
create two more groups one of type security and the other is of type
distribution type.
Now in your computer right click on any folder select properties and then
select sharing then click on add group and click on find button. You will only
see the two groups having type security not the distribution group.
There are two types of permission one is share permission and the other is local
permission. The share permission is applied when the object is accessing
remotely. You can assign share permission on a folder by right clicking and select
the properties and then click on sharing then click on advance sharing then give
name to the shared folder then add the group and then assign permissions. Local
permissions are applied on both type of access i.e. for remote access and for local
access but local permission override the remote permission. You can apply local
permission on a folder by right clicking and then select properties then select
NTFS tab and apply the permission.
1. Global group: Two things are important in group scope one is membership
and the other is visibility. The membership of the global group is only users
from its own domain. The visibility of the global group is throughout the
forest.
2. Domain local: Membership users from any domain in the forest while
visibility only in its own domain.
3. Universal: Global Group + Domain Local Universal Group
You need all these things in a multi-domain environment. There is Microsoft rule
A G D L P: A add users, G global group, DL domain local group, P
permissions.
It means that add users to the global group then add the global group into the
domain local group and then apply permissions.
Case Study:
Accounts domain because the users are available on it while domain A is also
called a resource domain. Account domain needs global group and Resource
domain is called domain local group.
Consider another case study let a Folder named Folder A has the following
permissions
Group Policy:
There are two policies available on domain by default. One is called default
domain policy and the other is called default domain controller policy. Type
[Link] command in the run window the group policy management console
will be opened. Then click on domain then click on group policy object these two
will be displayed.
Group policy is applied on a container. Inside the container there may be either
users or computers. On users the policy is implemented when he logs on while on
the computer it is applicable when the system reboots. Group policy enable
containers are:
Now create another group policy in the policy management console by right click
on the group policy object and select new then give name to the policy. Now
check in both GPC and GPT the policies will be shown 3.
Right click on one of the group policy object and select copy then select paste the
policy object will be pasted then rename it and edit for further modifications.
There is a new feature in window 2008 server called Starter GPO. In which a
company general template (rules) is made then whenever you create a new policy
object. Select Starter GPO object then right click and select new then give name
then click ok.
Now if you want to create a new policy object right click on the group policy
object right click and select new give name to the policy object and below in the
drop down list select the starter GPO template and the click ok and then right
click and select edit for further modifications and permissions.
WMI Filter: - It is a tool which filters out the conditions during logon. For example
if we want to install MS Office on the user account first of all we will check the
free space. For this purpose you need to write a SQL query. A tool WMIMetic tool
is also available on Microsoft website for download that makes a script for WMI
filter.
Steps:
First of all SDP (software distribution point) will be created on the hard disk that
contains the software to be deployed. Generally assign deployment is used for
computers which are fixed for the users. While publish deployment is used for
users whose computer is not fixed.
Note: in domain environment when we create a user then click on the user
properties and select member of tab and write “ba” and click on add and apply.
Otherwise you cannot logon with this user.
Lecture no-6
Steps of Software Deployment
First make a SDP (software Distribution Point) on your hard disk and right
click on it go to properties then advance sharing and then give full control
to every one group.
Now open group policy management console ([Link]) and click on
domain and select group policy object
Right click on the default domain policy and select edit
There click on policies under computer and click on software settings
Right Click on software installation and select new package
Give the network path (\\pc10) and press enter the shared folders will be
displayed.
Select SDP and then click on .msi file and press ok then it will ask whether
you want to assign or publish the application select your choice and click
ok.
If you want to install customize packages (like excel, word only) through
software deployment then you need .mst file
First of all install ORK(Office Resource Kit) from MS Office CD in order to
make .mst file
After installing ORK open it from programs then tools then resource kit
Click on custom installation wizard
Browse for [Link] from SDP
Create a new MST file give any name
Next then next and select packages from the software
Click on next and then click on exit
At the end it will ask CD key as volume license.
Now right click on group policy and edit default domain policy
Select policies under computer configurations and then click on software
settings
Right click on software installation and select new package
Give a network path select the SDP then office then Proclus
Then select advance then select modification then click on Add
Select MST then deployment then select assign
Select install at logon and then click on ok
Now update group policy by gpupdate command
Note: if there is no .msi file then you can create it by using a software called
WININSTALL that is called msi maker.
When only setup file is available of the software then you can create a ZAP file. It
is published not assigned. There is no self repair in ZAP file.
Symmetric encryption: In this method the decryption and encryption keys will be
same. It means that you will need the same key for decryption that you have used
for encryption.
Asymmetric encryption: In this method the encryption and decryption keys are
different. It means that when you use one key for encryption then you can
decrypt the information with a different key.
2. Public key encryption: In this case the senders encrypt the information
with the receiver public key. It is also asymmetric encryption in which the
receivers will use its private key to decrypt it.
