Windows 2000 MCSE Study System - Alan R. Carter
Windows 2000 MCSE Study System - Alan R. Carter
Alan R. Carter
Trademarks: All brand names and product names used in this book are trade names, service marks, trademarks, or registered trademarks of
their respective owners. IDG Books Worldwide is not associated with any product or vendor mentioned in this book.
IDG Books Worldwide, Inc. is an independent entity from Microsoft Corporation, and not affiliated with Microsoft Corporation in any
manner.This publication and CD-ROM may be used in assisting students to prepare for a Microsoft Certified Professional Exam. Neither
Microsoft Corporation, its designated review company, nor IDG Books Worldwide, Inc. warrants that use of this publication and CD-ROM
will ensure passing the relevant Exam. Microsoft is either a registered trademark or trademark of Microsoft Corporation in the United States
and/or other countries.
John Kilcullen
Chairman and CEO
IDG Books Worldwide, Inc.
IDG is the world’s leading IT media, research and exposition company. Founded in 1964, IDG had 1997 revenues of $2.05
billion and has more than 9,000 employees worldwide. IDG offers the widest range of media options that reach IT buyers
in 75 countries representing 95% of worldwide IT spending. IDG’s diverse product and services portfolio spans six key areas
including print publishing, online publishing, expositions and conferences, market research, education and training, and
global marketing services. More than 90 million people read one or more of IDG’s 290 magazines and newspapers, including
IDG’s leading global brands — Computerworld, PC World, Network World, Macworld and the Channel World family of
publications. IDG Books Worldwide is one of the fastest-growing computer book publishers in the world, with more than
700 titles in 36 languages. The “...For Dummies®” series alone has more than 50 million copies in print. IDG offers online
users the largest network of technology-specific Web sites around the world through IDG.net (http://www.idg.net), which
comprises more than 225 targeted Web sites in 55 countries worldwide. International Data Corporation (IDC) is the world’s
largest provider of information technology data, analysis and consulting, with research centers in over 41 countries and more
than 400 research analysts worldwide. IDG World Expo is a leading producer of more than 168 globally branded conferences
and expositions in 35 countries including E3 (Electronic Entertainment Expo), Macworld Expo, ComNet, Windows World
Expo, ICE (Internet Commerce Expo), Agenda, DEMO, and Spotlight. IDG’s training subsidiary, ExecuTrain, is the world’s
largest computer training company, with more than 230 locations worldwide and 785 training courses. IDG Marketing
Services helps industry-leading IT companies build international brand recognition by developing global integrated marketing
programs via IDG’s print, online and exposition products worldwide. Further information about the company can be found
at www.idg.com. 1/26/00
4701-1 FM.f.qc 4/24/00 12:28 Page iv
CREDITS
Acquisitions Editors Project Coordinators
Joyce Pepple Linda Marousek
Jennifer Humphreyville Fusilero Danette Nurse
Project Editors Louigene A. Santos
Brian MacDonald Graphics & Production Specialists
Linda Turnowski Robert Bihlmayer
Technical Editor Jude Levinson
Donald E. Dillenburg, MCSE, Michael Lewis
CNE, CNX, CCNA, CCNP Victor Pérez-Varela
Dina F Quan
Copy Editor
Ramses Ramirez
Ami Knox
Book Designer
Media Development Specialist
Kurt Krames
Joe Kiempisty
Illustrators
Permissions Editor
Mary Jo Richards
Leonora Chin Sell
Gabriele McCann
Media Development Manager
Karl Brandt
Stephen Noetzel
Proofreading and Indexing
York Production Services
Cover Design
?????
iv
4701-1 FM.f.qc 4/24/00 12:28 Page v
v
4701-1 FM.f.qc 4/24/00 12:28 Page vi
ACKNOWLEDGMENTS
I never tire of thanking the many people who make it possible for me to
be an author. More people than I can count play a part in the writing
process that starts when I turn on my computer and ends with this nice,
hefty book in your hands.
First of all, I owe a huge debt of gratitude to my lovely wife Pat for the
thousands of hours you spent working with me on this project. I don’t know
how to thank you enough.
Thanks to everyone at IDG Books Worldwide, Inc., including Judy
Brief, Acquisitions Manager; Joyce Pepple, Acquisitions Editor; Jennifer
Humphreville Fusilero, Associate Acquisitions Editor; Brian MacDonald
and Linda Turnowski, Project Editors; and Ami Knox, Copy Editor. Special
thanks to Catalin Dulfu and Kurt Krames for the awesome design — you
did a fantastic job! Thanks also to the unsung heroes in the marketing, pub-
lic relations, sales, and production departments. Finally, many thanks to
Michelle Baxter, Publishing Manager; and to Richard Swadley, Senior Vice
President,Technical Publishing.
A very hearty thank you to Don Dillenburg, MCSE, CNE,ASE, for the
many painstaking hours you spent reviewing this book technically. I’d also
like to sincerely thank Curt Simmons, MCSE, MCT, and Steve Cline for
their hard work and valuable contributions that made it possible to get this
book out on time. I owe you guys.
And last but not least, thanks to my family and friends for their tremen-
dous support during this project.
4701-1 FM.f.qc 4/24/00 12:28 Page viii
CONTENTS AT A GLANCE
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
viii
4701-1 FM.f.qc 4/24/00 12:28 Page ix
Contents at a Glance ix
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1499
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1500
4701-1 FM.f.qc 4/24/00 12:28 Page x
CONTENTS
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Contents xi
xii Contents
Contents xiii
xiv Contents
Contents xv
xvi Contents
Contents xvii
xviii Contents
Contents xix
xx Contents
Contents xxi
xxii Contents
Contents xxiii
xxiv Introduction
Contents xxv
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1461
Appendix A Windows 2000 MCSE Core Exam Objectives . . . . . . . 1463
Appendix B What You Need to Know to Prepare for the Exams . . . . 1487
Appendix C What’s on the CD-ROM . . . . . . . . . . . . . . . . . . . . . 1493
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1499
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1500
End-User License Agreement . . . . . . . . . . . . . . . . . . . . PG#to come
CD-ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PG#to come
4701-1 FM.f.qc 4/24/00 12:28 Page xxvi
4701-1 FM.f.qc 4/24/00 12:28 Page xxvii
INTRODUCTION
Welcome to the Windows 2000 MCSE Study System! This book is designed
to help you acquire the knowledge, skills, and abilities you need to pass the
four core Microsoft Windows 2000 MCSE certification exams:
■ Exam 70-210: Installing, Configuring, and Administering
Microsoft Windows 2000 Professional
■ Exam 70-215: Installing, Configuring, and Administering
Microsoft Windows 2000 Server
■ Exam 70-216: Implementing and Administering a Microsoft
Windows 2000 Network Infrastructure
■ Exam 70-217: Implementing and Administering a Microsoft
Windows 2000 Directory Services Infrastructure
Alternatively, if you’ve already passed the three Windows NT 4.0 exams
(Exams 70-067, 70-068, and 70-073), and you want to take the Microsoft
Windows 2000 Accelerated Exam for MCPs Certified on Microsoft
Windows NT 4.0 (Exam 70-240), you’ll also find everything you need
to know in this volume.
This book is designed to be the only book or course you need to pre-
pare for and pass these Windows 2000 exams. For many people, there’s no
need to spend big bucks to sit in a classroom for several weeks — although
I teach those courses and I’m sure I’d enjoy having you as a student. But in
all honesty, as long as you have access to a computer, some time, and some
self-motivation, most of you can get the knowledge and experience you
need from the text, the numerous labs, the exam-style assessment ques-
tions, and the other carefully designed study guide elements in this book.
If you’re not planning to take one or more of these exams, but you want
to develop a comprehensive working knowledge of Windows 2000
Professional and Windows 2000 Server, then this book is also for you. I’ve
endeavored to explain — in clear, plain English — how Windows 2000
really works, both on stand-alone computers and in real-life network situ-
ations. It’s one thing to read a product help file; it’s another to actually
implement a feature on a live network.This book moves way beyond basic
theory to the practical “how to get the job done” that’s a necessity for net-
work administrators in today’s competitive workplace.
xxvii
4701-1 FM.f.qc 4/24/00 12:28 Page xxviii
xxviii Introduction
My hope is that you’ll find this book the most helpful Windows 2000
product reference you’ve ever read, and that you’ll use it not only to pre-
pare for the Windows 2000 exams, but that you’ll come back to it again
and again as you perform your day-to-day Windows 2000 tasks.
Introduction xxix
outs of sharing, securing, and accessing files and folders, and spells out the
important stuff you need to know about managing printing.This part also
shows you how to establish and manage auditing. Finally, Part III explains
how to back up and recover systems and data, including how to back up
and restore Active Directory.
xxx Introduction
CD-ROMs
The two compact discs included with this book contain some really excel-
lent resources. First, a 120-day evaluation copy of Microsoft Windows 2000
Server is included for you.You and I both know that having access to the
Windows 2000 product is absolutely essential if you’re going to learn how
to use it.You’ll also find a test engine and practice test questions for each of
the four core Microsoft Windows 2000 MCSE certification exams. Next,
you’ll find a complete electronic version of this book, in PDF format,
along with Adobe Acrobat Reader so you can easily navigate this resource.
Finally, an evaluation copy of Diskeeper Server, a premier defragmentation
utility for use on Windows 2000 and Windows NT NTFS partitions, is
included.
Scenarios
4701-1 FM.f.qc 4/24/00 12:28 Page xxxi
Introduction xxxi
Prerequisites
Although this book is a comprehensive study and exam preparation guide,
it does not start at ground zero. I assume you have the following knowl-
edge and skills at the outset:
■ Basic terminology and basic skills to use a Microsoft Windows
product. (This could be Windows 95,Windows 98, or a Windows
NT product.)
4701-1 FM.f.qc 4/24/00 12:28 Page xxxii
xxxii Introduction
Introduction xxxiii
TABLE 2 Chapters that Prepare You for Exam 70-215: Installing, Configuring,
and Administering Microsoft Windows 2000 Server
Chapter Number Chapter Title
Continued
4701-1 FM.f.qc 4/24/00 12:28 Page xxxiv
xxxiv Introduction
TABLE 2 (continued)
Chapter Number Chapter Title
TABLE 3 Chapters that Prepare You for Exam 70-216: Implementing and
Administering a Microsoft Windows 2000 Network Infrastructure
Chapter Number Chapter Title
TABLE 4 Chapters that Prepare You for Exam 70-217: Implementing and
Administering a Microsoft Windows 2000 Directory Services Infrastructure
Chapter Number Chapter Title
Introduction xxxv
CAUTION
Some of the Lab Exercises in this book have the potential to erase or cor-
rupt data on existing hard disks. Make sure you back up all important
data and programs before you attempt to perform the labs. Better yet, do
the labs on a computer that doesn’t contain any vital data or programs.
xxxvi Introduction
TIP
The compact disc included with this book contains an evaluation copy of
Windows 2000 Server.
Introduction xxxvii
task using Windows 2000 Server, it’s usually the same as learning how to
perform the same task using Windows 2000 Professional. So, if you’re won-
dering how I can prepare you for four Windows 2000 exams in one book,
it’s for this reason:Windows 2000 is Windows 2000.
Because of the similarities of the Windows 2000 operating systems,
throughout this book, except where differences are noted, when you read
“Windows 2000” you can assume I’m referring to all three of the most
commonly used Windows 2000 operating systems: Windows 2000
Professional,Windows 2000 Server, and Windows 2000 Advanced Server.
New Terms
How could I talk about Windows 2000 and other computer stuff without
using all kinds of fancy acronyms and terms? You know, the alphabet soup
you throw into everyday conversation around the dinner table that causes
your family members to roll their eyes?
I’ve chosen to italicize new or potentially unfamiliar terms, such as
Active Directory, as I define them. Normally, I’ll define a new term right
after its first mention. If you happen to see an unfamiliar word that’s itali-
cized, such as application programming interface (API), but it’s not followed by
a definition, you can flip to the glossary to read the definition of the term.
xxxviii Introduction
Code
All code listings and uniform resource locators (URLs) in this book are
presented in monospace font, like this:
http://www.microsoft.com
I’ve also used this type of font to identify names of files, folders, network
drives, paths to network resources, fully qualified domain names (FQDNs),
and character-based screen content when presented verbatim.
When you see monospace font presented in italics, the italicized text
represents a variable that could actually have a different name. For example,
I frequently use the term SystemRoot to indicate the drive and folder that
Windows 2000 is installed in on your computer, which, by default, is usu-
ally C:\Winnt.This folder, however, can actually be named anything you
want to call it.
When a variable consists of two or more words, I use underscores to
connect the words. An example of this type of variable is found in the
naming structure of an FQDN, which is server_name.domain_
name.root_domain_name. In this example, the variables “server name,”
“domain name,” and “root domain name” are separated by underscores to
convey the fact that the connected words represent a single variable.
Lastly, some command-line utilities have optional switches.When I refer
to such an optional switch, I show the switch in a pair of brackets, like this:
[/V]
Icons
Several different icons are used throughout this book to draw your atten-
tion to matters that deserve a closer look:
Professional
Server
EXAM Network
MATERIAL
Active Directory
You’ll see an icon similar to this at the beginning of each chapter and at
the beginning of each Lab Exercise. It will let you know, at a glance, exactly
which exams the chapter or lab is designed to help you prepare for.
4701-1 FM.f.qc 4/24/00 12:28 Page xxxix
Introduction xxxix
CAUTION
This icon is used to warn you that something unfortunate could happen if
you’re not careful. It also points out information that could save you a lot
of grief. It’s often easier to prevent a tragedy than to fix it afterwards.
CROSS-REFERENCE
This icon points you to another place in this book for more coverage of a
particular topic. It may point you back to a previous chapter where impor-
tant material has already been covered, or it may point you ahead to let
you know that a topic will be covered in more detail later on.
EXAM TIP
This icon points out important information or advice for those preparing
to take any of the four core Microsoft Windows 2000 MCSE certification
exams.
TIP
This icon is used to draw your attention to a little piece of friendly advice,
a helpful fact, a shortcut, or a bit of personal experience that might be of
use to you.
How to Contact Me
I’ve done my very best to make sure the contents of this book are techni-
cally accurate and error free. My technical reviewer and editors have also
worked hard toward this goal.
However, I know that perfection isn’t a possibility in the real world, and
if you find an error, or have some other comment or insight, I’d appreciate
hearing from you.You can contact me via the Internet at alan_carter@
usa.net.
I always read all of my readers’ e-mail messages, and, when possible,
include your corrections and ideas in future printings. However, because of
4701-1 FM.f.qc 4/24/00 12:28 Page xl
xl Introduction
Professional
Server
EXAM Network
MATERIAL
Directory Services
EXAM OBJECTIVES
The content of this chapter doesn’t map directly to any one spe-
cific exam objective, but that doesn’t mean it’s not important. The
basics presented in this chapter are crucial to your understanding
of Windows 2000.
So, no matter which of the four core Windows 2000 exams you’re
preparing for, read on. You owe it to yourself to get a firm grasp of
the Windows 2000 fundamentals early on, so you can dive into the
rest of the chapters with confidence.
4701-1 ch01.f.qc 4/24/00 09:01 Page 5
C HAP TE R
1
Overview of
Windows 2000
T his chapter explores the basics of the four new Windows 2000 operat-
ing systems. Ever wondered which operating system to choose for a
given situation? Or whether to choose a workgroup or a domain model?
These issues are explained and answered in this chapter. You’ll want to read
this chapter no matter which of the four core Microsoft Windows 2000 exams
you’re preparing for, because it spells out fundamental concepts you’ll need to
know, including:
■ Basic descriptions and features of the four new Windows 2000 operat-
ing systems: Professional, Server, Advanced Server, and Datacenter
Server
■ How the Windows 2000 user interface looks and feels
■ Application environments supported by Windows 2000
■ Fundamentals of Windows 2000 architecture
■ Explanations of basic Windows 2000 concepts: workgroups, domains,
and an introduction to Active Directory
5
4701-1 ch01.f.qc 4/24/00 09:01 Page 6
Chapter Pre-Test
1. List the four new Windows 2000 operating systems.
2. Does Windows 2000 support Plug and Play?
3. What are the five application types supported by Windows 2000?
4. Which hardware platforms are supported by Windows 2000?
5. What are the two primary modes in the Windows 2000
architecture?
6. What is Active Directory?
4701-1 ch01.f.qc 4/24/00 09:01 Page 7
TIP
When you hear the name “Windows 2000,” you might think this operat-
ing system is a revised version of Windows 98. However, Windows
2000 is really the latest and greatest version of Windows NT, and was
originally called Windows NT 5.0 before Microsoft changed its name to
Windows 2000.
Although based on the same kernel, each of the four operating systems
that make up the Windows 2000 operating system family is optimized for
use in a specific environment.
The following section explores some of the new common features
shared by the four Windows 2000 operating systems.
Hardware Requirements
As with all new versions of operating systems, Windows 2000 Profes-
sional requires significantly more hardware resources than did either of its
predecessors — Windows NT Workstation or Windows 98.The minimum
hardware required to successfully install and run Windows 2000
Professional on an Intel-based computer includes:
■ A Pentium/133MHz processor
■ 32MB of RAM (64MB are recommended)
■ 650MB of free hard disk space
In order to ensure operational success, all hardware should be on the
Windows 2000 Hardware Compatibility List (HCL) that is shipped with the
product and is also posted on Microsoft’s Web site.
CROSS-REFERENCE
For more information on the Hardware Compatibility List, including Web
site information, see Chapter 3. For detailed information on the hardware
requirements for installing Windows 2000 Professional, also see
Chapter 3.
Application Support
Windows 2000 Professional supports most MS-DOS–based applications,
most 16-bit and 32-bit Windows-based applications, POSIX 1.x applica-
tions, and most OS/2 1.x applications. Specifically, Windows 2000
Professional supports many Windows 95/Windows 98 applications that
were not supported by Windows NT Workstation 4.0. Windows 2000
Professional does not support applications that require direct hardware
access (bypassing the Hardware Abstraction Layer [HAL]) because this
4701-1 ch01.f.qc 4/24/00 09:01 Page 10
Security
Windows 2000 Professional supports a high level of security. User logon
and authentication are required in order to use the operating system and in
order to access local or network resources. Windows 2000 Professional
supports a local user account database, and can also support either a
Windows NT Server 4.0 domain user account database or user accounts
from the Windows 2000 Active Directory.
Two other security features of Windows 2000 Professional are smart card
support and Internet Protocol Security.A smart card is a security device that
contains a unique, encrypted set of authentication credentials.When used in
4701-1 ch01.f.qc 4/24/00 09:01 Page 11
conjunction with a smart card reader that has been installed on a computer,
smart cards eliminate the need for users to transmit user names and pass-
words across the network when logging on. Internet Protocol Security (IPSec)
encrypts TCP/IP traffic between two computers, thus preventing unautho-
rized users who capture network traffic from viewing or modifying sensi-
tive data.
Hardware Requirements
The minimum hardware required to successfully install and run Windows
2000 Server on an Intel-based computer includes:
■ A Pentium/133MHz processor
■ 64MB of RAM (128MB are recommended)
■ 950MB of free hard disk space (more disk space is required if the
computer contains more than 64MB of RAM)
All hardware should be on the Windows 2000 HCL.
CROSS-REFERENCE
For more detailed information on hardware requirements for installing
Windows 2000 Server, see Chapter 3.
File Management
Windows 2000 Server supports two new file management tools, the
Distributed file system (Dfs) and disk quotas.
The Distributed file system (Dfs) is a file system that enables an adminis-
trator to make shares that are stored on various servers on the network
appear to users as though they are stored within a single share on a single
server. The use of Dfs makes finding network resources easier for users,
because users don’t have to know which server physically contains the
shared resource they are trying to access.
4701-1 ch01.f.qc 4/24/00 09:01 Page 12
Application Support
Windows 2000 Server supports the same software applications as Windows
2000 Professional. In addition,Windows 2000 Server is optimized to support
the Microsoft BackOffice suite of products, including SQL Server, Systems
Management Server, Internet Information Server, Exchange Server, and
SNA Server, as well as many third-party server-based applications.
Windows 2000 Server also supports Terminal Services. This application
service, when run on a network server, enables users of client computers to
remotely perform processor-intensive or network-intensive tasks from
their client computers. The application runs on the server running
Terminal Services, so the user can take advantage of the processing power
and network connectivity of the server, while fully controlling the applica-
tion from the client computer’s keyboard and monitor.
CROSS-REFERENCE
Chapter 20 is devoted entirely to managing Terminal Services.
Security
Windows 2000 Server includes all of the security features of Windows
2000 Professional, and has additional security features of its own.
Windows 2000 Server supports a local user account database, and can also
support either a Windows NT Server 4.0 domain user account database, or
user accounts from the Windows 2000 Active Directory. In addition,
Windows 2000 Server can be configured as a domain controller, which
4701-1 ch01.f.qc 4/24/00 09:01 Page 13
contains a read/write copy of the Active Directory data store. Active Directory
is a directory service that stores information about various types of network
objects, including printers, shared folders, user accounts, and computers.
These objects are placed in a hierarchical structure that can be organized to
simplify administration.With Active Directory, users can gain access to any
network resource (that the user has permissions to) with a single logon.
CROSS-REFERENCE
Active Directory is an important feature of Windows 2000. It is dis-
cussed briefly later in this chapter, and is the primary focus of Chapter 2.
Networking
Windows 2000 Server supports routing of the IP, IPX, and AppleTalk pro-
tocols over both LAN and WAN interfaces. Both the Routing Information
Protocol (RIP) version 2 and the Open Shortest Path First (OSPF) routing
protocols are supported for IP routing.
Another new networking feature of Windows 2000 Server is the sup-
port this operating system provides for asynchronous transfer mode (ATM)
network adapter cards. ATM technology makes possible the simultaneous
transport of voice, data, video, and images over the network.
TIP
Because of the similarities of the Windows 2000 operating systems,
throughout this book, except where differences are noted, when you read
“Windows 2000” you can assume I’m referring to all three of the most
commonly used Windows 2000 operating systems: Windows 2000
Professional, Windows 2000 Server, and Windows 2000 Advanced
Server. Windows 2000 Datacenter Server is beyond the scope of this
book, and its differences will not be discussed in this book.
There are several icons on the desktop, as well as a taskbar. Each of these
items is discussed in the following sections.
My Documents
The My Documents icon represents the My Documents folder of the
logged-on user.This folder is the default storage location for user-created
documents. Double-clicking the My Documents icon displays the con-
tents of the My Documents folder.
My Computer
Double-clicking the My Computer icon displays the My Computer dialog
box. This dialog box graphically represents every drive on the computer
(including network drives, if any), as well as the Control Panel folder. If
you double-click any icon in the My Computer dialog box, a dialog box is
displayed showing the contents of the drive or folder you clicked.
TIP
Windows 2000 offers you a choice of whether to single-click or double-
click to open an item, such as My Computer. The default setting is
double-click. If you want to change this setting, open My Computer, then
select Tools ➪ Folder Options. In the Folder Options dialog box, select
the “Single-click to open an item” option. This setting applies not only to
My Computer, but to the other items on the desktop, and also to all items
displayed in Windows Explorer.
My Network Places
If you double-click the My Network Places icon, a dialog box is displayed
that contains an icon for Add Network Place, an icon for Computers Near
Me, and an icon for the Entire Network.
Use the Add Network Place icon when you want to connect to a shared
folder on the network, or connect to an FTP or Web site. This icon is a
simplified wizard for mapping a network drive or connecting to a Web site,
and creating a shortcut to this drive or Web site in the My Network Places
folder.
If you double-click the Computers Near Me icon, all of the computers
in your workgroup or domain are displayed.You can double-click any of
these computers to display the shared folders and shared printers on that
computer.The Printers and Scheduled Tasks folders on the selected com-
puter are also displayed.
4701-1 ch01.f.qc 4/24/00 09:01 Page 18
The Entire Network icon, when double clicked, opens a dialog box that
gives you three options.You can select a link that will search for a particu-
lar computer on the network.You can also select a link that will search for
specific files or folders located anywhere on the network. Finally, you can
select a link that will let you view and browse all of the workgroups,
domains, and computers on your network.
Recycle Bin
The Recycle Bin icon is a politically correct version of the Macintosh
trash can icon.When you delete files, the files are moved from their origi-
nal location into the Recycle Bin folder. If you later want those files back,
you can move them from the Recycle Bin to another location.When you
delete items in the Recycle Bin, the items are removed permanently from
your computer. It’s normally a good idea to periodically empty your
Recycle Bin so that a large amount of valuable disk space is not taken up
by deleted files.
Internet Explorer
When you double-click the Internet Explorer icon, Microsoft Internet
Explorer 5 starts.You can use this application to browse Web pages located
on the Internet or on your company’s intranet.
Taskbar
The taskbar at the bottom of the desktop contains the Start button, a
Quick Launch toolbar, a button for each program that is currently run-
ning, and a clock.
I’ll get to the Start button and Quick Launch toolbar in a minute, but
first let me explain how you can use the other elements in the taskbar.
4701-1 ch01.f.qc 4/24/00 09:01 Page 19
You can use the taskbar to quickly switch between two or more appli-
cations that are running by clicking the button that represents the applica-
tion you want to use.You can configure the properties of the taskbar by
right-clicking anywhere on the taskbar, and then selecting Properties.
Finally, you can easily set the time and date by double-clicking the clock in
the taskbar.
Start Button The Start button is located on the left side of the taskbar at
the bottom of the desktop. Clicking the Start button opens a menu that
enables you to quickly access programs, recently used documents, favorites,
settings (such as the Control Panel and Printers folders), and Help. The
menu also includes a Windows Update option, which is a link to
Microsoft’s Web site where you can download new Windows features and
operating system updates. In addition, this menu enables you to run appli-
cations from a command line, find a document, log off, and shut down
your computer.
You can customize your Start menu by dragging and dropping program
icons from one Start menu folder to another location in the Start menu.
For example, when I select Start ➪ Programs ➪ Accessories ➪ Windows
Explorer, I can click Windows Explorer, and drag and drop it directly in
the Programs folder in my Start menu. From then on, when I want to run
Windows Explorer, I will select Start ➪ Programs ➪ Windows Explorer.
I could also have dropped Windows Explorer directly on the top section
of my Start menu, above Programs. If I had dropped Windows Explorer
here, I would select Start ➪ Windows Explorer to run this program.
Quick Launch Toolbar The Quick Launch toolbar is located directly to the
right of the Start button in the taskbar. By default, the Quick Launch tool-
bar consists of the Show Desktop icon, the Internet Explorer icon, and the
Outlook Express icon. The purpose of the Quick Launch toolbar is to
enable you to easily start any of the applications whose icons appear in the
toolbar by clicking the icon for the desired application.You can customize
the Quick Launch toolbar by dragging and dropping shortcuts from your
desktop, the Start menu, or Windows Explorer on the toolbar. You can
place the Quick Launch toolbar anywhere on your desktop by clicking the
left end of the toolbar, and then dragging and dropping it to the desired
location on your desktop.
4701-1 ch01.f.qc 4/24/00 09:01 Page 20
Windows Explorer
A discussion of the Windows 2000 user interface wouldn’t be complete
without mentioning Windows Explorer. You can access any file, folder,
printer, or application on your computer or on the network in Windows
Explorer. Windows Explorer replaces Windows NT Explorer from earlier
versions of Windows NT. Windows Explorer is a useful tool for copying,
moving, and deleting files.You can also share folders and configure file and
folder security by using this program.
4701-1 ch01.f.qc 4/24/00 09:01 Page 21
EXAM TIP
A basic understanding of the application environments will serve you well
when you’re optimizing and troubleshooting applications, and also when
you sit down to take the Windows 2000 Professional exam, which has a
stated objective on this very topic. For now I’ll begin by laying the ground-
work, and later I’ll present more detailed information on optimizing and
troubleshooting applications in Chapter 22.
MS-DOS Environment
Applications designed for the MS-DOS environment are typically legacy
applications that use a character-based, command-line interface. A charac-
ter-based, command-line interface is one that relies on keyboard input
rather than mouse input.Additionally, the screen display does not necessar-
ily match the printed output — it’s not What You See Is What You Get
(WYSIWYG). Many utilities designed for MS-DOS are still useful even
though they haven’t been rewritten for use in the Windows graphical
environment.
Windows 2000 includes support for MS-DOS applications via a subsys-
tem called a Virtual DOS Machine (VDM). A VDM is a Win32 applica-
tion that emulates an Intel 486 computer running the MS-DOS operating
system.
Most MS-DOS applications are supported by Windows 2000 in a VDM.
However, MS-DOS applications that make direct calls to hardware are not
supported by Windows 2000. These applications could compromise the
NTFS file and folder security provided by the Windows 2000 operating
system if they were permitted to directly access the computer’s hard disk.
The other reason direct calls to hardware are not permitted is to protect
against the possibility of an application accessing and modifying memory
that is in use by Windows 2000, and thereby causing the system to crash.
Windows 2000 enables multiple VDMs to be run, and each MS-DOS
application runs in its own separate VDM. Because each application runs in
its own separate VDM, if an MS-DOS application crashes, other applica-
tions are not affected.Additionally,Windows 2000 can preemptively multi-
task multiple MS-DOS applications.
4701-1 ch01.f.qc 4/24/00 09:01 Page 23
VDMs have three threads.Two of these threads are used to maintain the
VDM environment.The third thread is used by the application. An appli-
cation that runs in a VDM is referred to as a singled-threaded application,
because only one thread is used by the application.
Some MS-DOS applications require environmental settings that would
normally be configured in the MS-DOS computer’s Autoexec.bat or
Config.sys files. For example, a path to the application may need to be
specified, or a terminate-and-stay-resident (TSR) program may need to be
loaded prior to starting the application.To provide the same environmental
settings in a Windows 2000 environment, you can edit the Autoexec.nt
and Config.nt files to include any necessary instructions. Settings con-
tained in the Autoexec.nt and Config.nt files are executed each time a
VDM is started.These files are edited in the same manner as you would edit
an Autoexec.bat or Config.sys file. The Autoexec.nt and
Config.nt files are stored in the SystemRoot\System32 folder. The
default Autoexec.nt and Config.nt files contain instructions for editing
and configuring these files.
TIP
Throughout this book, I use the term SystemRoot to refer to the folder
that Windows 2000 is installed in. The default installation folder for
Windows 2000 is C:\Winnt.
Win16 Environment
Win16 environment applications consist of 16-bit Windows applications
designed for Windows 3.x and Windows for Workgroups.These applications
are graphical applications that accept input from both a mouse and key-
board. Often the screen display matches the printed output (WYSIWYG).
Windows 2000 provides support for 16-bit Windows applications via a
special subsystem called WOW, for Win16-on-Win32. The WOW subsys-
tem is a special purpose VDM, called a Win16 VDM, that emulates an Intel
486 computer running MS-DOS and Windows 3.1.
Most 16-bit Windows applications are supported by Windows 2000.
However, 16-bit Windows applications that make undocumented calls to
the operating system or that require specific device drivers that make direct
calls to hardware may not run correctly on Windows 2000.
4701-1 ch01.f.qc 4/24/00 09:01 Page 24
By default, when multiple Win16 applications are run at the same time,
they all run in a single Win16 VDM.This means that, by default, all Win16
applications share the same memory space. Because the Win16 applications
share the same memory space, if one application crashes, other Win16 appli-
cations may also crash. Because multiple Win16 applications share a single
Win16 VDM,Windows 2000 can’t preemptively multitask multiple Win16
applications.
To prevent a rogue Win16 application from crashing all of your other
Win16 applications, and to allow Win16 applications to be preemptively
multitasked,Windows 2000 permits Win16 applications to be run in sepa-
rate Win16 VDMs.This is referred to as running Win16 applications in sep-
arate memory spaces.
CROSS-REFERENCE
For details on how to configure a Win16 application to run in a separate
memory space, see the section on optimizing applications in Chapter 22.
Win32 Environment
The Win32 environment is Windows 2000’s native application environ-
ment. It is the preferred and fastest environment for running applications
on Windows 2000, because no emulation or workarounds are required.
Win32 environment applications consist of 32-bit Windows applications
written specifically for Windows 95, Windows 98, Windows NT, and
Windows 2000. Windows 2000 provides support for Win32 applications
via the Win32 subsystem.
Each Win32 application runs in its own separate memory space. Because
of this, if a Win32 application crashes, other applications are not affected.
Windows 2000 can preemptively multitask multiple Win32 applications.
POSIX Environment
Portable Operating System Interface for Computing Environments (POSIX) was
developed as a set of accepted standards for writing applications for use on
various UNIX computers. POSIX environment applications consist of
applications developed to meet the POSIX standards. These applications
are sometimes referred to as POSIX-compliant applications.
4701-1 ch01.f.qc 4/24/00 09:01 Page 25
OS/2 Environment
OS/2 environment applications consist of 16-bit, character-based applica-
tions designed for OS/2 version 1.x. Applications designed for other ver-
sions of OS/2, including OS/2 2.x, 3.x, and Presentation Manager
applications, are not supported by Windows 2000.Windows 2000 provides
support for OS/2 applications via the OS/2 subsystem.
Some OS/2 applications, called real-mode applications, can be run in an
MS-DOS environment. Because Windows 2000 supports MS-DOS
VDMs, real-mode OS/2 applications can be run in a VDM by using the
Forcedos.exe command to start the application.
Each OS/2 application runs in its own separate memory space. This
means that if an OS/2 application crashes, other applications are not
affected.Windows 2000 can preemptively multitask OS/2 applications.
EXAM TIP
An understanding of the Windows 2000 architecture will also help you to
become a good troubleshooter — and all four of the core Windows 2000
exams contain numerous troubleshooting objectives.
User mode
Kernel mode
Executive Services
Microkernel
Hardware
User Mode
Applications and their subsystems run in user mode.This mode is referred to
as a less-privileged processor mode because it does not have direct access to
hardware. User mode applications are limited to assigned memory address
spaces and can’t directly access other memory address spaces. User mode
uses specific application programming interfaces (APIs) to request services from
a kernel mode component.
The purpose of separating the applications in user mode from the hard-
ware, of restricting the memory address spaces that applications can access,
and of forcing the applications to run all requests for services through the
kernel mode, is to protect against the possibility of an application crashing
the system, and also to protect against unauthorized user access.
4701-1 ch01.f.qc 4/24/00 09:01 Page 28
Examine Figure 1-3 again, and notice that there are four main subsys-
tems in user mode: the OS/2 subsystem, the Win32 subsystem, the POSIX
subsystem, and the Security subsystem.
The OS/2 subsystem is required to run OS/2 1.x–compatible applica-
tions. The OS/2 subsystem obtains its user interface and its screen func-
tions from the Win32 subsystem, and requests Executive Services in kernel
mode to perform all other functions for it. (Executive Services is covered
in the next section of this chapter.)
The Win32 subsystem is the primary application subsystem. All 32-bit
Windows applications run in this subsystem. The Win32 subsystem pro-
vides its own screen and keyboard functions, and requests Executive
Services in kernel mode to perform all other functions for it.The Win32
subsystem also provides screen and keyboard functions for all of the other
subsystems.
The POSIX subsystem is designed to run POSIX 1.x–compatible appli-
cations. It functions very much like the OS/2 subsystem.The POSIX sub-
system uses the Win32 subsystem to provide all of its screen and graphical
displays, and it requests Executive Services in kernel mode to perform all
other functions for it.
Finally, the Security subsystem, which is also referred to as the Integral sub-
system, supports the logon process.This subsystem also supports and provides
the security for Active Directory. The Security subsystem obtains its user
interface and its screen functions from the Win32 subsystem, and requests
Executive Services in kernel mode to perform all other functions for it.
In addition to the four formal subsystems, a Virtual DOS Machine
(VDM) is a feature of user mode. Its function is to run MS-DOS–based
and Windows 3.x–based (all 16-bit) applications. Because the VDM is a
Win32 application, all of its services, including screen and keyboard func-
tions, are provided by the Win32 subsystem.
Kernel Mode
Kernel mode refers to a highly privileged mode of operation. It is called
“highly privileged” because all code that runs in kernel mode can access
the hardware directly, and can also directly access memory. A process run-
ning in kernel mode is not restricted to its own specific memory address
space as is an application running in user mode.
The entire set of services that comprise kernel mode is called Executive
Services (or sometimes the Windows NT Executive, or the Executive, for
4701-1 ch01.f.qc 4/24/00 09:01 Page 29
TIP
Notice that I mentioned that Executive Services is sometimes called the
Windows NT Executive. Because Windows 2000 is the next version of
Windows NT, the name Windows NT will periodically crop up in descrip-
tions of Windows 2000 operating system components and processes.
Notice how Figure 1-3 graphically presents the pieces of kernel mode.
Kernel mode is made up of numerous components integral to the major
Windows 2000 operating system functions.
The Executive Services component functions as an interface between user
mode and kernel mode. Its purpose is to pass information between user
mode subsystems and kernel mode components. In addition, Executive
Services is responsible for the transfer of information and instructions
between the various kernel mode components. Executive Services can be
thought of as the “glue” that holds Windows 2000 together. As mentioned
earlier, Executive Services is also called the Windows NT Executive, or the
Executive, for short.
The I/O Manager is responsible for all input and output to disk storage
subsystems.As it manages input and output, the I/O Manager also serves as a
manager and supporter of communication between the various drivers.The
I/O Manager can communicate directly with system hardware if it has the
appropriate hardware device drivers. Subcomponents of the I/O Manager
include a Cache Manager, File System Drivers, and Device Drivers.
Window Manager is responsible for providing the graphical user inter-
face. Window Manager communicates directly with the graphics device
drivers, which in turn communicate directly with the hardware. In the
early days of Windows NT (versions 3.51 and earlier), Window Manager
was an integral part of the Win32 subsystem in user mode.When Windows
NT 4.0 came along, the developers moved Window Manager from user
mode to kernel mode. This change enabled faster access to the graphics
device drivers and eliminated the need for user mode applications to
switch back and forth between kernel mode and user mode to make calls
for graphics services. For these reasons,Window Manager continues to be
a kernel mode component in Windows 2000.
There are six other kernel mode subsystems: the Security Reference
Monitor, the Virtual Memory Manager, the Object Manager, the Plug and
4701-1 ch01.f.qc 4/24/00 09:01 Page 30
Play Manager, the Power Manager, and the IPC Manager. Each one of
these subsystems communicates directly with the Microkernel.
The Microkernel is the very heart of the Windows 2000 operating sys-
tem. It handles interrupts, schedules threads, and synchronizes processing
activity. The Microkernel, in turn, communicates with the Hardware
Abstraction Layer (HAL).
The HAL is designed to hide the varying characteristics of hardware so
that all hardware platforms appear the same to the Microkernel.As a result,
only the HAL, and not the entire Microkernel, needs to address each and
every hardware platform. The HAL can communicate directly with the
computer’s hardware.
Now that you’ve been introduced to user mode and kernel mode,
you’re ready to move on to the last major architecture topic: the Windows
2000 memory model.
Workgroups
A workgroup is a logical grouping of networked computers in which one or
more of the computers has one or more shared resources, such as a shared
folder or a shared printer.
In a Windows 2000 (or Windows NT) workgroup environment, user
account security is maintained individually at each separate computer
through the use of a local user account database. Resources and adminis-
tration are distributed throughout the computers that make up the work-
group. In a workgroup configuration there is no centrally maintained user
accounts database, nor any centralized security.This means that a user must
have a user account on each computer in the workgroup that contains a
shared resource that the user needs to access. Figure 1-4 illustrates how
user account security is distributed throughout a workgroup environment.
Notice that user account security is maintained individually at each sepa-
rate computer in the workgroup.
4701-1 ch01.f.qc 4/24/00 09:01 Page 32
User account
security
maintained
at local PC
Shared
hard disk
User account PC User account
security security
maintained maintained
at local PC at local PC
PC PC
Accounting
Shared Shared
printer printer
PC
User account
security
maintained Shared
at local PC hard disk
Domains
A domain is a logical grouping of networked computers in which one or more
of the computers has one or more shared resources, such as a shared folder or
a shared printer, and in which all of the computers share a common central
domain directory database that contains user account security information.
One distinct advantage of using a domain, particularly on a large network,
is that administration of user account security for the entire network can be
managed from a centralized location. In a domain, a user has only one user
account, which is stored in the domain directory database.This user account
enables the user to access shared resources (that the user has permissions to
access) located on any computer in the domain. Figure 1-5 illustrates how
user account security is centralized in a domain environment. Note that all
user account security is maintained by the domain controller.
User account
security maintained
at domain
PC controller
Windows 2000
Shared
Server domain
printer
controller or
Windows NT 4.0
Primary Domain
Controller (PDC)
PC
Sales.com Domain
Shared
printer
PC
Shared Shared
hard disk printer
Shared
hard disk
Active Directory
Active Directory is the directory service used by Windows 2000. A directory
service is a centralized, hierarchical database that contains information about
4701-1 ch01.f.qc 4/24/00 09:01 Page 35
Supports two new file systems: FAT32 and the Encrypting File System
(EFS)
Power Options in Control Panel
■ The application environments supported by Windows 2000 include the MS-
DOS environment, the WIN16 environment, the Win32 environment, the
POSIX environment, and the OS/2 environment.
■ Windows 2000 supports only the Intel Pentium/166MHz (and higher) hard-
ware platform.
■ Fundamental terms relating to the Windows 2000 architecture include user
mode, kernel mode, and the Windows 2000 virtual memory model. User mode
does not have direct access to hardware. In contrast, all code that runs in ker-
nel mode can access the hardware directly, and can also directly access mem-
ory. The Windows 2000 virtual memory model utilizes demand paging.
■ Three other important Windows 2000 concepts are workgroups, domains, and
Active Directory.
A workgroup is a logical grouping of networked computers in which one
or more of the computers has shared resources, such as a shared folder
or a shared printer.
A domain is a logical grouping of networked computers in which one or
more of the computers has one or more shared resources and in which all
of the computers share a common central domain directory database that
contains user account security information.
Active Directory is the directory service used by Windows 2000.
4701-1 ch01.f.qc 4/24/00 09:01 Page 37
37
STUDY GUIDE
This section contains several exam readiness questions designed to test
your knowledge and help you prepare for the exams. You can find the
answers to these questions at the end of this chapter.
EXAM TIP
I urge you to take the time to answer the questions in the Assessment
Questions section at the end of each chapter. These questions are
specifically designed to help you to apply the facts and concepts you’ve
just learned. Your investment of time now will pay off later when you take
the exams!
Assessment Questions
1. You are choosing a Windows 2000 operating system to use on a new
computer at your company.This new computer will be used exclu-
sively as an employee’s desktop computer.Which operating system
should you choose?
A. Windows 2000 Professional
B. Windows 2000 Server
C. Windows 2000 Advanced Server
D. Windows 2000 Datacenter Server
2. You are choosing a Windows 2000 operating system to use on a new
computer at your company.This new computer will be used exclu-
sively as a network file server.Which operating system should you
choose?
A. Windows 2000 Professional
B. Windows 2000 Server
C. Windows 2000 Advanced Server
D. Windows 2000 Datacenter Server
4701-1 ch01.f.qc 4/24/00 09:01 Page 38
38
39
Virtual DOS
OS/2 Win32 POSIX Logon
application application process
(VDM)
OS/2 POSIX
subsystem
Services
Cache Process
Manager Manager
(LPC)
File Facility
System
Drivers
(RPC)
Facility
Microkernel
Hardware (HAL)
Hardware
40
Assessment Questions
1. A. Windows 2000 Professional is optimized for use on desktop
computers.
2. B. Windows 2000 Server is optimized for use on network file, print,
application, and Web servers.
3. C. Windows 2000 Advanced Server is optimized for use on servers
(such as SQL servers) in an enterprise network environment.
4. A. The Intel Pentium/166MHz (and higher) platform is the only
hardware platform supported by Windows 2000.
5. D. The Security subsystem, which is also referred to as the Integral
subsystem and is a user mode component, supports the logon process.
It also supports and provides the security for Active Directory.
6. A. Applications and their subsystems run in user mode.
4701-1 ch01.f.qc 4/24/00 09:01 Page 41
41
User mode
Kernel mode
Executive Services
Microkernel
Hardware
Directory Services
EXAM
MATERIAL
EXAM OBJECTIVES
C HAP TE R
2
Overview of Active
Directory
43
4701-1 ch02.f.qc 4/24/00 09:02 Page 44
Chapter Pre-Test
1. Two key features of Active Directory are _____________ and
_____________.
2. What are the fundamental units that make up Active Directory?
3. What is the difference between a domain tree and a forest?
4. What service is Active Directory dependent on?
5. What is the primary purpose of organizational units (OUs)?
4701-1 ch02.f.qc 4/24/00 09:02 Page 45
CROSS-REFERENCE
This chapter is basically a theoretical and planning discussion about
Active Directory. Later chapters in this book address installing Active
Directory (Chapter 7), administering and securing Active Directory
(Chapter 8), and managing and optimizing Active Directory operations
and replication (Chapter 22).
So why is Active Directory so cool? I’ll answer that question in the next
section by discussing some of the features of Active Directory.
4701-1 ch02.f.qc 4/24/00 09:02 Page 46
Ease of Administration
The logical, hierarchical structure of Active Directory, in conjunction with
group policies, makes for greater ease in administering a Windows 2000
Server network.
You can think of the structure of Active Directory as being like the
hierarchical structure of a file system. When working with a file system,
you can assign a particular user administrative rights to a folder and to all of
that folder’s contents. In Active Directory, you can delegate, to a particular
4701-1 ch02.f.qc 4/24/00 09:02 Page 47
EXAM TIP
If you don’t have a solid understanding of the structure of Active
Directory and its components, don’t even think of taking the Directory
Services exam! Nailing down these concepts is vitally important to your
success on this exam.
Schema
In Active Directory terminology, the schema is a formal definition — a set
of rules, if you wish — of all of the classes of objects and their attributes
that are stored in the directory. The schema governs the structure of the
directory, including how various objects in the directory fit into the direc-
tory’s hierarchical structure.
The schema is what makes Active Directory extensible.As organizations
change, it may be necessary to add or modify object attributes, or even to
create new classes.The use of certain applications, in particular, may require
these kinds of modifications. Microsoft anticipates that application vendors
will provide the means to modify the schema when necessary to support
their application’s specific requirements.
4701-1 ch02.f.qc 4/24/00 09:02 Page 50
CROSS-REFERENCE
For information on Installing the ADMINPAK, see the sidebar titled
“Installing the ADMINPAK” in Chapter 8.
Because the schema is the heart of Active Directory, it’s important that
it be protected from accidental or unauthorized modification. For this
reason, Microsoft created a special Security Group for Windows 2000
called Schema Admins. Only users with this permission can run programs
that will modify the schema.
Global Catalog
The global catalog is a master, searchable index that contains information
about every object in every domain in a forest. For now, you can think of
a forest as all of the domains that make up a company’s network. Forests will
be covered in more technical detail later in this chapter.
The global catalog, in conjunction with various search tools, is what
enables administrators and users to search for and quickly locate an object,
regardless of where the object is located on the network.
Windows 2000 automatically creates, by default, a global catalog on the
first domain controller that is installed in a forest.You can configure other
domain controllers to maintain a copy of the global catalog, as well. The
global catalog contains a full copy, or replica, of all objects in its host
domain, and a partial replica of all objects in all other domains in the
forest. A partial replica includes the most common properties of every
object, but not all of the properties of every object.
Hierarchical Structure
By now you’ve read the term “hierarchical structure” a zillion times. But
what does it mean, exactly? A hierarchical structure refers to a manner of
organizing a group of interrelated elements in which the elements are
ranked or stacked, one above the other. An example of a hierarchical
4701-1 ch02.f.qc 4/24/00 09:02 Page 51
President
Domains
Domains are the fundamental units that make up Active Directory. As
stated previously, a domain is a logical grouping of networked computers in
which one or more of the computers has shared resources, such as a shared
folder or printer, and in which all of the computers share a common Active
Directory data store that contains user account, resource, security, and
other information.Active Directory consists of one or more domains.
A domain is a natural security boundary in a Windows 2000 network.
Users from other domains cannot pierce this boundary to access shared
resources unless trust relationships are created between the domains to
4701-1 ch02.f.qc 4/24/00 09:02 Page 52
TIP
When possible, I recommend using a single domain, because this greatly
simplifies the administration of your network.
Organizational Units
Organizational units are a type of Active Directory object, and are sometimes
called container objects.They contain objects and other organizational units
from their own domain. Organizational units are often called by their
abbreviated name ( OUs.
An organizational unit is used to organize related objects and other
organizational units in Active Directory in much the same way that a
folder is used to organize related files and other folders in a volume. Also,
the organizational unit is the smallest container component of Active
Directory to which you can delegate administrative authority or assign
group policy. The primary purpose of an organizational unit, then, is the
organization of related objects and other organizational units to simplify
administration.
For example, suppose an administrator wants to delegate network
administration of the Sales department to an assistant administrator. The
administrator decides to group together all of the objects associated with
the Sales department (including users, computers, printers, shared folders,
and groups). Then the administrator creates an organizational unit and
4701-1 ch02.f.qc 4/24/00 09:02 Page 53
places all of the objects associated with the Sales department into this
organizational unit. Completing these steps enables the administrator to
delegate administration for the Sales department by assigning the assistant
administrator the permissions required to administer the organizational
unit and its contents.
Trees
In Active Directory terminology, a domain tree is a hierarchical grouping of
one or more domains that must have a single root domain, and may have
one or more child domains. In a domain tree, the root domain is the
domain at the top (or root) of the tree.
Domains in a domain tree are often spoken of in terms of parent
domains and child domains. A parent domain is any domain that is above
another domain in the domain tree hierarchy.A child domain is any domain
that is below another domain in the tree. A domain can be a parent to a
domain below it and a child to the domain above it. In a multidomain tree,
the root domain is always a parent domain. Figure 2-2 illustrates a domain
tree. Notice that there is only one root domain in the tree, but that the tree
contains more than one child domain.
root1.com
child1.root1.com child2.root1.com
grandchild.child2.root1.com
Also notice the naming structure used in Figure 2-2. In a domain tree,
the domains that make up the tree have contiguous DNS domain names.
The root domain’s name forms the basis of (and will be a part of) the
4701-1 ch02.f.qc 4/24/00 09:02 Page 54
FQDNs of all of the other domains in the tree.A child domain’s FQDN is
created by appending the name of the parent domain to its own NetBIOS
name by using the child_domain.parent_domain.root_domain.
com format. For example, in Figure 2-2, the domain with a NetBIOS
name of child1 appends the name of its parent domain, root1.com., to its
own name, resulting in an FQDN of child1.root1.com. The root
domain in a domain tree also takes its name in this way, by appending the
name of the first-level DNS domain that it is a member of to its own
NetBIOS name. In Figure 2-2, the root domain with a NetBIOS name of
root1 appends the name of the first-level DNS domain, com, to its own
name, resulting in an FQDN of root1.com.
In organizations that require multiple domains, a domain tree enables
any permitted user in any domain in the tree to access shared resources in
any domain in the tree.This user access is made possible by the special trust
relationships that exist between the domains in the tree.
Trust Relationships
To manage the interaction between multiple domains, trust relationships
are necessary. A trust relationship, or trust, is an agreement between two
domains that enables users in one domain to be authenticated by a domain
controller in another domain, and therefore to access shared resources in
the other domain.
The terminology used to discuss trusts is sometimes confusing, so a
good portion of this section is dedicated to explaining and clarifying these
terms. Once you’ve mastered the terminology, trust concepts are much
easier to understand.
Trusting Domain vs. Trusted Domain Two terms are commonly used to
refer to a trust between two domains: trusting domain and trusted domain.
The trusting domain is the domain that has resources to share with user
accounts in the trusted domain. The trusting domain trusts the trusted
domain. The trusted domain is the domain that contains the user accounts
that want to access the shared resources in the trusting domain.The trusted
domain is trusted by the trusting domain.
A trust relationship between two domains is depicted in diagrams by
using an arrow to point from the trusting (resource) domain to the trusted
(user accounts) domain. Figure 2-3 illustrates a trust relationship between
the west.com domain and the east.com domain.The west.com domain
4701-1 ch02.f.qc 4/24/00 09:02 Page 55
is the trusting domain, and the east.com domain is the trusted domain.
Notice that the arrow points toward the domain with the user accounts.
This trust relationship enables users from the east.com domain to
access shared resources located in the west.com domain.
west.com east.com
(resources) (user accounts)
At first glance, it might appear that the user accounts in the c.com
domain are able to access resources in the a.com domain, but this is not
the case.A trust relationship does not exist between the a.com domain and
the c.com domain. Therefore, users in the c.com domain can’t access
resources in the a.com domain.
It is possible to establish a two-way trust relationship between two
domains by creating two, one-way trusts between those domains. In a two-
way trust relationship, two domains trust each other.
A transitive trust is a trust relationship between two Windows 2000
domains in the same domain tree (or forest) that can extend beyond these
two domains to other trusted domains within the same domain tree
(or forest).A transitive trust is always a two-way trust, meaning that both of
4701-1 ch02.f.qc 4/24/00 09:02 Page 56
the domains trust each other. By default, all Windows 2000 trusts within a
domain tree (or forest) are transitive trusts.
Transitive trusts are depicted in diagrams by a single line with an arrow
at each end. Figure 2-5 illustrates transitive trusts in a Windows 2000
domain tree.
parent.com
child1.parent.com child2.parent.com
Forests
Earlier in this chapter I said you could think of a forest as being all of the
domains that compose a company’s network. A more technically accurate
definition of a forest is a group of one or more domain trees, linked by
transitive trusts, that shares a common schema and global catalog.
A forest begins with one domain and one domain tree. It’s kind of a
difficult concept to grasp, but when you install Active Directory on the
first domain controller on your network,Windows 2000 creates a domain,
a domain tree, and a forest all at the same time. So, even though you’ve
only installed Active Directory on one computer, you’ve got all of these
big-picture elements created and ready to go. Now the forest can grow as
you add additional domains and domain trees.
Figure 2-6 illustrates a forest that consists of two domain trees. Notice
that this forest contains two root domains, each of which forms the basis
for its own domain tree. Also notice that a single, transitive trust connects
the two domain trees.
Take another look at Figure 2-6, and notice the domain names. By
definition, the domains in a domain tree have contiguous DNS domain
names. In this example, rootA.com is contained in the name of every
domain in its tree. Likewise, rootB.org is contained in the name of every
domain in its tree. However, that’s as far as it goes. The two domain trees
themselves do not have contiguous DNS domain names, even though they
have been joined together in a forest.
4701-1 ch02.f.qc 4/24/00 09:02 Page 58
rootA.com rootB.org
A forest takes its name from the root tree, which is the first tree created
in the forest.
Security
As mentioned previously, Active Directory resides in the Windows 2000
Security subsystem.Together,Active Directory and the Security subsystem
protect Active Directory against unauthorized access. The Active
Directory/Security subsystem team uses access control lists (ACLs) to
determine who can access (and/or modify) an object. An ACL is a list of
SIDs and the associated access privileges assigned to each SID. Each object
and network resource has an ACL associated with it.
4701-1 ch02.f.qc 4/24/00 09:02 Page 60
CROSS-REFERENCE
I’ll give detailed instructions for installing Active Directory in Chapter 7.
However, I strongly recommend that you read the rest of this chapter,
including the “Planning for Active Directory on Your Network” section,
before you install Active Directory.
CROSS-REFERENCE
For more information on optimizing global catalog servers, see Chapter 22.
Replication
The term replication, as applied to Active Directory, refers to the process of
copying information and information updates from the Active Directory data
store on one domain controller to other domain controllers. The purpose
of replication is to synchronize Active Directory data among the domain
controllers in the domain and forest. Several types of Active Directory
information get replicated:
■ The schema: The schema is replicated to all domain controllers in
the forest.
4701-1 ch02.f.qc 4/24/00 09:02 Page 63
Sites
A site consists of one or more TCP/IP subnets, which are specified by an
administrator. Additionally, if a site contains more than one subnet, the
subnets should be connected by high-speed, reliable links. Sites do not
correspond to domains: You can have two or more sites within a single
domain, or you can have multiple domains in a single site.A site is solely a
grouping based on IP addresses. Figure 2-7 shows two sites connected by a
slow WAN link.
Seattle Indianapolis
The purpose of sites is to enable servers that regularly copy data to other
servers (such as Active Directory replication data) to distinguish between
servers in their own site (which are connected by high-speed links) and
servers in another site (which are connected by slower-speed WAN links).
Replication between domain controllers in the same site is fast, and
typically administrators can permit Windows 2000 to automatically
perform this task. Replication between a domain controller in one site and
domain controllers in other sites is slower (because it takes place over a
slow WAN link) and often should be scheduled by the administrator so
that use of network bandwidth for replication is minimized during the
network’s peak-activity hours.
Sites and Active Directory replication can be configured by using Active
Directory Sites and Services.
CROSS-REFERENCE
For detailed information on how to manage and optimize Active Directory
replication, including how to use sites, see Chapter 22.
TIP
When more than one domain controller is able to perform a specific task,
that task is referred to as a multiple master operation. When only one
domain controller can perform a specific task, that task is called a single
master operation.
So, things were going along pretty smoothly, and then, when Microsoft
implemented Active Directory and all of its associated processes, it
discovered that a purely multiple master design just wasn’t going to work
for Windows 2000. Although most domain controller–related tasks can be
4701-1 ch02.f.qc 4/24/00 09:02 Page 65
Schema Master
The schema master is the only domain controller that can make changes to
the schema. When you, as an administrator, use an application to change
the schema, you don’t necessarily need to sit down at the schema master to
run this application, nor do you need to know which computer is
functioning as the schema master.Windows 2000 seamlessly connects the
application to the schema master (across the network) in order to make the
desired change.
Because the schema is identical throughout the forest, there can be only
one schema master in a forest.
If the computer that is functioning as the schema master is not available
when you want to make a change to the schema, you won’t be able to
change the schema until the schema master becomes available, or until you
assign the schema master role to a different domain controller in the forest.
PDC Emulator
The PDC emulator performs one of two different roles, depending on how
Active Directory is implemented on your network.
When Active Directory is configured to interact with Windows NT 4.0
backup domain controllers (BDCs), or to interact with computers that
don’t have Windows 2000 Directory Service Client software, Active
Directory is said to be operating in mixed-mode. When Active Directory
operates in mixed-mode, the PDC emulator acts like a Windows NT
primary domain controller (PDC). In this situation, the PDC emulator
synchronizes user account information (such as user names and passwords)
with the existing Windows NT 4.0 BDCs. In addition, when administrators
or users of computers that don’t run Windows 2000 client software need
to make a user account change, that computer must contact the PDC
emulator to make the desired change.
When Active Directory is configured to interact only with Windows 2000
domain controllers and computers that run Windows 2000 Directory Service
Client software, Active Directory is said to be operating in native-mode.
When Active Directory operates in native-mode, the PDC emulator receives
password changes more quickly than other domain controllers in the domain.
When this occurs, the PDC emulator is said to receive preferential treatment
for replication of password changes. Because of this preferential treatment, the
PDC emulator is the domain controller that is most likely to have the most
current version of a user’s password.Therefore, if another domain controller
fails to authenticate a user due to an apparently incorrect password, it will
forward the user’s authentication request to the PDC emulator, and then
4701-1 ch02.f.qc 4/24/00 09:02 Page 67
Relative ID Master
You may recall that when security principal objects (users, groups, and
computers) are created, Active Directory assigns each of these objects a
security identifier, or SID.An SID consists of two parts: a domain SID and
a relative ID.The domain SID identifies the domain in which the object is
created, and is the same for all objects created in the domain. The relative
ID identifies the object in the domain, and is unique for each object
created in the domain.
The relative ID master (sometimes called the RID master) is the domain
controller in the domain that assigns a range of relative IDs to each domain
controller in the domain for use in creating SIDs. Because of this assignment
by the relative ID master, the potential for domain controllers issuing
duplicate SIDs to newly created security principal objects is eliminated.
There can be only one relative ID master in each domain in a forest.
If the computer that is functioning as the relative ID master is not
available when a domain controller exhausts its assigned range of relative
IDs, that domain controller won’t be able to issue SIDs until the relative ID
master becomes available, or until you assign the relative ID master role to
a different domain controller in the domain.
Infrastructure Master
The infrastructure master is the domain controller in the domain that updates
group membership information when group members (who are users
from other domains) are renamed or moved. For example, say that you
have a group named Accounting in your domain. PatL, a user from another
domain, is a member of the Accounting group. PatL recently changed her
name due to marriage, so you change her user name to PatC. The
infrastructure master is responsible for updating the Accounting group
membership information to reflect the change in the user’s name. (I know
the description of this master role sounds bizarre, but this is really how
it works.)
4701-1 ch02.f.qc 4/24/00 09:02 Page 68
CROSS-REFERENCE
For information on optimizing flexible single master operations and
master roles, see Chapter 22.
CROSS-REFERENCE
I’ll cover DNS in more depth, including detailed installation instructions,
in Chapter 7.
CROSS-REFERENCE
I’ll cover installing the Directory Service Client in Chapter 4.
4701-1 ch02.f.qc 4/24/00 09:02 Page 71
TIP
Windows NT 4.0 had a functional limitation of about 40,000 objects
(or 40MB of disk space) in a single domain. So, while there is still some
limitation, Windows 2000 can accommodate many more objects in a
single domain than Windows NT 4.0 could.
CAUTION
Naming an OU after a geographic location can be a risky thing — just
think of all of the cities and countries that have changed their names in
the past 10 years.
One last note on OUs. OUs are not security principal objects. Because
of this, OUs can’t be used in the same way that a group can be used to
assign rights and permissions to users or groups contained within the OU.
If you want to assign rights and permissions to multiple users, use a group.
TIP
When planning and implementing any naming convention, I recommend
that you attempt to keep all names intuitive, short, and simple. This will
make everyone’s life (especially yours) much easier.
Naming Domains
First of all, you’ll need to name your Active Directory domain (or domains).
When you do this, you’ll need to consider if the name you assign to your
domain will be the same when accessed by users on your company’s
intranet as it will when accessed by external users over the Internet.
As was previously stated, Active Directory domains use DNS domain
names. Keep in mind that the maximum length of a fully qualified domain
name (FQDN), including periods and all extensions, is 63 characters.
Allowed characters include uppercase letters (A–Z), lowercase letters (a–z),
numbers (0–9), and the hyphen (-).
If your domain name will be the same for both internal and external users,
I recommend choosing a domain name that is as close to your company’s
name as possible so it will be easily recognized and located by Internet users
and by Internet search engines.
If you decide you want to further isolate your company’s private
intranet behind a firewall, you might choose to use one domain name for
internal use, and use a different domain name for external users on the
Internet. In this case, the domain name for internal use can be anything
you want, and the domain name that external users on the Internet use
should be as close to your company’s name as possible.
Before you choose your domain name, you should consider using an
Internet search engine to determine if the name you want to use is already
registered to someone else. Currently, DNS domain names are managed by
InterNIC (which stands for Internet Network Information Center).
Finally, if your network is connected to the Internet, you must register
your company’s DNS domain name (as accessed by users over the Internet)
with the appropriate naming authority (InterNIC in the United States).
Your Internet service provider will usually perform this task for you.
4701-1 ch02.f.qc 4/24/00 09:02 Page 75
There are probably as many naming schemes for users, groups, and
computers as there are network administrators. Often, the overall length of
a name is limited to eight characters so that the name is compatible with
MS-DOS directory name limitations. This eight-character limitation is
common, but certainly not mandatory, especially on most of today’s
networks.
A few common naming conventions for user names include:
■ The first seven letters of the user’s first name plus the first letter of
the user’s last name
■ The first letter of the user’s first name plus the first seven letters of
the user’s last name
■ The user’s initials plus the last four digits of the user’s employee
number
■ Various hybrid combinations of the preceding schemes
Finally, you’ll need to come up with a way to handle exceptions. It’s
quite common, for example, for two users to have the same first name and
last initial, such as Mike Sinclair and Mike Saunders. If you choose to adopt
the first naming scheme in the preceding list, you will need to have a way
to resolve these potentially duplicate user names. You could resolve the
problem by assigning Mike Sinclair the user account name of MikeS
(assuming he was hired first), and assigning Mike Saunders the user
account name of MikeSa.
This chapter introduced several key Active Directory terms and concepts:
■ Active Directory is the directory service used by Windows 2000. In Windows
2000, the directory service database is called the Active Directory data store.
A read/write copy of the Active Directory data store is physically located on
each domain controller in a Windows 2000 domain.
■ Active Directory has many key features. It provides fully integrated security,
provides ease of administration by using group policies, makes resources
easier to locate, is scalable to any size network, and is flexible and extensible.
■ Numerous Active Directory terms and concepts were defined and discussed in
this chapter:
Object: A record in the directory that is defined by a particular set
of attributes
4701-1 ch02.f.qc 4/24/00 09:02 Page 78
80
STUDY GUIDE
This section contains several exam readiness questions designed to test
your knowledge of Active Directory terms and concepts and help you
prepare for the Directory Services exam.You can find the answers to these
questions at the end of this chapter.
Assessment Questions
1. Which of the following is not a feature of Active Directory?
A. It is flexible and extensible.
B. It is scalable to any size network.
C. It provides ease of administration by utilizing group policies.
D. It eliminates the need for trust relationships between domains.
2. Which of the following are classes of Active Directory objects?
(Choose all that apply.)
A. User
B. Group
C. Domain
D. Workgroup
E. Organizational Unit
3. What is the minimum number of domains that a domain tree
can contain?
A. 1
B. 2
C. 3
D. 4
4. By default, what type of trust are all Windows 2000 trust relationships
within a domain tree or forest?
A. Explicit trust
B. One-way trust
C. Transitive trust
D. Non-transitive trust
4701-1 ch02.f.qc 4/24/00 09:02 Page 81
81
5. Which master role causes the domain controller that performs this
role to be the only domain controller in the forest that can add a new
domain to the forest?
A. PDC emulator
B. Schema master
C. Relative ID master
D. Infrastructure master
E. Domain naming master
6. For most large companies, in terms of ease of network administration,
what is the optimum number of Active Directory domains to use on
their Windows 2000 network?
A. 1
B. 2
C. 3
D. More than 3
7. Which of the following are true statements about organizational units
(OUs)? (Choose all that apply.)
A. They are security principal objects.
B. They are sometimes called container objects.
C. They should mimic the company’s organization chart.
D. They should be used to make network administration easier.
E. They can contain objects and other organizational units from
their own domain.
8. You want to implement Active Directory on your Windows 2000
network.Your network consists of Windows 2000 Server computers,
Windows 2000 Professional computers,Windows NT Workstation
4.0 computers, and Windows 98 computers.You want to achieve
optimum functionality of all of the client computers with Active
Directory.What should you do?
A. Install the Directory Service Client on all of the Windows 98
computers.
B. Upgrade all of the Windows 98 computers to Windows 2000
Professional.
4701-1 ch02.f.qc 4/24/00 09:02 Page 82
82
Assessment Questions
1. D. Active Directory does not eliminate the need for trust relationships.
2. A, B, C, E. Of the items listed, only “Workgroup” is not a formal
class of Active Directory objects.
3. A. A domain tree is a hierarchical grouping of one or more domains
that must have a single root domain, and may have one or more
child domains.
4701-1 ch02.f.qc 4/24/00 09:02 Page 83
83
Professional
EXAM Server
MATERIAL
EXAM OBJECTIVES
C HAP TE R
3
Installing Windows 2000
I n this chapter, I’ll explore how to install Windows 2000. I’ll describe the
hardware required to install the various Windows 2000 operating systems,
and walk you through a comprehensive preinstallation checklist. Next, I’ll
explain the actual installation process, including the different ways you can
start the installation, what takes place during each phase of the installation,
and a detailed listing of the steps involved in a typical attended installation of
Windows 2000. Then, I’ll cover how to uninstall Windows 2000. Finally, I’ll
present some tips on troubleshooting common Windows 2000 installation
problems.
87
4701-1 ch03.f.qc 4/24/00 09:04 Page 88
Chapter Pre-Test
1. What is the HCL?
2. Your computer has a Pentium/100MHz processor, 32MB of RAM,
and 2GB of free hard disk space. Do you have the minimum
hardware required to install Windows 2000 Professional?
3. By default, in which folder is Windows 2000 installed?
4. What’s the difference between per server and per seat licensing?
5. Which method of starting Setup should you use to perform an
over-the-network installation of Windows 2000?
4701-1 ch03.f.qc 4/24/00 09:04 Page 89
TIP
You can also access the most recent Hardware Compatibility List by vis-
iting Microsoft’s Web site at http://www.microsoft.com/hcl.
If you have hardware that is not listed on the HCL, contact the manu-
facturer of your equipment to see if the correct Windows 2000 drivers for
that device can be obtained.
Continued
4701-1 ch03.f.qc 4/24/00 09:04 Page 90
Table 3-1 shows the minimum hardware required for installation pur-
poses only, as published by Microsoft.
More hard disk space is needed for applications and data files. In addition,
extra hard disk space — up to 100MB more — may be needed if the FAT
file system is used. Other factors to consider are that over-the-network
installations require more disk space than installing from a CD-ROM, and
that upgrades typically require more disk space than new installations.
Additional RAM may be required for some applications, and to speed
up operations while running applications.
If you use mass storage devices that make use of third-party SCSI or RAID
drivers, you should have the disk that contains these drivers on hand when
performing an installation of Windows 2000.The Windows 2000 installa-
tion program will prompt you for these drivers during installation.
File System
File system to be used for installation (choose one): FAT ____
FAT32 ____ NTFS ____
Windows 2000 supports three file system types: FAT, FAT32, and NTFS.
The file allocation table (FAT) file system (sometimes called the FAT16 file
system) is supported by Windows 2000 and many other operating systems,
including MS-DOS, OS/2, Windows 3.x, Windows 95, Windows 98, and
Windows NT. Normally, if you want your computer to dual boot between
Windows 2000 and one of these other operating systems (and both oper-
ating systems are located on the same hard disk partition), choose the FAT
file system. The FAT file system supports neither extended attributes nor
file-level security. For planning purposes, you should be aware that the
maximum size FAT partition supported by Windows 2000 is 4GB.While
Windows NT also supports FAT partitions up to 4GB in size, all other
operating systems that support the FAT file system only support FAT par-
titions up to 2GB in size.
The FAT32 file system is supported by Windows 95 OSR2,Windows 98,
and Windows 2000. If you want your system to dual boot between
Windows 2000 and one of these other Windows operating systems, you
can use the FAT32 file system instead of the FAT file system.The FAT32
file system is more efficient than the FAT file system and supports larger
partition sizes.Windows 2000 will format FAT32 partitions up to 32GB in
size.Windows 2000 supports the use of FAT32 partitions larger than 32GB
that have been formatted by other operating systems.
The Windows NT file system (NTFS) is supported only by Windows
2000 and Windows NT. In general, choose NTFS if you do not want your
computer to dual boot between Windows 2000 and another operating sys-
tem and you want the added advantages provided by NTFS, including
extended attributes, file-level security, and partitions larger than 32GB.The
maximum practical size of an NTFS partition is 2 terabytes (TB).
TIP
I recommend you use the NTFS file system unless you require dual boot
capability.
You should carefully consider your choice of file system before installing
Windows 2000. If you select the FAT or FAT32 file system during your
installation of Windows 2000, you can easily convert the file system to
4701-1 ch03.f.qc 4/24/00 09:04 Page 94
NTFS at a later date if you change your mind. However, if you select the
NTFS file system during your installation of Windows 2000 and then later
want to convert to FAT or FAT32, the process is much more difficult.To
convert from NTFS to any other file system, you must back up all data,
repartition and format the computer’s hard disk with FAT or FAT32, rein-
stall Windows 2000, and then restore all the files from backup.
Windows 2000 does not support the high performance file system (HPFS)
used by OS/2. If you want to install Windows 2000 on a computer that
uses HPFS, you must back up all data, repartition and format the com-
puter’s hard disk with FAT, FAT32, or NTFS, and then restore all the files
from backup before you can install Windows 2000.
CROSS-REFERENCE
For a more in-depth discussion of file systems, see Chapter 6.
CAUTION
If you choose to install Windows 2000 in the folder containing another
operating system, Windows 2000 will delete the previously installed
operating system. Do not select this option unless you’re sure you will
never need to boot to your old operating system again.
Regional Settings
Complete one of the following: Accept English (United States) defaults
for system and user locales and keyboard layout _____
Or, use the following custom settings:
__________________________________________________________
Regional settings enable you to customize Windows 2000 for your specific
region and language. The default option for both the system locale and
user locale is English (United States).The default keyboard layout is the US
keyboard layout.
If you work in the United States and use English for your primary lan-
guage, you will most likely be able to accept the defaults in this section and
continue on.
If you live in another part of the world, have a primary language other
than English, or prefer a different keyboard layout, you can customize
Windows 2000 to meet your needs.
If you don’t want to bother with selecting regional settings during the
installation process, you can accept the default options during the install,
and then use the Regional Options application in Control Panel to con-
figure your regional settings at a later time.
CROSS-REFERENCE
For more details on using the Regional Options application in Control
Panel, see Chapter 5.
Product Key
25-Character Product Key: ______ - ______ - ______ - ______ - ______
During installation, you need to enter the 25-character product key that is
located on the back of the Windows 2000 compact disc case.This entry is
required.
Licensing Mode
This section applies only to Windows 2000 Server and Windows 2000
Advanced Server.
Choose one: Per server ____ Per seat ____
If per server, number of client access licenses: __________
4701-1 ch03.f.qc 4/24/00 09:04 Page 96
Windows 2000 Server (and Advanced Server) has two licensing modes: per
server and per seat.
■ Per server: In the per server licensing mode, you must have one
client access license for each concurrent connection to the server.
For example, if you have 150 client computers (workstations), but
only 100 of them will be logged on to the Windows 2000 Server
(or Advanced Server) computer at any one time, then you would
need 100 client access licenses. If you select the Per server option
during installation, enter the number of client access licenses you
have purchased for this server in the “Number of concurrent con-
nections” spin box.The minimum number of client access licenses
is 5, and the maximum number is 9,999.
I recommend you choose the per server licensing mode when you
have only one server, and not all of your client computers will
access the server at the same time.
■ Per seat: In the per seat licensing mode, you must have one client
access license for each client computer that will ever connect to a
Windows 2000 Server or Windows 2000 Advanced Server com-
puter on your network.
In general, I recommend you choose the per seat licensing mode
when you have more than one server on your network, particularly
when client computers will access multiple servers simultaneously.
For example, suppose you have 500 client computers and 6 Windows 2000 Server
computers on a network, and the client computers access several servers at a time.
If you choose the per seat licensing mode, you only need to purchase 500 client
access licenses, whereas if you choose the per server licensing mode, you probably
need to have more than one client access license per client computer.
4701-1 ch03.f.qc 4/24/00 09:04 Page 97
Computer Name
What will this computer’s name be? ____________________________
During the installation of Windows 2000, you are prompted to enter the
name your computer will use on the network. The computer name is also
used as the computer’s NetBIOS name. NetBIOS names can be up to 15
characters long.You can use a computer name that is longer than 15 char-
acters, but Windows 2000 will only use the first 15 characters for the com-
puter’s NetBIOS name.
All computers on the network must use different names. Uniqueness is
the key here. If you have a small network, you can probably get by with
naming the computers after the characters in your favorite movie, televi-
sion series, or comic strip. If you have a large network, however, you will
probably want to use some type of systematic naming scheme to ensure
that each computer has a unique name.
Administrator Password
You may not want to write down the password for the Administrator
account here, but you will need to enter an administrator password during
the installation process.
CAUTION
Don’t forget the password for the Administrator account — you’ll need it
to log on and to perform administrative tasks once the system is up and
running. If you forget the administrator password, you’ll probably have to
reinstall Windows 2000.
Components
If you’re only interested in installing Windows 2000 Professional, you can
skip this section — it applies only to Windows 2000 Server and Windows
2000 Advanced Server.
4701-1 ch03.f.qc 4/24/00 09:04 Page 98
■ Services:
Network Load Balancing (Windows 2000 Advanced Server only)
SAP Agent
■ Protocols:
Internet Protocol (TCP/IP)
AppleTalk Protocol
DLC Protocol
NetBEUI Protocol
CROSS-REFERENCE
For detailed information on installing, configuring, and removing these
networking components, see Chapter 16.
4701-1 ch03.f.qc 4/24/00 09:04 Page 103
Workgroup/Domain
Make this computer a member of (choose one):
Workgroup ____ Domain ____
Workgroup or domain name: ___________________________
If domain, authorized user name: _______________________
If domain, authorized user password: ____________________
You must choose to participate in either a workgroup or a domain.
■ Workgroup: In general, if your computer is not on a network, or
is on a network that does not have a domain, select workgroup. If
you elect to make this computer a member of a workgroup, only
users that have user accounts physically located in this computer’s
user account database will be able to log on to this computer
locally, or access this computer’s shared resources over the network.
■ Domain: If you want this computer to participate in an existing
domain on your network, choose the domain option. If you decide
to make this computer a member of a domain, two kinds of users
will be able to log on to this computer locally and to access this
computer’s shared resources over the network: users that have
accounts in this computer’s user account database, and users that
have user accounts in the Active Directory data store.
If you select the domain option, during installation you will need
to enter the user name and password of a user (often the adminis-
trator) who is authorized to join this computer to the domain.
Whether you choose to make this computer a member of a workgroup
or a domain, you should be prepared to enter the name of the workgroup
or domain during the installation process.
CROSS-REFERENCE
For more information on choosing between workgroups and domains, see
the “Workgroups, Domains, and Active Directory” section in Chapter 1.
4701-1 ch03.f.qc 4/24/00 09:04 Page 104
EXAM TIP
Both the Professional and Server exams have objectives on performing
an attended installation of Windows 2000. Be sure to study the installa-
tion process carefully and do the labs at the end of this chapter.
In this section, I’ll begin by explaining the three different ways you can
start Setup, the Windows 2000 installation program. Then I’ll discuss the
setup flow in general, including the three distinct phases that take place
during the installation process. Finally, I’ll detail the specific steps necessary
to perform an installation of Windows 2000.
CROSS-REFERENCE
This chapter focuses on how to perform a single, attended, “clean” instal-
lation of Windows 2000. For details on performing an upgrade to
Windows 2000, see Chapter 4. For information on automating the instal-
lation of Windows 2000 and on using Remote Installation Services to
deploy Windows 2000 on a larger scale, see Chapter 19.
Starting Setup
The Windows 2000 user interface refers to the Windows 2000 installation
program by several different names during the installation process. It’s
called Windows 2000 Setup, Setup, and the Windows 2000 Setup Wizard.
For now, I’ll just call the program Setup.
There are three ways to start the installation process:
■ From a CD-ROM drive
■ Using Winnt.exe
■ Using Winnt32.exe
4701-1 ch03.f.qc 4/24/00 09:04 Page 105
In the following sections I’ll explain how to use each of these three meth-
ods to begin the Windows 2000 installation process.
Using Winnt.exe
You can use Winnt.exe to start Setup from an unsupported CD-ROM
drive (a CD-ROM drive that is not listed on the HCL), or to start an over-
the-network installation.
Before you can use Winnt.exe, you must partition and format your
computer’s hard disk using either MS-DOS or Windows 95/Windows 98
DOS. Then boot the computer to DOS, and load either the CD-ROM
drivers or network drivers (depending on the type of installation you’re
doing).You should also run SmartDrive (Smartdrv.exe) to significantly
speed up the installation process. (Detailed steps to perform each of these
tasks are listed in the “Installing Windows 2000 by Using Winnt.exe” step-
by-step section later in this chapter.) Then you’re ready to begin an instal-
lation of Windows 2000 by using Winnt.exe.
4701-1 ch03.f.qc 4/24/00 09:04 Page 106
The various switches are not case sensitive — you can type them in either
uppercase or lowercase.To install Windows 2000 by using Winnt.exe, you
don’t really need to use these optional command-line switches.They’re pri-
marily used when performing unattended/automated installations of
Windows 2000.Table 3-2 lists each command-line switch, and its function.
TABLE 3-2 Winnt.exe Command-Line Switches
Switch What the Switch Does
Using Winnt32.exe
Winnt32.exe is used to upgrade a previous installation of Windows 95,
Windows 98, Windows NT Workstation, or Windows NT Server to
Windows 2000; or to perform a fresh installation of Windows 2000 in a
different folder than the previously installed operating system. Installing
Windows 2000 in a different folder will automatically configure Windows
2000 to dual boot between the previously installed operating system and
Windows 2000. Because Winnt32.exe is used only to perform upgrades,
no preparation of your computer is necessary prior to performing the
installation.
You can either use the Winnt32.exe command to perform the upgrade,
or you can use the autorun feature to automatically start the installation
when you insert the compact disc into the CD-ROM drive of the computer
to be upgraded. The primary advantage of using Winnt32.exe is that it
enables you to perform an unattended installation of Windows 2000,
whereas the autorun feature does not.
TIP
Unless you’re planning on performing an unattended or automated instal-
lation, I recommend you use the autorun feature to automatically start
the install when upgrading from a previous version of Windows to
Windows 2000.
Again, the switches are not case sensitive — you may type them in either
uppercase or lowercase. To install Windows 2000 by using Winnt32.exe,
you don’t really need to use these optional command-line switches.They’re
primarily used when performing unattended/automated installations of
Windows 2000.Table 3-3 lists each command-line switch, and its function.
4701-1 ch03.f.qc 4/24/00 09:04 Page 108
Setup Flow
An attended installation of Windows 2000 takes place in two to three dis-
tinct phases, depending on the installation method you use. For ease of ref-
erence, I call these three phases the MS-DOS–based/file copy phase, the
text mode phase, and the Windows 2000 Setup Wizard phase. During each
phase you respond to various prompts and enter requested information.
The Windows 2000 installation program is called Windows 2000 Setup
or Setup in the first two phases, and is usually referred to as the Windows
2000 Setup Wizard in the third phase.The Windows 2000 installation pro-
gram either prompts you to reboot your computer or automatically
reboots your computer at the end of each of these three phases.
Here’s a brief description of what takes place during each phase of a
typical Windows 2000 installation.
4701-1 ch03.f.qc 4/24/00 09:04 Page 110
At this point the Windows 2000 Setup Wizard installs networking com-
ponents.Then you choose to use either typical or custom settings for the
installation. Next, you choose whether to make your computer a member
of a workgroup or a domain.
The last part of this phase takes a fair amount of time to complete.The
Windows 2000 Setup Wizard installs and configures various components.
Then, the wizard installs Start menu items, registers components, saves set-
tings, and removes any temporary files used for the installation.
Finally, you are prompted to remove the compact disc from your
CD-ROM drive, and to restart your computer.
STEP BY STEP
7. Setup prompts you to select the file system you want on the partition you
selected in Step 5, as shown in Figure 3-3. Highlight the file system you want,
and then press Enter.
8. If you are installing Windows 2000 on a partition that contains another operating
system in the \Winnt folder, Setup asks you to choose whether to use this folder
for the current installation and delete the existing operating system, or to install
Windows 2000 in another folder. If you choose to install Windows 2000 in another
folder, Setup will prompt you to enter the name of the folder you want to use.
4701-1 ch03.f.qc 4/24/00 09:04 Page 115
9. Setup examines your computer’s hard disk(s) for corruption, then copies files to
the Windows 2000 installation folders. (This process takes a few minutes.) Setup
then initializes and saves the Windows 2000 configuration. Then Setup reports
that this portion of Setup has been successfully completed. If there is a floppy
disk in drive A:, remove it. Setup automatically reboots your computer.
2. The Windows 2000 Setup Wizard automatically detects and installs hardware
devices on your computer. This takes several minutes, and your display may flicker
during this time. If your computer stops during this process for a long period of
time (more than an hour) or displays an error, reboot your computer and Setup
will resume automatically.
3. The Regional Settings screen is displayed. You can configure your system locale
and user locales, and select from various input languages and keyboard layout
options on this screen. By default, the system and user locales are set to English
(United States), and the keyboard layout is the US keyboard layout. When you fin-
ish customizing these options, click Next to continue.
4701-1 ch03.f.qc 4/24/00 09:04 Page 116
4. The Personalize Your Software screen is displayed. Type in your name and the
name of your company or organization. Click Next.
5. The Licensing Modes screen is displayed (for installations of Windows 2000
Server and Advanced Server only). Select the licensing mode you want to use.
If you select the Per Server mode, enter the number of Client Access Licenses
you have for this server. Click Next.
6. The Computer Name and Administrator Password screen is displayed, as shown
in Figure 3-5. You can either accept the default computer name presented, or
type in another name of your own choosing. After you choose a computer name,
type in a password for the Administrator account, and confirm that password by
retyping it. Click Next.
8. The Date and Time Settings screen is displayed. You can set the correct day,
date, time, and time zone if they do not appear correctly. Click Next.
9. The Networking Settings screen is displayed, and Windows 2000 installs the net-
working components you selected. Next, you are prompted to choose whether to
use typical or custom settings. Select the option you want, then click Next.
TIP
If you select the custom settings option, you may want to enter configu-
ration information for various networking clients, protocols, and services.
Detailed configuration information for these components is presented in
later chapters.
12. The Performing Final Tasks screen is displayed, as shown in Figure 3-7. Here
Setup installs Start menu items, registers components, saves settings, and
removes any temporary files used during the installation. This process takes
several minutes to complete.
13. The Completing the Windows 2000 Setup Wizard screen appears. If there is a
CD in your CD-ROM drive, remove it now. Then click Finish to restart your com-
puter. This completes the installation of Windows 2000.
The next two sections of steps deal with running Windows 2000 for the first time
after an installation is performed. The first of these sections covers what to do
when running Windows 2000 Server or Windows 2000 Advanced Server for the
first time. The last section explains the steps to run Windows 2000 Professional
for the first time.
1. When your computer reboots and Windows 2000 starts, press Ctrl+Alt+Delete.
Then type in the password you selected earlier for the Administrator account.
Click OK.
2. The Windows 2000 Configure Your Server screen appears, as shown in Figure
3-8. Select the type of network environment you have (I selected “I will configure
my server later”), then click Next.
4701-1 ch03.f.qc 4/24/00 09:04 Page 119
1. When your computer reboots, the Network Identification Wizard starts. Click Next.
2. The Users of This Computer screen is displayed, as shown in Figure 3-9. In this
screen, you select from two options: users must enter a user name and password
each time they use this computer, or Windows 2000 will automatically log on all
users of this computer by using a predefined user name and password. If you
select the second option (which is the default option), type in a user name and
password, and confirm the password by retyping it. Click Next.
4701-1 ch03.f.qc 4/24/00 09:04 Page 120
STEP BY STEP
1. Boot your computer to MS-DOS (or Windows 95 or Windows 98) from a floppy
disk that has the Sys.com utility on it.
2. At the command prompt type Sys a: c: (and press Enter). This will replace the
Windows 2000 boot sector with the boot sector for your other operating system
(MS-DOS, Windows 95, or Windows 98).
3. Remove the floppy disk from drive A: and reboot the computer. MS-DOS,
Windows 95, or Windows 98 should start automatically.
4. Now that you have disabled Windows 2000, you can complete the removal of
Windows 2000 files from your computer. Free up hard disk space by removing
Pagefile.sys, Ntldr, Boot.ini, Ntdetect.com, Bootsect.dos,
and, if it exists on your computer, Ntbootdd.sys. (Because some of these files
have attributes of hidden, system, and read-only, you will have to remove the file
attributes before you can delete these files.) You can also remove the entire
Windows 2000 installation folder (usually C:\Winnt), and the \Program
files\Windows NT folder. This completes the removal of Windows 2000.
CROSS-REFERENCE
For more information on primary and extended partitions, see Chapter 6.
4701-1 ch03.f.qc 4/24/00 09:04 Page 122
TIP
The Delpart.exe utility is not included in the Windows 2000 prod-
uct. However, you can download this utility via the Internet by accessing
ftp://ftp.teleprint.ch/pub/ms. The filename at this location
is Delpart.exe.
You have the recommended amount of The most likely cause of this problem
free disk space, but still run out of disk is that your partition is formatted using
space during the installation. larger sectors than were anticipated
by the engineers who developed the
minimum hardware requirements. Either
use a larger partition for the installation,
or free up disk space on your existing
partition and restart the installation.
A blue screen or STOP message is This can be caused by several things.
displayed during installation or after Some of the most common causes are
a reboot. a corrupt boot sector, a boot sector virus,
a failed hardware device, or a hardware
configuration conflict. On another
Windows 2000 computer, start Windows
2000 Help (Start ➪ Help) and search for
the specific STOP message displayed.
Windows 2000 Help contains, for many
specific STOP messages, the most likely
cause of the problem and a detailed
recommended solution.
You can’t install from your CD-ROM drive. This could be caused by an unsupported
CD-ROM or by an unsupported SCSI
adapter card. Some SCSI adapter cards,
such as PC card SCSI adapters, are
not supported during installation, but
you can install the drivers for them after
the installation is complete. Try installing
over the network using Winnt.exe.
Continued
4701-1 ch03.f.qc 4/24/00 09:04 Page 124
You can’t join a domain during installation. The most common causes of this problem
are incorrect TCP/IP configuration
settings on the computer being installed,
a bad or incorrect network adapter driver,
loose or failed network connections, or an
incorrectly typed user name, password, or
domain name. Verify the TCP/IP settings
on your computer. Ensure that you have
the correct network adapter driver. Check
network cables and connections. Confirm
that you have correctly typed in the user
account name, password, and domain
name. (All passwords in Windows 2000
are case sensitive.)
Network services don’t start correctly. Common causes of this problem include
incorrect TCP/IP configuration settings,
a bad or incorrect network adapter driver,
and duplicate computer names. Verify the
TCP/IP settings on your computer. Ensure
that you have the correct network adapter
driver. Confirm that the newly assigned
computer name is unique — that it does
not match any other computer, domain,
or workgroup name used on the network.
126
STUDY GUIDE
This section contains several exercises that are designed to cement your
knowledge and help your prepare for the Professional and Server exams:
■ Exam readiness questions: These questions test your knowledge
of the Windows 2000 installation topics covered in this chapter.You
can find the answers to these questions at the end of this chapter.
■ Scenario: The situation-based questions in scenarios challenge you
to apply your understanding of the material to solve a hypothetical
problem. In a scenario, you may be asked to decide “why” or “how,”
to design a structure or strategy, or to devise a solution to a prob-
lem.You don’t need to be at a computer to do scenarios.Answers to
this chapter’s scenario are presented at the end of this chapter.
EXAM TIP
Since many questions on Microsoft certification exams are scenario-
based, the Scenario exercises will help you prepare for the types of com-
plex questions you’re likely to encounter when you take the Windows
2000 exams.
EXAM TIP
The labs in this book are extremely important for your exam preparation.
Don’t even think about skipping them! There’s no substitute for using the
Windows 2000 products to master the skills that the Microsoft Certified
Professional exams test.
4701-1 ch03.f.qc 4/24/00 09:04 Page 127
127
Assessment Questions
1. You want to install Windows 2000 Professional on a computer.What
are the minimum hardware requirements to install this operating
system?
A. Pentium/75MHz processor, 16MB of RAM, 400MB of free hard
disk space
B. Pentium/100MHz processor, 32MB of RAM, 500MB of free
hard disk space
C. Pentium/133MHz processor, 64MB of RAM, 1GB of free hard
disk space
D. Pentium/166MHz processor, 128MB of RAM, 1GB of free hard
disk space
2. You want to install Windows 2000 Server on a computer.What are
the minimum hardware requirements to install this operating system?
A. Pentium/75MHz processor, 16MB of RAM, 400MB of free hard
disk space
B. Pentium/100MHz processor, 32MB of RAM, 500MB of free
hard disk space
C. Pentium/133MHz processor, 256MB of RAM, 1GB of free hard
disk space
D. Pentium/166MHz processor, 128MB of RAM, 2GB of free hard
disk space
3. You are preparing to install Windows 2000 on a computer, and you
want this computer to be able to dual boot between Windows 2000
and Windows 98.Which file system should you use?
A. FAT (or FAT32)
B. NTFS
C. HPFS
D. You can use either FAT or NTFS.
4701-1 ch03.f.qc 4/24/00 09:04 Page 128
128
129
Scenarios
Scenarios provide you with an opportunity to apply the knowledge you’ve
gained in this chapter. In this particular scenario, you’ll get to practice
applying the facts you’ve learned about troubleshooting failed Windows
2000 installations.
A Windows 2000 installation can fail for a number of reasons. For each
of the following problems, consider the given facts and answer these ques-
tions:What do you think the possible causes of the failed installation are?
What course of action would you take to try to resolve the problem?
1. You attempt to perform an attended installation of Windows 2000
Professional on a new computer at your office. During the installa-
tion, the process stops and a blue screen is displayed.
2. You are performing an attended installation of Windows 2000 Server.
During the installation, you try to join a domain, but an error mes-
sage is displayed indicating that the domain controller for this domain
cannot be located.
Lab Exercises
The objective of these labs is to provide you with hands-on experience
installing Windows 2000 Server and Windows 2000 Professional.
CAUTION
You need to have access to a dedicated computer (or a dedicated hard
disk) to perform the labs in this book, because installing Windows 2000
and converting to NTFS will render your computer unbootable by any
other operating system (such as Windows 95, Windows 98, and so on).
4701-1 ch03.f.qc 4/24/00 09:04 Page 130
130
If you’re using a home computer or office computer (or any other com-
puter that other people use), I strongly recommend that you obtain a sep-
arate hard disk to use to perform the labs in this book.That way, you’ll be
able to do the Windows 2000 labs, and the other people who use the com-
puter will be able to continue using it the way they always have, without
change to their operating system, applications, or data. Using a separate
hard disk will also ensure that your labs will not corrupt existing data or
programs on the computer’s original hard disk.
131
Lab Exercises
Lab 3-1 Performing an Attended Installation of
Windows 2000 Server
Server
EXAM
MATERIAL
CAUTION
If you don’t use a dedicated hard disk or dedicated computer, I strongly
recommend that you back up all important data and programs before
performing any of the labs in this book.
■ Your hard disk is not yet partitioned and does not contain any data.
■ Your computer meets the minimum hardware requirements speci-
fied in the “Hardware and Software You’ll Need” section in the
Preface of this book.
■ Your computer is configured to boot directly to its CD-ROM
drive. (If it is not configured in this way, or can’t be configured
to boot this way, you’ll need to create the Windows 2000 Setup
Boot Disks as explained in the “Starting from a CD-ROM drive”
section earlier in this chapter.)
This lab consists of three parts:
■ Part 1: Starting Setup from a CD-ROM Drive
■ Part 2: Running the Windows 2000 Setup Wizard
■ Part 3: Running Windows 2000 Server for the First Time
4701-1 ch03.f.qc 4/24/00 09:05 Page 132
132
TIP
If your computer can’t be configured to boot from its CD-ROM drive, boot
the computer by using the Windows 2000 Setup Boot Disks. Follow the
instructions presented on-screen until Windows 2000 Setup begins.
133
10. Setup formats the new partition. (This process takes a few minutes.)
Then Setup examines your computer’s hard disk(s) for corruption,
and copies files to the Windows 2000 installation folders. (This
process also takes a few minutes.) Setup then initializes and saves the
Windows 2000 configuration. Finally, Setup reports that this portion
of Setup has been successfully completed.At this point, remove the
Windows 2000 Server compact disc from the CD-ROM drive. In
addition, if there is a floppy disk in drive A:, remove it. Setup then
automatically reboots your computer.
1. After your computer reboots, place the Windows 2000 Server com-
pact disc back in your computer’s CD-ROM drive when prompted,
and click OK.
2. After a couple of minutes, Setup displays the initial Windows 2000
Setup Wizard welcome screen. Click Next to continue. (If you don’t
click Next immediately,Windows 2000 automatically continues on to
the next step.)
3. The Windows 2000 Setup Wizard automatically detects and installs
hardware devices on your computer.This takes several minutes, and
your display may flicker during this time. If your computer stops dur-
ing this process for a long period of time (more than an hour) or dis-
plays an error, reboot your computer and Setup will resume
automatically.
4. The Regional Settings screen is displayed. Click Next.
5. The Personalize Your Software screen is displayed.Type your name in
the Name text box. If applicable, type the name of your company or
organization in the Organization text box. Click Next.
6. The Licensing Modes screen is displayed. Click Next.
7. The Computer Name and Administrator Password screen is displayed.
In the “Computer name” text box, type Server01. (If you’re doing this
lab in a classroom with multiple computers on a network, your instruc-
tor will provide you with the appropriate computer name to use.) In
the “Administrator password” text box, type password. Confirm the
password by typing password in the “Confirm password” text box.
Click Next.
4701-1 ch03.f.qc 4/24/00 09:05 Page 134
134
135
1. When your computer reboots and Windows 2000 Server starts, press
Ctrl+Alt+Delete.When prompted, enter a password of password.
Click OK.
2. The Windows 2000 Configure Your Server screen appears. Select the
“I will configure this server later” option, then click Next.
Because this chapter focuses on installing Windows 2000, I have
deferred a detailed discussion of many configuration options until
Chapters 5 through 7.
3. The Configure Your Server screen appears. Clear the check box next
to “Show this screen at startup.” Close this window.
EXAM
MATERIAL
TIP
Before you can successfully complete this lab, you should complete
Lab 3-1.
136
137
have these drivers, just ignore this screen.) Then Windows 2000
Setup loads numerous files and drivers, and starts Windows 2000.
2. If you’re using an evaluation copy of Windows 2000, a screen may
appear notifying you that you are installing such a version. Press Enter.
3. The Windows 2000 Server Setup screen appears, welcoming you to
Setup. Press Enter.
4. The Windows 2000 Professional Setup screen appears. Press Esc.
5. On the next Windows 2000 Professional Setup screen that appears,
ensure that the partition you installed Windows 2000 Server on
(usually C:) is highlighted. Press Enter.
6. On the next Windows 2000 Professional Setup screen that appears,
press C to continue.
7. On the next Windows 2000 Professional Setup screen that appears,
ensure that “Leave the current file system intact (no changes)” is
highlighted. Press Enter.
8. Setup examines your hard disk(s), then copies files to the Windows
2000 installation folders.This can take a few minutes. Setup initializes
and saves your Windows 2000 configuration, and then automatically
reboots your computer.
138
139
140
Assessment Questions
1. C. See Table 3-1.
2. C. See Table 3-1.
3. A. If you want your computer to dual boot between Windows 2000
and Windows 98, you should choose the FAT or FAT32 file system,
because Windows 98 does not support NTFS or HPFS, and Windows
2000 does not support HPFS.
4. A. The most common way to install Windows 2000 on a new com-
puter is from a CD-ROM drive.
5. B. Winnt.exe is used to start an over-the-network installation of
Windows 2000.
6. D. When Windows 2000 is installed in the same folder as the other
operating system,Windows 2000 will delete the previously installed
operating system.When Windows 2000 is installed in a different folder
than the other operating system, it will automatically configure the
computer to dual boot between Windows 2000 and the previously
installed operating system.
7. B, C, D. The types of components you can select from in “Custom
settings” are clients, services, and protocols.
8. D. In general, if your computer is not on a network, make the com-
puter a member of a workgroup.
Scenarios
1. Some possible causes of the failed installation are hardware conflicts
(or incompatibilities), a failed hardware device, a corrupt boot sector,
or a boot sector virus.
Possible courses of action to resolve the problem include starting
Windows 2000 Help on another Windows 2000 computer and
searching for the specific STOP message displayed on the computer
with the blue screen, checking for two pieces of hardware with the
same settings (I/O port, interrupt, and so on) and reconfiguring hard-
ware if conflicts are found, and repairing the boot sector by using
Fdisk/mbr from MS-DOS or by using a virus detection utility.
4701-1 ch03.f.qc 4/24/00 09:05 Page 141
141
Professional
EXAM Server
MATERIAL
EXAM OBJECTIVES
C HAP TE R
4
Upgrading to
Windows 2000
143
4701-1 ch04.f.qc 4/24/00 09:05 Page 144
Chapter Pre-Test
1. Can you upgrade a Windows for Workgroups computer
to Windows 2000 Professional?
2. Can you upgrade a Windows NT Workstation 4.0 computer
to Windows 2000 Server?
3. How can you tell if your computer’s current hardware is adequate
for upgrading to Windows 2000?
4. What should you do if some of your existing software applications
aren’t compatible with Windows 2000?
5. When upgrading your existing Windows NT Server 4.0 network
to Windows 2000, which computer should you upgrade first?
4701-1 ch04.f.qc 4/24/00 09:05 Page 145
Preparing to Upgrade
Before you upgrade a computer to Windows 2000, there are several steps you
should take to prepare for the upgrade. First of all, you should ask yourself
numerous questions to make sure that upgrading to Windows 2000 makes the
best sense for your situation. If you don’t decide to upgrade, you may decide
to install the Directory Service Client on the computer. If you decide to go
ahead with the upgrade, you’ll need to prepare the computer by making sure
it has sufficient, compatible hardware to run Windows 2000.You may also
need to obtain upgrade packs for some of your installed software programs.
Finally, there are a few special considerations you should note if you’re plan-
ning to upgrade computers on an existing Windows NT 4.0 network. All
these questions are discussed in the following sections.
See Table 4-1 for the minimum processor, RAM, and hard disk space
required to install Windows 2000 Professional and Windows 2000 Server.
See the “Preparing a Hardware and Software Upgrade Report” step-by-step
section later in this chapter for detailed instructions on how to determine
whether a computer’s hardware is adequate for and compatible with
Windows 2000.
TIP
Before you install the Directory Service Client on a Windows 95 com-
puter, you should ensure that Internet Explorer 4.01 or later is installed
and that Active Desktop is enabled — otherwise the wizard used to install
the Directory Service Client won’t run.
STEP BY STEP
Table 4-1 reviews the minimum processor, memory (RAM), and available
hard disk space required to install Windows 2000 Professional and Windows
2000 Server. Keep in mind that these are the bare-bones minimum require-
ments, and that you’ll probably want to use better components for your
upgrade if at all possible.
TABLE 4-1 Minimum Processor, Memory, and Disk Space Required to Install
Windows 2000
Hardware Windows 2000 Windows 2000 Server/
Component Professional Advanced Server
STEP BY STEP
1. Boot your computer to its existing operating system (Windows 95, Windows 98,
Windows NT Workstation, or Windows NT Server). Log on as Administrator.
2. Place the product compact disc of the operating system you want to upgrade to
(either Windows 2000 Professional or Windows 2000 Server) in your computer’s
CD-ROM drive.
3. Windows 2000 displays a message indicating that the compact disc contains a
newer version of Windows than you are currently running. Click No.
4. Close the Microsoft Windows 2000 CD dialog box.
5. Select Start ➪ Programs ➪ MS-DOS Prompt (for Windows 95/98 computers).
If you’re using a Windows NT computer, select Start ➪ Programs ➪ Command
Prompt.
6. At the MS-DOS/command prompt, type the drive letter of your CD-ROM drive,
followed by a colon — for example, D: — and press Enter. Then type cd \i386
and press Enter. Then type winnt32 /checkupgradeonly and press Enter.
7. Windows 2000 prepares an upgrade report. This takes a few minutes.
8. The Windows 2000 Readiness Analyzer displays the upgrade report, as
shown in Figure 4-2. The upgrade report shown in this figure was created
on a Windows 98 computer.
After you’ve generated your upgrade report, you can review it to deter-
mine how your computer’s hardware stacks up, and whether or not your
computer’s software applications will work with Windows 2000.
EXAM TIP
One of the exam objectives for the Professional exam mentions applying
“update packs to installed software applications.” The Windows 2000
user interface uses the terms upgrade pack and update pack inter-
changeably, although upgrade pack seems to be the most frequently
used term.
It’s possible that there may not be an upgrade pack or other way to
make an application compatible with Windows 2000. If there isn’t a way to
upgrade the application, you have three options:
■ Remove the application and discontinue using it.
■ Replace the application with a similar program that is compatible
with Windows 2000.
4701-1 ch04.f.qc 4/24/00 09:06 Page 153
■ If you must continue using the old application, you shouldn’t upgrade
this computer.
I recommend that you contact the manufacturer of all software applica-
tions that the upgrade report indicates will not or may not work with
Windows 2000 to request upgrade packs before you upgrade to Windows
2000.Then, when you perform the actual upgrade, supply the location of
the upgrade packs (on your computer or network) when prompted by
Windows 2000 Setup.
CROSS-REFERENCE
For more information on installing and configuring a DNS server, see
Chapter 7.
STEP BY STEP
TIP
This section lists the steps I used to upgrade Windows 98 to Windows
2000 Professional. The steps to upgrade Windows 95 are nearly identical.
If you have upgrade packs for installed applications, select the “Yes, I have upgrade
packs” option, and click Add. Windows 2000 prompts you to browse your computer
or network for the location of the upgrade pack(s). In the browse list, highlight the
location the upgrade packs are located in and click OK. Go on to Step 9.
If you don’t have upgrade packs, select the “No, I don’t have any upgrade packs”
option, and click Next.
9. The Upgrading to the Windows 2000 NTFS File System screen appears.
If you don’t need to dual boot this computer between Windows 2000 and
Windows 95, Windows 98, or MS-DOS, select the “Yes, upgrade my drive”
option, and click Next. Go on to Step 10.
If you want this computer to be able to dual boot, select the default option of “No,
do not upgrade my drive,” and click Next.
10. Windows 2000 prepares an upgrade report. (This is the same upgrade report
I discussed earlier in the “Determining If hardware Is Adequate” section.) This
process takes a few minutes.
11. Windows 2000 may prompt you to supply updated files for Plug and Play hardware
in your computer. If it does, either click Provide Files and follow the instructions pre-
sented on-screen, or click Next if you want to complete the upgrade now and go
back and provide the updated files later.
TIP
I recommend that you don’t complete the upgrade until you have the nec-
essary files and upgrade packs for the hardware and software installed in
your computer. If you continue the upgrade without providing these
files/upgrade packs, you may find that some of your hardware and/or
software won’t work after Windows 2000 is installed.
12. Windows 2000 displays the Upgrade Report. You can read, save, and print this
report. Click Next.
13. If Windows 2000 determined that some of your hardware or software is not com-
patible with Windows 2000 (and you did not supply updated files or upgrade
packs), Windows 2000 Setup prompts you to either review the upgrade report
again, continue with the upgrade, or quit setup. If you choose to continue the
upgrade in spite of these potential incompatibilities, click Continue.
14. The Ready to Install Windows 2000 screen is displayed. Click Next. Windows
2000 will automatically install itself and perform all necessary upgrades and file
system conversions. The process takes a long time — up to an hour or more. Your
computer will restart several times during the upgrade process.
4701-1 ch04.f.qc 4/24/00 09:06 Page 158
15. After your computer finishes the upgrade and performs its final reboot, the
Password Creation dialog box is displayed. Type a password for the Administrator
in the New Password text box. Confirm this password by retyping it in the Confirm
New Password text box. Click OK.
16. Log on to Windows 2000 Professional by typing in your user name and password
and clicking OK. The upgrade is complete.
STEP BY STEP
TIP
These are the steps I used to upgrade a Windows NT Workstation 4.0
computer to Windows 2000 Professional. The steps to upgrade Windows
NT Workstation 3.51 are nearly identical.
If for some reason you don’t want to use NTFS, select the “No, do not upgrade
my drive” option, and click Next.
8. Windows 2000 Setup checks your computer for compatibility with Windows
2000, and displays the Report System Compatibility screen if it detects any
incompatible hardware or software, as shown in Figure 4-4. If you want more
information about any item displayed in this screen, highlight the item and click
Details. To save this report, click Save As and provide a file name.
Click Next.
9. Windows 2000 Setup copies installation files to your computer’s hard disk.
Then Windows 2000 restarts your computer.
10. After your computer reboots, Windows 2000 Setup inspects your computer’s
hardware configuration. If you have third-party SCSI or RAID drivers that need
to be installed, press F6 during this process. (If you don’t have these drivers,
just ignore this screen.)
11. Windows 2000 Setup examines your hard disk(s) and copies files to the Windows
2000 installation folders. Then Setup initializes your Windows 2000 configuration,
and restarts your computer.
12. Windows 2000 Professional starts. If you chose to convert your file system to
NTFS, Windows 2000 converts the drive to NTFS. Windows 2000 restarts your
computer again.
4701-1 ch04.f.qc 4/24/00 09:06 Page 160
13. Windows 2000 Setup detects and installs devices on your computer. This takes
several minutes, and your display may flicker during this time. If your computer stops
during this process for a long period of time (more than an hour) or displays an error,
reboot your computer and Setup will resume automatically.
14. Windows 2000 Setup installs networking components. Then Windows 2000 Setup
installs additional Windows 2000 components. Finally, Setup performs a final set of
tasks. During this process, it installs Start menu items, registers components, saves
settings, and removes any temporary files used. This process takes quite a bit of
time. Then Windows 2000 automatically restarts your computer.
15. Log on to Windows 2000 Professional by typing in your user name and password
and clicking OK. The upgrade is complete.
CAUTION
As you might expect, during the upgrade process your server will be
restarted several times. Because of this fact, I recommend that you
perform the upgrade at a time when you are able to reboot the server
without disrupting service to users of client computers.
STEP BY STEP
TIP
These are the steps I used to upgrade a Windows NT Server 4.0 computer
to Windows 2000 Server. The steps to upgrade from Windows NT Server
3.51 are similar.
2. Place the Windows 2000 Server compact disc in your computer’s CD-ROM drive.
3. Windows 2000 displays a message indicating that the compact disc contains a
newer version of Windows than you are currently using. Click Yes to upgrade to
Windows 2000.
4701-1 ch04.f.qc 4/24/00 09:06 Page 161
4. The Windows 2000 Setup Wizard starts. Accept the default option to upgrade to
Windows 2000, and click Next.
5. The License Agreement screen appears. Select the “I accept this agreement”
option, and click Next.
6. The Your Product Key screen appears. Type in the 25-character product key from
the back of your Windows 2000 compact disc case. Click Next.
7. The Upgrading to the Windows 2000 NTFS File System screen appears. (This
screen doesn’t appear if your computer is already configured to use NTFS.)
If you want to use NTFS, accept the default option of “Yes, upgrade my drive,”
and click Next. (I recommend using NTFS for most upgrade situations.)
If for some reason you don’t want to use NTFS, select the “No, do not upgrade
my drive” option, and click Next.
8. Windows 2000 Setup checks your computer for compatibility with Windows 2000,
and displays the Report System Compatibility screen if incompatible hardware or
software is detected. If you want more information about any item displayed in this
screen, highlight the item and click Details. To save the report, click Save As and
provide a filename. Click Next.
9. Windows 2000 Setup copies installation files to your computer’s hard disk. Then
Windows 2000 restarts your computer.
10. After your computer reboots, Windows 2000 Setup inspects your computer’s
hardware configuration. If you have third-party SCSI or RAID drivers that need to
be installed, press F6 during this process. (If you don’t have these drivers, just
ignore this screen.)
11. Windows 2000 Setup examines your hard disk(s) and copies files to the Windows
2000 installation folders. Then Setup initializes your Windows 2000 configuration,
and restarts your computer.
12. Windows 2000 Server starts. If you chose to convert your file system to
NTFS, Windows 2000 converts the drive to NTFS. Windows 2000
restarts your computer again.
13. Windows 2000 Setup detects and installs devices on your computer. This takes
several minutes, and your display may flicker during this time. If your computer
stops during this process for a long period of time (more than an hour) or
displays an error, reboot your computer and Setup will resume automatically.
14. Windows 2000 Setup installs networking components. Then Windows 2000 Setup
installs additional Windows 2000 components. Finally, Setup performs a final set of
tasks. During this process, it installs Start menu items, registers components, saves
settings, and removes any temporary files used. This process takes quite a bit of
time. Then Windows 2000 automatically restarts your computer.
4701-1 ch04.f.qc 4/24/00 09:06 Page 162
15. If you are upgrading a stand-alone server or a member server, log on to Windows
2000 Server by typing in your password and clicking OK. The upgrade is complete.
If you are upgrading a domain controller (either a PDC or a BDC), Windows 2000
Setup automatically logs you on as Administrator and starts the Active Directory
Installation Wizard. Configure each of the screens in this wizard as appropriate to
complete the upgrade. You must restart your computer at the end of this process.
CROSS-REFERENCE
For detailed information on using the Active Directory Installation Wizard,
see the “Installing Active Directory” section in Chapter 7.
This chapter explored numerous Windows 2000 upgrade topics. Some of the key
points are:
■ You can upgrade the following operating systems to Windows 2000
Professional: Windows 95, Windows 98, Windows NT Workstation 3.51,
and Windows NT Workstation 4.0.
■ You can upgrade the following operating systems to Windows 2000 Server:
Windows NT Server 3.51 and Windows NT Server 4.0.
■ If you decide not to upgrade a Windows 95 or Windows 98 computer to
Windows 2000, but you run Windows 2000 (and Active Directory) on servers
and other computers on your network, you may decide to install the Directory
Service Client on this computer.
■ When you prepare a computer to meet upgrade requirements, you need
to determine if hardware is adequate, obtain necessary upgrade packs
for software, and test software applications before the upgrade.
Windows 2000 is somewhat of a hardware hog. Table 4-1 shows the
minimum hardware required to install Windows 2000.
To determine if hardware is adequate and if software is compatible with
Windows 2000, you can use the /checkupgradeonly switch for the
Winnt32.exe command-line utility to create an upgrade report.
■ There are some special considerations for upgrading an existing Windows NT
4.0 network to Windows 2000, including planning your domain structure,
evaluating infrastructure and hardware, testing server-based applications,
and planning for your DNS server.
■ When upgrading an existing Windows NT Server 4.0 network to Windows 2000,
you should upgrade computers in a specific order.
When upgrading from a single domain model, the primary domain controller
(PDC) must be upgraded first.
When upgrading from a multiple domain model, you should upgrade the
PDC of the Windows NT 4.0 domain that will become the Windows 2000
root domain first.
■ If you upgrade an existing multiple domain Windows NT 4.0 network to a single
Windows 2000 domain, the domain structure can’t be upgraded directly, but is
upgraded by performing a series of sequential steps.
4701-1 ch04.f.qc 4/24/00 09:06 Page 165
165
STUDY GUIDE
This section contains several exercises that are designed to cement your
knowledge and help you prepare for the exams:
■ Assessment questions: These questions test your knowledge of
the upgrade topics covered in this chapter. You can find the answers
to these questions at the end of this chapter.
■ Lab Exercises: These two labs give you the opportunity to practice
upgrading a Windows 98 computer to Windows 2000 Professional,
and upgrading a Windows NT Server 4.0 computer to Windows
2000 Server.
Assessment Questions
1. Which operating system(s) can you upgrade to Windows 2000
Professional? (Choose all that apply.)
A. Windows 95
B. Windows 98
C. Windows for Workgroups
D. Windows NT Workstation 4.0
E. Windows NT Server 4.0
2. Which operating system(s) can you upgrade to Windows 2000 Server?
(Choose all that apply.)
A. Windows 95
B. Windows 98
C. Windows for Workgroups
D. Windows NT Workstation 4.0
E. Windows NT Server 4.0
3. You are considering upgrading a Windows NT Workstation 4.0 com-
puter on your network to Windows 2000 Professional.The computer
has 12 applications installed in addition to the operating system.All
the applications are compatible with Windows 2000.The end user
would benefit from the additional features Windows 2000 provides.
What action should you take?
4701-1 ch04.f.qc 4/24/00 09:06 Page 166
166
167
168
Lab Exercises
The following labs provide you with hands-on experience upgrading to
Windows 2000 Professional and Windows 2000 Server.
EXAM
MATERIAL
169
6. At the MS-DOS prompt, type the drive letter of your CD-ROM drive,
followed by a colon — for example, D: — and press Enter.Then type cd
\i386 and press Enter.Then type winnt32 /checkupgradeonly and
press Enter.
7. Windows 2000 prepares an upgrade report.This takes a few minutes.
8. The Windows 2000 Readiness Analyzer displays the upgrade report.
Print the upgrade report. Click Finish.
9. At the MS-DOS prompt, type exit and press Enter.
10. Read the upgrade report you printed in Step 8. If the report indi-
cates your hardware is inadequate to run Windows 2000, perform
any necessary hardware upgrades. If the report indicates that some
of your computer’s hardware or software may be incompatible
with Windows 2000, obtain the appropriate updated files or
upgrade packs from the hardware or software manufacturer.
If you have hardware or software installed in your computer for which
you are unable to obtain updated files or upgrade packs for Windows
2000, and you no longer require the use of this hardware or software,
remove the hardware or software from your computer before upgrad-
ing to Windows 2000.
170
171
15. After your computer finishes the upgrade and performs its final reboot,
the Password Creation dialog box is displayed.Type a password for the
Administrator in the New Password text box. Confirm this password by
retyping it in the Confirm New Password text box. Click OK.
16. Log on to Windows 2000 Professional by typing in your password
and clicking OK.The upgrade is complete.
EXAM
MATERIAL
This lab is optional because it requires a Windows NT Server 4.0 computer that
is configured as a stand-alone server. If you have a Windows NT Server 4.0
computer that you’ve been wanting to upgrade to Windows 2000, here’s
your opportunity.
The purpose of this lab is to give you hands-on experience in upgrading
a Windows NT Server 4.0 stand-alone server to Windows 2000 Server.
Follow the steps in this lab exercise carefully.
1. Boot your computer to Windows NT Server 4.0. Log on
as Administrator.
2. Place the Windows 2000 Server compact disc in your computer’s
CD-ROM drive.
3. Windows 2000 displays a message indicating that the compact disc
contains a newer version of Windows than you are currently using.
Click Yes.
4. The Windows 2000 Setup Wizard starts.Accept the default option
to upgrade to Windows 2000, and click Next.
5. The License Agreement screen appears. Select the “I accept this
agreement” option, and click Next.
6. The Your Product Key screen appears.Type in the 25-character
product key from the back of your Windows 2000 compact
disc case. Click Next.
4701-1 ch04.f.qc 4/24/00 09:06 Page 172
172
173
Assessment Questions
1. A, B, D. The only operating systems that can be upgraded to Windows
2000 Professional are Windows 95,Windows 98, and Windows NT
Workstation. Neither Windows for Workgroups nor Windows NT
Server can be upgraded to Windows 2000 Professional.
2. E. The only operating systems that can be upgraded to Windows
2000 Server are Windows NT Server 3.51 and Windows NT Server
4.0. E is the only correct answer.
3. B. Upgrading the computer to Windows 2000 Professional is probably
the best choice given that the current operating system is Windows NT
Workstation 4.0 (which upgrades easily to Windows 2000 Professional)
and the fact that the computer has 12 additional applications installed
on it that would need to be reinstalled and reconfigured if a clean install
was performed.
4. C. See Table 4-1.
5. C. See Table 4-1.
4701-1 ch04.f.qc 4/24/00 09:06 Page 174
174
Professional
EXAM Server
MATERIAL
EXAM OBJECTIVES
C HAP TE R
5
■ Update drivers.
■ Monitor and configure multiple processing units.
■ Install, configure, and troubleshoot network adapters.
■ Manage and troubleshoot driver signing.
■ Configure, manage, and troubleshoot the Task Scheduler.
■ Manage and troubleshoot the use and synchronization of offline
files.
■ Manage hardware profiles.
■ Configure support for multiple languages or multiple
locations.
■ Enable multiple-language support.
■ Configure multiple-language support for users.
■ Configure local settings.
■ Configure Windows 2000 Professional for multiple
locations.
■ Configure and troubleshoot desktop settings.
■ Configure and troubleshoot fax support.
■ Configure and troubleshoot accessibility services.
Continued
4701-1 ch05.f.qc 4/24/00 09:10 Page 178
Professional
EXAM Server
MATERIAL
C HAP TE R
5
Using Control Panel
I t seems that Control Panel just gets bigger and better with every new
release of Windows — and Control Panel in Windows 2000 is no excep-
tion. Windows 2000 Control Panel is so robust that I could write a whole book
about it alone. But I’ll try to contain my enthusiasm and boil it down to the
basics you need to prepare for the Microsoft Windows 2000 certification
exams and to use Windows 2000 in the real world.
So, in this chapter, I’ll start with a brief overview of Control Panel. Then I’ll
work my way through Control Panel applications, one at a time. I’ll explain what
each application is used for, and then show you how to use many of the appli-
cations to configure a Windows 2000 computer. As you can tell by reading
the exam objectives for this chapter, a huge focus is placed on installing, con-
figuring, managing, and troubleshooting specific hardware devices on a
Windows 2000 computer. You’ll see that same focus throughout this chapter,
with a lot of emphasis placed on using Add/Remove Hardware, Device
Manager, and various troubleshooting tips and tools.
179
4701-1 ch05.f.qc 4/24/00 09:10 Page 180
Chapter Pre-Test
1. What is Control Panel?
2. What application is used to install hardware devices on a
Windows 2000 computer?
3. What term is defined as “a special type of program that enables
an operating system, such as Windows 2000, to recognize and
work with a particular hardware device”?
4. How many displays can a Windows 2000 computer support
simultaneously?
5. What is driver signing?
6. What does IrDA stand for, and what does this organization do?
7. List three tools used to troubleshoot hardware devices on a
Windows 2000 computer.
4701-1 ch05.f.qc 4/24/00 09:10 Page 181
STEP BY STEP
1. From the Windows 2000 desktop, right-click any blank area in the taskbar. Then
select Properties from the menu that appears.
2. In the Taskbar and Start Menu Properties dialog box, click the Advanced tab.
3. On the Advanced tab, select the check box next to Expand Control Panel, as
shown in Figure 5-2. Click OK.
4. Now, when you select Start ➪ Settings ➪ Control Panel, a full menu of Control
Panel applications is displayed on the desktop, as shown in Figure 5-3.
TIP
Control Panel applications look and feel the same in all of the Windows
2000 operating systems — Professional, Server, and Advanced Server.
4701-1 ch05.f.qc 4/24/00 09:10 Page 183
It’s true that, depending on the Windows 2000 operating system you’re
running, you may have more or fewer Control Panel applications, and
more or fewer configurable options within an application, but basically, if
you know how to use a Control Panel application on one Windows 2000
computer, you’ll be able to use that application on other Windows 2000
computers.
In the next sections, I’ll describe each of the Control Panel applications
and show you how to use many of these applications to configure and
manage a Windows 2000 computer.
Accessibility Options
The Accessibility Options application is used to configure the keyboard,
sound, display, and mouse options on a computer to accommodate users
who are physically challenged, including people who have difficulty striking
multiple keys simultaneously on a keyboard, people who are visually or hear-
ing impaired, or people who have difficulty holding or clicking a mouse.
The Accessibility Options application is available unless you deselected
it during the installation of Windows 2000. Accessibility Options is nor-
mally installed by default, but if it’s not installed on your computer, you can
use the Add/Remove Programs application (discussed later in this chapter)
to install it.
In the following sections, I’ll explain first how to configure Accessibility
Options, and then how to troubleshoot Accessibility Options.
finger quickly once he or she has pressed a key. ToggleKeys causes Windows
2000 to play a tone every time the Caps Lock, Num Lock, or Scroll Lock
key is pressed. A high tone is played when the key is first pressed, and a
lower tone is played when Caps Lock, Num Lock, or Scroll Lock is pressed
again (and turned off).This feature is helpful for visually impaired users.
TIP
MouseKeys only works when you have a numeric keypad on your key-
board, which some laptop computers don’t have.
On the General tab, you can configure Windows 2000 to turn off acces-
sibility features after the computer has been idle for a specified number of
minutes.You can also configure Windows 2000 to notify you, either visu-
ally or by making a sound, when an accessibility feature is turned on or off.
You can also configure SerialKey devices, such as numeric keypads or
other devices that augment the keyboard and mouse features, on this tab.
As the name implies, SerialKey devices are connected to a computer’s ser-
ial port. Finally, an administrator can choose to apply all selected
Accessibility Option settings to the computer’s default desktop that is dis-
played during logon, to new users that log on to this computer from this
point on, or both.
Making configuration changes in the Accessibility Options application
is fairly straightforward and self-explanatory. For example, suppose you
want to configure keyboard settings for an employee who is unable to
strike two keys simultaneously. Because many keyboard commands use the
Shift, Ctrl, or Alt keys in conjunction with another key, you’ll need to
select the Use StickyKeys option on the Keyboard tab. You can either
accept the default settings for this option, or click Settings for more
StickyKeys configuration options. When you’re finished configuring
Accessibility Options, click OK.
TIP
In the Accessibility Options dialog box (and in many other dialog boxes in
Windows 2000), you can click either OK or Apply. Clicking OK applies
the changes you made and closes the dialog box. Clicking Apply applies
the changes you made, but leaves the dialog box open. You don’t need to
click Apply first, and then OK. Just clicking OK will do the job.
Add/Remove Hardware
The Add/Remove Hardware application is a wizard that helps you add,
remove, unplug, and troubleshoot the hardware in your computer.
Hardware devices that you can add, remove, and troubleshoot include:
■ Display devices/video adapters
■ DVD and CD-ROM devices
■ Input/output (I/O) devices, such as:
Cameras
Keyboard
Mouse
Multimedia devices
Printers
Scanners
USB devices
TIP
When you add (or remove) hardware by using the Add/Remove
Hardware application, what you’re really doing is installing (or removing)
device drivers for hardware devices that are already installed in (or con-
nected to) the computer.
EXAM TIP
Because many of the Professional and Server exam objectives deal with
installing, configuring, and troubleshooting hardware devices, and
because Add/Remove Hardware is one of the primary tools used for
these tasks, I urge you to read these next few sections carefully and prac-
tice using this tool.
STEP BY STEP
7. The Hardware Type screen appears. Select the type of hardware device you want
to add. (I selected IDE ATA/ATAPI controllers from the Hardware types list
because I was installing an IDE CD-ROM controller.) Click Next.
8. The Select a Device Driver screen appears, as shown in Figure 5-6. Notice that a
list of manufacturers and a list of specific devices (models) are displayed.
Select the manufacturer of the device you want to add, and then select the spe-
cific model. If the manufacturer or specific model does not appear in the lists, and
you have a manufacturer’s disk with drivers on it, click Have Disk and follow the
instructions presented on-screen. (Because I have a generic, industry standard
IDE controller, I selected a manufacturer of [Standard IDE ATA/ATAPI controllers],
and a model of Standard IDE/ESDI Hard Disk Controller.)
Click Next.
9. If the device you’re adding is not Plug and Play, Windows 2000 displays a warn-
ing dialog box informing you that Windows 2000 could not detect the settings of
the device. If this warning is displayed, click OK.
10. If Windows 2000 is unable to detect the settings of the device, a Resources tab is
displayed, as shown in Figure 5-7. Notice that the configuration for the device I am
adding (Basic configuration 0000) conflicts with devices already installed in the
computer. We know this because hardware conflicts are listed in the “Conflicting
device list” box at the bottom of the dialog box, and are also indicated by the inter-
national “no” symbol (the circle-and-slash) in the “Resource settings” box.
In order to correctly configure this dialog box, you’ll need to know what settings
you configured (by jumpers or switches) on the hardware device you installed. For
example, for the IDE CD-ROM controller I installed, I configured the controller to
use the I/O range of 0168 — 016F, the I/O range of 036E — 036E, and an IRQ
(interrupt request) of 10. I chose these settings because that is how the jumpers
on the card itself were configured.
Then, what you have to do is to select, one at a time, the Basic configurations in
the “Settings based on” drop-down list box until you find one that displays the
correct settings (the settings that were manually configured on the card by using
jumpers or switches) in the “Resource settings” box. When you find the correct
setting, no conflicts should be listed in the “Conflicting device list” box. If conflicts
are listed, you must resolve them, either by physically changing the hardware set-
tings on the device you are adding or by using the System application in Control
Panel to change the resource settings on the conflicting device.
TIP
If you’re configuring a Plug and Play device, you don’t need to know the
resource settings for the device. Just try the Basic configuration options,
one at a time, until you find an option that displays no conflicts. Windows
2000 will then configure the Plug and Play device for you.
If you are unable to find a Basic configuration option that matches your hardware
configuration, select the Basic configuration option that most closely matches
your hardware configuration (the settings made on the card using jumpers or
switches). Then highlight the specific resource type in the “Resource settings”
box that does not match your hardware configuration, clear the check box next
to “Use automatic settings” if it is checked, and click Change Setting. If the
“Use automatic settings” check box is grayed out, you won’t be able to manually
change individual settings, but you will still be able to select from among the
Basic configuration options. Follow the instructions presented on-screen to make
the setting match your hardware configuration.
Click OK.
11. In the Start Hardware Installation screen, click Next.
12. In the Completing the Add/Remove Hardware Wizard screen, click Finish.
13. Depending on the type of device being added, a System Settings Change dialog
box may be displayed, notifying you that you must restart your computer before
the new settings will take effect.
4701-1 ch05.f.qc 4/24/00 09:10 Page 193
STEP BY STEP
CAUTION
Don’t just reach back and unplug the device at this point — if you do, you
could damage the device or your computer because the device’s drivers
are still running in memory, even though they’ve been removed from the
hard disk.
Now you can shut down your computer and remove the hardware device.
After uninstalling a device, you should either shut down your computer
and remove the device, as I just mentioned, or use the steps that follow to
unplug a device and then remove the device from your computer.
There are two methods you can use to unplug or eject a device.You can
use the Add/Remove Hardware application in Control Panel, or you can
use the Unplug or Eject Hardware icon that Windows 2000 automatically
displays in the taskbar when a PC Card or USB device is installed. I’ll
explain how to use both methods in the steps that follow.
STEP BY STEP
6. The Select Device to Unplug screen appears, as shown in Figure 5-8. Notice
the devices that you can unplug. Also notice the icon that appears above the
“Hardware devices” box. This is the Unplug/Eject icon, and it will be mentioned
again in a later step.
Click the device you want to unplug. Click Next.
7. The Confirm Device screen appears. In this screen, Windows 2000 lists the
device or devices it is preparing to unplug. In some cases more devices than the
one you selected will be listed. If additional devices are shown, it is because they
are dependent on the device you selected. To continue unplugging the device(s),
click Next.
8. The Completing the Add/Remove Hardware Wizard screen appears, as shown in
Figure 5-9. Note the Unplug/Eject icon in this screen, and notice where Windows
2000 displays this icon on the taskbar.
Click Finish. It is now safe to unplug or eject the device.
4701-1 ch05.f.qc 4/24/00 09:10 Page 196
STEP BY STEP
1. Double-click the Unplug/Eject icon on the taskbar (it’s located next to your system
clock).
2. The Unplug or Eject Hardware dialog box appears. Click the device you want to
unplug or eject. Click Stop.
3. The Stop a Hardware Device dialog box appears, listing the device (or devices) to
be unplugged. Click OK to continue.
4. Windows 2000 displays the Safe to Remove Hardware dialog box, indicating it is
now okay to remove the hardware device. Click OK, and unplug or eject the device.
4701-1 ch05.f.qc 4/24/00 09:10 Page 197
STEP BY STEP
Add/Remove Programs
The Add/Remove Programs application is used to install and remove third-
party software and to add and remove optional Windows 2000 components.
All users can use the Add/Remove Programs application to add and remove
third-party applications, but only members of the Administrators group can
use the portion of this application that enables you to add and remove
optional Windows 2000 components.
To start the Add/Remove Programs application, double-click the
Add/Remove Programs icon in Control Panel.
Adding a Program
One of the most common uses for the Add/Remove Programs application is
to add a new program or application.To add a new program, such as a word
processing application or a game, insert the application’s compact disc (or
first installation floppy disk) into your computer. In the Add/Remove
Programs application main dialog box, click Add New Programs. A dialog
box is displayed, as shown in Figure 5-10. Notice that you can either add a
program from a compact disc or a floppy disk, or you can connect to
Microsoft’s Web site over the Internet and download new or updated
Windows 2000 features, device drivers, service packs, and so on. If your
Windows 2000 computer is a member of a domain, another option is dis-
played in this dialog box that enables you to add programs from your corpo-
rate network. Follow the instructions presented on-screen to install the new
program.
Removing a Program
Another common use of this application is to remove an installed program,
perhaps because the program is not functioning properly, because you want
to free up disk space, or for any other reason.You can use the Add/Remove
Programs application to remove a program entirely, or to remove a discrete
component within a program.The following steps explain how to use the
Add/Remove Programs application to remove a program.
4701-1 ch05.f.qc 4/24/00 09:10 Page 199
STEP BY STEP
Although the stated purpose of this section (and the previous steps) is all
about removing a program, I should point out that many application setup
programs, when launched using the preceding steps, also enable you to add
components at this time.This can be a useful feature when you want to add
and delete components of a program, but don’t want to remove the program
entirely.
are unnecessary for you or your users. Here’s how to add or remove
optional Windows 2000 components:
STEP BY STEP
To add or remove a component, select or clear the check box next to that compo-
nent. The check boxes in this dialog box have three possible states:
Checked: If the check box next to a component is checked when the dialog
box first appears, this component, and all of its subcomponents, is already
installed on this computer. If you select a check box that was previously
cleared, this component, and all of its subcomponents, will be installed dur-
ing this process.
4701-1 ch05.f.qc 4/24/00 09:11 Page 202
Cleared: If the check box next to a component is cleared when the dialog
box first appears, this component, and all of its subcomponents, is not
installed on this computer. If you clear a check box that was checked or gray
checked, this component, and all of its subcomponents, will be removed by
this process.
Gray Checked: If the check box next to a component is gray checked when
the dialog box first appears, this component and selected subcomponents
are already installed on this computer. If you highlight a component, click
Details, and then select or clear check boxes next to specific subcompo-
nents, Windows 2000 will make the requested changes by either adding or
removing selected subcomponents.
As you can tell from the preceding check box descriptions, you can control which
subcomponents of a component are added or removed. To configure specific
subcomponents, highlight a component and click Details. In the dialog box that
appears, select the check boxes next to the subcomponents you want to add,
clear the check boxes next to the subcomponents you want to remove, or both,
and then click OK.
Click Next.
5. Windows 2000 configures components, and makes the configuration change(s)
you requested. When the Completing the Windows Components Wizard screen
appears, click Finish.
6. Click Close to exit the Add/Remove Programs application.
Date/Time
The Date/Time application is used to configure the date, time, time zone,
and optional adjustment for daylight saving time.You must be a member of
the Administrators group to use the Date/Time application.
To start the Date/Time application, double-click the Date/Time appli-
cation in Control Panel, or double-click the clock/time display in the
lower-right-hand corner of the taskbar on your desktop.
Because the configuration options and settings in this application are
straightforward and self explanatory, I won’t go into a detailed discussion of
how to use this application.
Display
The Display application is used to configure a computer’s desktop settings,
including background, screen saver options and computer power settings,
desktop appearance,Web pages that appear on the Active Desktop, desktop
icons and visual effects, and display adapter settings (including multiple-
display support).You can also configure the display to use large fonts, large
icons, and a high-contrast color scheme to accommodate a visually chal-
lenged user. In addition to configuring desktop and display settings, the
Display application is also useful for troubleshooting desktop settings and
video adapters.
To start the Display application, double-click the Display icon in Control
Panel; or, simply right-click the desktop and select Properties from the
menu that appears.
There are six tabs in the Display Properties dialog box: Background,
Screen Saver,Appearance,Web, Effects, and Settings.
■ Picture Display: In this drop-down list box, you can select one
of three appearance options to apply to the picture you choose for
your wallpaper: Center,Tile, or Stretch. If you select Center, the
picture you selected for your wallpaper will be centered on your
desktop. If you select Tile, multiple copies of the picture will be
tiled on your desktop. If you select Stretch, the picture will be
stretched to fit your entire desktop.
■ Pattern: Maybe you don’t want a picture on your desktop at all.
In this case, you can select a pattern to use as wallpaper, instead of
a picture. (In other words, the two choices, picture or pattern, are
mutually exclusive.) To select a pattern for your desktop, first select
a background picture of None in the “Select a background picture
or HTML document as Wallpaper” list box.Then click Pattern.
4701-1 ch05.f.qc 4/24/00 09:11 Page 205
In the Pattern dialog box, select a pattern for your desktop, then
click OK.
Once you’ve configured the picture or pattern you want to use as wall-
paper on your desktop, click OK.
TIP
If you select an HTML document to use as wallpaper, and you have not
previously enabled Active Desktop, a dialog box is displayed, asking if
you want to enable Active Desktop now. Click Yes if you want to use the
HTML picture you’ve selected as wallpaper.
CAUTION
I don’t recommend that you use any of the “3D” screen savers on servers.
Using these screen savers can significantly slow server response time
because of the large amount of processor utilization these screen savers
need.
Here are the screen saver options you can configure on this tab:
■ Screen Saver: In this drop-down list box, you can select a screen
saver that will be displayed on your desktop after a specified num-
ber of minutes has passed without any user input. Once you’ve
selected a screen saver, then you can configure the following
optional settings:
■ Settings: Clicking Settings causes a Setup dialog box to be dis-
played that contains customizable settings for the specific screen
saver you’ve selected. In this dialog box, you can make configura-
tion changes, and then click OK.
■ Preview: If you want to preview your screen saver in full screen
mode now (as opposed to waiting the specified number of minutes
before it is scheduled to start), click Preview. Be careful to not
move your mouse after clicking Preview — moving your mouse
causes the preview to stop.
■ Password protected: This check box is a security feature of
Windows 2000.When selected,Windows 2000, once it runs your
screen saver, locks your computer and does not allow any user to
access your desktop without first entering either your password or
the Administrator’s password.
■ Wait: In this spin box, you can select the number of minutes you
want to pass without user input before Windows 2000 starts your
screen saver. If you select too low of a number, your screen saver
may become really annoying.
After you’ve selected and configured your screen saver, click OK.
4701-1 ch05.f.qc 4/24/00 09:11 Page 207
Or, you can create and save your own custom scheme by selecting each
item individually and configuring the item’s appearance.
you can configure the Web page’s properties on the Web tab by using the
Properties button (notice this is grayed out in Figure 5-16). When you’ve
finished configuring the Web tab, click OK.
On the Effects tab you can change icons for items on your desktop, and
you can configure various visual effects. The configurable options on this
tab are pretty self explanatory.
In the following section I’ll show you how to perform some of the most
common display configuration tasks, including configuring the number of
colors/color depth used by the display, configuring the display’s resolution,
and setting the monitor’s refresh frequency.
STEP BY STEP
TIP
With some display adapters, you can either choose a very high color depth
(such as True Color) or a high resolution (such as 1024 × 768), but you may
not be able to choose both. For example, if you select True Color and then
select a high display resolution, Windows 2000 may automatically change
your color setting to a lower color depth setting (such as High Color).
4701-1 ch05.f.qc 4/24/00 09:11 Page 211
STEP BY STEP
1. If your current video card does not support multiple outputs, install and configure
one or more additional display devices/video adapters in your Windows 2000
computer.
2. Start the Display application. (To do this, right-click anywhere on your desktop,
then select Properties from the menu that appears.)
3. Click the Settings tab.
4. The Settings tab appears, as shown in Figure 5-19. Notice that multiple monitor
icons are displayed in this dialog box.
Also notice in Figure 5-19 that the primary monitor is shown as a highlighted box
with a black frame around it. The primary monitor, by default, is monitor 1. The pri-
mary monitor is where the Logon dialog box will be displayed, and is also where
applications will open, by default. (You can select which monitor will be used as
the primary monitor in Step 6.)
4701-1 ch05.f.qc 4/24/00 09:11 Page 212
TIP
By default, the primary monitor is the video adapter that is installed in the
card slot closest to the power supply in the computer.
To use multiple monitors, you must enable each additional monitor. To enable a
monitor, click its icon within the Settings tab, then select the check box next to
“Extend my Windows desktop onto this monitor.”
5. After each additional monitor is enabled, you can configure the color and resolution
of each monitor by first clicking the monitor’s icon, and then configuring the appro-
priate settings. You can configure different settings on each individual monitor.
6. Choose the monitor that will serve as your primary monitor. This does not have to
be monitor 1. To perform this configuration, click the icon of the monitor you want
to use as the primary monitor, then select the check box next to “Use this device
as the primary monitor.” If this check box is grayed out, the selected monitor is
already configured as the primary monitor.
7. Configure the monitor icons on the Settings tab to match the physical arrange-
ment of your monitors. For example, if you have two monitors, stacked one on top
of the other, you can click and drag one monitor under the other so that the pic-
ture on the screen coincides with the actual physical arrangement.
4701-1 ch05.f.qc 4/24/00 09:11 Page 213
command button on the Settings tab. Figure 5-20 shows the Display
Troubleshooter.
Fax
The Fax application appears in Control Panel only when a fax device, such
as a fax modem, is installed in the computer.The Fax application is used to
configure Fax properties, including cover pages and the Fax status monitor.
4701-1 ch05.f.qc 4/24/00 09:11 Page 215
This application can also be used to access the Fax Service Management
Console and to add a Fax printer.
To access the Fax application, double-click the Fax icon in Control
Panel. There are four tabs in the Fax Properties dialog box: User
Information, Cover Pages, Status Monitor, and Advanced Options, as shown
in Figure 5-21.
Notice in Figure 5-21 that the User Information tab appears on top, by
default. On this tab you can configure your own personal user informa-
tion, such as your name, home and work telephone numbers, fax number,
and e-mail address.Windows 2000 uses this information to fill in the fields
on your fax cover page.
button.You can also access the Fax Service Management Console from the
desktop by selecting Start ➪ Programs ➪ Accessories ➪ Communications ➪
Fax ➪ Fax Service Management.The Fax Service Management Console is
displayed, as shown in Figure 5-22. Notice that you can configure both
devices and logging in this console.
STEP BY STEP
1. Start the Fax Service Management Console. (In the Fax application, click the
Advanced Options tab, then click the Open Fax Service Management Console
button.)
2. The Fax Service Management dialog box appears. In the left pane, click Devices.
In the right pane, right-click the fax device you want to configure, and select
Properties from the menu that appears.
3. The fax device’s Properties dialog box appears, as shown in Figure 5-23. Notice
the check box next to “Enable receive.”
To configure a fax device to receive faxes, select the check box next to “Enable
receive.”
In this dialog box you can also configure the Transmitting Station Identifier (TSID),
which is a line of text that typically includes the company name and fax number of
the fax device you are configuring. You can also configure the Called Station
Identifier (CSID), which is a line of text that is usually identical to the TSID.
4701-1 ch05.f.qc 4/24/00 09:11 Page 217
TIP
The reason the TSID and the CSID are the same is because they both
identify the same fax device. The TSID identifies the fax device when it is
in a sending mode, and the CSID identifies the device when it is in a
receiving mode.
4. After you configure a fax device to receive faxes, you may want to configure what
Windows 2000 will do with received faxes. By default, Windows 2000 stores all
received faxes in the C:\Documents and Settings\All
Users\Documents\My Faxes\Received Faxes folder. To configure
how Windows 2000 treats received faxes, click the Received Faxes tab.
5. On the Received Faxes tab, you can configure Windows 2000 to take any or all
of the following actions with received faxes:
Print received faxes to a specified printer.
Save received faxes in a specified folder (either the default folder or any
folder you choose).
Send received faxes to a local e-mail inbox.
4701-1 ch05.f.qc 4/24/00 09:11 Page 218
TIP
In order to configure a fax device to send received faxes to a local e-mail
inbox, you must first configure the Fax Service to log on to the computer
using a user account that is a member of the Administrators group. You
must also be using a MAPI-enabled client e-mail program, such as
Microsoft Outlook.
When you’re finished configuring the Received Faxes tab, click OK.
6. Close Fax Service Management.
CROSS-REFERENCE
For more information on configuring a service to log on using a user
account, see the “Configuring a service to log on using a user account”
step-by-step section in Chapter 15.
If you’re having fax problems on your computer that you are unable to
resolve, you might consider configuring Windows 2000 to write the max-
imum amount of information on fax error events to the Application Log
in Event Viewer.You can set logging levels in the Fax Service Management
Console.
CROSS-REFERENCE
I’ll cover how to use Event Viewer to view logged event information in
Chapter 13.
4701-1 ch05.f.qc 4/24/00 09:11 Page 219
Other resources you can use to troubleshoot fax devices include the
Add/Remove Hardware application, Device Manager, and System
Information. Add/Remove Hardware was discussed earlier in this chapter,
and I’ll cover Device Manager and System Information later in this chapter.
Folder Options
The Folder Options application is used to customize the manner in which
files and folders are displayed, to change file associations (this term is
explained later on in the chapter), and to make network files available for
use offline.
To start the Folder Options application, double-click the Folder
Options icon in Control Panel. You can also access this application by
selecting Tools ➪ Folder Options in Windows Explorer.There are four tabs
in the Folder Options dialog box: General, View, File Types, and Offline
Files, as shown in Figure 5-24. Notice that the General tab appears on top
by default.
You can configure many advanced file and folder settings on the View
tab. For the average user, the default settings are generally appropriate, in
my opinion. However, as an administrator, I like to use several of the set-
tings in this dialog box to help me with managing and troubleshooting
tasks. For example, I often select the “Show hidden files and folders”
option so that I can view all files and folders on a particular disk or com-
puter. In addition, I clear the check boxes next to “Hide file extensions for
known file types” and “Hide protected operating system files.” Making
4701-1 ch05.f.qc 4/24/00 09:11 Page 221
TIP
The Enable Offline Files check box is selected, by default, on Windows
2000 Professional computers, but you must manually enable offline files
on Windows 2000 Server computers.
Offline files are files, folders, or Web pages that are stored on a network
server and, in addition, are configured on the local computer so they can
be used when the computer is not connected to the network. Offline Files
is a more robust version of the briefcase feature that was introduced in pre-
vious versions of Windows.
Offline Files is a great feature for laptop computers. With offline files,
you can work on a document (that is stored on a network server) at the
office. Then, when you go home with your laptop for the night, you can
continue to work on that document just as though you were connected to
the network.The next morning, when you return to work and log on to
the network,Windows 2000 will synchronize the document on your lap-
top with the network server so that the server’s version of the document is
updated. By default, Offline Files is enabled in Windows 2000 Professional,
but is not enabled in Windows 2000 Server.
There are two or three primary tasks involved in configuring offline
files, depending on whether you’re running Windows 2000 Professional or
Windows 2000 Server. First (if you’re using Windows 2000 Server), you
need to enable offline files in the Folder Options application. Then, in
Windows Explorer, you select the specific files and folders you want to
make available for use offline. Alternatively, you can use Internet Explorer
if you want to make a Web page available for use offline. Then you can
configure custom synchronization settings of your offline files if necessary.
The following sections walk you through these tasks.
STEP BY STEP
TIP
If the only type of files you want to make available offline are Web pages,
you don’t have to enable offline files.
1. Before you can work with files offline, you have to select the specific files or folders
(located on a network server) to make them available for offline use. To do this, start
Windows Explorer (select Start ➪ Programs ➪ Accessories ➪ Windows Explorer).
2. In Windows Explorer, right-click the file or folder on the network server you want
to make available for offline use, and select Make Available Offline from the menu
that appears.
3. Windows 2000 starts the Offline Files Wizard.
TIP
The Offline Files Wizard only runs the first time you make a file or folder
available for offline use. If you’ve previously run this wizard, Windows
2000 makes the file or folder available for use offline at this point, and
you’re done with this process.
Click Next.
4. Select the check box next to “Automatically synchronize the Offline Files when I
log on and log off my computer” if you want Windows 2000 to automatically syn-
chronize the selected offline file or folder at these times. If you want to manually
control synchronization, leave this check box blank. Click Next.
5. On the next screen, you can choose to enable periodic reminders that you are
currently working offline to be displayed. You can also choose whether to create a
shortcut to the Offline Files folder on your desktop. Select the check box
next to either or both of these configuration options, as appropriate. Click Finish.
6. Windows 2000 copies the selected offline files from the server to the Offline
Files folder on your computer.
STEP BY STEP
In this dialog box you can specify additional idle settings, such as the number of
idle minutes before synchronization occurs, how often synchronization will occur if
the computer remains idle, and whether Windows 2000 will perform synchroniza-
tion when the computer is running on battery power. Click OK when you’re fin-
ished configuring this dialog box.
5. To schedule when synchronization of offline files occurs, click the Scheduled tab,
which is shown in Figure 5-30. You can use this tab if you want Windows 2000
to synchronize offline files at specific times, days, or both.
If you want to make changes to the way Windows 2000 handles your
offline files after you’ve initially made them available offline, you can use
the Offline Files tab in Folder Options to configure these changes.
STEP BY STEP
On the Offline Files tab, there are several configuration settings you can change:
You can disable offline files by clearing the check box next to Enable Offline
Files.
You can enable or disable reminders to synchronize your offline files. (When
offline files are enabled, reminders are enabled, by default, to occur every 60
minutes unless you specifically disabled reminders in the Offline Files
Wizard.)
You can place (or remove) a shortcut to the Offline Files folder on
your desktop.
You can configure the maximum amount of hard disk space to use for tempo-
rary offline files.
You can view the files stored in your Offline Files folder — these are
the files you’ve previously configured for offline use.
You can delete temporary or permanent versions of offline files contained in
the Offline Files folder to free up disk space on your computer.
You can configure (using the Advanced command button) how your com-
puter responds when it loses a connection to a server on your network that
contains the original copy of your offline files.
When you’re finished configuring this tab, click OK.
When troubleshooting offline files, several issues can arise. Most offline
file problems involve synchronization problems. Some common offline file
problems and potential solutions are:
■ If a user reports that he or she is unable to make a file available for
offline use, check the user’s permissions to the file or folder in
question.The user must have share and NTFS permissions that
enable the user to read, write, and delete the file or folder.
■ If users of laptop computers report that they don’t have the most
current versions of the offline files they work with, ensure that
each user’s mobile computer is configured to synchronize files both
when the user logs on and logs off the network.
■ If users report that they frequently don’t have enough free disk
space to perform tasks, consider decreasing the amount of disk
space allocated for temporary offline files, or replacing the hard
4701-1 ch05.f.qc 4/24/00 09:11 Page 229
Fonts Folder
The Fonts folder is actually a tool used to install, delete, and manage fonts.
To access the Fonts folder, double-click the Fonts icon in Control Panel.
When you open the Fonts folder, numerous fonts are displayed, as
shown in Figure 5-32.The Fonts folder displays every font that is installed
on the computer. Notice that in this figure each font is represented by an
icon that contains the letters TT, O, or A.
The letter contained in a font’s icon indicates what type of font it is.
There are three possibilities:
■ A: This letter indicates the font is either a vector, raster, or Adobe
Type 1 PostScript font.
■ O: This letter indicates the font is an OpenType font. OpenType
fonts are an extension of the TrueType standard.
■ TT: These letters indicate the font is a TrueType font.
Working with fonts is fairly simple. For example, to install a new font,
with the Fonts folder open, select File ➪ Install New Font, and then fol-
low the instructions presented on-screen. Or, you can install a new font by
opening Windows Explorer, and then dragging the new font and dropping
it on the \Winnt\Fonts folder. Windows 2000 will automatically install
the new font.
There are at least three easy ways to remove an installed font.You can
highlight the font and press Delete. Or, you can right-click the font’s icon,
and select Delete from the menu that appears. Or, you can highlight the
font, and select File ➪ Delete.
To view what a font looks like, double-click the font’s icon. You can
print a sample of the font by clicking Print in the font’s dialog box.
Game Controllers
The Game Controllers application is useful for managing game-related
hardware, such as joysticks and gamepads.With Game Controllers, you can
add, remove, and configure game controllers.You must be a member of the
Administrators group to perform many of the tasks that can be done using
the Game Controllers application.
To access Game Controllers, double-click the Game Controllers icon in
Control Panel.
Because working with the Game Controllers application is fairly
straightforward, and because most network administrators don’t have a lot
of game controllers to configure on the job, I won’t bore you with the
details of using Game Controllers.
4701-1 ch05.f.qc 4/24/00 09:11 Page 231
Internet Options
The Internet Options application is a powerful tool that enables you to
configure temporary Internet files and a home page; configure security
levels for various Web content zones; manage content ratings, certificates,
and personal information; configure dial-up and LAN connections to the
Internet, including proxy server settings; specify which program Windows
2000 will use for each Internet service; and configure multiple advanced
settings.
TIP
If you’re familiar with Internet Explorer (version 5.x) on Windows 95,
Windows 98, or Windows NT, you’ll find that the Internet Options appli-
cation in Windows 2000 is the same as the Internet Options application
that is installed with Internet Explorer 5 on computers that run these
other operating systems.
Keyboard
The Keyboard application is used to configure specific keyboard features,
including speed of character repeat and cursor blink rate, input locale
(including keyboard layout), and keyboard device type.
To start the Keyboard application, double-click the Keyboard icon in
Control Panel.
There are three tabs in the Keyboard Properties dialog box: Speed, Input
Locales, and Hardware.The Speed tab is shown in Figure 5-33.
If you want to adjust the character repeat delay, the character repeat rate,
or the cursor blink rate, drag the slider to the desired speed, and click OK.
The Input Locales tab, which is shown in Figure 5-34, is used to config-
ure both the input locale (the language and locality of the language such as
English United States) and the keyboard layout.
4701-1 ch05.f.qc 4/24/00 09:11 Page 232
EXAM TIP
The Professional exam has five objectives on configuring a computer for
multiple languages and multiple locations. Multiple locations are config-
ured on the Input Locales tab in Keyboard or Regional Options (which is
covered later in this chapter), and multiple languages are configured in
Regional Options. I recommend that you know how to use both of these
applications in your sleep!
The default input locale is English (United States).You can add other
input locales (such as English [United Kingdom] or Dutch [Netherlands])
by clicking Add on the Input Locales tab, selecting the input locale you
want from the Input locale drop-down list box, and then clicking OK.You
can also remove an input locale on this tab by highlighting the input locale
and clicking Remove.
TIP
You can have multiple input locales installed on a single computer.
Licensing
The Licensing application is used to manage licensing and licensing repli-
cation on the local Windows 2000 Server computer.The Licensing appli-
cation is not available on Windows 2000 Professional computers.You must
be a member of the Administrators group to use the Licensing application.
A licensing mode (Per Server or Per Seat) is selected and the number of
client access licenses is configured during the installation of Windows 2000
Server. However, if you purchase additional client licenses, or decide after
installation to change your licensing mode, you can use the Licensing
application to accomplish this.
4701-1 ch05.f.qc 4/24/00 09:11 Page 234
CAUTION
It is a violation of the Windows 2000 licensing agreement to change the
licensing mode of a server from Per Seat to Per Server.
STEP BY STEP
1. Start Licensing. (Select Start ➪ Settings ➪ Control Panel, and then double-click
Licensing.)
2. The Choose Licensing Mode dialog box appears, as shown in Figure 5-35.
If you use the Per Server license mode and want to add client licenses that you
have purchased, click Add Licenses.
3. In the New Client Access License dialog box, enter the number of new licenses
that you want to add in the Quantity spin box, and click OK.
4. In the Per Server Licensing dialog box, agree to the license agreement and click
OK. When the Choose Licensing Mode dialog box reappears, the number of con-
current connections is changed to reflect the number of client licenses you
added.
4701-1 ch05.f.qc 4/24/00 09:11 Page 235
5. To change your licensing mode from Per Server to Per Seat, select the “Per seat”
option, and click OK.
6. In the Per Seat Licensing dialog box, agree to the license agreement and click OK.
Mouse
The Mouse application is used to configure a mouse or other pointing
device.
To start the Mouse application, double-click the Mouse icon in Control
Panel.
There are four tabs in the Mouse Properties dialog box, as shown in
Figure 5-36. Notice the Buttons, Pointers, Motion, and Hardware tabs.
CROSS-REFERENCE
Because the Network and Dial-up Connections folder is pri-
marily used to perform networking tasks, I’ll explain how to use this folder
in Chapter 15.
4701-1 ch05.f.qc 4/24/00 09:11 Page 237
CROSS-REFERENCE
I’ll explain how to use Phone and Modem Options when I discuss dial-up
connections in Chapter 15.
Power Options
The Power Options application enables you to configure energy-saving
settings for your computer. This application was originally designed to
address the needs of laptop and other mobile computers. The battery life
limitations of these computers inspire us to think about saving energy.This
application is also useful for conserving energy used by desktop comput-
ers. If you’re thinking, “Who cares about saving energy?” consider this: I
recently saw a sign in a building of a Redmond, Washington–based soft-
ware company that indicated the company could save over $1,000,000 a
year if everyone turned off equipment when it was not in use.
The Power Options application also enables you to install and configure
an uninterruptible power supply (UPS). A UPS permits an orderly shut-
down of your computer to avoid data loss during a power outage.
Although all users can start the Power Options application, you must be
a member of the Administrators group to use this application.
To start the Power Options application, double-click the Power Options
icon in Control Panel. Figure 5-37 shows the Windows 2000 Professional
version of the Power Options Properties dialog box.
4701-1 ch05.f.qc 4/24/00 09:11 Page 238
As Figure 5-37 shows, there are five tabs in the Power Options Properties
dialog box: Power Schemes,Advanced, Hibernate,APM, and UPS.
TIP
The APM tab is only available on Windows 2000 Professional computers.
a power cord and plug) on the taskbar.You can then double-click this icon
in the taskbar to quickly access the Power Options application.
On the Hibernate tab, you can enable hibernation support.When hiber-
nation support is enabled, an additional option — Hibernate — is added to
the Shut Down Windows dialog box that is displayed when you select
Start ➪ Shut Down. When you select this method of shutting down, the
contents of the computer’s memory are saved to a file on its hard disk, and
then the computer is shut down.When you restart the computer, the con-
tents of memory are reloaded, and you can continue working in whatever
program was open when hibernation occurred.This feature is particularly
useful to users of laptop and other mobile computers who may frequently
need to shut down and restart their computers (such as prior to an aircraft’s
takeoff and landing). To enable hibernation support, select the “Enable
hibernate support” check box on this tab.
Notice that two additional tabs — Alarms and Power Meter — have been
added to the dialog box.Also notice that the UPS tab is no longer present.
Microsoft assumes that if you’re using Advanced Power Management you
won’t be using a UPS with that computer.
The Alarms tab, which is shown in Figure 5-39, enables you to specify
what actions are taken when the computer’s battery runs low. Notice that
there are two sections on this tab: “Low battery alarm” and “Critical bat-
tery alarm.”
The premise of this tab is that you might want Windows 2000 to per-
form certain actions when your computer’s battery charge drops to two dis-
tinct, predetermined (by you) levels.When the battery charge drops to the
first level (typically 10 to 20 percent of the battery’s total capacity), this is
said to be a “Low battery alarm.”When the battery charge drops to the sec-
ond level (typically 3 to 10 percent of its total capacity), this is said to be a
“Critical battery alarm.” On the Alarms tab, you can configure the specific
actions Windows 2000 will take when each of these two events occurs.
4701-1 ch05.f.qc 4/24/00 09:11 Page 241
Some of the actions you can configure on the Alarms tab include:
■ Notification: You can have Windows 2000 do nothing; or you can
configure Windows 2000 to play a sound, display a message on
your screen, or do both to notify you of the alarm.
■ Power Mode: You can have Windows 2000 do nothing, go on
Stand by, or power off when the alarm occurs. Stand by is a low
power usage state where all unnecessary devices, such as monitors
and hard disks, are turned off.
■ Run Program: You can have Windows 2000 do nothing or run a
specified program, script, or batch file when the alarm occurs.
You can configure Windows 2000 to take one set of actions when a low
battery alarm occurs, and the same or a completely different set of actions
when a critical battery alarm occurs.
The Power Meter tab shows the current power source (AC power or
batteries) and the percentage of charge remaining in the computer’s battery.
Another change that occurs after APM is enabled is that a Stand by option
is added to the Shut Down Windows dialog box that is displayed when you
select Start ➪ Shut Down.When you select Stand by, the computer switches
4701-1 ch05.f.qc 4/24/00 09:11 Page 242
into its lowest power consumption mode. In Stand by mode, all unnecessary
hardware in the computer (such as monitors and hard disks) is turned off,
and the computer screen goes blank.The computer is still running, though,
and you can return it to its normal, active state by pressing any key or mov-
ing the mouse.
One other change that occurs after enabling APM is that an additional
option appears on the Advanced tab.This option configures Windows 2000
to prompt you for a password when the computer comes out of Stand by
mode, and this option is selected by default.
Finally, if you’ve selected the option on the Advanced tab to always
show the Power Options icon on the taskbar, this icon has an additional
feature. After APM is enabled, the Power Options icon automatically dis-
plays a power cord and plug icon when the computer is connected to AC
power, and displays a battery icon when the computer in running on bat-
tery power.
Configuring a UPS
The UPS tab is used to install, configure, and monitor an uninterruptible
power supply (UPS). The UPS tab is not present on Windows 2000
Professional computers on which APM has been enabled.
I strongly recommend you use a UPS on any Windows 2000 Server or Windows
2000 Advanced Server computer, and on any other computer that is critical to your
operations. Not using a UPS can result in data loss and sometimes even hardware
damage if electrical power fails unexpectedly. The UPS is your friend because it
can save you from all of this. Of course, if you work somewhere that never has a
power outage, perhaps under the Hoover dam, you needn’t concern yourself about
using a UPS at all. . . .
Also remember that UPS batteries don’t last forever. Follow the manufacturer’s
recommendations for battery replacement and maintenance. There’s nothing so
dissatisfying as finding out that your UPS battery is dead after the power fails. I
know. I once spent an entire day during a big Seattle windstorm responding to cus-
tomer calls concerning damaged hardware and lost data problems that were the
direct result of failed UPS batteries.
4701-1 ch05.f.qc 4/24/00 09:11 Page 243
TIP
The UPS tab in Power Options is a basic UPS management tool. Most
commercial quality UPS devices include software that is much more
sophisticated. I recommend you use the software that the manufacturer
supplies with your UPS.
The UPS tab is adequate for managing an inexpensive UPS that does
not include Windows 2000–compatible software. Figure 5-40 shows the
UPS tab in Power Options.
Notice in Figure 5-40 that on the UPS tab you can view the status of a
UPS device.You can also select and configure a specific UPS device for
your computer under “Details.” Finally, you can view the status of the UPS
service (whether it is stopped or running). In the next section, I’ll explain
how to install and configure a UPS device on a Windows 2000 Server
computer.
4701-1 ch05.f.qc 4/24/00 09:11 Page 244
STEP BY STEP
1. Start Power Options. (Select Start ➪ Settings ➪ Control Panel, and then double-
click Power Options.)
2. In the Power Options Properties dialog box, click the UPS tab.
3. To install a UPS, click Select.
4. In the UPS Selection dialog box, select the manufacturer of your UPS device
from the “Select manufacturer” drop-down list box. The options you can choose
from in this box are American Power Conversion and Generic. (Gee, I wonder
who wrote this application?) If your UPS is not made by American Power
Conversion, select Generic. Then select the model of the device in the “Select
model” box. Finally, select the port this device will use. Click Next.
5. If you selected a generic UPS in Step 4, the UPS Interface Configuration On:
COMx dialog box appears, as shown in Figure 5-41.
In this dialog box, select the appropriate type of signal polarity (either negative or
positive) for each of the three UPS events listed. Consult your UPS documenta-
tion before changing the default settings. Click Finish.
6. The UPS tab reappears. To configure the newly installed UPS, click Configure.
7. The UPS Configuration dialog box appears, as shown in Figure 5-42.
4701-1 ch05.f.qc 4/24/00 09:11 Page 245
In this dialog box, you can configure notifications and alarms. You can specify the
number of seconds Windows 2000 will wait, after a power failure, before it dis-
plays a dialog box indicating that the power has failed. You can also configure the
number of minutes Windows 2000 will run on a battery before generating a criti-
cal alarm, and configure a critical alarm procedure in this dialog box. A critical
alarm is an event that occurs when either the UPS battery is almost dead, or after
the computer runs for a specified number of minutes on battery power, whichever
occurs first. When the point of critical alarm is reached, Windows 2000 runs a
specified program, script, or batch file (if so configured), and then shuts down the
computer.
Configure the settings in this dialog box to meet your needs. Click OK.
8. In the Power Options Properties dialog box, click OK.
4701-1 ch05.f.qc 4/24/00 09:11 Page 246
Printers Folder
The Printers folder is a tool used to add, remove, and configure local
and network printers.Although all users can start the Printers folder and
can use this application to add a network printer, you must be a member of
the Administrators group to use this application to add a local printer.
CROSS-REFERENCE
The Printers folder is covered extensively in Chapter 12.
Regional Options
The Regional Options application is useful for configuring local settings,
and also for configuring support for multiple languages and multiple loca-
tions. For example, this application enables you to configure how certain
objects, such as numbers, currency, time, and date are displayed in applica-
tions. Regional Options also enables you to configure input locale, lan-
guage settings, and keyboard layout.
EXAM TIP
The Professional exam has five objectives on configuring a computer for
multiple languages and multiple locations. Ensure that you are extremely
familiar with the Regional Options application prior to taking this exam.
TIP
The Input Locales tab in Regional Options is the same as the Input
Locales tab in the Keyboard application discussed earlier in this chapter.
In the following sections I’ll show you how to use the Regional
Options application to configure local settings and how to configure sup-
port for multiple languages and multiple locations.
4701-1 ch05.f.qc 4/24/00 09:11 Page 247
STEP BY STEP
1. Start the Regional Options application. (Select Start ➪ Settings ➪ Control Panel,
then double-click Regional Options.)
2. On the General tab, select the check box next to the language you want to add
support for in the “Language settings for the system” box. When you add support
for a particular language, you will be able to read and write (type) documents in
that language. Click OK.
3. If prompted, insert your Windows 2000 product compact disc into your com-
puter’s CD-ROM drive and click OK. When prompted by Windows 2000, click
Yes to restart your computer to make the change effective. If your Windows 2000
compact disc is in your CD-ROM drive, remove it now.
4. Start the Regional Options application. Examine the locations listed in the “Your
locale (location)” drop-down list box. Your location should now be listed. Select
your location and click OK.
TIP
Installing support for a new language, such as Chinese, only provides
language support in applications run on this computer — it doesn’t turn
your operating system into a Chinese version of Windows 2000.
4701-1 ch05.f.qc 4/24/00 09:11 Page 249
STEP BY STEP
1. Start the Regional Options application. (Select Start ➪ Settings ➪ Control Panel,
then double-click Regional Options.)
2. On the General tab, select the check box next to the language or languages you
want to add support for in the “Language settings for the system” box. Click OK.
3. If prompted, insert your Windows 2000 product compact disc into your com-
puter’s CD-ROM drive. When prompted by Windows 2000, click Yes to restart
your computer to make the change or changes effective.
4. Start the Regional Options application again (see Step 1). Click the Input
Locales tab.
5. The Input Locales tab appears, as shown in Figure 5-44. Notice that even though
support for multiple languages is installed, only the English (United States) input
language and US keyboard layout is configured. You must manually add each
additional input locale to complete the process of implementing support for each
language you have added.
To add an additional input locale, click Add.
4701-1 ch05.f.qc 4/24/00 09:11 Page 250
6. In the Add Input Locale dialog box, select the first input locale you want to add
from the “Input locale” drop-down list box. Then select the keyboard layout you
want to use with this input locale from the “Keyboard layout/IME” drop-down list
box. Click OK.
7. The Input Locales tab reappears. Repeat Step 6 until you’ve added all of the input
locales you need. Figure 5-45 shows the Input Locales tab after two new input
locales have been added.
Notice in Figure 5-45 that there is a check mark next to the English (United
States) input locale. This check mark indicates that this is the default input locale
that will be used when an application that supports multiple languages (such as
Microsoft Word, Excel, and so on) is started.
To change the default input locale, highlight the locale in the “Installed input
locales” list box and click Set as Default.
8. You can also configure hot keys to quickly switch between input locales on the
Input Locales tab. To do this, highlight the item for which you want to configure a
hot key sequence in the “Hot keys for input locales” list box and click Change Key
Sequence. Follow the instructions presented on-screen to configure the hot key
sequence you want to use.
4701-1 ch05.f.qc 4/24/00 09:11 Page 251
9. Finally, notice the “Enable indicator on taskbar” check box at the bottom of the
Input Locales tab in Figure 5-45. This option, which is selected by default when
you add additional input locales, causes an icon for the input locale currently
being used to appear on the taskbar, next to the clock. When you click this icon,
all installed input locales are displayed and you can quickly switch to a different
input locale by clicking the input locale you want to switch to.
Figure 5-46 shows the menu that appeared on my computer when I clicked the
input locale icon in the taskbar. Notice that all of the input locales that I added in
Steps 6 and 7 are displayed.
When you change to a different input locale in this way, only the active application
is affected. You can run multiple applications on your computer at the same time
and use a different input locale for each application.
10. When you’re finished configuring input locales, click OK.
4701-1 ch05.f.qc 4/24/00 09:11 Page 252
scanners and cameras. If you have an infrared port on your computer, you
can also use this tab to configure Windows 2000 to receive images from
digital cameras via an infrared/wireless link.
To install a new scanner or camera, click Add on the Devices tab. This
brings up the Scanner and Camera Installation Wizard, which is similar to
the Add/Remove Hardware Wizard.The advantage of adding a scanner or
camera by using this application is that it saves you from having to com-
plete several beginning screens in the Add/Remove Hardware Wizard.
Figure 5-47 shows the Scanners and Cameras Properties dialog box after a
camera and scanner have been installed.
To remove a scanner or camera, highlight the device you want to
remove on the Devices tab and then click Remove. Then click Yes when
Windows 2000 asks if you’re sure you want to remove this device.
To configure a scanner or camera, highlight the device you want to con-
figure on the Devices tab, and then click Properties. A Properties dialog
box specific to the device is displayed.The tabs and possible configuration
options vary depending on the model and type of device (scanner or cam-
era) you are configuring. Some of the most common tabs include General,
Port Settings, and Color Management.
Once you’ve installed and configured a scanner or camera, you can use
the Imaging application (Start ➪ Programs ➪ Accessories ➪ Imaging) to
initiate the transfer of images from your scanner or camera to your
Windows 2000 computer.
You can also configure Windows 2000 to receive images from a scanner
or digital camera via an infrared/wireless link if both your computer and
your scanner or camera have infrared support.To configure infrared image
transfer, click Wireless Device on the Devices tab.This command button is
a shortcut to the Wireless Link application in Control Panel.
TIP
If you don’t have an infrared port on your computer, the Wireless Device
command button will not be displayed.
I’ll discuss the Wireless Link application in more depth later in this chapter.
STEP BY STEP
1. Start the Scheduled Tasks tool. (Select Start ➪ Settings ➪ Control Panel, and
then double-click Scheduled Tasks.)
2. In the Scheduled Tasks folder, double-click the Add Scheduled Task icon.
3. The Scheduled Task Wizard starts. Click Next.
4. The wizard prompts you to select the program you want to schedule, as shown in
Figure 5-49. Several applications are listed, and if you don’t find the program you
want, you can click Browse to locate the desired program or file on your com-
puter or the network.
If you selected a program from the list, click Next.
Or, if you browsed for and selected a file or program, click Open.
4701-1 ch05.f.qc 4/24/00 09:11 Page 257
5. Enter a name for this task, and select how often you want the task to be performed.
Figure 5-50 shows this screen after a task and frequency have been selected.
Click Next.
6. Depending on the frequency you selected in Step 5, an additional screen may be
displayed prompting you to enter specific scheduling information, including days,
dates, time, and so on. Configure this screen to meet your needs and click Next.
7. Enter a user name and password that Windows 2000 will use to run this task.
Ensure that the user name you enter has the necessary rights and permissions to
perform this task, especially if the task needs to access data on another com-
puter on your network. Confirm the password, and click Next.
CROSS-REFERENCE
For more information on permissions and user rights, see Chapters 8, 9,
and 12. Active Directory security is covered in Chapter 8. User rights are
covered in Chapter 9. File and folder security is covered in depth in
Chapter 12.
8. To configure advanced settings for this task, select the check box next to “Open
advanced properties for this task when I click Finish.” Click Finish.
Or, if you don’t want to configure advanced settings at this time, click Finish, and
skip the remaining steps listed here. (You can set advanced settings later by right-
clicking the task’s icon in Scheduled Tasks, and then selecting Properties from
the menu that appears.)
9. Four tabs are displayed in which you can configure advanced settings: Task,
Schedule, Settings, and Security.
On the Task tab, you can configure command-line switches, specify the
appropriate folder to start the task in, and specify a user name and password
for the task. You can also temporarily disable a task by clearing the check
box next to Enabled.
On the Schedule tab, you can configure specific scheduling information for
the task and create additional schedules for this task.
On the Settings tab, you can configure various advanced settings, includ-
ing idle time and Power Management options. For example, you can config-
ure Windows 2000 to start the task only if the computer has been idle for a
specified number of minutes, or to not start the task if the computer is run-
ning on battery power.
On the Security Tab, you can configure security permissions so that other
users can run the task.
When you’ve finished configuring advanced settings, click OK.
After you’ve added a task to the Scheduled Tasks folder you may
want to delete the task or to change its configuration settings.To delete a
task, right-click the task’s icon in the Scheduled Tasks folder and select
Delete from the menu that appears. To change a task’s configuration set-
tings, double-click the task’s icon in the Scheduled Tasks folder and
make the necessary changes in the task’s dialog box.
4701-1 ch05.f.qc 4/24/00 09:11 Page 259
The scheduled task starts, but You may need to add command-line switches or
does not complete correctly. options to the Run text box on the Task tab in the
Scheduled Tasks tool, or you may need to modify
or correct the existing path in this text box.
Or, you may need to configure the task to log on
by using a different user account that has the
necessary rights and permissions to perform
the task.
A task scheduled by using the You may need to add command-line switches or
at command starts, but does options to the Run text box on the Task tab in the
not complete correctly. Scheduled Tasks tool, or you may need to modify
or correct the existing path in this text box.
Or, because you cannot specify a user account
with the at command, you may need to use the
Task tab in the Scheduled Tasks tool to configure
the task to log on by using a user account that has
the necessary rights and permissions to perform
the task.
Or, if you schedule several tasks using the at
command, you may need to configure the Schedule
service to log on using a user account instead of
logging on using a system account. This process
is explained in Chapter 15.
The scheduled task starts, but Verify the task’s schedule on the Schedule tab.
not at the time you expected it
to start.
The scheduled task does Ensure that the task is enabled on the Task tab.
not start.
No scheduled tasks run on Ensure that the Schedule service is running on your
your computer. computer. Configuring services is explained in detail
in Chapter 15.
Windows 2000 defines several sound events, such as Default Beep, Exit
Windows, New Mail Notification, Incoming Fax, Low Battery Alarm, and
so on. On the Sounds tab you can select a sound scheme that Windows
2000 will use when sound events occur.You can also modify the selected
sound scheme by changing the default sounds that are assigned to sound
events, and you can replace an individual sound within a sound scheme
with another sound that you have recorded.You can also select No Sounds
for your sound scheme if you don’t want Windows 2000 to use sounds. On
this tab you can also configure sound volume and whether or not a volume
control (speaker) icon is displayed in your taskbar.
On the Audio tab you can set the preferred device to use for sound
playback, sound recording, and MIDI music playback.You can also set the
4701-1 ch05.f.qc 4/24/00 09:11 Page 261
volume and configure advanced settings for each of these devices. So, if
you have multiple sound devices in your computer, you can select which
device Windows 2000 will use for each sound activity.
On the Hardware tab you can view and configure the properties of
sound and multimedia devices that are installed in your computer, and
troubleshoot these devices.
If you highlight a device on the Hardware tab and then click Trouble-
shoot, Windows 2000 starts a Troubleshooter specific to the highlighted
device. This Troubleshooter takes you through a series of questions and
steps to help you identify and resolve various sound and multimedia device
problems. Follow the instructions presented on-screen to resolve the par-
ticular problem you’re experiencing.
Other resources you can also use to troubleshoot sound and multimedia
devices include the Add/Remove Hardware application, Device Manager,
and System Information. Add/Remove Hardware was discussed earlier in
this chapter, and I’ll cover Device Manager and System Information later
in this chapter.
System
The System application is a robust tool that enables you to view system
information and configure environment settings, including network iden-
tification, hardware, user profiles, and advanced settings. Although all users
can start the System application and use it to view system properties, you
must be a member of the Administrators group to use the System applica-
tion to change system settings.
To start the System application, double-click the System icon in
Control Panel. Or, you can right-click My Computer on the desktop, and
then select Properties from the menu that appears. Figure 5-52 shows the
System Properties dialog box.
Notice in Figure 5-52 that there are five tabs in this dialog box: General,
Network Identification, Hardware, User Profiles, and Advanced.
The General tab in the System Properties dialog box, which is shown in
Figure 5-52, displays various system information, including the operating
system and version number, the registered owner of the operating system,
and information about the computer.
4701-1 ch05.f.qc 4/24/00 09:11 Page 262
you must disconnect all mapped drives (from the computer you’re changing) to
domain controllers in that domain.
CAUTION
Because Windows 2000 requires you to reboot the computer after mak-
ing identification changes, you should perform this task only when you
can shut down and restart the computer.
STEP BY STEP
To change the computer’s name, type over the name that is highlighted in the
“Computer name” text box with a new computer name. For backwards compatibil-
ity with NetBIOS, you should typically limit a computer name to 15 characters in
length, with no special characters or spaces.
To change the computer’s workgroup/domain membership, select the appropriate
option button, and type in the name of the workgroup or domain you want to
make this computer a member of. You must know the name of the workgroup or
domain — browsing is not supported in this dialog box.
When you’re finished making configuration changes, click OK.
5. If you changed the computer’s domain membership in Step 4, or changed the
name of a computer that belongs to a domain, a Domain Username and
Password dialog box appears. Enter the name and password of a user account
that has permission to join the domain, rename this computer in the domain, or
both (this is usually the name and password of an administrator). Click OK.
6. If you changed the computer’s workgroup or domain membership in Step 4, a
Network Identification dialog box appears, welcoming you to the workgroup or
domain. Click OK.
7. A Network Identification dialog box appears, stating that you must reboot your
computer for the changes to take effect. Click OK. The changes you made will
take effect the next time you restart the computer.
4701-1 ch05.f.qc 4/24/00 09:11 Page 265
Notice that on the Hardware tab you can start the Hardware Wizard, man-
age driver signing, start Device Manager, and configure hardware profiles.