Indirectly keys are issued by CA. CA issue first certificate to itself then he gets the
ability to give certificates to others and CA always sends information in encrypted
form. When a person request for the public key of the receiver. CA issues him his
own certificate containing CA public key and then encrypt other person public key
with its private key and send it to you. You will decrypt CA encrypted information
by his public key and will take the public key of the other person.
CA Installation
There are some impacts of CA after its installation on the system. First impact you
cannot change the system name after CA installation. Second you cannot remove
or add system to domain after CA. Third you cannot remove Active Directory from
the system after CA installation.
Steps
There are two methods used to issue a certificate. One is using the mmc and the
other is web enrollment.
If you want to revoke a certificate from the user then use the following Steps
Right click on CA
Select All Tasks and click on Backup CA
Click on next and browse for the folder in which you want to store backup
Give a password and then click on finish
Right click on CA
Select All Tasks
Click on Restore and click ok
Click on next and then browse for folder where backup is located
Click on ok then click on next
Give the password that you have assigned during backup
Click finish then click on yes
Lecture no-7
Active Directory Replication
Replication is derived from a word replica which means copy. Replication means
to make a copy. Actually ADC is the copy of the DC.
Sites: The collection of DC’s connected with a high speed permanent and reliable
connection is called a site.
In normal terms sites means locations. There are two types of replication.
1. Inter-site Replication
Inter-site replication means replication between sites. In this case there are
multiple sites. The bandwidth of the link will be slow in case of inter-site
replication because the link is WAN.
2. Intra-site Replication
Multiple Sites: for example we have two sites A and B. There are two DC’s in site
A and three DC’s on site B. Both sites are interconnected with each other through
WAN link. It means that it is Inter-site replication. Now a question arises that is it
logical that every DC of site B will send updates or changes to every DC in site or
only one DC from site B sends or receive updates or changes from one DC of site A
and then forward these updates or changes to the local DC’s.
The DC on each side that sends or receives changes or updates from other site DC
is called Bridge Head Server. Therefore we can define it as A domain controller
that receives changes from remote site and then forward these changes to local
DC.
If you want to display bridge head server then type the repadmin /bridgeheads
command in the command line but you will see no bridge head server.
Now make two sites Lahore and Islamabad then move Lahore DC into Islamabad
site then again run the above command.
Site links
Site links means when you are establishing links between sites then you must
consider the following five things
1. Protocols
a. IP
b. SMTP (it runs on limited bandwidth)
2. Member site
3. Cost
4. Interval
5. Schedule
Steps:
Click on Administrative tools then click on Active directory sites and trust
Click on AD sites and services then click on sites
click on inter site transport then select IP and right click on it and select
new site link
Give name to the site and press ok.
Now right click on the created site and select properties
Click on cost. When the value of cost is low then its priority is high. For
example if you have two links A and B. The link will be preferred whose cost
is low. But if both links have the same cost then defines a schedule by
clicking on the schedule button.
Steps:
First install support tools from windows server 2003 CD. Click on support
tools then inside the tools folder select support tools .msi and install it.
Now type replmon in the command line and press ok
Right click on the monitored server and select Add monitored servers
Add the name of the server or click on search
Click on expand
Lecture no-1
Managing Server 2008 Storage
Basic Disk
Dynamic Disk
Primary Partition
Extended Partition
Logical Partition
Simple Volume
Spanned Volume
Stripped Volume
Mirrored volume / disk duplexing
Hardware implementation of RAID
Software implementation of RAID
RAID-0 (disk stripping / stripped volume)
RAID-1 (disk mirroring / mirrored volume)
RAID-5 (stripped volume with parity)
San
Nas
Storage networking
Lecture no-2
IIS (Internet Information Service)
There are three methods for hosting multiple websites on the same web server
Steps for hosting multiple websites on same web server using different IP’s
In order to host multiple websites on the same web server by assigning different
port numbers, you have to assign different port numbers in creating new websites
and in the internet explorer write the port number along with URL as
[Link] but it is impractical in real world.
URL Redirection
Steps:
IIS Backup
IIS Restore
Note: It will only restore site configuration not the web contents
Windows share point services are not available by default in the server 2008 CD.
You have to download it from the Microsoft website. It is used to make portals,
blogs etc. portal is a website which gives information as well as interaction to the
users (for example facebook, orkit etc). Windows share point services change the
website into portal. Perform the following three steps
Lecture no-3
Remote Desktop Services
There are two components of the remote desktop services. Remote Desktop
Services is introduced in windows 2000 which is called terminal services in which
both the components must be installed. In Windows 2003 both these
components were separated. In windows 2008 R2 it is called remote desktop
services.
1. Remote Administration
For remote administration you don’t need to install remote desktop services only
enable it from the properties of computer.
2. Application Sharing
If you want to perform application sharing then you must install remote desktop
services from Roles.
You need to create a publishing point when you on air live contents. There are
two publishing points.
Note: after performing all these steps if still the video is not playing then only
connect the computer to the internet it will be played. Similarly On Demand
Publishing having the same steps.