Clicking the Hardware Wizard command button starts the Add/
Remove Hardware Wizard, which was covered earlier in this chapter.This
wizard enables you to add, remove, unplug, and troubleshoot hardware in
your computer.
Notice that there are three file signature verification options in the
Driver Signing Options dialog box:
■ Ignore: Selecting this option causes Windows 2000 to install all
files, whether or not they have been digitally signed. Because all
files, signed and unsigned, are installed when this option is selected,
4701-1 ch05.f.qc 4/24/00 09:11 Page 267
TIP
The Dllcache folder is hidden from normal view in Windows Explorer.
4701-1 ch05.f.qc 4/24/00 09:11 Page 268
To use the Sfc.exe utility, first start a command prompt (select Start ➪
Programs ➪ Accessories ➪ Command Prompt). Then type sfc and press
Enter to display a list of this utility’s command-line switches. Finally, type
sfc followed by the appropriate command-line switches, and press Enter.
Depending on the switches you select, it can take several minutes to an
hour or more for this utility to run.
Keyboard
Mouse
Multimedia devices
Printers
4701-1 ch05.f.qc 4/24/00 09:11 Page 269
Scanners
Smart card readers
USB devices
EXAM TIP
Because many of the Professional and Server exam objectives deal with
configuring and troubleshooting hardware devices, and because Device
Manager is one of the primary tools used for these tasks, I urge you to
read the next several sections carefully and practice using this tool.
In the following sections, I’ll show you how to use Device Manager to
perform several types of tasks, such as viewing and changing the configu-
ration of hardware devices; configuring and managing card services; unin-
stalling, disabling, enabling, and updating device drivers; and upgrading
from a single processor to multiple processors. I’ll also explain how to use
Device Manager to troubleshoot hardware devices.
Figure 5-58 shows the Device Manager dialog box. Notice that a graph-
ical list of devices installed in a laptop computer is displayed.
STEP BY STEP
1. Start Device Manager. (Select Start ➪ Settings ➪ Control Panel, then double-click
System. Click the Hardware tab. Click Device Manager.)
2. In the Device Manager dialog box, click the + next to the type of device you want
more detailed information on.
3. A list of the specific devices installed is displayed under the device type heading.
Right-click the specific device you want detailed configuration information on, and
select Properties from the menu that appears.
4. The device’s Properties dialog box appears. Within the Properties dialog box,
there are several tabs, which vary depending on the device. Click the Resources
tab to view the resources currently being used by the device. Figure 5-59 shows
the Resources tab for the built-in infrared device in a laptop computer.
Notice in Figure 5-59 that the I/O range and interrupt request used by the built-in
infrared device are displayed in the “Resource settings” box. Also notice the
“Conflicting device list” box at the bottom of the dialog box, and notice that no
conflicts are listed for this particular device.
TIP
If the device you are viewing the properties of conflicts with another
device in your computer, is not currently enabled, or can’t find enough
free resources that it can use, when you click the Resources tab you may
need to click Set Configuration Manually to view the resource settings.
The Set Configuration Manually button is only displayed when Windows
2000 is unable to automatically configure a device.
5. If you want to change the resources used by this device (because of a conflict or
for any other reason), you can accomplish this by selecting one of the Basic con-
figuration options in the “Settings based on” drop-down list box. Unless the
device is Plug and Play, you’ll need to know what settings are configured (by
jumpers or switches) on the hardware device in order to select the correct config-
uration. Each of the Basic configuration options, when selected, will display a dif-
ferent combination of resources used in the “Resource settings” box, and may
cause conflicts to appear in the “Conflicting device list” box.
First, ensure that the check box next to “Use automatic settings” is cleared. Then
select each of the Basic configuration options, one at a time, until you find one
that displays the correct settings in the “Resource settings” box.
TIP
Windows 2000 permits you to change the resource settings of many, but
not all, devices.
When you find the correct setting, no conflicts should be listed in the “Conflicting
device list” box. If conflicts are listed, you must resolve them, either by physically
changing the hardware settings on the device you are adding, or by using Device
Manager to change the resource settings on the conflicting device. Click OK.
If you are unable to find a Basic configuration option that matches your hardware
configuration, select the Basic configuration option that most closely matches
your hardware configuration. Then highlight the specific resource type in the
“Resource settings” box that does not match your hardware configuration, clear
the check box next to “Use automatic settings” if it is checked, and click Change
Setting. If the “Use automatic settings” check box is grayed out, you won’t be
able to manually change individual settings, but you may still be able to select
from among the Basic configuration options. Follow the instructions presented
on-screen to make the setting match your hardware configuration. Click OK.
4701-1 ch05.f.qc 4/24/00 09:12 Page 272
6. Windows 2000 prompts you to restart your computer so that the configuration
changes you’ve made can take effect. Click Yes.
Configuring and Managing Card Services Card services is a term used to refer
to the device drivers used by CardBus/PCMCIA controllers.These device
drivers make it possible for a laptop/mobile computer to recognize and
enable the built-in CardBus/PCMCIA slot(s) in the computer. Card services
doesn’t include the device drivers associated with the specific PC Cards
themselves (such as network adapter cards or fax modem cards), but only
includes the device drivers associated with the CardBus/PCMCIA slots.
If your laptop computer is listed in the System/Mobile Uniprocessor
section of the Windows 2000 Hardware Compatibility List (HCL),
Windows 2000 should automatically detect and install the device drivers
for your computer’s CardBus/PCMCIA slot(s).
When Windows 2000 automatically detects and installs a
CardBus/PCMCIA slot, this slot is displayed as a device under the “PCM-
CIA adapters” heading in Device Manager. Most laptop computers have
two devices listed under this device type heading, one for each of the two
slots in the computer. Figure 5-60 shows the Device Manager dialog box
with PCMCIA adapters expanded. Notice that there are two CardBus
controllers installed.
If Windows 2000 does not automatically detect your computer’s
CardBus/PCMCIA slot(s), contact the manufacturer of your computer to
obtain the latest Windows 2000-compatible drivers, and then use the
Add/Remove Hardware Wizard (discussed earlier in this chapter) to install
the CardBus/PCMCIA card slot(s).
If you need to view or change the resource settings used by a
CardBus/PCMCIA card slot (and its associated drivers), you can use the
steps titled “Using Device Manager to view and change device configura-
tion” in the previous section.
STEP BY STEP
1. Start Device Manager. (Select Start ➪ Settings ➪ Control Panel, and then double-
click System. Click the Hardware tab. Click Device Manager.)
2. In the Device Manager dialog box, click the + next to the type of device for which
you want to uninstall, disable, or enable device drivers.
3. Right-click the specific device for which you want to disable device drivers, and
select Uninstall, Disable, or Enable from the menu that appears.
TIP
Disable only appears in the menu if the device is enabled. Similarly,
Enable only appears in the menu if the device is disabled.
4. Windows 2000 may display a warning message or dialog box, depending on the
type of device driver action you specified. Click OK or Yes, as appropriate.
5. If prompted by Windows 2000, click Yes to restart your computer so that the con-
figuration changes you’ve made can take effect.
You can also use Device Manager to update device drivers.You might
want to update the device driver for a modem, for example, when the
modem’s manufacturer releases an updated driver that provides additional
uses or stability for the device (or, in some cases, just makes the thing
work).
Updated device drivers are usually obtained by downloading them from
a third-party manufacturer’s Web site. Updating device drivers is also
referred to as upgrading device drivers. I’ll show you how to update device
drivers in the steps that follow.
STEP BY STEP
1. Start Device Manager. (Select Start ➪ Settings ➪ Control Panel, and then double-
click System. Click the Hardware tab. Click Device Manager.)
2. In the Device Manager dialog box, click the + next to the type of device for which
you want to update device drivers.
4701-1 ch05.f.qc 4/24/00 09:12 Page 275
3. Right-click the specific device for which you want to update device drivers, and
select Properties from the menu that appears.
4. In the device’s Properties dialog box, click the Driver tab.
5. On the Driver tab, click Update Driver.
6. The Upgrade Device Driver Wizard starts. Click Next.
7. On the Install Hardware Device Drivers screen, you can either instruct Windows
2000 to search for a suitable driver for the device, or to display a list of known
device drivers for this device so you can choose a specific driver.
The recommended option is “Search for a suitable driver for my device.” Select
the appropriate option and click Next.
If you select the “Display a list of the known drivers for this device . . .” option and
click Next, follow the instructions presented on-screen to manually select and
install the updated device driver.
8. If you selected the “Search for a suitable driver for my device” option in Step 7,
the Locate Driver Files screen appears, as shown in Figure 5-61. Notice that you
can specify one or more specific locations for Windows 2000 to search for
device driver files.
Select the appropriate search locations for driver files for the device. Click Next.
9. The Driver Files Search Results screen appears, as shown in Figure 5-62.
4701-1 ch05.f.qc 4/24/00 09:12 Page 276
STEP BY STEP
1. Start Device Manager. (Select Start ➪ Settings ➪ Control Panel, and then double-
click System. Click the Hardware tab. Click Device Manager.)
2. In the Device Manager dialog box, click the + next to Computer. (This is usually
the first or second device type listed under the computer’s name.)
3. Right-click the device listed under Computer. (This may be called Standard PC,
ACPI Uniprocessor PC, MPS Uniprocessor PC, or a brand-specific name.)
Select Properties from the menu that appears.
4. In the device’s Properties dialog box, click the Driver tab.
5. On the Driver tab, click Update Driver.
6. The Upgrade Device Driver Wizard starts. Click Next.
7. Select “Display a list of the known drivers for this device so that I can choose a
specific driver.” Click Next.
8. On the Select a Device Driver screen, select the “Show all hardware of this
device class” option.
Then select the manufacturer and multiprocessor model of your computer in the
appropriate boxes on this screen. Figure 5-63 shows a manufacturer and multi-
processor model selected. Click Next.
If your manufacturer and model don’t appear on this screen and you have a disk
containing the appropriate drivers, click Have Disk and follow the instructions pre-
sented on-screen.
4701-1 ch05.f.qc 4/24/00 09:12 Page 278
9. In the Start Device Driver Installation screen, click Next to install the new device
driver.
10. In the Completing the Upgrade Device Driver Wizard screen, click Finish.
11. Click Close in your computer’s Properties dialog box.
12. Click Yes when Windows 2000 prompts you to restart your computer.
STEP BY STEP
1. Start the System application. (Select Start ➪ Settings ➪ Control Panel, and then
double-click System.)
2. In the System Properties dialog box, click the Hardware tab.
3. On the Hardware tab, click Hardware Profiles.
4. In the Hardware Profiles dialog box, ensure that the profile you want to use to cre-
ate a new profile is highlighted. Click Copy.
5. In the Copy Profile dialog box, type in a name for the new profile, such as
Undocked, or accept the default name displayed. Click OK.
6. Now, to configure the new hardware profile, click Properties in the Hardware
Profiles dialog box.
7. The new profile’s Properties dialog box appears, as shown in Figure 5-65.
If this profile is for a laptop computer, select the check box next to “This is a
portable computer” and select one of the three possible docking options. If you
want this hardware profile to be displayed as an option when Windows 2000
starts, select the check box next to “Always include this profile as an option when
Windows starts.” Click OK.
4701-1 ch05.f.qc 4/24/00 09:12 Page 281
At this point, it’s often a good idea to rename Profile 1 with a more
intuitive name for the user, such as “Docked.” To rename a profile, high-
light the profile in the Hardware Profiles dialog box, then click Rename.
Type a new name for the hardware profile in the Rename Profile dialog
box, then click OK.
Another configuration you might want to make now is to set the default
hardware profile. In the Hardware Profiles dialog box, the default hardware
profile is the profile at the top of the list in the “Available hardware profiles”
box. If the hardware profile used most often is not at the top of the list, you
can configure it to be the default profile by moving it to the top of the list.
To move a profile within the list of available hardware profiles, highlight
the profile you want to move, then click the up arrow or down arrow
command button to move it up or down in the list.
When more than one hardware profile is configured on a computer,
Windows 2000 displays these hardware profiles during the boot process
and permits you to manually select the profile you want to use. In the
Hardware Profiles dialog box you can configure Windows 2000 to either
wait until you manually select a hardware profile or automatically start the
4701-1 ch05.f.qc 4/24/00 09:12 Page 282
STEP BY STEP
1. Start your Windows 2000 computer. During the boot process, select the hard-
ware profile for which you want to enable or disable devices.
2. Start the System application. (Select Start ➪ Settings ➪ Control Panel, and then
double-click System.)
3. In the System Properties dialog box, click the Hardware tab.
4. On the Hardware tab, click Device Manager.
5. In Device Manager, click the + next to the type of device you want to enable or
disable within this hardware profile.
6. Right-click the specific device you want to enable or disable within this hardware
profile. From the menu that appears, select Properties.
7. In the device’s Properties dialog box, select the appropriate usage for this device
in the “Device usage” drop-down list box. The possible configuration settings are:
Use this device (enable)
Do not use this device in the current hardware profile (disable)
Do not use this device in any hardware profiles (disable)
If you are configuring a hardware profile for a laptop computer in its undocked
state, you would typically select “Do not use this device in the current hardware
profile (disable)” to disable a device, such as a network adapter card, that is not
available when a laptop computer is not docked.
Select the appropriate device usage option. Click OK.
4701-1 ch05.f.qc 4/24/00 09:12 Page 283
STEP BY STEP
1. Start Services. (Right-click My Computer, then select Manage from the menu that
appears. In the Computer Management dialog box, click the + next to Services
and Applications, then click Services.)
2. In the right pane of the window, right-click the specific service you want to enable
or disable within a hardware profile, and then select Properties from the menu
that appears.
3. In the service’s Properties dialog box, click the Log On tab.
4. On the Log On tab, click the hardware profile you want to enable or disable this
service in. Then click Enable or Disable, as appropriate. Click OK.
5. Exit Computer Management.
TIP
If you enabled or disabled a service in the hardware profile you’re cur-
rently using, you’ll need to restart your computer before these changes
will take effect.
CROSS-REFERENCE
I’ll explain how to work with user profiles in depth in Chapter 9.
There are two options in the “Application response” section that enable
you to choose how Windows 2000 allocates processor time between pro-
grams running on your computer:
■ Applications: Selecting this option causes Windows 2000 to
assign a higher priority (in terms of processor time allocated)
to the application running in the foreground than to all other
programs.This feature is often selected for desktop computers to
promote smoother, faster response to user input in the active appli-
cation.This setting is selected by default on Windows 2000
Professional computers (but is not the default on Windows 2000
Server or Advanced Server computers).
■ Background services: Selecting this option causes Windows
2000 to assign equal priority to all programs.When this option is
selected, the foreground application has the same priority as a pro-
gram running in the background.This option is generally the most
appropriate setting for servers, which don’t normally have an inter-
active user.This setting is selected by default on Windows 2000
Server and Advanced Server computers.
You can also configure virtual memory in the Performance Options
dialog box. Virtual memory, you may recall, is the physical space on a hard
disk that Windows 2000 treats as though it were RAM.Virtual memory is
implemented in Windows 2000 by the use of paging files.
4701-1 ch05.f.qc 4/24/00 09:12 Page 286
You should consider both paging file performance and system recover-
ability when configuring virtual memory paging files.
If you want to configure your computer for maximum paging file per-
formance, consider doing one or more of the following:
■ Place the paging file on any hard disk in your computer that does
not contain the Windows 2000 boot partition.
■ Place the paging file on the hard disk in your computer that has
the least amount of activity.
■ Place a small paging file on each hard disk in your computer,
except on the disk that contains the Windows 2000 boot partition.
■ Place the paging file on a striped volume.
CAUTION
It’s not normally a good idea to place the paging file on a RAID-5 volume
created by using Disk Management. If you do, you’ll improve perfor-
mance of the paging file, but you’ll decrease performance of the com-
puter’s processor because of the amount of processor time required to
compute the RAID-5 parity information.
CAUTION
When you modify your computer’s current paging file, Windows 2000
requires you to shut down and restart your computer.
4701-1 ch05.f.qc 4/24/00 09:12 Page 287
STEP BY STEP
1. Start the System application. (Select Start ➪ Settings ➪ Control Panel, and then
double-click System.)
2. In the System Properties dialog box, click the Advanced tab.
3. On the Advanced tab, click Performance Options.
4. In the Performance Options dialog box, click Change.
5. The Virtual Memory dialog box appears, as shown in Figure 5-68. Notice that all
logical drives are listed in the Drive list box, regardless of whether or not a paging
file exists on the drive.
To create an additional paging file, in the Drive list box, highlight the logical
drive on which you want to create the paging file. Then, configure the initial size
and maximum size you want the new paging file to be. Then click Set.
4701-1 ch05.f.qc 4/24/00 09:12 Page 288
TIP
To avoid fragmentation of your paging file, configure the file’s initial size
and maximum size with the same values. The total combined size of all of
your paging files should be at least as large as the recommended size
displayed in the Virtual Memory dialog box.
To move a paging file to another disk, first, create a new paging file on the
target disk. Then configure the initial size and maximum size of the original paging
file to zero, and click Set. (This deletes the original paging file.)
6. In the Virtual Memory dialog box, click OK.
7. If you have modified the current paging file, Windows 2000 notifies you that you
must restart your computer before the changes you made will take effect. Click OK.
8. In the Performance Options dialog box, click OK.
9. In the System Properties dialog box, click OK.
10. If you modified the current paging file, Windows 2000 prompts you to restart your
computer now. Click Yes.
There’s one other important configuration you can make in the Virtual
Memory dialog box (shown in Figure 5-68).You can configure the maxi-
mum size, in MB, that Windows 2000 will allocate to the operating sys-
tem’s Registry database. By default,Windows 2000 allocates enough space
to accommodate even the largest anticipated Registry. However, each pro-
gram that you install on your computer requires space in the Registry. If
your current Registry size is approaching the maximum Registry size set-
ting, you might want to manually increase the maximum Registry size in
the Virtual Memory dialog box.
specific user. System environment variables apply to all users and to the oper-
ating system.
In my experience, administrators don’t often have to change environ-
ment variables. However, occasionally a legacy application may require you
to manually change one or more environment variables.
To change a user environment variable, you must be logged on as the user
whose variable you want to modify.To modify a system environment vari-
able, you must be logged on as a user with Administrator rights. The next
section explains the steps involved in configuring environment variables.
STEP BY STEP
1. Start the System application. (Select Start ➪ Settings ➪ Control Panel, and then
double-click System.)
2. In the System Properties dialog box, click the Advanced tab.
3. On the Advanced tab, click Environment Variables.
4. The Environment Variables dialog box appears, as shown in Figure 5-69. Notice
the “User variables for Administrator” and “System variables” list boxes.
TIP
If you want Windows 2000 to write debugging information when the sys-
tem crashes, remember that you must have a paging file on the boot par-
tition that is at least as large as the amount of RAM in the computer, plus
1MB, in order for Windows 2000 to create a memory dump file.
■ Dump File: This text box is used to specify the name and loca-
tion of the file that Windows 2000 will use as a dump file in the
event of a system crash. By default, the file is named Memory.dmp
and is located in the folder Windows 2000 is installed in.
■ Overwrite any existing file: When this check box is selected
(and it is selected by default),Windows 2000 overwrites any previ-
ously existing dump file when a Stop error occurs. If this check
box is cleared and a dump file exists,Windows 2000 will not write
a new dump file in the event of a system crash.
TIP
If you experience recurrent system crashes, the Memory.dmp file may
be needed when you contact Microsoft Technical Support. Microsoft
Technical Support personnel can use a debugger on your Memory.dmp
file to identify the cause of your system crashes.
4701-1 ch05.f.qc 4/24/00 09:12 Page 293
CROSS-REFERENCE
I’ll cover how to use this application when I discuss managing users and
groups in Chapter 9.
Wireless Link
The Wireless Link application enables you to configure the infrared
device(s) installed in a Windows 2000 computer, including how files and
images are transferred to this computer.The Wireless Link application does
not enable you to configure infrared devices located in other hardware
devices.
An infrared device, which is also called a wireless device, is a port in a
computer or other piece of hardware (such as a printer, camera, scanner,
digital camera, and so on) that is capable of sending and receiving data,
images, or both by using infrared light. Standards for infrared/wireless
devices are maintained by the Infrared Data Association (IrDA). Because of
this, infrared devices are also called IrDA devices.
Infrared devices are commonly used to transfer data between two laptop
computers, transfer data between a laptop computer and a personal digital
assistant (PDA), send print jobs from a laptop computer to a printer, or to
transfer images from a digital camera to a laptop computer.
Although all users can start and use the Wireless Link application, you
must be a member of the Administrators group to use this application to
change hardware settings.
To access the Wireless Link application, double-click the Wireless Link
icon in Control Panel.
4701-1 ch05.f.qc 4/24/00 09:12 Page 294
TIP
The Wireless Link icon appears in Control Panel only if an infrared device
is installed in the computer.
Notice in Figure 5-71 that there are three tabs in this dialog box: File
Transfer, Image Transfer, and Hardware.
On the File Transfer tab, you can configure how files are received by the
infrared device(s) installed in your computer.You can cause an icon to be
displayed in the taskbar when the infrared device is in use. You can also
configure your computer to accept (or reject) files sent to your infrared
device(s). You can configure Windows 2000 to display file transfer status
during file transfers. Finally, you can specify the default location where
Windows 2000 will save files received through the infrared device(s) on
your computer.
On the Image Transfer tab you can enable your computer to accept
images transferred from a digital camera over a wireless link.You can also
specify the folder in which Windows 2000 will store these digital images,
and whether or not Windows 2000 will automatically open Windows
Explorer to the specified folder after receiving the images.
4701-1 ch05.f.qc 4/24/00 09:12 Page 295
TIP
You can’t initiate the transfer of images from a digital camera to your
computer by using the Wireless Link application — you should either initi-
ate the transfer from the camera, or install and configure the camera on
your computer and then use the Imaging application to transfer images.
On the Hardware tab you can view and configure the properties of the
infrared device(s) that are installed in your computer.The Properties dialog
boxes that you can access here are the same as those you can access by
using Device Manager, which was covered earlier in this chapter. If you are
having problems with an infrared device in your computer, you can click
Troubleshoot on the Hardware tab to start the Hardware Troubleshooter.
Troubleshooting Hardware
Troubleshooting hardware is a common task for network administrators. It
is also a strong focus of the Professional and Server exams. In this section,
I’ll discuss some tips and tools for troubleshooting hardware on Windows
2000 computers.
There are numerous hardware devices, which, when installed in a
Windows 2000 computer, may require troubleshooting. Some of these
devices include:
■ Display devices/video adapters
■ Input/output (I/O) devices, such as: cameras; keyboard; modems,
including fax modems; the mouse, multimedia devices, printers,
scanners, and smart card readers
■ Mobile computer hardware
■ Network adapter cards
When troubleshooting a specific device (such as a mouse), you can often use
its associated application (in this case, Mouse) to view and configure device
properties, update drivers, and start a device-specific Troubleshooter.
TIP
Once you’ve displayed information using one of the System Information
components, you may want to print it. To print the information displayed,
right-click anywhere in the right pane, and select Print from the menu that
appears.
Also notice in Figure 5-75 that I’ve highlighted the Serial suboption
under Ports. Clicking an option or suboption in the left pane causes the
details for the option or suboption to be displayed in the right pane.
The Software Environment component displays detailed information
about the software loaded in computer memory.You can use this compo-
nent to determine whether a driver or process is running, and to view ver-
sion information. Figure 5-76 shows the options available within the
Software Environment component. Notice that the Drivers option is high-
lighted, and that various driver information, including the driver name,
description, type, and state, is shown in the right pane of the window.
The Internet Explorer 5 component displays various information about
the Internet Explorer 5 installation on this computer, including version
4701-1 ch05.f.qc 4/24/00 09:12 Page 301
and build number, a list of files and their version numbers, Internet con-
nectivity settings, cache information, content settings and certificates, and
security configuration information.
■ Try replacing the device with a known good device of the same
exact type.
■ Verify that the device in question is on the Windows 2000
Hardware Compatibility List.
This chapter explored numerous Control Panel topics. Many of the Control Panel
applications are self-explanatory, but a few deserve some final emphasis before I
leave this chapter.
■ Control Panel is an exhaustive collection of applications. These applications,
which are automatically installed during installation of Windows 2000, are
used to install,configure, or both install and configure various components,
applications, hardware, protocols, and services.
■ Add/Remove Hardware is an important application because it is used to add,
remove, unplug, and troubleshoot the hardware devices in your computer.
■ The Display application is used to configure desktop settings, display settings,
and multiple-display support.
■ The Folder Options application is particularly useful for configuring offline files.
■ The Power Options application is used to configure power schemes, hiberna-
tion, Advanced Power Management (APM), and UPS devices.
■ The Regional Options application is useful for configuring local settings, and
for configuring support for multiple languages and locations.
■ The System application is used to perform numerous tasks, including changing
network identification, managing driver signing, and creating and managing
hardware profiles. The System application also includes Device Manager, a
powerful tool for configuring and troubleshooting hardware devices.
■ Numerous tools for troubleshooting hardware are covered in this chapter, such
as the Add/Remove Hardware application, Device Manager, Troubleshooters,
and System Information.
4701-1 ch05.f.qc 4/24/00 09:12 Page 303
303
STUDY GUIDE
This section contains several exercises that are designed to cement your
knowledge of Control Panel topics and help you prepare for the
Professional and Server exams:
■ Assessment questions: These questions test your knowledge of
the Control Panel features and topics covered in this chapter.You
can find the answers to these questions at the end of this chapter.
■ Scenario: The situation-based questions in a scenario challenge you
to apply your understanding of the material to solve a hypothetical
problem. In this chapter’s scenario, you are asked to describe the
action you would take to solve a number of troubleshooting prob-
lems.You don’t need to be at a computer to do the scenario.Answers
to this chapter’s scenario are presented at the end of this chapter.
■ Labs: These exercises are hands-on practice activities that you per-
form on a Windows 2000 computer.The labs in this chapter give
you an opportunity to use the Add/Remove Hardware application,
to use Device Manager, and to explore several different Control
Panel applications.
Assessment Questions
1. You want to install the device drivers for a new infrared device in
your Windows 2000 computer.Which tool should you use?
A. Wireless Link
B. Device Manager
C. Scanners and Cameras
D. Add/Remove Hardware
2. You want to configure multiple language support on your Windows
2000 computer.Which tool should you use?
A. Fonts
B. Keyboard
C. Regional Options
D. Add/Remove Programs
4701-1 ch05.f.qc 4/24/00 09:12 Page 304
304
3. Which Windows 2000 tool can you use to initiate the transfer of
images from a digital camera to your Windows 2000 computer?
A. Imaging
B. Wireless Link
C. Scanners and Cameras
D. Sounds and Multimedia
4. Which tool should you use to manage driver signing on a Windows
2000 computer?
A. System
B. Folder Options
C. Licensing
D. Add/Remove Programs
5. Which of the following features is supported on Windows 2000
Professional computers but is not supported on Windows 2000 Server
computers?
A. Wireless devices
B. Multiple displays
C. Advanced Power Management (APM)
D. Uninterruptible power supplies (UPSs)
6. You want to change the workgroup membership of a Windows 2000
Professional computer.Which tool should you use?
A. System
B. Regional Options
C. System Information
D. Network and Dial-up Connections
7. You want to create and configure a hardware profile on your
Windows 2000 computer.Which tool should you use?
A. System
B. Device Manager
C. Add/Remove Programs
D. Add/Remove Hardware
8. You want to configure synchronization settings for your offline files.
Which tool should you use?
4701-1 ch05.f.qc 4/24/00 09:12 Page 305
305
A. Folder Options
B. Scheduled Tasks
C. Windows Explorer
D. System Information
9. You want to add an additional paging file to your Windows 2000
Server computer.Which tool should you use?
A. System
B. Folder Options
C. Windows Explorer
D. Add/Remove Programs
10. Which of the following tools are useful for troubleshooting hardware
devices on a Windows 2000 computer? (Choose all that apply.)
A. Device Manager
B. System Information
C. Add/Remove Programs
D. Add/Remove Hardware
Scenarios
The following scenarios provide you with an opportunity to apply the
knowledge you’ve gained in this chapter about troubleshooting several
Windows 2000 features that are managed by Control Panel applications.
Many times when a feature fails to perform as expected, the cause of the
failure is an underlying configuration problem. For each of the following
problems, describe the actions you would take to try to resolve the problem.
1. Yesterday you enabled the StickyKeys option (in Accessibility
Options) on a user’s Windows 2000 computer.Today the user reports
that he is unable to log on.
2. A user reports that the icons displayed on her Windows 2000 desktop
are too small to read easily.
3. A user reports that he can’t receive faxes by using the fax modem
installed in his Windows 2000 computer.
4. An employee at your office uses a Windows 2000 laptop computer
both at work and at home.The user recently configured some files for
4701-1 ch05.f.qc 4/24/00 09:12 Page 306
306
offline use.The user reports that when working at home she doesn’t
always have the most current version of the offline files.
5. A user recently scheduled several tasks on his Windows 2000 com-
puter. He reports that he is having problems with one of the sched-
uled tasks.The task starts, but does not complete correctly.
Lab Exercises
These labs are designed to provide you with hands-on experience using
many of the applications and tools in Control Panel. From installing and
configuring all the way to troubleshooting, these labs cover it all.
The purpose of this lab is to give you practical experience using the
Add/Remove Hardware application. As stated previously, you use this
application to add, remove, unplug, and troubleshoot the hardware in your
computer, including display devices/video adapters; DVD and CD-ROM
devices; input/output (I/O) devices, such as cameras, keyboard, modems
(including fax modems), the mouse, multimedia devices, printers, scanners,
smart card readers, USB devices, and wireless devices such as infrared
(IrDA) devices; mobile computer hardware such as PC Card devices; and
network adapter cards.
In this lab, you’ll install, configure, and remove a non–Plug and Play
infrared device in your computer. Use these same basic steps no matter which of
the devices listed above you want to install, configure, or remove.
TIP
I don’t expect you to go out and buy any hardware to do this lab. You’ll be
installing device drivers for a nonexistent piece of hardware, and later you’ll
remove the device drivers to return your computer to its normal state.
4701-1 ch05.f.qc 4/24/00 09:12 Page 307
307
The steps that follow walk you through using Add/Remove Hardware
on a Windows 2000 Professional computer.The steps for using this appli-
cation on a Windows 2000 Server computer are identical.
1. Boot your computer to Windows 2000 Professional. Log on as
Administrator.
2. Select Start ➪ Settings ➪ Control Panel.
3. In the Control Panel dialog box, double-click Add/Remove
Hardware.
4. The Add/Remove Hardware Wizard starts. Click Next.
5. The Choose a Hardware Task screen appears. Select the
“Add/Troubleshoot a device” option. Click Next.
6. Windows 2000 attempts to detect the new hardware device.The
Choose a Hardware Device screen appears. Click “Add a new device”
in the Devices list box. Click Next.
7. The Find New Hardware screen appears. Select the “No, I want to
select the hardware from a list” option. Click Next.
8. The Hardware Type screen appears. Click “Infrared devices.”
You’re installing, configuring, and removing an infrared (IrDA) device
in this lab, but use these same basic steps to install, configure (when
appropriate), and remove any hardware device in your computer,
including a display device/video adapter; a DVD or CD-ROM
device; an input/output (I/O) device, such as a camera, a keyboard, a
modem (including a fax modem), a mouse, a multimedia device, a
printer, a scanner, a smart card reader, or a USB device; mobile com-
puter hardware such as a PC Card device; or a network adapter card.
Click Next.
9. The Select Infrared Device screen appears. In the Manufacturers box,
highlight (Standard Infrared Port). In the Infrared Device box, high-
light Built-in Infrared Device. Click Next.
10. Windows 2000 displays a warning dialog box informing you that
Windows 2000 could not detect the settings of the device. Click OK.
11. A Resources tab is displayed. Examine this tab closely. Notice the
question marks in the “Resource settings” box.This means that the
device is not yet configured.
4701-1 ch05.f.qc 4/24/00 09:12 Page 308
308
In the “Setting based on” drop-down list box, select Basic configura-
tion 0001. On most computers, this causes a conflict to be displayed
in the “Conflicting device list” box.All conflicts listed in the
“Conflicting device list” box must be resolved.
In the “Setting based on” drop-down list box, select Basic configura-
tion 0005. In the “Resource settings” box, click Input/Output Range,
then click Change Setting. In the Edit Input/Output Range dialog
box, accept the defaults (if no devices are conflicting) and click OK.
In the “Resource settings” box, click Interrupt Request, then click
Change Setting. In the Edit Interrupt Request dialog box, accept the
defaults (if no devices are conflicting) and click OK.
If there are conflicting devices in either the Edit Input/Output
Range dialog box of the Edit Interrupt Request dialog box, use the
up or down arrow to the right of the Value text box to find a value
that does not cause any conflicts.Then click OK.
On the Resources tab, click OK.
12. In the Start Hardware Installation screen, click Next.
13. In the Completing the Add/Remove Hardware Wizard screen, click
Finish.
14. A System Settings Change dialog box is displayed, notifying you that
you must restart your computer before the new settings will take
effect. Click Yes to restart your computer.
15. Boot your computer to Windows 2000 Professional. Log on as
Administrator.
16. Start Control Panel (if it is not already displayed on your desktop).
Double-click Add/Remove Hardware.
17. When the Add/Remove Hardware Wizard starts, click Next.
18. In the Choose a Hardware Task screen, select the “Uninstall/Unplug a
device” option. Click Next.
19. In the Choose a Removal Task screen, select the “Uninstall a device”
option. Click Next.
20. In the Installed Devices on Your Computer screen, highlight the
Built-in Infrared Device that has a yellow circle containing an excla-
mation point as part of its icon. (This device is probably at the top of
the Devices list.) Click Next.
4701-1 ch05.f.qc 4/24/00 09:12 Page 309
309
21. In the Uninstall a Device screen, select the “Yes, I want to uninstall
this device” option. Click Next.
22. In the Completing the Add/Remove Hardware Wizard screen, click
Finish.
The purpose of this lab is to give you hands-on experience using the
System application. This application is used to perform several configura-
tion, management, and troubleshooting tasks.
This lab has three parts:
■ Part 1: Managing and Troubleshooting Driver Signing
■ Part 2: Using Device Manager
■ Part 3: Creating and Managing Hardware Profiles
The steps that follow take you through these tasks on a Windows 2000
Professional computer. The steps are identical on a Windows 2000 Server
computer.
310
311
TIP
You don’t need to have a computer with multiple processors to perform
this lab.
4701-1 ch05.f.qc 4/24/00 09:12 Page 312
312
TIP
Normally you would select one of the multiprocessor models to configure
support for multiple processing units. However, I’m assuming that you
don’t have a multiprocessor computer, but still want to experience the
basic steps in the process.
Click Next.
20. In the Start Device Driver Installation screen, click Next to install the
device driver you selected.
21. In the Completing the Upgrade Device Driver Wizard screen, click
Finish.
22. Click Close in your computer’s Properties dialog box.
23. Click Yes when Windows 2000 prompts you to restart your computer.
24. In the next several steps you configure card services on a mobile
computer. The rest of the steps in this section are optional because they
require that you have a laptop computer.
Boot your computer to Windows 2000 Professional. Log on as
Administrator.
4701-1 ch05.f.qc 4/24/00 09:12 Page 313
313
25. Start Control Panel if it is not displayed on your desktop. (From the
desktop, select Start ➪ Settings ➪ Control Panel.)
26. In the Control Panel dialog box, double-click System.
27. In the System Properties dialog box, click the Hardware tab.
28. On the Hardware tab, click Device Manager.
29. In the Device Manager dialog box, click the + next to PCMCIA
adapters. Right-click any device listed under this heading, and select
Properties from the menu that appears.
30. In the PCMCIA adapter’s Properties dialog box, view the informa-
tion displayed on the General tab, including the device type and
device status. Click the Resources tab.
31. On the Resources tab, notice the resource settings used by the PCM-
CIA adapter in your computer.
If conflicts are listed in the “Conflicting device list” box, highlight the
conflicting resource (in the “Resource settings” box) and click
Change Setting. Configure a nonconflicting setting and click OK.
Windows 2000 may not permit you to change the resource settings
used by this device — if this is the case, and if the PCMCIA adapter
conflicts with another device, you’ll probably have to change the
resource settings for the other device to resolve the conflicts.
Click OK.
32. Close Device Manager.
33. In the System Properties dialog box, click OK.
34. If you made configuration changes to your PCMCIA adapter,
Windows 2000 will prompt you to restart your computer now.
314
The objective of this lab is to give you hands-on experience using several
Control Panel applications.
This lab has eight parts:
■ Part 1: Configuring Accessibility Services
■ Part 2: Configuring Fax Support
■ Part 3: Configuring and Managing the Task Scheduler
4701-1 ch05.f.qc 4/24/00 09:13 Page 315
315
316
317
318
319
4. On the Appearance tab, try out several schemes (by selecting them,
one at a time) in the Scheme drop-down list box until you find one
you like. Click the Web tab.
5. On the Web tab, notice that you can enable Web content on your
Active Desktop. Click the Effects tab.
6. On the Effects tab, notice the many visual effects you can configure.
Click the Settings tab.
7. On the Settings tab, notice that you can set the number of colors used
and the screen area. Click Troubleshoot.
8. The Display Troubleshooter starts. Notice that this is a special
Troubleshooter just for display problems. Close Windows 2000 Help.
If you don’t have multiple display devices, click OK and stop here.
If you have multiple video adapters and multiple monitors, continue
on to Step 9.
9. If you have multiple video adapters and multiple monitors, your
Settings tab should be similar to Figure 5-77.
320
Click the icon representing your second monitor and select the check
box next to “Extend my Windows desktop onto this monitor.”Then
configure the monitor icons to match the physical arrangement of
your monitors. For example, if you have two monitors, stacked one
on top of the other, you can click and drag one monitor under the
other, so that the picture on the screen coincides with the actual
physical arrangement. Click OK.
10. If you’ve changed any display settings,Windows 2000 prompts you to
apply the new settings. Click OK.
11. In the Monitor Settings dialog box, click Yes to keep your new set-
tings. Click No if you want to revert to your original settings.
321
322
323
Assessment Questions
1. D. Add/Remove Hardware is the only Windows 2000 application
that can be used to add/install an infrared device.
2. C. Regional Options is the only Windows 2000 application that can
be used to configure support for multiple languages.
3. A. The Imaging application (Start ➪ Programs ➪ Accessories ➪
Imaging) is the only Windows 2000 application that can be used to
initiate image transfer.You can use Wireless Link to configure how
Windows 2000 will handle received image files, but you can’t use
Wireless Link to initiate the image transfer.
4. A. The System application is used to configure and manage driver
signing.
5. C. Of the four features listed, all are supported on both Windows
2000 Professional and Windows 2000 Server computers except APM.
APM is only supported on Windows 2000 Professional computers.
6. A.The System application in Control Panel is used to make network
identification changes.
7. A.The System application is used to create, configure, and manage
hardware profiles.
8. C. Use Windows Explorer to configure a synchronization schedule
for offline files. (Select Tools ➪ Synchronize to start this process.) You
can also access the same synchronization tool by selecting Start ➪
Programs ➪ Accessories ➪ Synchronize.
9. A. The System application is used to create, configure, and manage
paging files.
10. A, B, D. All of the tools listed are commonly used to troubleshoot
hardware devices except Add/Remove Programs.
Scenarios
1. The most likely cause of this problem is that the check box next
to “Apply all settings to logon desktop” on the General tab in the
Accessibility Options application is not selected. Ensure that this
check box is selected, and click OK.The user should now be able
to log on to the computer.
4701-1 ch05.f.qc 4/24/00 09:13 Page 324
324
2. There are few things you can try to fix this problem.You can try
decreasing the monitor resolution on the Settings tab in the Display
application. Or, you can try selecting a different appearance scheme
such as Windows Classic (large) or Windows Standard (extra large)
on the Appearance tab in the Display application. Finally, you can try
selecting the check box next to “Use large icons” on the Effects tab in
the Display application.
3. The most likely cause of this problem is that the computer isn’t con-
figured to receive faxes. By default,Windows 2000 computers are
configured to send faxes, but must be manually configured to receive
faxes. Configure the device to receive faxes by using the Fax Service
Management Console on the user’s computer.
4. Ensure that the user’s laptop computer is configured to synchronize
offline files both when she logs on and logs off the computer. Instruct
the user to always log off before powering off the computer for the
night.
5. You may need to add command-line switches or options to the Run
text box in the task’s Properties dialog box. Or, you may need to mod-
ify or correct the existing path in this text box. Or, you may need to
configure the task to log on by using a different user account that has
the necessary rights and permissions to perform the task.
4701-1 ch05.f.qc 4/24/00 09:13 Page 325
4701-1 ch06.f.qc 4/24/00 09:14 Page 326
Professional
EXAM Server
MATERIAL
EXAM OBJECTIVES
C HAP TE R
6
Working with File
Systems and Disks
I n this chapter I’ll introduce you to the file systems supported by Windows
2000, including FAT, FAT32, and NTFS. I’ll also cover the basics of
configuring a Windows 2000 computer’s hard disks and volumes. In this
section I’ll explain about various types of disks, partitions, and volumes, and
then discuss how to use Disk Management to perform numerous disk
management tasks on a Windows 2000 computer. I’ll provide you with
detailed steps to create several volume types, including simple volumes,
spanned volumes, striped volumes, mirrored volumes, and RAID-5 volumes.
Next, I’ll explain how to use Disk Defragmenter to analyze and defragment
volumes, and how to use Logical Drives to view logical drive properties and
change a logical drive’s label. Then I’ll present some troubleshooting tips,
and finally, I’ll explain how to recover from disk failure when using a simple,
spanned, striped, mirrored, or RAID-5 volume.
327
4701-1 ch06.f.qc 4/24/00 09:14 Page 328
Chapter Pre-Test
1. Unless you require your computer to dual boot between Windows
2000 and another operating system, what is usually the best file
system to use on a Windows 2000 computer?
2. Which is easier: converting from FAT (or FAT32) to NTFS, or
converting from NTFS to FAT (or FAT32)?
3. What is the difference between a basic disk and a dynamic disk?
4. What are the five different types of volumes that Windows 2000
supports?
5. What is the name of the Windows 2000 tool used to perform
most disk administration tasks?
4701-1 ch06.f.qc 4/24/00 09:14 Page 329
In the following sections I’ll describe each of the file systems supported
by Windows 2000 in detail. I’ll also discuss the capabilities and limitations
of each of these file systems.
FAT
The file allocation table (FAT) file system used by Windows 2000 is a modified
version of the FAT file system used by MS-DOS. FAT (sometimes called
FAT16) is the only hard disk file system supported by Windows 95
(versions prior to OSR2),Windows 3.x,Windows 3.1x, and MS-DOS. So,
if you want to configure a Windows 2000 computer to dual boot between
Windows 2000 and Windows 95 (versions prior to OSR2),Windows 3.1x,
or MS-DOS, your computer’s first partition on the first hard disk must use
the FAT file system.
4701-1 ch06.f.qc 4/24/00 09:14 Page 330
If you’re not sure whether you have an OSR2 version of Windows 95,
there’s an easy way to find out. From the Windows 95 desktop, select
Start ➪ Settings ➪ Control Panel.Then double-click the Systems application,
and examine the General tab, which lists specific information about the
system installed on your computer. If your system version is 4.00.950 or
4.00.950 a, then you have a version of Windows 95 that was released prior
to OSR2.
Now I’ll give a brief overview of the characteristics and features of the
FAT file system, including security, naming conventions, speed of access to
files, and volume size.
TIP
A volume is an area of disk space (often called a partition) on one or
more hard disks that has been formatted with a file system.
Security
The FAT file system does not support file and folder security in Windows
2000. Because file and folder security is not supported on a FAT volume,
any user who is logged on locally to a computer has full control of all of
the files and folders located in the FAT volume(s) on that computer.This
applies only to local access.
However, you can use share permissions to control users’ access to
shared folders over the network. Share permissions affect only the access of
files and folders over the network, not when someone is logged on locally.
So, if you need local file and folder security, you should use the NTFS file
system instead of the FAT file system.
Naming Conventions
The FAT file system, as used by Windows 2000, supports the use of long
filenames. Filenames can be up to 255 characters in length.
TIP
Windows 2000 supports extremely long filenames, but many applica-
tions don’t. Consider the length of filename supported by the applica-
tions you use when assigning filenames.
The FAT file system preserves uppercase and lowercase in filenames, but
filenames are not case sensitive. Because of this, I can request the file
ALAN.DOC by typing Alan.doc, ALAN.DOC, or alan.doc, and Windows
2000 always retrieves ALAN.DOC.
Volume Size
The maximum size of a FAT volume on all operating systems except
Windows 2000 and Windows NT is 2GB. Both Windows 2000 and Win-
dows NT support FAT volumes up to 4GB. This is possible because
Windows 2000 and Windows NT support a larger cluster size (up to 64K)
than do other operating systems.
CAUTION
I recommend against dual booting between Windows 2000 (or
Windows NT) and another operating system when using a FAT volume
larger than 2GB. It’s possible to lose some or all of the files on your FAT
volume if you dual boot on a computer with this configuration.
The maximum size of a file in a FAT volume is 4GB.The FAT file system,
as used by Windows 2000, does not support file compression.
TIP
Windows 2000 does not support the file compression utilities contained
in Windows 98, Windows 95, and MS-DOS. If you compress files by
using these utilities, Windows 2000 won’t be able to access these files.
4701-1 ch06.f.qc 4/24/00 09:14 Page 332
FAT32
The FAT32 file system used by Windows 2000 is the same as the FAT32 file
system that was released with Windows 95 OSR2 and Windows 98. The
FAT32 file system is only supported by Windows 2000,Windows 98, and
Windows 95 OSR2.
If you want to dual boot between Windows 2000 and Windows 98 (or
Windows 95 OSR2), you can use either the FAT32 or FAT file system on
your computer’s first volume.
In the sections that follow I’ll cover the specific characteristics of the
FAT 32 file system, including security, naming conventions, speed of access
to files, and volume size.
Security
Like the FAT file system, the FAT32 file system does not support file and
folder security in Windows 2000. Because file and folder security is not
supported on a FAT32 volume, any user who is logged on locally to a
computer has full control of all of the files and folders located in the
FAT32 volume(s) on that computer.This applies only to local access.
However, you can use share permissions to control users’ access to
shared folders over the network. Share permissions affect only the access of
files and folders over the network, not when someone is logged on locally.
So, if you need local file and folder security, you should use the NTFS file
system instead of the FAT32 or FAT file systems.
Naming Conventions
The naming conventions supported by the FAT32 file system are identical
to those supported by the FAT file system:
■ Filenames can be up to 255 characters in length.
■ Filenames can contain any character except \ / : * ? “ < > |
and may begin with any permitted character. Filenames can contain
spaces and multiple periods.
■ The FAT32 file system preserves uppercase and lowercase in file-
names, but filenames are not case sensitive.
4701-1 ch06.f.qc 4/24/00 09:14 Page 333
Volume Size
Although the maximum size of a FAT32 volume on Windows 98
and Windows 95 OSR2 is 2 terabytes (TB), the disk management utilities
contained in Windows 2000 only enable you to create and format a FAT32
volume up to 32GB. Windows 2000 does support FAT32 volumes larger
than 32GB that are created by other operating systems.
The maximum size of a file in a FAT32 volume is 32GB. Like the FAT
file system, FAT32 does not support file compression.
NTFS
The Windows NT file system (NTFS) is the most powerful file system
supported by Windows 2000. Only Windows 2000 and Windows NT
support NTFS — no other Microsoft operating systems currently support
this file system.
Windows 2000 NTFS is a newer version than Windows NT NTFS, and
supports several features not supported by Windows NT NTFS. Because of
this, if you want to dual boot between Windows 2000 and Windows NT,
you must have Windows NT 4.0 with Service Pack 4 or later installed.
When it comes to security, naming conventions, speed of access to files,
and volume size, NTFS in Windows 2000 has its own unique characteristics.
Additionally, NTFS has some features not supported by the FAT or FAT32
file systems.
Security
NTFS provides file and folder security for both local and remote users on
a network. NTFS is the only file system discussed here that permits the
assigning of permissions to individual files and folders.
4701-1 ch06.f.qc 4/24/00 09:14 Page 334
CROSS-REFERENCE
NTFS and share security are covered in depth in Chapter 11.
NTFS supports the Encrypting File System (EFS). EFS enables you to
store files on an NTFS partition in an encrypted format so that even if an
unauthorized user removes a hard drive from your computer, that user will
be unable to access the sensitive data contained in the encrypted file.
In addition to the security provided by NTFS, remember that because
Windows 2000 requires a user to log on before accessing files, Windows
2000’s security is greater than operating systems that don’t require the user
to log on.
Naming Conventions
Like the FAT and FAT32 file systems, NTFS supports the use of long
filenames. Filenames can be up to 255 characters in length.
Filenames can contain any character except \ / : * ? “ < > | and
may begin with any permitted character. Filenames can contain spaces and
multiple periods, and the characters after the last period are considered the
filename extension.
NTFS preserves uppercase and lowercase in filenames. Filenames are not
case sensitive (except when used by a POSIX application). For example, a
Win32 application does not distinguish between Money.DOC, MONEY.DOC,
and money.doc — it treats all three names as though they were the
same file.
The POSIX subsystem, however, is case sensitive with respect to
filenames, because it does not translate a request for a file into all uppercase
letters as the Win32 and other subsystems do. A POSIX application treats
the filenames in the previous paragraph as though they were three separate
files: Money.DOC, MONEY.DOC, and money.doc. You must use a POSIX
application if you want to access these three different files — if you attempt
4701-1 ch06.f.qc 4/24/00 09:14 Page 335
to access Money.DOC with a Win32 application (no matter how you type
the file name), you will always retrieve the MONEY.DOC file because the
Win32 Subsystem translates file requests into all uppercase letters.
Volume Size
The maximum theoretical size of an NTFS volume is 16 exabytes (an
exabyte is one billion billion bytes, or a giga-gigabyte). However, when you
actually implement NTFS on current standard industry hardware, there is a
functional limitation of 2TB.
The maximum size of a file in an NTFS volume is limited only by the
amount of free space in the NTFS volume.
TIP
Compression can cause some performance degradation on volumes
with substantial write activity. Additionally, accessing uncompressed files
is faster than accessing compressed files.
If you require dual boot, and the other operating system supports
FAT32, then I recommend FAT32 over FAT because of FAT32’s speed and
support of larger volume sizes.
CDFS
The Compact Disc File System (CDFS) supports access to compact discs.
It is not used on a computer’s hard disks — this file system is used only
on CD-ROM devices that read and/or write compact discs. Because
of the prevalence of CD-ROM devices, CDFS is supported by most
operating systems.
UDF
The Universal Disk Format (UDF) is a file system used to access read-only
digital video discs (DVDs). Like CDFS, this file system is not used on a
computer’s hard disks — this file system is used only on DVD-ROM devices.
HPFS
Windows 2000 does not support the high performance file system
(HPFS), although some of the earliest versions of Windows NT did. If you
want to upgrade to Windows 2000 from an early version of Windows NT
that used HPFS, you must convert your HPFS volume to NTFS before
performing the upgrade.
TIP
Command syntax typed at the command prompt is not case sensitive —
meaning that you can type the command in either uppercase or lower-
case. The exceptions to this rule are POSIX commands typed at the
command prompt. All POSIX commands are case sensitive.
Disk Types
Windows 2000 uses two primary terms to refer to the hard disks in a
computer: basic disks and dynamic disks. I’ll define and discuss each of these
terms in the next sections.
Windows 2000 also supports removable media devices, such as Zip drives
and tape drives. I’ll also briefly examine these types of storage devices.
Basic Disks
Basic disks is a fancy Windows 2000 term that refers to hard disks that use
industry-standard partitioning and formatting, and contain primary and/or
extended partitions. Prior to Windows 2000, all Microsoft operating systems
used basic disks — there wasn’t any other kind.
4701-1 ch06.f.qc 4/24/00 09:14 Page 340
Let’s face it — hard disks can be a large investment, and like the other assets your
company owns, they need to be secured and properly maintained. And I’m sure I
don’t have to tell you that even more important than the disks themselves is the
data they contain.
With these thoughts in mind, here are a few personal recommendations to help
ensure that your hard disks don’t fail prematurely:
Treat hard disks carefully. I’ve been told that baggage handlers for some airline
carriers interpret the word “Fragile” to mean that the box or bag shouldn’t be
dropped from higher than ten feet. But I’m really talking about kinder and gentler
treatment than that when it comes to hard disks.
Observe proper techniques when installing and removing hard disks from the
computer. Ensure that you’re grounded and working in a static-free environment. I
like to use static mats and wrist straps to provide the necessary static protection.
Protect hard disks from excessive heat. In my experience, a hard disk’s number one
enemy is excessive heat. Many times small companies put their servers in an
unventilated closet, or don’t have adequate cooling fans for the number of disks
installed in a computer. These oversights often lead to premature disk failure.
Windows 2000 partitions and formats the first hard disk in your
computer (the disk that Windows 2000 is installed on) as a basic disk
during the installation process. If you have multiple hard disks in your
computer, Windows 2000 prompts you to convert these additional disks
into dynamic disks the first time you run Disk Management.
There are some limitations to using basic disks.A basic disk can contain
a maximum of four partitions: it can contain up to four primary partitions,
but only one extended partition.
If your Windows 2000 computer is configured to dual boot between
Windows 2000 and any other operating system, you should configure all
hard disks that will be accessed by the other operating system as basic disks,
4701-1 ch06.f.qc 4/24/00 09:14 Page 341
Dynamic Disks
Dynamic disks is a Windows 2000 term that refers to hard disks that contain
Windows 2000 dynamic volumes. Dynamic volumes are volumes that do not
use primary partitions, extended partitions, or logical drives. These
dynamic volumes are manually created by using Disk Management.
Dynamic disks overcome the partition limitations inherent in basic
disks. Dynamic disks can support an unlimited number of volumes, versus
the four-partition maximum of basic disks.
In Windows 2000, you must use dynamic disks to create any volume
that extends across more than one hard disk, such as spanned volumes,
striped volumes, mirrored volumes, and RAID-5 volumes. (I’ll define and
discuss each of these different kinds of volumes later in this chapter in the
“Volume Types” section.) Windows 2000 will support the Windows NT
versions of these types of volumes on basic disks if they were created by
Windows NT, but in Windows 2000 you can only create these volume
types on dynamic disks.
Because dynamic disks do not contain industry-standard primary or
extended partitions, no other operating system supports or can access
dynamic disks. Only Windows 2000 supports dynamic disks. For this
reason, if your Windows 2000 computer is configured to dual boot
between Windows 2000 and any other operating system, you should
configure all hard disks that will be accessed by the other operating system
as basic disks, not dynamic disks.
Windows 2000 does not currently support dynamic disks on laptop
computers, but you can create and configure them on some. Microsoft
intended that the option to convert to a dynamic disk would be grayed out
on laptop computers.
Removable Media
Windows 2000 supports various removable media devices. Removable
devices include CD-ROM drives, tape drives, Zip drives, DVD drives, and
so on.
4701-1 ch06.f.qc 4/24/00 09:14 Page 342
Partition Types
Windows 2000 supports two types of partitions on basic disks: primary and
extended. Both types of partitions can coexist on the same hard disk. A
basic disk can have a maximum of four partitions — it can have more than
one primary partition, but it can have only one extended partition.
TIP
In Windows 2000, primary and extended partitions can only be created
on basic disks — they cannot be created on dynamic disks.
Primary Partitions
A primary partition is a partition on a basic disk that can be configured as the
active partition. The active partition is the partition that contains the files
necessary to load the operating system. When the computer boots, it
attempts to load the operating system from the active primary partition on
the first hard disk in the computer.Any primary partition on the first hard
disk in the computer can be designated as the active partition. In Windows
2000 terminology, the active partition is also called the system partition.
A primary partition can occupy all of the space on a disk, or any portion
of it.A basic disk can have up to four primary partitions.A primary partition
can be formatted as a single logical drive (but not as multiple logical drives).
For detailed instructions on creating a primary partition, see the
“Creating and Formatting Partitions” section later in this chapter.
Extended Partitions
An extended partition is a partition on a basic disk that can be subdivided
into one or more logical drives. A logical drive is a volume that is created
4701-1 ch06.f.qc 4/24/00 09:14 Page 343
from some or all of the space in an extended partition, and that is assigned
a drive letter.
Logical drives can be formatted with FAT, FAT32, or NTFS.You can
have one logical drive formatted with FAT or FAT32, and another logical
drive in the same extended partition formatted with NTFS.
There can be only one extended partition on a disk.An extended partition
can’t be marked active.
For detailed instructions on creating an extended partition, see the
“Creating and Formatting Partitions” section later in this chapter.
Volume Types
A volume is an area of disk space (often called a partition) on one or more
hard disks that has been formatted with a file system. Windows 2000
supports several different volume types, including:
■ Simple volumes
■ Spanned volumes
■ Striped volumes
■ Mirrored volumes
■ RAID-5 volumes
The volume types listed here can only be created on dynamic disks. As I
stated earlier,Windows 2000 will support the Windows NT versions of these
types of volumes on basic disks if they were created by Windows NT, but in
Windows 2000 you can only create these volume types on dynamic disks.
I’ll define and discuss each of these volume types in the following
sections. Then I’ll compare the fault tolerance, cost, and access speed of
these five volume types. Finally, I’ll provide detailed steps for creating each
of these volume types later in this chapter in the “Using Disk
Management” section.
Simple Volumes
A simple volume is volume that consists of formatted disk space on a single
hard disk.You can create simple volumes only on dynamic disks.
4701-1 ch06.f.qc 4/24/00 09:14 Page 344
TIP
If you’re used to thinking in terms of primary and extended partitions, it
might be helpful for you to picture a simple volume as if it were a logical
drive in an extended partition.
Spanned Volumes
A spanned volume consists of formatted disk space on more than one hard
disk that is treated as a single volume.A spanned volume can be formatted
with FAT, FAT32, or NTFS. The areas of disk space that make up a
spanned volume do not need to be of identical size.You can create spanned
volumes only on dynamic disks.
The primary purpose and use of a spanned volume is to access disk
space on more than one hard disk by using a single drive letter. A spanned
volume is sometimes used when a volume becomes full and you want to
enlarge its capacity.
The Windows NT equivalent of a spanned volume is a volume set.
However, volume sets are created on basic disks, whereas spanned volumes
are created on dynamic disks. If you upgrade a Windows NT computer to
Windows 2000,Windows 2000 will support any existing volume sets.
Spanned volumes are said to be created when areas of free space only (not
existing volumes) are combined into a spanned volume. Spanned volumes
are said to be extended when an existing NTFS simple or spanned volume
4701-1 ch06.f.qc 4/24/00 09:14 Page 345
TIP
The system partition can’t be extended into a spanned volume, even if
you have upgraded the disk that contains the system partition to a
dynamic disk. In addition, the partition on which Windows 2000 is
installed (also called the boot partition) can’t be extended into a spanned
volume, even if you have upgraded this disk to a dynamic disk.
Striped Volumes
A striped volume consists of identical-sized areas of formatted disk space
located on two or more dynamic disks. In a striped volume, data is stored,
a block at a time, evenly and sequentially, among all of the disks in the
striped volume. Striped volumes are sometimes referred to as disk striping.
Disk striping refers to the process wherein a file is written, or striped, one
block at a time; first to one disk, then to the next disk, and then to the next
disk, and so on, until all of the data in the file has been evenly distributed
among all of the disks in the striped volume.
A striped volume is accessed by using a single drive letter, as if all of its
disks were combined into a single drive.A striped volume can be formatted
with FAT, FAT32, or NTFS.
The Windows NT equivalent of a striped volume is a stripe set.
However, stripe sets are created on basic disks, whereas striped volumes are
4701-1 ch06.f.qc 4/24/00 09:14 Page 346
Mirrored Volumes
A mirrored volume consists of a simple volume that is exactly duplicated, in
its entirety, onto a second dynamic disk. A mirrored volume can be for-
matted with FAT, FAT32, or NTFS. Any simple volume can be mirrored.
A mirrored volume is accessed by using a single drive letter.
The Windows NT equivalent of a mirrored volume is a mirror set.
However, mirror sets are created on basic disks, whereas mirrored volumes
are created on dynamic disks. If you upgrade a Windows NT computer to
Windows 2000,Windows 2000 will support any existing mirror sets.
A mirrored volume provides the highest level of fault tolerance available
in Windows 2000. Mirrored volumes are used in situations where the
integrity of data is more important than minimizing costs. For example, a
financial institution might decide that using mirrored volumes is cost-
effective for their organization because the extra safety provided by
mirrored volumes outweighs the cost of additional disk space.
4701-1 ch06.f.qc 4/24/00 09:14 Page 347
RAID-5 Volumes
A RAID-5 volume consists of identical-sized areas of formatted disk space
located on three or more dynamic disks. In a RAID-5 volume, data is stored,
a block at a time, evenly and sequentially, among all of the disks in the
volume. In addition to data, parity information is also written across all of the
disks in the RAID-5 volume. This parity information enables RAID-5
volumes to provide the fault tolerance that striped volumes cannot.
STEP BY STEP
1. From the desktop, right-click My Computer. Select Manage from the menu
that appears.
2. If you want to use Disk Management to manage the local computer, skip to
Step 3 now.
If you want to use Disk Management to manage a remote computer, in the left
pane of the Computer Management dialog box, right-click Computer Management
(Local), and select “Connect to another computer” from the menu that appears. In
the Select Computer dialog box, either click the computer you want to manage in
the list box, or type in the name of the computer you want to manage in the Name
text box. Click OK.
3. In the left pane of the Computer Management dialog box, click Disk Management.
(If Storage is not already expanded so that Disk Management appears in the list,
click the + next to Storage.)
used; the status of the volume; the capacity, free space, and percent of the
volume’s capacity that is free space; whether or not the volume provides
fault tolerance; and the percent of disk space overhead required by
Windows 2000 to manage the volume. You might have to scroll to the
right to view all of this information.
Also notice in Figure 6-1 that the lower pane of Disk Management
graphically illustrates each of the disks in the computer. For each disk in
the computer, the disk number, type of disk (basic or dynamic), size of the
disk, and whether the disk is Online or Offline is displayed. Disk
Management also displays, in a bar graph fashion, each volume or partition
on each disk along with pertinent information about each volume.
You can easily customize the appearance of Disk Management by using
the options in the View menu. In the top pane, you can choose to display a
disk list, a volume list, or a graphical view of the disks in the computer. In
the bottom pane, you can choose to display a disk list, a volume list, a
graphical view of the disks in the computer, or to hide the bottom pane
entirely. In addition, you can move the bar that separates the top and
bottom panes by clicking and dragging it. You can also configure
appearance and scaling settings and customize additional MMC and
snap-in view options in the View menu.
4701-1 ch06.f.qc 4/24/00 09:14 Page 352
I’ve always wished that some book or course would have given me
more precise information and detailed instructions on working with disks.
It’s for this reason that I include the instructions to perform most disk
management tasks in the rest of this chapter in a step-by-step format. I’ll
explain how you can use Disk Management to create and format
partitions; upgrade a disk from basic to dynamic; revert from a dynamic
disk to a basic disk; and create and format simple, spanned, striped,
mirrored, and RAID-5 volumes. I’ll also include lots of screen shots to
help solidify your understanding of disk management.
It’s a good practice to use Disk Management only during times when
no one else is accessing the server. Some of Disk Management’s functions
take a significant amount of time to complete. This means that service to
clients during these times can be seriously slowed or interrupted.
CAUTION
Because using Disk Management can disrupt service to clients, I recom-
mend that you perform disk management tasks during nonbusiness hours
whenever possible, just as you would other administrative tasks on a server.
CAUTION
Take extreme care when using Disk Management — it’s easy to delete a
partition or volume that contains important data. Remember that reformat-
ting a partition or volume will also delete existing data.
The following steps explain how to create and format a primary partition,
how to create an extended partition, and how to create and format a logical
drive in an extended partition.These tasks can be performed only on basic
disks.You cannot create partitions on dynamic disks.
4701-1 ch06.f.qc 4/24/00 09:14 Page 353
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
previous section.)
2. If you have not previously upgraded all of your unpartitioned basic disks, the
Write Signature and Upgrade Disk Wizard appears. Because primary partitions
can only be created on basic disks, I’m assuming that you don’t want to upgrade
all of your disks to dynamic disks. If this is the case, and if this dialog box appears,
click Cancel.
3. In the bottom right pane, right-click in an area of unallocated space on the disk
on which you want to create the primary partition. From the menu that appears,
select Create Partition.
4. The Create Partition Wizard appears, as shown in Figure 6-2. Notice the
explanation of basic disks. Click Next.
5. In the Select Partition Type screen, select the “Primary partition” option.
Click Next.
6. Specify the amount of disk space, in MB, to be used for this partition, or accept
the default, which is all of the unallocated space on the disk. Click Next.
7. The Assign Drive Letter or Path window appears, as shown in Figure 6-3. Notice
the three options available.
If you choose the “Assign a drive letter” option, select a drive letter from the
drop-down list box.
4701-1 ch06.f.qc 4/24/00 09:14 Page 354
If you select the “Mount this volume at an empty folder that supports drive paths”
option, either type in the path to an empty folder on an NTFS volume on the local
computer, or click Browse and select an empty folder. The Browse command but-
ton is grayed out and not available if you are using Disk Management remotely.
If you select the “Do not assign a drive letter or path” option, you will need to
assign a drive letter or path to this partition later so that it can be accessed.
Click Next.
8. The Format Partition window appears, as shown in Figure 6-4. Note that the
default file system to use is NTFS.
There are several options you can configure in this dialog box.
You can choose to not format this partition, or to format the partition with specified
settings. If you choose to format the partition, you have the option to specify several
of its characteristics.
File system to use: The file system choices available are FAT, FAT32, or
NTFS. The default file system is NTFS. If you are creating a partition larger
than 2,048MB, the FAT file system will not be available as an option. If you
are creating a partition larger than 32GB, the FAT32 file system will not be
an option. If your partition is larger than 2GB and smaller than 4GB, and
you want to format it with the FAT file system, you must choose the “Do
not format this partition” option, and then format the partition later using
the Format.exe command-line utility.
4701-1 ch06.f.qc 4/24/00 09:14 Page 355
Allocation unit size: This setting refers to the sector size Disk
Management uses when it formats a partition. Sector sizes vary in this
menu from 512 bytes to 256K. There’s an important trade off to consider
when choosing a sector size. If you select a small sector size, you’ll have
less wasted disk space when storing files. If you select a large sector size,
large files will be accessed more quickly. For example, if you plan to store
large graphics or CAD files on this partition, consider using a large sector
size to improve performance. I normally recommend accepting the Default
setting for this option. The value for the Default setting varies depending
on the size of the partition (or volume) being formatted.
Volume label: This setting enables you to give the partition a name. Type
in the name you want to use for the volume label. The default label is New
Volume. You can assign a blank label to a volume by deleting the default name.
Perform a Quick Format: Selecting this option instructs Windows 2000
to write only the necessary data to the disk to support a volume, and not to
check for bad sectors during the formatting. Checking for bad sectors can
add a significant amount of time to the formatting process. I recommend that
you don’t select this option unless you are reformatting an existing partition.
Enable file and folder compression: This option is only available if you
choose NTFS as the file system. (If you choose any other file system, this box
is grayed out.) Selecting this option causes all files and folders placed in this
partition to be compressed by default. You can also set this attribute later by
using Windows Explorer.
4701-1 ch06.f.qc 4/24/00 09:14 Page 356
When you finish configuring the settings in this dialog box, click Next.
9. In the Completing the Create Partition Wizard window, review the settings you
have selected. If the settings are correct, click Finish. If you want to change any|
of the settings, click Back and make the appropriate changes. Windows 2000
creates and formats the primary partition.
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
2. If you have not previously upgraded all of your unpartitioned basic disks, the
Write Signature and Upgrade Disk Wizard appears. Because extended partitions
can only be created on basic disks, I’m assuming that you don’t want to upgrade
all of your disks to dynamic disks. If this is the case, and if this dialog box appears,
click Cancel.
3. In the bottom right pane, right-click in an area of unallocated space on the disk
on which you want to create the extended partition. From the menu that appears,
select Create Partition.
4. The Create Partition Wizard appears. Click Next.
5. Select the “Extended partition” option. Click Next.
6. Specify the amount of disk space, in MB, to be used for this partition, or accept
the default, which is all of the unallocated space on the disk. Click Next.
7. In the Completing the Create Partition Wizard window, review the settings you
have selected. If the settings are correct, click Finish. If you want to change any
of the settings, click Back and make the appropriate changes. Windows 2000
creates the extended partition.
4701-1 ch06.f.qc 4/24/00 09:14 Page 357
STEP BY STEP
After Windows 2000 creates and formats the logical drive, it appears in
Disk Management with a listing of its characteristics, including a drive letter
or path, the amount of space the logical drive contains, the file system the
logical drive is formatted with, and the word “Healthy.” The space on the
disk that was used to create the logical drive is no longer shown as free space.
TIP
I recommend you upgrade all of your unpartitioned basic disks to dynamic
disks when you first encounter this wizard unless you plan to dual boot
your computer between Windows 2000 and another operating system.
4701-1 ch06.f.qc 4/24/00 09:14 Page 359
Using the wizard is fairly straightforward. Here are the steps to use the
wizard to upgrade a basic disk to a dynamic disk.
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
2. If you have not previously upgraded all of your unpartitioned basic disks, the
Write Signature and Upgrade Disk Wizard appears, as shown in Figure 6-6.
(If this wizard does not appear and you want to upgrade a disk, use the next
set of steps in this section.) Click Next.
3. Select the disk(s) you want to upgrade. By default, all unpartitioned disks are
selected for upgrade. If you don’t want one of these disks to be upgraded,
deselect the check box next to that disk. Click Next.
TIP
This wizard only gives you an option to upgrade unpartitioned disks.
If you want to upgrade a disk that has already been partitioned, use the
next set of steps in this section.
4701-1 ch06.f.qc 4/24/00 09:14 Page 360
4. In the Completing the Write Signature and Upgrade Disk Wizard window, review
the settings you have selected. If the settings are correct, click Finish. If you want
to change any of the settings, click Back and make the appropriate changes.
Windows 2000 upgrades your disk(s) from basic to dynamic.
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
2. In the bottom right pane, right-click the disk you want to upgrade, as shown in
Figure 6-7. When you do this, right-click the small gray area on the left that
contains the actual disk number and disk type, not the long bar on the right
that contains the volume information.
Notice that I clicked the gray area where “Disk 1” appears, not on the bar to the
right representing the partitioned space.
From the menu that appears, select Upgrade to Dynamic Disk.
3. In the Upgrade to Dynamic Disk dialog box, select the disk(s) you want to
upgrade. By default, only the disk that you right-clicked is selected for upgrade.
All basic disks, both formatted and unformatted, are available for upgrade in this
dialog box. Click OK.
4. In the Disks to Upgrade dialog box, review the list of disks that will be upgraded.
You can click Details to display a list of the volumes currently contained on the
disk(s) selected for upgrade. If the list is correct, click Upgrade. If the list is not
correct, click Cancel.
4701-1 ch06.f.qc 4/24/00 09:14 Page 362
5. A warning dialog box appears. Note that once you upgrade a disk from basic to
dynamic, you will no longer be able to boot previous versions of Windows from
this disk. Assuming that you want to continue with the upgrade, click Yes.
6. Another warning dialog box appears. File systems on this disk will be dismounted
and unavailable during the upgrade process. This means that other users on the
network will not be able to access files on this disk during the upgrade process,
and that any open files will be closed without prior notice to the user. Open files
can become corrupted in this situation. Click Yes to continue.
7. If you are upgrading Disk 0, Windows 2000 displays another message, stating
that a reboot will take place after the disk is upgraded.
Windows 2000 upgrades the selected disk(s) from basic to dynamic, and may
reboot your computer.
STEP BY STEP
1. If the disk contains data in one or more volumes, back up all of the data on the disk.
2. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
3. If the disk to be reverted does not contain any volumes, skip to Step 6.
4701-1 ch06.f.qc 4/24/00 09:14 Page 363
If the disk to be reverted contains one or more volumes, you must delete these
volumes. To do this, in the bottom right pane of Disk Management, right-click in
a bar-shaped area that represents the volume you want to delete. Select Delete
Volume from the menu that appears.
4. Click Yes in the warning dialog box that appears to delete the selected volume.
5. Click Yes in the Disk Management dialog box to force the deletion of the selected
volume. Windows 2000 deletes the volume. Repeat Steps 3 through 5 to delete
each volume on the disk.
6. In the bottom right pane of Disk Management, right-click the small gray area on
the left that contains the disk number and disk type of the disk you want to revert.
Select Revert To Basic Disk from the menu that appears. Windows 2000 reverts
the dynamic disk to a basic disk.
7. Partition and format the basic disk, and if the volume previously contained data
that you need to access, restore that data to the disk.
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
2. If you have not previously upgraded all of your unpartitioned basic disks, the
Write Signature and Upgrade Disk Wizard appears. If you want to create a simple
volume on a basic disk, you’ll need to upgrade that disk to a dynamic disk. If this
is the case, use this wizard and the steps in the “Upgrading a Disk from Basic to
Dynamic” section earlier in this chapter. If you already have a dynamic disk on which
to create a simple volume and want to keep your existing basic disks, click Cancel.
4701-1 ch06.f.qc 4/24/00 09:14 Page 364
5. In the Select Volume Type screen, select the “Simple volume” option. Click Next.
6. In the Select Disks screen, specify the amount of disk space, in MB, to be used
for this volume, or accept the default, which is all of the unallocated space on the
disk. Click Next.
7. The Assign Drive Letter or Path screen appears. Select and configure one of the
three options in this dialog box.
If you choose the “Assign a drive letter” option, select a drive letter from the drop-
down list box.
If you select the “Mount this volume at an empty folder that supports drive paths”
option, either type in the path to an empty folder on an NTFS volume on the local
computer, or click Browse and select an empty folder. The Browse command but-
ton is grayed out and not available if you are using Disk Management remotely.
4701-1 ch06.f.qc 4/24/00 09:14 Page 365
If you select the “Do not assign a drive letter or path” option, you will need to
assign a drive letter or path to this volume later so that it can be accessed.
Click Next.
8. The Format Volume screen appears, as shown in Figure 6-9. Note that the
options for formatting a volume are the same as those used when formatting
a primary partition.
There are several options you can configure in this dialog box.
You can choose to not format this volume, or to format the volume with specified
settings. If you choose to format the volume, you have the option to specify several
of its characteristics.
File system to use: The file system choices available are FAT, FAT32, or
NTFS. The default file system is NTFS. If you are creating a volume larger
than 2,048MB, the FAT file system will not be available as an option. If you
are creating a volume larger than 32GB, the FAT32 file system will not be
an option. If your volume is larger than 2GB and smaller than 4GB, and you
want to format it with the FAT file system, you must choose the “Do not
format this volume” option, and then format the volume later using the
Format.exe command-line utility.
4701-1 ch06.f.qc 4/24/00 09:14 Page 366
Allocation unit size: This setting refers to the sector size Disk Manage-
ment uses when it formats the volume. Sector sizes vary in this menu from
512 bytes to 256K. There’s an important trade-off to consider when choos-
ing a sector size. If you select a small sector size, you’ll have less wasted
disk space when storing files. If you select a large sector size, large files
will be accessed more quickly. For example, if you plan to store large multi-
media or graphics files on this partition, consider using a large sector size
to improve performance. I normally recommend accepting the Default
setting for this option. The value for the Default setting varies depending
on the size of the volume being formatted.
Volume label: This setting enables you to give the volume a name. Type
in the name you want to use for the volume label. The default label is New
Volume. You can assign a blank label to a volume by deleting the default name.
Perform a Quick Format: Selecting this option instructs Windows 2000
to write only the necessary data to the disk to support a volume, and not to
check for bad sectors during the formatting. Checking for bad sectors can
add a significant amount of time to the formatting process. I recommend that
you don’t select this option unless you are reformatting an existing volume.
Enable file and folder compression: This option is only available if you
choose NTFS as the file system. (If you choose any other file system, this box
is grayed out.) Selecting this option causes all files and folders placed in this
volume to be compressed by default. You can also set this attribute later by
using Windows Explorer.
When you finish configuring the settings in this dialog box, click Next.
9. In the Completing the Create Volume Wizard screen, review the settings you have
selected. If the settings are correct, click Finish. If you want to change any of the
settings, click Back and make the appropriate changes. Windows 2000 creates
and formats the simple volume.
After Windows 2000 creates and formats the simple volume, it appears in
Disk Management with a listing of its characteristics, including
the name of the new volume, a drive letter or path, the amount of space the
volume contains, the file system the volume is formatted with, and the word
“Healthy.”The space on the disk that was used to create the simple volume
is no longer shown as unallocated.
4701-1 ch06.f.qc 4/24/00 09:14 Page 367
TIP
Neither the system nor the boot partition can be extended into a spanned
volume, even if you have upgraded the disk that contains these partitions
to a dynamic disk.
Now I’ll explain how to create a spanned volume, and then I’ll explain
how to extend an existing simple or spanned volume.
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
2. If you have not previously upgraded all of your unpartitioned basic disks, the
Write Signature and Upgrade Disk Wizard appears. If the disks you want to
use to create the spanned volume are basic disks, you’ll need to upgrade those
disks to dynamic disks. If this is the case, use this wizard and the steps in the
“Upgrading a Disk from Basic to Dynamic” section earlier in this chapter. If you
already have the dynamic disks on which you want to create a spanned volume
and want to keep your existing basic disks, click Cancel.
3. In the bottom right Disk Management pane, right-click in an area of unallocated
space on any of the dynamic disks that you want to be a part of the spanned
volume. From the menu that appears, select Create Volume.
4. In the Create Volume Wizard dialog box, click Next.
5. Select the “Spanned volume” option. Click Next.
4701-1 ch06.f.qc 4/24/00 09:14 Page 368
6. The Select Disks screen appears, as shown in Figure 6-10. Note that only one
dynamic disk is selected, by default, for inclusion in the spanned volume.
Highlight one or more additional dynamic disks in the “All available dynamic disks”
box. Click Add. You should now have two or more disks listed in the “Selected
dynamic disks” box.
Highlight the first disk listed in the “Selected dynamic disks” box, and specify
the amount of disk space, in MB, to be used for this disk in the spanned volume.
Repeat this process for each of the disks listed in the “Selected dynamic disks”
box. Click Next.
Or, instead of configuring disk space for each disk individually, you can accept the
default, which is all of the unallocated space on each of the disks, by clicking Next.
7. The Assign Drive Letter or Path screen appears. Select and configure one of the
three options in this dialog box. (These options are explained in detail in Step 7 in
the “Creating a Simple Volume” section.) Click Next.
8. The Format Volume screen appears. Select and configure the appropriate option.
(These options are explained in detail in Step 8 in the “Creating a Simple Volume”
section.) Click Next.
4701-1 ch06.f.qc 4/24/00 09:15 Page 369
9. In the Completing the Create Volume Wizard screen, review the settings you have
selected. If the settings are correct, click Finish. If you want to change any of the
settings, click Back and make the appropriate changes. Windows 2000 creates
and formats the spanned volume.
After Windows 2000 creates and formats the spanned volume, it appears
in Disk Management with a listing of its characteristics, including the
name of the new volume, a drive letter or path, the amount of space
on each disk that is included in the volume, the file system the volume is
formatted with, and the word “Healthy.” A newly created spanned volume
is shown in Figure 6-11. Notice that I chose to name this volume
“Spanned,” and that it consists of two dynamic disks, Disk 1 and Disk 2.
If you want to know the total amount of disk capacity of the spanned
volume, view the entry in the Capacity column for the spanned volume in
the top right pane in Disk Management.
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
2. If you have not previously upgraded all of your unpartitioned basic disks, the Write
Signature and Upgrade Disk Wizard appears. If the disks you want to use to
extend your simple or spanned volume are basic disks, you’ll need to upgrade
those disks to dynamic disks. If this is the case, use this wizard and the steps in
the “Upgrading a Disk from Basic to Dynamic” section earlier in this chapter. If
you already have the dynamic disks you need to extend your simple or spanned
volume and want to keep your existing basic disks, click Cancel.
3. In the bottom right Disk Management pane, right-click anywhere in the bar-
shaped space that represents the volume you want to extend. From the menu
that appears, select Extend Volume.
4. In the Extend Volume Wizard dialog box, click Next.
5. In the Select Disks screen, highlight one or more dynamic disks from the “All avail-
able dynamic disks” box to add to your existing volume. Click Add. You should now
have one or more disks listed in the “Selected dynamic disks” box.
Configure the amount of disk space you want to be included in the extended
volume from each of the dynamic disks listed in the “Selected dynamic disks” box.
The default setting is all of the unallocated space on each of the disks. Click Next.
6. In the Completing the Extend Volume Wizard screen, review the settings you have
selected. If the settings are correct, click Finish. If you want to change any of the
settings, click Back and make the appropriate changes. Windows 2000 extends
the volume.
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
2. If you have not previously upgraded all of your unpartitioned basic disks, the Write
Signature and Upgrade Disk Wizard appears. If the disks you want to use to create a
striped volume are basic disks, you’ll need to upgrade those disks to dynamic disks.
If this is the case, use this wizard and the steps in the “Upgrading a Disk from Basic
to Dynamic” section earlier in this chapter. If you already have the dynamic disks on
which you want to create a striped volume and want to keep your existing basic
disks, click Cancel.
3. In the bottom right Disk Management pane, right-click in an area of unallocated
space on any of the dynamic disks that you want to be a part of the striped volume.
From the menu that appears, select Create Volume.
4. In the Create Volume Wizard dialog box, click Next.
5. Select the “Striped volume” option. Click Next.
6. In the Select Disks screen, highlight one or more dynamic disks from the “All
available dynamic disks” box to be included in your striped volume. Click Add. You
should now have two or more disks listed in the “Selected dynamic disks” box.
Highlight any disk in the “Selected dynamic disks” box and configure the amount
of disk space you want to be included in the striped volume.
Because striped volumes require identical amounts of disk space on each disk
in the volume, Windows 2000 will use the amount of disk space you configure
from each of the selected disks when it creates the striped volume. If the disks
that will make up the striped volume have unequal amounts of unallocated space,
the largest amount of space you can configure is the amount of unallocated
space from the disk that has the smallest amount of unallocated space. (This
maximum size is also the default setting.) The total size of the striped volume
will be the amount of disk space you select times the number of disks that make
up the volume. This total is displayed in the Total volume size text box after you
configure the size for all selected disks setting. Click Next.
7. The Assign Drive Letter or Path screen appears. Select and configure one of the
three options in this dialog box. (These options are explained in detail in Step 7
in the “Creating a Simple Volume” section.) Click Next.
8. The Format Volume screen appears. Select and configure the appropriate option.
(These options are explained in detail in Step 8 in the “Creating a Simple Volume”
section.) Click Next.
4701-1 ch06.f.qc 4/24/00 09:15 Page 372
9. In the Completing the Create Volume Wizard screen, review the settings you have
selected. If the settings are correct, click Finish. If you want to change any of the
settings, click Back and make the appropriate changes. Windows 2000 creates
and formats the striped volume.
After Windows 2000 creates and formats the striped volume, it appears
in Disk Management with a listing of its characteristics, including the
name of the new volume, a drive letter or path, the amount of space on
each disk that is included in the striped volume, the file system the volume
is formatted with, and the word “Healthy.”A newly created striped volume
is shown in Figure 6-12. Notice that I chose to name this volume
“Striped,” and that it consists of three dynamic disks, Disk 1 and Disk 2,
and Disk 3.
TIP
You can only create and use mirrored volumes on Windows 2000 Server
and Advanced Server computers. Windows 2000 Professional does not
support mirrored volumes.
There are two different situations in which you can create a mirrored
volume:
■ You can create a mirrored volume from unallocated space on two
dynamic disks.This means you’re starting out with two dynamic
disks that have no data on them.
■ You can mirror an existing simple volume onto a second dynamic
disk that has enough unallocated space to contain the volume. In
this situation, you’re starting out with one disk that already has data
on it, and one additional dynamic disk that has no data on it.
In this section, I’ll list the steps to create a mirrored volume in each of
these situations.
I’ll also explain how to perform another common task associated with
mirrored volumes — creating a fault tolerance boot disk.When you mirror
the volume that contains your Windows 2000 Server/Advanced Server
installation folder (usually C:\Winnt), you should create a floppy disk that
will enable you to boot from your second hard disk should the first hard
disk in your mirrored volume fail.This floppy disk is called a fault tolerance
boot disk.
So, allow me to begin by explaining how to create a mirrored volume
on a Windows 2000 Server/Advanced Server computer by using two
dynamic disks that have no data on them.
4701-1 ch06.f.qc 4/24/00 09:15 Page 374
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
2. If you have not previously upgraded all of your unpartitioned basic disks, the
Write Signature and Upgrade Disk Wizard appears. If either of the two disks you
want to use to create the mirrored volume are basic disks, you’ll need to upgrade
those disks to dynamic disks. If this is the case, use this wizard and the steps in
the “Upgrading a Disk from Basic to Dynamic” section earlier in this chapter. If
you already have the two dynamic disks on which you want to create a mirrored
volume and want to keep your existing basic disks, click Cancel.
3. In the bottom right Disk Management pane, right-click in an area of unallocated
space on either of the two dynamic disks that you want to be a part of the mirrored
volume. From the menu that appears, select Create Volume.
4. In the Create Volume Wizard dialog box, click Next.
5. Select the “Mirrored volume” option. Click Next.
6. The Select Disks screen appears.
Highlight one additional dynamic disk in the “All available dynamic disks” box. Click
Add. You should now have two disks listed in the “Selected dynamic disks” box.
Highlight any disk in the “Selected dynamic disks” box and configure the amount
of disk space you want to be included in the mirrored volume.
Because mirrored volumes require identical amounts of disk space on each disk
in the volume, Windows 2000 Server/Advanced Server will use the amount of
disk space you configure from each of the two selected disks when it creates the
mirrored volume. If the two disks that will make up the mirrored volume have
unequal amounts of unallocated space, the largest amount of space you can
configure is the amount of unallocated space from the disk that has the smallest
amount of unallocated space. (This maximum size is also the default setting.) The
total size of the mirrored volume will be the amount of disk space you select. This
total is displayed in the Total volume size text box after you configure the size for
all selected disks setting. Click Next.
7. The Assign Drive Letter or Path screen appears. Select and configure one of the
three options in this dialog box. (These options are explained in detail in Step 7
in the “Creating a Simple Volume” section.) Click Next.
8. The Format Volume screen appears. Select and configure the appropriate option.
(These options are explained in detail in Step 8 in the “Creating a Simple Volume”
section.) Click Next.
4701-1 ch06.f.qc 4/24/00 09:15 Page 375
9. In the Completing the Create Volume Wizard screen, review the settings you
have selected. If the settings are correct, click Finish. If you want to change any
of the settings, click Back and make the appropriate changes. Windows 2000
Server/Advanced Server creates, formats, and resynchronizes the mirrored
volume. This process takes awhile.
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
2. If you have not previously upgraded all of your unpartitioned basic disks, the
Write Signature and Upgrade Disk Wizard appears. If the additional disk you want
to use to create the mirrored volume is a basic disk, you’ll need to upgrade that
disk to a dynamic disk. If this is the case, use this wizard and the steps in the
“Upgrading a Disk from Basic to Dynamic” section earlier in this chapter. If your
additional disk is already a dynamic disk and you want to keep your existing basic
disks, click Cancel.
TIP
If the disk that contains the volume (and data) you want to mirror is a
basic disk, you must upgrade that disk to a dynamic disk before you can
continue. Use the “Manually upgrading a basic disk to a dynamic disk”
step-by-step section earlier in this chapter to upgrade this disk.
3. In the bottom right Disk Management pane, right-click in the bar-shaped area that
represents the simple volume you want to mirror. From the menu that appears,
select Add Mirror.
4. In the Add Mirror dialog box, select the additional dynamic disk you want to use
to create the mirrored volume. Click Add Mirror. Windows 2000 Server/Advanced
Server creates and regenerates the mirrored volume. This process takes awhile
because Windows 2000 has to copy all of the data from the original disk to the
second disk in the mirrored volume.
edited Boot.ini file that points to the disk in the mirrored volume that is
still functional.
Here are the steps to create your own fault tolerance boot disk. Also,
because you’ll need to edit the Boot.ini file during this process, I’ve
included some information on how to edit this file in the section that follows
these steps.
STEP BY STEP
1. Place a blank 3.5-inch floppy disk in your computer’s floppy disk drive. From the
desktop, select Start ➪ Programs ➪ Accessories ➪ Windows Explorer.
2. Click the + next to My Computer in the left pane. Right-click 31⁄2 Floppy (A:),
and select Format from the menu that appears. You should perform this task
in Windows 2000, not in Windows 95 or Windows 98.
3. In the Format A:\ dialog box, click Start.
TIP
I recommend that you don’t select the quick format option for this task,
because you want to ensure that Windows 2000 will detect and com-
pensate for any and all errors on the disk.
4. A warning dialog box appears, indicating that all data on the disk will be erased.
Click OK.
5. Windows 2000 displays a message that the format is complete. Click OK.
6. In the Format A:\ dialog box, click Close.
7. In Windows Explorer, select Tools ➪ Folder Options. Click the View tab, and in the
Advanced settings box, select the “Show hidden files and folders” option. Then,
clear the check boxes next to “Hide file extensions for known file types,”
and “Hide protected operating system files.” In the warning dialog box, click Yes.
Click OK.
4701-1 ch06.f.qc 4/24/00 09:15 Page 378
CAUTION
If you edit the Boot.ini file on your computer’s hard disk, your
computer may no longer be bootable.
You can use any text editor, such as Notepad, to edit the Boot.ini file.
However, before you go on to edit this file, you might want to take a
closer look at it to understand its structure and syntax. I’ve reproduced a
sample Boot.ini file in Listing 6-1.
LISTING 6-1 Sample Boot.ini File
[boot loader]
timeout=30
4701-1 ch06.f.qc 4/24/00 09:15 Page 379
default=scsi(0)disk(0)rdisk(0)partition(1)\WINNT
[operating systems]
scsi(0)disk(0)rdisk(0)partition(1)\WINNT=”Microsoft Windows 2000 Server”
C:\=”Microsoft Windows”
Note that there are two sections to the Boot.ini file: [boot loader]
and [operating systems].
The first section, [boot loader], contains two entries.The first entry,
timeout, specifies how long, in seconds, the boot loader operating system
selection menu is displayed when the computer boots.The default timeout
is thirty seconds. The second entry, default, specifies which operating
system loads if no selection is made within the timeout period.
The second section of the Boot.ini file, [operating systems], first
lists entries consisting of ARC (Advanced RISC Computing) paths to various
operating systems. Only Windows 2000 and Windows NT use ARC paths
in the Boot.ini file to indicate which partition, physical disk, and folder
contains the files used to start the operating system. Next, the drive letter
and path to any other operating systems are listed. The operating system
named at the end of each [operating systems] entry, after the = sign
(whether it is an ARC path entry or not), is the operating system displayed
in the boot loader operating system selection menu.
There are two types of ARC path entries: multi and scsi.The terms
multi and SCSI refer to the type of hard disk that is listed in the ARC path.
TIP
The term scsi is normally presented in lowercase when it is used to indi-
cate an ARC path. It is normally presented in uppercase when it is used
to refer to a disk, adapter, or controller.
All hard disks that can be detected by the computer’s BIOS, or by the
BIOS on a SCSI adapter, are referred to as multi. All hard disks connected
to SCSI adapters that do not have their BIOS enabled are referred to as
SCSI. SCSI disks require a device driver to be loaded before the operating
system can access the disk.The Windows 2000 installation program copies
the device driver for a SCSI adapter to the root of the system partition, and
renames the file as Ntbootdd.sys.
4701-1 ch06.f.qc 4/24/00 09:15 Page 380
I decide that I want to create a fault tolerance boot disk so I can reboot
the computer in the event that Disk 0 fails. I follow the steps outlined in
the “Creating a fault tolerance boot disk” step-by-step section up to the
point where I edit the Boot.ini file on my floppy disk. The Boot.ini
file on my floppy disk (before editing) looks like Listing 6-2.
4701-1 ch06.f.qc 4/24/00 09:15 Page 382
[boot loader]
timeout=30
default=scsi(0)disk(0)rdisk(0)partition(1)\WINNT
[operating systems]
scsi(0)disk(0)rdisk(0)partition(1)\WINNT=”Microsoft Windows 2000 Server”
C:\=”Microsoft Windows”
scsi(0)disk(1)rdisk(0)partition(1)
[boot loader]
timeout=30
default=scsi(0)disk(1)rdisk(0)partition(1)\WINNT
[operating systems]
scsi(0)disk(1)rdisk(0)partition(1)\WINNT=”Microsoft Windows 2000 Server”
C:\=”Microsoft Windows”
Notice that the ARC path in both the [boot loader] and [operating
systems] sections now points to Disk 1 instead of Disk 0. In the event that
Disk 0 in LOTSADISKS fails, I can use my fault tolerance boot disk to boot
to Disk 1.
Finally, there are several optional switches you can add at the end of an
[operating systems] entry in a Boot.ini file. Table 6-3 lists and
describes these switches. These switches are not case sensitive — you can
type them in either uppercase or lowercase.
4701-1 ch06.f.qc 4/24/00 09:15 Page 384
TIP
These switches are not typically used when creating a fault tolerance boot
disk. However, because they are used frequently during troubleshooting,
and because this is the only section of this book that addresses the
Boot.ini file in detail, I’ve covered the switches here.
TIP
You can only create and use RAID-5 volumes on Windows 2000 Server
and Advanced Server computers. Windows 2000 Professional does not
support RAID-5 volumes.
STEP BY STEP
1. Start Disk Management. (The steps to start Disk Management are listed in the
“Using Disk Management” section.)
2. If you have not previously upgraded all of your unpartitioned basic disks, the
Write Signature and Upgrade Disk Wizard appears. If the disks you want to
use to create the RAID-5 volume are basic disks, you’ll need to upgrade those
disks to dynamic disks. If this is the case, use this wizard and the steps in the
“Upgrading a Disk from Basic to Dynamic” section earlier in this chapter. If you
already have the dynamic disks on which you want to create the RAID-5 volume
and want to keep your existing basic disks, click Cancel.
3. In the bottom right Disk Management pane, right-click in an area of unallocated
space on any of the dynamic disks that you want to be a part of the RAID-5
volume. From the menu that appears, select Create Volume.
4. In the Create Volume Wizard dialog box, click Next.
5. Select the “RAID-5 volume” option. Click Next.
6. In the Select Disks screen, highlight two or more dynamic disks from the
“All available dynamic disks” box to be included in your RAID-5 volume. Click
Add. You should now have three or more disks listed in the “Selected dynamic
disks” box.
Highlight any disk in the “Selected dynamic disks” box and configure the amount
of disk space you want to be included in the RAID-5 volume.
Because RAID-5 volumes require identical amounts of disk space on each disk
in the volume, Windows 2000 Server/Advanced Server will use the amount of disk
space you configure from each of the selected disks when it creates the RAID-5
volume. If the disks that will make up the RAID-5 volume have unequal amounts of
unallocated space, the largest amount of space you can configure is the amount of
unallocated space from the disk that has the smallest amount of unallocated space.
(This maximum size is also the default setting.) The total size of the RAID-5 volume
will be the amount of disk space you select times one less than the total number of
disks that make up the volume. This total is displayed in the Total volume size text
box after you configure the size for all selected disks setting. Click Next.
4701-1 ch06.f.qc 4/24/00 09:15 Page 386
7. The Assign Drive Letter or Path screen appears. Select and configure one of the
three options in this dialog box. (These options are explained in detail in Step 7
in the “Creating a Simple Volume” section.) Click Next.
8. The Format Volume screen appears. Select and configure the appropriate option.
(These options are explained in detail in Step 8 in the “Creating a Simple Volume”
section.) Click Next.
9. In the Completing the Create Volume Wizard screen, review the settings you
have selected. If the settings are correct, click Finish. If you want to change any
of the settings, click Back and make the appropriate changes. Windows 2000
Server/Advanced Server creates and formats the RAID-5 volume. This process
may take awhile, because Windows 2000 must first create the volume, then
format the volume, and finally generate parity information (which Windows
2000 refers to as “Regenerating”).
I recommend that you use Disk Defragmenter only during times when
no one else is accessing the server. Disk Defragmenter’s functions can take
a significant amount of time to complete.This means that service to clients
during these times can be seriously slowed or interrupted.
CAUTION
Because running Disk Defragmenter can slow or interrupt service to
clients, I recommend that you perform disk defragmentation tasks during
nonbusiness hours whenever possible, just as you would other adminis-
trative tasks on a server.
STEP BY STEP
1. From the desktop, right click My Computer. Select Manage from the menu
that appears.
2. In the left pane of the Computer Management dialog box, click Disk Defragmenter.
(If Storage is not already expanded so that Disk Defragmenter appears in the list,
click the + next to Storage.)
Figure 6-17 shows the Disk Defragmenter tool. Notice the Analyze and
Defragment command buttons in the right pane of this window.
Using Disk Defragmenter, both to analyze and defragment volumes, is
very straightforward.
4701-1 ch06.f.qc 4/24/00 09:15 Page 389
STEP BY STEP
TIP
You can defragment a volume without first analyzing it, if you want to.
To do this, start Disk Defragmenter, highlight the volume you want to
defragment, and click Defragment.
(MMC). Logical Drives enables you to view logical drive properties, change
a logical drive’s label, and configure several types of security settings on a log-
ical drive, including access permissions, ownership, audit entries, and special
permissions.The term logical drive, as it is used in this application, refers to any
volume or network-connected drive that is assigned a drive letter.
Viewing a logical drive’s properties and changing its label are easy tasks
to accomplish.
STEP BY STEP
Also notice the various information displayed about each of the logical drives,
including the type of logical drive, and whether the logical drive is local or is
mapped to a shared network drive.
3. To view the properties of a specific logical drive, right-click the logical drive in the
right pane, and select Properties from the menu that appears. The properties of
the logical drive are displayed, as shown in Figure 6-20. Notice the information
that is displayed, including the drive’s label, its type, the type of file system the
logical drive uses, the logical drive’s used and free space, and its capacity.
4. To change the label of the logical drive, type a new label in the Label text box, and
click OK.
Also notice in Figure 6-21 that Disk Management provides the following
information about the volume that the disk contains:
■ The name of the volume, if it has one, and its drive letter
■ The size of the volume
■ The status of the volume (Healthy, Failed, and so on)
What I want to focus on in this section is the status of the disk and volume.
The status that Disk Management displays is of primary importance when
4701-1 ch06.f.qc 4/24/00 09:15 Page 394
Unreadable This status indicates that a Try using the Rescan Disks
basic or dynamic disk is not command in Disk Management
accessible, due to hardware or rebooting your computer to
failure, I/O errors, or corruption. change the disk status. If these
steps don’t work, you may need
to replace the disk.
Unrecognized This status indicates that the Use a disk that is compatible with
disk is an Unknown disk type, your computer and with Windows
and that it has an OEM 2000. Or, if you’re not worried
signature that causes Disk about losing data on this disk, you
Management to prevent you can try performing a low-level
from using the disk. Most likely format using the disk controller’s
the disk was formatted and/or utilities. If you perform a low-level
configured by an incompatible format, all data on this disk will be
operating system, such lost, and the disk can potentially
as UNIX. become unusable. Performing a
low-level format is a last resort.
Table 6-5 lists and describes the possible status values that Disk
Management can display for volumes, and the actions you can take to
correct a volume problem.
TABLE 6-5 Possible Volume Status Values
Status Value Description What You Should Do
Continued
4701-1 ch06.f.qc 4/24/00 09:15 Page 396
Failed This status indicates that the If the disk that contains this
volume can’t be automatically volume is Offline, you may be able
started. Make sure that the to bring the disk back Online
physical disk is plugged in, by using the Reactivate Disk
powered on, and attached command in Disk Management.
to the computer. If the disk that contains this
volume is Online, you may be
able to use the Reactivate Volume
command to return the volume
to a Healthy status.
Failed
Redundancy This status indicates that a Because the volume no longer
volume no longer has any has any fault tolerance, you can
fault tolerance because one continue operations, but should
of the disks in the fault-tolerant repair the volume as soon as
volume is Offline. This status possible.
is only possible for mirrored
or RAID-5 volumes.
Failed This status indicates that a If the disk’s status value is
Redundancy volume no longer has any fault Online (Errors), try using the
(At Risk) tolerance and that I/O errors Reactivate Disk command in Disk
have been detected on one of Management to bring the disk
the disks in the fault-tolerant back Online. Because the volume
volume. This status is only no longer has any fault tolerance,
possible for mirrored or you can continue operations, but
RAID-5 volumes. should repair the volume as soon
as possible.
Healthy (At Risk) This status indicates that I/O If the disk status is Online
errors have been found on the (Errors), you may be able to
dynamic disk that contains return the disk to the Online
this volume. status by using the Reactivate Disk
command in Disk Management.
Initializing This status indicates that a Wait for the status to change
dynamic volume is being to Healthy.
initialized. This is a normal
status. Disk Management
displays this status during
initialization, and then
displays a status of Healthy.
Regenerating This status indicates that Wait for the status to change
data and parity are being to Healthy.
regenerated for a RAID-5
volume. This is a normal
status. Disk Management
displays this status during
regeneration, and then
displays a status of Healthy
for the RAID-5 volume.
4701-1 ch06.f.qc 4/24/00 09:15 Page 397
Resynching This status indicates that the Wait for the status to change
mirrors in a mirrored volume to Healthy.
are being resynchronized so
that both contain identical
data. This is a normal status.
Disk Management displays this
status during resynchronization,
and then displays a status of
Healthy for the mirrored volume.
One of the most common hard disk problems is disk failure. Once you
troubleshoot the problem, you’ve got to fix it. The next section of this
chapter is devoted entirely to recovering from disk failure.
EXAM TIP
The Server exam has an objective on recovering from disk failure. Because
you may not get a lot of practice at this in real life, I recommend that you
study this section carefully, and revisit it just before you take the exam.
CROSS-REFERENCE
Tape backup is critically important. For more information on data backup
and restoration, see Chapter 14.
When you have a disk failure (or a multiple disk failure in the case of a
mirrored or RAID-5 volume), and you don’t have a tape backup, you
might consider using a third-party data recovery service if the data is
extremely important or valuable to you.The data recovery service may be
able to retrieve some of your data from the failed disk(s). Be forewarned,
however, that this process is expensive and takes time to complete.
Before you perform any of the steps in the following sections to recover
from a failed hard disk, I recommend that you back up all existing partitions
and volumes on the computer with the failed disk. I say this because I’ve
accidentally deleted perfectly good data on a healthy volume while trying
to repair/recover from a failed hard disk. But hey, no one’s perfect.
CAUTION
Take extreme care when using Disk Management — it’s easy to delete
a partition or volume that contains important data. Remember that
reformatting a partition or volume will also delete existing data.
The next several sections explain the detailed steps you can take to recover
from disk failure in situations where simple volumes, spanned volumes,
striped volumes, mirrored volumes, and RAID-5 volumes are involved.
STEP BY STEP
1. Start Disk Management. Determine the disk that has failed — the failed disk will
appear with a status of Offline, and the failed volume may show a status of Failed.
2. Replace the failed hard disk.
4701-1 ch06.f.qc 4/24/00 09:15 Page 399
3. Reboot the computer to Windows 2000. If the disk that failed contained your
Windows 2000 installation, you will have to reinstall Windows 2000 at this point.
Because Windows 2000 will create a new volume during the installation process,
after reinstalling Windows 2000, skip to Step 6.
4. Start Disk Management.
5. Use the steps in the “Creating and formatting a simple volume” step-by-step
section earlier in this chapter to create and format a replacement simple volume
on the new hard disk.
6. Restore all data from tape.
STEP BY STEP
6. If you are recovering from a single disk failure, your nonfailed disk(s) will still con-
tain part of the original spanned volume. The partial volume on this disk(s) must be
deleted. In the bottom right pane of Disk Management, right-click the bar-shaped
area that represents the remaining portion of the spanned volume — this area will
show a status of Failed. From the menu that appears, select Delete Volume.
7. In the Delete Spanned Volume warning dialog box, click Yes. Windows 2000
deletes the remaining portion of the spanned volume.
8. Now that you’ve deleted the remaining portion of the spanned volume, you can
delete the Disk Management listing of the failed hard disk that you replaced in
Step 2. The listing for this disk appears at the bottom of the bottom right pane
in Disk Management with a name of Missing and a status of Offline. Right-click
this disk, and select Remove Disk from the menu that appears. Disk Management
removes the listing for this disk.
9. Use the steps in the “Creating a new spanned volume” step-by-step section
earlier in this chapter to create a new spanned volume.
10. Restore all data from tape.
STEP BY STEP
1. Start Disk Management. Determine the disk (or disks) that has failed — the failed
disk (or disks) will appear with a status of Offline, and the failed volume may show
a status of Failed.
2. Replace the failed hard disk or disks.
3. Reboot the computer to Windows 2000.
4. Start Disk Management.
4701-1 ch06.f.qc 4/24/00 09:15 Page 401
5. The Write Signature and Upgrade Disk Wizard appears. Use this wizard and the
steps in the “Upgrading a Disk from Basic to Dynamic” section earlier in this
chapter to upgrade the new hard disk or disks.
6. If you are recovering from a single disk failure, your nonfailed disk(s) will still con-
tain part of the original striped volume. The partial volume on this disk(s) must be
deleted. In the bottom right pane of Disk Management, right-click the bar-shaped
area that represents the remaining portion of the striped volume — this area will
show a status of Failed. From the menu that appears, select Delete Volume.
7. In the Delete Striped Volume warning dialog box, click Yes. Windows 2000
deletes the remaining portion of the striped volume.
8. Now that you’ve deleted the remaining portion of the striped volume, you can
delete the Disk Management listing of the failed hard disk that you replaced in
Step 2. The listing for this disk appears at the bottom of the lower right pane in
Disk Management with a name of Missing and a status of Offline. Right-click this
disk, and select Remove Disk from the menu that appears. Disk Management
removes the listing for this disk.
9. Use the steps in the “Creating a striped volume” step-by-step section earlier in
this chapter to create a new striped volume.
10. Restore all data from tape.
STEP BY STEP
1. Start Disk Management. Determine the disk that has failed — the failed disk will
appear with a status of Offline, and the failed volume may show a status of Failed
Redundancy.
2. Replace the failed hard disk.
4701-1 ch06.f.qc 4/24/00 09:15 Page 402
3. Reboot the computer to Windows 2000. If the failed disk contained your
Windows 2000 installation folder, use your fault tolerance boot disk to boot
the computer to Windows 2000.
4. Start Disk Management.
5. The Write Signature and Upgrade Disk Wizard appears. Use this wizard and
the steps in the “Upgrading a Disk from Basic to Dynamic” section earlier in this
chapter to upgrade the new hard disk.
6. In the bottom right pane in Disk Management, right-click the bar-shaped area that
represents the volume on the disk in the mirrored volume that is still functional
(Online) — the status of this volume is displayed as Failed Redundancy. From the
menu that appears, select Remove Mirror.
7. In the Remove Mirror dialog box, select the disk with the name Missing. Click
Remove Mirror.
CAUTION
If you select the wrong disk in this step, Windows 2000 will delete all of
the data on your good/nonfailed disk, and you will have to recreate your
mirrored volume and restore all your data from tape.
STEP BY STEP
1. Start Disk Management. Determine the disk that has failed — the failed disk
will appear with a status of Offline, and the failed volume may show a status
of Failed Redundancy.
2. Replace the failed hard disk.
3. Reboot the computer to Windows 2000.
4. Start Disk Management.
5. The Write Signature and Upgrade Disk Wizard appears. Use this wizard and
the steps in the “Upgrading a Disk from Basic to Dynamic” section earlier in this
chapter to upgrade the new hard disk.
6. In the bottom right pane in Disk Management, right-click the bar-shaped area
that represents the volume on any disk in the RAID-5 volume that is still functional
(Online) — the status of this volume is displayed as Failed Redundancy. From the
menu that appears, select Repair Volume.
7. In the Repair RAID-5 Volume dialog box, select the disk that you installed in
Step 2 to replace the failed hard disk. Click OK.
8. Windows 2000 repairs the RAID-5 volume. During this process the status
displayed is “Regenerating.”
4701-1 ch06.f.qc 4/24/00 09:15 Page 404
This chapter introduced several key file system and disk topics:
■ Several file systems are supported by Windows 2000, including FAT, FAT32,
and NTFS. Because of its speed, security, and recoverability, I recommend
using NTFS except when you need to dual boot between Windows 2000
and another operating system.
■ Disk Management is used to perform numerous disk management tasks on
your Windows 2000 computer, such as:
Creating and formatting partitions
Upgrading a disk from basic to dynamic
Reverting a dynamic disk to a basic disk
■ Disk Management is also used to create several different volume types, includ-
ing simple volumes, spanned volumes, striped volumes, mirrored volumes, and
RAID-5 volumes.
■ Disk Defragmenter is used to analyze and defragment volumes.
■ Logical Drives enables you to view logical drive properties, change a logical
drive’s label, and configure several types of security settings on a logical drive.
■ Tips for troubleshooting disks and volumes were presented. Specific steps on
how to recover from disk failure when using a simple volume, spanned volume,
striped volume, mirrored volume, and RAID-5 volume were also covered.
4701-1 ch06.f.qc 4/24/00 09:15 Page 405
405
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about file systems and disks and help you prepare for the
Professional and Server exams:
■ Assessment Questions: These questions test your knowledge of
the file systems and disk topics covered in this chapter.You’ll find
the answers to these questions at the end of this chapter.
■ Scenarios: These situation-based questions challenge you to
apply your understanding of the material to solve a hypothetical
problem. In the two scenarios in this chapter, you’ll be asked to
determine the courses of action you would take to resolve various
disk and volume problems.You don’t need to be at a computer to
do scenarios.The answers to these questions are also presented at
the end of this chapter.
■ Lab Exercises: These exercises are hands-on practice activities
that you perform on a computer.The two labs in this chapter give
you an opportunity to convert from one file system to another;
and to create, configure, and format a simple volume.
Assessment Questions
1. You are choosing a file system for your Windows 2000 Server computer.
You need this computer to support file compression, and you don’t need
to dual boot this computer between Windows 2000 Server and any
other operating system.Which file system should you choose?
A. FAT
B. FAT32
C. HPFS
D. NTFS
4701-1 ch06.f.qc 4/24/00 09:15 Page 406
406
407
Scenarios
The following scenarios provide you with an opportunity to apply the
knowledge you’ve gained in this chapter about troubleshooting disk and
volumes and recovering from disk failure.
408
Lab Exercises
The following two labs are designed to give you practical experience work-
ing with file systems, disks, and volumes on a Windows 2000 computer.
The objective of this lab is for you to gain hands-on experience using the
Convert.exe command-line utility to convert a volume’s file system
from FAT32 to NTFS. In this lab, you’ll convert your computer’s C: drive
to NTFS.
4701-1 ch06.f.qc 4/24/00 09:15 Page 409
409
CAUTION
If your computer is configured to dual boot between Windows 2000 and
another operating system, performing this lab will render the second
operating system unbootable.
If you skip this lab, though, you will be unable to complete most of the
remaining labs in this book, because NTFS is required to install Active
Directory. So, I recommend you use a dedicated hard disk to perform the
labs in this book, or that you give up dual boot capability on the computer
you’re using while you’re preparing for the exams.
The steps below walk you through the process of converting a volume’s
file system on a Windows 2000 Professional computer. The steps used to
perform this task on a Windows 2000 Server computer are identical.
1. Boot your computer to Windows 2000 Professional. Log on as
Administrator.
2. Select Start ➪ Programs ➪ Accessories ➪ Command Prompt.
3. At the command prompt, type convert c: /fs:ntfs and press Enter.
4. Convert.exe notifies you that it can’t gain exclusive access to the C:
drive.Type Y and press Enter to have this utility convert the C: drive
to NTFS when the computer is rebooted.
5. At the command prompt, type exit and press Enter.
6. Select Start ➪ Shut Down.
7. In the “What do you want the computer to do?” drop-down list box,
select Restart, and click OK.The computer shuts down and restarts.
During the reboot process,Windows 2000 converts the C: drive to
NTFS.At the end of the conversion process,Windows 2000 restarts
your computer.
The objective of this lab is for you to gain hands-on experience using Disk
Management on a Windows 2000 computer.You’ll convert a basic disk to
a dynamic disk; and then create, configure, and format a simple volume.
This lab is optional because it requires a second hard disk in your computer.
4701-1 ch06.f.qc 4/24/00 09:15 Page 410
410
411
Assessment Questions
1. D. NTFS is the only file system supported by Windows 2000 that
supports file compression.
2. A. If you need to dual boot between Windows 2000 and Windows
95 and MS-DOS, your only file system choice is FAT.
3. B. The Convert.exe command is used to change a volume’s file
system from FAT to NTFS.
4. D. A basic disk can contain a maximum of four partitions: it can contain
up to four primary partitions, but only one extended partition.
4701-1 ch06.f.qc 4/24/00 09:15 Page 412
412
Scenarios
Troubleshooting Disks and Volumes
1. The Online (Errors) status value indicates that Disk Management has
found I/O errors on a portion of a dynamic disk. Use the Reactivate
Disk command in Disk Management to try to return this disk to a
status value of Online.
2. The Foreign status value indicates that the disk in question is from
another Windows 2000 computer, that it has been installed on this
computer, but it has not yet been set up for use on this computer.
Use the Import Foreign Disks command in Disk Management to set
up the disk for this computer and to achieve a status value of Online.
3. The Failed status value for the volume indicates that Windows 2000 is
unable to automatically activate the volume. Since the status value for
the disk that contains this volume is Online, try using the Reactivate
Volume command in Disk Management to return the volume to a
status value of Healthy.
413
Network
EXAM Directory Services
MATERIAL
EXAM OBJECTIVES
C HAP TE R
7
Installing and Configuring
DNS and Active Directory
415
4701-1 ch07.f.qc 4/24/00 09:16 Page 416
Chapter Pre-Test
1. What does DNS stand for?
2. Define the term host name resolution.
3. The DNS domain at the top of the DNS domain namespace is
called the ________ domain. This domain is often represented
by a _____.
4. List four types of DNS servers.
5. What does TTL stand for?
6. What two prerequisites must be met prior to installing
Active Directory?
4701-1 ch07.f.qc 4/24/00 09:16 Page 417
What Is DNS?
DNS stands for Domain Name System.The primary purpose of DNS, which
consists of a set of specified naming rules and implementation standards, is to
provide host name resolution.
Host name resolution is the process of resolving a computer’s user-friendly
host name (such as www.idgbooks.com) to the numerical IP address of
that computer. The reason host name resolution is important is because
TCP/IP-based applications and utilities, such as Web browsers, use IP
addresses to communicate with other computers, while users prefer to use
easily remembered host names to access other computers.
In the next several sections I’ll explain what DNS has to do with Active
Directory, talk a little about DNS domain names and naming conventions,
explain in detail how host name resolution works using DNS, introduce
you to zones and other basic DNS terminology, and finally, describe the
many DNS server roles.
TIP
The actual installation of DNS can take place either prior to installing
Active Directory, or as part of the Active Directory installation.
The DNS domains in the next level down, under top-level domains, are
called second-level domains. These domains are subdomains of top-level
domains. Many businesses have a second-level domain that is a subdomain
of the com domain, such as microsoft.com. Each person or organization
using a second-level domain on the Internet is responsible for registering
that unique DNS domain name with the appropriate authority — the
appropriate authority being the one that manages the top-level domain
containing the second-level domain. If your organization’s network is never
connected to the Internet, you can use any top-level and second-level
domain names you want to, and you don’t have to register these names
with any naming authority.
4701-1 ch07.f.qc 4/24/00 09:16 Page 419
Root Domain
Top-Level Domains
Second-Level
Domains
microsoft idgbooks
You may be wondering, at this point, if DNS domains are the same as
Windows 2000 domains. In short, no, they’re not the same. However,
Windows 2000 domains directly correspond to and have the same names
as their corresponding DNS domains. In addition, Windows 2000 Active
Directory is designed to be tightly integrated with DNS.
DNS domain names (also called fully qualified domain names [FQDNs])
can contain a maximum of 63 characters. Allowed characters include
uppercase letters (A–Z), lowercase letters (a–z), numbers (0–9), and the
hyphen (-). Periods are used to separate domain and subdomain names, for
example, microsoft.com.
So, suppose that a user wants to access the Microsoft Web site at
www.microsoft.com.The user, in this example, is using a Windows 2000
Professional computer on IDG Books Worldwide, Inc.’s network. Here’s a
detailed account of how name resolution is accomplished in this case:
1. The user types in a URL of www.microsoft.com in Internet
Explorer on his or her Windows 2000 Professional computer.
2. Internet Explorer asks the DNS client software (on the user’s
computer) to determine the IP address of www.microsoft.com.
3. The DNS client software (on the user’s computer) sends a request
(called a query) to the DNS server on the IDG Books Worldwide, Inc.
network, asking that server to resolve www.microsoft.com to an IP
address.
4. Because the DNS server on the IDG Books Worldwide, Inc. network
primarily contains host name resolution information for only the com-
puters in the idgbooks.com domain, it sends a query to a DNS server
in the root domain, asking for the IP address of www.microsoft.com.
5. The DNS server in the root domain provides the IDG Books DNS
server with the IP address of a DNS server in the com domain that
can help the IDG Books DNS server resolve its query.
6. The IDG Books DNS server sends a query to the DNS server in the
com domain, asking for the IP address of www.microsoft.com.
7. The DNS server in the com domain provides the IDG Books DNS
server with the IP address of a DNS server in the microsoft.com
domain that can help the IDG Books DNS server resolve its query.
8. The IDG Books DNS server sends a query to the DNS server
in the microsoft.com domain, asking for the IP address of
www.microsoft.com.
9. The DNS server in the microsoft.com domain provides the IDG
Books DNS server with the IP address of www.microsoft.com.
10. When the IDG Books DNS server receives the IP address of
www.microsoft.com, it performs two tasks:
It stores the IP address of www.microsoft.com in its cache, so it
TIP
The terms zone and zone file are often used interchangeably.
Zones are not created by default when the DNS Server service is
installed — they are created and configured by an administrator.
DNS servers are computers that have the capability to use DNS to pro-
vide host name resolution to client computers. The Windows 2000 DNS
Server service (or its equivalent), when installed on a server, is what gives
that server the ability to provide host name resolution. A DNS server can
provide host name resolution for more than one zone. In addition, copies
of a zone can exist on multiple DNS servers for the purposes of providing
load balancing and fault tolerance.
On all Windows 2000 DNS servers except Active Directory-integrated
DNS servers, all DNS entries for a zone are contained in a single text file
called a zone file. On Active Directory-integrated DNS servers, DNS
entries are stored in the Active Directory data store instead of in a zone file.
4701-1 ch07.f.qc 4/24/00 09:16 Page 422
A DNS server can play one (or more) of several different roles, depending
on the type of zone(s) the server contains and how the DNS server is con-
figured.The types of roles that a DNS server can perform include:
■ Standard primary: This type of DNS server stores DNS entries (IP
address to host name mapping information and other DNS resource
records) in a zone file that is maintained on this server.The standard
primary server is typically called the primary server for short.The
primary server maintains the master copy of a zone file. Because
of this, when changes need to be made to the zone, they should
be made only on the standard primary server.There can only be
one standard primary server for a zone.
■ Active Directory-integrated (primary): This type of DNS
server is just like a standard primary server, except that it stores DNS
entries in the Active Directory data store, rather than in a zone file.
Because Active Directory supports multiple master replication, there
can be more than one Active Directory-integrated (primary) DNS
server for a zone.When changes need to made to the zone, they can
be made on any Active Directory-integrated (primary) DNS server
that contains the zone.
■ Standard secondary: This type of DNS server stores copies of
zones that it obtains from the standard primary,Active Directory-
integrated (primary), or another standard secondary DNS server.
The standard secondary server is typically called the secondary
server for short.The process of copying a zone to a standard sec-
ondary DNS server is called a zone transfer. Microsoft sometimes
calls this process replication.There can be multiple secondary DNS
servers for a zone.
■ Master: This type of DNS server provides a copy of the zone
to a standard secondary DNS server.The secondary DNS server
receiving the copy of the zone is sometimes called the slave in
this relationship.The types of DNS servers that can function
as masters are standard primary, Active Directory-integrated
(primary), and standard secondary.
■ Caching-only: This type of DNS server does not store any
zones whatsoever. It resolves host names to IP addresses for
client computers, and stores the resulting mapping information
in its cache. If a client computer requests resolution for a host
name that exists in the cache, the DNS server provides the
4701-1 ch07.f.qc 4/24/00 09:16 Page 423
EXAM TIP
DNS topics make up a large portion of the objectives for both the
Network and Directory Services exams. Make sure that you understand
DNS concepts and terminology, and get as much hands-on practice with
DNS as possible before you take these exams.
4701-1 ch07.f.qc 4/24/00 09:16 Page 424
TIP
If you have a DHCP server on your network, and you chose the “Typical
settings” option during the Windows 2000 installation, you probably
need to reconfigure your computer to use a static IP address.
STEP BY STEP
TIP
If you have more than one Local Area Connection, you’ll have to repeat
this process for each one.
4. In the Local Area Connection Properties dialog box, highlight Internet Protocol
(TCP/IP) and click Properties.
5. In the Internet Protocol (TCP/IP) Properties dialog box, select the “Use the
following IP Address” option, and type in a static IP address, subnet mask,
and default gateway. Click OK.
6. In the Local Area Connection Properties dialog box, click OK.
7. Close the Network and Dial-up Connections folder.
STEP BY STEP
1. From the desktop, right-click My Computer and select Properties from the menu
that appears.
2. In the System Properties dialog box, click the Network Identification tab.
3. On the Network Identification tab, click Properties.
4. In the Identification Changes dialog box, click More.
5. In the DNS Suffix and NetBIOS Computer Name dialog box, type your
company’s FQDN in the “Primary DNS suffix of this computer” text box
(for example, mycompany.com). Click OK.
6. In the Identification Changes dialog box, click OK.
7. In the Network Identification dialog box, click OK.
8. On the Network Identification tab, click OK.
9. In the System Settings Change dialog box, click Yes to restart your computer.
STEP BY STEP
1. Place your Windows 2000 Server or Advanced Server compact disc into your
computer’s CD-ROM drive. Select Start ➪ Settings ➪ Control Panel.
2. In the Control Panel dialog box, double-click Add/Remove Programs.
3. In the Add/Remove Programs dialog box, click Add/Remove Windows Components.
4. The Windows Components Wizard starts. In the Windows Components screen,
scroll down and highlight Networking Services. Click Details.
5. In the Networking Services dialog box, select the check box next to Domain
Name System (DNS). Click OK.
6. In the Windows Components screen, click Next.
7. Windows 2000 Setup configures components. In the Completing the Windows
Components Wizard screen, click Finish.
8. Close the Add/Remove Programs dialog box. Close Control Panel.
4701-1 ch07.f.qc 4/24/00 09:16 Page 427
Configuring DNS
Now that you’ve installed the DNS Server service on a Windows 2000
Server/Advanced Server computer, you’re ready to configure it.
Windows 2000 includes a tool specifically designed to help you configure
and manage DNS servers — it’s an administrative tool called DNS.To access
this tool, select Start ➪ Programs ➪ Administrative Tools ➪ DNS.You must
be a member of the Administrators group to use this tool.
Configuring DNS can include many different tasks, such as configuring
a DNS server to be its own DNS client, configuring a server to play one or
more server roles, configuring the properties of a DNS server, configuring
zones, integrating an Active Directory DNS with a non–Active Directory
DNS, managing replication of DNS, and manually creating DNS resource
records. I’ll show you how to perform each of these tasks in the following
sections.
EXAM TIP
The Network exam contains at least five objectives dealing with configur-
ing DNS. Ensure that you understand why and how each configuration is
used, the steps involved in performing each task, and which computer
you need to perform the necessary configuration on.
CAUTION
If you don’t make this configuration change on your DNS server, common
DNS testing utilities and other TCP/IP-based programs on the server
may not function correctly.
The steps involved in configuring the DNS server to be its own client
are fairly straightforward.
4701-1 ch07.f.qc 4/24/00 09:16 Page 428
STEP BY STEP
TIP
If you have more than one Local Area Connection, you’ll have to repeat
this process for each one.
4. In the Local Area Connection Properties dialog box, highlight Internet Protocol
(TCP/IP) and click Properties.
5. In the Internet Protocol (TCP/IP) Properties dialog box, ensure that the “Use the
following DNS server addresses” option is selected. Then, in the Preferred DNS
server text box, type the IP address of this DNS server. Click Advanced.
6. In the Advanced TCP/IP Settings dialog box, click the DNS tab.
7. On the DNS tab, type the FQDN of the DNS domain that this DNS server belongs
to in the “DNS suffix for this connection” text box. Generally it’s okay to accept the
remaining default settings on this tab. Click OK.
8. In the Internet Protocol (TCP/IP) Properties dialog box, click OK.
9. In the Local Area Connection Properties dialog box, click OK.
10. Close the Network and Dial-up Connections folder.
A forward lookup zone is a zone that contains the host name to IP address
mappings and information about available services for either a DNS
domain or a DNS domain and one or more of its subdomains. A reverse
lookup zone is a zone that contains IP address to host name mappings.The
mappings in a reverse lookup zone are the opposite of those contained in a
forward lookup zone. A DNS server uses a forward lookup zone when a
client computer knows the host name, but doesn’t know the associated IP
address. A DNS server uses a reverse lookup zone when a client computer
knows the IP address, but doesn’t know the associated host name.
The following steps explain how to configure a root server.
STEP BY STEP
5. The Root Server screen appears, as shown in Figure 7-3. Notice the two options
available in this screen.
TIP
If your DNS server is connected to the Internet, this screen won’t appear,
because the DNS server will automatically configure itself to use the root
servers on the Internet.
If you want to configure this server to be a root server, accept the default option
of “This is the first DNS server on this network.” Click Next.
If you want this DNS server to use an existing root server on your network, select
the “One or more DNS servers are running on this network” option, and provide
the IP address of a root server on your network that you want this server to use.
Click Next.
6. In the Forward Lookup Zone screen, you can choose whether or not to create
a forward lookup zone now.
If you select the “Yes, create a forward lookup zone” option and click Next, the New
Zone Wizard begins. (This wizard is explained fully in the next sections.) Follow the
instructions presented on-screen to create your forward lookup zone, and a reverse
lookup zone if desired. When you finish creating zones, skip to Step 7.
4701-1 ch07.f.qc 4/24/00 09:16 Page 431
If you select the “No, do not create a forward lookup zone” option, click Next.
7. The Completing the Configure DNS Server Wizard screen appears. Click Finish.
8. The DNS dialog box reappears. This completes the configuration of a root server.
Close the DNS dialog box.
Configuring Interfaces Also notice in Figure 7-4 that the Interfaces tab
appears on top. On this tab, you can limit or specify the network adapters
in this computer that will accept DNS queries from client computers.
There are two basic options on this tab:
■ All IP addresses: Selecting this option enables the DNS server
to accept client DNS queries that are addressed to any network
adapter in the server.This is the default setting.
■ Only the following IP addresses: Selecting this option
enables you to specify which network adapter(s) in the server
will accept client DNS queries. Once configured, the server
will only accept client DNS queries that are addressed to the
specified network adapters (which have been identified on
this tab by their associated IP addresses).
This feature is designed to help you protect your DNS server from
attack through a network adapter that is connected to a public network,
such as the Internet.
Configuring Forwarders The next tab in the DNS server’s Properties dialog
box is the Forwarders tab, which is shown in Figure 7-5.
On this tab, you can configure the DNS server to use one or more other
existing DNS servers on your network as a forwarder. If you select this
option, you need to specify the IP address of at least one other DNS server
that will serve as a forwarder for this server.
TIP
If this DNS server is configured to be a root server, the options on this
tab are grayed out. You can’t configure a root server to use a forwarder.
Once you select the “Enable forwarders” check box on this tab and
specify an appropriate IP address, the DNS server that uses the specified IP
address automatically becomes a forwarder — no additional configuration
on the forwarder is required.
If you configure this server to use a forwarder, the “Do not use recursion”
option becomes available. Select this check box if you don’t want this DNS
server to attempt to contact a root server to resolve a DNS query if the for-
warder is unable to resolve the query.
I recommend that you select the “Do not use recursion” option because it
eliminates fruitless duplication of effort by this DNS server. If the forwarder
isn’t able to resolve the query, it’s unlikely that this server will be able to,
either.
Configuring Advanced DNS Server Options The next tab in the DNS
server’s Properties dialog box is the Advanced tab, which is shown in
Figure 7-6.
In addition to displaying the version number of the DNS Server service,
this tab offers several configurable server options:
■ Disable recursion: The term recursion refers to repeating a process
until a solution is found. By default, recursion is enabled on DNS
servers.This means that a DNS server will contact as many other
DNS servers as necessary, one after another, to resolve a client DNS
query. Selecting the “Disable recursion” option prevents the DNS
server from contacting any other DNS servers to resolve a query. If
the DNS server does not have the mapping information required
to resolve the query, it provides the requesting client with the IP
address of the DNS server it would have contacted first if recursion
were enabled. It’s then up to the client computer to contact the
referred DNS server in an attempt to resolve the host name.
4701-1 ch07.f.qc 4/24/00 09:16 Page 434
the requesting client each time the host name is requested, thereby
providing load balancing for the requested servers. If this option is
deselected, the DNS server responds with the IP address of the first
mapping entry in its zone that matches the client’s query.
■ Enable netmask ordering: This option, which is selected by
default, determines how a DNS server responds when it receives
a query to resolve a host name of a computer that has multiple
network adapters.When this option is selected, the DNS server
attempts to respond with the associated IP address that is physically
located on the same subnet as the client, thus avoiding unnecessary
routing traffic. If this option is deselected, the DNS server uses
round robin (if enabled) to respond to client queries.
■ Secure cache against pollution: This option determines how
much information gathered by a DNS server (when it must contact
multiple DNS servers to resolve a query) is cached for future use.
By default, all responses to queries are cached.When this option
is selected, only the final answer to the query is cached.This
option is not selected by default.
The next configurable option on the Advanced tab is “Name checking.”
When you manually create a resource record, the DNS server checks the
host name contained in this record, and verifies that it meets certain criteria.
The drop-down list box contains three name checking methods that the
DNS server can use: Strict RFC (ANSI), Non-RFC (ANSI), and Multibyte
(UTF8). Multibyte (UTF8) is the default setting, and permits the DNS
server to recognize more characters than either of the other two options. I
recommend that you accept the default setting, unless you are using other
DNS servers on your network that don’t support this option.
The next option on this tab is “Load zone data on startup.”This option
determines where the DNS server will look for its initialization informa-
tion when the DNS Server service starts.The three options available in the
drop-down list box are “From registry,” “From file,” and “From Active
Directory and registry.” The default setting is “From Active Directory and
registry,” and is appropriate for most situations.
The last option on the Advanced tab is “Enable automatic scavenging of
stale records.” Selecting this option enables scavenging on the DNS server.
Scavenging is the process of searching for and deleting stale resource records
in zones. If you select this option, you can configure an additional option
that defines how old a record must be in order to be considered stale.The
4701-1 ch07.f.qc 4/24/00 09:16 Page 436
CAUTION
I recommend that you read all of the on-line Windows 2000 Help infor-
mation on scavenging before you implement this feature. If this feature is
incorrectly implemented, DNS resource records that you want to keep
may be deleted.
Configuring Root Hints The next tab in the DNS server’s Properties dialog
box is the Root Hints tab, which is shown in Figure 7-7. Notice the server
names and IP addresses listed on this tab.
Root hints are server name and IP address combinations that point to
root servers located either on the Internet or on your organization’s private
network.The Root Hints tab contains a list of DNS servers that this DNS
server can contact to resolve client DNS queries for host names that reside
in another DNS domain.
4701-1 ch07.f.qc 4/24/00 09:16 Page 437
TIP
You can’t configure root hints on a Windows 2000 DNS server that is a
root server.
STEP BY STEP
Also notice that the option next to “Active Directory-integrated” is grayed out — this
option is only available after you install Active Directory and the DNS Server service
on a Windows 2000 Server/Advanced Server computer.
Accept the default option of “Standard primary” and click Next.
6. In the Zone Name screen, type in the name of the zone you are creating. This
name is usually the FQDN of the DNS domain that the zone will contain, such
as microsoft.com. Click Next.
7. The Zone File screen appears. In this screen, you can either create a new zone file
for the new zone, or configure the new zone to use an existing file. I recommend
you accept the default option of “Create a new file with this file name,” and also
that you accept the default filename presented. Click Next.
4701-1 ch07.f.qc 4/24/00 09:17 Page 440
8. The Completing the New Zone Wizard screen appears. Click Finish.
9. The DNS dialog box reappears. Notice that the new zone you created appears
in the right pane.
STEP BY STEP
CROSS-REFERENCE
For more information on network IDs, subnets, and other TCP/IP issues,
see Chapter 16.
4701-1 ch07.f.qc 4/24/00 09:17 Page 441
7. The Zone File screen appears. In this screen, you can either create a new zone file
for the new zone, or configure the new zone to use an existing file. I recommend you
accept the default option of “Create a new file with this file name,” and also that you
accept the default filename presented. Click Next.
8. The Completing the New Zone Wizard screen appears. Click Finish.
9. The DNS dialog box reappears. Notice that the new zone you created appears
in the right pane.
Now that you’ve created your forward lookup and reverse lookup
zones, you may want to consider configuring the properties of these zones
if the default settings don’t meet your needs.
STEP BY STEP
1. Start the DNS administrative tool if it is not already running. (Select Start ➪
Programs ➪ Administrative Tools ➪ DNS.)
4701-1 ch07.f.qc 4/24/00 09:17 Page 442
2. In the DNS dialog box, click the + next to the DNS server’s name in the left pane
if this computer is not already expanded.
3. If you want to configure a forward lookup zone, click the + next to the Forward
Lookup Zones folder in the left pane.
If you want to configure a reverse lookup zone, click the + next to the Reverse
Lookup Zones folder in the left pane.
In the left pane, highlight the specific zone you want to configure. Select
Action ➪ Properties.
4. The zone’s Properties dialog box appears, as shown in Figure 7-10. Notice the
five tabs in this dialog box.
Figure 7-10 shows the zone properties of a standard primary forward lookup zone.
On the General tab, notice that the status of the zone and type of the zone are indi-
cated. You can pause the zone (if it is running), or start the zone (if it is paused) on
this tab. You can also change the type of the zone on this tab. (I’ll discuss changing
zone types in more depth later in this chapter.)
Also notice that the zone filename is displayed on the General tab, and that you can
configure the zone to allow dynamic updates. (See the section on “Configuring
zones for dynamic updates” later in this chapter for more information.)
Make any appropriate configurations on this tab, and click the Start of Authority
(SOA) tab.
4701-1 ch07.f.qc 4/24/00 09:17 Page 443
The default settings on this tab are acceptable in most situations, with the
exception of the entry in the “Responsible person” text box. (This entry should
be the e-mail address of the DNS administrator responsible for maintaining this
DNS server.) That said, here are descriptions of the each of the configurable
options on the Start of Authority (SOA) tab:
Serial number: This number represents the version number, if you will, of
the zone. Each time a resource record is added, modified, or deleted from a
zone, the serial number increases by one. Secondary servers use the serial
number to determine whether they have the most recent copy of the zone.
This number is normally not modified by administrators.
Primary server: This is the host name of this DNS server. This field should
not be modified unless you designate a different server to be the standard
primary server for this zone.
Responsible person: This field should contain the e-mail address of the
administrator responsible for this DNS server. Normally, e-mail addresses
contain an @ sign, for example, [email protected]. In this field, you
should not use the @ sign — use a period (.) instead of the @ sign. The previ-
ous e-mail name would be entered in this field as alan_carter.usa.net.
4701-1 ch07.f.qc 4/24/00 09:17 Page 444
This tab shows a list of known DNS servers for this zone. By default, only the primary
server for the zone is listed. You must manually add entries for each secondary server
for the zone.
Use the Add, Edit, and Remove command buttons on this tab to make any
necessary configurations. Then click the WINS tab.
7. The WINS tab appears, as shown in Figure 7-13.
On this tab you can configure the DNS server to query a specified WINS
server to resolve host names that the DNS server is unable to resolve by
searching the resource records contained in this zone. A WINS server is
used to resolve NetBIOS computer names into IP addresses. For more
information on WINS, see chapter 16.
TIP
Reverse lookup zones don’t have a WINS tab — they have a WINS-R tab.
The WINS-R tab is used to configure the DNS server to use a specified
WINS server to resolve IP addresses that the DNS server is unable to
resolve by searching the resource records in this zone.
To enable WINS lookup, select the check box next to “Use WINS forward lookup”
and add the IP address of at least one WINS server that you want this DNS server
to use.
4701-1 ch07.f.qc 4/24/00 09:17 Page 446
Make any appropriate configurations on this tab, and click the Zone Transfers tab.
8. The Zone Transfers tab appears, as shown in Figure 7-14.
The settings on this tab determine how this zone handles the process of copying
this zone (in other words, performing zone transfers) to secondary servers. By
default, the zone is configured to allow zone transfers to any secondary DNS
server that requests a copy of the zone. If you want to protect your zone’s data,
you can configure the zone to only transfer copies of the zone to servers listed
on the Name Servers tab, or only to a list of specified servers.
You can also specify which secondary servers will be notified of updates to the zone.
This means that when the zone’s serial number increases, the specified secondary
servers will be notified of the change. By default, all servers listed on the Name
Servers tab are notified of updates.
Make any appropriate configurations on this tab, and click OK.
secondary zone is created on a different server than the DNS server that
contains the standard primary zone. In addition, the zone name of a stan-
dard secondary zone must match the name of the standard primary zone
as it will be copied to the secondary server.
A standard secondary zone can be either a forward lookup or reverse
lookup zone.
In the remainder of this section I’ll explain how to create and configure
a standard secondary zone.
STEP BY STEP
STEP BY STEP
TIP
When a client computer refreshes a record, the timestamp on the record
is updated, and the no-refresh interval begins again.
Microsoft recommends that you set the refresh interval to the same length of time
as the no-refresh interval. The default time interval for both options is seven days.
Select and/or configure the appropriate options. Click OK.
5. If you are configuring a standard primary zone for dynamic updates and you
enabled scavenging, a DNS warning dialog box appears. Click Yes to continue.
6. The zone’s Properties dialog box reappears. Click OK.
STEP BY STEP
create this secondary zone, you must assign it the same name as the
Active Directory-integrated zone, and specify the IP address of the
Active Directory-integrated DNS server.
TIP
If you want the non–Active Directory DNS server to maintain a copy of
more than one Active Directory-integrated zone, you must create a sec-
ondary zone for each Active Directory-integrated zone that you want the
server to maintain a copy of.
Transfers tab in the standard primary zone’s Properties dialog box. (See the
“Configuring a standard primary zone” section earlier in this chapter for
details on how to perform this task.) Figure 7-18 shows the Zone Transfers
tab after it has been configured to limit zone transfers to a specified list of
DNS servers.
DNS servers support a wide variety of resource record types. Each type of
resource record has a different purpose.Table 7-2 lists and describes the types
of resource records supported by the Windows 2000 DNS Server service.
TABLE 7-2 Windows 2000 DNS Resource Record Types
Record Type Description
Now that you have a good understanding of the different types of DNS
resource records, I’ll show you how to manually create DNS resource records.
STEP BY STEP
In the Name text box, type the name of the host you want to add a record for.
Then, in the IP address box, type the IP address of the host.
Finally, if you want to create an associated pointer (reverse lookup) record,
select the check box next to “Create associated pointer (PTR) record.”
Click Add Host.
5. A DNS message appears, indicating that the host record was successfully created.
Click OK.
6. Repeat Steps 4 and 5 until you have added all of the new host records you need.
Then, in the New Host dialog box, click Done.
The second way involves creating new zones and is called “creating
delegated zones.” This process involves two steps: first, you create a new
standard primary or Active Directory-integrated zone to implement each
new subdomain; and second, you configure zone delegation for each of
the newly created zones.The key point to remember about delegation is
that it must be performed on the standard primary or Active Directory-
integrated zone that contains the parent domain of the new DNS subdo-
main(s). For example, suppose that I create two new zones to implement
two new subdomains (for example, marketing.microsoft.com and
development.microsoft.com). I then need to configure delegation
for the two new zones on the standard primary or Active Directory-
integrated zone that contains the microsoft.com domain.
TIP
If you create the zones for the new subdomains on the Windows 2000
DNS server that contains the standard primary or Active Directory-inte-
grated zone for the parent domain, delegation is automatically configured
by Windows 2000, and you can skip that part of the process.
STEP BY STEP
In the next section I’ll explain how to create and delegate a new zone for
a new subdomain. Remember, if you create the zones for the new subdo-
mains on the Windows 2000 DNS server that contains the standard primary
or Active Directory-integrated zone for the parent domain, delegation is
automatically configured by Windows 2000, and you can skip the steps in
Part 2 of this process.
STEP BY STEP
1. Start the DNS administrative tool if it is not already running. (Select Start ➪
Programs ➪ Administrative Tools ➪ DNS.)
2. In the left pane, click the + next to the name of the DNS server that contains the
standard primary or Active Directory-integrated zone that contains the parent
domain of the subdomain you just created.
3. In the left pane, click the + next to the Forward Lookup Zones folder.
In the left pane, highlight the parent domain. Select Action ➪ New Delegation.
4. The New Delegation Wizard begins. Click Next.
5. The Delegated Domain Name screen appears. In the “Delegated domain” text
box, type the name of the subdomain, for example, marketing. Click Next.
4701-1 ch07.f.qc 4/24/00 09:17 Page 461
6. The Name Servers screen appears. On this screen, specify the names and asso-
ciated IP addresses of all DNS servers you plan to configure to maintain a copy
of the zone you created in Part 1. The list you create here is a DNS referral list
that this DNS server will use to refer other DNS servers attempting to resolve
names in the new, delegated zone.
TIP
Listing servers here does not cause a copy of the zone to be automati-
cally replicated to these DNS servers — you’ll have to configure these
servers as secondary servers (or as Active Directory-integrated servers)
in order for them to receive a copy of the zone.
You must add at least one server name and IP address to this screen in order to
continue. To add a server name and IP address to the list, click Add.
7. The New Resource Record dialog box appears. In the Server name text box,
type the name of the server you want to add. In the IP address box, type the IP
address of the server you want to add. Click Add. Click OK.
8. Repeat Steps 6 and 7 until you are finished adding server names and IP
addresses. Figure 7-21 shows the Name Servers screen after server names
and IP addresses have been added. Click Next.
STEP BY STEP
TIP
If you have more than one Local Area Connection, you’ll have to repeat
this process for each one.
4. In the Local Area Connection Properties dialog box, highlight Internet Protocol
(TCP/IP) and click Properties.
5. In the Internet Protocol (TCP/IP) Properties dialog box, ensure that the “Use the
following DNS server addresses” option is selected. Then, in the Preferred DNS
server text box, type the IP address of the DNS server you want this computer to
use. You can also specify, in the “Alternate DNS server” text box, an IP address of
an alternate DNS server that this computer will use if the preferred DNS server is
not available. Click Advanced.
6. In the Advanced TCP/IP Settings dialog box, click the DNS tab.
7. On the DNS tab, type the FQDN of the DNS domain that the computer you’re
configuring belongs to in the “DNS suffix for this connection” text box. Generally
you can accept the remaining default settings on this tab. Click OK.
8. In the Internet Protocol (TCP/IP) Properties dialog box, click OK.
9. In the Local Area Connection Properties dialog box, click OK.
10. Close the Network and Dial-up Connections folder.
4701-1 ch07.f.qc 4/24/00 09:17 Page 463
The Monitoring tab appears, as shown in Figure 7-22. Notice the types
of testing that you can configure on this tab.Also notice that monitoring is
not configured, by default.
There are two types of tests that you can configure on the Monitoring
tab: a simple query, and a recursive query.A simple query is a query that this
DNS server can resolve without contacting any other DNS servers. In
other words, it’s a query for a resource record in one of the zones that this
DNS server contains. If you select the check box next to “A simple query
against this DNS server” and then click Test Now, you’ll be instructing
your DNS server to immediately test itself to see if it can resolve a standard
client DNS query.
The results of this test are displayed in the Test results box at the bottom
of the Monitoring tab. If a PASS result is displayed, this indicates that the
DNS Server service was successfully installed on the computer, and that
this DNS server can resolve queries. Instead of clicking Test Now, you can
configure the DNS server to automatically perform the simple query test
at the intervals you specify.This type of testing can be useful for monitor-
ing your DNS server.
4701-1 ch07.f.qc 4/24/00 09:17 Page 465
A recursive query is a query that this DNS server can’t resolve by itself — it
must contact one or more additional DNS servers to resolve the query. If
you select the check box next to “A recursive query to other DNS servers”
and then click Test Now, you’ll be instructing your DNS server to immedi-
ately query another DNS server in an attempt to resolve the query. The
results of this test are displayed in the Test results box at the bottom of the
Monitoring tab. Or, instead of clicking Test Now, you can configure the
DNS server to automatically perform this test at the intervals you specify.
This type of testing can also be useful for monitoring your DNS server.
Troubleshooting DNS
There are several tools you can use when you need to troubleshoot a DNS
problem, including the Monitoring tab, Nslookup.exe, the DNS Server
log in Event Viewer,Windows 2000 Help, and the Logging tab. I’ll discuss
each of these resources in the sections that follow.
Using the Monitoring Tab You can use the Monitoring tab in a DNS server’s
Properties dialog box to determine whether the DNS server can resolve a
query, as explained in the previous section.
STEP BY STEP
USING NSLOOKUP.EXE
8. When you’re finished using Nslookup.exe, type exit and press Enter to close
Nslookup.exe. Then type exit and press Enter to close the Command Prompt.
4701-1 ch07.f.qc 4/24/00 09:17 Page 467
Using the DNS Server Log Another DNS troubleshooting tool is the DNS
Server log in Event Viewer.You can use this tool to view event detail about
DNS Server service events. Sometimes the detailed information displayed
can be useful for troubleshooting DNS problems.
STEP BY STEP
1. From the desktop, select Start ➪ Programs ➪ Administrative Tools ➪ Event Viewer.
2. In the left pane of the Event Viewer dialog box, highlight the DNS Server log.
The DNS Server log is displayed in the right pane, as shown in Figure 7-24.
To view the detail on a specific DNS event, double-click that event in the right pane.
3. The Event Properties dialog box is displayed, as shown in Figure 7-25. Notice the
detailed description of the DNS event and possible solutions listed.
4701-1 ch07.f.qc 4/24/00 09:17 Page 468
Also notice the up arrow and down arrow in this dialog box. You can use these
buttons to view event detail for other events in the list. When you’re finished
viewing event details, click OK.
4. Close Event Viewer.
Using Windows 2000 Help You can also use Windows 2000 Help to obtain a
wealth of information on common DNS problems.Windows 2000 Help is a
good troubleshooting resource because it contains detailed descriptions of
many specific DNS problems and recommended solutions to these problems.
STEP BY STEP
To access any of the topics listed, click the topic in the right pane.
6. When you are finished using Windows 2000 Help, close the Windows 2000
dialog box.
Using the Logging Tab Finally, you can use the Logging tab in a DNS
server’s Properties dialog box to create detailed logs of DNS activity.These
logs can be particularly helpful when troubleshooting DNS. By default,
logging is not enabled on a Windows 2000 DNS server.
To access the Logging tab, select Start ➪ Programs ➪ Administrative Tools
➪ DNS.Then, in the DNS dialog box, highlight the name of the DNS server
for which you want to configure logging. Then select Action ➪ Properties.
Finally, in the DNS server’s Properties dialog box, click the Logging tab.
4701-1 ch07.f.qc 4/24/00 09:17 Page 470
The Logging tab appears, as shown in Figure 7-27. Notice the various
logging options, and that none of these options are selected by default.
Also notice, in Figure 7-27, the location of the log file.The DNS log file
is stored as %SystemRoot%\system32\dns\dns.log. (Remember that
SystemRoot represents the folder that Windows 2000 is installed in.)
Each of the logging options on the Logging tab represents a specific type
of DNS event. For example, selecting the check box next to Query causes
each query received to be logged. Likewise, selecting the check box next to
Update causes each resource record update request received to be logged.
To enable logging, select the check box(es) next to the events you want
logged, and click OK.To view the log file after logging has been enabled,
use Notepad to open the %SystemRoot%\system32\dns\dns.log file.
CROSS-REFERENCE
See Chapter 2 for detailed information on how Active Directory is
implemented and for practical tips on planning for Active Directory on
your network.
4701-1 ch07.f.qc 4/24/00 09:17 Page 472
Windows 2000 includes a wizard that helps you install Active Directory,
called the Active Directory Installation Wizard.There are two ways to start
this wizard:
■ From the desktop, select Start ➪ Run. In the Run dialog box, type
dcpromo and click OK.
■ From the desktop, select Start ➪ Programs ➪ Administrative Tools ➪
Configure Your Server.Then, in the Windows 2000 Configure Your
Server dialog box, click the Active Directory link. On the Active
Directory page, scroll down and click Start the Active Directory
wizard.
In the next several sections, I’ll show you how to install Active
Directory. Because the installation steps vary depending on the computer’s
role in Active Directory and your network configuration, I’ll try to cover
the most common installation scenarios you’ll encounter.
CAUTION
The Active Directory Installation Wizard requires you to restart your
computer at the end of the installation process. Because of this, con-
sider performing this task at a time when service to clients won’t be
interrupted by a shutdown and restart.
4701-1 ch07.f.qc 4/24/00 09:17 Page 473
STEP BY STEP
1. Start the Active Directory Installation Wizard. (Select Start ➪ Run. In the Run
dialog box, type dcpromo and click OK.)
2. The Active Directory Installation Wizard starts. Click Next.
3. The Domain Controller Type screen appears. Accept the default option of “Domain
controller for a new domain” and click Next.
4. The Create Tree or Child Domain screen appears. Accept the default option of
“Create a new domain tree” and click Next.
5. The Create or Join Forest screen appears. Accept the default option of “Create a
new forest of domain trees” and click Next.
6. The New Domain Name screen appears. In the “Full DNS name for new domain”
text box, type the FQDN of the new domain. Figure 7-28 shows this screen after
the name of the new domain has been entered. Click Next.
7. The NetBIOS Domain Name screen appears. Accept the default name displayed,
and click Next.
8. The Database and Log Locations screen appears. In this screen, you specify the
location where the Active Directory database and log will be stored. Microsoft rec-
ommends that, for best recoverability, you store the database and log on separate
physical hard disks. However, the default locations are on the same hard disk. Either
accept the default locations or type in the locations you want to use and click Next.
4701-1 ch07.f.qc 4/24/00 09:17 Page 474
9. The Shared System Volume screen appears. On this screen you specify the location
of the folder that will be shared as the system volume. This folder must be located
on a Windows 2000 NTFS volume. Either accept the default location or type in
the location you want to use and click Next.
10. If you have not previously configured a DNS server on your network, or if this
computer is not correctly configured to use a DNS server, the Active Directory
Installation Wizard may display a message indicating that it can’t contact the
DNS server. If this message is displayed, click OK.
11. If you don’t have a DNS server on your network, or if your DNS server does not
support dynamic updates, the Configure DNS screen appears, as shown in
Figure 7-29.
If you haven’t yet installed a DNS server on your network, accept the default
option of “Yes, install and configure DNS on this computer.”
If you have a DNS server but it doesn’t support dynamic updates, select the “No,
I will install and configure DNS myself” option.
Click Next.
12. The Permissions screen appears.
If your network includes Windows NT 4.0 Server computers as well as Windows
2000 Server computers, accept the default option of “Permissions compatible
with pre-Windows 2000 Servers.”
4701-1 ch07.f.qc 4/24/00 09:17 Page 475
If the servers on your network all run Windows 2000, select the “Permissions
compatible only with Windows 2000 servers” option.
Click Next.
13. The Directory Services Restore Mode Administrator Password screen appears.
In this screen, type in and confirm an Administrator password that will be used if
Active Directory ever needs to be restored on this computer from a backup. I rec-
ommend that you write down this password and store it in a safe place. Click Next.
14. The Summary screen appears, summarizing the choices you selected while using
this wizard. If you are satisfied with the configurations, click Next. (Otherwise, you
can click Back to change the options you selected.)
15. The wizard installs and configures Active Directory. This process may take several
minutes to complete.
16. The Completing the Active Directory Installation Wizard screen appears. Click Finish.
17. When the Active Directory Wizard dialog box appears, click Restart Now to
restart your computer and complete the Active Directory installation.
If you selected the “No, I will install and configure DNS myself ” option
in Step 11 because your DNS server doesn’t support dynamic updates, you
will need to manually add Active Directory resource records to the zone
file on your DNS server.
To do this, first copy the SystemRoot\System32\Config\Netlogon.
dns file from the server on which you installed Active Directory to your
DNS server.Then, on the DNS server, use your favorite text editor to copy
the contents of this file and then paste these contents onto the end of the zone
file of the DNS domain with the same name as the Windows 2000 domain
you created during the Active Directory installation process.
TIP
I recommend that you reboot your DNS server and your new Windows
2000 domain controller after you complete this process to ensure that the
changes to the DNS server are correctly recognized by the Windows 2000
domain controller.
4701-1 ch07.f.qc 4/24/00 09:17 Page 476
TIP
In these steps, I assume that you have previously configured the addi-
tional server as a client of a DNS server that supports dynamic updates.
STEP BY STEP
Select the option next to “Additional domain controller for an existing domain” and
click Next.
4. The Network Credentials screen appears. Type in the user name, password, and
domain name of the Administrator account for the domain. Figure 7-31 shows the
Network Credentials screen after this information has been entered. Click Next.
5. The Additional Domain Controller screen appears. Type in the FQDN of the
Windows 2000 domain to which this domain controller will belong. You can
browse for the domain name if you don’t know it. Click Next.
6. The Database and Log Locations screen appears. In this screen, you specify the
location where the Active Directory database and log will be stored. Microsoft rec-
ommends that, for best recoverability, you store the database and log on separate
physical hard disks. However, the default locations are on the same hard disk. Either
accept the default locations or type in the locations you want to use and click Next.
7. The Shared System Volume screen appears. On this screen you specify the location
of the folder that will be shared as the system volume. This folder must be located
on a Windows 2000 NTFS volume. Either accept the default location or type in
the location you want to use and click Next.
8. The Directory Services Restore Mode Administrator Password screen appears. In
this screen, type in and confirm an Administrator password that will be used if Active
Directory ever needs to be restored on this computer from a backup. Click Next.
4701-1 ch07.f.qc 4/24/00 09:17 Page 478
9. The Summary screen appears, summarizing the choices you selected while using
this wizard. If you are satisfied with the configurations, click Next. (Otherwise, you
can click Back to change the options you selected.)
10. The wizard installs and configures Active Directory. This process may take several
minutes to complete.
11. The Completing the Active Directory Installation Wizard screen appears. Click Finish.
12. When the Active Directory Wizard dialog box appears, click Restart Now to
restart your computer and complete the Active Directory installation.
STEP BY STEP
1. Start the Active Directory Installation Wizard. (Select Start ➪ Run. In the Run dialog
box, type dcpromo and click OK.)
2. The Active Directory Installation Wizard starts. Click Next.
3. The Domain Controller Type screen appears. Accept the default option of
“Domain controller for a new domain” and click Next.
4. The Create Tree or Child Domain screen appears. Select the option “Create a
new child domain in an existing domain tree” and click Next.
4701-1 ch07.f.qc 4/24/00 09:17 Page 479
5. The Network Credentials screen appears. Type in the user name, password, and
domain name of the Administrator account for the parent domain of the new child
domain you are creating. Click Next.
6. The Child Domain Installation screen appears. In the “Parent domain” text box,
type the name of the parent domain — in other words, the name of the domain in
which you are creating a new child domain. In the “Child domain” text box, type
the name of the new child domain. Figure 7-32 shows this screen after it has
been configured. Click Next.
7. The NetBIOS Domain Name screen appears. Accept the default name displayed,
and click Next.
8. The Database and Log Locations screen appears. In this screen, you specify the
location where the Active Directory database and log will be stored. Either accept
the default locations or type in the locations you want to use and click Next.
9. The Shared System Volume screen appears. On this screen you specify the location
of the folder that will be shared as the system volume. This folder must be located
on a Windows 2000 NTFS volume. Either accept the default location or type in the
location you want to use, and then click Next.
10. The Permissions screen appears.
If your network includes Windows NT 4.0 Server computers as well as Windows
2000 Server computers, accept the default option of “Permissions compatible
with pre-Windows 2000 Servers.”
4701-1 ch07.f.qc 4/24/00 09:17 Page 480
If the servers on your network all run Windows 2000, select the “Permissions
compatible only with Windows 2000 servers” option.
Click Next.
11. The Directory Services Restore Mode Administrator Password screen appears. In
this screen, type in and confirm an Administrator password that will be used if Active
Directory ever needs to be restored on this computer from a backup. Click Next.
12. The Summary screen appears, summarizing the choices you selected while using
this wizard. If you are satisfied with the configurations, click Next.
13. The wizard installs and configures Active Directory. This process may take several
minutes to complete.
14. The Completing the Active Directory Installation Wizard screen appears. Click Finish.
15. When the Active Directory Wizard dialog box appears, click Restart Now to
restart your computer and complete the Active Directory installation.
STEP BY STEP
1. Start the Active Directory Installation Wizard. (Select Start ➪ Run. In the Run dialog
box, type dcpromo and click OK.)
4701-1 ch07.f.qc 4/24/00 09:17 Page 481
6. The New Domain Tree screen appears. In the text box, type the FQDN of the new
domain tree. (This is the name of the new domain you’re creating.) Click Next.
7. The NetBIOS Domain Name screen appears. Accept the default name displayed,
and click Next.
8. The Database and Log Locations screen appears. In this screen, you specify the
location where the Active Directory database and log will be stored. Either accept
the default locations or type in the locations you want to use and click Next.
9. The Shared System Volume screen appears. On this screen you specify the location
of the folder that will be shared as the system volume. This folder must be located
on a Windows 2000 NTFS volume. Either accept the default location or type in
the location you want to use and click Next.
10. The Permissions screen appears.
4701-1 ch07.f.qc 4/24/00 09:17 Page 482
will become the first domain controller in the new forest (instead of the first
domain controller on your network). For details on how to perform this task,
see the section titled “Installing Active Directory for the First Time” earlier in
this chapter.
STEP BY STEP
STEP BY STEP
1. From the desktop of the computer on which you installed Active Directory, select
Start ➪ Programs ➪ Administrative Tools ➪ Active Directory Users and Computers.
2. In the left pane of the Active Directory Users and Computers dialog box, click the
+ next to the name of the domain you’ve just created.
TIP
If the Active Directory domain you created isn’t listed in this dialog box,
your Active Directory installation was not successful. You’ll probably have
to reinstall Active Directory.
3. In the left pane, highlight the Domain Controllers folder. In the right
pane, the name of your computer should be displayed. (This is the computer
on which you installed Active Directory.) Figure 7-34 shows an Active Directory
domain (domain1.mcse) and a domain controller (INSPIRON) displayed
after a successful Active Directory installation.
If your Active Directory domain and/or domain controller aren’t displayed, your
Active Directory installation was not successful. You’ll probably have to reinstall
Active Directory. Close the Active Directory Users and Computers dialog box.
4701-1 ch07.f.qc 4/24/00 09:17 Page 485
If your Active Directory domain and domain controller are displayed, close Active
Directory Users and Computers and proceed to Step 4.
4. From the desktop of your DNS server, select Start ➪ Programs ➪ Administrative
Tools ➪ DNS.
5. In the left pane of the DNS dialog box, click the + next to the name of your DNS
server. Then click the + next to the Forward Lookup Zones folder. Then
highlight the folder that has the same name as the Active Directory domain you
just created.
In the right pane of the DNS dialog box, four folders should be displayed, as
shown in Figure 7-35. Notice the four folders: _msdcs, _sites, _tcp, _udp.
(If you just installed Active Directory, you may need to wait several minutes for all
of these folders to be displayed. Click Action ➪ Refresh to update your display.)
If these four folders are present, Active Directory is correctly installed and registered
with your DNS server. Close DNS.
If these folders are not present, Active Directory has not correctly registered itself
with the DNS server. In this situation, you probably don’t have to reinstall Active
Directory, but you do need to register Active Directory with the DNS server, as
explained in the next section.
4701-1 ch07.f.qc 4/24/00 09:17 Page 486
TIP
To stop and restart the Net Logon service, use the Services administrative
tool. For information on using this tool, see Chapter 15. Or, at a command
prompt, you can type net stop netlogon (and press Enter), and then type
net start netlogon (and press Enter) to stop and restart this service.
4701-1 ch07.f.qc 4/24/00 09:17 Page 487
■ If the zone that contains your Active Directory domain doesn’t sup-
port dynamic updates, you’ll need to manually add Active Directory
resource records to the zone file on your DNS server. (I explained
how to do this at the end of the section titled “Installing Active
Directory for the First Time” earlier in this chapter.)
If the solutions recommended above don’t resolve your Active Directory
installation problem, or if you encounter other problems with Active
Directory, I recommend that you consult Windows 2000 Help for trou-
bleshooting assistance. Windows 2000 Help contains detailed descriptions
of many specific Active Directory problems and recommended solutions to
these problems.
STEP BY STEP
To view more information and possible solutions for any of the problems listed,
click the problem.
5. When you are finished using Windows 2000 Help, close the Windows 2000
dialog box.
■ After you install the DNS Server service, numerous configurations can be
made to a DNS server. You can:
Configure the DNS server to be or to use a root server and to be a
caching-only server
Configure the properties of the DNS server
Create and configure zones, including standard primary zones and standard
secondary zones
Configure zones for dynamic updates
Convert a standard primary zone to an Active Directory-integrated zone
Integrate an Active Directory DNS with a non–Active Directory DNS
Manage replication of DNS
Manually create DNS resource records
Create DNS subdomains and implement zone delegation
■ Before client computers on your network can utilize a DNS server, they must
be configured to do so.
■ Nslookup.exe is a command-line utility that is used to test a DNS server.
■ Active Directory can be installed on Windows 2000 Server and Windows
2000 Advanced Server computers. Two prerequisites must be met prior to
installing Active Directory:
At least one volume on the Windows 2000 Server/Advanced Server
computer must be formatted with NTFS.
Because Active Directory requires DNS, you either need to have a DNS
server installed on your network prior to installing Active Directory, or, you
can choose to install DNS at the same time that you perform the Active
Directory installation.
■ The specific steps to install Active Directory vary depending on the computer’s
role in Active Directory and your network configuration.
4701-1 ch07.f.qc 4/24/00 09:17 Page 490
490
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about DNS and Active Directory, and help you prepare for the
Network and Directory Services exams:
■ Assessment Questions: These questions test your knowledge of
the DNS and Active Directory topics covered in this chapter.You’ll
find the answers to these questions at the end of this chapter.
■ Scenarios: The problems in scenarios challenge you to apply your
understanding of the material to a hypothetical situation. In this
chapter’s scenarios, you’ll be asked to spell out the specific steps
you would take to perform several complex DNS tasks.You don’t
need to be at a computer to do scenarios.Answers to the scenarios
are presented at the end of this chapter.
■ Lab Exercises: These exercises are hands-on practice activities that
you perform on a computer.The two labs in this chapter give you
an opportunity to install, configure, test, monitor, and troubleshoot
DNS; and to install, verify, and troubleshoot Active Directory.
Assessment Questions
1. What type of DNS domain is microsoft.com?
A. Root domain
B. Top-level domain
C. Second-level domain
D. Third-level domain
2. You install the DNS Server service on a Windows 2000 Server
computer.You configure this DNS server to use a root server,
but you do not create any zones whatsoever on this DNS server.
What type of DNS server have you configured?
A. Master
B. Forwarder
C. Root server
D. Caching-only
4701-1 ch07.f.qc 4/24/00 09:17 Page 491
491
492
C. Certificate Services
D. Windows 2000 Server or Advanced Server
8. Which of the following statements about Active Directory are true?
(Choose all that apply.)
A. You can install Active Directory on any Windows 2000
Professional, Server, or Advanced Server computer.
B. When you install Active Directory on a Windows 2000 Server
computer, the computer becomes a domain controller.
C. You can use Active Directory Users and Computers to install
Active Directory.
D. At least one volume must be formatted with FAT or FAT32 prior
to installing Active Directory.
9. You want to install Active Directory on a Windows 2000 Server
computer. How can you start the Active Directory Installation
Wizard? (Choose all that apply.)
A. Select Start ➪ Run.Then, in the Run dialog box, type dcpromo
and click OK.
B. Select Start ➪ Programs ➪ Administrative Tools ➪ DNS.Then, in
the DNS dialog box, select Action ➪ New Host.
C. Select Start ➪ Programs ➪ Administrative Tools ➪ Active Directory
Users and Computers.Then, in the Active Directory Users and
Computers dialog box, select Action ➪ Connect to Domain.
D. Select Start ➪ Programs ➪ Administrative Tools ➪ Configure Your
Server.Then, in the Windows 2000 Configure Your Server dialog
box, click the Active Directory link. On the Active Directory
page, scroll down and click Start the Active Directory wizard.
Scenarios
Scenarios provide you with an opportunity to apply the knowledge you’ve
gained in this chapter. In this chapter’s scenarios, you’ll get an opportunity
to revisit two specific DNS configuration tasks. Because each of these tasks
involve multiple DNS servers, you probably won’t have the computer
resources to practice the tasks directly. However, these scenario problems
enable you to act as if you were performing each task, and spell out the
steps you would take on each DNS server to complete the task.
4701-1 ch07.f.qc 4/24/00 09:17 Page 493
493
For each problem, consider the given information and identify the steps
required to accomplish the specified task.
1. You have two DNS servers on your network. One DNS server is a
Windows 2000 Active Directory-integrated DNS server, and the other
is a DNS server that runs on a UNIX host.You want the UNIX DNS
server to maintain a copy of the zone that is located on the Active
Directory-integrated DNS server.What steps would you take (and
on which server) to accomplish this?
2. Your company’s network has five locations: a central office and four
satellite offices. Each location has a server that functions both as an
Active Directory domain controller and as a Windows 2000 DNS
server.The DNS server at your central office currently has one
standard primary zone.You want to replicate this zone to the
other four DNS servers in the most efficient manner possible.What
steps would you take (and on which servers) to accomplish this?
Lab Exercises
The following two labs are designed to give you practical experience
working with DNS and Active Directory.
494
495
496
497
10. In the left pane of the DNS dialog box, highlight the Reverse
Lookup Zones folder. Select Action ➪ New Zone.
11. The New Zone Wizard begins. Click Next.
12. The Zone Type screen appears.Accept the default option of
“Standard primary” and click Next.
13. The Reverse Lookup Zone screen appears.Accept the default
“Network ID” option.Type in a Network ID of 192.168.59
unless your network administrator or instructor supplies you
with a different Network ID. Click Next.
14. The Zone File screen appears.Accept the default options presented
on this screen. Click Next.
15. The Completing the New Zone Wizard screen appears. Click Finish.
16. The DNS dialog box reappears. Notice that the new zone you created
appears in the right pane.
In the left pane of the DNS dialog box, click the + next to the
Forward Lookup Zones folder.Also click the + next to the
Reverse Lookup Zones folder.
17. In the left pane, highlight the domain1.mcse zone. Select
Action ➪ Properties.
18. The zone’s Properties dialog box appears. On the General tab, select
Yes in the “Allow dynamic updates?” drop-down list box. Click OK.
19. Repeat Steps 17 through 18 for each of the other three zones you
created, configuring each zone to allow dynamic updates.
20. In the left pane of the DNS dialog box, highlight the domain1.mcse
folder. Select Action ➪ Refresh.
21. In the right pane of the DNS dialog box, notice the manufacturing
and sales folders that are displayed.Also notice that both folders are
gray, which indicates that zone delegation is enabled for the manufac-
turing and sales zones.You don’t have to manually configure zone
delegation because you created the subdomains on the same DNS
server that contains the domain1.mcse parent domain.
498
499
The objective of this lab is to give you hands-on experience installing Active
Directory on a Windows 2000 Server computer. Then, after the Active
Directory installation, you’ll have an opportunity to verify the installation,
practice troubleshooting Active Directory problems, and monitor the DNS
Server service.
There are four parts to this lab:
■ Part 1: Installing Active Directory
■ Part 2:Verifying Your Active Directory Installation
■ Part 3:Troubleshooting Active Directory
■ Part 4: Monitoring the DNS Server Service
Begin this lab by booting your computer to Windows 2000 Server and
logging on as Administrator.
1. Select Start ➪ Run. In the Run dialog box, type dcpromo and
click OK.
2. The Active Directory Installation Wizard starts. Click Next.
3. The Domain Controller Type screen appears.Accept the default
option of “Domain controller for a new domain” and click Next.
4. The Create Tree or Child Domain screen appears.Accept the default
option of “Create a new domain tree” and click Next.
5. The Create or Join Forest screen appears.Accept the default option
of “Create a new forest of domain trees” and click Next.
6. The New Domain Name screen appears. In the “Full DNS name
for new domain” text box type domain1.mcse and click Next.
4701-1 ch07.f.qc 4/24/00 09:18 Page 500
500
501
5. In the left pane of the DNS dialog box, click the + next to the name
of your DNS server (Server01).Then click the + next to the Forward
Lookup Zones folder.Then highlight the domain1.mcse folder.
In the right pane of the DNS dialog box, four folders should be dis-
played: _msdcs, _sites, _tcp, _udp. (You may need to wait several
minutes after the computer reboots for all of the folders to be displayed.
Click Action ➪ Refresh to update your display.)
If these four folders are present,Active Directory is correctly installed
and registered with your DNS server. Close the DNS dialog box.
502
TIP
The monitoring feature doesn’t appear to be rock-solid (although it does
work better after Active Directory is installed). Sometimes a PASS result
is displayed, and sometimes a FAILED result is displayed. Even if a
FAILED result is displayed, this doesn’t necessarily mean your DNS
server is not functioning properly.
6. Clear the check boxes next to “A simple query against this DNS
server” and “Perform automatic testing at the following interval.”
Click OK.
7. Close the DNS dialog box.
Standard secondary
Master
Slave
Caching-only
Forwarder
Root server
4701-1 ch07.f.qc 4/24/00 09:18 Page 503
503
Assessment Questions
1. C. Microsoft.com is a second-level domain.The root domain
is . and the top-level domain is com.
2. D. A caching-only server is a DNS server that has been configured to
use (or to be) a root server.A caching-only DNS server does not store
any zones.
3. B. Use the Root Hints tab in a DNS server’s Properties dialog box in
the DNS administrative tool to configure root hints.
4. D. A static IP address is specified by configuring the Local Area
Connection in the Network and Dial-up Connections folder.
5. B. You should select Yes in the drop-down list box next to “Allow
dynamic updates?” in the zone’s Properties dialog box.
6. C. When a Windows 2000 DNS server is connected to the Internet,
the Configure DNS Server Wizard does not permit you to configure
this server as a root server.
7. A, B, D. Windows 2000 Server (or Advanced Server) must be installed
and at least one volume formatted with NTFS prior to installing Active
Directory. In addition, the DNS Server service must be installed either
before installing Active Directory or during the process of installing
Active Directory.
8. B. When Active Directory is installed on a Windows 2000 Server or
Advanced Server computer, the computer becomes a domain controller.
None of the other statements are true.
9. A, D. These are the only two ways to start the Active Directory
Installation Wizard.
4701-1 ch07.f.qc 4/24/00 09:18 Page 504
504
Scenarios
1. On the UNIX DNS server, create a standard secondary zone.
When you create this secondary zone, assign it the same name as
the Active Directory-integrated zone, and specify the IP address
of the Active Directory-integrated DNS server that contains the
master copy of the zone.
2. The most efficient way to achieve replication, in this situation, is to:
a. Convert the standard primary zone on the Windows 2000 DNS
server at the central office to an Active Directory-integrated zone.
b. Configure each of the four Windows 2000 DNS servers at
the four satellite offices to load zone data on startup from
“Active Directory and registry.”
Once these two steps have been performed,Active Directory will
automatically replicate the zone data to each of the four satellite
Windows 2000 DNS servers.
4701-1 ch07.f.qc 4/24/00 09:18 Page 505
4701-1 ch08.f.qc 4/24/00 09:20 Page 508
Directory Services
EXAM
MATERIAL
EXAM OBJECTIVES
C HAP TE R
8
Administering and
Securing Active Directory
509
4701-1 ch08.f.qc 4/24/00 09:20 Page 510
Chapter Pre-Test
1. What are OUs, and what is their purpose?
2. List two tasks you can use Active Directory Users and Computers
to perform.
3. The act of creating an Active Directory object for a shared folder,
shared printer, or other network resource is called ______________.
4. Define the terms parent object and child object.
5. What is the smallest container object in Active Directory to which
you can delegate administrative authority?
4701-1 ch08.f.qc 4/24/00 09:20 Page 511
CROSS-REFERENCE
OUs and planning an OU structure were covered in Chapter 2.
Creating OUs
Before you can create OUs, you must install Active Directory and create an
Active Directory domain that will contain the OUs you create. OUs are
created by using Active Directory Users and Computers.
The Windows 2000 Administration Tools, called the ADMINPAK, can be installed
on any Windows 2000 computer (Professional, Server, or Advanced Server).
However, the ADMINPAK files must be installed from a Windows 2000 Server or
Advanced Server compact disc.
Notice the left pane in the dialog box.This pane displays the hierarchical
structure of Active Directory in a tree format. Each item displayed in the left
pane is an Active Directory object.The Active Directory objects in the left
pane are called container objects (or sometimes just containers) because they
can contain other objects.When you highlight an object in the left pane, its
contents are displayed in the right pane.
Because you’ll probably use Active Directory Users and Computers
extensively to create OUs and to manage Active Directory objects, I want
to tell you about another way to access this tool.
Microsoft recommends, for security reasons, that you log on as a regular
user instead of always as Administrator. However, because you need
Administrator privileges to use Active Directory Users and Computers, you’ll
need to create a shortcut to this tool and configure it to run as Administrator.
4701-1 ch08.f.qc 4/24/00 09:20 Page 514
STEP BY STEP
1. Right-click the desktop, and select New ➪ Shortcut from the menu that appears.
2. The Create Shortcut wizard begins. In the “Type the location of the item” text box,
type runas /netonly /user:domain_name\administrator “mmc.exe dsa.msc”
and click Next.
TIP
Remember to replace italicized text, such as domain_name, with your actual
domain name, and don’t use the underscore — it’s just a placeholder.
3. In the “Type a name for this shortcut” text box, type Active Directory Users and
Computers. Click Finish.
4. The shortcut you just created appears on your desktop. To run Active Directory
Users and Computers with Administrator privileges while logged on as regular
user, double-click the shortcut on your desktop, and supply the Administrator
password when prompted.
STEP BY STEP
CREATING AN OU
4. The new OU appears in the right pane of the Active Directory Users and
Computers dialog box.
Configuring OU Properties
After you’ve created an OU, you may want to configure its properties.
Specifically, you can configure a general description of the OU, specify a
user account that is responsible for managing the OU, and configure
Group Policy for the OU.
STEP BY STEP
CONFIGURING AN OU
5. To configure Group Policy for the OU, click the Group Policy tab and make the
necessary configurations. Click OK.
CROSS-REFERENCE
I’ll cover Group Policy in great detail in Chapter 10.
STEP BY STEP
3. The Find Users, Contacts, and Groups dialog box appears, as shown in Figure 8-2.
Notice the “Find” and “In” drop-down list boxes near the top of the dialog box.
In the “In” drop-down list box, select the domain or OU in which you want to
search; or select the Entire Directory, which includes records for all domains
in the forest.
In the “Find” drop-down list box, select the type of object you want to locate. The
types of objects you can select from are users, contacts, and groups; computers;
printers; shared folders; organizational units; or custom search.
Depending on the object you select, a tab specific to that object type is displayed,
along with an Advanced tab.
On the object-specific tab, enter any known information about the object you
want to locate, as prompted by the tab. Text boxes for information such as the
object’s name, description, owner, location, model, and so on may be displayed.
Click Find Now to perform the search.
4. Active Directory Users and Computers displays a list of all objects that match
the information you specified.
If the object you searched for is displayed, you can take various actions depend-
ing on the type of object. If you searched for a user, contact, or group, you can
view and modify the object’s properties (if you have the appropriate permissions)
by double-clicking the object. If you searched for a printer, you can directly con-
nect to the printer. If you searched for a shared folder, you can map a network
drive to that shared folder, and so on.
4701-1 ch08.f.qc 4/24/00 09:21 Page 519
If the object you searched for is not displayed, or if you want to search for multiple
objects that all have a similar property, such as all objects located in a particular
city, click the Advanced tab and select the specific fields and values you want to
search by. Numerous fields are available on this tab — in fact, you can search for
an object by virtually any of its properties.
5. Close the Find Users, Contacts, and Groups dialog box.
STEP BY STEP
If Active Directory is not selected in the “Look in” drop-down list box, select it.
On the People tab, fill in any known information about the person you want to
find, such as the person’s first name, last name, or a portion of their e-mail
address. Click Find Now to perform the search.
3. Windows Explorer displays a list of all people that match the information
you specified.
If the person you searched for is displayed, you can view the person’s full name,
e-mail address, business phone number, and home phone number. You can click
Properties to view and/or modify detailed information about the user (if you have
the appropriate permissions). You can also click Add to Address Book to add this
user to your Outlook Express Address Book.
If the person you searched for is not displayed, you can click the Advanced tab and
define advanced search criteria that you want Windows Explorer to search by.
Also notice that on the Features tab you can select from multiple options, such
as double-sided printing, stapling, color printing, and so on. Select the features
you need.
On the Advanced tab you can select the specific fields and values you want to
search by. Numerous fields are available on this tab — in fact, you can search for
a printer by virtually any of its properties.
Once you’ve made all configurations you want to on the Printers, Features, and/or
Advanced tabs, click Find Now to search.
3. Windows Explorer displays a list of all printers that match the information you
specified. In addition to the printer’s name, the location, model, server the printer
is connected to, and comments (if any) are displayed for each printer listed.
If you want to connect to one of the printers listed, right-click the printer and
select Connect from the menu that appears. Windows 2000 will install drivers
for that printer on your computer (if not already installed) and will connect to
the printer.
You can also view the printer’s properties by right-clicking the printer and selecting
Properties from the menu that appears. If you have the appropriate permissions,
you can edit the printer’s properties, as well.
1. To search for a computer, in the Search Explorer bar, scroll down and
click Computers.
2. The Search for Computers screen appears in the Search Explorer bar. In the
Computer Name text box, type in any known part of the name of the computer
you want to search for. Click Search Now.
4701-1 ch08.f.qc 4/24/00 09:21 Page 522
3. Windows Explorer displays the results of the computer search in the right pane.
Figure 8-5 shows both the Search for Computers Explorer bar and the computer
search results.
All computer names that contain the letter combination you specified in Step 2
are listed in the computer search results. In addition to the computer’s name, the
location and comments (if any) are displayed for each computer listed.
If you right-click any computer listed in the search results pane, you can select
from numerous options in the menu that appears, including:
Open Containing Folder: If you select this option, Windows Explorer
opens a dialog box for the domain in which the computer is located. This
dialog box lists all computers in this domain. You can open, explore, create
a shortcut to, or view the properties of any computer listed.
Open: If you select this option, Windows Explorer graphically displays all of
the shared folders, shared printers, the Scheduled Tasks folder, and the
Printers folder for the computer. You can map a network drive to a shared
folder; connect to a shared printer; or open, explore, or create a shortcut to
any of the folders listed.
4701-1 ch08.f.qc 4/24/00 09:21 Page 523
Explore: If you select this option, a Windows Explorer window is opened that
shows the computer’s location on the network in the left pane, and a graphical
list of the shared folders, shared printers, the Scheduled Tasks folder,
and the Printers folder for the computer. You can browse the network;
map a network drive to a shared folder; connect to a shared printer; or open,
explore, or create a shortcut to any of the folders listed.
Create Shortcut: If you select this option, Windows 2000 enables you to
create a shortcut to this computer on your desktop.
Properties: If you select this option, a few general properties of the
computer are displayed.
If you right-click any of the shared folders displayed, you can open, explore,
search, map a network drive to, create a shortcut to, or view the properties of the
shared folder.
Folders, once they have been created and shared on a network server,
must always be manually published in Active Directory.
TIP
Publishing a shared folder or printer in Active Directory doesn’t create the
shared folder or printer. Instead, it creates an object in Active Directory
that represents the previously created and shared folder or printer.
STEP BY STEP
EXAM TIP
Make sure you understand what happens to an Active Directory object’s
permissions when the object is moved. Since the process of moving an
object is pretty simple, expect the exam to focus more on permissions
than on the moving process.
STEP BY STEP
Expand the OUs or other container objects in this dialog box as necessary.
Highlight the OU or other container object in which you want to place the
object you are moving. Click OK.
4. Windows 2000 moves the object, and returns you to the Active Directory Users
and Computers dialog box.
4701-1 ch08.f.qc 4/24/00 09:21 Page 528
TIP
Active Directory permissions only specify whether a user, group, or com-
puter can view or modify an object’s properties in Active Directory. Active
Directory permissions do not control access to the shared folders or
shared printers themselves.
4701-1 ch08.f.qc 4/24/00 09:21 Page 529
In the real world you may not have to modify the security properties on
Active Directory objects, because the default security permissions of the
Windows 2000 built-in groups are often adequate for small to medium-sized
organizations. Once an administrator makes users members of appropriate
groups, the users have permissions to Active Directory objects suitable for
the users’ job tasks and responsibilities.
EXAM TIP
Even if you don’t have to set permissions on Active Directory objects on
your company’s Windows 2000 network, make sure you understand and
know how to apply these permissions before you take the Directory
Services exam.
Permissions Terminology
Before I move on to the process of setting permissions on Active Directory
objects, there are a few terms I need to define, which are used throughout the
Windows 2000 user interface. Two of these terms are parent object and child
object. A parent object is a container object that contains other objects. An
object that is contained in the parent object is referred to as a child object.
Another important term is inheritance. Inheritance refers to the per-
missions an object receives simply because it is contained in another
object — in other words, because an object is a child (or grandchild)
object of a particular parent object. When an object inherits permis-
sions, it’s not because the permissions have been applied specifically to
the object in question, but rather because permissions have been set on
the parent object that contains the object in question.An important fea-
ture of inheritance is that when permissions are configured to apply to
all of an object’s child objects, the permissions are applied to all objects
contained in the parent object’s tree, regardless of how many intermedi-
ate containers exist between the child object and the parent object to
which the permissions have been assigned.
TIP
I recommend, for ease of administration, that you assign permissions to
groups instead of users whenever possible. I also recommend that you
assign permissions as high in the domain tree as possible and rely on
inheritance to propagate permissions down the tree.
STEP BY STEP
If you want to block inheritance to this object, clear the check box next to “Allow
inheritable permissions from parent to propagate to this object.” This check box is
selected by default.
If you want to configure advanced permissions, or if you want the permissions you
assign to be inheritable by child objects of this object, click Advanced. (If you are
done configuring permissions, skip to Step 9.)
6. The Access Control Settings dialog box for the object is displayed. Figure 8-9
shows the Access Control Settings dialog box for an OU. Notice the detailed
permission entries listed.
To configure advanced permissions, highlight the user or group (listed in the
Name column) for which you want to edit permissions. Then click View/Edit.
7. The Permission Entry dialog box for the object appears. Figure 8-10 shows
the Permission Entry for Kirkland dialog box. Notice that the user or group
you selected in Step 6 appears in the Name list box. Also notice the
detailed list of permissions and the “Apply onto” drop-down list box.
4701-1 ch08.f.qc 4/24/00 09:21 Page 533
By default, the permissions you configure will apply to this object only. However, if
you want to use inheritance to propagate this permission to child objects, select the
“This object and all child objects” option from the “Apply onto” drop-down list box.
TIP
You must manually change the setting in the “Apply onto” drop-down list
box if you want to use inheritance to propagate the permissions you’re
configuring.
In the Permissions box, select or clear the check boxes next to the permissions
you want to modify for the selected user or group. Click OK.
8. The Access Control Settings dialog box for the object reappears. Click OK.
9. In the object’s Properties dialog box, click OK.
STEP BY STEP
call this exception “the deny rule.” The Full Control permission can be
particularly troublesome here. If the user (or any group that the user is a
member of) is denied the Full Control permission, the user is denied all
permissions to the Active Directory object. For this reason, you should use
great care when denying a permission to a user or group.
However, even the deny rule has an exception. If a specific user (or group)
is denied a permission at the parent object level, and that user (or group) is
directly allowed that permission (or a permission that includes that permis-
sion) at the object level, then the directly assigned permission (called an explicit
permission) takes precedence, and even overrides the denied permission. For
example, suppose a user is denied the Write permission to an OU, and is also
assigned the Full Control permission to a child object of the OU.At the child
object level, then, the user is denied the Write permission by inheritance, but
is explicitly assigned the Full Control permission.The user’s effective permis-
sion to the child object is Full Control, because this permission was explicitly
assigned at the child object level.
TIP
Sometimes administrators want to delegate authority to an assistant for
all objects in the OU, but not to the actual OU itself. In this case, select
the “Child objects only” option instead of the “This object and all child
objects” option when configuring advanced permissions.
STEP BY STEP
TIP
For purposes of using this wizard only, think of a “custom task” in terms
of assigning specific permissions to a specific user for a specific Active
Directory object (or for a particular type of child object contained in that
object).
4701-1 ch08.f.qc 4/24/00 09:21 Page 538
8. The Active Directory Object Type screen appears. In this screen you specify the
scope of the task you want to delegate. You can choose to either delegate control
of this entire object, or to delegate control of specific child objects contained in
this object. Select the appropriate option and click Next.
9. The Permissions screen appears, as shown in Figure 8-12.
In the top half of this screen, select the type(s) of permissions you want to
assign. Then, in the Permissions box, select the specific permissions you
want to assign. Click Next.
10. In the Completing the Delegation of Control Wizard screen, click Finish.
■ When an OU is moved in Active Directory, all of the OU’s contents are moved,
as well.
■ A parent object is a container object that contains other objects. An object
that is contained in the parent object is referred to as a child object.
■ Access to Active Directory objects can be controlled by assigning Active
Directory permissions to users, groups, and computers that may attempt to
access these objects. Permissions are set by modifying the security properties
of an Active Directory object.
■ When you configure the permissions of an Active Directory object, you can:
Specify the users and groups that are specifically permitted or denied
access to the object and/or its properties
Specify whether the object’s permissions will be applied to only the object
itself, or to the object and to all of its child objects
Specify whether the object will inherit permissions from its parent object
Configure permissions to control access to a specific property of the object
■ Occasionally, you may need to assign permissions to an Active Directory
object, but not have the Full Control (or the Modify Permissions) permission
for the object. To remedy this situation, an Administrator must take ownership
of the object.
■ It’s not uncommon for a user to have permissions to an Active Directory object
and to be a member of one or more groups that also have permissions to that
object. In general, user and group permissions are additive, and the least restric-
tive permission is the user’s effective permission. But there are exceptions.
■ Delegation is one of the many benefits of Active Directory. Delegation of Active
Directory objects enables the administrator to distribute administrative tasks
among several assistant administrators without giving each assistant adminis-
trative privileges to the entire network.
4701-1 ch08.f.qc 4/24/00 09:21 Page 541
541
STUDY GUIDE
This section contains exercises that are designed to solidify your knowledge
about implementing an OU structure and managing Active Directory
objects, and to help you prepare for the Directory Services exam:
■ Assessment questions: These questions test your knowledge of
the Directory Service topics covered in this chapter.You’ll find the
answers to these questions at the end of this chapter.
■ Lab Exercises: These exercises are hands-on practice activities
that you perform on a computer.The lab in this chapter gives you
an opportunity to practice implementing OUs and managing
Active Directory objects.
Assessment Questions
1. You want to create an organizational unit (OU) on a Windows 2000
Server computer that is a domain controller.Which tool should you use?
A. Windows Explorer
B. Active Directory Sites and Services
C. Active Directory Domains and Trusts
D. Active Directory Users and Computers
2. You want to use a Windows 2000 Professional computer on your
Windows 2000 network to create an organizational unit (OU).
How can you accomplish this?
A. Install Active Directory on the Windows 2000 Professional
computer.Then use Active Directory Domains and Trusts
to create the OU.
B. Install the ADMINPAK on the Windows 2000 Professional
computer.Then use Active Directory Users and Computers
to create the OU.
4701-1 ch08.f.qc 4/24/00 09:21 Page 542
542
543
Lab Exercises
The following lab is designed to give you practical experience working
OUs and Active Directory objects.
4701-1 ch08.f.qc 4/24/00 09:21 Page 544
544
EXAM
MATERIAL
545
546
5. The Find Users, Contacts, and Groups dialog box reappears. In the
Find drop-down list box, select Computers.
6. When the “Find in the Directory” dialog box is displayed, click OK.
7. In the “Computer name” text box, type Server01 and click Find Now.
8. Active Directory Users and Computers displays a computer named
SERVER01. Double-click SERVER01.
9. The SERVER01 Properties dialog box appears. Notice the various
tabs.Type in a description of your computer on the General tab, and
click OK.
10. Close the Find Computers dialog box. Close the Active Directory
Users and Computers dialog box.
547
548
549
Assessment Questions
1. D. You can use Active Directory Users and Computers to create and
manage OUs.
2. B. To use a Windows 2000 Professional computer to create an OU, you
should first install the ADMINPAK on the Windows 2000 Professional
computer, and then use Active Directory Users and Computers to
create the OU.You can’t install Active Directory on a Windows 2000
Professional computer.
3. D. To search for a specific shared folder in Active Directory, use Active
Directory Users and Computers.You can use Windows Explorer to
browse Active Directory, but you can’t use it to search for a specific
shared folder.
4. A, C, D. B is not correct because Joe loses all of his previously
inherited permissions from the New York OU.
5. A. Use MoveTree.exe to move Active Directory objects from
one domain to another.
6. C. Typically, when user and group permissions to an Active Directory
object differ, the permissions are additive, and the least restrictive permis-
sion is the user’s effective permission.There are, however, exceptions to
this rule.All of the other statements are false.
7. A, B, C, D. All of the statements are true.
8. A, C. There are two ways to delegate administration of Active Directory
objects: by using the Delegation of Control Wizard (found in Active
Directory Users and Computers) and by using Active Directory Users
and Computers to manually assign the appropriate permissions to the
user for the OU.
4701-1 ch09.f.qc 4/24/00 09:22 Page 550
Professional
Server
EXAM
MATERIAL Directory Services
EXAM OBJECTIVES
C HAP TE R
9
Managing Users
and Groups
I almost called this chapter “Everything You Always Wanted to Know About
Users and Groups but Were Afraid Someone Would Explain to You in
Great Detail.” It’s way too long a title, but it conveys the idea that this chapter
is a comprehensive study of users and groups in a Windows 2000 environ-
ment. I’ll start by explaining how user authentication works. Then I’ll spend the
rest of the chapter exploring user and group accounts. I’ll take you through the
steps involved in just about every local and domain user task you can think of,
from creating and configuring user accounts to copying, renaming, and delet-
ing user accounts. I’ll also show you how to work with user profiles, account
policies, and user rights, and spend some time explaining how to troubleshoot
these features. Then I’ll move on to groups, where I’ll begin by explaining how
to use local and built-in groups on the local computer. Finally, I’ll discuss
groups in Active Directory, including how to create, configure, and manage
these groups.
551
4701-1 ch09.f.qc 4/24/00 09:22 Page 552
Chapter Pre-Test
1. What is Kerberos V5?
2. What are the two Windows 2000 built-in user accounts?
3. What’s the difference between a local user account and a
domain user account?
4. What are roaming user profiles and mandatory user profiles?
5. What are the three major types of Windows 2000 account
policies?
6. What’s the difference between a security group and a distribution
group?
7. What type of group has preset characteristics and is automati-
cally created during the installation of Windows 2000?
4701-1 ch09.f.qc 4/24/00 09:22 Page 553
CROSS-REFERENCE
I’ll cover Certificate Services in more depth in Chapter 18.
Network Authentication
Network authentication is the process of verifying a user’s credentials for the
purpose of determining whether the user is permitted to access network
resources, such as a shared folder, a shared printer, or a network service.
Here’s a high-level overview of what happens when a user attempts to
access a network resource. (Because Kerberos V5 is the default Windows
2000 authentication protocol, I assume that the Kerberos V5 protocol is
used in this example.)
1. The user attempts to access the network resource from the local
Windows 2000 computer.
The action the user takes to initiate access can take several forms. For
example, the user could attempt to open a file stored on a network
server from within an application, such as Microsoft Word. Or, the user
could click Print within any application.There are numerous actions
the user can take, but they all boil down to the user attempting to
access a network resource.
2. The local Windows 2000 computer sends a Kerberos Ticket-Granting
Service Request that includes the user’s name, the name of the net-
work resource the user wants to access, encrypted timestamp infor-
mation, and the ticket-granting ticket (received when the user logged
on) to a Windows 2000 domain controller.
3. The Windows 2000 domain controller unencrypts the timestamp
information. If the unencryption process produces a valid timestamp,
the domain controller uses the information in the Ticket-Granting
4701-1 ch09.f.qc 4/24/00 09:22 Page 556
Naming Conventions
When you create user accounts, keep in mind a few simple rules for user
names:
■ User names (which are referred to as user logon names in Active
Directory Users and Computers) can be from one to 20 char-
acters long.
TIP
Windows 2000 allows you to enter more than 20 characters for a user
name, but will only recognize the first 20.
4701-1 ch09.f.qc 4/24/00 09:22 Page 558
Table 9-1 shows how three user names would appear using the naming
conventions described in A, B, and C.
TABLE 9-1 Common User Account Naming Conventions
Full Name Scheme A Scheme B Scheme C
for these two employees.You could resolve the problem by assigning Mike
Smith the user name of MikeS (assuming he was hired before Mike
Sutherland), and assigning Mike Sutherland the user name of MikeSu.
Passwords
I’ll just say a few words about passwords. Everyone knows that using pass-
words protects the security of the network, because only authorized users
can log on.
When user accounts are created, you should have a plan for managing
passwords. Will passwords be assigned and maintained by the network
administrator? Or, will users choose their own passwords?
When users maintain their own passwords, it’s a good idea to remind
them of a few password security basics:
■ Don’t use your own name or the name of a family member or pet as
a password. (This is a common security loophole in most networks.)
■ Never tell your password to anyone.
■ Don’t write your password on a sticky note and then stick it on
your monitor. Other not-so-hot places to store your password are
on or under your keyboard; in your top desk drawer; in your
Rolodex; or in your briefcase, wallet, or purse.
■ Use a sufficiently long password. I recommend using eight or more
characters in a password.The longer the password, the more diffi-
cult it is to guess.
■ Use a mix of uppercase and lowercase letters, numbers, and special
characters. Remember, passwords are case-sensitive.
■ If passwords are required to be changed regularly, don’t use the
same password with an incremental number at the end, such as
Alan01,Alan02,Alan03, and so on. (Don’t laugh.This may seem
like common sense, but I’ve seen several network administrators
actually do this.)
4701-1 ch09.f.qc 4/24/00 09:22 Page 560
STEP BY STEP
1. From the desktop, right-click My Computer, and select Manage from the menu
that appears.
2. In the Computer Management dialog box, click the + next to Local Users and
Groups. Highlight the Users folder, and select Action ➪ New User.
3. The New User dialog box appears, as shown in Figure 9-1. Notice that by default
the new user must change his or her password when he or she first logs on.
Enter the user name, the person’s full name (this entry is optional), description
(this could be a department, location, or job title — it is also optional) and pass-
word (also optional). Confirm the password by retyping it.
Accept the default selection of “User must change password at next logon” if you
want the user to choose and enter a new password the first time the user logs on.
If you don’t want the user to change his or her password the first time the user
logs on, clear this check box.
4701-1 ch09.f.qc 4/24/00 09:22 Page 561
If the “User must change password at next logon” check box is cleared, two addi-
tional check boxes become available. Select the “User cannot change password”
check box if you — the network administrator — want to manage and assign user
passwords. Select the “Password never expires” check box if you are configuring
a user account for a Windows 2000 service to use when it logs on.
Select the check box next to “Account is disabled” if you are creating a user tem-
plate. (I’ll cover user templates in the section titled “Copying User Accounts” later
in this chapter.)
Click Create.
4. The New User dialog box reappears. Add additional users as necessary. When
you are finished adding users, click Close.
5. The new user(s) is created, and appears in the right pane of the Computer
Management dialog box.
STEP BY STEP
Enter the first name, middle initial, and last name of the new user in the appropri-
ate text boxes. Windows 2000 automatically displays the full name based on the
information you entered.
Enter a user logon name — this is the user name. Click Next.
4. The next New Object - User dialog box appears, as shown in Figure 9-3.
FIGURE 9-3 Configuring password options for a new domain user account
4701-1 ch09.f.qc 4/24/00 09:22 Page 563
Enter the password for the new user account, and confirm the password by retyp-
ing it. (Entering a password is optional.)
There are four check boxes that can be selected in this dialog box, none of which
are selected by default:
User must change password at next logon: Select this check box if you
want the user to choose and enter a new password the first time the user
logs on.
User cannot change password: Select this check box if you — the network
administrator — want to manage and assign user passwords.
Password never expires: Select this check box if you are configuring a
user account for a Windows 2000 service to use when it logs on.
Account is disabled: Select this check box if you are creating a user tem-
plate. (I’ll cover user templates in the section titled “Copying User Accounts”
later in this chapter.)
Make the appropriate configurations in this dialog box, and then click Next.
5. In the next New Object - User dialog box, click Finish.
6. Windows 2000 creates the new user account, and displays it in the right pane of
the Active Directory Users and Computers dialog box.
The syntax for the NET USER command is fairly complex.To view this
command’s syntax, type net help user | more at the command prompt,
and press Enter.
EXAM TIP
Both the Professional and Server exams test implementing, configuring,
managing, and troubleshooting local user accounts. You should practice
creating and configuring local user accounts until you’ve mastered these
tasks.
4701-1 ch09.f.qc 4/24/00 09:22 Page 565
STEP BY STEP
1. From the desktop, right-click My Computer, and select Manage from the menu
that appears.
2. In the Computer Management dialog box, click the + next to Local Users and
Groups. Highlight the Users folder. In the right pane, double-click the user
whose properties you want to configure. Or, you can right-click the user, and
select Properties from the menu that appears.
3. The user’s Properties dialog box appears. Configure the user’s properties as
necessary, and click OK.
The next several sections describe the tabs available in a local user account’s
Properties dialog box, and their many configurable options.
General On the General tab you can configure the local user’s full name,
description of the user account, and various password options, as shown in
Figure 9-5. Notice the check box next to “Account is locked out.”
Also notice that the “Account is locked out” check box is grayed out. If
the account has been locked out (due to too many unsuccessful logon
attempts), this check box will be checked.To unlock a locked account, you
need to clear this check box.
Member Of On the Member Of tab you can configure the local user’s
membership in the local groups on the local computer. Assigning users to
groups is an efficient way to manage permissions for multiple users. Click
Add to make the user account a member of a group, and click Remove to
remove the user account from a group. By default, all users are members of
the Users local group.
Profile The Profile tab is used to configure the local user’s environment.
On this tab you can specify a local or network path to the user’s Profile
folder. A user’s profile contains the user’s unique desktop settings, such as
screen color, screen saver, desktop icons, fonts, and so on.The default loca-
tion for a user’s profile is the C:\Documents and Settings\user_
name folder. If no path is entered on this tab, Windows 2000 uses the
default location. (I’ll cover managing user profiles in more detail later in
this chapter.)
On the Profile tab you can also specify a network or local path to the
user’s Home folder, and specify the name of the user’s logon script file, if a
logon script is used. A logon script is a batch file that is run each time a
user logs on. Logon scripts for local user accounts must be stored in the
SystemRoot\System32 folder. Logon scripts are commonly used to
automatically connect network drives and printers, and to install and
maintain certain types of software, such as the Systems Management Server
(SMS) client.
Dial-in On the Dial-in tab you can configure numerous dial-in properties
for the local user account. This tab is only available on Windows 2000
Server/Advanced Server computers. Figure 9-6 shows the Dial-in tab.
CROSS-REFERENCE
I’ll discuss configuring dial-in properties extensively when I cover remote
access in Chapter 17.
4701-1 ch09.f.qc 4/24/00 09:22 Page 567
STEP BY STEP
The next several sections describe the many tabs available in a domain
user account’s Properties dialog box, and their many configurable options.
General On the General tab you can configure the domain user’s name
and contact information, as shown in Figure 9-7.
On this tab, you can change the user’s first name, last name, and display
name.You can also add a description of the user account and the location
of the user’s office. Finally, you can configure the user’s telephone number,
e-mail address, and Web page address.
Address On the Address tab, you can configure detailed mailing and/or
physical address information for the domain user.The configurable options
on this tab are self-explanatory.
Account On the Account tab, you can configure the domain user’s logon
name, logon hours, computers the user can log on to, password and other
account options, and account expiration information, as shown in Figure
9-8. Notice the check box next to “Account is locked out.”
4701-1 ch09.f.qc 4/24/00 09:22 Page 569
Also notice that the “Account is locked out” check box is grayed out. If
the account has been locked out (due to too many unsuccessful logon
attempts), this check box will be checked.To unlock a locked account you
need to clear this check box.
There are ten options you can select in the “Account options” section of
this tab:
■ User must change password at next logon: Select this option
if you want the user to choose a new password the next time the
user logs on.
■ User cannot change password: Select this option if you want to
manage the user’s password, rather than having the user choose his
or her own password.
■ Password never expires: Select this option if you are configuring
a user account for a Windows 2000 service to use when it logs on.
■ Store password using reversible encryption: Select this option
if this user will be logging on to the domain from an Apple com-
puter, because Apple computers use a different type of password
encryption than Windows 2000 computers use.
4701-1 ch09.f.qc 4/24/00 09:22 Page 570
TIP
The Logon Workstations feature requires the NetBIOS protocol, and is
primarily designed to restrict access to non-Windows 2000 computers
that rely on NetBIOS. If you have removed NetBIOS from your Windows
2000 client computers, this feature won’t work correctly.
Profile The Profile tab is used to configure the domain user’s environ-
ment. On this tab you can specify a local or network path to the user’s
Profile folder. The default location for a user’s profile is the
C:\Documents and Settings\user_name folder on the computer the
user logs on to. If no path is entered on this tab, Windows 2000 uses the
default location. (I’ll cover managing user profiles in more detail later in
this chapter.)
On the Profile tab you can also specify a network or local path to the
user’s Home folder, and specify the name of the user’s logon script file, if a
logon script is used. Logon scripts for domain user accounts must be stored
in the NETLOGON share on a domain controller. By default, the NETLOGON
share is located in the SystemRoot\SYSVOL\sysvol\domain_name\
SCRIPTS folder on each domain controller in the domain.Windows 2000
automatically replicates all information in the SYSVOL folder, including the
NETLOGON share, to all domain controllers in the domain.
4701-1 ch09.f.qc 4/24/00 09:22 Page 573
CROSS-REFERENCE
I’ll cover Certificate Services in Chapter 18.
This tab is only present after you select View ➪ Advanced Features in
the Active Directory Users and Computers dialog box.
Member Of On the Member Of tab you can configure the user’s member-
ship in groups in the domain. Click Add to make the domain user account
a member of a group in the user’s domain, and click Remove to remove
the user account from a group in the user’s domain. By default, all domain
users are members of the Domain Users global group.
The Member Of tab also has an option to set a primary group for the
user account.Windows 2000 doesn’t require the use of primary groups, but
users of Apple computers who access files on a Windows 2000 Server
computer and users of Windows 2000 computers who run POSIX-com-
pliant applications do require certain file ownership and permissions set-
tings that a primary group provides. The default primary group is the
Domain Users global group.
Dial-in On the Dial-in tab you can configure numerous dial-in properties
for the domain user account.This Dial-in tab is identical to the Dial-in tab
for a local user account, which was shown in Figure 9-6.
CROSS-REFERENCE
I’ll discuss configuring dial-in properties extensively when I cover remote
access in Chapter 17.
4701-1 ch09.f.qc 4/24/00 09:22 Page 574
Object On the Object tab you can view limited information about the
domain user account object, including the object’s class, the date the user
account was created, the date the user account was last modified, and so
on. No configurations are possible on this tab. In addition, this tab is only
present after you select View ➪ Advanced Features in the Active Directory
Users and Computers dialog box.
Security On the Security tab you can specify the users and groups that are
permitted to view or modify the properties of the domain user account.
This tab is only present after you select View ➪ Advanced Features in the
Active Directory Users and Computers dialog box.
The Security tab is shown in Figure 9-11. Notice the “Allow” and
“Deny” check boxes for the various permissions listed.
In the Name box, users and groups that have some sort of permission to
view or modify one or more properties of this user are listed.You can use
the Add and Remove command buttons to add and remove users and
groups to and from the Name box.
4701-1 ch09.f.qc 4/24/00 09:22 Page 575
You can set permissions on any user or group for this user by highlight-
ing the user or group in the Name box and then selecting permissions in
the Permissions box.
CROSS-REFERENCE
Setting permissions is covered extensively in the “Setting Permissions on
Active Directory Objects” section in Chapter 8.
CROSS-REFERENCE
I’ll discuss Terminal Services (and the settings on these tabs) in
Chapter 20.
Group is the name of the local group on the Windows 2000 Professional
computer to which the user named in the first column belongs.
Click Add to add an existing user to the “Users for this computer” box.
TIP
You can’t use the Add command button to create new users.
Click Remove to remove a user from the “Users for this computer”
box. If you highlight a local user in the “Users for this computer” box and
click Remove, the user is deleted. If you highlight a domain user in the
“Users for this computer” box and click Remove, the domain user is not
deleted, but is denied access to this computer and is removed from the
“Users for this computer” box.
To view or modify a user’s properties or group memberships, highlight
the user in the “Users for this computer” box and click Properties. If the
user you highlighted is a local user, you can configure the user’s name, full
name, description, and group membership. For domain users, you can only
configure group membership. The Group Membership tab is shown in
Figure 9-13. Notice the three options in this dialog box.
4701-1 ch09.f.qc 4/24/00 09:22 Page 577
On the Group Membership tab you can make the highlighted user a
member of any group on the local computer. The options you can select
from are:
■ Standard user: Select this option if you want to make the user a
member of the Power Users Group on the local computer.
Members of this group can modify the computer and install pro-
grams, but can’t read other users’ files.This is the recommended
setting for most environments.
■ Restricted user: Select this option if you want to make the user a
member of the Users Group on the local computer. Members of
this group can log on to and use the local computer, can modify
and save their own documents, but can’t install programs or modify
computer system settings.This is the recommended setting for
high-security environments.
■ Other: Select this option if you want to make the user a member
of any other group on the local computer, such as Administrators,
Backup Operators, and so on.
You can also use Users and Passwords to change the password for any
local user listed in the “Users for this computer” box.To change a password,
highlight the local user in the “Users for this computer” box, click Set
4701-1 ch09.f.qc 4/24/00 09:22 Page 578
Password, type in (and confirm) the new user password in the Set Password
dialog box, and then click OK.
On the Advanced tab in the Users and Passwords dialog box you can
manage certificates, access the Local Users and Groups tool in Computer
Management, and configure whether local users are required to press
Ctrl+Alt+Delete before logging on.
TIP
Only domain user accounts can be copied — local user accounts can’t be
copied.
For example, suppose that you want to create a domain user account to
be used by an employee who will administer the network.You want this
user account to have all of the capabilities of the Administrator account, so
you decide to copy the Administrator account. When a user account is
copied, all properties of the user account, including its group member-
ships, are copied to the new user account with the exception of the user
name, full name, password, logon hours, address and telephone informa-
tion, organization information, the “Account is disabled” option, and user
rights and permissions.
You can use Active Directory Users and Computers to copy user
accounts.
4701-1 ch09.f.qc 4/24/00 09:22 Page 579
STEP BY STEP
Suppose, instead, that you are setting up a new network and need to cre-
ate multiple new user accounts for the accountants at a large CPA firm.All
of the accountants at this firm have similar network access needs, and their
user accounts will have substantially similar properties and group member-
ships.You can create a new user account, named Acct_Template, to use as a
template to create these new user accounts.
To create a new user account that will be used as a template, follow the
steps presented earlier in this chapter under “Creating a domain user
account.”When you create the new user account, assign the user account a
name that indicates the type of user account this template will be used to
create, such as Acct_Template for the accountants in the previous example.
Configure the template user account’s properties and group memberships
to match the requirements of the user accounts you will create using this
template.
4701-1 ch09.f.qc 4/24/00 09:22 Page 580
TIP
When you create a user account to be used as a template, I recommend
that you select the “Account is disabled” check box on the Account tab
so that no one can log on using this account.
STEP BY STEP
1. From the desktop, right-click My Computer, and select Manage from the menu
that appears.
2. In the Computer Management dialog box, click the + next to Local Users and
Groups. Highlight the Users folder. In the right pane, right-click the user account
you want to rename, and select Rename from the menu that appears.
3. Type in a new name for the user account, and press Enter. The user account is
renamed.
2. In the left pane of the Active Directory Users and Computers dialog box, click the
+ next to the name of the domain that contains the user account you want to
rename. Highlight the Users folder or OU that contains this user account. In the
right pane of the dialog box, right-click the name of the user you want to rename,
and select Rename from the menu that appears.
3. Type in a new name for the user account, and press Enter.
4. The Rename User dialog box appears. Fill in the requested information, including
the user’s first name, last name, and user logon name. (This is the information
about the user who will use this user account from this point on.) Click OK. The
user account is renamed.
Deleting a user account is just what it sounds like — the user account is
permanently removed, and all of its group memberships, permissions, and
user rights are lost. Normally you would only delete a user account when
you never plan to use the account again.
When you delete a user account, the SID associated with the account is
marked as deleted. If you later create a new account with the same name,
A new SID will be associated with the account. For this reason, the new
account won’t have the same privileges as the old, deleted account.
The two built-in accounts, Administrator and Guest, can’t be deleted,
although they can be renamed.
You can delete both local and domain user accounts, as the following
steps explain.
STEP BY STEP
1. From the desktop, right-click My Computer, and select Manage from the menu
that appears.
2. In the Computer Management dialog box, click the + next to Local Users and
Groups. Highlight the Users folder. In the right pane, right-click the user account
you want to delete, and select Delete from the menu that appears.
3. A dialog box appears, asking if you’re sure you want to delete the user account.
Click Yes to delete the user account. The user account is deleted.
4701-1 ch09.f.qc 4/24/00 09:22 Page 582
EXAM TIP
User profiles cover a lot of ground, and are tested on both the
Professional and Server exams. Every heading in this section is fair game,
so spend as much time as it takes for you to be comfortable with all of
the nuances of user profiles.
In the following sections I’ll discuss the contents of a user profile, how a
user profile is created, customizing the local and domain-wide Default
User profile folder, customizing the All Users profile folder, roaming
and mandatory user profiles, and deleting user profiles.
TIP
All user profiles have virtually the same contents as those shown for the
Administrator.
Note in Figure 9-14 that there are several subfolders and files contained
in the Administrator’s profile folder. Table 9-2 lists and describes each of
these folders and files.All users’ profile folders (not just the Administrator’s)
contain the folders and files listed in Table 9-2.
TABLE 9-2 Windows 2000 User Profile Folder Contents
Folder or File Description
Application Data This folder contains any user-specific application data that
an application vendor has chosen to store in it. For
example, a word processing application could store the
user’s custom dictionary in this subfolder.
Cookies This folder contains cookies, which are files stored on the
user’s computer that provide customization of Internet or
intranet Web sites.
Desktop This folder contains all shortcuts, files, and folders stored
on the user’s desktop.
4701-1 ch09.f.qc 4/24/00 09:22 Page 585
When Windows 2000 creates a new user profile, the new user’s initial user
profile is an exact copy of either the local or domain-wide Default User
profile folder (depending on the folder Windows 2000 copied to create the
new user profile).
The Default User profile folder can be customized by the Admini-
strator, as I’ll explain in the next section.
TIP
Remember that the Default User profile folder only affects first-time
users of this computer — previous users already have individual user pro-
file folders.
TIP
You can’t use Windows Explorer to copy user profiles. You can only copy
user profiles by using the System application in Control Panel.
STEP BY STEP
1. Select Start ➪ Settings ➪ Control Panel. Then double-click the System icon. (Or,
from the desktop, right-click My Computer, and select Properties from the menu
that appears.)
2. In the System Properties dialog box, click the User Profiles tab.
3. The User Profiles tab appears, as shown in Figure 9-15. Highlight the existing
user profile that you want to copy. Click Copy To.
4701-1 ch09.f.qc 4/24/00 09:22 Page 588
4. In the Copy To dialog box, type the full path of the location to which you want
to copy the user profile. (This could be C:\Documents and Settings\
Default User if you are copying an existing profile to replace the current local
Default User profile folder.) Figure 9-16 shows the Copy To dialog box after it
has been configured. Notice which user is permitted to use the copied user profile.
FIGURE 9-16 Specifying the destination for the copied user profile
To specify the user(s) who will be permitted to use the copied user profile, click
Change.
4701-1 ch09.f.qc 4/24/00 09:22 Page 589
5. In the Select User or Group dialog box, select the user or group that you want to
permit to use the copied user profile. (If you’re copying a user profile to customize
a Default User profile folder, you might want to select the Everyone group.)
Click OK.
6. The Copy To dialog box reappears, with the user or group you selected in Step 5
displayed in the “Permitted to use” section of the dialog box. Click OK.
7. If the destination location you selected in Step 4 already exists (such as the loca-
tion of an existing user or Default User profile folder) a Confirm Copy dialog
box appears, notifying you that the current contents of the destination folder will
be deleted during this operation. Click Yes to copy the user profile to the new
location and to overwrite the existing contents.
8. In the System Properties dialog box, click OK.
3. In the left pane, highlight the subfolder of the Default User profile folder in
which you want to create a shortcut. Select File ➪ New ➪ Shortcut.
4. In the Create Shortcut dialog box, type the full path to the application. If you don’t
know the full path to the application, you can browse for it. Click Next.
5. In the Select a Title for the Program dialog box, type the name of the shortcut the
way you want it to appear on the user’s desktop. Click Finish.
6. Repeat Steps 3 through 5 until you have created all the shortcuts you want in the
Default User profile folder. Close Windows Explorer.
TIP
In order for the new domain-wide Default User profile folder to work
correctly, you must name the copied folder Default User, and you
must configure the copied folder so the Everyone group is permitted to
use it.
4701-1 ch09.f.qc 4/24/00 09:22 Page 591
STEP BY STEP
At this point you’ve created a shared folder on the server. Now you must assign
a server-based user profile path to each user you want to assign a roaming user
profile. Use the steps in Part 2 to assign a server-based user profile path to a
domain user account. Use the steps in Part 3 to assign a server-based user pro-
file path to a local user account.
1. From the desktop, right-click My Computer, and select Manage from the menu
that appears.
2. In the Computer Management dialog box, click the + next to Local Users and
Groups. Highlight the Users folder. In the right pane, double-click the user for
whom you want to configure a roaming user profile. Or, you can right-click the
user, and select Properties from the menu that appears.
3. The user’s Properties dialog box appears. Click the Profile tab.
4. The Profile tab appears. In the “Profile path” text box, type in the complete path to
the shared folder you created in Part 1, and append the user’s name to the end of
this path. (For example, on a server named SERVER02, you might use the path
\\SERVER02\Profiles\JulieC.) Click OK.
5. Close the Computer Management dialog box.
At this point, all you’ve done is assign a location for the user’s roaming
user profile. Now the user must log on and log off to create a roaming user
profile on the server.When the user logs off, the user’s local user profile is
saved to the server and then becomes the user’s roaming user profile.The
roaming user profile is then available to the user from any Windows 2000
computer to which the user logs on. From this point on, every time the
user logs off, the user’s roaming user profile will be updated with any
changes the user has made during the time the user was logged on.
Both new and existing users can be assigned roaming user profiles.You
can also preconfigure a new or existing user’s roaming user profile so that
the next time the user logs on, the properties of the preconfigured server-
based roaming user profile are applied to the user.The advantage of using
preconfigured roaming user profiles is that the Administrator can provide
users with all of the shortcuts and program items users need to perform
their day-to-day tasks.
To preconfigure a user’s roaming user profile, assign a server-based profile
path to a user account, and then copy an existing user profile (that you have
customized with all of the files, shortcuts, settings, and applications you want
4701-1 ch09.f.qc 4/24/00 09:22 Page 595
the user to have) to the user’s roaming user profile path, and ensure that the
user is permitted to use the profile.
TIP
If you have a need for the capabilities of mandatory user profiles, con-
sider using group policy instead. Group policy provides the administrator
with more control over users’ environment settings than mandatory user
profiles. I’ll cover group policy in Chapter 10.
4701-1 ch09.f.qc 4/24/00 09:22 Page 596
STEP BY STEP
1. Select Start ➪ Settings ➪ Control Panel. Then double-click the System icon. (Or,
from the desktop, right-click My Computer, and select Properties from the menu
that appears.)
2. In the System Properties dialog box, click the User Profiles tab.
3. On the User Profiles tab, highlight the user profile you want to delete. Click
Delete.
4. In the Confirm Delete dialog box, click Yes to delete the user profile.
5. On the User Profiles tab, click OK.
6. Exit Control Panel if you opened it in Step 1.
EXAM TIP
Windows 2000 account policies are fairly straightforward, but expect to
see at least one password policy or account lockout policy question on
both the Professional and Server exams.
Password Policy
Password policy dictates the requirements of user passwords and how often
users must change their passwords. There are six configurable password
policy settings: “Enforce password history,” “Maximum password age,”
“Minimum password age,” “Minimum password length,” “Passwords must
meet complexity requirements,” and “Store password using reversible
encryption for all users.”
TIP
If users are not forced to change their passwords often enough, network
security may be compromised. However, if users have to change their
passwords too frequently, they may be unable to remember their pass-
words.
TIP
I recommend a minimum of eight characters for the “Minimum password
length” setting. With a password length of eight characters or more,
assuming basic password security measures are taken, it’s statistically
almost impossible for an unauthorized user to guess a password.
Store Password Using Reversible Encryption for All Users The “Store
password using reversible encryption for all users” setting determines
whether Windows 2000 stores user passwords by using one-way encryp-
tion or by using reversible encryption. One-way encryption is more secure
than reversible encryption. This setting can either be enabled or disabled.
By default, the “Store password using reversible encryption for all users”
setting is disabled.
4701-1 ch09.f.qc 4/24/00 09:23 Page 600
Reset Account Lockout After The “Reset account lockout after” setting
specifies the number of minutes that must pass without a bad logon
attempt in order for the “Account lockout threshold” counter to be reset
to zero. Resetting the counter to zero gives users the full number of possi-
ble bad logon attempts before account lockout. The possible settings are:
“Not defined,” or from 1 to 99,999 minutes. The default “Reset account
lockout after” setting is “Not defined.”
If this setting is “Not defined,” user accounts will never be locked out,
and the “Reset account lockout after” setting won’t be used.
If this setting is configured to x minutes (where x represents a number
from 1 through 99,999), the “Account lockout threshold” counter will be
reset to zero after the specified number of minutes have passed with no bad
logon attempts.
Kerberos Policy
Kerberos policy dictates how Windows 2000 uses the Kerberos V5 authen-
tication protocol to authenticate users.There are five configurable settings:
■ Enforce user logon restrictions
■ Maximum lifetime for service ticket
■ Maximum lifetime for user ticket
■ Maximum lifetime for user ticket renewal
■ Maximum tolerance for computer clock synchronization
The default configurations for each of these five settings are adequate
for most Windows 2000 implementations, and should not be changed
except by Administrators who have an in-depth understanding of the
Kerberos V5 protocol.
4701-1 ch09.f.qc 4/24/00 09:23 Page 602
The tool you use to set account policies depends on where you want to
set account policies:
■ To set account policies on the local Windows 2000 computer,
use the Local Security Policy tool in Administrative Tools. (Select
Start ➪ Settings ➪ Control Panel, double-click Administrative
Tools, then double-click Local Security Policy.)
■ To set account policies for all Windows 2000 computers in a
domain, use the Domain Security Policy tool in Administrative
Tools. (Select Start ➪ Programs ➪ Administrative Tools ➪ Domain
Security Policy.) This tool is available on Windows 2000 domain
controllers, or on other Windows 2000 computers that have the
ADMINPAK installed.
■ To set account policies for all domain controllers in a domain, use
the Domain Controller Security Policy tool in Administrative
Tools. (Select Start ➪ Programs ➪ Administrative Tools ➪ Domain
4701-1 ch09.f.qc 4/24/00 09:23 Page 603
TIP
Another way to set account policies is to use Active Directory Users and
Computers to configure a group policy for the domain (or for the domain
controllers in the domain) that specifies the desired account policies. I’ll
explain how to use group policy in Chapter 10.
Now I’ll show you how to set account policies for all Windows 2000
computers in the domain by using the Domain Security Policy tool.
Because the Windows 2000 user interfaces for the Domain Security Policy
tool, the Domain Controller Security Policy tool, and the Local Security
Policy tool are substantially similar, you can use these same steps to set
account policies for domain controllers or for the local Windows 2000
computer by using the appropriate tool.
STEP BY STEP
1. Start the Domain Security Policy tool. (Select Start ➪ Programs ➪ Administrative
Tools ➪ Domain Security Policy.)
2. In the left pane of the Domain Security Policy dialog box, click the + next to
Security Settings. Then click the + next to Account Policies.
3. In the left pane of the dialog box, highlight the type of account policies you want
to set, either Password Policy, Account Lockout Policy, or Kerberos Policy.
Figure 9-20 shows Password Policy highlighted in the Domain Security Policy
dialog box. Notice the six configurable settings displayed in the right pane.
4. To set account policies, in the right pane, double-click the setting you want to
configure. For example, suppose you want to configure the minimum password
length.
4701-1 ch09.f.qc 4/24/00 09:23 Page 604
5. In this case, the Security Policy Setting dialog box would be displayed, as shown
in Figure 9-21. Notice that a spin box is used to specify the minimum number of
required characters in user passwords.
TIP
Most of the Security Policy Setting dialog boxes, which are used for set-
ting password policy, account lockout policy, and Kerberos policy, are
similar to the dialog box shown in Figure 9-21.
4701-1 ch09.f.qc 4/24/00 09:23 Page 605
Make the appropriate configurations in the Security Policy Setting dialog box and
click OK.
6. Repeat Steps 3 through 5 to set additional account policies as necessary. When
you’ve finished setting account policies, close the Domain Security Policy dialog box.
TIP
Changes made to domain security policy are made on only one domain
controller. It may take several minutes to several hours for these changes
to replicate to all domain controllers in the domain. During this time,
some users will experience the changes, and some won’t.
User Rights
Each user right authorizes a user or group to perform a specific task. User
rights, unlike account policies, can be assigned to individual users and groups.
Microsoft has subdivided Windows 2000 user rights into two categories:
logon rights and privileges. Logon rights specify whether a user is permitted
to authenticate (log on) to a Windows 2000 computer, and if so, how that
user is permitted to log on. Privileges enable a user to perform specific tasks.
The Windows 2000 logon rights are:
■ Access this computer from the network
■ Deny access to this computer from the network
■ Deny logon as a batch job
■ Deny logon as a service
4701-1 ch09.f.qc 4/24/00 09:23 Page 606
TIP
When a user is assigned both the “Log on locally” and the “Deny logon
locally” logon rights or when logon rights conflict, the “Deny logon
locally” logon right takes precedence.
TIP
Another way to assign user rights is to use Active Directory Users and
Computers to configure a group policy for the domain (or for the domain
controllers in the domain) that specifies the desired user rights. I’ll explain
how to use group policy in Chapter 10.
Now I’ll show you how to assign user rights for all Windows 2000 com-
puters in the domain by using the Domain Security Policy tool. Because
the Windows 2000 user interfaces for the Domain Security Policy tool, the
Domain Controller Security Policy tool, and the Local Security Policy
tool are very similar, you can use these same steps to configure user rights
for domain controllers or for the local Windows 2000 computer by using
the appropriate tool.
STEP BY STEP
1. Start the Domain Security Policy tool. (Select Start ➪ Programs ➪ Administrative
Tools ➪ Domain Security Policy.)
2. In the left pane of the Domain Security Policy dialog box, click the + next to
Security Settings. Then click the + next to Local Policies. In the left pane of the
dialog box, highlight User Rights Assignment. The list of user rights that you can
assign appears in the right pane, as shown in Figure 9-22. Notice that both logon
rights and privileges are listed.
3. To assign user rights, in the right pane, double-click the user right you want to
assign.
4. A Security Policy Setting dialog box for the user right you selected appears, as
shown in Figure 9-23. Notice that the user right I chose to configure is called
“Log on locally.” This user right permits users to log on interactively at all
Windows 2000 computers within the tool’s scope, in this case, at all Windows
2000 computers in the domain.
4701-1 ch09.f.qc 4/24/00 09:23 Page 609
If you’re using the Domain Security Policy tool or Domain Controller Security
Policy tool, select the check box next to “Define these policy settings” (if it is not
already selected). Then click Add.
If you’re using the Local Security Policy tool, click Add.
5. The “Add user or group” dialog box appears. Click Browse to add users or groups.
6. The Select Users or Groups dialog box appears, as shown in Figure 9-24.
Double-click each user or group that you want to assign this user right to. As you
double-click each user or group, the user or group’s name will appear in the bot-
tom section of this dialog box. (You can also perform this step by highlighting a
user or group and then clicking Add, but double-clicking is faster and easier.)
When you’ve selected all of the users and/or groups you want to assign this
user right to, click OK.
7. In the “Add user or group” dialog box, click OK.
8. In the Security Policy Setting dialog box, click OK.
9. Repeat Steps 3 through 8 to assign additional user rights if necessary. When
you’ve finished assigning user rights, close the Domain Security Policy dialog box.
4701-1 ch09.f.qc 4/24/00 09:23 Page 611
You are an Administrator, but Verify that you are logged on as Administrator. If
you are unable to modify the you are logged on as Administrator, ensure that you
properties of a user account. have the appropriate permissions to manage the
user account. Verify your permissions on the
Security tab in the user’s Properties dialog box. If
necessary, take ownership of the user account.
Continued
4701-1 ch09.f.qc 4/24/00 09:23 Page 612
A user reports that she can’t This message is displayed when a user’s account
log on to her Windows 2000 has expired, has been disabled, or has been locked
computer. During the logon out. If the user is a local user, on the General tab in
attempt, a message stating the local user’s Properties dialog box, clear the
“Your account has been check box next to “Account is locked out” or clear
disabled. Please see your the check box next to “Account is disabled.” If the
system administrator” is user is a domain user, on the Account tab in the
displayed. user’s Properties dialog box, change the account
expiration date or clear the check box next to
“Account is locked out.”
A user who normally works This message is displayed when a user attempts to
weekdays came in to work log on during restricted hours or attempts to log on
on Sunday, and could not to a restricted computer. Check the Logon Hours
log on to his Windows 2000 and Log On To settings on the Account tab in the
computer. A message stating user’s Properties dialog box, and make any
“Unable to log you on because necessary changes.
of an account restriction” was
displayed.
A user reports that she is By default, only Administrators can log on locally to
unable to log on locally to the the domain controller. Restricting local logon to the
domain controller. domain controller is generally a preferred practice.
Use the Domain Controller Security Policy tool to
grant the user the “Log on locally” user right, or
make the user a member of a group that has that
user right. Remember, if the user has been assigned
both the “Log on locally” and “Deny logon locally”
user rights, the “Deny logon locally” right takes
precedence.
A user reports that he is Use the Local Security Policy tool on the local
unable to clear or save the computer to grant the user the “Manage auditing
Event Viewer logs on his and security log” user right, or make the user a
Windows 2000 computer. member of a group that has that user right.
4701-1 ch09.f.qc 4/24/00 09:23 Page 613
When Windows 2000 prompts Examine the Password Policy settings. Check to
a user to change his password, see if the new password the user has entered
he types in a new password, but meets the minimum password length and
Windows 2000 will not accept password complexity requirements. Remember,
the user’s new password. A if password complexity is enabled, the password
message stating “Your must contain three of the four types of characters:
password must be at least 8 uppercase alphabetic, lowercase alphabetic,
characters; cannot repeat any numbers, and special characters. Is the user’s
of your previous 2 passwords; new password a password that he has used
must contain capitals, numerals previously? If so, check to see if it meets the
or punctuation . . .” is displayed. “Enforce password history” settings.
A user reports that she can’t The most likely cause of this problem is that the
change her password. When user hasn’t met the minimum password age
she attempts to do so, a requirements. Explain to the user that she must
message stating “The password keep her password for the minimum number of
on this account cannot be days specified.
changed at this time” is displayed.
Numerous users report that if Examine the Account Lockout Policy settings.
they mistype their passwords The most likely cause of this problem is that the
two times they are unable to “Account lockout threshold” setting is set too low.
log on. A message stating, Increase this setting if necessary. In addition, you
“Your account has been will need to manually unlock each user’s account
disabled. Please see your (in the user’s Properties dialog box) before they
system administrator” is will be able to log on.
displayed.
A user reports that he is Verify that the user name, domain, and password the
unable to log on. A message user is using are correct. Remember, passwords are
is displayed, stating “The case sensitive. Make sure that Caps Lock is not on.
system could not log you on.”
A user reports that she is able Verify that at least one domain controller is available
to log on locally (by using her on the network. If so, check the network connection
local user account) but is between the user’s computer and the domain
unable to log on to the domain controller.
(by using her domain user
account).
A user at a Windows NT 4.0 The most likely cause of this problem is that the
computer reports that he is Windows 2000 domain controller that is performing
nable to log on to the domain. the PDC emulator role is unavailable. Take the
necessary actions to make this computer available
on the network.
4701-1 ch09.f.qc 4/24/00 09:23 Page 614
Local Groups
Local groups are groups that are created and maintained on an individual
Windows 2000 computer (that is not a domain controller). Local groups
can be created by members of the Administrators, Power Users, and Users
groups.
Local groups are used to control access to resources on the local com-
puter. In a typical configuration, a local group is assigned permissions to a
specific resource, such as a shared folder or a shared printer.Then individual
user accounts and groups are made members of this local group.The result
4701-1 ch09.f.qc 4/24/00 09:23 Page 615
is that all members of the local group now have permissions to the shared
resource on the local computer. Using local groups simplifies the adminis-
tration of resources, because permissions can be assigned once to a local
group, instead of separately to each user account.
TIP
Local groups can’t be used to control access to resources on any com-
puter other than the local computer.
Both local and domain user accounts can be members of a local group.
In addition, built-in system groups on the local computer and global
groups and universal groups from the domain can be members of a local
group. Finally, a local group can’t be a member of another group.
Built-in Groups
Built-in groups are groups with preset characteristics that are automatically
created during the installation of Windows 2000. There are two kinds of
built-in groups on a Windows 2000 computer that is not a domain con-
troller: built-in local groups, and built-in special groups.
Built-in Local Groups Built-in local groups are groups that have the rights
and/or permissions that enable their members to perform specific tasks on
the local computer.You can assign users to the built-in local groups that
most closely match the tasks the users need to perform. If there isn’t a
built-in local group that has the rights or permissions needed to perform a
specific task or access a specific resource, then you can create a local group
and assign it the necessary rights or permissions to accomplish the task or
access the resource.
You can assign rights and permissions to built-in local groups. In addi-
tion, you can make users members of (and remove users from) built-in
local groups. (An exception is that you can’t remove Administrator from
the Administrators group.) Built-in local groups can be renamed, but they
can’t be deleted.
There are six built-in local groups that are automatically created during
the installation of Windows 2000 on a nondomain controller:
■ Administrators: Members of this group have full administrative
rights and permissions to administer the local computer.This group
initially contains the Administrator account, and, if the computer is
a member of a domain, it contains that domain’s Domain Admins
global group.
4701-1 ch09.f.qc 4/24/00 09:23 Page 616
STEP BY STEP
1. Right-click My Computer, and select Manage from the menu that appears.
2. In the left pane of the Computer Management dialog box, click the + next to Local
Users and Groups. Highlight the Groups folder. Select Action ➪ New Group.
3. In the New Group dialog box, type in a name for the new group in the “Group
name” text box. Enter a description if you want to. Click Add to add members to
this group.
4. In the Select Users or Groups dialog box, double-click each user or group you
want to make a member of your new group. As you double-click each user or
group, the user or group’s name will appear in the bottom section of this dialog
box. (You can also perform this step by highlighting a user or group and then
clicking Add, but double-clicking is faster and easier.) When you’ve selected all
of the users or groups you want to make members of this group, click OK.
5. In the New Group dialog box, click Create.
6. Repeat Steps 3 through 5 if you want to create additional local groups. Click Close.
Three of the most common local group management tasks are renaming
a group, deleting a group, and changing the group’s membership.
STEP BY STEP
1. Right-click My Computer, and select Manage from the menu that appears.
2. In the left pane of the Computer Management dialog box, click the + next to Local
Users and Groups. Highlight the Groups folder. In the right pane, right-click the
group you want to rename or delete.
To rename a group, select Rename from the menu that appears, type in a new
name for the group, and press Enter.
To delete a group, select Delete from the menu that appears. Click Yes when
Windows 2000 asks if you’re sure you want to delete the group.
TIP
Remember, you can’t delete the built-in local groups.
4701-1 ch09.f.qc 4/24/00 09:23 Page 620
1. Right-click My Computer, and select Manage from the menu that appears.
2. In the left pane of the Computer Management dialog box, click the + next to Local
Users and Groups. Highlight the Groups folder. In the right pane, double-click
the group you want to change the membership of.
3. The group’s Properties dialog box appears.
To remove a member from the group, highlight the member in the Members box,
and click Remove. Skip to Step 5.
To add a member to the group, click Add.
4. In the Select Users or Groups dialog box, double-click each user or group you
want to add to the group. When you’ve selected all of the users and/or groups
you want to add, click OK.
5. In the group’s Properties dialog box, click OK.
On a Windows 2000 Professional computer, you can also use the Users
and Passwords Control Panel application to add and remove existing local
user accounts to and from existing local groups.
Global Groups
Global groups, like domain local groups, are created and maintained in
Active Directory on Windows 2000 domain controllers. Global groups,
however, are primarily used to organize users who perform similar tasks or
have similar network access requirements.
In a typical configuration, user accounts of domain users who have sim-
ilar job functions are placed in a global group. Then this global group is
made a member of one or more domain local groups in any domain in the
forest. Each of these domain local groups is assigned permissions to a spe-
cific shared resource. The result is that members of the global group now
have permissions to the shared resource(s).
Here’s an example of how global groups can be used in real life. Suppose
that when the company’s network was first installed, the administrator cre-
ated user accounts, and placed these user accounts in various global groups
depending on the users’ job functions. Now, the network administrator
wants to assign several users permissions to a shared printer on a Windows
2000 computer. The administrator creates a new domain local group and
assigns this group permissions to the shared printer.Then the administrator
selects the global groups that contain the user accounts that need access to
this shared printer, and makes the global groups members of the new
domain local group. The result is that all domain user accounts that are
members of the selected global groups now have access to the shared
printer. If access to all resources is managed in this way, when a new user is
4701-1 ch09.f.qc 4/24/00 09:23 Page 622
created, the administrator need only make the user a member of the appro-
priate global group(s) in order for the user to have access to all network
resources required to do his or her job.
The advantage of using global groups, then, is ease of administration —
the network administrator can manage large numbers of users by placing
them in a small number of global groups.
A global group can only contain user accounts and other global groups
from its domain. Global groups can’t contain domain local groups or uni-
versal groups from its domain, and can’t contain user accounts or groups
from any other domain.
Although it is not a preferred practice, you can assign user rights and
permissions to global groups. Global groups can be assigned permissions to
shared resources on any computer in the forest.
Universal Groups
Universal groups, like domain local groups and global groups, are created and
maintained in Active Directory on Windows 2000 domain controllers.
Universal groups, however, are used to organize users from multiple domains
that perform similar job tasks or have similar network access requirements,
and/or to control access to shared resources in multiple domains.
There’s no one typical universal group configuration. For example, you
can use a universal group as a “super” global group by placing users from
multiple domains into the universal group, and then making the universal
group a member of one or more domain local groups to which you have
assigned permissions to shared resources. Or, you can use a universal group
in much the same way as you’d use a domain local group, except that you
can assign a universal group permission to a shared resource on any com-
puter in the forest. In short, you can use universal groups just about any
way you want to.
Universal groups provide significant advantages, but sometimes present
significant challenges, too.The primary advantage of using universal groups is
their open membership: user accounts, global groups, and universal groups
from any domain in the forest can be members of a universal group.An addi-
tional advantage of using universal groups is that universal groups can be
assigned permissions to shared resources on any computer in the forest.
The main disadvantage of using universal groups is that they can cause
potential network traffic problems. Here’s how this can happen.When you
first create a universal group, all of the group’s members are listed in the
global catalog.Then, each time you change the membership of a universal
4701-1 ch09.f.qc 4/24/00 09:23 Page 623
group, the global catalog is updated, and this change is replicated to all
global catalog servers on your network. If you have a large number of uni-
versal groups and change them frequently, this can cause significant
amounts of replication traffic on your network.
Another challenge presented by universal groups is that they are not avail-
able if your Windows 2000 domain is operating in mixed-mode, that is,
when you have both Windows 2000 domain controllers and Windows NT
4.0 backup domain controllers in your domain. Universal groups can only
be used when your Windows 2000 domain is operating in native-mode.
Because of these challenges, you should only use universal groups when
you need to organize users from multiple domains that perform similar job
tasks or have similar network access requirements, or when you need to use
a single group to control access to shared resources in multiple domains.
Built-in Global and Universal Groups Built-in global and universal groups
on domain controllers are automatically created during the installation of
Active Directory and stored in the Users folder. Built-in global and uni-
versal groups are primarily used to group users by the types of administra-
tive tasks they can perform in Active Directory and on all computers in the
Windows 2000 domain.
Built-in global and universal groups on domain controllers have the
same characteristics as administrator-created global and universal groups
(which were covered earlier in this chapter).
There are numerous built-in global and universal groups. Below I’ve
listed and described the most common ones:
■ Domain Admins: Members of this global group have no initial
rights or permissions.This group initially derives all of its rights
and permissions from its membership in other groups. By default,
this group is a member of the domain’s built-in local
Administrators group and the local built-in Administrators group
on all computers that are members of the domain.As a result of
this group’s membership in other groups, members of Domain
Admins can administer Active Directory and all computers in the
domain.This group initially contains the Administrator account.
■ Domain Users: Members of this global group have no initial rights
or permissions.This group initially derives all of its rights and per-
missions from its membership in other groups. By default, this group
is a member of the domain’s built-in local Users group and the local
built-in Users group on all computers that are members of the
domain.This group initially contains all domain user accounts
4701-1 ch09.f.qc 4/24/00 09:23 Page 626
STEP BY STEP
In the “Group name” text box, enter a name for the group.
If you have Windows NT 4.0 computers in your domain, you can assign the group
a different name for those computers by entering it in the “Group name (pre-
Windows 2000)” text box. If you choose to assign a different name, it should con-
tain 20 characters or fewer for backward compatibility with Windows NT 4.0.
4701-1 ch09.f.qc 4/24/00 09:23 Page 628
Select a group scope — either Domain local, Global, or Universal. The default
selection is Global.
TIP
You can’t create a universal group in a Windows 2000 domain that is
operating in mixed-mode.
STEP BY STEP
TIP
You can’t delete any of the domain’s built-in groups.
3. The group’s Properties dialog box appears, as shown in Figure 9-26. Notice the
six tabs in this dialog box: General, Members, Member Of, Managed By, Object,
and Security. (The Object and Security tabs are only displayed when Advanced
Features is selected in the View menu.)
On the General tab, you can change the group’s pre-Windows 2000 name, enter
a description for the group, and enter the e-mail address for the group.
On this tab you can also change the group scope. The three possible options
are Domain local, Global, and Universal. The actual options available to you will
depend on the type of group you’re configuring.
You can also change the group type on the General tab. The two possible options
are Security and Distribution.
CAUTION
Changing the group scope or group type can significantly change the
structure and functionality of the group, including the membership of the
group, the resources to which the group can be assigned permissions,
and so on. In general, I recommend that you don’t change the group
scope or group type.
4701-1 ch09.f.qc 4/24/00 09:23 Page 631
Make any appropriate changes on the General tab. If you’re finished configuring
the group, click OK. Otherwise, I’ll explain the other tabs in the following steps.
4. On the Members tab, you can add and remove members to and from the group.
(For detailed instructions, see the step-by-step section titled “Adding and remov-
ing members to/from a group in Active Directory.”)
5. On the Members Of tab, you can add this group to and remove this group from
other groups.
6. On the Managed By tab, you can select a user from any domain in Active
Directory to be listed as the manager for this group. All of the user’s contact infor-
mation will then be displayed on this tab. To select a user, click Change, and then
select a user from the Select User or Contact dialog box. Click OK. If you need to
view or modify the user’s contact data, click View.
7. On the Object tab, you can view information about the group, including the
group’s FQDN, the date the group was created, the date the group was last mod-
ified, and so on. No configurations are possible on this tab.
8. On the Security tab, you can specify the users and groups that are permitted to
view or modify the properties of this group, and assign permissions to these users
and groups.
9. When you’re finished configuring the group’s properties, click OK in the group’s
Properties dialog box.
Several important user and group topics were introduced in this chapter:
■ User authentication is the process of verifying a user’s credentials for the pur-
pose of determining whether the user is permitted to access a local computer
or a network resource, such as a shared folder or shared printer.
■ There are two Windows 2000 built-in user accounts: Administrator and Guest.
■ You can use the Local Users and Groups tool in Computer Management to
create and configure local user accounts on a nondomain controller.
■ To create and configure domain user accounts in Active Directory, use Active
Directory Users and Computers.
■ You can also create user accounts by using a batch file or a script file in con-
junction with the NET USER command-line utility.
4701-1 ch09.f.qc 4/24/00 09:23 Page 632
■ You can copy, rename, and delete user accounts, with the exception of the two
built-in accounts, Administrator and Guest, which can’t be deleted.
■ A user profile is a folder that contains a collection of settings and options that
specify a user’s desktop and all other user-definable settings for a user’s work
environment. The System application in Control Panel is used to copy user
profiles.
■ Roaming user profiles are user profiles that are stored on a Windows 2000
Server computer. Because these profiles are stored on a server, they are avail-
able to users regardless of which Windows 2000 computer on the network
they log on to.
■ A mandatory user profile is a user profile that, when assigned to a user, can’t
be changed by the user. A user can make changes to desktop and work envi-
ronment settings during a single logon session, but these changes are not
saved to the mandatory user profile when the user logs off.
■ Windows 2000 account policies are sets of rules that are applied to many user
accounts, often to all of the users in a domain. There are three major types of
account policies: password policy, account lockout policy, and Kerberos policy.
■ User rights authorize individual users and groups to perform specific tasks.
User rights are not the same as permissions: user rights enable users to per-
form tasks; whereas permissions enable users to access objects, such as files,
folders, printers, and Active Directory objects.
■ Groups on the local computer are primarily used to control access to
resources on that computer. All groups on the local computer are security
groups. There are two kinds of groups found on the local computer: local
groups and built-in groups.
■ You can create and manage local groups by using the Local Users and Groups
tool in Computer Management. You must be a member of the Administrators,
Power Users, or Users groups to create a local group.
■ Groups in Active Directory are used to control access to network resources
and to organize users who perform similar job tasks and/or have similar net-
work access requirements.
■ There are three administrator-created kinds of groups in Active Directory:
domain local groups, global groups, and universal groups. In addition, there
are built-in local, global, universal, and special groups in Active Directory.
4701-1 ch09.f.qc 4/24/00 09:23 Page 633
■ You can create groups in Active Directory by using Active Directory Users
and Computers. You must be a member of the domain’s built-in local
Administrators or Account Operators groups to create groups in Active
Directory.
4701-1 ch09.f.qc 4/24/00 09:23 Page 634
634
STUDY GUIDE
This section contains several exercises designed to drive home the user and
group concepts presented in this chapter:
■ Assessment questions: These questions test your knowledge of
the user and group topics covered in this chapter.You can find the
answers to these questions at the end of this chapter.
■ Scenario: The situation-based questions in scenarios challenge
you to apply your understanding of the material to solve a hypo-
thetical problem. In this chapter’s scenario, you are asked to
describe the action you would take to solve a number of given
troubleshooting problems.You don’t need to be at a computer to
do scenarios.Answers to this chapter’s scenario are presented at the
end of this chapter.
■ Lab Exercises: These exercises are hands-on practice activities
that you perform on a Windows 2000 computer.The two labs in
this chapter give you an opportunity to create local and domain
user and group accounts; test local user authentication; and work
with account policies, user rights, and user profiles.
Assessment Questions
1. You want to create a local user account on a Windows 2000
computer.Which tool should you use?
A. Local Security Policy
B. Local Users and Groups
C. The System application
D. Active Directory Users and Computers
2. You want to create a domain user account.Which tool should
you use?
A. Users and Passwords
B. The System application
C. Local Users and Groups
D. Active Directory Users and Computers
4701-1 ch09.f.qc 4/24/00 09:23 Page 635
635
636
8. You want to create a domain local group.Which tool should you use?
A. Local Security Policy
B. Domain Security Policy
C. Local Users and Groups
D. Active Directory Users and Computers
9. Your company has 50 sales representatives.The domain user accounts
of these sales representatives are the only members of a single global
group.You want to assign all of the sales representatives permissions to
a specific printer located in the sales office. How can you efficiently
accomplish this?
A. Assign each of the sales representatives’ user accounts permissions
to the printer.
B. Create a new global group. Make the user accounts of all of the
sales representatives members of the new global group.Assign
permissions to the printer to the new global group.
C. Create a new built-in special group.Assign permissions to the
printer to the built-in special group. Make the global group that
contains the sales representatives a member of the new built-in
special group.
D. Create a new domain local group.Assign permissions to the
printer to the new domain local group. Make the global group
that contains the sales representatives a member of the new
domain local group.
10. You want to use a single group to organize users from multiple
domains that perform similar job tasks.Which kind of group should
you use?
A. Universal group
B. Global group
C. Domain local group
D. Built-in special group
4701-1 ch09.f.qc 4/24/00 09:23 Page 637
637
Scenarios
The following scenarios provide you with an opportunity to apply the
knowledge you’ve gained in this chapter about troubleshooting local and
domain user accounts. User account problems can arise due to a number of
different causes. For each of the following problems, consider the given sit-
uation and facts, and state what course of action you would take to try to
resolve the problem.
1. A user,ToddE, reports that he can’t log on to his Windows 2000 com-
puter.Windows 2000 displayed the following message:“Your account
has been disabled. Please see your system administrator.”
2. A user, SusanB, usually works from Monday through Friday. However,
this past weekend she came in to work and could not log on to her
Windows 2000 computer.Windows 2000 displayed the following
message:“Unable to log you on because of an account restriction.”
3. A user,AnneC, reports that Windows 2000 prompted her to change
her password, but when she typed in a new password,Windows 2000
would not accept the new password.Windows 2000 displayed the fol-
lowing message:“Your password must be at least 9 characters; cannot
repeat any of your previous 3 passwords; must contain capitals,
numerals, or punctuation . . .”
4. A user, JeffT, reports that he can’t log on locally to your network’s
Windows 2000 domain controller.
5. A user, GregZ, reports that he is unable to log on to his Windows
2000 computer.Windows 2000 displayed the following message:“The
system could not log you on.”
Lab Exercises
These labs are designed to provide you with hands-on experience working
with users and groups in a Windows 2000 environment.
4701-1 ch09.f.qc 4/24/00 09:23 Page 638
638
The purpose of this lab is to give you practical experience working with
local users and groups on a Windows 2000 Professional computer.
There are three parts to this lab:
■ Part 1: Creating and Configuring Local Users and Groups
■ Part 2: Implementing and Configuring User Rights
■ Part 3:Testing Local User Authentication
Begin this lab by booting your computer to Windows 2000 Professional
and logging on as Administrator.
639
5. In the New User dialog box, click Close.The new users are created,
and appear in the right pane of the Computer Management dialog
box. In the right pane, double-click User1.
6. In the User1 Properties dialog box, click the Profile tab.
7. On the Profile tab, type C:\User1 in the “Profile path” text box.
Click OK.
8. In the left pane of the Computer Management dialog box, highlight
the Groups folder. Select Action ➪ New Group.
9. In the New Group dialog box, type Backuponly in the “Group
name” text box. Enter a description of Members can back up
files but not restore them. Click Add.
10. In the Select Users or Groups dialog box, scroll down until the user
named Backup is displayed. Double-click Backup. Click OK.
11. In the New Group dialog box, click Create.Then click Close.
12. In the right pane of the Computer Management dialog box, double-
click Power Users.
13. In the Power Users Properties dialog box, click Add.
14. In the Select Users or Groups dialog box, scroll down until the user
named User1 is displayed. Double-click User1. Click OK.
15. In the Power Users Properties dialog box, click OK.
16. Close Computer Management.
640
6. In the Select Users or Groups dialog box, scroll down until the
Backuponly group is displayed. Double-click Backuponly. Click OK.
7. In the Local Security Policy Setting dialog box, click OK.
8. In the right pane of the Local Security Settings dialog box, double-
click the “Back up files and directories” user right.
9. In the Local Security Policy Setting dialog box, click Add.
10. In the Select Users or Groups dialog box, scroll down until the
Backuponly group is displayed. Double-click Backuponly. Click OK.
11. In the Local Security Policy Setting dialog box, click OK.
12. Close the Local Security Settings dialog box.
13. Close Administrative Tools.
641
The purpose of this lab is to give you practical experience working with
domain users and groups on a Windows 2000 Server computer.
There are four parts to this lab:
■ Part 1: Configuring Account Policies and Assigning User Rights
■ Part 2: Creating and Configuring Domain User and Group Accounts
■ Part 3: Creating and Configuring Domain User Accounts by
Scripting
■ Part 4: Configuring and Managing User Profiles
Begin this lab by booting your computer to Windows 2000 Server and
logging on as Administrator.
642
4. In the Security Policy Setting dialog box, configure the “Keep pass-
word history” spin box to 8 passwords remembered. Click OK.
5. In the right pane of the Domain Security Policy dialog box, double-
click “Maximum password age.”
6. In the Security Policy Setting dialog box configure the “Passwords
expire in” spin box to 30 days. Click OK.
7. If a Suggested Value Changes dialog box appears, click OK.
8. In the right pane of the Domain Security Policy dialog box, double-
click “Minimum password age.”
9. In the Security Policy Setting dialog box, configure the “Passwords
can be changed after” spin box to 5 days. Click OK.
10. In the right pane of the Domain Security Policy dialog box, double-
click “Minimum password length.”
11. In the Security Policy Setting dialog box, configure the “No password
required” spin box to 8 characters. (Note that the name of this spin
box changes to “Password must be at least.”) Click OK.
12. In the left pane of the Domain Security Policy dialog box, highlight
Account Lockout Policy.
13. In the right pane, double-click “Account lockout threshold.”
14. In the Security Policy Setting dialog box configure the “Account will
not lock out” spin box to 3 invalid logon attempts. (Note that the name
of this spin box changes to “Account will lock out after.”) Click OK.
15. In the Suggested Value Changes dialog box, click OK.
16. In the left pane of the Domain Security Policy dialog box, click
the + next to Local Policies. In the left pane, highlight User Rights
Assignment. In the right pane, double-click the “Log on locally”
user right.
17. In the Security Policy Setting dialog box, select the check box next to
“Define these policy settings.” Click Add.
18. In the “Add user or group” dialog box, click Browse.
19. In the Select Users or Groups dialog box, scroll down until the
Everyone group is displayed. Double-click Everyone. Click OK.
20. In the “Add user or group” dialog box, click OK.
21. In the Security Policy Setting dialog box, click OK.
22. Close Domain Security Policy.
4701-1 ch09.f.qc 4/24/00 09:23 Page 643
643
644
10. In the New Object - User dialog box, enter a password of changeme,
and confirm this password by retyping it. Select the check box next to
“User must change password at next logon.” Click Next.
11. In the New Object - User dialog box, click Finish.
12. Repeat Steps 8 through 11 to create two additional new users in the
Accounting OU.When prompted, enter the following information
for the additional new users:
13. In the left pane of the Active Directory Users and Computers dialog
box, highlight the Information Services OU, and select Action ➪
New ➪ User.
14. In the New Object - User dialog box, enter the following information:
First name: Mike
Last name: Calhoun
User logon name: MikeCa
Click next.
15. In the New Object - User dialog box, enter a password of changeme,
and confirm this password by retyping it. Select the check box next to
“User must change password at next logon.” Click Next.
16. In the New Object - User dialog box, click Finish.
17. In the left pane of the Active Directory Users and Computers dialog
box, highlight the Marketing OU, and select Action ➪ New ➪ User.
18. In the New Object - User dialog box, enter the following information:
First name: Pam
Last name: Rhodes
User logon name: PamR
Click next.
4701-1 ch09.f.qc 4/24/00 09:23 Page 645
645
19. In the New Object - User dialog box, enter a password of changeme,
and confirm this password by retyping it. Select the check box next to
“User must change password at next logon.” Click Next.
20. In the New Object - User dialog box, click Finish.
21. Repeat Steps 17 through 20 to create three additional new users in
the Marketing OU.When prompted, enter the following information
for the additional new users:
Text Box Label 1st New User 2nd New User 3rd New User
22. In the left pane of the Active Directory Users and Computers dialog
box, highlight the Accounting OU.Then, in the right pane, double-
click Robert Jones.
23. On the General tab in the Robert Jones Properties dialog box, type
Accounting Manager in the Description text box. Click the
Profile tab.
24. On the Profile tab, type \\Server01\Profiles\RobertJ in the Profile
path text box. Click OK.
25. Repeat Steps 22 through 24 to configure account settings for each
of the new domain users you created. Remember to highlight the
appropriate OU to access each user account. Use the following table
to assign a description and profile path to each user.
646
26. In the left pane of the Active Directory Users and Computers dialog
box, highlight the Accounting OU.
27. Select Action ➪ New Group.
28. In the New Object - Group dialog box, enter/configure the following
information for the new group:
Group name: Accountants
Group scope: Global
Group type: Security
Click OK.
29. In the right pane of the Active Directory Users and Computers
dialog box, double-click the group you just created.
30. On the General tab in the group’s Properties dialog box, type
Accounting Managers and Staff in the Description text box.
Click the Members tab.
31. On the Members tab, click Add.
32. In the Select Users, Contacts, Computers, or Groups dialog box, add
the following users to the group by double-clicking each user: Pam
Rhodes, Robert Jones, Nancy Yates, and Mike Cook.Then click OK.
33. In the group’s Properties dialog box, click OK.
34. In the left pane of the Active Directory Users and Computers dialog
box, highlight the Marketing OU.Then repeat Steps 27 through 33
two more times to create and configure two additional groups. Use
the information in the following table to help you create these two
groups.
4701-1 ch09.f.qc 4/24/00 09:23 Page 647
647
35. In the left pane of the Active Directory Users and Computers dialog
box, highlight the Users folder. In the right pane, double-click the
Enterprise Admins group.
36. In the Enterprise Admins Properties dialog box, click the Members tab.
37. On the Members tab, click Add.
38. In the Select Users, Contacts, Computers, or Groups dialog box, scroll
down until Mike Calhoun is displayed. Double-click Mike Calhoun.
Click OK.
39. In the Enterprise Admins Properties dialog box, click OK.You have
just made Mike Calhoun (the Information Services Manager) a
member of the Enterprise Admins group so that he can administer
Active Directory and all computers in the domain. Close Active
Directory Users and Computers.
648
649
6. Right-click the desktop, and select Properties from the menu that
appears.
7. On the Background tab in the Display Properties dialog box, select a
wallpaper of Snow Trees from the scrolling list box. Click OK.
8. Click Yes to enable Active Desktop.
9. Right-click the desktop, and select New ➪ Shortcut from the menu
that appears.
10. In the Create Shortcut dialog box, type calc.exe in the text box.
Click Next.
11. In the Select a Title for the Program dialog box, type Calculator in
the text box. Click Finish.The shortcut to the calculator appears on
the desktop.
12. From the desktop, select Start ➪ Shut Down.
13. In the Shut Down Windows dialog box, select “Log off SteveS” from
the drop-down list box. Click OK.
14. Press Ctrl+Alt+Delete.
15. In the Log On to Windows dialog box, enter a user name of
Administrator and a password of password. Click OK.
16. Right-click My Computer, and select Properties from the menu that
appears.
17. In the System Properties dialog box, click the User Profiles tab.
18. On the User Profiles tab, highlight the DOMAIN1\SteveS profile
and click Copy To.
19. In the Copy To dialog box, type C:\Winnt\Sysvol\Sysvol\
domain1.mcse\Scripts\Default User in the “Copy profile to”
text box. Click Change.
20. In the Select User or Group dialog box, type Everyone in the Name
text box. Click OK.
21. In the Copy To dialog box, click OK.You have just modified the
domain-wide Default User profile folder.
22. In the System Properties dialog box, highlight the DOMAIN1\SteveS
profile and click Copy To.
23. In the Copy To dialog box, type \\Server01\Profiles\BillT in the
“Copy profile to” text box. Click Change.
4701-1 ch09.f.qc 4/24/00 09:24 Page 650
650
24. In the Select User or Group dialog box, scroll down until the user
Bill Tracy is displayed. Double-click Bill Tracy.
25. In the Copy To dialog box, click OK.You’ve just copied Steve Smith’s
user profile to Bill Tracy’s profile folder.
26. In the System Properties dialog box, click OK.
27. Right-click My Computer, and select Explore from the menu that
appears.
28. In the left pane of the My Computer dialog box, click the + next to
Local Disk (C:). Highlight the Profiles folder. In the right pane,
double-click the BillT folder. Select Tools ➪ Folder Options.
29. In the Folder Options dialog box, click the View tab.
30. On the View tab, select the option next to “Show hidden files and
folders.” Clear the check box next to “Hide file extensions for known
file types.” Click OK.
31. In the right pane of the BillT dialog box, right-click the
ntuser.dat file, and select Rename from the menu that appears.
32. Type in a new name for the file of ntuser.man and press Enter.You
have just configured BillT’s profile to be a mandatory user profile.
Close Windows Explorer.
651
4. Roaming user profiles are user profiles that are stored on a Windows
2000 Server computer. Because these profiles are stored on a server
instead of on the local computer, they are available to users regardless
of which Windows 2000 computer on the network they log on to.
A mandatory user profile is a user profile that, when assigned to a
user, can’t be changed by the user.A user can make changes to desk-
top and work environment settings during a single logon session, but
these changes are not saved to the mandatory user profile when the
user logs off.
5. The three major types of Windows 2000 account policies are: pass-
word policy, account lockout policy, and Kerberos policy.
6. Security groups are primarily used to assign permissions and user
rights to multiple users. Distribution groups are primarily used to
send e-mail messages to a specified list of users.You can’t assign per-
missions and user rights to distribution groups.
7. A built-in group
Assessment Questions
1. B. Use the Local Users and Groups tool in Computer management to
create a new local user account on the local Windows 2000 computer.
2. D. Use Active Directory Users and Computers to create a new
domain user account.
3. C. Roaming user profiles are server-based profiles.They should be
stored in a shared folder on a Windows 2000 Server computer.
4. A. To make a user’s profile mandatory, you must rename the user’s
NTUSER.DAT file as NTUSER.MAN.
5. B. Use the System application (found in Control Panel) to copy user
profiles — you can’t use Windows Explorer for this task.
6. C. “Enforce password history” requires that a certain number of dif-
ferent passwords be used before an old password can be reused (in this
case, two).“Minimum password length” specifies the minimum num-
ber of characters a password can contain (in this case, eight).
7. B. Use Local Users and Groups to create and configure local groups
on the local Windows 2000 computer.
4701-1 ch09.f.qc 4/24/00 09:24 Page 652
652
Scenarios
1. This message is displayed when a local user’s account has been locked
out or has been disabled. On the General tab in the local user’s
Properties dialog box, clear the check box next to “Account is locked
out” or clear the check box next to “Account is disabled.”
2. This message is displayed when a user attempts to log on during
restricted hours or attempts to log on to a restricted computer. Check
the Logon Hours and Log On To settings on the Account tab in the
user’s Properties dialog box, and make any necessary changes.
3. Examine the Password Policy settings. Check to see if the new pass-
word the user has entered meets the minimum password length and
password complexity requirements. Remember, if password complex-
ity is enabled, the password must contain three of the four types of
characters: uppercase alphabetic, lowercase alphabetic, numbers, and
special characters. Is the user’s new password a password that she has
used previously? If so, check to see if it meets the “Enforce password
history” settings.
4701-1 ch09.f.qc 4/24/00 09:24 Page 653
653
Professional
Server
EXAM Directory Services
MATERIAL
EXAM OBJECTIVES
C HAP TE R
10
Directory Services Exam 70-217
■ Implement and troubleshoot Group Policy.
■ Create a Group Policy object (GPO).
■ Link an existing GPO.
■ Delegate administrative control of Group Policy.
■ Modify Group Policy inheritance.
■ Filter Group Policy settings by associating security
groups to GPOs.
■ Modify Group Policy.
■ Manage and troubleshoot user environments by using
Group Policy.
■ Control user environments by using Administrative
Templates.
■ Assign script policies to users and computers.
Continued
4701-1 ch10.f.qc 4/24/00 09:24 Page 656
Professional
Server
EXAM Directory Services
MATERIAL
C HAP TE R
10
Using System Policy and
Group Policy
657
4701-1 ch10.f.qc 4/24/00 09:24 Page 658
Chapter Pre-Test
1. What is System Policy?
2. In what sequence is System Policy applied?
3. What is Group Policy?
4. What is Group Policy called when it is implemented directly on
the local computer?
5. Fill in the blanks: Group Policy consists of two components: an
Active Directory object, called a ________ ________ ________ ,
and a series of files and folders that are automatically created
when the Active Directory object is created.
4701-1 ch10.f.qc 4/24/00 09:24 Page 659
TIP
If a user that does not have an individual user policy has a group system
policy that conflicts with the Default User policy, then the settings in the
Default User policy take precedence, because the Default User policy is
applied after the group system policy is applied.
STEP BY STEP
CAUTION
This is not a recommended practice, because using System Policy Editor
permanently changes the registry on a computer — if you decide you want
to revert to default settings at a later date, you’ll have to manually change
each and every setting that you previously changed.
I recommend that you use Group Policy (or Local Group Policy) to
configure settings on a Windows 2000 computer instead of using the
System Policy Editor, because registry changes made by Group Policy are
easily reversible.
That said, to edit the registry on a Windows 2000 computer by using
System Policy Editor, start System Policy Editor, then select File ➪ Open
Registry.Then configure local computer and local user settings as needed.
When you’re finished making changes, select File ➪ Save, then close
System Policy Editor.
■ After you remove the System Policy file from the domain
controllers, its settings are still applied to users and com-
puters. Unfortunately, System Policy permanently modifies the
registry, and does not revert to default settings even after the
System Policy file is removed.To solve this problem, you must
create a new System Policy file that reverses each setting that
was previously changed in the original System Policy file.
TIP
In order to create the new System Policy file, you’ll need to have a record
of each and every change that was applied by the old System Policy file.
Once you’ve implemented the new System Policy, and each user
has logged on, you can then remove the new System Policy file.
EXAM TIP
The Directory Services exam has multiple objectives on Group Policy.
Add that to the fact that Group Policy is a nifty new feature in Windows
2000, and you can rest assured of finding several tough Group Policy
questions on this exam.
4701-1 ch10.f.qc 4/24/00 09:25 Page 669
TIP
Just because Group Policy settings are updated throughout the day
doesn’t mean that all tasks specified by the Group Policy setting
changes will occur. For example, software installation and folder redirec-
tion only occur at startup or user logon.
STEP BY STEP
TIP
For more information on the many settings you can configure, see the
sections later in this chapter titled “Configuring Group Policy Settings to
Manage User Environments,” “Configuring Group Policy Settings to
Manage Scripts,” “Configuring Group Policy Settings to Manage
Security,” “Configuring Group Policy Settings to Redirect Folders,” and
“Configuring Group Policy Settings to Manage Software Deployment.”
4. When you’re finished configuring Local Group Policy, close the Group Policy
dialog box.
You may remember using the Local Security Policy tool (Start ➪
Programs ➪ Administrative Tools ➪ Local Security Policy) to set account
policies (such as password policy and account lockout policy) and local
policies (such as user rights assignment and audit policy) on the local
Windows 2000 computer .The Local Security Policy tool was discussed in
chapter 9.The Group Policy snap-in to the MMC enables you to config-
ure these same policies, plus many more, on the local computer.
You can also configure Local Group Policy on a remote Windows 2000
computer by using the Group Policy snap-in to the MMC.
4701-1 ch10.f.qc 4/24/00 09:25 Page 674
STEP BY STEP
STEP BY STEP
In this section I’ll explain how to modify a GPO’s Group Policy inher-
itance settings, how to disable computer or user configuration settings, and
how to configure security for a GPO.
TIP
I’ll show you how to modify GPOs primarily by using Active Directory
Users and Computers, but if you want to use Active Directory Sites and
Services, the steps to perform the various tasks are virtually identical.
STEP BY STEP
1. If you want to block Group Policy inheritance on a domain or an OU, select Start ➪
Programs ➪ Administrative Tools ➪ Active Directory Users and Computers.
Or, if you want to block Group Policy inheritance on a site, start Active Directory
Sites and Services.
2. In the left pane of the dialog box, expand sites, domains, and OUs as necessary
until the site, domain, or OU you want to configure is displayed in the left pane.
Highlight the site, domain, or OU, then select Action ➪ Properties.
3. In the site, domain, or OU’s Properties dialog box, click the Group Policy tab.
4. On the Group Policy tab (which is shown earlier in Figure 10-4), select the check
box next to “Block Policy inheritance.” Click OK.
5. Close Active Directory Users and Computers (or Active Directory Sites and
Services).
4701-1 ch10.f.qc 4/24/00 09:25 Page 678
The setting you can configure on the GPO itself is an option called “No
Override.” When this option is selected, settings in this GPO will take
precedence and will not be overridden by any conflicting settings in a child
object’s GPO.
STEP BY STEP
Select the check box next to “No Override: prevents other Group Policy Objects
from overriding policy set in this one.” Click OK.
6. The Group Policy tab reappears. A check mark is displayed in the No Override
column next to the GPO you just configured. Click OK.
7. Close Active Directory Users and Computers.
4701-1 ch10.f.qc 4/24/00 09:25 Page 679
EXAM TIP
If I were writing questions for the Directory Services exam, I’d write sev-
eral long, convoluted questions testing the examinees’ understanding of
the No Override and “Block Policy inheritance” options. Make sure you
thoroughly understand these two settings.
STEP BY STEP
Select either the “Disable Computer Configuration settings” check box or the
“Disable User Configuration settings” check box, as appropriate, to disable the
unused portion of this GPO.
6. When a check box is selected, Windows 2000 displays a Confirm Disable warn-
ing dialog box. Click Yes.
7. On the General tab in the GPO Properties dialog box, click OK.
8. On the Group Policy tab, click OK.
9. Close Active Directory Users and Computers.
A GPO is applied only to users and computers that have the Read and
Apply Group Policy Active Directory permissions to the GPO. By default,
the Authenticated Users group is assigned the Read and Apply Group Policy
Active Directory permissions to all newly created GPOs.The Authenticated
Users group includes all users and computers in Active Directory.
If you don’t want a GPO to be applied to all users and computers con-
tained in the site, domain, or OU with which the GPO is associated, you
must first remove the Authenticated Users group from the access control
list for the GPO, then you must add the appropriate users, computers, and
groups to the access control list for the GPO and assign these users, com-
puters, and groups the Read and Apply Group Policy permissions.
The easiest way to specify the users and computers to which a GPO
applies is to assign groups of users (or groups of computers) to the access
control list for the GPO, and then to assign the Read and Apply Group
Policy permissions to these groups for the GPO.This process is called filter-
ing Group Policy scope by using security groups. If you filter the scope of a GPO
by using security groups, it’s conceivable that you could have multiple
GPOs associated with a single container (such as an OU), with each GPO
applying to a different group of users or computers within the container.
Security is also configured on GPOs so that the administration of the
GPO can be delegated to other users on the network. A user (or group)
must be assigned the Read and Write Active Directory permissions to the
GPO in order to administer the GPO. By default, members of the Domain
Admins and Enterprise Admins groups have both of these permissions.
STEP BY STEP
6. The Security tab appears, as shown in Figure 10-7. Notice that the Authenticated
Users group is allowed, by default, the Read and Apply Group Policy permissions.
This tab is virtually the same as every other permissions dialog box you’ve seen so
far in Windows 2000. It has the usual list of users and groups (and computers) at
the top of the dialog box; and a list of permissions, along with a pair of Allow and
Deny check boxes for each permission, at the bottom of the dialog box.
To remove a user, group (such as Authenticated Users), or computer from the
permissions list for the GPO, highlight the user, group, or computer in the Name
box, and click Remove.
To add a user, group, or computer to the Name box, click Add.
7. In the Select Users, Computers, or Groups dialog box, double-click each user,
group, and computer you want to add. As you double-click each user, group, and
computer, it appears in the bottom portion of the dialog box. Click OK.
8. On the Security tab, each user, group, and computer you added is automatically
assigned the Read permission to the GPO.
4701-1 ch10.f.qc 4/24/00 09:25 Page 683
If you want this GPO to apply to the user, group, or computer you just
added, you’ll have to manually assign the user, group, or computer the Apply
Group Policy permission (in addition to the Read permission automatically
assigned).
If you want to delegate administrative control of this GPO to a user or
group you just added, you’ll have to manually assign the user or group the
Write permission (in addition to the Read permission automatically assigned).
To change the permissions of a user, group, or computer you added, highlight the
user, group, or computer in the Name box, then select or clear the appropriate
check boxes in the Permissions box.
When you’re finished configuring permissions, click OK.
9. On the Group Policy tab, click OK.
10. Close Active Directory Users and Computers.
STEP BY STEP
To link the existing GPO once you’ve located it, highlight it and click OK.
6. The Group Policy tab reappears, and the linked GPO is listed. Click OK.
7. Close Active Directory Users and Computers.
4701-1 ch10.f.qc 4/24/00 09:25 Page 685
GPOs are applied, in order, from the bottom of the list to the top of the
list. The GPO at the bottom of the list (in this case, the HQ Seattle
Administrators GPO) has the lowest priority, and is applied first.The GPO
at the top of the list (in this case, the HQ Seattle Managers GPO) has the
highest priority, and is applied last.
In our example, this means that settings in the HQ Seattle Administrators
GPO will be overridden by any conflicting settings in any of the other GPOs
in the list. Because of this,TinaT (and other members of the Administrators
4701-1 ch10.f.qc 4/24/00 09:25 Page 686
TIP
Remember that when you configure the Administrative
Templates folder in the Computer Configuration section your settings
will apply to specified computers, and that when you configure the
Administrative Templates folder in the User Configuration sec-
tion your settings will apply to specified users.
STEP BY STEP
2. In the left pane of the Active Directory Users and Computers dialog box, expand
domains and OUs as necessary until the domain or OU associated with the GPO
you want to configure is displayed in the left pane. Highlight the domain or OU,
then select Action ➪ Properties.
3. In the domain or OU’s Properties dialog box, click the Group Policy tab.
4. On the Group Policy tab, highlight the GPO for which you want to configure
Administrative Templates settings, and click Edit. (You can also dou-
ble-click the GPO.)
5. The Group Policy dialog box appears. Click the + next to the Administrative
Templates folder either in the Computer Configuration section or the User
Configuration section. Then expand subfolders as necessary until the folder that
contains the settings you want to configure is displayed in the left pane. Highlight
the folder that contains the Group Policy settings you want to configure. The con-
figurable settings in that folder are then displayed in the right pane.
6. In the right pane, double-click the setting you want to configure.
7. The setting’s Properties dialog box appears, as shown in Figure 10-11. Notice the
Not Configured, Enabled, and Disabled options. These three options are available
when configuring many settings in the Administrative Templates folder.
If you want more information about the setting you selected, click the Explain tab.
Otherwise, configure options as appropriate on the Policy tab. (The possible set-
tings vary substantially from setting to setting.) Click OK.
8. The Group Policy dialog box reappears. Repeat Steps 5, 6, and 7, as necessary,
to configure additional Group Policy settings for this GPO. Close the Group
Policy dialog box.
9. In the domain or OU’s Properties dialog box, click OK.
10. Close Active Directory Users and Computers.
and, if multiple scripts are specified for one event, you can specify the order
in which scripts will run.
Configuring Group Policy settings to manage scripts is done on a GPO-
by-GPO basis, and is fairly straightforward, as the following steps explain.
STEP BY STEP
To change the position of a script in the list (if multiple scripts are listed) in
order to change the order in which the scripts are run, highlight the script you
want to move, and use the Up and Down command buttons to change the
script’s position in the list. Scripts are run in the order they are listed on the
Scripts tab, from the top of the list down.
To edit the name of a script in the list or to change optional script parame-
ters, highlight the script and click Edit.
To remove a script from the list, highlight the script and click Remove.
To add a script to the list, click Show Files.
11. In the dialog box that appears (either Logon, Logoff, Startup, or Shutdown),
select Edit ➪ Paste. Close the dialog box.
12. Click Add.
13. The Add a Script dialog box appears. In the Script Name text box, type the name
of the script file you want to add. You can browse for the name of the script file if
you need to. In the Script Parameters text box, type in any optional parameters for
the script file. Click OK.
4701-1 ch10.f.qc 4/24/00 09:25 Page 694
Just one final tip on working with scripts. Although you can assign a
logon script to an individual user account by configuring a user account’s
properties, Microsoft recommends, for ease of administration, that you use
Group Policy to assign logon scripts to users.
CROSS-REFERENCE
Specific user rights assignment settings are covered in Chapter 9, and
specific audit policy settings are covered in Chapter 13.
CROSS-REFERENCE
I cover certificates and public key policies in detail in Chapter 18.
CROSS-REFERENCE
I discuss IP Security in Chapter 16.
STEP BY STEP
STEP BY STEP
6. The folder’s Properties dialog box appears. Select one of the available redirection
options from the Setting drop-down list box. The available options are:
No administrative policy specified: If you select this option, this GPO
will not redirect the folder.
Basic - Redirect everyone’s folder to the same location: If you select
this option, Windows 2000 will redirect the specified folder (for all users
affected by this GPO) to the same shared folder on the network. You will then
need to specify a network location to redirect users’ folders to. This is normally
a UNC path such as \\Server_name\Share_name\%username%. The
%username% variable creates a new folder in the shared network folder for
each user whose folder is redirected.
Advanced - Specify locations for various user groups: If you select this
option, users who belong to a specific group will have their folders redirected
to a specific shared folder on the network. You can specify a different network
location for each group you specify. You can use the %username% variable to
give each user in the group an individual folder in the specified network share.
Select the appropriate option and specify the network location(s) to which folders
will be redirected. Click the Settings tab.
7. The Settings tab is displayed, as shown in Figure 10-14. Notice the options avail-
able in the Policy Removal section.
Most of the options on this tab are self-explanatory. However, I want to point out
the two options in the Policy Removal section. If you think that you will ever want
to change the redirected folder back into a local folder, and you don’t want to
have to manually reconfigure each client computer, I recommend you select the
option next to “Redirect the folder back to the local user profile location when pol-
icy is removed.” If you want the folder to remain redirected when the policy is
removed, accept the default option of “Leave the folder in the new location when
policy is removed.”
Configure options on this tab as appropriate. Click OK.
8. Close the Group Policy dialog box.
9. In the Properties dialog box for the domain or OU, click OK.
10. Close Active Directory Users and Computers.
EXAM TIP
The Directory Services exam has five objectives on using Group Policy to
deploy and maintain software. This subject is sure to be well covered on
this exam. So, if you don’t get much opportunity to deploy software on
the job, be sure to revisit this section before you take the exam.
[Application]
FriendlyName = “Adobe Acrobat Reader”
SetupCommand = ar405eng.exe
[Ext]
pdf=
Notice that a .zap file is separated into two primary sections: the
Application section and the Ext (extensions) section.
In the Application section there are two required commands —
FriendlyName and SetupCommand. FriendlyName is used to specify the
name of the application as it will appear to the user. SetupCommand is used
to specify the filename of the setup program used to install the application.
The Ext section consists of a list of all three-letter file extensions that
will be associated with the application. If more than one extension will be
associated with the application, each extension is placed on a separate line.
Each application extension must be followed by the = sign.
When a .zap file is created, it must be saved in the same folder as the
application’s source files.
STEP BY STEP
TIP
The application must be stored in a shared folder on a network server, or
Group Policy will not be able to install the application on client computers.
7. The Deploy Software dialog box is displayed, as shown in Figure 10-15. Notice
the three available options in this dialog box.
Published: Select the Published option if you want Windows 2000 to pub-
lish the application using the default settings in the Windows Installer file you
selected in Step 6. Skip to Step 14. If you are deploying software to comput-
ers, the Published option will be grayed out, and the Assigned option will be
selected by default.
Assigned: Select the Assigned option if you want Windows 2000 to assign
the application using the default settings in the Windows Installer file you
selected in Step 6. Skip to Step 14.
Advanced published or assigned: Select the “Advanced published or
assigned” option if you want to modify how the application is installed or
assigned.
8. The package’s Properties dialog box appears. There are six tabs in this dialog
box: General, Deployment, Upgrades, Categories, Modifications, and Security.
On the General tab, type in the name you want the package to use, or accept
the default. Click the Deployment tab.
9. The Deployment tab appears, as shown in Figure 10-16. Notice the default
deployment options for a package that is being deployed to users.
Using Group Policy to Deploy Service Packs for Applications Once you
have deployed an application, you might want to deploy a service pack for
the application.To deploy a service pack, copy the service pack files into the
4701-1 ch10.f.qc 4/24/00 09:25 Page 706
STEP BY STEP
STEP BY STEP
8. In the Enter new category dialog box, type in a name for the new software cate-
gory and click OK.
9. Repeat Steps 7 and 8 until you have created all of the software categories you
need. Click OK.
10. Close the Group Policy dialog box.
11. In the domain or OU’s Properties dialog box, click OK.
12. Close Active Directory Users and Computers.
STEP BY STEP
6. In the Remove Software dialog box, you can choose to either immediately unin-
stall the software, or allow users to continue using existing installations but pre-
vent new installations. Select the appropriate removal method and click OK.
7. Close the Group Policy dialog box.
8. In the domain or OU’s Properties dialog box, click OK.
9. Close Active Directory Users and Computers.
This chapter introduced several important System Policy and Group Policy topics:
■ System Policy is a collection of administrator-created user, group, and com-
puter system policies that enable an administrator to manage non-Windows
2000 client computers (and their users) on a Windows 2000 network. You can
create System Policy for Windows NT 4.0, Windows 95, and Windows 98
computers (and their users).
■ System Policy is managed and configured by using the System Policy Editor
(Poledit.exe). The three types of policies that can be included in System
Policy are a user system policy, a group system policy, and a computer system
policy.
■ Group Policy is a policy that contains rules and settings that are applied to
Windows 2000 computers, their users, or both, that are located in a specific
part of Active Directory. You can configure Group Policy settings to manage
user environments, scripts, security, redirection of folders, and software
deployment.
■ Group Policy is typically implemented in Active Directory. However, Group
Policy can be implemented directly on the local computer. When implemented
on the local computer, Group Policy is called Local Group Policy.
■ Group Policy consists of two components: an Active Directory object, called a
Group Policy object (GPO), and a series of files and folders that are automati-
cally created when the GPO is created.
■ Group Policy is applied to Windows 2000 computers and their users in a pre-
defined, systematic manner.
■ Inheritance also affects how Group Policy is applied. A user or a computer
normally inherits Group Policy from the container in which it resides and from
the parent containers above it in the Active Directory tree. When Group Policy
settings conflict, the Group Policy that is applied last is the policy that takes
precedence.
■ Local Group Policy is configured on an individual Windows 2000 computer by
using the Group Policy snap-in to the Microsoft Management Console (MMC).
You must be a member of the Administrators group on the local computer to
manage Local Group Policy.
4701-1 ch10.f.qc 4/24/00 09:25 Page 712
■ You can use Active Directory Users and Computers to create a GPO associ-
ated with a domain or an OU. You can use Active Directory Sites and Services
to create a GPO associated with a site. You can use these same tools to con-
figure and modify the GPOs you create.
■ You can use Group Policy to deploy software, upgrade software, apply service
packs, and remove software. You can select from three software deployment
methods: assigning software to computers, assigning software to users, and
publishing software to users.
4701-1 ch10.f.qc 4/24/00 09:25 Page 713
713
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about System Policy and Group Policy, and to help you prepare
for the Professional, Server, and Directory Services exams:
■ Assessment questions: These questions test your knowledge of
the System Policy and Group Policy topics covered in this chapter.
You’ll find the answers to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge
you to apply your understanding of the material to solve a hypo-
thetical problem. In this chapter’s scenario, you are asked to analyze
Group Policy and System Policy situations and recommend solu-
tions for given problems.You don’t need to be at a computer to do
scenarios.Answers to this chapter’s scenarios are presented at the
end of this chapter.
■ Lab exercises: These exercises are hands-on practice activities that
you perform on a computer.The lab exercise in this chapter gives
you an opportunity to practice various System Policy and Group
Policy tasks.
Assessment Questions
1. You want to use System Policy to manage several Windows 98 client
computers on your company’s Windows 2000 network.Where must
you create this System Policy file?
A. On any Windows 2000 computer on the network on which the
ADMINPAK is installed
B. On any Windows 2000 Server computer on your network
C. On a Windows 2000 Server computer on your network that is a
domain controller
D. On a Windows 98 computer
4701-1 ch10.f.qc 4/24/00 09:25 Page 714
714
715
Scenarios
Using Group Policy and System Policy to manage your network can be an
enormously complex task. For each of the following problems, consider
the given facts and answer the question or questions that follow.
1. You manage a Windows 2000 network that has over 1,000 Windows
2000 Professional client computers.You just downloaded a service pack
for an application that was deployed to all client computers by using
Group Policy.What steps would you take to deploy the service pack?
2. You recently configured a GPO for an OU that contains 100 users
and their computers. Many of the settings in the GPO are not taking
effect.What should you do to resolve this problem?
3. You have configured several user settings in a GPO that is associated
with an OU.These settings are not being applied to any users in the
OU.What should you do to resolve this problem?
4701-1 ch10.f.qc 4/24/00 09:25 Page 716
716
Lab Exercises
Lab 10-1 Managing policies in Windows 2000
Professional
Server
EXAM Directory Services
MATERIAL
717
718
719
14. Click Start. Notice that the Run command has not been removed
from the Start menu.The changes made in System Policy Editor will
not take place until you log off and log on again.
15. Click Start ➪ Shut Down.
16. In the Shut Down Windows dialog box, select Log off Administrator
from the drop-down list box. Click OK.
17. Press Ctrl+Alt+Delete. In the Log On to Windows dialog box, type
in a user name of Administrator and a password of password.
Click OK.
18. Click Start. Notice that the Run command is no longer displayed in
the Start menu.
19. Select Start ➪ Programs ➪ Accessories ➪ Command Prompt.
20. At the command prompt, type poledit and press Enter.
21. In the System Policy Editor dialog box, select File ➪ Open Registry.
22. In the System Policy Editor - Local Registry dialog box, double-click
Local User.
23. In the Local User Properties dialog box, click the + next to Shell,
then click the + next to Restrictions. Clear the check box next to
“Remove Run command from Start menu.” Click OK.
24. Select File ➪ Save.Then select File ➪ Exit.
25. Close the Command Prompt dialog box.The next time you log off
and log on, the Run command will reappear in the Start menu.
720
6. On the Sharing tab, select the option next to “Share this folder” and
click OK.
7. Place your Windows 2000 Server compact disc in your computer’s
CD-ROM drive.
8. Close the Microsoft Windows 2000 CD dialog box.
9. In the left pane, click the + next to your CD-ROM drive. Highlight
the I386 folder.
10. In the right pane, scroll down until a file named ADMINPAK is dis-
played. (It may appear either as ADMINPAK or ADMINPAK.MSI.)
Right-click the ADMINPAK file and select Copy from the menu
that appears.
11. Click the + next to Local Disk (C:). Highlight the Apps folder.
Select Edit ➪ Paste.Windows 2000 copies the ADMINPAK file
from your compact disc to the Apps shared folder.
12. Close Windows Explorer.
3. Make sure you press Enter after the last line. Select File ➪ Save As. In
the Save As dialog box, type Logonscript.bat in the “File name” text
box, and select All Files from the “Save as type” drop-down list box.
Click Save.
4701-1 ch10.f.qc 4/24/00 09:25 Page 721
721
4. Exit Notepad.
5. Select Start ➪ Programs ➪ Administrative Tools ➪ Active Directory
Users and Computers.
6. In the left pane, right-click the HQ Seattle OU and select Properties
from the menu that appears.
7. In the HQ Seattle Properties dialog box, click the Group Policy tab.
8. On the Group Policy tab, click New.Type a name of HQ Seattle
GPO and press Enter. Click Options.
9. In the HQ Seattle GPO Options dialog box, select the check box
next to No Override. Click OK.
10. On the Group Policy tab, ensure that HQ Seattle GPO is highlighted
and click Properties.
11. In the HQ Seattle GPO Properties dialog box, click the Security tab.
12. On the Security tab, click Add.
13. In the Select Users, Computers, or Groups dialog box, double-click
Mike Calhoun.Then double-click the Sales, Managers, and
Accountants groups. Finally, double-click SERVER01. Click OK.
14. On the Security tab, highlight Mike Calhoun. In the Permissions box
select the Allow check boxes next to Write, Create All Child Objects,
Delete All Child Objects, and Apply Group Policy. (The Read check
box is selected by default — don’t deselect it.)
15. Repeat Step 14 for SERVER01 and for the Sales,Accountants and
Managers groups.
16. Highlight Authenticated Users, and clear the Allow check box next to
Apply Group Policy. Click OK.
17. On the Group Policy tab, click Edit.
18. In the Group Policy dialog box, in the User Configuration section,
click the + next to the Software Settings folder. Right-click
Software installation and select New ➪ Package from the menu that
appears.
19. In the Open dialog box, type in a file name of \\Server01\Apps\
Adminpak.msi and click Open.
20. In the Deploy Software dialog box, select the option next to
Assigned. Click OK.
21. Select Start ➪ Programs ➪ Accessories ➪ Windows Explorer.
4701-1 ch10.f.qc 4/24/00 09:26 Page 722
722
723
724
725
Assessment Questions
1. D. The System Policy file for the Windows 98 client computers must
be created on either a Windows 95 or Windows 98 computer. Since a
Windows 98 computer was the only correct answer choice provided
in the possible answers to this question, D is the correct answer.
2. B. A Windows NT 4.0 System Policy file should be named
NTconfig.pol.
3. C. You can use Active Directory Users and Computers to create a
GPO that will be associated with a specific domain or OU. If you are
creating a GPO that will be associated with a site, you should use
Active Directory Sites and Services.
4. C. Use Active Directory Users and Computers to link the existing
GPO to the additional OUs.
5. A. In order to administer a GPO, the assistant network administrator
must be allowed the Read and Write Active Directory permissions to
the GPO.
6. A, B, and C. You can use Group Policy to upgrade software, remove
software, and deploy service packs. However, you need a third-party
application to repackage an application and create an .msi file for it.
7. B. You should use Group Policy to manage multiple Windows 2000
Professional computers on a Windows 2000 network. Using Local
Group Policy would work, but you would have to manage each com-
puter individually.You could also use System Policy Editor to individ-
ually edit the registry on each client computer, but it would be very
inefficient, and System Policy does not have nearly as many features
as Group Policy.
8. C. You should redeploy the application so that the new files in the
service pack will be installed on all computers on which the original
application was deployed.
4701-1 ch10.f.qc 4/24/00 09:26 Page 726
726
Scenarios
1. First, copy the contents of the service pack to the shared network
folder that contains the application’s installation files. Make sure that
the original Windows Installer file is replaced with the one in the
service pack.Then use Group Policy to redeploy the application.
2. Ensure that all users and computers that should be affected by the
GPO are allowed the Read and Apply Group Policy permissions to
the GPO. In addition, ensure that no other GPOs that affect those
users and computers are configured with conflicting settings.
3. Ensure that the user configuration settings portion of the GPO is not
disabled. If that does not resolve the problem, ensure that all users in
the OU are allowed the Read and Apply Group Policy permissions to
the GPO. Finally, ensure that no other GPOs that affect those users
are configured with settings that conflict with the new GPO.
4. Use Group Policy to mark the old word processing application for
mandatory removal, and then use Group Policy to deploy the new
word processing application to the appropriate users and computers.
5. Ensure that all computers in the OU are allowed the Read and Apply
Group Policy permissions to the GPO. In addition, ensure that no
other GPO that affects those computers is configured to specify
mandatory removal of the application.
6. A System Policy file that is created on a Windows 2000 computer
can’t be used to manage Windows 98 client computers.You must cre-
ate the System Policy file for the Windows 98 client computers by
using Poledit.exe on a Windows 98 (or Windows 95) client com-
puter and save that file as Config.pol (not as Ntconfig.pol).
7. Ensure that no GPOs in Active Directory are overriding the Local
Group Policy settings.A GPO in Active Directory must be overriding
the local settings, or they would have taken effect.
4701-1 ch10.f.qc 4/24/00 09:26 Page 727
4701-1 ch11.f.qc 4/24/00 09:26 Page 728
Professional
EXAM Server
MATERIAL
EXAM OBJECTIVES
C HAP TE R
11
Sharing, Securing, and
Accessing Files and Folders
729
4701-1 ch11.f.qc 4/24/00 09:26 Page 730
Chapter Pre-Test
1. List the seven Windows 2000 file and folder attributes.
2. How does a shared folder appear in Windows Explorer?
3. User and group share permissions are __________ , and
normally the ____________ restrictive permission is the
user’s effective permission.
4. When NTFS and share permissions differ, the _________
restrictive permission becomes the user’s effective permission
to the file or folder in the share.
5. What volume management mechanism can you use to
automatically track disk space usage on a user-by-user basis,
and to prevent individual users from exceeding the disk space
limitations they have been assigned by an Administrator?
4701-1 ch11.f.qc 4/24/00 09:26 Page 731
Archive Indicates that the file or folder has been modified since the last
backup.
Is applied by the operating system when a file or folder is saved
or created, and is commonly removed by backup programs after
the file or folder has been backed up.
Compress Indicates that Windows 2000 has compressed the file or folder.
Is only available on NTFS volumes.
Can be set by using Windows Explorer and by using the compress
command-line utility.
Can’t be used in conjunction with the Encrypt attribute. In other
words, a file can be encrypted or compressed, but not both.
Is applied by administrators to control which files and folders
will be compressed.
Encrypt Indicates that Windows 2000 has encrypted the file or folder.
Is only available on NTFS volumes.
Can be set by using Windows Explorer and by using the cipher
command-line utility.
Can’t be used in conjunction with the Compress attribute.
Is applied by users and administrator to control which files and
folders will be encrypted. Once a file or folder has been encrypted,
only the user who encrypted the file or folder (or the Administrator)
can open the file or folder and view its contents.
Continued
4701-1 ch11.f.qc 4/24/00 09:26 Page 732
Hidden Indicates that the file or folder can’t be seen in a normal directory scan.
Files or folders with this attribute can’t be copied or deleted.
Is automatically applied to various files and folders by Windows
2000 during installation. In addition, this attribute can be applied
by administrators or users to hide and protect files and folders.
Index Indicates that the file or folder is indexed by the Indexing Service.
Is only available on NTFS volumes.
Can be applied by administrators or users. Once this attribute has
been applied to a file, users can use Windows Explorer to locate this
file by searching for words or phrases contained in the file.
Read-only Indicates that the file or folder can only be read — it can’t be written
to or deleted.
Is often applied by administrators to prevent accidental deletion of
application files.
System Indicates that the file or folder is used by the operating system.
Files or folders with this attribute can’t be seen in a normal directory
scan, and can’t be copied or deleted.
Can’t be set by using Windows Explorer. You must use the attrib
command-line utility to view or change this attribute.
Is automatically applied to various files and folders by Windows 2000
during installation.
EXAM TIP
Both the Professional and Server exams have objectives on configuring
file compression and data encryption. Pay special attention to both the
Compress and Encrypt attributes.
the Encrypt attribute, that’s all there is to it. EFS does all the work.As stated
previously, the Encrypt attribute is only available for files and folders on
NTFS volumes.
The Encrypt attribute is normally applied by a user to protect sensitive
data that should be accessed only by that user. It is typically applied at the
folder level, because when applied to a folder,Windows 2000 encrypts all
of the files in the folder. When applied to an individual file, this attribute
must be reapplied each time the file is modified.
As stated previously, in a Windows 2000 domain environment, only the
user who encrypted the file and the domain’s Administrator account can
open the file. On a local Windows 2000 computer that is not a member of
a domain, only the local user who encrypted the file and the local
Administrator account can open the file. The Administrator account, in
both of these situations, is called the recovery agent because this account is
assigned a special key that permits it to unencrypt (that is, recover)
all encrypted files on the computer. If you want to designate additional
recovery agents, you can use Group Policy to specify additional users (on
the local computer, in an OU, or in an entire domain) who can open all
encrypted files and folders.
The Encrypt and Compress attributes are mutually exclusive — you can
use one or the other, but not both, on a file or folder.
STEP BY STEP
If you want to assign the Read-only or Hidden attributes, select the check box
next to the attribute you want to assign. To assign all other attributes, click
Advanced.
TIP
Files and folders on FAT or FAT32 volumes don’t have the Advanced com-
mand button, but do have an additional check box for the Archive attribute.
4701-1 ch11.f.qc 4/24/00 09:26 Page 735
4. The Advanced Attributes dialog box appears, as shown in Figure 11-2. Notice
that the Index attribute is selected by default. This dialog box (and the attributes
it contains) is available only for files or folders on NTFS volumes.
Select the check boxes next to the attributes you want to assign. (Or, clear the
check boxes next to attributes you want to remove.) The user interface in this
dialog box will not permit you to select both the Compress and Encrypt attributes —
you can select one or the other, but not both. Click OK.
5. In the file or folder’s Properties dialog box, click OK.
6. If you have modified the attributes of a folder that contains other files or folders,
a Confirm Attribute Changes dialog box appears. Choose whether to apply your
changes to this folder only, or to apply your changes to this folder and all of its
subfolders and files. Click OK.
7. Windows 2000 applies attributes. Close Windows Explorer.
Sharing a Folder
Only certain users can share folders:
■ Members of the Administrators and Server Operators built-in local
groups on domain controllers can share folders on any Windows
2000 domain controller in the domain.
■ Members of the Administrators and Power Users built-in local groups
on nondomain controllers (whether or not they are members of the
domain) can share folders on the local computer.
■ Members of the Domain Admins built-in global group on
domain controllers can share folders on any Windows 2000
computer that is a member of the domain.This is due to the
fact that the Domain Admins group is, by default, a member of
the Administrators built-in local group on domain controllers
and a member of the Administrators built-in local group on all
nondomain controllers that are members of the domain.
When a folder is shared, its entire contents (including all files and subfolders)
are available to users who have the appropriate permissions to the share.
Because all files and subfolders are accessible when a folder is shared, you
should consider which users and groups need access to folders when you
design your server’s folder structure.
When sharing a folder, it’s a good idea to assign it a share name that is
easily recognized by users, and one that appropriately describes the
resources contained in the folder. Otherwise, users can become frustrated
trying to locate the specific network resources they need.
Additionally, keep in mind when you assign a name to a shared folder
that a long share name may not be readable by all client computers on your
network. MS-DOS computers, for example, can only read share names of
up to 8 characters (plus a 3-character extension) in length, and Windows
95 and Windows 98 computers can only read share names of up to 12
characters in length. Share names on Windows 2000 and Windows NT
computers can be up to 80 characters long.
You can use Windows Explorer or Computer Management to share
folders on the local Windows 2000 computer.To share folders on remote
computers, use Computer Management.
4701-1 ch11.f.qc 4/24/00 09:26 Page 737
STEP BY STEP
Permissions: If you want to assign or change share permissions for this shared
folder, click Permissions. (I’ll cover share permissions later in this chapter.)
Caching: If you want to modify offline file settings for this shared folder,
click Caching. Then, in the Caching Settings dialog box, select from the
following options:
Allow caching of files in this shared folder: This check box is selected by
default. If you want to prevent users from viewing this folder offline, clear this
check box. If you want users to be able to configure this folder for offline use,
accept the default setting, and select one of the following three options in the
Setting drop-down list box:
Manual Caching for Documents: Select this option if you want users to
manually configure individual files in this folder for offline use. This is the
default setting.
Automatic Caching for Documents: Select this option if you want the
files in this shared folder to be automatically downloaded to a user’s local
computer and cached on the local hard disk as the user opens each file in
the shared folder. The entire folder is not cached on the user’s computer —
just the individual files the user has opened. If this option is selected, users
don’t have to manually configure the files in this folder for offline use. In
addition, the cached files are automatically synchronized with the server
when the user logs on and logs off his or her computer. This setting is not r
ecommended when multiple users access and change the same file(s) in
the shared folder.
Automatic Caching for Programs: Select this option if this folder contains
application files, and you want these application files to be cached on the
user’s local computer. Selecting this option can increase access speed for
the user and decrease network traffic because the application is executed
from the user’s local computer instead of over the network. If application files
in this shared folder are updated on the server, Windows 2000 will update
the cached files on the user’s local computer the next time the user logs on
or logs off.
CROSS-REFERENCE
For more information on working with offline files, see the “Folder
Options” section in Chapter 5.
Click OK.
4. In the folder’s Properties dialog box, click OK.
5. Close Windows Explorer.
4701-1 ch11.f.qc 4/24/00 09:27 Page 739
In this dialog box, enter the full path to the folder you want to share (such
as C:\Data). You can browse for this folder if you don’t know its path.
Enter a share name for the share. You can also enter a description for the share
if you want to. Click Next.
6. In the next dialog box, configure the appropriate share permissions for this shared
folder. (I’ll cover share permissions a little later in this chapter.) Click Finish.
7. A dialog box appears, indicating that the folder has been successfully shared.
Click Yes if you want to create another shared folder. Otherwise, click No.
4701-1 ch11.f.qc 4/24/00 09:27 Page 740
8. The folder you just shared appears in the right pane of the Computer
Management dialog box. Close Computer Management.
Naming Conventions
A naming convention is an accepted method of identifying individual
computers and their resources on the network.
The two common naming conventions used in Windows 2000 are the
universal naming convention (UNC) and fully qualified domain names (FQDNs).
A UNC name consists of a server name and a shared resource name in
the following format:
\\Server_name\Share_name
In this format, Server_name represents the name of the server that the
shared folder is located on, and Share_name represents the name of the
shared folder.You can use a UNC name in this format to connect to a net-
work share. For example, a shared folder named Public located on a
server named SERVER1 would have the following UNC name:
\\SERVER1\Public
A UNC name can also specify the name of a subfolder within the share,
the name of a file within the share, or the name of a file within a subfolder
in the share using the following format:
\\Server_name\Share_name\Subfolder_name\File_name
4701-1 ch11.f.qc 4/24/00 09:27 Page 741
You can use a UNC name in this format to access a specific folder or
file, such as a data file on a remote server. For example, a data file named
Salaries.doc in the Payroll folder located in a share named HR on a
server named CORP would have the following UNC name:
\\CORP\HR\Payroll\Salaries.doc
An FQDN is a fancy term for the way computers are named and refer-
enced on the Internet. FQDNs are often used on networks that use
TCP/IP and DNS servers.The format of an FQDN is:
server_name.domain_name.root_domain_name
STEP BY STEP
4. The Browse For Folder dialog box appears, as shown in Figure 11-5.
Click the + next to any domain or workgroup (or double-click the domain or
workgroup) to view a list of available network servers in that domain or work-
group. Then, click the + next to any server in the list (or double-click the server)
to view a list of shared folders on that server. Highlight the shared folder you
want to connect to, and click OK.
5. In the Map Network Drive dialog box, the UNC name for the shared folder you
selected appears in the Folder drop-down list box. Click Finish.
6. Windows Explorer connects to the shared folder and opens a new dialog box
for the shared folder. You can now access the contents of the shared folder. In
addition, the shared folder appears, along with its drive letter, in the left pane.
Once you have connected to a shared folder, the new drive letter
appears in Windows Explorer, My Computer, and the Open dialog box in
standard Windows applications. You can then access the files and folders
within the share in the same manner that you access files and folders on
your local computer.
STEP BY STEP
Read Permits a user to view a list of the share’s contents (names of files
and subfolders), to change the current folder to a subfolder of the
share (sometimes called traversing to subfolders), to view data in
files, and to run application files.
Change Permits a user to perform all tasks included in the Read permission.
In addition, permits a user to create files and subfolders within the
share, to edit data files and save changes, and to delete files and
subfolders within the share.
Full Control Permits a user to perform all tasks included in the Change permission.
In addition, permits a user to change NTFS permissions and to take
ownership of files and folders (on shares located on NTFS volumes).
STEP BY STEP
Deny: When the Deny check box next to a specific permission is selected
for a user or group, the user or group is specifically denied that permission
to the share, even if the user or group is allowed that permission through
membership in another group.
TIP
A denied permission always overrides an allowed permission.
Neither: When neither the Allow or Deny check box next to a specific
permission is selected for a user or group, the user or group is not assigned
that permission to the share.
When a user or group is not listed in the Name box, the user or group has no
permissions (and no access) to the share unless the user or group is a member
of a group that is listed in the Name box.
To change the permissions currently assigned to a user or group
listed in the Name box, highlight the user or group, then select or clear the
appropriate check boxes in the Permissions box.
To remove a user or group from the permissions list for the share,
highlight the user or group in the Name box, and click Remove.
To add a user or group to the Name box, click Add.
5. In the Select Users, Computers, or Groups dialog box, double-click each user and
group you want to add. (You can also highlight each user or group and then click
Add, but double-clicking is faster and easier.) As you double-click each user or
group, the user or group appears in the bottom portion of the dialog box. Click OK.
6. In the Permissions dialog box for the share, each user or group that you added
is automatically assigned the Read permission to the share. To change the permis-
sions of a user or group you added, highlight the user or group in the Name box,
then select or clear the appropriate check boxes in the Permissions box. Click OK.
7. In the shared folder’s Properties dialog box, click OK.
8. Close Windows Explorer.
EXAM TIP
When taking the Professional and Server exams, watch out for denied
permissions. A denied permission is a big red flag. Remember that a
denied permission always overrides an allowed permission.
Here are two examples that illustrate how user and group share permis-
sions combine.
Example 1
A user, RomanB, manages a shared folder named SalesData that contains
Sales department data. RomanB is a member of three groups. Table 11-3
shows the SalesData share permissions assigned to RomanB and to the
three groups of which he is a member.
TABLE 11-3 RomanB’s Group Memberships and Share Permissions
User or Group SalesData Share Permissions Assigned
Example 2
Until recently, a user, PennyL, was a design analyst in the Marketing
department. She has just been promoted to a management position in the
Human Resources department. PennyL’s network has a shared folder
named HRData that contains Human Resources department data, including
employee performance reviews. PennyL is a member of three groups.Table
11-4 shows the HRData share permissions assigned to the three groups of
which PennyL is a member.
TABLE 11-4 PennyL’s Group Memberships and Their HRData
Share Permissions
Group HRData Share Permissions Assigned
Modifying a Share
After a share is created, you may want to modify its properties. You can
assign multiple share names to a share, change the name of a share, or stop
sharing a share.
When you assign an additional name to a share, what you actually end
up doing is creating a new share for the same network resource.When you
create the new share you must manually assign a new set of share permissions
that apply only to new share.The permissions from the original share are not
automatically applied to the new share.
STEP BY STEP
STEP BY STEP
STEP BY STEP
3. The folder’s Properties dialog box appears with the Sharing tab displayed. Select
the “Do not share this folder” option. Click OK.
4. Close Windows Explorer.
Administrative Shares
Every time you start Windows 2000 on a computer, Windows 2000
automatically creates several hidden shares that only members of the
Administrators group (on the local computer) have permissions to access.
These shared are referred to as administrative shares because they are used by
Administrators to perform administrative tasks.
The Windows 2000 administrative shares are: C$, D$, E$, and so on (one
share for the root of each hard disk volume on the computer); and a share
named Admin$, which corresponds to the folder in which Windows 2000
is installed (SystemRoot). The $ at the end of each administrative share
causes the share to be hidden from users when they browse the network. If
users are not specifically aware the share exists, they will not be able to
connect to the hidden share. To connect to a hidden share, you have to
type in the server name and share name in the Map Network Drive dialog
box in Windows Explorer.You can’t browse for hidden shares.
Administrative shares make it possible for an Administrator to connect
to any hard disk on a computer and to access all of its files and folders,
regardless of whether regular shares exist on that hard disk. In this way
an Administrator can perform backup, restore, and other administrative
functions on a Windows 2000 computer.
Any share can be configured as a hidden share by placing a $ at the end
of its share name. However, hiding a share by appending a $ to the share
name does not limit user access to the share. The hidden share retains it
assigned share permissions. Only access to the hidden administrative shares is
restricted, by default, to Administrators only.
If you don’t want administrative shares available on a Windows 2000
computer, you can configure Windows 2000 to prevent the creation of
administrative shares.To accomplish this, you can edit the registry.You can
4701-1 ch11.f.qc 4/24/00 09:27 Page 752
edit the registry directly by using Regedt32.exe, or you can use the
System Policy Editor to disable the creation of the hidden administrative
shares. System Policy editor was covered in chapter 10.
CAUTION
If you configure a Windows 2000 computer to prevent the creation of
administrative shares, some administrative tools such as the Distributed
File System tool may not function correctly on that computer.
STEP BY STEP
STEP BY STEP
1. Start the Distributed File System tool. (Select Start ➪ Programs ➪ Administrative
Tools ➪ Distributed File System.) (This tool is available on all Windows 2000
Server computers, and is available on Windows 2000 Professional computers on
which the ADMINPAK has been installed.)
2. In the Distributed File System dialog box, select Action ➪ New Dfs Root.
4701-1 ch11.f.qc 4/24/00 09:27 Page 755
10. In the Completing the New Dfs Root Wizard screen, click Finish.
11. Windows 2000 creates the new Dfs root. It appears in the left pane in the
Distributed File System dialog box.
root and its replica(s), Windows 2000 will synchronize files and folders
between the replica(s) and the original domain Dfs root every 15 minutes.
TIP
You can only configure automatic replication between a domain Dfs root
and its replica when both shares are located on NTFS volumes.
You can create up to 31 replicas of an original domain Dfs root, plus the
original domain Dfs root, for a total of 32 instances of a domain Dfs root
(assuming that you have 32 Windows 2000 Server computers, one computer
for each instance).
In the steps that follow I’ll explain how to create a domain Dfs root
replica, and then how to configure automatic replication between the
domain Dfs root and its replica.
STEP BY STEP
1. Start the Distributed File System tool. (Select Start ➪ Programs ➪ Administrative
Tools ➪ Distributed File System.)
2. If the domain Dfs root you want to create a replica of is not displayed in the left
pane of the Distributed File System dialog box, select Action ➪Display an Existing
Dfs Root.
Then, in the Display an Existing Dfs Root dialog box, expand the domains in the
Trusting Domains list box until the domain Dfs root you want to create a replica
of is displayed. Highlight this Dfs root (when you do, it appears in the “Dfs root
or host server” text box). Click OK.
3. In the left pane of the Distributed File System dialog box, right-click the domain
Dfs root you want to create a replica of, and select New Root Replica from the
menu that appears.
4. The New Dfs Root Wizard dialog box appears. Type in the FQDN of the
Windows 2000 Server computer on which you want to create the replica,
for example, server02.domain1.mcse. If you don’t know the FQDN
of the server, you can click Browse to browse for it. Click Next.
5. In the Specify the Dfs Root Share screen, choose whether to use an existing
share for the replica or to create a new share to use for the replica.
If you have an existing shared folder that you want to use for the replica,
select the “Use an existing share” option and select the shared folder from
the drop-down list box.
4701-1 ch11.f.qc 4/24/00 09:27 Page 758
Otherwise, select the “Create a new share” option. Then, in the “Path to share”
text box, type in the drive letter and path to the share you want to create for the
replica, for example, C:\Dfsreplica. (This can be the path to an existing or
nonexisting folder. If the folder doesn’t yet exist, Windows 2000 will create it for
you.) Finally, in the “Share name” text box, type in the share name for the replica.
Click Finish.
6. If you chose to create a new share in Step 5, and the folder you specified does
not exist, Windows 2000 asks if you want to create the folder. Click Yes.
7. Windows 2000 creates the Dfs root replica. It is displayed in the right pane of
the Distributed File System dialog box.
If you want to manually copy data between the domain Dfs root and its replica,
stop here. Otherwise, continue on to Step 8 to configure automatic replication.
8. In the left pane of the Distributed File System dialog box, right-click the domain
Dfs root, and select Replication Policy from the menu that appears.
9. The Replication Policy dialog box appears, as shown in Figure 11-8. Notice the “No”
entries in the Replication column. Automatic replication is not enabled by default.
Highlight the shared folder that contains the original domain Dfs root. Click
Enable. The entry in the Replication column changes from No to Yes (Primary).
Then, highlight the shared folder that contains the replica, and click Enable.
The entry in the Replication column changes from No to Yes. Click OK.
4701-1 ch11.f.qc 4/24/00 09:27 Page 759
TIP
When configuring automatic replication, it’s important to configure the
domain Dfs root first, and then the replica, to ensure that the contents of
the Dfs root are correctly copied to the replica.
STEP BY STEP
1. Start the Distributed File System tool. (Select Start ➪ Programs ➪ Administrative
Tools ➪ Distributed File System.)
2. If the Dfs root in which you want to create a Dfs link is not displayed in the left
pane of the Distributed File System dialog box, select Action ➪ Display an Existing
Dfs Root.
Then, in the Display an Existing Dfs Root dialog box, expand the domains in the
Trusting Domains list box until the Dfs root in which you want to create a Dfs link
is displayed. Highlight this Dfs root (when you do, it appears in the “Dfs root or
host server” text box). Click OK.
3. In the left pane of the Distributed File System dialog box, right-click the Dfs root in
which you want to create a Dfs link, and select New Dfs Link from the menu that
appears.
4. The Create a New Dfs Link dialog box appears, as shown in Figure 11-9.
In the “Link name” text box, type a name for the Dfs link. Because this is the name
that users will see, it should clearly indicate the shared folder that it points to, the
shared folder’s contents, or both. The Dfs link name can even be the same as the
name of the shared folder it points to.
4701-1 ch11.f.qc 4/24/00 09:27 Page 760
In the “Send the user to this shared folder” text box, type the full UNC name
to the shared folder that this Dfs link points to, for example, \\Server03\
Applications. You can browse for the UNC name if you don’t know it.
Enter a comment in the Comment text box if appropriate.
Configure the length of time client computers will cache the pointer if necessary.
The default setting is 1800 seconds (30 minutes).
Click OK.
5. Windows 2000 creates the Dfs link. It appears in the left pane of the Distributed
File System dialog box, under its Dfs root.
the original shared folder and the copy of the shared folder must both be
located on NTFS volumes on Windows 2000 Server computers.
STEP BY STEP
1. Start the Distributed File System tool. (Select Start ➪ Programs ➪ Administrative
Tools ➪ Distributed File System.)
2. If the Dfs root that contains the Dfs link for which you want to create a replica is
not displayed in the left pane of the Distributed File System dialog box, select
Action ➪Display an Existing Dfs Root.
Then, in the Display an Existing Dfs Root dialog box, expand the domains in the
Trusting Domains list box until the Dfs root that contains the Dfs link for which
you want to create a replica is displayed. Highlight this Dfs root (when you do,
it appears in the “Dfs root or host server” text box). Click OK.
3. In the left pane of the Distributed File System dialog box, click the + next to the
Dfs root that contains the Dfs link for which you want to create a replica (if the
Dfs root is not already expanded). Right-click the Dfs link, and select New
Replica from the menu that appears.
4. The Add a New Replica dialog box appears, as shown in Figure 11-10. Notice
that by default, automatic replication of Dfs link replicas is not enabled.
In the “Send the user to this shared folder” text box, type the full UNC name to
the shared folder that this Dfs link replica points to, for example, \\Server05\
Applications. You can browse for the UNC name if you don’t know it.
4701-1 ch11.f.qc 4/24/00 09:27 Page 762
If you want to manually copy data between the original shared folder and its alter-
nate copy, accept the default setting of “Manual replication.”
Otherwise, select the “Automatic replication” option. Click OK.
5. If you selected the “Automatic replication” option, the Replication Policy dialog
box appears.
Highlight the original shared folder to which the Dfs link points. Click Enable. The
entry in the Replication column changes from No to Yes (Primary).
Then, highlight the copy of the shared folder to which the Dfs link replica points,
and click Enable. The entry in the Replication column changes from No to Yes.
Click OK.
Figure 11-11 shows the Replication Policy dialog box after automatic replication
has been configured.
6. The Dfs link replica appears in the right pane of the Distributed File System
dialog box.
4701-1 ch11.f.qc 4/24/00 09:27 Page 763
NTFS Permissions
NTFS permissions, which can only be assigned to files and folders on NTFS
volumes, protect data from unauthorized access when users connect to the
share locally or over the network.
4701-1 ch11.f.qc 4/24/00 09:27 Page 764
Full Control Perform all actions included Perform all actions included in
in the Modify permission. the Modify permission.
In addition, the user can In addition, the user can change
change the file’s permissions the folder’s permissions, take
and can take ownership of ownership of the folder, and
the file. delete files and subfolders
within the folder.
4701-1 ch11.f.qc 4/24/00 09:27 Page 765
TIP
You can think of a volume as a parent folder for all of the files and folders
it contains. You can assign NTFS permissions to a volume in the same
way you can assign them to a folder. A volume is just a big folder that
doesn’t have a parent folder.
STEP BY STEP
Deny: When the Deny check box next to a specific NTFS permission is
selected for a user or group, the user or group is specifically denied that
NTFS permission to the file or folder, even if the user or group is allowed
that permission through membership in another group.
TIP
A denied permission always overrides an allowed permission.
Neither: When neither the Allow or Deny check box next to a specific NTFS
permission is selected for a user or group, the user or group is not assigned
that permission to the file or folder.
When a user or group is not listed in the Name box, the user or group has no
NTFS permissions (and no access) to the file or folder unless the user or group
is a member of a group that is listed in the Name box.
To change the NTFS permissions currently assigned to a user or group
listed in the Name box, highlight the user or group, then select or clear the
appropriate check boxes in the Permissions box.
TIP
You can’t change inherited NTFS permissions at this level. If the permis-
sions shown in this dialog box are inherited (that is, a gray box with a
check in it is displayed), you must change these permissions on the par-
ent folder where the NTFS permissions were originally assigned.
To remove a user or group from the permissions list for the file or folder,
highlight the user or group in the Name box, and click Remove.
To add a user or group to the Name box, click Add.
5. In the Select Users, Computers, or Groups dialog box, double-click each user
and group you want to add. (You can also highlight each user or group and then
click Add, but double-clicking is faster and easier.) As you double-click each
user or group, the user or group appears in the bottom portion of the dialog
box. Click OK.
6. In the file or folder’s Properties dialog box, each user or group you added is auto-
matically assigned the Read and Read & Execute NTFS permissions to a file, or
the Read, Read & Execute, and List Folder Contents NTFS permissions to a folder.
To change the NTFS permissions of a user or group you added, highlight the user
or group in the Name box, then select or clear the appropriate check boxes in the
Permissions box.
If you want this file or folder to inherit NTFS permissions from its parent folder,
accept the default setting of “Allow inheritable permissions from parent to
propagate to this object.”
4701-1 ch11.f.qc 4/24/00 09:27 Page 768
If you want to block inheritance of NTFS permissions from this file or folder’s par-
ent folder, clear the check box next to “Allow inheritable permissions from parent
to propagate to this object.”
CAUTION
Exercise care when blocking inheritance — you could end up denying
yourself permission to access or assign permissions to the file or folder.
If you intend to block inheritance, make sure you specifically assign
yourself the Allow – Full Control NTFS permission to the file or folder
before you block inheritance.
7. If you selected the check box next to “Allow inheritable permissions from parent
to propagate to this object” in Step 6, the Security dialog box shown in Figure
11-13 appears.
If you want to keep all of this file or folder’s inherited permissions, but convert
them to explicit permissions instead of inherited permissions, click Copy.
If you want to delete all of this file or folder’s inherited permissions, so that only
the users and groups that you explicitly assign permissions to this file or folder
remain, click Remove.
If you’ve changed your mind after all of this and decide you don’t want to block
inheritance after all, click Cancel.
8. In the file or folder’s Properties dialog box, click OK.
9. Exit Windows Explorer.
4701-1 ch11.f.qc 4/24/00 09:27 Page 769
The standard NTFS file and folder permissions I’ve talked about so far
are used in most situations.The standard permissions actually consist of the
most commonly used combinations of special permissions, which are some-
times called advanced permissions.
For example, the Read NTFS permission consists of the List
Folder/Read Data, Read Attributes, and Read Extended Attributes special
permissions.You might encounter a situation where assigning a special per-
mission to a user or group for a file or folder would better accomplish your
security goals than assigning a standard permission.
Special NTFS permissions are assigned by clicking the Advanced com-
mand button on the Security tab in a file or folder’s Properties dialog box.
Like regular NTFS permissions, special permissions are specifically allowed
or denied to a specific user or group.
STEP BY STEP
CAUTION
Think twice before selecting the “Reset permissions on all child objects . . .”
check box. If you select this check box, you will reset NTFS permissions on
all subfolders and files of this folder to match the users, groups, and NTFS
permissions set in the Permission Entries list box for this folder.
4701-1 ch11.f.qc 4/24/00 09:27 Page 770
When this check box is selected, permissions will even be reset on files and
subfolders that are currently configured to block inheritance, and inheritance
will be enabled on those files and subfolders.
To remove a user or group from the Permission Entries list box, highlight
the user or group and click Remove.
To view or edit current NTFS permissions for a user or group, highlight the
user or group and click View/Edit. Assign advanced permissions as appropriate.
Click OK.
To add a user or group to the Permission Entries list box, click Add.
6. In the Select User, Computer, or Group dialog box, double-click the user or group
you want to add.
7. The Permission Entry dialog box for the folder appears, as shown in Figure 11-15.
Notice the long list of permissions in the Permissions list box — these are the
special (or advanced) NTFS permissions.
Assign special permissions to the user or group you added by selecting the
appropriate Allow or Deny check boxes.
4701-1 ch11.f.qc 4/24/00 09:27 Page 771
Then, select the appropriate option from the “Apply onto” drop-down list box.
This setting determines how the permissions you set in this dialog box will be
inherited. The possible selections are:
This folder, subfolders and files — this is the default setting
This folder only
This folder and subfolders
This folder and files
Subfolders and files only
Subfolders only
Files only
The selection you make in this drop-down list box works in conjunction with the
“Apply these permissions to objects and/or containers within this container only”
check box at the bottom of the dialog box. If you select this check box (and any
option in the “Apply onto” box that includes subfolders), the permissions you set
will be applied to the subfolder, but will not be applied to any files or folders
within the subfolder.
Click OK.
4701-1 ch11.f.qc 4/24/00 09:27 Page 772
8. In the Access Control Settings dialog box for the file or folder, click OK.
9. In the file or folder’s Properties dialog box, click OK.
The only exception to this rule is when the moved files or folders are
moved to a new folder on the same NTFS volume — in this case, the moved
files or folders retain their original NTFS permissions, even if these
permissions were inherited from the folder in which they were originally
contained. In this situation, the moved files or folders do not inherit the
NTFS permissions from the destination folder.
The following examples illustrate how NTFS permissions are applied to
moved or copied files.The same rules apply to moved or copied folders.
TIP
Because FAT and FAT32 volumes don’t support NTFS permissions, any
files or folders that you copy or move to a FAT or FAT32 volume lose all of
their NTFS permissions, along with the security that those permissions
provided.
Example 1
A folder named Documents is shared on an NTFS volume.The Everyone
group is allowed the Change share permission to the Documents share. In
addition, the Everyone group is allowed the Full Control NTFS permis-
sion to all files and folders in the Documents share. Users who access
the Documents share over the network are only allowed the Change
permission to the files and folders in the share, because Change is the most
restrictive permission.
Example 2
A folder named Apps is shared on an NTFS volume.The Everyone group
is allowed the Full Control share permission to the Apps share. In addition,
the Everyone group is allowed the Read NTFS permission to the files and
folders in the Apps share. Users who access the Apps share over the
4701-1 ch11.f.qc 4/24/00 09:27 Page 775
network only have the Read permission to the files and folders in this
share, because Read is the most restrictive permission.
TIP
Remember, share permissions only apply when users connect to a share
over the network. NTFS permissions are the only permissions that apply
to users who log on locally to the computer that contains the share.
Keep in mind that when you combine share and NTFS permissions, both
the share permissions and NTFS permissions must permit a user to perform
a task. For example, if a user is allowed the Change share permission to a
share, and also is allowed the Read NTFS permission to the shared folder,
the user’s effective permission to the share is Read, for two reasons. First,
Read is the most restrictive permission. Second, the Change share permis-
sion includes the functionality of the Read permission, so in effect, both the
share permission and NTFS permission grants the user the ability to Read.
Sometimes, however, there isn’t any overlap between share and NTFS
permissions, and the user ends up not having any effective permissions to a
resource. For example, if a user has the Allow – Read share permission to a
share, and also has the Allow – Write NTFS permission to the shared
folder, the user won’t be able to either Read or Write, because there is no
overlap in the functionality of these two permissions.
STEP BY STEP
5. The Security tab in the file or folder’s Properties dialog box is displayed. Click
Advanced.
4701-1 ch11.f.qc 4/24/00 09:27 Page 777
6. In the Access Control Settings dialog box for the file or folder, click the Owner tab.
7. The Owner tab is displayed, as shown in Figure 11-17. Notice that Windows
2000 is unable to display the current owner (because you don’t have permissions
to view the ownership information for the file or folder).
In the “Change owner to” box, highlight the user (or group, if listed) that you want
to become the new owner of the file or folder.
If you are taking ownership of a folder, and you also want to become the owner of
all subfolders and files in this folder, select the check box next to “Replace owner
on subcontainers and objects.”
Click OK.
8. If you selected the check box next to “Replace owner on subcontainers and
objects” in Step 7, Windows 2000 displays a security warning dialog box, indicat-
ing that you don’t have permission to read the contents of the folder. The dialog
box also asks if you want to grant yourself the Full Control permission to the
folder and to all of its contents. Click Yes.
9. The Security tab reappears. Click OK.
4701-1 ch11.f.qc 4/24/00 09:27 Page 778
STEP BY STEP
TIP
By default, once quotas are enabled, this option is selected, and disk
space on this volume is limited to 1K per user. You’ll almost certainly
want to increase this setting.
Limit disk space to: If you select this option, all users of this volume (that
don’t have an individual disk quota assigned) will be assigned a disk quota in
the amount of disk space specified.
Enforcement of this quota depends on whether the “Deny disk space to
users exceeding quota limit” check box is selected.
You can configure disk space limit on a user-by-user basis, thus allotting
different users different amounts of disk space. I’ll show you how to do this
when I discuss Quota Entries later in this section.
Set warning level to: This setting determines when Windows 2000 will
generate a warning message in the Quota Entries dialog box (and in the
System Log in Event Viewer if so configured). Users are not notified when
they exceed their warning level. The warning level must be less than or
equal to the user’s disk space limit.
4701-1 ch11.f.qc 4/24/00 09:27 Page 780
Log event when a user exceeds their quota limit: If this check box is
selected, Windows 2000 writes an event to the System Log in Event Viewer
when the user exceeds the disk space limit.
Log event when a user exceeds their warning level: If this check box is
selected, Windows 2000 writes an event to the System Log in Event Viewer
when the user exceeds the warning level limit.
Select and configure the appropriate options on this tab. Click Apply.
5. A Disk Quota warning dialog box is displayed. Click OK to enable the quota system.
6. On the Quota tab, click Quota Entries to view disk quota utilization for this
volume and to configure disk space limits for individual users.
7. The Quota Entries dialog box for the volume appears, as shown in Figure 11-19.
Notice the three types of indicators in the Status column: Above Limit, Warning,
and OK.
This dialog box is primarily used for monitoring disk quota usage for individual
users and groups. You can view the exact amount of disk space currently used by
each user, as well as each user’s disk quota limit, warning level, and percent of
allowed disk space used.
4701-1 ch11.f.qc 4/24/00 09:27 Page 781
In addition, you can modify the disk quota limit and warning level for any user or
group listed in the dialog box. You can also add users to the dialog box and
assign them disk quota limits.
To modify an individual user’s disk quota limit, double-click the entry.
8. The Quota Settings dialog box for the user appears, as shown in Figure 11-20.
If you want Windows 2000 to track the user’s disk usage, but you don’t want to
limit the user’s disk usage, select the “Do not limit disk usage” option.
If you want to limit the user to a specific amount of disk space, select the “Limit
disk space to” option and configure the user’s limit. You should also configure the
user’s warning level — this level can’t be greater than the user’s disk space limit.
TIP
When an individual user is assigned a disk quota, the user won’t be pre-
vented from exceeding his or her assigned disk space limit unless the
“Deny disk space to users exceeding quota limit” check box is selected
on the Quota tab for the volume.
Click OK.
9. To add a user to the Quota Entries list, select Quota ➪ New Quota Entry in the
Quota Entries dialog box.
4701-1 ch11.f.qc 4/24/00 09:27 Page 782
10. In the Select Users dialog box, double-click the user you want to add. Click OK.
(You can select more than one user to add, but if you do, you end up assigning
them all identical disk space limits. Unless you want all users to have the same
disk quota limit, add the users one at a time.)
11. In the Add New Quota Entry dialog box, make the appropriate disk limit
configurations for the user you’re adding and click OK.
12. The user is added to the top of the Quota Entries list. When you’re finished
configuring and monitoring disk quotas, close Quota Entries.
13. In the volume’s Properties dialog box, click OK.
This chapter introduced several important Windows 2000 file and folder topics:
■ Windows 2000 files and folders have various attributes, some of which the
administrator can use to provide a limited amount of data protection. You can
assign or change attributes by using Windows Explorer.
■ In Windows 2000, folders are shared to enable users to access network
resources. A shared folder appears in Windows Explorer as a folder with a
hand under it. A shared folder is often referred to as a share.
■ Shared folder permissions (often called share permissions) control user
access to shared folders, and only apply when users connect to the folder
over the network.
■ When user and group permissions conflict, the permissions are additive,
and normally the least restrictive permission is the user’s effective permission.
However, there is an exception: a denied permission always overrides an
allowed permission.
■ The Distributed file system (Dfs) enables an administrator to make shares that
are stored on various servers on the network appear to users as though they
are stored within a single share on a single server. This makes finding network
resources easier for users.
■ A Dfs root is a special type of shared folder that can contain files, folders, Dfs
links, and other Dfs roots. A Dfs link is a special type of subfolder in a Dfs root
that acts as a pointer to a specific shared folder on the network.
■ NTFS permissions, which can only be assigned to files and folders on
NTFS volumes, protect data from unauthorized access when users connect
to the share locally or over the network. There are standard and special
NTFS permissions.
■ When NTFS and share permissions differ, the most restrictive permission
becomes the user’s effective permission to the file or folder in the share. If
either the NTFS or the share permissions deny a user access, access is denied.
■ If the Administrator needs to change the permissions assigned to a file or folder,
but doesn’t have the Full Control or Change Permissions NTFS permission to
the file or folder, the Administrator must take ownership of the file or folder.
4701-1 ch11.f.qc 4/24/00 09:27 Page 788
789
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about sharing, securing, and accessing files and folders on the
network, and to help you prepare for the Windows 2000 Professional and
Server exams:
■ Assessment questions: These questions test your knowledge of the
various Windows 2000 file and folder topics covered in this chapter.
You’ll find the answers to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge you
to apply your understanding of the material to solve a hypothetical
problem. In this chapter’s scenario, you are asked to troubleshoot and
optimize various situations involving access to shared files and fold-
ers.You don’t need to be at a computer to do scenarios.Answers to
this chapter’s scenarios are presented at the end of this chapter.
■ Lab exercises: These exercises are hands-on practice activities that
you perform on a computer.The lab in this chapter gives you an
opportunity to practice several common Windows 2000 file and
folder tasks.
Assessment Questions
1. You want to protect application files located on an NTFS volume on
a Windows 2000 computer so that users can’t accidentally delete these
files.Which attribute should you assign to the application files?
A. Hidden
B. System
C. Encrypt
D. Read-only
2. You want to share a folder located on a FAT32 volume on a
Windows 2000 computer.Which tool should you use?
A. System Tools
B. Folder Options
C. Windows Explorer
4701-1 ch11.f.qc 4/24/00 09:27 Page 790
790
791
A. Windows Explorer
B. Disk Management
C. Folder Options
D. System Tools
7. You move a file from an NTFS volume on a Windows 2000 client
computer to a folder on an NTFS volume on a Windows 2000 Server
computer.What effect does moving this file have on the NTFS
permissions assigned to the file?
A. The moved file retains all of its original NTFS permissions.
B. The moved file loses all of its original NTFS permissions, and
now has no permissions.
C. The moved file loses some of its original NTFS permissions, and
inherits some of the NTFS permissions from its destination folder.
D. The moved file loses all of its original NTFS permissions,
and inherits all of the inheritable NTFS permissions from its
destination folder.
8. BetsyR is a member of one group,Technicians, that is allowed the
Full Control share permission to the Support share. BetsyR is a
member of another group, Managers, that is allowed the Modify
NTFS permission to the Support share. BetsyR is not assigned
any specific share or NTFS permissions as an individual user.
What is BetsyR’s effective permission to the Support share?
A. Allow – Modify
B. Allow – Full Control
C. Allow – Read & Execute
D. Deny – Full Control
4701-1 ch11.f.qc 4/24/00 09:27 Page 792
792
Scenarios
The following scenarios provide you with an opportunity to apply the
knowledge you’ve gained in this chapter about working with files and
folders in a Windows 2000 environment.
Users can have difficulty accessing shared resources for a number of rea-
sons. For each of the following problems, consider the given situation and
facts, and state what course of action you would take to try to resolve the
problem or optimize the situation.
1. A user, NancyW, reports that she can’t save files to the
AccountingData share located on an NTFS volume on a Windows
2000 computer. NancyW is a member of the following groups that
have various share and NTFS permissions to the AccountingData
share.
2. A user reports that her personal, sensitive data files are no longer
encrypted.You just enabled compression on the NTFS volume on the
Windows 2000 Server computer that contains the user’s data files.
3. A user, JohnS, has worked at your company as a sales representative
for five years. JohnS was recently made a manager of the company.
He reports that he can’t access the ManagersData share located on
an NTFS volume on a Windows 2000 computer. John is a member
of several groups that have various NTFS permissions to the
ManagersData share.
793
4. Users report that they cannot access the Data stand-alone Dfs root
that is hosted by a Windows 2000 Server computer named Server03.
5. Yesterday you saved a file in a domain Dfs root.Today, when you map
a network drive to the domain Dfs root, the file is not listed in the
contents of the Dfs root.
6. Several users in your company report that they are having difficulty
locating shared folders that contain documents they need to access to
perform their daily tasks.
Lab Exercises
The following lab is designed to give you practical experience working
with files and folders in a Windows 2000 environment.
794
795
17. In the Permissions for ManagersData dialog box, notice that the
Everyone group is allowed the Full Control share permission to
the folder. Click Add.
18. In the Select Users, Computers, or Groups dialog box, scroll down
and double-click the Domain Users group. Click OK.
19. In the Permissions for ManagersData dialog box, highlight the
Domain Users group, and select the Allow check box for the Full
Control permission. Highlight the Everyone group, and click
Remove. Click OK.
20. In the Managers Properties dialog box, click the Security tab.
21. On the Security tab, click Add.
22. In the Select Users, Computers, or Groups dialog box, scroll down
and double-click the Managers group. Click OK.
23. On the Security tab, highlight the Managers group. Select the Allow
check box next to the Full Control NTFS permission. Click OK.
24. In the right pane, highlight the Accounting folder. Select File ➪
Sharing.
25. In the Accounting Properties dialog box, select the option next to
“Share this folder.”Type AccountingData in the “Share name”
text box. Click Permissions.
26. In the Permissions for AccountingData dialog box, click Add.
27. In the Select Users, Computers, or Groups dialog box, scroll
down and double-click the Domain Users group. Click OK.
28. In the Permissions for AccountingData dialog box, highlight the
Domain Users group, and select the Allow check box for the
Full Control permission. Highlight the Everyone group, and
click Remove. Click OK.
29. In the Accounting Properties dialog box, click the Security tab.
30. On the Security tab, click Add.
31. In the Select Users, Computers, or Groups dialog box, scroll down
and double-click the Accountants group.Then double-click the
Managers group. Click OK.
32. On the Security tab, highlight the Managers group. Select the
Allow check box next to the Full Control NTFS permission.Then
highlight the Accountants group. Select the Allow check box next
to the Modify NTFS permission. Click OK.
4701-1 ch11.f.qc 4/24/00 09:27 Page 796
796
33. In the right pane, highlight the Sales folder. Select File ➪ Sharing.
34. In the Sales Properties dialog box, select the option next to “Share
this folder.”Type SalesData in the “Share name” text box. Click
Permissions.
35. In the Permissions for SalesData dialog box, click Add.
36. In the Select Users, Computers, or Groups dialog box, scroll down
and double-click the Domain Users group. Click OK.
37. In the Permissions for SalesData dialog box, highlight the Domain Users
group, and select the Allow check box for the Full Control permission.
Highlight the Everyone group, and click Remove. Click OK.
38. In the Sales Properties dialog box, click the Security tab.
39. On the Security tab, click Add.
40. In the Select Users, Computers, or Groups dialog box, scroll down
and double-click the Managers group.Then double-click the Sales
group. Click OK.
41. On the Security tab, highlight the Managers group. Select the Allow
check box next to the Full Control NTFS permission.Then highlight
the Sales group. Select the Allow check box next to the Modify
NTFS permission. Click OK.
You’ve now shared the three new folders, and assigned both share and
NTFS permissions to these shared folders. Close Windows Explorer.
797
5. In the Specify the Host Server for the Dfs Root screen, accept the
default Server name of server01.domain1.mcse. Click Next.
6. In the Specify the Dfs Root Share screen, select the “Create a new
share” option. In the “Path to share” text box, type C:\Data. In the
“Share name” text box, type Data and click Next.
7. Windows 2000 asks if you want to create the C:\Data folder.
Click Yes.
8. In the Name the Dfs Root screen, enter a Comment of Company
Shared Data. Click Next.
9. In the Completing the New Dfs Root Wizard screen, click Finish.
10. Windows 2000 creates the new Dfs root. It appears in the left pane
in the Distributed File System dialog box. Highlight the new Dfs root
named \\SERVER01\Data and select Action ➪ New Dfs Link.
11. In the Create a New Dfs Link dialog box, type in a Link name of
ManagersData. In the “Send the user to this shared folder” text
box, type \\Server01\ManagersData. Click OK.
12. The new Dfs link appears in the left pane. Highlight the Dfs root
named \\SERVER01\Data and select Action ➪ New Dfs Link.
13. In the Create a New Dfs Link dialog box, type in a Link name of
AccountingData. In the “Send the user to this shared folder” text
box, type \\Server01\AccountingData. Click OK.
14. The new Dfs link appears in the left pane. Highlight the Dfs root
named \\SERVER01\Data and select Action ➪ New Dfs Link.
15. In the Create a New Dfs Link dialog box, type in a Link name of
SalesData. In the “Send the user to this shared folder” text box,
type \\Server01\SalesData. Click OK.
16. The new Dfs link appears in the left pane.You’ve now created a Dfs
root and three Dfs links. Close the Distributed File System.
17. Start Windows Explorer. (Select Start ➪ Programs ➪ Accessories ➪
Windows Explorer.)
18. In the left pane, click the + next to My Computer. Select Tools ➪
Map Network Drive.
19. In the Map Network Drive dialog box, select a Drive letter of V:
(from the Drive drop-down list box) and type in a Folder name of
\\Server01\Data. Click Finish.
4701-1 ch11.f.qc 4/24/00 09:28 Page 798
798
20. Windows 2000 connects you to the Dfs root, and displays the Data
on Server01 dialog box. Notice the three folders in the right pane.
These folders correspond to the three Dfs links you created. If you
open one of these folders, Dfs will automatically open the shared
folder associated with the Dfs link. Close both Windows Explorer
dialog boxes.
799
800
16. In the left pane, click the + next to My Computer. Highlight Local
Disk (C:). Click the Search command button in the toolbar. In the
“Search for files or folders named” text box, type Encrypted.txt
and click Search Now.
17. In the right pane, double-click the Encrypted.txt file.
18. A Notepad warning dialog box appears, indicating that access is
denied. Even though SteveS has permissions to all files and folder
on the local computer, he is unable to open this file because it is
encrypted. Click OK.
19. Close the Untitled - Notepad dialog box.
20. Close Windows Explorer.
21. Select Start ➪ Shut Down.
22. In the Shut Down Windows dialog box, select “Log off SteveS”
from the drop-down list box. Click OK.
23. Press Ctrl+Alt+Delete.
24. In the Log On to Windows dialog box, type in a User name of
Administrator and a password of password. Click OK.
801
Assessment Questions
1. D. Assign the Read-only attribute to application files to protect
them from accidental deletion by users.
2. C. Windows Explorer is used to share folders on Windows 2000
computers.
3. B. UNC names are specified in the format:
\\Server_name\Share_name\Subfolder_name\File_name
4. D. Edit the registry to prevent the creation of administrative shares.
4701-1 ch11.f.qc 4/24/00 09:28 Page 802
802
5. C. User and group share permissions are additive, and the least restrictive
permission is typically the user’s effective permission.
6. A. Windows Explorer is used to assign NTFS permissions to files
and folders.
7. D. When a file or folder is moved to a new folder on a different
volume, it inherits all of the inheritable NTFS permissions from the
destination folder.
8. A. When share and NTFS permissions combine, the most restrictive
permission is applied.
Scenarios
1. When share and NTFS permissions combine, the most restrictive
permission is applied. In this case, NancyW’s effective permission to
the AccountingData share is Read.To enable NancyW to save files
to the share, you could assign the Allow – Full Control share permis-
sion to the Accounting group for the AccountingData share.This
would give the Accounting group the Full Control share permission
and the Full Control NTFS permission to the AccountingData
share (for an effective permission of Full Control).
2. Compression and encryption are mutually exclusive — you can use
one or the other, but not both.A possible solution for this case, if the
user requires encryption, would be to uncompress the folder that
contains the user’s sensitive data files.
3. JohnS is unable to access the ManagersData share because he is a
member of a group that is specifically denied access to this share.To
solve the problem, you could remove the Sales group from the access
control list to the ManagersData folder. Or, you could remove JohnS
from the Sales group.
4. Determine whether Server03 is accessible on the network. If not, take
the action to bring it back on line.Another possible solution that will
prevent this problem from recurring would be to implement a
domain Dfs root with a replica to provide fault tolerance.
4701-1 ch11.f.qc 4/24/00 09:28 Page 803
803
5. The most likely cause of this problem is that the file was saved in one
replica of the domain Dfs root, the file was not automatically copied
to the Dfs root replicas, and today you accessed a different replica of
the Dfs root.To solve the problem, first determine whether automatic
replication is configured between the Dfs root and its replicas. If auto-
matic replication is not configured, either configure automatic repli-
cation, or discontinue your practice of saving files in the Dfs root.
6. One solution to this problem would be to assign more intuitive
names to shared folders so that users can quickly locate the resources
they need.Another possible solution is to make shares from multiple
servers available in a single Dfs root.
4701-1 ch12.f.qc 4/24/00 09:28 Page 804
Professional
Server
EXAM
MATERIAL Directory Services
EXAM OBJECTIVES
C HAP TE R
12
Managing Printing
805
4701-1 ch12.f.qc 4/24/00 09:28 Page 806
Chapter Pre-Test
1. In Windows 2000 printing terminology, what is a printer?
2. Which Windows 2000 printing term is defined as a printer that
has multiple ports (and multiple print devices) assigned to it?
3. What are the three Windows 2000 printer permissions?
4. Which Windows 2000 printer permission, when combined with
other permissions, overrides and takes precedence over all other
printer permissions?
5. If you experience print job failures due to lack of free space on
the volume where your spool folder is located, what can you do
to resolve the problem?
4701-1 ch12.f.qc 4/24/00 09:28 Page 807
Printing Terminology
Before you can fully understand printing with Windows 2000, you need to
understand a couple of basic terms.
In the terminology associated with Windows 2000, the term printer does
not represent a physical device that produces printed output. Rather, a
printer is the software interface between the Windows 2000 operating sys-
tem and the device that produces the printed output.
If you are used to working with a different operating system, such as
NetWare or UNIX, you may be used to thinking of what Windows 2000
calls a printer as a combination of a print queue (or print spooler) plus a
driver for the device that produces printed output.
In Windows 2000, the term print device (or printing device) refers to the
physical device that produces printed output — what is more commonly
referred to as a “printer.”
EXAM TIP
Be sure that you know the Windows 2000 printing terminology cold.
Otherwise, you may become confused when taking the exams.
Remember: a printer is software, and a print device (or printing device) is
hardware. Beat this into your head with a large wooden mallet!
Now that you have a grasp of basic Windows 2000 printing terminol-
ogy, you’re ready to move on to the nuts and bolts of printing in Windows
2000.
10. The print monitor communicates directly with the print device and
sends the ready-to-print print job to the print device.
11. The print device produces the printed document.
Figure 12-1 graphically illustrates the steps in the Windows 2000 print
process. Notice that the spooler routes the print job to the local hard disk
if the print device is managed by the local computer, and routes the print
job to the spooler on the network-connected computer if the print device
is managed by the network-connected computer.
Windows
application (for
example, Word)
Local print provider Print processor Local print provider Print processor
(Adds separator (Adds separator
page if needed) page if needed)
TIP
All client computers that use any operating system other than Windows
2000 send print jobs to Windows 2000 printers using the RAW format.
STEP BY STEP
1. Power on the print device and connect it to the Windows 2000 computer’s USB
port.
2. Windows 2000 detects the new device and displays a Found New Hardware dia-
log box. Eventually, Windows 2000 starts the Found New Hardware Wizard. Click
Next.
3. The Install Hardware Device Drivers screen is displayed, as shown in Figure 12-2.
Notice that the specific print device being added is displayed.
4701-1 ch12.f.qc 4/24/00 09:28 Page 812
STEP BY STEP
TIP
You can also access the Printers folder in Windows Explorer or
Control Panel.
5. A Found New Hardware dialog box is displayed. Then, the New Printer Detection
screen appears, indicating that a Plug and Play printer was detected and
installed, and asking you if you want to print a test page. Choose Yes or No, and
click Next.
6. On the Completing the Add Printer Wizard screen, click Finish.
7. If you chose to print a test page in Step 5, a dialog box is displayed asking if the
test page printed. Click OK.
8. The new printer you just added is displayed in the Printers folder. Close the
Printers folder.
EXAM TIP
Make sure you know when to add a local printer and when to add a net-
work printer. For the purposes of adding a printer, only shared printers
on other Windows-based computers and NetWare servers are consid-
ered network printers. All other printers and print devices, even those
connected directly to the network, are considered local printers.
To add these kinds of printers, you also use the Add Printer Wizard in
the Printers folder. The process is similar to adding a local non-USB
Plug and Play printer, only more manual configuration is required to
accomplish the task.
Use the following general steps to add a non-Plug and Play local (or a
directly connected network) printer. If you want to add an HP (DLC)
printer, a standard TCP/IP printer, a UNIX printer, or an AppleTalk
printer, see the sections that follow for additional information and tips.
4701-1 ch12.f.qc 4/24/00 09:29 Page 815
STEP BY STEP
Select the port that the print device is connected to from the list.
If the port you want to use is not displayed, select the “Create a new port” option,
and select the type of port you want to create from the Type drop-down list box.
Then follow the instructions presented on-screen to create the new port.
Click Next.
6. The Add Printer Wizard screen is displayed, as shown in Figure 12-5.
Select your print device’s manufacturer from the list on the left. Then select the
print device’s model from the list on the right.
If your print device does not appear in the list, and you have drivers for the device
(either on a floppy disk, CD-ROM, or downloaded from the Internet), click Have
Disk and follow the instructions on-screen.
4701-1 ch12.f.qc 4/24/00 09:29 Page 816
Click Next.
7. On the Name Your Printer screen, either accept the default name displayed for
this printer, or type in a different name in the “Printer name” text box. Also choose
whether you want this printer to be the default printer for all Windows-based pro-
grams on this Windows 2000 computer. Click Next.
8. On the Printer Sharing screen, choose whether or not to share this printer.
If you’re adding a printer on a Windows 2000 Professional computer, the default
selection is “Do not share this printer.” If you’re adding a printer on a Windows
2000 Server computer, the default selection is “Share as.”
If you choose to share the printer, either accept the default name displayed for the
shared printer, or type in a different name in the “Share as” text box. Click Next.
9. If you chose to share the printer in Step 8, a Location and Comment screen appears
on which you can describe the location and features of the printer you’re adding. All
entries on this screen are optional. Enter information as appropriate and click Next.
10. The Print Test Page screen is displayed. Select Yes to print a test page, or select
No to skip printing a test page. Click Next.
11. On the Completing the Add Printer Wizard screen, click Finish.
12. If you chose to print a test page in Step 10, a dialog box is displayed asking if the
test page printed. Click OK.
13. The new printer you added is displayed in the Printers folder. Close the
Printers folder.
4701-1 ch12.f.qc 4/24/00 09:29 Page 817
CROSS REFERENCE
I’ll cover how to use the Network and Dial-Up Connections
folder in detail in Chapter 15.
When you use the Add Printer Wizard to add an HP (DLC) printer, you
must assign the printer to a Hewlett-Packard Network Port. To do this,
select the “Create a new port” option on the Select the Printer Port screen,
and select “Hewlett-Packard Network Port” from the Type drop-down list
box.
When you create the new Hewlett-Packard Network Port, you’ll be
asked to select a card address (MAC address) for the HP JetDirect adapter
used by the print device you’re adding. If you have more than one HP
JetDirect adapter on your network, you’ll need to know which one is con-
nected to the print device you’re adding.
One last item you might want to consider when adding this kind of a
printer is whether the printer will use a Job Based or Continuous connec-
tion. This option is configured by clicking Timers in the Add Hewlett-
Packard Network Peripheral Port dialog box, and then selecting the
appropriate option button.
The default setting is Continuous, which, if accepted, causes this
Windows 2000 computer to monopolize all DLC connections to the HP
JetDirect adapter, and permits only this computer to connect to the HP
print device using the DLC protocol. If more than one computer must
connect to the HP JetDirect adapter using DLC, select a Job Based con-
nection. A Job Based connection permits all Windows 2000 (and Windows
NT 4.0) computers on the network that have the DLC protocol installed
to access the HP JetDirect adapter for printing.
4701-1 ch12.f.qc 4/24/00 09:29 Page 818
When you use the Add Printer Wizard to add a UNIX printer, you must
assign the printer to an LPR port. To do this, select the “Create a new
port” option on the Select the Printer Port screen, and select “LPR Port”
from the Type drop-down list box. After you do this, Windows 2000
prompts you to provide the name (or IP address) of the UNIX server that
the print device is connected to and the name of the print queue on that
UNIX computer that is associated with the print device you’re adding.
STEP BY STEP
communicate with the other computer on the network that hosts the
shared printer:
■ If the computer that hosts the shared printer is a Windows-based
computer (Windows 2000,Windows NT,Windows 95, or
Windows 98), you must ensure that the Windows 2000 computer
you’re configuring and the computer that hosts the shared printer
have at least one network protocol in common. Network protocols
include the Internet Protocol (TCP/IP), the NetBEUI protocol,
and the NWLink IPX/SPX/NetBIOS Compatible Transport pro-
tocol.To add a protocol on a Windows 2000 computer, use the
Network and Dial-up Connections folder (in Control Panel).
■ If the computer that hosts the shared printer is a Novell NetWare
server that uses the IPX protocol, you must ensure that the Windows
2000 computer you’re configuring has the NWLink IPX/SPX/
NetBIOS Compatible Transport protocol and Gateway (or Client)
Service(s) for NetWare installed. If you need to install this protocol
or service, use the Network and Dial-up Connections folder
(in Control Panel).
■ If the computer that hosts the shared printer is a Novell NetWare
server that uses only the TCP/IP protocol, you must ensure that
the Windows 2000 computer you’re configuring has the TCP/IP
protocol and Novell’s Windows 2000 client software installed.
(Because TCP/IP is installed by default on Windows 2000 com-
puters, you shouldn’t have to add it.) To install the Novell client
software on a Windows 2000 computer, follow the product
instructions.
Once your Windows 2000 computer is configured to communicate
with the computer that is hosting the shared network printer, you’re ready
to connect your Windows 2000 computer to the shared network printer.
In other words, you’re ready to add a network printer.
STEP BY STEP
1. On the Windows 2000 computer, open the Printers folder. (Select Start ➪
Settings ➪ Printers.)
2. In the Printers folder, double-click Add Printer.
4701-1 ch12.f.qc 4/24/00 09:29 Page 822
On this screen, you specify how you want Windows 2000 to locate the shared
network printer you’re adding. The options you can select from are:
Find a printer in the Directory: Select this option if you want to have
Windows 2000 search Active Directory for the shared network printer. If you
select this option (which is the default setting), you can use the Find Printers
dialog box to search Active Directory for the printer.
Type the printer name, or click Next to browse for a printer: Select
this option if you want to specify a UNC path to the shared network printer,
or if you want to browse the network for this printer. If you select this option,
you can select the shared network printer from a browse list.
Connect to a printer on the Internet or on your intranet: Select this
option if you want to specify a URL for an Internet printer. (I’ll cover connect-
ing to Internet printers more in the next section.) Browsing is not supported
for this option.
Select the appropriate option, and click Next.
4701-1 ch12.f.qc 4/24/00 09:29 Page 823
6. If the computer that hosts the shared network printer you’re adding does not have
drivers for the print device that are supported by Windows 2000, Windows 2000
prompts you to install drivers on the local Windows 2000 computer to enable it
to print to the shared network printer.
If this Connect to Printer warning dialog box does not appear, skip to Step 8.
If this Connect to Printer warning dialog box appears, click OK and continue.
7. In the Add Printer Wizard dialog box, select the shared network print device’s
manufacturer from the list on the left. Then select the print device’s model from
the list on the right.
If the shared network print device does not appear in the list, and you have drivers
for the device (either on a floppy disk, CD-ROM, or downloaded from the Internet),
click Have Disk and follow the instructions on-screen.
Click Next.
8. On the Default Printer screen, choose whether the network printer you’re adding
will be the default printer for all Windows-based programs on this Windows 2000
computer. Click Next.
9. On the Completing the Add Printer Wizard screen, click Finish.
10. The network printer you just added is displayed in the Printers folder. Close
the Printers folder.
STEP BY STEP
6. To print to this printer, select this printer (in any Windows-based application) in
the same manner you would select any other printer. Close Internet Explorer.
4701-1 ch12.f.qc 4/24/00 09:29 Page 826
Windows 2000 computers aren’t the only computers that can connect
to and use Internet printers. You can also use Internet Explorer on
Windows NT, Windows 95, and Windows 98 computers to connect to
Internet printers.
EXAM TIP
Spend all the time you need to become thoroughly familiar with connect-
ing to Internet printers. Because this task is a stated objective (on the
Professional exam) and because it’s a new feature for Windows 2000,
this topic is sure to be tested.
Sharing a Printer
The purpose of sharing a printer on a Windows 2000 computer is to
enable users of other computers on the network to connect to and to send
print jobs to the shared printer.The computer that hosts the shared printer
is called a print server. The print server performs all of the spooling, print
job management, scheduling, and sending of the final print jobs to the
print device.
When you share a printer on a Windows 2000 computer that is a mem-
ber of a Windows 2000 domain, by default, the printer is automatically
published in Active Directory at the same time. Of course, you can choose
not to publish a printer in Active Directory when you share it by clearing
the appropriate check box on the Sharing tab.
When you share a printer on your Windows 2000 computer, the types
of computers on the network that can access the shared printer are some-
what dependent upon the protocols and services installed in the Windows
2000 computer.
When you install Windows 2000, the File and Printer Sharing for
Microsoft Networks service is installed by default. If you have not installed
any other services and you share a printer on your Windows 2000 com-
puter, only computers that have client software for Microsoft networks can
access the shared printer.
If Internet Information Services (IIS) is installed on your Windows 2000
computer, when you share a printer on that computer, Windows 2000
automatically shares the printer as an Internet printer at the same time.
Windows-based computers that have Internet Explorer installed can access
shared Internet printers.
4701-1 ch12.f.qc 4/24/00 09:29 Page 827
STEP BY STEP
TIP
I recommend you use intuitive names for shared printers so that end
users can easily identify each shared printer’s type, capabilities, and,
when appropriate, location.
4701-1 ch12.f.qc 4/24/00 09:29 Page 828
If your Windows 2000 computer is a member of a Windows 2000 domain, the “List
in the Directory” check box is automatically selected when you share a printer. If you
don’t want to publish this shared printer in Active Directory, clear this check box.
If you have client computers on your network that don’t run Windows 2000, and if
these client computers will print to this shared printer, you may want to install
additional drivers to support these client’s operating systems.
If you don’t want to install additional drivers, click OK. Windows 2000 shares the
printer. Close the Printers folder, and stop here.
If you want to install additional drivers, click Additional Drivers.
4. The Additional Drivers dialog box appears, as shown in Figure 12-10. Notice that
the only check box selected is the box next to Intel Windows 2000.
Select the check box next to each processor and operating system combination
that is used by client computers on your network that will print to this shared
printer. Click OK.
5. If prompted, insert the appropriate operating system compact disc(s) that contain
the additional printer drivers and click OK.
4701-1 ch12.f.qc 4/24/00 09:29 Page 829
TIP
The Intel drivers for Windows NT 4.0, Windows 95, and Windows 98 are
contained on the Windows 2000 product compact disc.
STEP BY STEP
In the following sections I’ll explain how to perform many printer con-
figuration tasks, including: configuring printer pools, scheduling printers,
setting printer priorities, assigning a separator page, configuring printer
permissions, and assigning forms to paper trays.
STEP BY STEP
1. Access the Properties dialog box of the printer you want to configure as a printer
pool. (See the steps to do this in the previous section.)
4701-1 ch12.f.qc 4/24/00 09:29 Page 831
When a user prints to a printer pool, the print job is sent to the first
listed print device in the port list that is not busy printing another print
job.The entire print job is sent to the same port (and therefore to the same
print device). In a printer pool the print spooler — not the user — deter-
mines the print device to which the print job is sent.
4701-1 ch12.f.qc 4/24/00 09:29 Page 832
Scheduling Printers
Scheduling printers is a technique you can use to help manage the flow of
print jobs on your Windows 2000 network. Scheduling a printer means
assigning the hours a specific print device is available for use by a specific
printer.
When scheduling a printer, the hours of availability apply only to the
print device, not to the printer. This means that users can print to the
printer at any time during the day (or night), and the printer then spools
the jobs to the hard disk. However, the print jobs are sent to the print
device only during the print device’s hours of availability.
CAUTION
If you decide to schedule a printer, be sure to reserve plenty of hard disk
space to spool print jobs while they wait for the print device to become
available.
So why would you want to schedule a printer? Well, suppose that you’re
the administrator for a small network that has 20 Windows 2000 comput-
ers. The owner of the company recently bought a laser print device for
network printing, and doesn’t want to spend any more money on print
devices. One of the employees occasionally generates a print job that is 500
to 600 pages long. This report ties up the one available print device for a
long time, frustrating other employees. The large reports are for archival
and reference purposes, and are not needed immediately.
You solve the problem by scheduling printers. First, you create a second
printer that prints to the laser print device. Then you schedule the new
printer so that it only sends print jobs to the print device during nonbusi-
ness hours.You instruct the employee who creates the large print jobs to
use the new printer for the large print jobs.The result is that the employee
can generate large print jobs at any time without inconveniencing other
employees.The large print jobs are spooled to the hard disk, and then sent
to the print device during nonbusiness hours.
TIP
If you schedule printers to be available during nonbusiness hours, be
sure the print device is stocked with plenty of paper at the close of busi-
ness each day.
4701-1 ch12.f.qc 4/24/00 09:29 Page 833
STEP BY STEP
SCHEDULING PRINTERS
1. Access the Properties dialog box of the printer you want to schedule. (See the
steps in the “Configuring Printer Properties” section earlier in this chapter.)
2. In the Properties dialog box, click the Advanced tab.
3. On the Advanced tab, select the “Available from” option, and then configure the
hours that you want the print device associated with this printer to be available.
Click OK.
Figure 12-12 shows the Advanced tab after a printer has been scheduled. Notice
that the printer is only available from 9:00 P.M. to 5:00 A.M. Print jobs sent to this
printer will only be sent to the print device during these nonbusiness hours.
one printer sends print jobs to the same print device, setting printer prior-
ities may be useful.
If two printers are configured to use the same print device, and you
configure one of these printers to have a higher priority than the other
printer, then all print jobs from the higher-priority printer will be sent to
the print device before any print jobs from the lower-priority printer
are sent.
The highest printer priority is 99, and the lowest printer priority is 1.
All printers have a priority of 1 by default.
Here’s an example of a situation in which setting printer priorities could
be beneficial. Suppose you have two printers on a Windows 2000 Server
computer that both send print jobs to the print device (an HP LaserJet)
connected to LPT1:. One printer is named HPSales, and the other printer
is named HPManagers.
The managers at your company, who think their work is more impor-
tant than everyone else’s, tell you — the network administrator — that they
want their print jobs printed before anyone else’s.
So what’s a network administrator to do? You decide to configure
printer security so that everyone can use the HPSales printer, but that only
members of the Managers group can use the HPManagers printer. Then
you set the priority on the HPManagers printer to a value higher than 1.
Once this is done, the managers’ print jobs will take priority.
Suppose there are 100 print jobs waiting to print in the HPSales printer,
and a manager sends a print job to the HPManagers printer. The current
print job from the HPSales printer will finish printing, then the manager’s
print job will be printed, even though there are 100 other print jobs in the
HPSales printer that were generated before the manager’s print job.
STEP BY STEP
1. Access the Properties dialog box of the printer for which you want to set printer
priority. (See the steps in the “Configuring Printer Properties” section earlier in
this chapter.)
2. In the Properties dialog box, click the Advanced tab.
3. On the Advanced tab, set the printer’s priority number in the Priority spin box.
Remember, the highest priority is 99, and the lowest is 1. Click OK.
4. Close the Printers folder.
4701-1 ch12.f.qc 4/24/00 09:29 Page 835
STEP BY STEP
The four separator page files you can select from are:
pcl.sep This separator page file switches a dual language print device to
PCL printing, and causes a separator page to be printed at the beginning of
each print job.
pscript.sep This separator page file switches a dual language print
device to PostScript printing, but does not cause a separator page to be
printed at the beginning of each print job.
sysprint.sep This separator page file switches a dual language print
device to PostScript printing, and causes a separator page to be printed at
the beginning of each print job.
sysprtj.sep This separator page file switches a dual language print
device to PostScript printing and selects the print device’s Japanese fonts (if
any), but does not cause a separator page to be printed at the beginning of
each print job.
Double-click the separator page file you want to assign to the printer.
6. In the Separator Page dialog box, click OK.
7. In the printer’s Properties dialog box, click OK.
8. Close the Printers folder.
Print A user with this permission can connect to the printer and
send print jobs to the printer. By default, the Print
permission is assigned to the Everyone group.
Manage Documents A user with this permission can pause, resume, restart, and
delete print jobs sent to the printer. By default, members of
the Creator Owner group are assigned the Management
Documents printer permission. This enables users who
create print jobs to manage their own print jobs.
4701-1 ch12.f.qc 4/24/00 09:29 Page 837
Manage Printers A user with this permission can perform all tasks included in
the Print permission. In addition, the user can pause, restart,
and share the printer; can change spooler settings; can
assign printer permissions (including the Manage Documents
permission); and can change the printer’s properties.
STEP BY STEP
1. Access the Properties dialog box of the printer for which you want to assign per-
missions. (See the steps in the “Configuring Printer Properties” section earlier in
this chapter.)
2. In the Properties dialog box, click the Security tab.
3. The Security tab appears, as shown in Figure 12-14. Notice the default printer
permissions assigned to the Administrators group.
Also notice the Allow and Deny check boxes.
Allow: When the Allow check box next to a specific printer permission is
selected for a user or group, the user or group is granted the selected per-
mission to the printer.
Deny: When the Deny check box next to a specific printer permission is
selected for a user or group, the user or group is specifically denied that per-
mission to the printer, even if the user or group is allowed that permission
through membership in another group.
Neither: When neither the Allow or Deny check box next to a specific printer
permission is selected for a user or group, the user or group is not assigned
that permission to the printer.
4701-1 ch12.f.qc 4/24/00 09:29 Page 838
When a user or group is not listed in the Name box, the user or group has no per-
missions (and no access) to the printer unless the user or group is a member of a
group that is listed in the Name box.
To change the printer permissions currently assigned to a user or group listed in
the Name box, highlight the user or group, then select or clear the appropriate
check boxes in the Permissions box.
To remove a user or group from the permissions list for the printer, highlight the
user or group in the Name box, and click Remove.
To add a user or group to the Name box, click Add.
4. In the Select Users, Computers, or Groups dialog box, double-click each user
and group you want to add. As you double-click each user or group, the user or
group appears in the bottom portion of the dialog box. Click OK.
4701-1 ch12.f.qc 4/24/00 09:29 Page 839
5. On the Security tab in the printer’s Properties dialog box, the users and groups
you added appear in the Name box. Each user or group you added is automati-
cally assigned the Print permission to the printer. To change the printer permis-
sions of a user or group you added, highlight the user or group in the Name
box, then select or clear the appropriate check boxes in the Permissions box.
Click OK.
6. Close the Printers folder.
STEP BY STEP
1. Access the Properties dialog box of the printer for which you want to assign a
form to a paper tray. (See the steps in the “Configuring Printer Properties” sec-
tion earlier in this chapter.)
2. In the Properties dialog box, click the Device Settings tab.
3. The Device Settings tab appears, as shown in Figure 12-15. Notice that by
default the Letter form is assigned to each tray.
Highlight the tray to which you want to assign a particular form. Then, in the drop-
down list box that appears, select the form you want to assign to this tray.
When you’ve finished assigning forms to paper trays, click OK.
4701-1 ch12.f.qc 4/24/00 09:29 Page 840
Creating Forms
Windows 2000 offers several built-in forms. However, occasionally you
may want to create your own custom forms.You can create forms on the
Forms tab in the Print Server Properties dialog box. Options that you can
configure include form name, paper size, and printer area margins.
Once you’ve created a form, you can assign that form to a specific paper
tray on a printer. (See the section earlier in this chapter on “Assigning
Forms to Paper Trays.”) Once a form is assigned to a paper tray, documents
that specify that form are automatically printed using that paper tray.
Some network administrators create a separate printer for each form
and paper tray assignment to ease administration, and to enable users to
select forms in a more intuitive manner.
STEP BY STEP
CREATING A FORM
4. To create a new form, highlight an existing form in the “Forms on” list box that is
similar to the form you want to create. Select the check box next to “Create a
New Form.”
In the “Form Description for” text box, type in a name for your new form.
Modify settings in the Measurements section of this dialog box to meet your
needs. You can select either metric or English measurements, and you can spec-
ify the form’s paper size and printer area margins.
When you are finished, click Save Form.
5. Windows 2000 creates the new form and adds it to the “Forms on” list box.
Click Close.
6. Close the Printers folder.
You can also use the Forms tab to modify forms that you’ve created.
However, you can’t modify the premade Windows 2000 forms.
Managing Ports
You can use the Ports tab in the Print Server Properties dialog box to add,
delete, and configure ports.
The capabilities of the Ports tab in the Print Server Properties dialog
box are virtually identical to those of the Ports tab in a printer’s Properties
dialog box.
STEP BY STEP
To delete a port, highlight the port you want to delete and click Delete Port. In
the Delete Port dialog box, click Yes to delete the port.
To add a port, click Add Port.
TIP
Some ports can’t be deleted. Windows 2000 displays a warning box
when it is unable to delete the specified port.
5. The Printer Ports dialog box appears, as shown in Figure 12-18. Notice the avail-
able port types listed. The port types displayed in this dialog box will vary, depend-
ing on the protocols and services installed on your Windows 2000 computer.
Highlight the type of port you want to add and click New Port.
6. Depending on the type of port you’re adding, various wizard screens or dialog
boxes may be displayed. Follow the instructions presented on screen to create
your new port.
7. The Printer Ports dialog box reappears. Click Close.
8. In the Print Server Properties dialog box, click Close.
9. Close the Printers folder.
4701-1 ch12.f.qc 4/24/00 09:29 Page 844
STEP BY STEP
To manage print jobs that have been sent to a printer, double-click the
printer in the Printers folder.This action brings up the printer’s dialog
box. In this dialog box you can pause, resume, restart, and cancel (delete)
print jobs.You can also set a print job’s priority and schedule the time a
print job may be printed.
Figure 12-21 shows a printer’s dialog box. Notice the Document menu,
and the various options it contains.Also notice the Status column.The sta-
tus of a print job can sometimes be helpful when troubleshooting printers.
STEP BY STEP
To manage a print job, select the option button next to the print job (in the
Document column), and then click the action you want to take from the
Document Actions menu in the left pane.
TIP
If you frequently need to manage documents for this printer, consider
adding it to your Favorites in Internet Explorer.
STEP BY STEP
When the original print device is repaired and brought back online, you
can repeat the preceding steps, this time selecting the port that is associated
with the original print device. Print jobs will then be sent to the original
print device.
4701-1 ch12.f.qc 4/24/00 09:29 Page 850
A user reports that he is unable to The most probable cause of this problem is
print to a printer. You have specifically that the user is a member of a group that is
allowed the Print permission to this denied the Print permission to the printer.
user for this printer. Either remove the user from the group or
remove the Deny – Print permission from
the group.
You are unable to add a standard The most common cause of this problem is
TCP/IP local printer on a Windows an incorrect configuration of a TCP/IP
2000 computer. parameter on either the Windows 2000
computer or on the TCP/IP print device.
Ensure that the IP address, subnet mask,
and default gateway parameters are set
correctly on both.
You experience a paper jam in the The cause of the paper jam isn’t important
middle of printing an important print here, but being able to reprint the entire
job. You want to reprint the entire print job is. To solve this problem,
print job, but it is not possible immediately double-click the printer in the
to reprint the job from the application Printers folder. Then pause the print
because you deleted the document job. Then clear the paper jam at the print
after you created the print job. device. Finally, select Restart in the printer’s
dialog box to reprint the entire print job.
(Don’t select Resume, because this option
won’t reprint the entire print job.)
Print jobs aren’t being sent from the The most likely cause of this problem is a
printer to the print device. A print job stalled print spooler. Stop and restart the
with a size of 0 bytes is at the top of Print Spooler service, and printing should
the print job list for the printer. Other resume.
documents are also listed in the
print job list, and users can still send
print jobs to the printer.
4701-1 ch12.f.qc 4/24/00 09:29 Page 851
Probable Cause/
Problem Recommended Solution
When users print to a printer pool, The most likely cause of this problem is
documents sent to one of the print that nonidentical print devices are being
devices in the printer pool are not used in the printer pool. Remove the
printed correctly. device that is not printing correctly from
the printer pool, or replace the device with
a print device that is identical to all other
print devices in the printer pool.
An HP (DLC) printer has stopped This problem usually occurs when another
sending print jobs to its assigned computer on the network is configured to
print device. use DLC to connect to the print device by
using a Continuous connection. If you want
more than one printer to be able to access
a print device by using DLC, configure a
Job Based connection for all printers.
■ You can configure options for a printer in the printer’s Properties dialog box.
This dialog box is accessed through the Printers folder. You can configure
printer pools, schedule printers, set printer priorities, assign a separator page,
configure printer permissions, and assign forms to paper trays in this dialog box.
■ The three Windows 2000 printer permissions are Print, Manage Documents,
and Manage Printers. Printer permissions are specifically allowed or denied to
individual users and groups. User and group printer permissions are additive,
and typically the least restrictive combination of printer permissions applies.
■ You can configure several of a print server’s properties. Print server properties
are configured in the Print Server Properties dialog box, which is accessed
from the Printers folder. In this dialog box you can create forms, manage ports,
manage printer drivers, and change the location of the spool folder.
■ There are several tools and techniques you can use to manage print jobs. You
can use the Printers folder to manage print jobs. You can also use Internet
Explorer to manage print jobs on Internet printers. Finally, you can redirect print
jobs to another print device if the original print device fails.
■ Printing problems can occur on a Windows 2000 network for several reasons.
A good first step, when troubleshooting printer problems, is to ensure that
users have appropriate printer permissions.
4701-1 ch12.f.qc 4/24/00 09:29 Page 853
853
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about Windows 2000 printing, and to help you prepare for the
Professional, Server, and Directory Services exams:
■ Assessment questions: These questions test your knowledge of
the printing topics covered in this chapter.You’ll find the answers
to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge
you to apply your understanding of the material to solve a hypo-
thetical problem. In this chapter’s scenario, you are asked to trou-
bleshoot various Windows 2000 printing problems.You don’t need
to be at a computer to do scenarios.Answers to this chapter’s sce-
nario are presented at the end of this chapter.
■ Labs: These exercises are hands-on practice activities that you per-
form on a computer.The lab in this chapter gives you an opportu-
nity to practice several basic Windows 2000 printing tasks.
Assessment Questions
1. You want to add a printer on your Windows 2000 Professional com-
puter that is connected to an HP JetDirect adapter that does not sup-
port TCP/IP printing.What should you install on your Windows
2000 Professional computer before you add the printer?
A. The DLC protocol
B. The NetBEUI protocol
C. Print Services for Unix
D. Client Service for NetWare
2. What must you do before you can publish a Windows 2000 printer in
Active Directory?
A. Share the printer.
B. Install the NetBEUI protocol.
C. Install printer drivers for other operating systems.
D. Assign the Everyone group the Allow – Manage Documents
permissions to the printer.
4701-1 ch12.f.qc 4/24/00 09:29 Page 854
854
855
8. A print job with a size of 0 bytes is listed at the top of the print job
list, and other print jobs in the print job list are not being sent to the
print device.What should you do?
A. Delete the print job at the top of the print job list.
B. Pause the printer, then restart the printer.
C. Stop the Print Spooler service, then restart the Print Spooler
service.
D. Delete the printer, then recreate the printer.
Scenarios
The following scenarios provide you with an opportunity to apply the
knowledge you’ve gained in this chapter about troubleshooting printing
problems in a Windows 2000 environment. Printing problems can occur
on a Windows 2000 network for several reasons. For each of the following
problems, consider the given facts and answer these questions:
1. A user, JohnT, reports that he is unable to print to a printer on your
Windows 2000 network.You specifically allowed JohnT the Print
permission for this printer about a month ago.
a. What do you think is the most likely cause of the printing
problem?
b. What course of action would you take to try to resolve the
problem?
2. Several users report that when they print to a printer pool on a
Windows 2000 Server computer, documents printed by one of the
print devices in the printer pool are not printed correctly.The
printed pages contain garbled, unreadable text.
a. What do you think is the most likely cause of the printing
problem?
b. What course of action would you take to try to resolve the
problem?
4701-1 ch12.f.qc 4/24/00 09:29 Page 856
856
Lab Exercises
The following lab is designed to give you practical experience working
with printers in a Windows 2000 environment.
857
8. On the Printer Sharing screen, ensure that the “Do not share this
printer” option is selected. Click Next.
9. On the Print Test Page screen, ensure that the No option is selected,
and click Next.
10. On the Completing the Add Printer Wizard screen, click Finish.
11. The new local printer you added is displayed in the Printers folder.
Continue on to Part 2.
858
859
Assessment Questions
Scenarios
1. The most likely cause of this problem is that JohnT is a member
of a group that is denied the Print permission to this printer. Either
remove JohnT from the group or remove the Deny – Print permis-
sion from the group.
2. The most likely cause of this problem is that nonidentical print
devices are being used in the printer pool. Remove the device that
is not printing correctly from the printer pool, or replace the device
with a print device that is identical to (or at least uses the same
printer drivers as) all other print devices in the printer pool.
4701-1 ch13.f.qc 4/24/00 09:30 Page 860
Professional
Server
EXAM
MATERIAL Directory Services
EXAM OBJECTIVES
C HAP TE R
13
Auditing and Security
T his chapter is all about managing auditing and security on your Windows
2000 computer and on your Windows 2000 network. First, I’ll show you
how to enable and configure auditing. You’ll learn how to audit Active Directory
objects as well as files, folders, and printers. Next, I’ll explain how you can use
Event Viewer to view, monitor, and analyze audit and security events.
From there, I’ll explore how to use the Security Templates snap-in to cre-
ate and implement a security template that can be used to apply a predefined
security policy to one or more computers. Next, I’ll introduce you to another
snap-in, Security Configuration and Analysis, that you can use to compare a
computer’s existing security policy settings against a predefined set of secu-
rity policy settings. I’ll also tell you about a command-line version of this snap-
in that can make security analysis on your network easier for you. Finally, I’ll
give you some helpful tips for troubleshooting auditing and security problems.
861
4701-1 ch13.f.qc 4/24/00 09:30 Page 862
Chapter Pre-Test
1. What are the two areas Windows 2000 auditing is divided into?
2. What types of objects you can audit in Windows 2000?
3. What Windows 2000 tool can you use to view the results of
auditing?
4. What is a security template?
5. What MMC snap-in can you use to create, edit, and manage secu-
rity templates?
6. What are the two primary ways to implement a security template?
7. What MMC snap-in can you use to compare a computer’s security
configuration settings against the predefined security configura-
tion settings in a security template?
4701-1 ch13.f.qc 4/24/00 09:30 Page 863
Managing Auditing
When enabled, auditing produces a log of specified security events and
activities that occur on a Windows 2000 computer. By default, auditing is
not enabled.
Windows 2000 auditing is divided into two areas: auditing of access to
the system and auditing of access to objects. System access auditing pri-
marily involves tracking accesses and attempted accesses to the Windows
2000 operating system. Object access auditing involves tracking accesses
and attempted accesses to specific objects, such as Active Directory objects
(including users, groups, computers, OUs, domains, and so on), files, fold-
ers, and printers.
You must be a member of the Administrators group to enable and con-
figure auditing. In the next sections, I’ll show you how to enable and con-
figure both system access and object access auditing.
CAUTION
Auditing is disabled by default in the Default Domain Controllers Policy
GPO. Even if you enable auditing for all Windows 2000 computers in a
domain, auditing will not be enabled on domain controllers until you
enable it in the Default Domain Controllers Policy GPO by using the
Domain Controller Security Policy tool.
CROSS-REFERENCE
If you need refreshing on Group Policy, see Chapter 10.
Now I’ll show you how to configure an audit policy for all Windows
2000 computers in the domain by using the Domain Security Policy tool.
Because the Windows 2000 user interfaces for the Domain Security Policy
tool, the Domain Controller Security Policy tool, and the Local Security
Policy tool are substantially similar, you can use these same steps to config-
ure an audit policy for domain controllers or for the local Windows 2000
computer — all you need to do is start the appropriate tool and follow the
steps in the next section.
STEP BY STEP
1. Start the Domain Security Policy tool. (Select Start ➪ Programs ➪ Administrative
Tools ➪ Domain Security Policy.)
2. In the left pane of the Domain Security Policy dialog box, click the + next to
Security Settings. Then click the + next to Local Policies. Highlight Audit Policy. A
list of specific audit policies that you can configure is displayed in the right pane,
as shown in Figure 13-1.
3. In the right pane, double-click the audit policy you want to configure.
4701-1 ch13.f.qc 4/24/00 09:30 Page 866
4. A Security Policy Setting dialog box for the audit policy you selected appears, as
shown in Figure 13-2.
Figure 13-2 shows the Security Policy Setting dialog box for the “Audit account
logon events” audit policy. However, the dialog boxes for each of the other audit
policies are identical to this one.
Select the check box next to “Define these policy settings.” Then, select either the
check box next to Success, Failure, or both.
When the Success check box is selected, Windows 2000 generates an audit
event each time a user successfully performs the audited task (in this case, each
time a user logs on).
When the Failure check box is selected, Windows 2000 generates an audit
event each time a user attempts to perform an audited task but fails (usually
because of a lack of permissions or user rights).
When both the Success and Failure check boxes are selected, an audit
event is generated each time a user attempts to perform an audited task, whether
successfully or unsuccessfully.
Click OK.
5. The Domain Security Policy dialog box reappears. Repeat Steps 3 and 4 to con-
figure additional audit policies as necessary. Close the Domain Security Policy
dialog box.
Table 13-1 lists and describes the types of Windows 2000 system events
you can audit.
4701-1 ch13.f.qc 4/24/00 09:30 Page 867
TIP
Carefully consider which events you need to audit. If you choose to audit
everything, the computer’s performance will be slowed significantly, your
Security Log will fill up quickly, and you’ll find yourself sifting through vol-
umes of useless information to find the auditing data you need.
4701-1 ch13.f.qc 4/24/00 09:30 Page 868
EXAM TIP
A favorite exam-writer trick is to tell you that auditing has been configured
for an object, but that no audit events are being written to the Security
Log. Remember that system access auditing (for either directory service
access or object access) must also be enabled and configured before
object auditing will occur.
In the next sections I’ll show you how to configure auditing of Active
Directory objects, files, folders, and printers.
STEP BY STEP
TIP
You can’t remove auditing entries that are inherited from parent objects.
9. In the Access Control Settings dialog box for the object, click OK.
10. In the object’s Properties dialog box, click OK.
11. Close Active Directory Users and Computers.
TIP
Remember, you must also enable and configure system access auditing
for directory service access before object auditing of Active Directory
objects will occur.
When configuring auditing of files and folders, make sure that you take
inheritance into account. When auditing is configured for a volume or a
folder, all files and folders in that volume or folder inherit the auditing set-
tings configured on the parent object.
The task of configuring auditing of files and folders is normally per-
formed by using Windows Explorer, as the following steps explain.
STEP BY STEP
The selection you make in this drop-down list box works in conjunction with the
“Apply these auditing entries to objects and/or containers within this container
only” check box at the bottom of the dialog box. If you select this check box (and
any option in the “Apply onto” box that includes subfolders), the auditing entries
you set will be applied to the subfolder, but will not be applied to any files or
folders within the subfolder.
Next, configure auditing for accesses to the file or folder. You can configure suc-
cessful accesses, failed accesses, or both, for each type of access.
When you’re finished configuring audit entries, click OK.
10. In the Access Control Settings dialog box for the file or folder, click OK.
11. If system access auditing of object access has not yet been enabled for this com-
puter, Windows 2000 displays a Security dialog box, as shown in Figure 13-6.
Click OK, and remember to enable auditing of object access after you complete
these steps.
4701-1 ch13.f.qc 4/24/00 09:30 Page 874
STEP BY STEP
7. In the Select User, Computer, or Group dialog box, double-click the user, com-
puter, or group for which you want to audit accesses to this printer.
8. The Auditing Entry dialog box for the printer appears, as shown in Figure 13-7.
Notice the “Apply onto” drop-down list box.
Select the appropriate option in the “Apply onto” drop-down list box. In this list
box you can choose whether to apply these auditing settings to this printer only,
to this printer’s documents only, or to this printer and its documents.
Next, configure auditing for accesses to the printer. You can configure successful
accesses, failed accesses, or both, for each type of access.
When you’re finished configuring printer auditing, click OK.
9. In the Access Control Settings dialog box for the printer, click OK.
10. In the printer’s Properties dialog box, click OK.
11. Close the Printers folder.
4701-1 ch13.f.qc 4/24/00 09:30 Page 876
STEP BY STEP
When you first open the Security Log, there may be so many events
listed that you despair of ever locating the event you’re looking for. To
make it easier to locate specific events, you can filter the Security Log so
that only events of the type(s) you select are displayed. Filtering Security
Log events can help you to analyze the specific type(s) of events you want
to monitor.
STEP BY STEP
Select the check box next to the event type(s) you want displayed in the
Security Log.
4701-1 ch13.f.qc 4/24/00 09:30 Page 879
Then, select the event source from the “Event source” drop-down list box.
Generally, the default selection of All is appropriate. However, if you only want
to view security events from a specific source, such as Directory Services, select
the appropriate source from this drop-down list box.
Finally, if you want to view only those events that occurred during a specific time
period, you can configure the time period by selecting Events On in the From and
To drop-down list boxes, and then specifying a start and stop date and time.
When you finish configuring filtering, click OK.
4. The Security Log in Event Viewer reappears. Only the events that meet the criteria
you configured on the Filter tab are displayed.
If you want to archive the events in the Security Log, you can save them
by using Event Viewer.After you archive the log, you should clear it so that
the archived events are no longer displayed, and there is room for the log to
accumulate new events.
STEP BY STEP
5. Event Viewer asks if you want to save the Security Log before you clear it.
Because you just saved the Security Log, click No to continue.
6. Windows 2000 clears the Security Log and creates a success audit event with a
description that states “The audit log was cleared.” The description of this audit
event also includes the user name of the user who cleared the log.
STEP BY STEP
In this dialog box, configure the maximum size of the Security Log. The default
maximum log size is 512K, which may be much smaller than you need if you plan
to audit multiple security events.
Next, select one of the three options to choose the action that Windows 2000
will take when the maximum log size is reached. Click OK.
4. Close Event Viewer.
TIP
The Security Templates snap-in was originally included as part of the
Security Configuration Tool Set, but Microsoft split this tool set into two
components: the Security Templates snap-in and the Security Config-
uration and Analysis snap-in.
STEP BY STEP
There are two ways to create a security template. You can either edit
then save one of the predefined security templates, or you can create a
security template from scratch. By far the most common technique used is
modifying an existing security template.
4701-1 ch13.f.qc 4/24/00 09:30 Page 883
STEP BY STEP
1. Open the security console you created in the previous set of steps. (Select
Start ➪ Programs ➪ Administrative Tools ➪ Security Console.)
2. In the left pane of the security console, click the + next to Security Templates.
Then click the + next to C:\WINNT\Security\Templates. All of the secu-
rity templates on your computer, including the predefined security templates, are
displayed in the left pane, as shown in Figure 13-12.
Highlight the existing security template you want to modify. Select Action ➪
Save As.
3. In the Save As dialog box, type in the name you want to assign to the new tem-
plate you’re creating in the “File name” text box. Click Save.
4. In the left pane of the security console, click the + next to the name of the security
template you just created. Further expand the components of the security tem-
plate as necessary. Figure 13-13 shows the contents of a new security template I
created. Notice that the configurable settings in a security template are the same
as the configurable settings available in Local Security Policy, Domain Security
Policy, and Domain Controller Security Policy.
4701-1 ch13.f.qc 4/24/00 09:30 Page 884
Modify the individual security settings in the template to meet your needs.
5. When you’re finished configuring the security template, highlight the name of your
security template in the left pane, and select Action ➪ Save.
6. Close the security console. If prompted, click Yes to save console settings to your
security console.
You may decide you want to create a security template from scratch.
The following steps explain how to perform this process.
STEP BY STEP
1. Open the security console you created earlier in this chapter. (Select Start ➪
Programs ➪ Administrative Tools ➪ Security Console.)
2. In the left pane of the security console, click the + next to Security Templates.
Then click the + next to C:\WINNT\Security\Templates.
4701-1 ch13.f.qc 4/24/00 09:30 Page 885
STEP BY STEP
When you apply a security template to the local computer, it’s impor-
tant to keep in mind how the security settings in Group Policy are applied.
If the computer you are applying the security template to is a member of a
domain, it may be affected by other security settings configured at the
domain level or set in various GPOs in Active Directory.
CROSS-REFERENCE
For more information on how Group Policy is applied, see Chapter 10.
STEP BY STEP
EXAM TIP
Both the Server and Directory Services exams have objectives relating to
security configuration and analysis. Make sure you are very comfortable
with both the Security Templates and the Security Configuration and
Analysis snap-ins before you take these exams.
Before you can use the Security Configuration and Analysis snap-in,
you’ll probably want to add it to the security console you created earlier in
this chapter.
STEP BY STEP
1. Open the security console you created earlier in this chapter. (Select Start ➪
Programs ➪ Administrative Tools ➪ Security Console.)
2. In the security console dialog box, select Console ➪ Add/Remove Snap-in.
3. In the Add/Remove Snap-in dialog box, click Add.
4. In the Add Standalone Snap-in dialog box, scroll down and highlight Security
Configuration and Analysis. Click Add. Then click Close.
5. In the Add/Remove Snap-in dialog box, click OK.
6. In the security console dialog box, select Console ➪ Save.
7. Close the security console dialog box.
I’ll show you how to use the Security Configuration and Analysis snap-
in in the following sections.
4701-1 ch13.f.qc 4/24/00 09:30 Page 888
STEP BY STEP
1. Open the security console you created earlier in this chapter. (Select Start ➪
Programs ➪ Administrative Tools ➪ Security Console.)
2. In the left pane of the security console, highlight Security Configuration and
Analysis. Select Action ➪ Open database. (Or, you can right-click Security
Configuration and Analysis and select Open database from the menu that
appears.)
3. The Open database dialog box appears. The contents of the Database folder
on this computer are displayed. By default, this folder is empty.
To open a database that you have previously created, double-click the
database.
To create a new database, type in a name for the database in the “File name”
text box, and click Open.
4. In the Import Template dialog box, the security templates on this computer are dis-
played. Double-click the security template you want to import into the database.
5. Windows 2000 creates the database and returns you to the security console dialog
box. Leave this dialog box open if you plan to analyze or configure your computer.
Analyzing a Computer
Once you’ve created a database (or opened an existing database) in the
Security Configuration and Analysis snap-in, you’re ready to use this snap-
in to analyze your computer.What really happens here is that the Security
Configuration and Analysis snap-in compares your computer’s security
configuration settings against the security configuration settings in the
security template you’ve loaded into the database.
4701-1 ch13.f.qc 4/24/00 09:30 Page 889
Once the analysis is performed, you can view the results of the analysis
by using the Security Configuration and Analysis snap-in, and determine
whether your computer meets the security standards specified in the secu-
rity template.
STEP BY STEP
1. Open the security console you created earlier in this chapter. (Select Start ➪
Programs ➪ Administrative Tools ➪ Security Console.)
2. If you haven’t already done so, follow the steps in the previous section to create
or open a database.
3. In the left pane of the security console, highlight Security Configuration and
Analysis. Select Action ➪ Analyze Computer Now.
4. In the Perform Analysis dialog box, click OK to accept the default error log
file path.
5. Security Configuration and Analysis analyzes the computer.
6. To view the results of the analysis, in the left pane of the security console dialog
box, click the + next to Security Configuration and Analysis. Then continue
expanding containers and folders until the container or folder that contains the
security settings for which you want to view the analysis results is displayed in
the left pane. Highlight that container or folder.
7. The analysis results are displayed in the right pane of the security console, as
shown in Figure 13-14. Notice the symbols used to indicate compliance or non-
compliance with the security settings in the database. An X in a red circle indi-
cates noncompliance, and a check mark in a white circle indicates compliance.
Also notice the Database Setting and Computer Setting columns. The Database
Setting column displays the desired security settings, as specified by the security
template settings contained in the database. The Computer Setting column dis-
plays the computer’s actual security settings.
8. When you finish viewing the results of the analysis, close the security console. Or,
if you want to apply the security settings in the database to the computer, leave
the security console open — I’ll show you how to apply these settings to your com-
puter in the next section.
4701-1 ch13.f.qc 4/24/00 09:31 Page 890
]
FIGURE 13-14 Viewing analysis results
Configuring a Computer
Once you’ve analyzed your computer against a predefined set of security
settings, you may decide that you want to apply the security template set-
tings contained in the Security Configuration and Analysis database to the
local computer. For example, if the results of the analysis show that your
computer doesn’t meet your company’s security settings standard (as set
forth in the security template you used in the database to analyze the com-
puter), you may need to use the Security Configuration and Analysis snap-
in to apply the settings in the template to the noncompliant computer.
4701-1 ch13.f.qc 4/24/00 09:31 Page 891
STEP BY STEP
1. Open the security console you created earlier in this chapter. (Select Start ➪
Programs ➪ Administrative Tools ➪ Security Console.)
2. If you haven’t already done so, follow the steps in the previous section to create
or open a database. Make sure you select a database that contains the security
settings you want to apply to this computer.
Optionally, you may want to analyze the computer to compare its security settings
with those contained in the database.
3. In the left pane of the security console, highlight Security Configuration and
Analysis. Select Action ➪ Configure Computer Now.
4. In the Configure System dialog box, click OK to accept the default error log
file path.
5. Security Configuration and Analysis configures your computer’s security settings.
This takes a few minutes.
6. Close the security console dialog box. If prompted, click Yes to save settings to
the security console.
The syntax and parameters for secedit.exe are beyond the scope of
this book. However, you can easily access the Windows 2000 Help for the
secedit.exe command-line utility.
STEP BY STEP
895
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about auditing and security, and to help you prepare for the
Professional, Server, and Directory Services exams:
■ Assessment Questions: These questions test your knowledge of
the auditing and security topics covered in this chapter.You’ll find
the answers to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge
you to apply your understanding of the material to solve a hypo-
thetical problem. In this chapter’s scenarios, you are asked to trou-
bleshoot auditing and security problems and answer the questions
following each problem.You don’t need to be at a computer to do
scenarios.Answers to this chapter’s scenarios are presented at the
end of this chapter.
■ Lab Exercises: These exercises are hands-on practice activities
that you perform on a computer.The lab in this chapter gives you
an opportunity to practice managing auditing and security in
Windows 2000.
Assessment Questions
1. You want to enable system access auditing on a Windows 2000 Server
computer that is a domain controller.Which tool should you use?
A. System
B. Windows Explorer
C. Domain Security Policy
D. Domain Controller Security Policy
2. You want to enable auditing of several folders on a Windows 2000
Professional computer.You have already enabled system access audit-
ing.Which tool should you use?
A. Local Security Policy
B. Windows Explorer
C. Folder Options
D. System
4701-1 ch13.f.qc 4/24/00 09:31 Page 896
896
897
6. Which tasks can you perform by using the Security Templates snap-in
to the MMC? (Choose all that apply.)
A. Create security templates.
B. Edit security templates.
C. Import security templates.
D. Compare a computer’s security configuration settings against the
security configuration settings in a specific security template.
7. What is the name of the command-line utility you can use to
perform the same tasks as you can perform by using Security
Configuration and Analysis?
A. gpedit.msc
B. secpol.msc
C. poledit.exe
D. secedit.exe
8. You are archiving a Security Log for later analysis in a spreadsheet.
Which file type should you assign to the log when you save it?
A. .evt
B. .txt
C. .csv
D. .exe
Scenarios
Troubleshooting auditing and security on a Windows 2000 computer or a
Windows 2000 network can be a painstaking, though necessary, task. For
each of the following troubleshooting problems, consider the given facts
and answer the questions that follow.
1. You recently configured object access auditing for multiple files and
folders on a Windows 2000 Server computer, but no auditing events
are appearing in the Security Log.
a. What is the most likely cause of this problem?
b. What should you do to resolve this problem?
4701-1 ch13.f.qc 4/24/00 09:31 Page 898
898
Lab Exercises
Lab 13-1 Managing Auditing and Security
Professional
Server
EXAM
MATERIAL
Directory Services
899
2. In the left pane of the Domain Controller Security Policy dialog box,
click the + next to Security Settings.Then click the + next to Local
Policies. Highlight Audit Policy.
3. In the right pane, double-click “Audit directory service access.”
4. In the Security Policy Setting dialog box, select the check box next to
“Define these policy settings.”Then, ensure that the check boxes next
to Success and Failure are both selected. Click OK.
5. In the right pane, double-click “Audit logon events.”
6. In the Security Policy Setting dialog box, select the check box next to
“Define these policy settings.”Then ensure that the check boxes next
to Success and Failure are both selected. Click OK.
7. In the right pane, double-click “Audit object access.”
8. In the Security Policy Setting dialog box, select the check box next to
“Define these policy settings.”Then ensure that the check boxes next
to Success and Failure are both selected. Click OK.
9. Close the Domain Controller Security Policy dialog box.
10. Select Start ➪ Run.
11. In the Run dialog box, type
secedit /refreshpolicy machine_policy
and click OK.
12. Start Windows Explorer. (Select Start ➪ Programs ➪ Accessories ➪
Windows Explorer.)
13. In the left pane, click the + next to My Computer, then highlight
Local Disk (C:).
14. In the right pane, right-click the Program Files folder and select
Properties from the menu that appears.
15. In the Program Files Properties dialog box, click the Security tab.
16. On the Security tab, click Advanced.
17. In the Access Control Settings for Program Files dialog box, click the
Auditing tab.
18. On the Auditing tab, click Add.
19. In the Select User, Computer, or Group dialog box, double-click the
Authenticated Users group.
4701-1 ch13.f.qc 4/24/00 09:31 Page 900
900
20. In the Auditing Entry for Program Files dialog box, select the
Successful and Failed check boxes next to List Folder/Read Data.
Click OK.
21. In the Access Control Settings for Program Files dialog box,
click OK.
22. In the Program Files Properties dialog box, click OK.
23. In the left pane, scroll down and click the + next to Control Panel.
Then highlight the Printers folder.
24. In the right pane, right-click the AGFA-AccuSet v52.3 printer, and
select Properties from the menu that appears.
25. In the AGFA-AccuSet v52.3 Properties dialog box, click the
Security tab.
26. On the Security tab, click Advanced.
27. In the Access Control Settings for AGFA-AccuSet v52.3, click the
Auditing tab.
28. On the Auditing tab, click Add.
29. In the Select User, Computer, or Group dialog box, double-click the
Everyone group.
30. In the Auditing Entry for AGFA-AccuSet v52.3, select the Successful
and Failed check boxes next to Print. (The Read Permissions check
boxes are automatically checked when you select the Print check
boxes.) Click OK.
31. In the Access Control Settings for AGFA-AccuSet v52.3 dialog box,
click OK.
32. In the AGFA-AccuSet v52.3 Properties dialog box, click OK.
33. Close the Printers folder.
34. Select Start ➪ Programs ➪ Administrative Tools ➪ Active Directory
Users and Computers.
35. In the left pane of the Active Directory Users and Computers dialog
box, highlight domain1.mcse. Select Action ➪ Properties.
36. In the domain1.mcse Properties dialog box, click the Security tab.
37. On the Security tab, click Advanced.
38. In the Access Control Settings for domain1 dialog box, click the
Auditing tab.
4701-1 ch13.f.qc 4/24/00 09:31 Page 901
901
39. On the Auditing tab, double-click the default auditing entry named
Everyone.
40. In the Auditing Entry for domain1 dialog box, notice the default set-
tings on both the Object and Properties tabs.Then, on the Object tab,
select the Successful and Failed check boxes next to List Contents.
Click OK.
41. In the Access Control Settings for domain 1 dialog box, click OK.
42. In the domain1.mcse Properties dialog box, click OK.
43. Close Active Directory Users and Computers.
902
10. In the Event Properties dialog box, read the detailed information
about the audit event. Notice that the failure event is a logon failure
due to an unknown user name or a bad password. (This is the event
you generated in Step 3.) Click OK.
11. Close Event Viewer.
903
12. In the Template Security Policy Setting dialog box, select the check
box next to “Define this policy setting in the template.”Then select
the Enabled option. Click OK.
13. In the left pane of the console, highlight My Security Template,
and select Action ➪ Save.
14. Close the Security Configuration Tool Set dialog box.When
prompted, click Yes to save console settings to the Security
Configuration Tool Set.
15. Select Start ➪ Programs ➪ Administrative Tools ➪ Local Security Policy.
16. In the Local Security Settings dialog box, select Action ➪ Import Policy.
17. In the Import Policy From dialog box, double-click My Security
Template.
18. Close the Local Security Settings dialog box.
19. Select Start ➪ Programs ➪ Administrative Tools ➪ Active Directory
Users and Computers.
20. In the left pane of the Active Directory Users and Computers dialog
box, highlight domain1.mcse. Select Action ➪ Properties.
21. In the domain1.mcse Properties dialog box, click the Group Policy tab.
22. On the Group Policy tab, highlight the Default Domain Policy GPO,
and click Edit.
23. In the Group Policy dialog box, click the + next to the Windows
Settings folder in the Computer Configuration section.Then high-
light the Security Settings container. Select Action ➪ Import Policy.
24. In the Import Policy From dialog box, double-click My Security
Template.
25. Close the Group Policy dialog box.
26. In the domain1.mcse Properties dialog box, click OK.
27. Close Active Directory Users and Computers.
904
905
5. You can use the Security Templates snap-in to create, edit, and man-
age security templates.
6. There are two primary ways to implement a security template: you
can either apply the security template directly to the local computer;
or you can import the security template into a Group Policy object
(GPO) in Active Directory, where it will be applied to all computers
affected by that GPO.
7. The Security Configuration and Analysis snap-in
Assessment Questions
1. D. Using Domain Controller Security Policy is the best choice.
You can set audit policy in Domain Security Policy, but auditing
will not be enabled on domain controllers until you enable it in
the Default Domain Controllers Policy GPO by using either the
Domain Controller Security Policy tool,Active Directory Users
and Computers, or the Group Policy snap-in to the MMC.
2. B. Once system access auditing has been enabled, you can enable
object access auditing of folders by configuring the folders’ Properties
dialog boxes in Windows Explorer.
3. B. The most likely cause of the lack of audit events in the Security
Log is that system access auditing has not yet been enabled on this
Windows 2000 computer.To audit access to an object, such as a
printer, you must not only configure object access auditing, you
must configure system access auditing as well.
4. B. Audited events are written to the Security Log in Event Viewer.
5. C. Because the domain controller’s Audit Policy is being overridden
by the Default Domain Controllers Policy GPO, you should use
Domain Controller Security Policy (or Active Directory Users and
Computers) to modify this GPO and thereby enable auditing on the
domain controller.
4701-1 ch13.f.qc 4/24/00 09:31 Page 906
906
6. A, B. You can create, edit, delete, and save security templates by using
the Security Templates snap-in. However, if you want to import a
security template you’ll need to use another tool, such as Local
Security Policy or Active Directory Users and Computers. If you
want to compare a computer’s security configuration against the con-
figuration of a specific template, you’ll need to use Security
Configuration and Analysis.
7. D.
8. C. Saving the Security Log as a comma-delimited file is probably the
best choice if you want to analyze the data later in a spreadsheet.
Scenarios
1. The most likely cause of this problem is that system access auditing
for object access has not been enabled on the Windows 2000 Server
computer.To resolve the problem, use the appropriate tool (Local
Security Policy, Domain Security Policy, Domain Controller Security
Policy, and so on) to enable system access auditing on the Windows
2000 Server computer.Then auditing of the files and folders will
occur, and the audit events will be written to the Security Log.
2. The most likely cause of this problem is that security policy settings
in a GPO are overriding the security policy settings you set on this
Windows 2000 Professional computer by using Local Security Policy.
Check the security policy settings set at other levels of the network,
including each GPO that may affect this computer. Remember the
Group Policy inheritance rules, and that the Group Policy applied last
is the one that takes precedence.
4701-1 ch13.f.qc 4/24/00 09:31 Page 907
4701-1 ch14.f.qc 4/24/00 09:32 Page 908
Professional
Server
EXAM
MATERIAL Directory Services
EXAM OBJECTIVES
C HAP TE R
14
Backup and Recovery
909
4701-1 ch14.f.qc 4/24/00 09:32 Page 910
Chapter Pre-Test
1. What is user data?
2. What is System State data?
3. How can you access the Windows 2000 backup program
called Backup?
4. What are the three primary tasks you can perform by
using Backup?
5. What is an Emergency Repair Disk?
6. Who can perform backups and restores?
7. What are the two types of restores you can perform of Active
Directory?
8. List three Windows 2000 tools you can use to recover from a
system failure.
9. What is the name of the Windows 2000 management tool used
to manage removable media?
4701-1 ch14.f.qc 4/24/00 09:32 Page 911
EXAM TIP
Make sure you know what’s included in System State data — and what’s
not — on both domain controllers and nondomain controllers when you
take the exams.
In this book, I’ve already discussed several ways you can manage and
optimize the availability of your network’s data, including using NTFS and
permissions to restrict access to files and folders and using mirrored volumes
and RAID-5 volumes to provide fault tolerance.Another important part of
your overall fault tolerance plan is performing regular backups of data.
A tape backup is not a replacement for other fault tolerance methods,
such as mirrored volumes and RAID-5 volumes.Tape backup is an addi-
tional safety precaution to use when other fault tolerance methods fail. I
don’t recommend that you rely solely on mirrored volumes, RAID-5
4701-1 ch14.f.qc 4/24/00 09:32 Page 912
What to Back Up
Before you can create a backup strategy, you need to determine which data
on your network will be backed up. I recommend that all network data be
backed up regularly.This includes both user data and System State data.
In general, operating systems, applications, and System State data need to
be backed up less frequently than user-created data files.You may find it
sufficient to back up these types of data once a week, once a month, or
4701-1 ch14.f.qc 4/24/00 09:32 Page 913
even less often. An exception to this general rule is System State data on
domain controllers. System State data on Windows 2000 domain
controllers should be backed up fairly frequently because it contains the
Active Directory data store.
Depending on the importance of your data, user-created data files can be
backed up once a week, once a day, once an hour, or at any frequency that
meets your organization’s needs.When determining which files to back up
and how often, ask yourself how much data you can really afford to lose. For
example, if you decide to back up only once a week, can you afford to lose
six days of sales information and other employee-created data?
Backup Types
Before I talk about the specific backup types, a short discussion on the
archive attribute, and how the operating system and backup programs use
this attribute, is in order.
The archive attribute is a marker that the operating system automatically
assigns to all files and folders when they are first installed or created.
Depending on the backup type, backup programs remove the archive
attribute from a file or folder to indicate that the file or folder has been
backed up. If a file or folder is modified after it is backed up, the operating
system reassigns the archive attribute to it.
There are five standard types of backups you can perform:
■ Normal: A normal backup backs up all selected files and folders.
It removes the archive attribute from the backed up files and folders.
A normal backup is a full, complete backup — it is the backbone
of your backup plan or strategy.
■ Copy: A copy backup backs up all selected files and folders. It does
not remove or otherwise affect the archive attribute.The copy
backup can be performed without disrupting the normal backup
schedule, because it does not affect the archive attribute.You could
use a copy backup to create an extra backup to store off-site.
■ Incremental: An incremental backup backs up all selected files
and folders that have changed since the last normal or incremental
backup.An incremental backup removes the archive attribute from
the backed up files and folders.An incremental backup is not
cumulative — it contains only the changes made since the last
normal or incremental backup. If a normal backup is performed
4701-1 ch14.f.qc 4/24/00 09:32 Page 914
Backup Strategies
There are a number of acceptable backup strategies, and three fairly
common ones:
■ Perform a normal backup every day. This is the most time-
consuming of the three common strategies in terms of the time
required to perform backups. However, should a restore be
necessary, only the last normal backup is required, and restore
time is greatly less than either of the other two strategies.
4701-1 ch14.f.qc 4/24/00 09:32 Page 915
Security Considerations
When planning your company’s backup strategy, there are a few security
considerations to take into account:
■ If the data is of a sensitive nature, consider physically securing the
tape drive and the backup tapes in a locked room.While your server
may require a password and permissions to access confidential data,
when a backup tape is taken and restored on another server, your
server’s security measures are defeated.
■ Consider rotating backup tapes to an off-site location.This can
prevent or minimize data loss due to a single catastrophic event,
such as a theft, fire, flood, or earthquake. Consider using a third-
party company that will store your data tapes in a secure, climate-
controlled environment.
■ If you store backup tapes in a fireproof safe, remember that fireproof
doesn’t necessarily mean that heat or smoke can’t destroy the data
on magnetic tapes. Make sure the safe is capable of protecting
magnetic media as well as papers and other important items.
4701-1 ch14.f.qc 4/24/00 09:32 Page 916
Tape Rotation
Most organizations rotate their magnetic tapes in order to reduce the
cost of backups. Instead of using a new tape every day, tapes are reused in a
systematic manner.
There are probably almost as many tape rotation methods as there are
network administrators. Consider the following tape rotation example,
which is illustrated in Table 14-1.
TABLE 14-1 Sample Backup Tape Rotation Scheme
Monday Tuesday Wednesday Thursday Friday
This example requires eight tapes for a four-week period. Tapes one
through four are reused each week, with the Monday tape used again the
following Monday, and so on. Depending on the amount of data backed
up and the tape’s capacity, the data from the previous backup can be
appended or replaced. A different tape is used for the backup made each
Friday, so that files that are deleted during the course of the previous weeks
can be recovered. The eighth tape is permanently archived and removed
from the tape rotation scheme.
When choosing a tape rotation method, consider the following:
■ The useful life of a tape: Tapes need to be eventually removed
from the rotation scheme and replaced with new tapes.The number
of times a magnetic tape can be reused depends on the tape’s quality
and storage conditions.
4701-1 ch14.f.qc 4/24/00 09:32 Page 917
■ Tape cost versus the cost of lost data: Some tapes are guaranteed
for life — but only for the cost of the tape.The cost of lost data is
not guaranteed.
■ Archiving tapes: Removing a tape from the rotation schedule
weekly, monthly, or quarterly is a good way to provide a perma-
nent, long-term archive of your company’s data.These tapes are
often stored off-site for disaster recovery purposes (such as in the
case of a fire).
Documenting Backups
Documenting your backups will make restoring after a failure a much
easier task. Consider keeping a backup log book that documents each
backup procedure performed. You should record the date and time the
backup was performed, a brief description of the data backed up, the name
of the person who performed the backup, the tape number used, and its
storage location.You can also include a detailed or summarized printed log
of the backup. If you have this information readily available, the person
performing the restore will be able to quickly identify and locate the most
recent backup tape(s) needed.
Speaking of logs, most backup programs can be configured to create
detailed logs that list the individual files and folders backed up. These logs
can be quite helpful if a user tells you that he or she has accidentally deleted
an important file, and asks you to restore it from tape.A log (either printed,
or written to a file on a disk) will enable you to locate the appropriate tape
needed to restore the file quickly and easily.
EXAM TIP
You can’t use Backup to back up or restore System State data on a remote
Windows 2000 computer. In other words, you can’t back up or restore
System State data over the network. Keep this in mind when you take
the exams.
4701-1 ch14.f.qc 4/24/00 09:32 Page 918
You can use Backup to back up files and folders to a local disk, a
network drive, or a tape device. I recommend you ensure that your tape
drive is listed on the Windows 2000 Hardware Compatibility List (HCL)
and that it has enough capacity to back up your entire server on a single
tape.This is a big help, especially if you perform unattended tape backups.
Before you perform a tape backup, make sure that you have the
appropriate permissions and user rights to perform a backup.To perform a
backup, you need to be a member of the Administrators or Backup
Operators groups, or you need to have the “Back up files and directories”
user right assigned to you. If you are backing up a Windows 2000 domain
controller, members of the Server Operators group also have the necessary
permissions to back up files and folders on this computer.
Consider the time of day when performing backups. Because of the use
of processor and memory during backups, it’s normally best to perform
this task during the periods of lowest server and network usage — often
during nonbusiness hours.
Backup provides you with two different methods to perform a backup.
You can either use the Backup Wizard, or you can manually configure a
backup on the Backup tab.
STEP BY STEP
6. In the Where to Store the Backup screen, select the backup media type you want
to use for this backup from the “Backup media type” drop-down list box. Media
types include files and any tape devices installed and configured on your
Windows 2000 computer.
Then, if you selected a backup media type of file, in the “Backup media or file
name” text box, either accept the default path or type in a complete path to the
file that will contain your backup data. You can browse for this file if you want to.
If you selected a specific tape drive in the “Backup media type” drop-down list
box, select the specific media you want to use in the “Backup media or file name”
drop-down list box.
Click Next.
7. The Completing the Backup Wizard screen appears. If you are finished configuring
your backup, click Finish and skip to Step 14.
If you want to configure advanced backup options, such as the type of backup,
click Advanced.
8. If you clicked Advanced, the Type of Backup screen appears. In this screen, select
the type of backup you want to perform. Available options include: Normal, Copy,
Incremental, Differential, and Daily. Click Next.
4701-1 ch14.f.qc 4/24/00 09:32 Page 920
9. In the How to Back Up screen, you can configure Backup to verify your data after
it is backed up, to use your tape device’s hardware compression capabilities, if
any, or both. If you select the check box next to “Verify data after backup,” this
will approximately double the time it takes to perform the backup. Select the
appropriate option(s), and click Next.
10. In the Media Options screen, you can specify whether Backup will append the
data in this backup to the data already contained on the backup tape or file, or
whether Backup will replace (overwrite) the data on the tape or file with this
backup. Select the appropriate option and click Next.
11. In the Backup Label screen, either accept the default backup and media labels,
or type in different backup and media labels to meet your needs. Click Next.
12. In the When to Back Up screen, you configure whether the backup will run now
or at a later time. If you select the “Later” option, you can schedule the backup
to start at the date and time you choose. Select and configure the appropriate
option, and click Next.
13. In the Completing the Backup Wizard screen, click Finish.
14. If you configured the backup to run now, Windows 2000 performs the backup.
At the completion of the backup, a Backup Progress dialog box is displayed, as
shown in Figure 14-2. Notice that various backup statistics are displayed, and
that you can choose to view a report containing even more detailed information
about the backup.
If you want to view the backup report, click Report. Close Notepad when you
finish viewing the report.
Click Close.
15. Close Backup.
If you’re comfortable using the Backup user interface, you may decide
to configure backups manually instead of using the Backup Wizard. I’ll
show you how to manually configure a backup in the steps that follow.
STEP BY STEP
On this tab, select the check box next to the drives, files, and folders you want to
back up. You can expand drives and folders as necessary by clicking the + next to
the drive or folder.
Next, select the destination for this backup from the “Backup destination” drop-
down list box. Destinations include File and any tape devices installed and
configured on your Windows 2000 computer.
Then, if you selected a backup destination of File, in the “Backup media or file
name” text box, either accept the default path or type in a complete path to the
file that will contain your backup data. You can browse for this file if you want to.
If you selected a specific tape drive in the “Backup destination” drop-down list
box, select the specific media you want to use in the “Backup media or file name”
drop-down list box.
4. On the Backup tab, view the Backup options displayed. If you want to modify any
of these options, select Tools ➪ Options.
5. The Options dialog box appears. This dialog box contains five tabs: General,
Restore, Backup Type, Backup Log, and Exclude Files. You can use these tabs
to customize your backup. Make the appropriate configurations, then click OK.
6. In the Backup dialog box, click Start Backup.
7. The Backup Job Information dialog box appears, as shown in Figure 14-4. Notice
that you can schedule the backup, configure advanced backup options, enter a
backup description, choose whether to append or replace data on the backup
tape, and start the backup in this dialog box.
Configure the appropriate options, and either click Start Backup or Schedule, as
appropriate.
4701-1 ch14.f.qc 4/24/00 09:32 Page 923
Scheduling Backups
Not only can you schedule an individual backup when you configure it,
you can use the Schedule Jobs tab in Backup to view the backup schedule
and to schedule periodic backups on your Windows 2000 computer.
The Schedule Jobs tab enables you to automate the implementation of
your company’s backup strategy.You can use this tool to schedule recurring
unattended normal, incremental, differential, and other types of backups.
The Schedule Jobs tab is fairly straightforward to use.
STEP BY STEP
SCHEDULING A BACKUP
If you have already scheduled jobs, you can view them on this schedule.
To add a job to the schedule, click Add Job.
4701-1 ch14.f.qc 4/24/00 09:32 Page 924
STEP BY STEP
TIP
Unlike Windows NT 4.0, in Windows 2000 the computer’s registry is
never copied to the Emergency Repair Disk.
Insert a blank, formatted floppy disk into your computer’s A: drive and click OK.
4701-1 ch14.f.qc 4/24/00 09:32 Page 925
4. Windows 2000 creates the Emergency Repair Disk. After the Emergency Repair
Disk is successfully created, remove it from the computer’s A: drive and store it
in a safe place. Click OK in the Emergency Repair Diskette dialog box.
5. Close Backup.
In the following sections I’ll explain how to use Backup to restore user
data, System State data, and the Active Directory data store.
STEP BY STEP
8. In the Advanced Restore Options screen, select one or more of the appropriate
options:
Restore security
Restore Removable Storage database
Restore junction points, not the folders and file data they reference
Click Next.
9. In the Completing the Restore Wizard screen, click Finish.
10. If you are restoring from a file, the Enter Backup File Name dialog box appears. If
this dialog box appears, ensure that the name of the file that contains the backup
you want to restore from is displayed in the “Restore from backup file” text box.
You can browse for this file if you need to. Click OK.
11. Windows 2000 performs the restore. At the completion of the restore, a
Restore Progress dialog box is displayed. This dialog box displays various
restore statistics.
The Restore Progress dialog box also has an option that enables you to view a
report on the restore. To view this report, click Report. Close Notepad when you
finish viewing the report.
Click Close.
12. Close Backup.
CAUTION
Only restore System State data when you have to. Typically, this is a last-
resort measure that is only used when all other attempts to correct a
damaged Windows 2000 system configuration (including using Safe
Mode and the Emergency Repair Disk) have failed.
STEP BY STEP
5. The Completing the Restore Wizard screen appears. If you want to configure
advanced restore options, such as the location to which the System State
data should be restored, click Advanced. (For information on how to configure
Advanced options, see Steps 6 through 8 in the step-by-step section titled
“Restoring User Data by Using the Restore Wizard” earlier in this chapter.)
Otherwise, click Finish.
6. If you are restoring from a file, the “Enter Backup File Name” dialog box appears.
If this dialog box appears, ensure that the name of the file that contains the
backup you want to restore from is displayed in the “Restore from backup
file” text box. You can browse for this file if you need to. Click OK.
7. Windows 2000 performs the restore of System State data. At the completion of
the restore, a Restore Progress dialog box is displayed. This dialog box displays
various restore statistics.
The Restore Progress dialog box also has an option that enables you to view a
report on the restore. To view this report, click Report. Close Notepad when you
finish viewing the report.
Click Close.
8. A Backup warning dialog box appears, indicating that you must shut down and
restart your computer to complete the restore. Click Yes.
TIP
In order to restore System State data on a domain controller, which
includes the Active Directory data store, you’ll need the Administrator’s
password that was entered in the “Directory Services Restore Mode
Administrator Password” screen during the installation of Active Directory.
STEP BY STEP
1. Shut down and restart the domain controller. During the boot process, press F8.
2. On the Windows 2000 Advanced Options Menu, select Directory Services
Restore Mode and press Enter.
3. If you have more than one operating system installed on this computer, select
Microsoft Windows 2000 Server and press Enter.
4. Windows 2000 Server boots in Safe Mode – Directory Services Repair. Press
Ctrl+Alt+Delete.
4701-1 ch14.f.qc 4/24/00 09:32 Page 931
5. In the Log On to Windows dialog box, accept the default user name of administra-
tor. Enter the Administrator’s password that was entered in the “Directory Services
Restore Mode Administrator Password” screen during the installation of Active
Directory. (This is probably not the current Administrator’s password.) Click OK.
6. A Desktop warning message appears, indicating that Windows is running in Safe
Mode. Click OK.
7. Select Start ➪ Programs ➪ Accessories ➪ System Tools ➪ Backup.
8. In the Backup dialog box, click the Restore Wizard button.
9. The Restore Wizard starts. Click Next.
10. In the “What to Restore” screen, expand components in the left pane until System
State is displayed. Select the check box next to System State. Click Next.
11. The Completing the Restore Wizard screen appears. If you want to configure
advanced restore options, such as the location to which the System State data
should be restored, click Advanced. (For information on how to configure Advanced
options, see Steps 6 through 8 in the step-by-step section titled “Restoring User
Data by Using the Restore Wizard” earlier in this chapter.) Otherwise, click Finish.
12. If you are restoring from a file, the Enter Backup File Name dialog box appears. If
this dialog box appears, ensure that the name of the file that contains the backup
you want to restore from is displayed in the “Restore from backup file” text box.
You can browse for this file if you need to. Click OK.
13. Windows 2000 performs the restore of System State data, including Active
Directory. At the completion of the restore, a Restore Progress dialog box is
displayed. This dialog box displays various restore statistics, and contains an
option that enables you to view a report on the restore. To view this report, click
Report. Close Notepad when you finish viewing the report. Click Close.
14. A Backup warning dialog box appears, indicating that you must shut down and
restart your computer to complete the restore.
If you are performing a nonauthoritative restore of Active Directory, click
Yes. Reboot the domain controller normally.
If you are performing an authoritative restore of Active Directory, click
No, close Backup, and complete the steps listed in the next section.
CAUTION
Don’t reboot the domain controller now if you’re performing an authorita-
tive restore — if you do, you’ll have to do the restore all over again before
you can mark objects.
4701-1 ch14.f.qc 4/24/00 09:32 Page 932
STEP BY STEP
and press Enter. For example, to restore only an OU named London in a domain
named domain2.com, you would type
restore subtree OU=London,DC=domain2,DC=com
STEP BY STEP
1. Start the Windows 2000 computer. During the boot process, press F8.
2. On the Windows 2000 Advanced Options Menu, select Safe Mode (or Safe
Mode with Networking, or Safe Mode with Command Prompt) and press Enter.
3. If you have more than one operating system installed on this computer, select the
operating system you want to start in Safe Mode and press Enter.
4. Windows 2000 boots in Safe Mode. Press Ctrl+Alt+Delete.
5. In the Log On to Windows dialog box, enter your user name and password for
this computer.
TIP
If this computer is a domain controller, you must log on as Administrator
and enter the Administrator’s password that was entered in the “Directory
Services Restore Mode Administrator Password” screen during the
installation of Active Directory. (This is probably not the current
Administrator’s password.)
Click OK.
6. A Desktop warning message appears, indicating that Windows is running in Safe
Mode. Click OK.
7. The Windows 2000 desktop is displayed.
4701-1 ch14.f.qc 4/24/00 09:32 Page 935
Once you’ve started a Windows 2000 computer in Safe Mode, you can
use Windows 2000 applications and tools to diagnose and correct your
computer’s problem. For example, you can use Control Panel applications,
such as the Add/Remove Hardware application and Device Manager
(a component of the System application) to diagnose and resolve hardware,
hardware configuration, and device driver problems.You can also use the
various Troubleshooters in Help to aid you in diagnosing the problem.
TIP
Because only the minimum files and drivers are used when Windows
2000 boots in Safe Mode, don’t be surprised when many services and
devices don’t work. For example, in regular Safe Mode you won’t be able
to access any network resources.
CAUTION
Only experienced system administrators with extensive troubleshooting
and diagnostic skills should use the Recovery Console because it’s easy
to damage critical operating system files and because the Recovery
Console’s interface is not particularly user-friendly.
There are two ways you can start the Recovery Console.You can boot
the computer from the Windows 2000 compact disc and select Recovery
Console from the menu that appears; or, if the Recovery Console has been
installed in the computer’s boot menu, you can select the Recovery
Console option from the boot loader menu when the computer starts.
You need to log on as Administrator to use the Recovery Console.
STEP BY STEP
1. Place the Windows 2000 compact disc in your Windows 2000 computer’s
CD-ROM drive. Start the computer and boot from the compact disc.
2. If your compact disc contains an evaluation version of Windows 2000,
when prompted, press Enter to continue.
3. The Welcome to Setup screen appears. Press R.
4. In the Windows 2000 Repair Options screen, press C to start the Recovery
Console.
5. The Recovery Console starts. If you have more than one Windows 2000
installation on your computer, type in the number of the installation you want
to repair and press Enter.
6. When prompted, type the Administrator password (this is the password for the
Administrator on the local computer) and press Enter.
TIP
If this computer is a domain controller, type the Administrator’s password that
was entered in the “Directory Services Restore Mode Administrator
Password” screen during the installation of Active Directory and press Enter.
STEP BY STEP
1. Place your Windows 2000 compact disc into your computer’s CD-ROM drive.
Close the Microsoft Windows 2000 CD dialog box.
2. Select Start ➪ Programs ➪ Accessories ➪ Command Prompt.
3. In the Command Prompt dialog box, at the command prompt, type in the drive let-
ter of your CD-ROM drive followed by a colon (for example, D:) and press Enter.
4. At the command prompt, type cd \i386 and press Enter.
5. At the command prompt, type winnt32 /cmdcons and press Enter.
6. A Windows 2000 Setup dialog box appears, as shown in Figure 14-7.
Click Yes to install the Recovery Console as an option in the boot loader menu.
7. A Windows 2000 Setup wizard starts and installs the Recovery Console. When
the installation is complete, a Microsoft Windows 2000 [Server or Professional]
Setup dialog box appears, notifying that the Recovery Console has been success-
fully installed. Click OK.
8. At the command prompt, type exit and press Enter.
TIP
You need to create the Emergency Repair Disk on your Windows 2000
computer when it’s functioning properly. If you don’t think about making
an Emergency Repair Disk before you have a problem, you’ll be out of
luck, because you can’t create one on a computer that won’t start.
You should only use an Emergency Repair Disk to repair the computer
on which it was created. If you attempt to use an Emergency Repair Disk
to repair another computer, changes to the computer’s configuration and
startup files (AUTOEXEC.NT and CONFIG.NT) may occur. In addition,
the disk may not contain the information needed to successfully repair
the computer.
4701-1 ch14.f.qc 4/24/00 09:32 Page 939
STEP BY STEP
1. Place the Windows 2000 compact disc in your Windows 2000 computer’s
CD-ROM drive. Start the computer and boot from the compact disc.
2. If your compact disc contains an evaluation version of Windows 2000, when
prompted, press Enter to continue.
3. The Welcome to Setup screen appears. Press R.
4. In the Windows 2000 Repair Options screen, press R to start the emergency
repair process.
5. In the Windows 2000 Professional Setup screen, select from one of two options:
Manual Repair: To choose from a list of repair options, press M.
Fast Repair: To perform all repair options, press F and skip to Step 7.
6. In the next screen, select one or more of the following repair tasks:
Inspect startup environment
Verify Windows 2000 system files
Inspect boot sector
All three tasks are selected by default. When you finished making your selections,
highlight “Continue (perform selected tasks)” and press Enter.
7. When prompted, insert your Windows 2000 Emergency Repair Disk into drive A:
and press Enter.
8. Windows 2000 performs the emergency repair process and replaces any dam-
aged system files that it detects. When prompted, remove your Emergency Repair
Disk from drive A:. Windows 2000 restarts your computer.
After you’ve performed the emergency repair process and restarted your
Windows 2000 computer, you should reapply any Windows 2000 Service
Packs that were previously installed on this computer.
CAUTION
If you use Removable Storage as a part of your backup strategy, be sure
to test it thoroughly to ensure that it is working correctly, and that you are
getting the backups you want.
4701-1 ch14.f.qc 4/24/00 09:32 Page 941
■ Removable Storage is a Windows 2000 management tool you can use to man-
age, monitor, and configure removable media associated with your Windows
2000 computer.
4701-1 ch14.f.qc 4/24/00 09:32 Page 943
943
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about backup and recovery, and to help you prepare for the
Professional, Server, and Directory Services exams:
■ Assessment questions: These questions test your knowledge of
the backup and recovery topics covered in this chapter.You’ll find
the answers to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge you
to apply your understanding of the material to solve a hypothetical
problem. In this chapter’s scenarios, you are asked to analyze several
situations involving backup and recovery-related topics.You don’t
need to be at a computer to do scenarios.Answers to this chapter’s
scenarios are presented at the end of this chapter.
■ Lab Exercises: These exercises are hands-on practice activities
that you perform on a computer.The lab in this chapter gives you
an opportunity to practice numerous backup and recovery tasks.
Assessment Questions
1. You want to create an Emergency Repair Disk for your Windows
2000 computer.Which tool should you use?
A. Windows 2000 Setup
B. Backup
C. System
D. ntdsutil.exe
2. You perform a normal backup for your company once a week. In
addition, you want to perform a backup of data each day in between
normal backups.You want to minimize the amount of time it takes
to perform these backups.Which backup type should you use on
the days in between normal backups?
A. Normal
B. Incremental
4701-1 ch14.f.qc 4/24/00 09:32 Page 944
944
C. Differential
D. Copy
3. Which Windows 2000 tool should you use to perform a restore of
user data on a domain controller?
A. Backup
B. Active Directory Users and Computers
C. Computer Management
D. Disk Management
4. Your Windows 2000 computer won’t boot.Which tools can you use
to attempt to recover from the system failure? (Choose all that apply.)
A. Backup
B. Recovery Console
C. Emergency Repair Disk
D. Safe Mode
5. You want to monitor and configure your organization’s removable
media, including a tape library and optical discs.Which Windows
2000 tool can you use to do this?
A. Remote Storage
B. Sounds and Multimedia
C. Imaging
D. Removable Storage
6. You recently discovered that another administrator on your network
accidentally deleted an OU and all of its users.As a result of replication,
the Active Directory data store on all of your network’s domain con-
trollers is damaged.You want to restore Active Directory so that the
restored Active Directory objects will replace the corresponding Active
Directory entries on other domain controllers on your network when
replication of Active Directory takes place.What kind of restore should
you perform on the domain controller?
A. An authoritative restore
B. A nonauthoritative restore
C. A partial restore of user data
D. A full restore of user data
4701-1 ch14.f.qc 4/24/00 09:32 Page 945
945
7. You want to add the Recovery Console to the boot loader menu
of your Windows 2000 computer.You place your Windows 2000
compact disc into your CD-ROM drive and start a command
prompt.At the command prompt, you change to the drive letter
of the CD-ROM drive, and then change directories to the i386
folder.What should you type at the command prompt?
A. winnt32 /rcvcons
B. winnt /rcvcons
C. winnt32 /cmdcons
D. winnt /cmdcons
8. You are performing an authoritative restore of Active Directory.After
performing a restore of System State data on your domain controller,
but before rebooting the computer, you start a command prompt.
What should you type at the command prompt?
A. authoritative restore
B. restore database
C. restore subtree
D. ntdsutil
Scenarios
I introduced a lot of backup and recovery-related topics in this chapter,
and here’s your chance to sink your teeth into a few situations that you
might encounter in real life. For each of the scenarios listed, consider the
given facts and answer the questions that follow.
1. When you arrived at the office this morning, you found your
Windows 2000 Server computer locked up, and you were unable to
reboot it successfully.
a. What are three tools you can use to attempt to recover from the
system failure?
b. If none of these attempts works, what should you do next?
4701-1 ch14.f.qc 4/24/00 09:32 Page 946
946
including security
Monitor all removable media associated with your company’s
Lab Exercises
Lab 14-1 Backup and Recovery
Professional
Server
EXAM Directory Services
MATERIAL
947
948
1. Shut down and restart your Windows 2000 Server computer (which is
configured as a domain controller). During the boot process, press F8.
2. On the Windows 2000 Advanced Options Menu, select Directory
Services Restore Mode and press Enter.
3. Select Microsoft Windows 2000 Server from the boot loader menu
and press Enter.
4. Windows 2000 Server boots in Safe Mode – Directory Services
Repair.When prompted, press Ctrl+Alt+Delete.
5. In the Log On to Windows dialog box, accept the default user name
of administrator. Enter a password of password. Click OK.
6. A Desktop warning message appears, indicating that Windows is
running in Safe Mode. Click OK.
7. Select Start ➪ Programs ➪ Accessories ➪ System Tools ➪ Backup.
8. In the Backup dialog box, click the Restore Wizard button.
9. The Restore Wizard starts. Click Next.
10. In the What to Restore screen, click the + next to File. Click the +
next to “Media created date.” Select the check boxes next to C: and
System State. Click Next.
11. The Completing the Restore Wizard screen appears. Click Advanced.
12. In the Where to Restore screen, accept the default selection of
Original location and click next.
13. In the How to Restore screen, select the “Always replace the file on
disk” option and click Next.
14. In the Advanced Restore Options screen, accept the default selections
and click Next.
15. In the Completing the Restore Wizard screen, click Finish.
16. In the Enter Backup File Name dialog box, ensure that C:\Backup.
bkf is displayed in the “Restore from backup file” text box. Click OK.
4701-1 ch14.f.qc 4/24/00 09:32 Page 949
949
17. Windows 2000 performs the restore of the Apps folder and System
State data, including Active Directory.When the Restore Progress
dialog box indicates that the restore is complete, click Report to
view the restore report. Close Notepad when you finish viewing
the report. Click Close.
18. When a Backup warning dialog box appears, click No, and
close Backup.
CAUTION
Don’t click Yes — If you do, you’ll have to re-perform Part 2 of this lab up
to this point.
950
951
952
Assessment Questions
1. B. Of the choices presented, only the Backup program can be used
to create an Emergency Repair Disk.You can boot your computer to
the Windows 2000 compact disc and use the Windows 2000 Setup
program to use the Emergency Repair Disk, but you can’t create it
by using this program.
2. B. In terms of the time it takes to perform backups, the incremental
backup will take the least amount of time because it is not a cumulative
backup, like the differential backup.
4701-1 ch14.f.qc 4/24/00 09:32 Page 953
953
Scenarios
1. You can use Safe Mode, the Recovery Console, and the Emergency
Repair Disk to attempt to recover from the system failure. If none of
these techniques work, you could also try restoring System State data
on the Windows 2000 Server computer.
2. There are several techniques you could consider when you want to
manage and optimize the availability of your network’s data. For
example, you can use NTFS and permissions to restrict access to
files and folders, and use mirrored volumes and RAID-5 volumes to
provide fault tolerance.Another important part of your overall fault
tolerance plan is performing regular backups of data.
4701-1 ch14.f.qc 4/24/00 09:33 Page 954
954
Professional
Server
EXAM
MATERIAL Network
EXAM OBJECTIVES
C HAP TE R
15
Creating and Configuring
Network and Dial-up
Connections
959
4701-1 ch15.f.qc 4/24/00 09:38 Page 960
Chapter Pre-Test
1. What does Windows 2000 automatically create for each network
adapter that is installed (and detected) in a Windows 2000
computer?
2. What is a VPN connection?
3. What must you have installed in your Windows 2000 computer
before you can create a dial-up connection?
4. In what situation might you want to use Internet Connection
Sharing?
5. What are bindings and provider order?
6. In addition to installing network protocols, you may also need
to install and configure additional network clients and services
to fully support the connections on your Windows 2000 computer,
and to support _______________ with other ___________
___________.
7. What function do network clients perform?
8. What function do services perform?
4701-1 ch15.f.qc 4/24/00 09:38 Page 961
Creating Connections
Connections provide your Windows 2000 computer with access to a
network or another computer, and also provide other computers on
the network with access to your computer. A connection includes all of
the hardware and software required to communicate on the network that
your computer is connected to. Windows 2000 supports several different
kinds of connections:
■ Local area connections: These are connections between a
computer and a local area network that require the computer
to have a network adapter installed.
■ Dial-up connections: These are connections between two
computers that use modems for communication.
■ Direct connections: These are connections between two
computers that involve the use of a cable or infrared port.
■ Virtual private network (VPN) connections: These are
private, encrypted connections between two computers that
can already communicate with each other by using TCP/IP.
■ Incoming connections: These are inbound connections to a
computer that can use a modem, cable, or infrared port.
The Network and Dial-up Connections folder in Control Panel is
used to create, configure, and manage all of these types of connections.
EXAM TIP
The Professional exam has several objectives on using these various
types of connections. Make sure you fully understand how to create and
use these connections to connect to other computers and networks.
Installing Modems
You can use either the Phone and Modem Options or the Add/Remove
Hardware applications in Control Panel to install a modem.You must be a
member of the Administrators group to add and configure modems.
The process of installing a modem is quite similar whether you use
Add/Remove Hardware or Phone and Modem Options. Using Phone and
Modem Options is slightly faster because it saves you from having to com-
plete several of the beginning screens in the Add/Remove Hardware Wizard.
CROSS-REFERENCE
If you decide to use Add/Remove Hardware to install your modem, you
can find specific instructions for using this application in the
“Add/Remove Hardware” section in Chapter 5.
4701-1 ch15.f.qc 4/24/00 09:38 Page 963
STEP BY STEP
5. The Add/Remove Hardware Wizard starts and displays the Install New Modem
screen. If you want Windows 2000 to automatically detect your modem, ensure
that the check box next to “Don’t detect my modem, I will select it from a list”
is cleared. If you want to manually select your modem, select this check box.
Click Next.
6. Follow the instructions presented on-screen to complete the installation of
your modem.
Configuring Modems
Once you’ve installed a modem you can use the Phone and Modem
Options application in Control Panel to configure your modem’s properties.
4701-1 ch15.f.qc 4/24/00 09:38 Page 964
STEP BY STEP
There are three primary configurations you can make on the General tab:
Speaker volume: You can move the slider to adjust the modem’s speaker
volume to the desired level. Some modems only permit an on or off setting.
Maximum Port Speed: In this drop-down list box, you can select a
maximum port speed for this modem. The possible range is from 300 bps
to 115200 bps. The default setting of 115200 is appropriate for most
56 Kbps modems.
Dial Control — Wait for tone before dialing: If you select this check box,
the modem will wait for a dial tone before it dials. This check box is selected
by default.
Configure the appropriate options on this tab. Click the Diagnostics tab.
6. On the Diagnostics tab, select the check box next to “Record a Log” if you want
Windows 2000 to record a log file of modem connection activity. This log file,
though not necessary for normal modem operations, can be extremely useful for
troubleshooting modem connection problems.
Later, when you want to view this log file, return to this tab, and click the
“View log” command button, which brings up the log as a Notepad text file.
Click the Advanced tab.
7. On the Advanced tab, you can specify a custom modem initialization string in
the “Extra initialization commands” text box. This is an advanced setting that is
not required for most modem applications. You can also configure advanced
port settings on the Advanced tab, and change default settings for call and data
connection preferences. Again, these settings do not require configuration for
most situations. Make the appropriate configurations on this tab and click OK.
8. In the Phone And Modem Options dialog box, click OK. Close Control Panel.
STEP BY STEP
6. In the “Setting up your Internet connection” screen, select one of the two
following options:
I connect through a phone line and a modem
I connect through a local area network (LAN)
(I selected the “I connect through a phone line and a modem” option.) Click Next.
7. In the Choose Modem screen, select the modem you want to use for this dial-up
connection from the drop-down list box. Click Next.
8. In the “Step 1 of 3: Internet account connection information” screen, enter your
area code and telephone number of your Internet service provider (ISP) in the text
boxes provided. Select the country you are located in from the “Country/region
name and code” drop-down list box.
If your ISP instructs you to configure a manual logon, a logon script, to use the
SLIP or C-SLIP connection protocols, or if you need to manually configure the
static IP address your computer will use for this connection, click Advanced,
make the necessary configurations specified by your ISP, and click OK.
Click Next.
9. In the “Step 2 of 3: Internet account logon information” screen, enter the user
name and password to log on to your ISP. Click Next.
10. In the “Step 3 of 3: Configuring your computer” screen, either accept the default
name for this connection, or type in a new one. Click Next.
11. In the Set Up Your Internet Mail Account screen, select the Yes option to set up
an Internet mail account now.
If you don’t want to set up an Internet mail account now, select No and skip to
Step 16.
Click Next.
12. In the Your Name screen, type your name, as you want it to appear, in e-mail
messages that you send. Click Next.
13. In the Internet E-mail Address screen, type your e-mail address, and click Next.
14. In the E-mail Server Names screen, select your incoming mail server type from the
drop-down list box. Then type in the FQDN of the incoming mail server in the text
box provided. Finally, type in the FQDN of your outgoing mail server in the text box
provided. Click Next.
15. In the Internet Mail Logon screen, type in the account name and password you
will use to send and receive e-mail through your ISP. (Your ISP provides you with
this information.) Click Next.
16. In the Completing the Internet Connection Wizard screen, click Finish.
17. In the “Web page unavailable while offline” dialog box that appears, click Connect
to connect to the Internet.
4701-1 ch15.f.qc 4/24/00 09:39 Page 968
18. Windows 2000 attempts to connect to the Internet. If your connection is config-
ured correctly, a Connection Complete dialog box is displayed. Click OK. (If error
messages are displayed, you may need to reconfigure this connection.)
19. To disconnect the connection, right-click the connection in the Network and
Dial-up Connections folder, and select Disconnect from the menu that
appears. Or, right-click the network connection icon in the taskbar (near the
clock) and select Disconnect from the menu that appears.
STEP BY STEP
6. In the Phone Number to Dial screen, type in the area code and phone number of
the remote access server you want to connect to in the text boxes provided. Then
select the country you are dialing from in the “Country/region code” drop-down list
box. Click Next.
7. In the Connection Availability screen, select whether this connection will be
available to all users of this computer, or only available to the currently logged
on user. Click Next.
8. In the Internet Connection Sharing screen, you can select a check box to
enable Internet Connection Sharing for this connection. However, most dial-up
connections to remote access servers should not be configured to use Internet
Connection Sharing. Click Next.
9. In the Completing the Network Connection Wizard screen, either accept the
default name for this connection or type in a new name. If desired, select the
check box to add a shortcut to your desktop for this connection. Click Finish.
10. The Connect dialog box for your newly created dial-up connection appears.
If you want to connect to the remote access server now to test your connection,
enter a user name and password for the remote access server, and click Dial.
Windows 2000 connects to the remote access server and displays the
Connection Complete dialog box. Click OK.
If you don’t want to connect now, click Cancel.
TIP
You can’t configure a Windows 2000 Server computer that is a member
of a domain to accept incoming connections by using the Network
Connection Wizard. If you need to make this configuration, you must use
the Routing and Remote Access administrative tool.
There are two ways you can configure a computer to accept incoming
connections. You can select the “Accept incoming connections” option
while using the Network Connection Wizard. Or, you can select the
“Connect directly to another computer” option, and configure this
computer to play the role of “Host” for this connection. I’ll explain how to
use both of these methods in the next two sets of steps.
STEP BY STEP
TIP
If you select Host, this connection will be configured as an incoming con-
nection. (The result will be the same as if you had selected the “Accept
incoming connections” option in Step 4.) If you select Guest, this con-
nection will be configured as a direct connection.
Click Next.
4701-1 ch15.f.qc 4/24/00 09:39 Page 972
6. In the Connection Device (or Select a Device) screen, select the device that
will be used for the direct connection from the drop-down list box. Options may
include: Communications Port (COM 1, COM2, and so on), Direct Parallel
(LPT1, LPT2, or LPT3), and Infrared Port (IRDA1-0). Click Next.
7. If you selected the Host option in Step 5, in the Allowed Users screen,
select the check box next to each user you want to permit to use the incoming
connection to this computer. Click Next.
Or, if you selected the Guest option in Step 5, in the Connection Availability
screen, select whether this connection will be available to all users of this computer,
or only available to the currently logged on user. Click Next.
8. In the Completing the Network Connection Wizard screen, either accept the
default name for the connection or type in a new one. Click Finish.
STEP BY STEP
10. If you selected the “Automatically dial this initial connection” option in Step 5,
the Initial Connection dialog box for your newly created VPN connection appears.
If you want to test your VPN connection, click Yes to connect to the Internet
using the dial-up connection to the Internet you selected in Step 5, and follow
the instructions presented on-screen. If you don’t want to test your VPN
connection now, click No.
If you selected the “Do not dial the initial connection” option in Step 5, the Connect
dialog box for the VPN connection appears, prompting you to enter the user name
and password for the computer you’re connecting to. If you want to test your VPN
connection, enter this information and click Connect. If you don’t want to test your
VPN connection now, click Cancel.
will apply to all newly created connections, I recommend you use either
Device Manager or the Phone and Modem Options application.
STEP BY STEP
There are numerous items you can configure in this dialog box. Remember that
the configurations you make in this dialog box apply to this modem only as it is
used by this specific dial-up connection.
Maximum speed (bps): In this drop-down list box you can select the
maximum speed the modem will use for this connection. If you don’t
configure this option, Windows 2000 automatically selects a maximum
speed based on the make and model of modem installed in your computer.
Modem protocol: This configuration is grayed out and not available unless
the manufacturer of your modem supplies you with a custom installation
(.inf) file.
The Hardware features section includes these options:
Enable hardware flow control: Selecting this check box causes Windows
2000 to use the RTS and CTS hardware signals to control the flow of data to
and from the modem. This option should be used with high-speed modems,
or when modem compression is enabled. This option is selected by default.
Enable modem error control: Selecting this check box causes Windows
2000 to negotiate an error correction method with the remote modem (the
modem you are dialing in to). Error correction detects and corrects data
corruption during transmission over analog phone lines. If no error correction
method can be agreed upon, error correction is not used. This option is
selected by default.
4701-1 ch15.f.qc 4/24/00 09:39 Page 977
In addition to configuring a modem, you can also use the General tab to
configure a phone number (and alternates), whether or not to use dialing
rules, and whether to show a connection icon in the taskbar when the
connection is active.
To configure a phone number, enter the area code and phone number in
the text boxes provided. If you want to configure alternate phone numbers,
click Alternates and follow the directions presented on-screen.
If you want to use dialing rules, select the check box next to “Use dialing
rules” and then click Rules.Windows 2000 displays the Dialing Rules tab in
4701-1 ch15.f.qc 4/24/00 09:39 Page 978
the Phone and Modem Options application. Follow the instructions pre-
sented on-screen to configure your dialing rules.
As Figure 15-7 shows, there are numerous dialing and redialing options
in this dialog box. In the Dialing options section are the following options:
■ Display progress while connecting: If you select this check
box,Windows 2000 displays a dialog box during the connection
attempt that enables you to view the activity taking place during
the process, such as “Dialing,”“Verifying user name and password,”
“Registering your computer on the network,” and so on.This
option is selected by default.
■ Prompt for name and password, certificate, etc.: Selecting this
check box causes Windows 2000 to display a dialog box that prompts
you to enter a user name and password before the connection is
4701-1 ch15.f.qc 4/24/00 09:39 Page 979
dialed.When this dialog box is displayed and you enter your user
name and password, you can select an option to have Windows
2000 save (remember) your password for this connection. Once
you’ve selected the save password option, you can then clear the
check box for “Prompt for name and password, certificate, etc.” and
Windows 2000 will always use your saved user name and password
(without prompting you) for this connection.This option is selected
by default.
CAUTION
Having Windows 2000 save (remember) your user name and password
can save you time, but it can also be a potential breach of security,
because anyone using your computer can connect to the remote server
without having to provide a user name and password. If security is
important to you, I recommend that you don’t select this option.
TIP
Configuring a long “Idle time before hanging up” setting is no guarantee
that the connection will not be dropped by the remote server, which may
have a shorter idle time-out setting.
EXAM TIP
The Professional, Server, and Network exams each have an objective on
Internet Connection Sharing. Be sure you know when Internet
Connection Sharing should and should not be used, how to enable
Internet Connection Sharing, and which connection should be shared.
CAUTION
You should only enable Internet Connection Sharing on one computer on
your network. If you enable Internet Connection Sharing on more than
one computer, you may experience serious TCP/IP connectivity prob-
lems on your network.
STEP BY STEP
Select the check box next to “Enable Internet Connection Sharing for this
connection.” Once this check box is selected, the “Enable on demand dialing”
check box is also automatically selected if the connection being configured is
a dial-up connection.
If you want to make a specific Internet application (such as a game) available
to users on your network, or, if another computer on your network runs a service
(such as a Web server or an FTP server) that needs to be accessed by users who
connect to your network by using this shared Internet connection, click Settings
and add and configure the application or service. When you finish configuring
applications and services, click OK.
Click OK.
4. A Network and Dial-up Connections confirmation dialog box appears. Click Yes to
enable Internet Connection Sharing.
4701-1 ch15.f.qc 4/24/00 09:39 Page 983
In the next sections I’ll show you how to install network protocols
and configure network bindings, as well as provide you with some tips for
troubleshooting network protocols.
STEP BY STEP
TIP
Only the network protocols that are not already installed on your com-
puter appear in this dialog box. So, depending on your Windows 2000
computer’s configuration, your dialog box may differ from the one
presented here.
Highlight the protocol you want to add. If the protocol you want to add is not dis-
played, you can click Have Disk and insert a floppy disk containing the protocol
you want to add, and then follow the instructions presented on-screen. Click OK.
4701-1 ch15.f.qc 4/24/00 09:39 Page 987
6. Windows 2000 installs the protocol you selected, and returns you to the Local
Area Connection Properties dialog box. The installation process may take a
minute or so. Click Close.
STEP BY STEP
CONFIGURING PROTOCOLS
EXAM TIP
Before you take the Server exam, I recommend you memorize the
information in Tables 15-2 and 15-3. You should know which clients and
services can be installed on Professional computers, and which clients
and services are available for Server computers only. You should also
know what each of these clients and services does.
4701-1 ch15.f.qc 4/24/00 09:39 Page 989
Continued
4701-1 ch15.f.qc 4/24/00 09:39 Page 990
Server/
Advanced
Service Professional Server Description
Continued
4701-1 ch15.f.qc 4/24/00 09:39 Page 992
Server/
Advanced
Service Professional Server Description
Continued
4701-1 ch15.f.qc 4/24/00 09:39 Page 994
CAUTION
Windows 2000 requires you to reboot your computer after the installa-
tion of some clients and services. Because of this fact, I recommend that
you install clients and services at a time when you are able to reboot the
server without disrupting service to users of client computers.
STEP BY STEP
TIP
Only the network clients that are not already installed on your computer
appear in this dialog box.
6. Windows 2000 installs the client you selected. When prompted, click Yes to shut
down and restart your computer to complete the installation.
permissions to the folder on the NetWare server that is being shared with
Windows 2000 client computers.The administrator of the NetWare server
must create this group — it does not exist by default. If the NTGATEWAY
group does not exist on the NetWare server, or if the user account you
supply to GSNW for accessing the NetWare server is not a member of the
NTGATEWAY group, this feature will not work correctly.
EXAM TIP
This particular configuration is very specific and detail oriented, and most
people I know can’t remember exactly how to configure it off the top of
their heads. For these reasons, this is a favorite topic of exam authors.
Memorize this information before you take the exams.
Installing Services
Installing services is fairly straightforward. The hardest thing about it is
determining which program to use to perform the installation. I’ll try to
boil it down:
■ You can use the Network and Dial-up Connections folder to
install the QoS Packet Scheduler service and the SAP Agent service.
Just like protocols and clients, these services are installed by modify-
ing the properties of one of the computer’s connections.
■ You can install all other services by using the Add/Remove
Programs application.Alternatively, some of these services can
be installed by using the Optional Networking Components
option in the Advanced menu in the Network and Dial-up
Connections folder.
In the steps that follow, I’ll explain how to install a service by modifying
the properties of a connection in the Network and Dial-up
Connections folder. For detailed steps on installing a service by using the
Add/Remove Programs application, see the steps titled “Using
Add/Remove Programs to Add/Remove Optional Windows 2000
Components” in the “Add/Remove Programs” section in Chapter 5.
4701-1 ch15.f.qc 4/24/00 09:39 Page 997
STEP BY STEP
TIP
Only the services that are not already installed on your computer appear
in this dialog box.
6. Windows 2000 installs the service you selected, and returns you to the Local
Area Connection Properties dialog box. Click Close.
STEP BY STEP
TIP
If you have more than one local area connection on your computer, you
can configure the order the connections will be used in this box.
Highlight the connection, then click either the up arrow or the down
arrow button to move the connection up or down in the list.
4. To configure bindings, in the Bindings for Local Area Connection box, highlight
the protocol for which you want to change the binding order. Then, to the right of
this box, click either the up arrow or the down arrow button to move the protocol
up or down in the list.
5. To configure provider order, click the Provider Order tab.
6. On the Provider Order tab, in the “Network providers” box, highlight the provider
you want to reorder. Then, to the right of this box, click either the up arrow or the
down arrow button to move the provider up or down in the list.
7. When you finish configuring bindings and provider order, click OK.
Configuring Services
After you install services on your Windows 2000 computer, you may need
to configure them. For example, you may need to start or stop a service,
configure the startup type of a service, or configure a service to log on by
using a specific user account, or to enable or disable a specific service
within a hardware profile.
You can perform all of these service configuration tasks, on both the
local computer as well as remote computers, by using the Services tool in
Computer Management.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1003
STEP BY STEP
1. On the desktop, right-click My Computer, and select Manage from the menu that
appears. Windows 2000 starts the Computer Management MMC.
2. If you want to manage services on the local computer, skip to Step 4.
If you want to manage services on a remote computer, in the left pane of the
Computer Management dialog box, right-click Computer Management (Local)
and select “Connect to another computer” from the menu that appears.
3. In the Select Computer dialog box, double-click the name of the computer to
which you want to connect.
4. In the left pane of the Computer Management dialog box, click the + next to
Services and Applications. Highlight Services.
5. In the right pane, a list of all of the services installed on the Windows 2000
computer is displayed, as shown in Figure 15-14.
In the next several sections I’ll explain how to perform numerous service
configuration tasks by using the Services tool.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1004
STEP BY STEP
1. Start the Services tool (see the steps on “Starting the Services Tool “ in the
previous section).
2. In the right pane, right-click the specific service you want to start, stop, pause,
resume, or restart. Then select Start, Stop, Pause, Resume, or Restart from the
menu that appears.
TIP
Depending on the service you select and the current status of this
service, not all actions will be available in this menu.
Configuring the Startup Type of a Service You can also use the Services
tool to configure the startup type of a service. There are three possible
startup types:
■ Automatic: If you select automatic,Windows 2000 starts the service
automatically every time the computer is booted.
■ Manual: If you choose manual, a user or an application must start
the service.
■ Disabled: If you select disabled, the service can’t be started by a
user or application.
For example, suppose you want to enable remote users to establish
Telnet command-line sessions with your Windows 2000 Server computer.
Because the default startup type of the Telnet service is Manual, you decide
to change its startup type to Automatic. I’ll show you how to perform this
task in the steps that follow.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1005
CAUTION
Exercise caution when using the Services tool. Changing the startup
type of a service or disabling a service can render your computer unable
to access (or provide) network resources.
STEP BY STEP
1. Start the Services tool (see the steps on “Starting the Services Tool” earlier in
this chapter).
2. In the right pane, right-click the specific service for which you want to change the
startup type, and then select Properties from the menu that appears. (Or, you can
double-click the service.)
3. The service’s Properties dialog box appears, as shown in Figure 15-15. Notice
the information displayed about the service, including its startup type and status.
In the “Startup type” drop-down list box, select the startup type you want to
assign to this service. Click OK.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1006
TIP
If you change the startup type of a service to Automatic, the service
doesn’t automatically start until the next time you boot the computer. If
you want the service to start now ( without rebooting the computer),
right-click the service, and select Start from the menu that appears.
STEP BY STEP
Figure 15-16 shows the Properties dialog box of a service that has been config-
ured to log on using a user account. Notice that in this case the FTP Publishing
Service has been configured to log on by using the Guest account.
6. Windows 2000 displays a message indicating that the selected user account
has been granted the Log On As A Service right. Click OK.
7. Another message is displayed, indicating that the new logon name will not take
effect until you stop and restart the service. Click OK.
8. In the right pane, right-click the service you have just configured, and select
Restart from the menu that appears. Selecting Restart stops and immediately
restarts the service.
9. Close Computer Management.
Enabling or Disabling a Service within a Hardware Profile You can use the
Services tool to enable or disable a service within a hardware profile.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1008
CROSS-REFERENCE
I explained how to use the Services tool to perform this task when I
covered hardware profiles in the “System” section in Chapter 5.
Configuring Recovery Options for a Service The Services tool has a useful
new feature that enables you to configure, in advance of a service failure,
the recovery actions that Windows 2000 will take when the service fails.
You can configure it to take one of four specific actions on the service’s
first, second, and subsequent failures:
■ Take No Action: Selecting this option causes Windows 2000
to do the obvious — nothing.This is the default setting for all
service failures.
■ Restart the Service: Selecting this option causes Windows 2000
to attempt to restart a service that has failed.
■ Run a File: Selecting this option causes Windows 2000 to
run a specified file (such as a batch file or a script file) when the
service fails.
■ Reboot the Computer: Selecting this option causes Windows
2000 to restart the computer when the service fails.This is probably
not the option of choice in most situations.
STEP BY STEP
1. Start the Services tool (see the steps on “Starting the Services Tool” earlier in
this chapter).
2. In the right pane, right-click the specific service you want to configure recovery
options for, and then select Properties from the menu that appears.
3. In the service’s Properties dialog box, click the Recovery tab.
4. On the Recovery tab, select the options you want Windows 2000 to take if this
service fails. Select an option for the service’s first, second, and subsequent
failures. Figure 15-17 shows the World Wide Web Publishing Service after
its recovery options have been configured.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1009
Notice that you can configure the number of days after which the service’s fail
count will be reset to 0. Also note that the service will be restarted, by default, after
1 minute. Change either or both of these two configuration settings, as needed.
If you select the Run a File option for any service failure, you must specify the
complete path to the file that will be run in the File text box. If you don’t know the
complete path to the file, you can click Browse to find it. Also specify any com-
mand line parameters for this file in the “Command line parameters” text box.
If you select the Reboot the Computer option for any service failure, you can
click the Restart Computer Options button (grayed out in Figure 15-17) to set
the number of minutes that Windows 2000 will wait, after the service failure, to
restart the computer. You can also configure a message that will be sent to all
connected computers prior to restarting the computer.
Click OK when you are finished configuring this tab.
5. Close Computer Management.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1010
STEP BY STEP
1. Start the Services tool (see the steps on “Starting the Services Tool” earlier in
this chapter).
2. In the right pane, right-click the specific service for which you want to view
service dependencies, and then select Properties from the menu that appears.
3. In the service’s Properties dialog box, click the Dependencies tab.
4. The Dependencies tab appears, as shown in Figure 15-19. Notice the list of
services that the Messenger service is dependent on. Click OK.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1011
There are two configurable options in this dialog box, and both should
be configured to enable the Windows 2000 computer to send traps.
■ Community name: A community name is like an SNMP pass-
word. If your computer doesn’t have the appropriate community
name, the computer it is sending traps to will not accept the traps.
In this text box, type in the appropriate community name and click
Add to list. public is the most commonly used community name.
You can add multiple community names if you are sending traps to
multiple computers that each require a different community name.
■ Trap destinations: This box displays the list of all computers
to which trap messages will be sent.To add a computer to this
list (which is empty by default) click Add, and then type in the
computer’s name in the SNMP Service Configuration dialog
box that appears.You can add multiple trap destinations.
There are several options you can configure on this tab.The Security
options on this tab are
■ Typical (recommended settings): This security setting option,
which is selected by default, is appropriate for most situations.
If you select this option, you can define security settings by
configuring three common suboptions:
Validate my identify as follows: This configuration determines
TIP
Only dial-up connections have an option to configure interactive logon
and scripting — direct and VPN connections do not.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1015
TIP
You can also create a shortcut to a connection by dragging the
connection from the Network and Dial-up Connections folder
and dropping it on your desktop.
■ You may need to install and configure additional network clients, services, and
protocols to fully support the connections on your Windows 2000 computer,
and to support interoperability with other operating systems.
■ When you install a network client, service, or protocol, it is generally available
to all connections on your computer, even if you accomplish the installation
task by configuring the properties of a specific connection.
■ All network clients and network protocols can be installed by using the
Network and Dial-up Connections folder. You can also use this
folder to install the QoS Packet Scheduler service and the SAP Agent service.
All other services can be installed by using Add/Remove Programs.
■ Bindings specify three specific properties of a local area connection: which
installed client(s) or service(s) the connection uses, which protocol(s) are
used by (or bound to) each selected client or service, and the order in which
selected protocols are used by each associated client or service.
■ You can use the Services tool in Computer Management to perform configuration
tasks, including: starting and stopping a service, configuring a service’s startup
type, configuring a service to log on by using a user account, and so on.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1018
1018
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about creating and configuring connections on a Windows
2000 computer, and to help you prepare for the Professional, Server, and
Network exams:
■ Assessment Questions: These questions test your knowledge
of the connection topics covered in this chapter.You’ll find the
answers to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge you
to apply your understanding of the material to solve a hypothetical
problem. In this chapter’s scenario, you are asked to troubleshoot
some common connection problems.You don’t need to be at a
computer to do scenarios.Answers to this chapter’s scenarios are
presented at the end of this chapter.
■ Lab Exercise: These exercises are hands-on practice activities that
you perform on a computer.The lab in this chapter gives you an
opportunity to practice creating and configuring connections on
your Windows 2000 computer.
Assessment Questions
1. You want to create a virtual private network (VPN) connection on a
Windows 2000 computer.What tool should you use?
A. Phone and Modem Options
B. Wireless Link
C. Internet Connection Wizard
D. Network and Dial-up Connections folder
2. You want to enable Internet Connection Sharing on a Windows
2000 computer.The computer has several existing connections. On
which connection should you enable Internet Connection Sharing?
A. VPN Connection
B. Local Area Connection
4701-1 ch15.f.qc 4/24/00 09:39 Page 1019
1019
1020
Scenarios
Troubleshooting connection problems on a Windows 2000 computer
requires attention to detail and can be quite painstaking. For each of the
following problems, consider the facts given and answer the questions
that follow.
4701-1 ch15.f.qc 4/24/00 09:39 Page 1021
1021
1. Your Windows 2000 computer has two local area connections. One
local area connection is connected to your home network, and the
other is connected to a cable modem for Internet access.You recently
enabled Internet Connection Sharing for one of these connections,
but users on your home network report that they are unable to access
the Internet.
a. What is the most likely cause of this problem?
b. What should you do to resolve the problem?
2. You recently installed and configured TCP/IP on your Windows 2000
computer. However, your computer is now unable to communicate
with all other computers on your network that use TCP/IP.
a. What is the most likely cause of this problem?
b. What should you do to resolve the problem?
Lab Exercise
Lab 15-1 Creating and Configuring Connections
Professional
Server
EXAM Network
MATERIAL
1022
TIP
You’ll be installing device drivers for a modem in this part, but you don’t
have to actually have a modem.
1023
1024
19. In the Internet Connection Sharing screen, ensure that the check box
next to “Enable Internet Connection Sharing for this connection” is
cleared. Click Next.
20. In the Completing the Network Connection Wizard screen, type in a
connection name of Remote Access Server in the text box provided.
Click Finish.
21. In the Connect Remote Access Server dialog box, click Cancel.
22. Your new Remote Access Server connection is displayed in the
Network and Dial-up Connections folder. Double-click
Make New Connection.
23. The Network Connection Wizard starts. Click Next.
24. In the Network Connection Type screen, select the “Connect to a
private network through the Internet” option. Click Next.
25. In the Public Network screen, ensure that the “Automatically dial this
initial connection” option is selected, and that “Internet Connection”
is selected in the drop-down list box. Click Next.
26. In the Destination Address screen, type server01.domain1.mcse in
the text box and click Next.
27. In the Connection Availability screen, select the “For all users”
option. Click Next.
28. In the Internet Connection Sharing screen, ensure that the check box
next to “Enable Internet Connection Sharing for this connection” is
cleared. Click Next.
29. In the Completing the Network Connection Wizard screen, accept
the default name for this connection of Virtual Private Connection.
Click Finish.
30. In the Initial Connection dialog box, click No.
31. Windows 2000 creates the VPN and displays it in the Network and
Dial-up Connections folder. Continue to Part 3.
1025
CAUTION
This part of the lab will modify your computer’s TCP/IP configuration. If
you are connected to a live network, I recommend you don’t do this part.
1026
5. Windows 2000 installs the protocol you selected, and returns you to
the Local Area Connection Properties dialog box.The installation
process may take a minute or so.
6. In the Local Area Connection Properties dialog box, highlight
NWLink IPX/SPX/NetBIOS Compatible Transport Protocol, and
click Properties.
7. In the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol
Properties dialog box, type in an internal network number of 48972345.
Select the “Manual frame type detection” option, and click Add.
8. In the Manual Frame Detection dialog box, select a frame type of
Ethernet 802.2 from the “Frame type” drop-down list box.Type in
a network number of 29987. Click OK.
9. In the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol
Properties dialog box, click OK.
10. In the Local Area Connection Properties dialog box, click Install.
11. In the Select Network Component Type dialog box, highlight Service
and click Add.
12. In the Select Network Service dialog box, highlight the SAP Agent
and click OK.
13. In the Local Area Connection Properties dialog box, click Install.
14. In the Select Network Component Type dialog box, highlight Client
and click Add.
15. In the Select Network Client dialog box, highlight Gateway
(and Client) Services for NetWare. Click OK.
16. Two dialog boxes appear, one after the other. In the Select NetWare
Logon dialog box (the second dialog box that appears), click OK. In
the Local Network dialog box, click Yes to restart your computer now.
17. Reboot your computer to Windows 2000 Server and log on as
Administrator. Continue to Part 5.
1027
1028
Assessment Questions
1. D. Use the Network Connection Wizard in the Network and
Dial-up Connections folder to make new connections.
2. C. Internet Connection Sharing should always be enabled on the
connection that the computer uses to connect to the Internet. In this
case, that’s a dial-up connection to the Internet.
3. B, C, D. Internet Connection Sharing should not be used on networks
that have existing routers, DNS servers, or DHCP servers, because once
Internet Connection Sharing is enabled on a computer,Windows 2000
automatically makes that computer into the gateway, DNS proxy server,
and DHCP server for that network segment, and assigns this computer
an IP address of 192.168.0.1.
4. A. To directly connect the two computers by using infrared ports, you
must configure one of the computers to accept incoming connections,
and configure the other computer to directly connect to the other.
4701-1 ch15.f.qc 4/24/00 09:40 Page 1029
1029
Scenarios
1. The most likely cause of this problem is that you enabled Internet
Connection Sharing on the wrong connection. Internet Connection
Sharing must be enabled on the connection that is used to access the
Internet. In this case, Internet Connection Sharing must be enabled
on the connection that is connected to the cable modem.To resolve
the problem, disable Internet Connection Sharing on the local area
connection that connects to your home network, and enable it on
the connection that is connected to your cable modem.
2. The most likely cause of this problem is an incorrect TCP/IP setting,
such as the computer’s IP address.To resolve the problem, ensure that
all TCP/IP settings on your computer are configured correctly, with
settings that are compatible with the other computers on your
network that use TCP/IP.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1030
Professional
Server
EXAM
MATERIAL Network
EXAM OBJECTIVES
1031
4701-1 ch16.f.qc 4/24/00 09:41 Page 1032
C HAP TE R
16
Networking with TCP/IP
1033
4701-1 ch16.f.qc 4/24/00 09:41 Page 1034
Chapter Pre-Test
1. What is TCP/IP?
2. True or False: All computers located on the same network
segment should have the same network ID.
3. What does a default gateway address specify?
4. What are the two ways in which you can assign an IP address
to a Windows 2000 computer?
5. What is a DHCP scope?
6. What is WINS?
7. How can you enable routing on a Windows 2000 Server
computer?
8. What are the five routing protocols that ship with Windows 2000
Server?
9. What are two security features of TCP/IP in Windows 2000?
4701-1 ch16.f.qc 4/24/00 09:41 Page 1035
Overview of TCP/IP
The Transmission Control Protocol/Internet Protocol (TCP/IP) is a widely
used transport protocol that provides robust capabilities for Windows 2000
networking.
TIP
In the Windows 2000 interface, TCP/IP is called “Internet Protocol
(TCP/IP).” But I prefer to simply call it what it is — TCP/IP.
IP Addressing
An IP address is a 32-bit binary number, broken into four 8-bit sections
(often called octets), that uniquely identifies a computer or other network
device on a network that uses TCP/IP. IP addresses must be unique — no
two computers or other network devices on an internetwork should have the same IP
address. If two computers have the same IP address, one or both of the com-
puters may be unable to communicate over the network. An IP address is
not the same as a network adapter card’s hardware (or MAC) address.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1036
Subnet Masks
A subnet mask specifies which portion of an IP address represents the net-
work ID and which portion represents the host ID. A subnet mask allows
TCP/IP to determine whether network traffic destined for a given IP
address should be transmitted on the local subnet, or whether it should be
routed to a remote subnet. A subnet mask should be the same for all com-
puters and other network devices on a given network segment.
A subnet mask is a 32-bit binary number, broken into four 8-bit sections
(octets), that is normally represented in a dotted decimal format. Each 8-bit
section is represented by a whole number between 0 and 255.
A common subnet mask is 255.255.255.0. This particular subnet mask
specifies that TCP/IP will use the first three octets of an IP address as the net-
work ID, and will use the last octet as the host ID.This subnet mask is some-
4701-1 ch16.f.qc 4/24/00 09:41 Page 1037
TIP
For more information on subnetting and subnet masks, see Network+
Certification Study System, by Joseph J. Byrne (IDG Books Worldwide).
Table 16-1 lists all of the subnet masks normally used on TCP/IP net-
works, the number of bits specified by each subnet mask, and the maxi-
mum number of host IDs that can be used on a single subnet with that
subnet mask.
TABLE 16-1 Common Subnet Masks
Maximum number of
Number of bits host IDs that can be
specified by the used on a single subnet
Subnet mask subnet mask with this subnet mask
255.0.0.0 8 16,777,214
255.128.0.0 9 8,388,606
Continued
4701-1 ch16.f.qc 4/24/00 09:41 Page 1038
255.192.0.0 10 4,194,302
255.224.0.0 11 2,097,150
255.240.0.0 12 1,048,574
255.248.0.0 13 524,286
255.252.0.0 14 262,142
255.254.0.0 15 131,070
255.255.0.0 16 656,534
255.255.128.0 17 32,766
255.255.192.0 18 16,382
255.255.224.0 19 8,190
255.255.240.0 20 4,094
255.255.248.0 21 2,046
255.255.252.0 22 1,022
255.255.254.0 23 510
255.255.255.0 24 254
255.255.255.128 25 126
255.255.255.192 26 62
255.255.255.224 27 30
255.255.255.240 28 14
255.255.255.248 29 6
255.255.255.252 30 2
IP address: 192.168.75.122
Default gateway: 192.168.75.1
Computer_A
Subnet_A
IP address: 192.168.75.1
Router
IP address: 192.168.70.1
Subnet_B
IP address: 192.168.70.31
Default gateway: 192.168.70.1
Computer_B
Configuring TCP/IP
IP addresses must be configured on each connection in a Windows 2000
computer when TCP/IP is installed. Because TCP/IP is automatically
installed during most installations of Windows 2000, IP address configura-
tion is often done as part of the installation process.After the installation of
Windows 2000, when a new connection is created, it is configured, by
default, to receive its IP addressing information from a DHCP server.
You can assign an IP address to a Windows 2000 computer in one of
two ways: by manually specifying a computer’s IP address configuration, or
by configuring a computer to obtain IP addressing information automati-
cally from a DHCP server.
STEP BY STEP
TIP
When you’re configuring TCP/IP addressing information on a Windows
2000 computer so it can function on your company’s local area network,
you would normally select the computer’s Local Area Connection during
this step.
3. If the connection you selected is not a local area connection, in the connection’s
Properties dialog box, click the Networking tab.
Then, for all connection types, highlight Internet Protocol (TCP/IP) and click
Properties.
4. The Internet Protocol (TCP/IP) Properties dialog box appears, as shown in Figure
16-2. Notice the IP address, Subnet mask, Default gateway, and Preferred DNS
server text boxes.
Ensure that the “Use the following IP address” option is selected. Then complete
the following text boxes:
IP address: Enter the IP address you want to assign to this connection.
This is a mandatory setting.
Subnet mask: Enter the subnet mask you want to assign to this connec-
tion. This is a mandatory setting.
Default gateway: Enter the default gateway address that will be used by
this connection. This is an optional setting. However, if you don’t configure
this setting, this computer won’t be able to communicate with computers
located on other network segments.
If you want the computer to use a DNS server, complete the following text boxes:
Preferred DNS server: Enter the IP address of the DNS server you want
this connection to use.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1042
Alternate DNS server: Optionally, you can enter the IP address of an addi-
tional DNS server that will be used by this connection if the preferred DNS
server is not available.
Click OK.
5. In the connection’s Properties dialog box, click OK.
6. Close the Network and Dial-up Connections folder.
then renew that lease, enabling a client computer to use the same IP
address indefinitely, unless the computer is turned off for several days (long
enough for the lease to expire).
Assigning IP addresses by using a DHCP server is the preferred method
because:
■ Using a DHCP server makes it possible for you to manage IP
addresses centrally, thus ensuring that addresses are valid and not
duplicated.
■ Using a DHCP server reduces the amount of administration time
required to manage and maintain IP addresses for each connection
on each computer on the network.
■ Using a DHCP server reduces the likelihood of human error when
IP addresses are assigned, because no need exists to enter an IP
address manually for each connection on every individual computer.
■ Using a DHCP server enables an administrator to centrally change
the IP address that each client computer uses to contact a DNS or
WINS server, instead of having to manually reconfigure each client
computer.
■ Using a DHCP server enables you to regain the use of an IP
address no longer assigned to a host when the DHCP lease period
for this IP address expires.
Before you can assign an IP address to a connection on a Windows 2000
computer by using a DHCP server, you must have a DHCP server on your
network. (I’ll explain how to install and configure a DHCP server a little
later in this chapter.)
STEP BY STEP
Then, for all connection types, highlight Internet Protocol (TCP/IP) and click
Properties.
4. In the Internet Protocol (TCP/IP) Properties dialog box, select the “Obtain an IP
address automatically” option.
If you also want a DNS server address to be automatically assigned, select the
“Obtain DNS server address automatically” option.
Figure 16-3 shows a connection configured to receive both its IP addressing
information and its DNS server address automatically. Click OK.
you can type the host name or FQDN of the computer with which you are
trying to communicate.) If your computer is able to communicate with the
remote computer specified, ping.exe displays four replies from the remote
computer.The following is an example of a successful ping response.
Reply from 192.168.59.5: bytes=32 time<10ms TTL=128
Reply from 192.168.59.5: bytes=32 time<10ms TTL=128
Reply from 192.168.59.5: bytes=32 time<10ms TTL=128
Reply from 192.168.59.5: bytes=32 time<10ms TTL=128
EXAM TIP
The Network exam has six objectives on DHCP. Be sure you’re good and
comfortable with all facets of DHCP before you take the Network exam.
In the next few sections I’ll show you how to install the DHCP service;
how to authorize a DHCP server in Active Directory; how to configure
DHCP for integration with a DNS server; how to configure DHCP
scopes, superscopes, and multicast scopes; and how to monitor a DHCP
server. I’ll also provide you with some tips for troubleshooting DHCP.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1047
STEP BY STEP
INSTALLING DHCP
STEP BY STEP
TIP
Windows 2000 computers only register their host name to IP address
information (called forward lookup information) with the DNS Server.
Windows 2000 computers do not register their IP address to Host name
information (called reverse lookup information) with the DNS server. If
you want to register reverse lookup information, you must configure the
DHCP server to perform DNS registration.
In order for this feature to be implemented, the DNS server must sup-
port dynamic updates. If your DNS server is a Windows 2000 Server com-
puter running the Windows 2000 Domain Name System (DNS) service,
you shouldn’t have any problems here, because the Windows 2000 DNS
service fully supports dynamic updates.
STEP BY STEP
STEP BY STEP
CREATING A SCOPE
6. If you configured a range of IP addresses in Step 5 that spans more than one
subnet, the Create Superscope screen is displayed. If you want to create a super-
scope, select the Yes option and click Next. If you don’t want to create a super-
scope, click Back and reconfigure your IP address range to only include IP
addresses from a single subnet.
If you configured a range of IP addresses in Step 5 from only one subnet, the
Add Exclusions screen is displayed. In this screen, you can specify IP addresses
(or ranges of IP addresses) within the scope that will not be assigned to DHCP
client computers by the DHCP server.
TIP
You should exclude from the scope IP addresses of any computers, such
as routers and DHCP servers, that have been assigned static IP
addresses.
To exclude IP addresses, enter the start and end IP address of the range you
want to exclude and click Add. (If you only want to exclude a single IP address,
use this IP address as both the start and end IP address of the exclusion range.)
When you finish configuring exclusions, click Next.
7. In the Lease Duration screen, either accept the default DHCP lease duration of
eight days, or configure a custom lease duration. Click Next.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1053
STEP BY STEP
To exclude IP addresses, enter the start and end IP address of the range you
want to exclude and click Add. (If you only want to exclude a single IP address,
use this IP address as both the start and end IP address of the exclusion range.)
When you finish configuring exclusions, click Next.
7. In the Lease Duration screen, either accept the default DHCP multicast lease
duration of 30 days, or configure a custom lease duration. Click Next.
8. In the Activate Multicast Scope screen, select whether to activate this multicast
scope now. Your options are Yes or No. A DHCP server can’t assign addresses
from a multicast scope until the scope is activated. Make your selection and click
Next.
9. In the Completing the New Multicast Scope Wizard screen, click Finish.
10. Windows 2000 creates the multicast scope. It is displayed in the right pane of
the DHCP dialog box. Close DHCP.
STEP BY STEP
If you want to configure server options, right-click the Server Options folder
and select Configure Options from the menu that appears.
If you want to configure scope options, right-click the Scope Options folder,
and select Configure Options from the menu that appears.
3. The Server Options or Scope Options dialog box appears. In the Available
Options list, select the check box next to the option you want to configure. Once
you select the check box, the configurable options for this item are displayed in
the bottom portion of the dialog box, as shown in Figure 16-6.
Enter the appropriate information (such as server name or IP address) for the
option you selected.
Repeat this step until you have configured all of the server options or scope
options you need to configure. When you finish configuring options, click OK.
4. The DHCP dialog box appears, with your scope or server options displayed in
the right pane, as shown in Figure 16-7. Close DHCP.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1057
Notice the scope options I’ve configured in figure 16-7: a router, a DNS
server, a DNS domain name, a WINS server, and a WINS/NBT node type.
These are the most commonly used DHCP options on a Windows 2000
network, and the options on which you’re most likely to be tested on the
Windows 2000 exams.
I’ll get into WINS a little later in this chapter, but for now you should
know that if you want your DHCP server to provide client computers
with the information they need to use a WINS server, you need to config-
ure the following two options:
■ 044 WINS/NBNS Servers: This option is used to specify the IP
address of one or more WINS servers for client computers.This
option provides DHCP clients with the IP addressing information
they need to be able to use a WINS server.This option is com-
monly configured on a DHCP server so that the administrator
doesn’t have to manually configure each client computer to use
a WINS server.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1058
STEP BY STEP
Finally, select one of the three options in the “Supported types” section:
DHCP only: Select this option if you only want to permit the DHCP client
(for which an IP address is reserved) to request that address by using the
DHCP protocol.
BOOTP only: Select this option if you only want to permit the DHCP client
(for which an IP address is reserved) to request that address by using the
BOOTP protocol. The BOOTP protocol is an older protocol that is consid-
ered the predecessor to DHCP.
Both: Select this option if you want to permit the DHCP client (for which an
IP address is reserved) to request that address by using either the DHCP or
BOOTP protocol. This is the default selection.
Click Add.
4. Repeat Step 3 until all desired IP address reservations are configured. Click
Close.
5. Close DHCP.
You can use the DHCP administrative tool to provide you with a great
deal of information about how your DHCP server is functioning. In
DHCP you can display statistics about each DHCP server, such as the
number of scopes and IP addresses it has, and how many of those IP
addresses are in use.To view these statistics, in the DHCP dialog box, right-
click the DHCP server for which you want to view statistics, and select
Display Statistics from the menu that appears. Figure 16-9 shows statistics
for a DHCP server.
You can also view information about address leases. When a DHCP
client computer obtains an IP address from a DHCP server, the client com-
puter is said to lease that IP address for a preset period of time, called a lease
duration. In DHCP, you can view a list of all IP addresses assigned to DHCP
clients, the host name of the client computer to which each IP address is
assigned, and lease expiration information for each lease. Lease information
is provided on a scope-by-scope basis.To view IP address lease information,
in the DHCP dialog box, expand the scope for which you want to view
lease information, and highlight the Address Leases folder. Lease infor-
mation is displayed in the right pane, as shown in Figure 16-10.
You can also use System Monitor, a Performance tool, to monitor the
DHCP Server object and its many counters.The DHCP Server object and
its counters are available in System Monitor after DHCP is installed on a
Windows 2000 Server computer. You can also use System Monitor to
determine if your DHCP server has adequate memory, processor, and disk
resources.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1061
CROSS-REFERENCE
I cover how to use System Monitor in Chapter 21.
Troubleshooting DHCP
Typically, DHCP servers don’t require much troubleshooting. Once your
DHCP server is up and running, it normally just works.
Two of the most common DHCP problems reported by users include
the inability to lease an address from the DHCP server, and the inability to
renew a leased address. If you face either of these two problems, try one or
more of the following tips to resolve the problem:
■ Use the Services tool in Computer Management to verify that the
DHCP Server service is started. If it’s not, start this service.
■ If the DHCP server was recently installed and configured, ensure
that the DHCP server has been authorized in Active Directory.
■ Use the DHCP administrative tool to verify that a scope exists on
the DHCP server, that the scope contains an adequate number of
IP addresses, and that the IP addresses are appropriate for the net-
work segment.
■ Use the DHCP administrative tool to verify that the scope is active.
A scope can’t be used to assign IP addresses until it is activated.
■ Verify that the DHCP client computer has been configured to use
a DHCP server, and that its physical connection to the network
(including network adapter card, cable, hub, and so on) is functioning.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1062
Notice the #DOM: portion of the entries for wolf, server01, and nat.The
#DOM: portion is used to specify that the computer is a domain controller
for the domain whose name immediately follows #DOM. In this example,
wolf is a domain controller for domain2, and server01 and nat are domain
controllers for domain1.
Installing WINS
Before you can install WINS on a Windows 2000 Server computer,
TCP/IP must be installed, and the computer’s local area connection must
be configured with a static IP address.
STEP BY STEP
Before your newly installed WINS server will do you any good, you’ll
need to configure each client computer on the network to use the WINS
server for NetBIOS name resolution.You can either accomplish this task
by manually configuring each client computer to use the WINS server, or
by configuring a DHCP server to supply each client computer with the IP
addressing information it needs to use the WINS server. I’ll discuss how to
configure NetBIOS name resolution options on client computers a little
later in this chapter.
STEP BY STEP
STEP BY STEP
This is an important dialog box that contains all of the settings that need to be
configured for WINS replication:
In the “Replication partner type” drop-down list box, select one of the three avail-
able options:
Push/Pull: Selecting this option configures the replication partner to notify
this WINS server when its database changes (this is called a push), and to
request database changes from this WINS server (this is called a pull). This
is the default option and should be used between two WINS servers that are
connected by a local area network or other high-speed link.
Push: Selecting this option configures the replication partner to notify this
WINS server when its database changes (but not to request database
changes from this WINS server). This setting is often used when the WINS
server you’re configuring (not the replication partner) is located on the other
side of a remote WAN link where no other servers (other than the WINS
server itself) exist. Because NetBIOS name resolution is primarily concerned
with resolving server IP addresses, and there are no other servers on the
remote network with the isolated WINS server, there’s no need to update
the replication partner with this WINS server’s database changes.
Pull:Selecting this option configures the replication partner to request data-
base changes from this WINS server (but not to notify this WINS server
when its database changes). This setting is often used when the two WINS
servers are separated by a slow WAN link, and when the replication partner
needs to be updated with this WINS server’s database changes.
8. If you selected a replication partner type of Push/Pull or Pull, complete the “Pull
replication section” of this dialog box.
If you want this WINS server to maintain a constant connection with its replication
partner, accept the default selection of the check box next to “Use persistent con-
nection for replication.” This option should only be selected when the two WINS
servers are connected by a high-speed link or are on a local area network. This
option speeds up the replication process between the WINS servers, because
they don’t have to take time to establish a connection each time replication occurs.
By default, WINS replication occurs every 30 minutes. If you want to schedule
when replication occurs, in the “Start time” section, configure the time of day you
want WINS replication to start. Then, configure the frequency of WINS replica-
tion by configuring the “Replication interval” section.
9. If you selected a replication partner type of Push/Pull or Push, complete the
“Push replication” section of this dialog box.
If you want this WINS server to maintain a constant connection with its replica-
tion partner, accept the default selection of the check box next to “Use persistent
connection for replication.” This option should only be selected when the two
WINS servers are connected by a high-speed link or are on a local area network.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1069
Then, in the “Number of changes in version ID before replication” spin box, spec-
ify the number of database changes that must occur before the replication partner
will notify this WINS server of its database changes.
10. When you finish configuring the properties of the replication partner, click OK.
You can also view the WINS server database that contains the NetBIOS
name to IP address mappings for servers and client computers that are con-
figured to use this WINS server.
STEP BY STEP
You can also use System Monitor, a Performance tool, to monitor the
WINS Server object and its many counters.The WINS Server object and
its counters are available in System Monitor after WINS is installed on a
Windows 2000 Server computer. You can also use System Monitor to
determine if your WINS server has adequate memory, processor, and disk
resources.
CROSS-REFERENCE
I cover how to use System Monitor in Chapter 21.
Troubleshooting WINS
Like DHCP servers, WINS servers don’t normally require much trou-
bleshooting. Once your WINS server is installed and correctly configured,
it normally just works.
That said, the most common WINS problem is the inability to resolve a
NetBIOS name to its associated IP address. This problem typically shows
up when a user tries to map a network drive to a server by using the
server’s name, and receives an error message stating “The network path
\\server_name\share_name could not be found.”
If you experience this problem, here are some tips that might help you:
■ Use the Services tool in Computer Management to verify that the
Windows Internet Name Service (WINS) is started. If it’s not, start
this service.
■ Verify that the client computer (or computers) experiencing the
problem are configured to use the WINS server.
■ Verify that the server (or other resource) that the client is attempting
to connect to is configured to use the WINS server.
■ Use ping.exe to verify that the client computer experiencing
the problem can communicate with the WINS server by using
TCP/IP.
■ If you have multiple WINS servers on the network, verify that
WINS server replication is correctly configured on each WINS
server, and that replication is occurring.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1072
TIP
When I say “client computer,” I’m referring to clients of the WINS server,
which include all computers on the network, including the WINS server
itself. You need to configure all of the computers on your network for
NetBIOS name resolution.
You can configure client computers to use a WINS server in one of two
ways.You can either manually configure each client computer to use the
WINS server, or you can configure your DHCP server to supply each
client computer with the IP addressing information it needs to use the
WINS server. (In the section earlier in this chapter on “Configuring
DHCP Options,” I discussed the two important options that should be
configured if you want your DHCP server to supply client computers with
the information they need to use a WINS server.)
In the following steps, I’ll show you how to configure a Windows 2000
client computer to use a WINS server for NetBIOS name resolution.
STEP BY STEP
TIP
If the computer has more than one Local Area Connection, you’ll need to
perform these steps on each of the connections.
To configure the computer to use a WINS server, click Add. In the TCP/IP
WINS Server dialog box, enter the IP address of the WINS server, and click Add.
If you want this computer to use more than one WINS server, repeat this process
until IP addresses for all WINS servers have been added.
If you want this computer to use both a WINS server and an lmhosts
file, accept the default selection in the check box next to “Enable LMHOSTS
lookup.”
If you want this computer to only use the WINS server, and to not use
an lmhosts file, clear the check box next to “Enable LMHOSTS lookup.”
4701-1 ch16.f.qc 4/24/00 09:41 Page 1074
7. In the bottom of this dialog box, select one of the following three options:
EnableNetBIOS over TCP/IP: If you have any non-Windows 2000
Windows-based computers on your network (such as Windows NT,
Windows 95 or 98) select this option. This option is selected by default.
Disable NetBIOS over TCP/IP: If all of the computers on your network are
Windows 2000 computers, and you don’t use any programs or applications
that require NetBIOS, select this option.
Use NetBIOS setting from the DHCP server: If you want to use your
DHCP server to control whether NetBIOS is enabled on this computer
(instead of enabling or disabling NetBIOS on the local computer), select
this option.
Click OK.
8. In the Internet Protocol (TCP/IP) Properties dialog box, click OK.
9. In the Local Area Connection Properties dialog box, click OK.
10. Close the Network and Dial-up Connections folder.
Routing TCP/IP
IP routing is a function of the Internet Protocol (IP) that uses IP address
information to send data packets from a source computer on one network
segment across one or more routers to a destination computer on another
network segment. Hardware devices that perform routing are called routers.
Windows 2000 Server computers can function as routers, but Windows
2000 Professional computers can’t.
EXAM TIP
The Network exam has more objectives on routing than you can shake a
stick at. This is an extremely complex subject. Make sure you know the
features each of the Windows 2000 Server routing protocols has to
offer, and when and how each protocol should be used.
Static Routing
Static routing is basic, no-frills IP routing. No additional software is neces-
sary to implement static routing in Windows 2000 Server computers. In
order to function as a router, the Windows 2000 Server computer must
have at least one network adapter card installed. In addition, it must have
either an additional network adapter card or a communications device,
such as a modem, installed.
Enabling Routing
When you enable routing on a Windows 2000 Server computer (without
installing additional routing software or protocols), you are configuring
your Windows 2000 Server computer to function as a static router.
You can use the Routing and Remote Access administrative tool to enable
routing on a Windows 2000 Server computer, as the following steps explain.
STEP BY STEP
CROSS-REFERENCE
See Chapter 17 for information on how to configure a remote access
server and a VPN server.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1076
5. In the Routed Protocols screen, verify that all network protocols required on the
server are listed. Commonly listed protocols include IPX, TCP/IP, and AppleTalk.
If you need to add additional protocols, select the “No, I need to add protocols”
option. If you select this option, the wizard stops, and directs you install the nec-
essary protocols in the Network and Dial-up Connections folder, and
then to run this wizard again.
If all the protocols you need are listed, accept the default option of “Yes, all of the
available protocols are on this list.” Click Next.
6. In the Demand-Dial Connections screen, choose whether to use demand-dial
connections on this server. A demand-dial connection is a type of dial-up (or
VPN) connection that is used by a router only when it needs to transmit data to a
remote network. Your two choices are Yes or No, and the default selection is No.
You can change this option later if you change your mind. Make your selection,
then click Next.
7. If you selected Yes in Step 6, the IP Address Assignment screen appears. Select
the method you want to use for assigning IP addresses to remote routers when
they connect to this computer using a demand-dial connection. Your choices are
“Automatically” (this is the default setting), or “From a specified range of addresses.”
Click Next.
8. In the Completing the Routing and Remote Access Server Setup Wizard screen,
click Finish.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1077
9. Windows 2000 starts the Routing and Remote Access service. Your Windows
2000 Server computer is now configured as a static router. Close Routing and
Remote Access.
STEP BY STEP
In the Gateway text box, enter the IP address of the router that can forward
packets to this remote network segment.
In the Metric spin box, select the number of routers that packets must pass
through in order to reach the remote network segment by using this static route.
Click OK.
4. The static route is created, and is displayed in the right pane. Close Routing and
Remote Access.
Configuring a Router
Once you’ve configured your Windows 2000 Server computer to function
as a router, you may need to configure the router’s properties to meet your
network’s needs. You can use Routing and Remote access to configure
several router properties, including security, protocol, and event logging
options.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1079
STEP BY STEP
On this tab, you can enable or disable routing. You can also configure whether
this server will function as a remote access server (I cover remote access servers
in great detail in Chapter 17).
Assuming you want this server to function as a router (and you have selected the
check box next to Router), you should choose either to limit routing to the local
area network only, or to enable both local area network and demand-dial routing
to a remote network.
Make the appropriate configurations. To configure security options, click the
Security tab.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1080
TIP
If you want this router to support demand-dial routing, but you didn’t
configure it to support demand-dial connections when you used the wiz-
ard to enable routing, you must select the “LAN and demand-dial rout-
ing” option on this tab.
4. On the Security tab, you can select an authentication provider that will be used
for demand-dial and remote access connections. Your choices are Windows
Authentication or RADIUS Authentication. The default selection is Windows
Authentication, and is acceptable unless you’re using a RADIUS server to
authenticate remote access clients for multiple servers.
If you need to modify the authentication methods this server will use when it
authenticates remote clients or routers, click Authentication Methods and make
the necessary configurations. This option is normally only used by administrators
with advanced knowledge of authentication protocols.
You can also select the accounting provider this server will use. The accounting
provider logs all sessions with the router. You can select either Windows
Accounting (this is the default), RADIUS Accounting, or None.
Make the appropriate configurations. To configure IP options, click the IP tab.
5. The IP tab appears, as shown in Figure 16-18.
Notice that the “Enable IP routing” check box is selected. This is the default config-
uration. This check box must be selected in order for this computer to function as
an IP router.
If you want this router to support IP on all of its connections, ensure that the
“Allow IP-based remote access and demand-dial connections” check box is
selected. If this check box is cleared (and the “Enable IP Routing” check box
is selected), IP will only be used on local area connections.
TIP
If you want this router to support IP on demand-dial connections, make
sure to select this check box.
Next, you can configure how this computer will assign IP addresses to computers
and routers connecting to it. By default, the server is configured to use a DHCP
server for IP address assignment. However, you can configure it to use a static IP
address pool if you want to.
Make the appropriate configurations. To configure PPP options, click the PPP tab.
6. On the PPP tab, you can configure several Point-to-Point Protocol (PPP) options.
In general, you only need to concern yourself with this tab if your computer is con-
figured as a remote access server, or if your router supports demand-dial connec-
tions. By default, all PPP options are selected. The options are:
Multilink connections
Dynamic bandwidth control using BAP or BACP
Link control protocol (LCP) extensions
Software compression
Make any necessary changes. To configure Event Logging, click the Event
Logging tab.
7. On the Event Logging tab, you can configure how Windows 2000 will handle
event logging for routing and remote access events. You can select one of the
following four levels of logging:
Log errors only
Log errors and warnings (this is the default setting)
Log the maximum amount of information
Disable event logging
In addition to selecting a logging level, you can enable or disable PPP logging in
this dialog box. (It is disabled by default.)
When you finish configuring event logging options, click OK.
8. Close Routing and Remote Access.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1082
So, there are a lot of tasks you need to perform to enable demand-dial
routing on your Windows 2000 Server computer:
1. First, you must first configure your Windows 2000 Server computer
to enable “LAN and demand-dial routing” and to “Allow IP-based
remote access and demand-dial connections.”You may have chosen
to use demand-dial connections when you used the wizard to enable
routing on your computer, or you can manually configure these
options in the server’s Properties dialog box in Routing and Remote
Access. (I explained how to do this in the “Configuring a Router”
section earlier in this chapter.)
2. Next, because a port is required by a demand-dial interface, you
should ensure that the port you want this interface to use is config-
ured to support demand-dial routing connections.
3. Finally, before demand-dial routing will occur, you need to create and
configure a demand-dial interface.
TIP
Windows 2000 won’t permit you to configure a port or to create a
demand-dial interface until you have enabled demand-dial routing on the
server.
I’ll show you how to configure a port and how to create and configure
a demand-dial interface in the steps that follow.
STEP BY STEP
CONFIGURING A PORT
1. Select Start ➪ Programs ➪ Administrative Tools ➪ Routing and Remote Access.
2. In the left pane of the Routing and Remote Access dialog box, click the + next to
the server that contains the port you want to configure. Right-click Ports, and
select Properties from the menu that appears.
3. In the Ports Properties dialog box, highlight the modem or port you want to con-
figure, and click Configure.
4. The Configure Device dialog box for the port you selected appears, as shown in
Figure 16-19.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1084
Select the check box next to “Remote access connections (inbound only)” if this
computer functions as a remote access server and you want to permit this port to
be used for inbound connections from remote clients.
Select the check box next to “Demand-dial routing connections (inbound and out-
bound)” if this computer functions as a router and you want to permit this port to
be used for demand-dial connections.
If you’re configuring a modem port, enter the phone number of the modem.
Finally, if you’re configuring a PPTP or L2TP port, you can configure the maximum
number of ports of this type that the Windows 2000 Server computer will sup-
port. The range can be between 0 and 30,000.
When you finish configuring the port, click OK.
5. In the Ports Properties dialog box, click OK.
6. Close Routing and Remote Access.
5. In the Connection Type screen, choose whether you want this interface to use
a physical device (such as a modem, ISDN adapter, and so on) or a VPN port.
Click Next.
6. If you selected a physical device in Step 5, the “Select a device” screen
appears. Select the modem or other physical device you want this interface to
use. Click Next.
If you selected a VPN port in Step 5, the VPN Type screen appears. Select
the type of VPN port you want to use. Your choices are: Automatic selection (this
is the default), Point to Point Tunneling Protocol (PPTP), and Layer 2 Tunneling
Protocol (L2TP). Click Next.
7. If you selected a physical device in Step 5, the Phone Number screen
appears. Enter the phone number of the dial-up server or router that this
interface will connect to. Click Next.
If you selected a VPN port in Step 5, the Destination Address screen
appears. Enter the FQDN or IP address of the remote router that this
interface will connect to. Click Next.
8. The Protocols and Security screen appears, as shown in Figure 16-20.
FIGURE 16-20 Selecting protocol and security options for the interface
TIP
If a remote router will use this interface to connect to this computer,
select the check box next to “Add a user account so a remote router can
dial in.” If you don’t select this check box, you’ll have to manually create a
user account later for the remote router.
Click Next.
9. In the Dial Out Credentials screen, enter the user name, domain name, and pass-
word that this interface will use when it connects to a remote router. Click Next.
10. In the “Completing the demand-dial interface wizard” screen, click Finish.
11. If you need to change any of the settings you configured for this interface, you
can do so by using Routing and Remote Access. In the left pane of the Routing
and Remote Access dialog box, highlight Routing Interfaces. Then, in the right
pane, right-click the demand-dial interface, and select Properties from the menu
that appears. Make any necessary configuration changes, and click OK.
12. Close Routing and Remote Access.
Dynamic Routing
Dynamic routing is intelligent IP routing. A dynamic router is capable of
automatically building and updating a routing table. In a dynamic routing
environment, administrators don’t have to configure the routing table on
each router manually. As changes are made to the network, dynamic
routers automatically adjust their routing tables to reflect these changes.
So, how does dynamic routing work? Periodically, each dynamic router
on the network broadcasts packets containing the contents of its routing
table. Dynamic routers that receive these packets add the routing table infor-
mation received to their own routing tables. In this way, dynamic routers can
recognize other routers as they are added to and removed from the network.
The process of updating routing tables on routers is not instantaneous. It
may take from several seconds to several minutes before all routers on the
network have accurate, up to date routing tables. The time it takes for a
change to the network to be reflected in the routing tables of all routers on
the network is called the convergence interval, or convergence time.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1087
STEP BY STEP
3. In the New Routing Protocol dialog box, select RIP Version 2 for Internet Protocol
from the list. Click OK.
4. The protocol is installed.
STEP BY STEP
1. In the left pane of the Routing and Remote Access dialog box, right-click RIP, and
select Properties from the menu that appears.
2. In the RIP Properties dialog box, you can configure the maximum number of sec-
onds the router will wait before it sends triggered updates. (Triggered updates
are high-priority updates that are generated when a router is added to or removed
from the network. These updates are sent immediately instead of waiting until the
next periodic update.) The default setting is 5 seconds.
You can also configure event logging in this dialog box. You can choose to: log
errors only, log errors and warnings, log the maximum amount of information, or
disable event logging. The default selection is “Log errors only.”
To configure security options for the RIP v2, click the Security tab.
3. On the Security tab, select one of three options:
Accept announcements from all routers: Select this option if you don’t
want or need to use security. This is the default selection.
Accept announcements from listed routers only: Select this option if
you want to prevent your routing tables from accepting updates from
unknown routers. If you select this option, you must create a list of routers,
by IP address, that this router will accept updates from.
Ignore announcements from all listed routers: Select this option if you
want to prevent your routing table from accepting updates from specific,
known routers on your network. If you select this option, you must create a
list of routers, by IP address, that this router will not accept updates from.
When you finish configuring security options, click OK.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1089
4. To configure RIP v2 to use a routing interface in the computer, right-click RIP, and
select New Interface from the menu that appears.
5. In the New Interface for RIP Version 2 for Internet Protocol dialog box, highlight
the interface you want to configure this protocol to use. Click OK.
6. The RIP Properties dialog box for the interface you selected appears, as shown in
Figure 16-21.
In the “Operation mode” drop-down list box, select either the “Periodic update
mode” or the “Auto-static update mode.” Periodic update is the default for LAN
connections. If this mode is selected, RIP v2 sends out updates every 30 sec-
onds. Auto-static update mode is the default for demand-dial connections. If
this mode is selected, RIP v2 sends out updates only when the remote router
requests them.
In the “Outgoing packet protocol” drop-down list box, select the protocol that will
be used by this router to send updates to other routers. The four choices are: RIP
version 1 broadcast, RIP version 2 broadcast, RIP version 2 multicast, and Silent
RIP. The default protocol is RIP version 2 broadcast. If you select Silent RIP, this
router will accept updates from other routers, but won’t send out any updates of
its own.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1090
In the “Incoming packet protocol” drop-down list box, select the protocol that will
be accepted by this router for incoming RIP packets. The four choices are: Ignore
incoming packets, RIP version 1 and 2, RIP version 1 only, and RIP version 2 only.
The default protocol is RIP version 1 and 2.
If you want this router to send a password when it communicates with other
routers, and require that other routers send a password when they communicate
with this router, select the check box next to “Activate authentication” and enter
the password.
When you finish configuring options on this tab, click the Security tab.
7. The Security tab appears, as shown in Figure 16-22.
On this tab you can configure security for incoming and outgoing routes. The
default selection for both incoming routes and outgoing routes is “Accept all
routes.” Selecting this option provides no security.
If security is needed, you can configure RIP v2 to either accept or ignore all
routes in the ranges you specify. (If you select either of these two options, you
must specify one or more ranges of IP addresses.)
When you finish configuring security options, click the Neighbors tab.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1091
8. On this tab, you can specify how RIP v2 will communicate with neighbor routers.
(A neighbor, in router-speak, is a router that is physically connected to any of the
subnets that this router is physically connected to.) By default, RIP v2 uses
broadcasts and multicasts when it sends out updates to its routing table. This
means that the updates are not directed toward any specific router or computer.
You can configure RIP v2 to send packets directly to neighbor routers (by speci-
fying the router’s IP address) in addition to using broadcasts or multicasts; or,
you can configure RIP v2 to send packets directly to neighbor routers instead of
using broadcasts or multicasts.
When you finish making configurations on this tab, click the Advanced tab.
9. The Advanced tab appears, as shown in Figure 16-23. Notice the settings on this
tab. This is the default configuration for RIP v2 on a local area connection.
The options on this tab are seldom configured by administrators. For more infor-
mation on any of the options, right-click the option’s text, and select “What’s
This?” from the menu that appears. Windows 2000 displays a description of
the option.
Make any necessary configuration changes, and click OK.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1092
10. The interface you just configured RIP v2 to use is displayed in the right pane of
the Routing and Remote Access dialog box. If you need to configure RIP v2 to
use additional routing interfaces, repeat Steps 4 through 9 for each additional
interface. Close Routing and Remote Access.
STEP BY STEP
Configuring OSPF to Use a Routing Interface After you install OSPF, you
need to configure it to use one or more of the routing interfaces in your
Windows 2000 Server computer. Until you configure OSPF to use at least
one routing interface, OSPF will be unable to dynamically update your
routing tables.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1094
STEP BY STEP
Also notice that by default the check box next to “Enable OSPF for this address”
is selected and that the IP address beneath it is grayed out. This is the default
configuration for an interface that has only one IP address.
In the Area ID drop-down list box, select the routing area that this interface is
physically connected to.
4701-1 ch16.f.qc 4/24/00 09:41 Page 1095
Either accept the default router priority and cost, or adjust them to meet your
network’s requirements.
In the Password text box, enter the password that will be used in the routing area
you selected. If you don’t configure a password, the default password is
“12345678.”
Finally, select the type of network this interface is connected to:
Broadcast: Select this network type for all local area connections. If you are
configuring a local area connection, this option is selected by default.
Point-to-point: Select this network type for all demand-dial interfaces. If
you’re configuring a demand-dial interface, this option is selected by default.
Non-broadcast multiple access (NBMA): Select this network type for all
connections to X.25 or Frame Relay networks. If you’re configuring an X.25
or Frame Relay interface, this option is selected by default.
When you finish configuring options on this tab, click the NBMA Neighbors tab.
5. On the NBMA Neighbors tab, specify a list of neighbor routers, by IP address,
that this interface will use. The options on this tab are only available if you
selected a network type of “Non-broadcast multiple access (NBMA)” on the
General tab.
When you finish configuring this tab, click the Advanced tab.
6. The Advanced tab appears, as shown in Figure 16-25.
The options on this tab are seldom configured by administrators. For more informa-
tion on any of the options, right-click the option’s text, and select “What’s This?”
from the menu that appears. Windows 2000 displays a description of the option.
Make any necessary configuration changes, and click OK.
7. The interface you just configured OSPF to use is displayed in the right pane of
the Routing and Remote Access dialog box. If you need to configure OSPF to
use additional interfaces, repeat Steps 2 through 6 for each additional interface.
Close Routing and Remote Access.
TIP
Remember, if you want this routing to perform internal routing only, make
sure that all interfaces you configure this router to use are connected to
subnets within the same routing area.
Configuring Routing Areas OSPF uses routing areas to break up its large,
complex routing tables into manageable-sized chunks. Remember how I said
that OSPF uses a lot of processor time to calculate the shortest path to each
destination subnet? Well, if the routing table becomes too large, more demand
may be placed on the router’s hardware than it is capable of providing. So, the
solution is to configure additional routing areas, which enable routers to
maintain a portion of the company’s routing table, instead of all of it.
Not all networks require multiple routing areas. If your network is small,
you may only require a single routing area. In this case, Area 0 (the back-
bone area), which is automatically created when OSPF is installed, may be
sufficient for your network’s needs.
Routing areas are specified as one or more network number and subnet
mask combinations. Each of these network number and subnet mask com-
binations specifies a subnet within the routing area. Because a subnet con-
tains a range of IP addresses, these combinations are referred to as ranges.
STEP BY STEP
TIP
If you want to configure additional routing areas, you must edit Area 0
(the backbone area) and specify the network number and subnet mask
combinations for the subnets you determine Area 0 should contain.
Configuring Border Routing Border routing is OSPF routing that spans more
than one routing area. It requires the use of area border routers, which each
have interfaces that are connected to subnets in more than one routing area.
Configuring border routing is much the same as configuring internal
routing — the only difference is that in internal routing, all of the router’s
interfaces are connected to subnets within a single routing area; and in bor-
der routing, the router’s interfaces are connected to subnets in more than
one routing area. So, configuring border routing is simply a matter of con-
figuring OSPF to use interfaces that are connected to subnets in different
routing areas.
As I mentioned earlier, normally at least one interface of an area border
router is connected to the backbone area, but this is not a requirement. In
fact, sometimes, due to a company’s network design, this is not possible. For
example, suppose that you have a series of routing areas, and that Area 0 is
connected to Area 10.0.0.0 by a router, and Area 10.0.0.0 is connected to
Area 192.196.0.0 by a router, but Area 192.196.0.0 is not connected to
Area 0 by a router. In this situation, the area border router that connects
4701-1 ch16.f.qc 4/24/00 09:42 Page 1098
Area 10.0.0.0. to Area 192.196.0.0. will not have a physical interface that is
connected to Area 0. Instead, this border router will use an OSPF “virtual
interface” to connect to Area 0 (the backbone area).
A virtual interface is simply a mapping that tells the border router which
routing area is connected to Area 0 (and the IP address of a border router
in the routing area that has an interface connecting it to Area 0) so that it
has a way to forward packets to Area 0.
You can configure a virtual interface by configuring OSPF’s properties
on the border router that does not have an interface connecting it to Area 0.
STEP BY STEP
In the “Transit area ID” drop-down list box, select the area that is connected to
Area 0.
In the “Virtual neighbor router ID” text box, enter the IP address of the border
router in the transit area you specified that has an interface connected to Area 0.
The default selections for the remaining configurable options on this tab are
acceptable for most situations. However, you must enter the password used by
the virtual neighbor router in the “Plaintext password” text box.
Click OK.
6. In the OSPF Properties dialog box, click OK.
7. Close Routing and Remote Access.
STEP BY STEP
INSTALLING NAT
NAT as a DHCP server, a DNS proxy server, or both.A DNS proxy server
receives name resolution requests from client computers, performs the
name resolution by using DNS servers on the Internet, and then passes the
results of the resolution back to the client computer.
STEP BY STEP
TIP
If you select this option, when NAT assigns IP addressing information to
client computers, it will specify this Windows 2000 Server computer as
the network’s default gateway and DNS server.
4701-1 ch16.f.qc 4/24/00 09:42 Page 1102
If you don’t select this option, you’ll have to configure computers on your network
to use this computer as their default gateway, and, if no DNS server is installed
on the network, as their DNS server as well. Otherwise, computers on your net-
work won’t be able to access computers on the Internet.
After you finish making the appropriate configuration changes on this tab, click
the Name Resolution tab.
6. On the Name Resolution tab, you can configure NAT to function as a DNS proxy
server for the network. A DNS proxy server receives name resolution requests
from client computers, performs the name resolution by using DNS servers on the
Internet, and then passes the results of the resolution back to the client computer.
CAUTION
If the Windows 2000 Server computer on which NAT is installed is
already functioning as a DNS server, this option should not be selected.
If this computer is not currently functioning as a DNS server, select the check box
next to “Clients using Domain Name System (DNS).” In addition, if you are using
another computer on your network as a DNS server, your existing DNS server
must be configured to use the NAT server as a DNS forwarder.
4701-1 ch16.f.qc 4/24/00 09:42 Page 1103
If you select the check box next to “Clients using Domain Name System (DNS),” and
NAT is configured to use a demand-dial connection to the Internet, select the check
box next to “Connect to the public network when a name needs to be resolved,” and
select the appropriate demand-dial interface from the drop-down list box.
Make the appropriate configurations on this tab, and click OK.
7. Close Routing and Remote Access.
STEP BY STEP
STEP BY STEP
Ensure that the “Public interface connected to the Internet” option is selected. In
addition, if you want users on your network to be able to access resources on the
Internet, ensure that the check box next to “Translate TCP/UDP headers” check
box is selected.
Click the Address Pool tab.
5. On the Address Pool tab, you can enter any public (registered) IP addresses
assigned to you by your ISP that you want to associate with specific computers
on your network.
4701-1 ch16.f.qc 4/24/00 09:42 Page 1105
For example, if you have a Web server on your company’s network (that runs on
a computer other than the NAT server), you could associate one of the public IP
addresses assigned to you with the private IP address of the Web server. Once
this assignment is made, when the NAT server receives requests from users on
the Internet that are addressed to the public IP address, the NAT server will for-
ward these requests directly to the Web server’s private IP address.
To make this assignment, first add the public IP addresses on this tab, then click
Reservations, and associate the public IP address with the appropriate private
IP address of the computer on your network.
When you finish making configurations on this tab, click the Special Ports tab.
6. The Special Ports tab enables you to redirect specific types of network traffic
(such as http traffic) sent to a specific public IP address to the associated private
IP address of a computer on your private network.
Configurations on this tab are not the same as making a reservation on the
Address Pool tab. If you make an address reservation, all traffic sent to the speci-
fied public IP address is forwarded to the associated private IP address of the
computer on your private network. If you use the Special Ports tab, only traffic
that is sent to the specified public IP address and that uses a specific TCP or
UDP port will be forwarded to the associated private IP address of the computer
on your internal network.
The Special Ports feature gives you more granular control of what type of traffic
is forwarded to the computers on your internal network, but requires substantial
knowledge of TCP and UDP port numbers, including the applications associated
with these port numbers. For more information on TCP and UDP port numbers,
see RFC 1700, “Assigned Numbers.”
Make any necessary configurations on this tab. Click OK.
7. Close Routing and Remote Access.
DHCP Relay Agent. If you are not using Windows 2000 computers as
routers, you may want to use the DHCP relay service that comes with your
router (if there is one), instead of the Windows 2000 DHCP Relay Agent.
STEP BY STEP
STEP BY STEP
9. The Router tab appears, as shown in Figure 16-30. Notice the default settings on
this tab.
The default configurations on this tab are acceptable for most situations. If you
want more information about any of the options, right-click the text of an option
and select “What’s This?” from the menu that appears.
When you finish configuring router options, click OK.
10. Close Routing and Remote Access.
In addition to using Routing and Remote Access, you can use System
Monitor, a Performance tool, to monitor the IP object and its many coun-
ters. In particular, the Datagrams Forwarded/sec counter is helpful for deter-
mining how many packets your router has forwarded. You can also use
System Monitor to determine if your Windows 2000 Server computer that
is functioning as a router has adequate memory, processor, and disk resources.
CROSS-REFERENCE
I’ll cover how to use System Monitor in Chapter 21.
will trace the communications path between the two computers, and then
display the trace information.
The Routing and Remote Access administrative tool is also helpful for
troubleshooting TCP/IP routing problems. By using this tool you can
view the status of the server that’s functioning as a router, determine
whether the Routing and Remote Access service is started, and determine
whether Routing and Remote Access is enabled on that server. If the ser-
vice is not started, you can use the Services tool in Computer Manage-
ment to start the Routing and Remote Access service. If Routing and
Remote Access has been disabled for some reason, you can use the
Routing and Remote Access tool to enable it.
You can also use Routing and Remote Access to verify that the routing
protocols appropriate for your network are installed and configured cor-
rectly. In addition, you can verify that each routing protocol is configured
to use the appropriate routing interface(s) on the computer.
STEP BY STEP
To enable TCP/IP filtering on this computer, select the check box next to “Enable
TCP/IP Filtering (All adapters).”
Then, to specify the types of traffic that will be permitted, select either the Permit
All or Permit Only option for TCP Ports, UDP Port, and IP Protocols. If you select
the Permit Only option, you must specify the types of traffic that will be accepted
by this computer. If you select Permit Only and don’t specify the type of traffic
that will be accepted, no traffic of that type will be accepted by the computer.
4701-1 ch16.f.qc 4/24/00 09:42 Page 1114
For example, if you select Permit Only for TCP Ports, you must specify the actual
port numbers of all TCP ports that will be accepted by this computer.
TIP
To configuring packet filtering for IP protocols, you must specify each
allowed IP protocol by its associated protocol number. If you don’t know
what number is assigned to a protocol, you can use Notepad to view the
SystemRoot\system32\drivers\etc\protocol file, or you
can consult RFC 1700, “Assigned Numbers.”
STEP BY STEP
6. Repeat Steps 4 and 5 until you’ve added all of the filters you need for this interface.
7. Then, if you’re creating an input filter, choose one of the following options that
specify how the filters you’ve created will be applied to this interface:
Receive all packets except those that meet the criteria below
Drop all packets except those that meet the criteria below.
Or, if you’re creating an output filter, choose one of the following options that
specify how the filters you’ve created will be applied to this interface:
Transmit all packets except those that meet the criteria below
Drop all packets except those that meet the criteria below.
Select the appropriate option and click OK.
8. In the Properties dialog box for the interface, click OK.
9. Close Routing and Remote Access.
EXAM TIP
Expect to see several tough IPSec questions on the Network exam. Be
sure you know how to create and configure IPSec policies, rules, and fil-
ters, and that you know when to use transport mode and tunnel mode.
I recommend you practice configuring these elements before taking
the exam.
4701-1 ch16.f.qc 4/24/00 09:42 Page 1116
There are a couple of IPSec terms you should be familiar with: transport
mode and tunnel mode. IPSec is implemented in one of these two modes.
IPSec’s default mode is transport mode. In this mode, IPSec encrypts the
data portion of each IP packet, and then sends the IP packet to the destina-
tion computer.This mode is typically used on a company’s internal network.
IPSec can be configured to use tunnel mode. Tunnel mode is typically
used between two routers that are connected via a public network such as
the Internet. Tunnel mode is very similar to a VPN, and is often used for
the same reasons. In tunnel mode, IPSec first encrypts the entire IP packet.
Then, IPSec uses the encrypted packet as the data portion of a new IP
packet that it creates and sends, usually over the Internet, to the destination
computer.The original IP packet is said to be “tunneled” within the new
IP packet.
In the following sections I’ll explain how to enable IPSec, how to create
and customize IPSec policies, and how to configure IPSec for tunnel
mode. Finally, I’ll cover monitoring and troubleshooting IPSec.
Enabling IPSec
IPSec is not enabled by default. IPSec is implemented in Windows 2000 as
a security policy. Because of this, the tool you use to enable IPSec depends
on which computer(s) on your network you want to enable IPSec for:
■ To enable IPSec on an individual Windows 2000 computer, you
can configure the advanced TCP/IP settings for any Local Area
Connection in the Network and Dial-up Connections
folder, or you can use the Local Security Policy tool in Adminis-
trative Tools. (Select Start ➪ Settings ➪ Control Panel, double-click
Administrative Tools, then double-click Local Security Policy.) Or,
you can use the local Group Policy editor (gpedit.msc).
■ To enable IPSec on all Windows 2000 computers in a domain, you
can use the Domain Security Policy tool in Administrative Tools.
(Select Start ➪ Programs ➪ Administrative Tools ➪ Domain Security
Policy.) This tool is available on Windows 2000 domain controllers,
or on other Windows 2000 computers that have the ADMINPAK
installed.
4701-1 ch16.f.qc 4/24/00 09:42 Page 1117
STEP BY STEP
Secure Server (Require Security): If you select this policy, the computers
in the domain or OU (to which this GPO applies) will use IPSec for all com-
munication with other computers. Other computers on the network that don’t
have IPSec enabled won’t be able to communicate with the computers to
which this GPO applies.
Server (Request Security): If you select this policy, the computers in the
domain or OU (to which this GPO applies) will use IPSec for all communica-
tion with other computers in the domain or OU. Other computers on the net-
work that don’t have IPSec enabled will be able to communicate with the
computers to which this GPO applies.
TIP
A Windows 2000 computer can have only one IPSec policy.
In the right pane, right-click the policy you want to assign, and select Assign from
the menu that appears.
7. Close the Group Policy dialog box.
8. In the domain or OU’s Properties dialog box, click OK.
9. Close Active Directory Users and Computers.
in which rules are applied — Windows 2000 determines this order. Each
rule contains several IPSec configuration settings:
■ IP Filter: When you configure a rule, you choose an IP filter that
spells out what specific type of IP traffic this IPSec rule applies to.
■ IP Filter Action: You also choose a filter action, which deter-
mines whether IPSec will either require encryption of the IP
traffic specified by the filter, request encryption of this traffic, or
permit unencrypted traffic.
■ Authentication Method: This setting involves selecting how this
computer will authenticate itself to the destination computer.
There are three methods: the Windows 2000 default method
(Kerberos V5 protocol), using a certificate from a specified certifi-
cate authority, and using a predetermined encryption key.
■ Tunnel Setting: This option specifies whether IPSec will be used
in transport mode or tunnel mode. By default, IPSec is used in
transport mode. If tunnel mode is used, you must specify the IP
address of the destination computer with which the tunnel will
be established.
■ Connection Type: This setting specifies whether this rule applies
to all network connections, only to local area connections, or only
to remote access connections.
Now that you have a better understanding of the contents of an IPSec
policy, I’ll show you how to create and customize one.
STEP BY STEP
5. The Group Policy dialog box appears. Click the + next to the Windows
Settings folder in the Computer Configuration section. Then click the + next
to Security Settings. Right-click IP Security Policies on Active Directory, and
select Create IP Security Policy from the menu that appears.
6. The IP Security Policy Wizard starts. Follow the instructions presented on-screen
to create the IPSec policy.
Once you’ve created the new IPSec policy,Windows 2000 prompts you
to edit and customize this policy.The following steps explain how to cus-
tomize any IPSec policy.
STEP BY STEP
Select the appropriate method, make any additional configurations needed, and
click Next.
11. The IP Filter List screen appears, as shown in Figure 16-35.
Either select the IP filter you want this rule to use, or click Add to create a new fil-
ter. You can create a filter that specifies an IP protocol, a TCP or UDP source or
destination port, a source IP address (or IP address range), or a destination IP
address (or IP address range). You can create a complex filter that combines one
or more of these options. In addition, when you create a new IP filter, the filter will
be available for all IPSec rules, not just this one. When you finish selecting or cre-
ating an IP filter, click Next.
12. The Filter Action screen appears, as shown in Figure 16-36. Notice the three
default filter actions you can select from: Permit, Request Security (Optional),
and Require Security.
Either select the filter action you want this rule to use, or click Add to create a
new filter action. When you finish selecting or creating a filter action, click Next.
13. The Completing the New Rule Wizard screen appears. If you need to edit the rule
you’ve just created, accept the default selection in the check box next to “Edit
properties.” If you don’t want to edit this rule, clear this check box. Click Finish.
14. If you accepted the default selection in the previous step, the rule’s Properties
dialog box appears, as shown in Figure 16-37.
Notice the five tabs in this dialog box: IP Filter List, Filter Action, Authentication
Methods, Tunnel Setting, and Connection Type. Edit this rule as desired, and
click OK.
4701-1 ch16.f.qc 4/24/00 09:42 Page 1124
15. The IPSec policy’s Properties dialog box reappears. Ensure that the check box
next to each rule you want this policy to use is selected. These rules are displayed
in the order they are created — not necessarily in the order that Windows 2000
will apply them. Click Close.
16. Close Group Policy. In the domain or OU’s Properties dialog box, click OK. Close
Active Directory Users and Computers.
Monitoring IPSec
Windows 2000 includes a nice tool for monitoring IPSec — it’s called IP
Security Monitor.You can use IP Security Monitor to:
■ Determine whether IPSec is enabled on the monitored Windows
2000 computer (this can either be the local computer on which
you run IP Security Monitor, or a remote computer specified
when you start IP Security Monitor).
4701-1 ch16.f.qc 4/24/00 09:42 Page 1125
STEP BY STEP
By default, the statistics in this dialog box are updated every 15 seconds. To
change this frequency, click Options and enter the number of seconds you want
IP Security Monitor to wait between refreshes.
When you finish monitoring IPSec, close the IP Security Monitor dialog box.
Troubleshooting IPSec
If you use the default policies and default rules when configuring IPSec,
it’s not likely that you’ll run into too many problems. However, if you cre-
ate custom rules, IP filters, filter actions, and so on, things can become
pretty complex, and even confusing. If you’re having problems getting
IPSec up and running on your Windows 2000 network, here are a few tips
that might help:
■ Use IP Security Monitor to determine whether IPSec is enabled
on a Windows 2000 computer, and whether IPSec security is being
used for this computer’s communications with other computers.
■ If you’ve recently implemented an IPSec policy on a Windows
2000 computer, but IPSec is either not enabled or IPSec security
is not being used by this computer, try rebooting the computer
before performing more complex troubleshooting actions.
■ If you enable IPSec by using Group Policy, but IPSec is not
enabled on the intended computers, follow standard Group Policy
troubleshooting methods to ensure that Group Policy (including
IPSec policy) is being applied appropriately.
■ If you’ve customized one or more of the three default IPSec poli-
cies, and you want to restore these policies to their original configu-
rations, you can highlight IP Security Policies on Active Directory
(in Group Policy editor) and select Action ➪ All Tasks ➪ Restore
Default Policies.
■ If multiple administrators can edit IPSec policies and you’re concer-
ned that the policies may be corrupt, you can check the integrity of
these policies by highlighting IP Security Policies on Active Directory
(in Group Policy editor) and select Action ➪ All Tasks ➪ Check Policy
4701-1 ch16.f.qc 4/24/00 09:42 Page 1127
1129
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about TCP/IP and to help you prepare for the Professional,
Server, and Network exams:
■ Assessment questions: These questions test your knowledge of
the TCP/IP topics covered in this chapter.You’ll find the answers
to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge
you to apply your understanding of the material to solve a hypo-
thetical problem. In this chapter’s scenarios, you are asked to ana-
lyze TCP/IP, DHCP,WINS, routing, and IPSec configurations or
problems.You don’t need to be at a computer to do scenarios.
Answers to this chapter’s scenarios are presented at the end of this
chapter.
■ Lab Exercises: These exercises are hands-on practice activities
that you perform on a computer.The two labs in this chapter give
you an opportunity to practice configuring TCP/IP, installing and
configuring DHCP and WINS, configuring routing, and enabling
IPSec.
Assessment Questions
1. You are manually configuring TCP/IP addressing information on a
Windows 2000 Professional computer on your network.What should
you enter in the “Default gateway” text box?
A. The IP address of a WINS server on the local network segment
B. The IP address of a router on the local network segment
C. The local network segment’s subnet mask
D. The local network segment’s network ID
2. You just finished installing the Dynamic Host Configuration Protocol
(DHCP) service on a Windows 2000 Server computer that is a domain
controller on your network.What must you do before the DHCP ser-
vice can start?
4701-1 ch16.f.qc 4/24/00 09:42 Page 1130
1130
1131
Scenarios
In this chapter I introduced you to numerous TCP/IP and TCP/IP-related
topics. Here’s your chance to tackle a few situations you might encounter
in real life. For each of the following problems, consider the given facts and
answer the question or questions that follow.
1. Users of two computers on your Windows 2000 network report that
they are unable to communicate with other computers on the net-
work. Figure 16-39 shows the configuration of several components
on this network subnet.
4701-1 ch16.f.qc 4/24/00 09:42 Page 1132
1132
Ethernet
1133
Lab Exercises
Lab 16-1 Configuring TCP/IP
Professional
Server
EXAM
MATERIAL
Network
1134
CAUTION
If you’re on a live company network, changing your computer’s IP
address could cause TCP/IP communications problems on the network,
so you may not want to perform this step.
Click Advanced.
5. In the Advanced TCP/IP Settings dialog box, click the Options tab.
6. On the Options tab, highlight TCP/IP filtering and click Properties.
7. In the TCP/IP Filtering dialog box, select the check box next to
“Enable TCP/IP Filtering (All adapters).”Then, in the IP Protocols
section, select the Permit Only option, and click Add.
8. In the Add Filter dialog box, type 6 in the IP Protocol text box.
Click OK.
9. In the TCP/IP Filtering dialog box, in the IP Protocols section,
click Add again.
10. In the Add Filter dialog box, type 17 in the IP Protocol text box.
Click OK.
11. In the TCP/IP Filtering dialog box, in the IP Protocols section,
click Add again.
12. In the Add Filter dialog box, type 1 in the IP Protocol text box.
Click OK.
13. In the TCP/IP Filtering dialog box, notice that three protocols are
listed in the IP Protocols section.You have just configured a filter that
permits only IP traffic that uses the ICMP (1),TCP (6), and UDP
(17) protocols. Click OK.
14. In the Advanced TCP/IP Settings dialog box, click OK.
15. In the Internet Protocol (TCP/IP) Properties dialog box, click OK.
4701-1 ch16.f.qc 4/24/00 09:42 Page 1135
1135
16. In the Local Area Connection Properties dialog box, click OK.
17. In the Local Network dialog box, click Yes to restart your computer
now. Boot your computer to Windows 2000 Server and log on as
Administrator to perform the next lab.
1136
5. In the Networking Services dialog box, select the check boxes next to
Dynamic Host Configuration Protocol (DHCP) and Windows
Internet Name Service (WINS), and click OK.
6. In the Windows Components Wizard dialog box, click Next.
7. When prompted, insert your Windows 2000 Server compact disc into
your computer’s CD-ROM drive and click OK.When the Microsoft
Windows 2000 CD dialog box appears, close it.Windows 2000 con-
figures components and installs DHCP and WINS. In the Completing
the Windows Components Wizard screen, click Finish.
8. Close Add/Remove Programs.Then close Control Panel. Remove
your Windows 2000 Server compact disc from your computer’s
CD-ROM drive.
1137
1138
26. In the Activate Multicast Scope screen, select Yes. Click Next.
27. In the Completing the New Multicast Scope Wizard screen, click
Finish.
28. Windows 2000 creates the multicast scope. It is displayed in the right
pane of the DHCP dialog box. Click the + next to Superscope
Superscope 0. Click the + next to Scope 192.168.59.0. Highlight
Address Leases.The right pane is probably empty right now, but nor-
mally, after the DHCP server has been up and running for a while,
and clients have been configured to obtain their IP addressing infor-
mation from the DHCP server, there will be several leases listed.
29. In the left pane, right-click server01.domain1.mcse and select Display
Statistics from the menu that appears.
30. Notice the DHCP server statistics that are displayed. Click Close.
31. Close DHCP.
1139
1140
1141
19. In the Dial Out Credentials screen, enter a user name of Adminis-
trator, a domain name of domain1, and a password of password.
Confirm the password by retyping it. Click Next.
20. In the “Completing the demand-dial interface wizard” screen,
click Finish.
21. In the left pane of the Routing and Remote Access dialog box, right-
click Routing Interfaces, and select New Demand-dial Interface from
the menu that appears.
22. The Demand Dial Interface wizard starts. Click Next.
23. In the Interface Name screen, type in a name of Internet. Click
Next.
24. In the Connection Type screen, accept the default option of
“Connect using a modem, ISDN adapter, or other physical device.”
Click Next.
25. In the “Select a device” screen, select “Standard 56000 bps V90
Modem” from the list. Click Next.
26. In the Phone Number screen, type in 5559998. Click Next.
27. In the Protocols and Security screen, accept the default selection and
click Next.
28. In the Dial Out Credentials screen, enter a user name of Adminis-
trator, a domain name of ISP, and a password of password. Confirm
the password by retyping it. Click Next.
29. In the “Completing the demand-dial interface wizard” screen, click
Finish.
30. In the left pane of the Routing and Remote Access dialog box, right-
click General (under IP Routing), and select New Routing Protocol
from the menu that appears.
31. In the New Routing Protocol dialog box, highlight Open Shortest
Path First (OSPF) and click OK.
32. In the left pane of the Routing and Remote Access dialog box, right-
click General (under IP Routing), and select New Routing Protocol
from the menu that appears.
33. In the New Routing Protocol dialog box, highlight Network Address
Translation (NAT) and click OK.
4701-1 ch16.f.qc 4/24/00 09:43 Page 1142
1142
34. In the left pane of the Routing and Remote Access dialog box, right-
click Network Address Translation (NAT), and select Properties from
the menu that appears.
35. In the Network Address Translation (NAT) Properties dialog box,
select the “Log the maximum amount of information” option and
click OK.
36. In the left pane of the Routing and Remote Access dialog box, right-
click Network Address Translation (NAT), and select New Interface
from the menu that appears.
37. In the New Interface for Network Address Translation (NAT) dialog
box, select Local Area Connection and click OK.
38. In the Network Address Translation Properties – Local Area
Connection dialog box, ensure that the “Private interface connected
to private network” option is selected. Click OK.
39. In the left pane of the Routing and Remote Access dialog box, right-
click Network Address Translation (NAT), and select New Interface
from the menu that appears.
40. In the New Interface for Network Address Translation (NAT) dialog
box, select Internet and click OK.
41. In the Network Address Translation Properties – Internet dialog box,
ensure that the “Public interface connected to the Internet” option is
selected, and that the check box next to “Translate TCP/UDP head-
ers” is also selected. Click OK.
42. In the left pane of the Routing and Remote Access dialog box, right-
click OSPF, and select Properties from the menu that appears.
43. In the OSPF Properties dialog box, click the Areas tab.
44. On the Areas tab, click Edit.
45. In the OSPF Area Configuration dialog box, click the Ranges tab.
46. On the Ranges tab, enter a Destination of 192.168.0.0 and a
Network mask of 255.255.0.0 and click Add. Click OK.
47. On the Areas tab, click Add.
48. In the OSPF Area Configuration dialog box, enter an Area ID of
10.200.0.0 and click the Ranges tab.
49. On the Ranges tab, enter a Destination of 10.200.0.0 and a Network
mask of 255.255.0.0 and click Add. Click OK.
4701-1 ch16.f.qc 4/24/00 09:43 Page 1143
1143
1144
2. In the left pane of the Domain Security Policy dialog box, highlight
IP Security Policies on Active Directory. In the right pane, right-click
Server (Request Security) and select Properties from the menu that
appears.
3. In the Server (Request Security) Properties dialog box, click Add.
4. The Create IP Security Rule wizard starts. Click Next.
5. In the Tunnel Endpoint screen, select the “The tunnel endpoint is
specified by this IP address” option.Then enter an IP address of
192.168.200.1 and click Next.
6. In the Network Type screen, accept the default option of “All net-
work connections” and click Next.
7. In the Authentication Method screen, click Next.
8. In the IP Filter List screen, click Add.
9. In the IP Filter List dialog box, type in a name of Tunnel Mode and
a description of All IP traffic for remote network and click Add.
10. The IP Filter wizard starts. Click Next.
11. In the IP Traffic Source screen, select a source address of “Any IP
address” from the drop-down list box. Click Next.
12. In the IP Traffic Destination screen, select a destination address of “A
specific IP subnet” from the drop-down list box.Then enter an IP
address of 192.168.240.0 and a subnet mask of 255.255.255.0 and
click Next.
13. In the IP Protocol Type screen, select a protocol type of Any from the
drop-down list box. Click Next.
14. In the Completing the IP Filter Wizard screen, ensure that the “Edit
properties” check box is cleared, and click Finish.
15. In the IP Filter List dialog box, click Close.
16. In the IP Filter List screen in the Security Rule Wizard, select the
Tunnel Mode filter from the IP filter lists box. Click Next.
17. In the Filter Action screen, select Require Security. Click Next.
18. In the Completing the New Rule Wizard screen, ensure that the
“Edit properties” check box is cleared and click Finish.
19. In the Server (Request Security) Properties dialog box, notice the
new Tunnel Mode rule that you created is displayed and selected.
Click Close.
4701-1 ch16.f.qc 4/24/00 09:43 Page 1145
1145
20. In the right pane of the Domain Security Policy dialog box, right-
click Server (Request Security) and select Assign from the menu that
appears.
21. Close Domain Security Policy.
22. Select Start ➪ Run.
23. In the Run dialog box, type secedit /refreshpolicy machine_
policy and click OK.
24. Select Start ➪ Run.
25. In the Run dialog box, type ipsecmon server01 and click OK
26. The IP Security Monitor on server01 dialog box appears. Notice in
the lower right corner of this dialog box that IP Security is enabled
on this computer.View the various IPSec statistics displayed in this
dialog box. Close IP Security Monitor.
1146
Assessment Questions
1147
Scenarios
1. The problem in this situation is that Client_A has the same IP address
as Client_C. Duplicate IP addresses are not permitted.To resolve the
problem, you should change either Client_A’s or Client_C’s IP address
so that it is a unique IP address.
2. The most likely cause of this problem is that the DHCP server has
not been authorized in Active Directory. Until the DHCP server is
authorized, the DHCP service won’t start on the server.You should
use the DHCP administrative tool to authorize the DHCP server in
Active Directory.
3. The most likely cause of this problem is that the OU is configured
to block policy inheritance, or has a conflicting GPO.You should
reconfigure Group Policy on the OU so that inheritance is no longer
blocked, or that the conflicting GPO for the OU is removed, reorder-
ed, or reconfigured.
4. You should select a replication type of Pull for both servers. In addi-
tion, you might want to schedule WINS replication to occur during
nonbusiness hours.
5. The most likely cause of this problem is that the Windows 98 com-
puter is not configured to use the WINS server for NetBIOS name
resolution.You should configure the Windows 98 computer to use
the WINS server by specifying the IP address of your WINS server.
6. You should use the tracert.exe command-line utility to view the
path through the network that attempted communication from your
computer is taking, and to determine where network communication
stops.Then you’ll know which router is failing to correctly forward
TCP/IP packets to the remote server.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1148
Server
EXAM Network
MATERIAL
EXAM OBJECTIVES
C HAP TE R
17
Managing Remote Access
1149
4701-1 ch17.f.qc 4/24/00 09:44 Page 1150
Chapter Pre-Test
1. What is a virtual private network (VPN) connection?
2. How do PPTP and L2TP differ from each other?
3. Which transport protocols are supported by the Routing and
Remote Access service?
4. What is a multilink connection?
5. What kinds of ports are supported by the Routing and Remote
Access service?
6. What is a remote access policy?
4701-1 ch17.f.qc 4/24/00 09:44 Page 1151
EXAM TIP
Remote access is a complex topic. Even administrators who manage
remote access servers on a daily basis are well advised to study the
details and nuances presented in this chapter before taking the Server or
Network exam.
PPTP or L2TP. Both of these protocols support encryption of the data sent
over the VPN connection. Because a VPN uses an existing TCP/IP network
connection, no additional hardware is required.VPN connections are com-
monly used between two computers that communicate over the Internet.
TIP
If you plan to use L2TP VPN connections, you must install computer
(machine) certificates on both the Windows 2000 remote access server
and the remote access client. For more information on Certificate
Services, see Chapter 18.
STEP BY STEP
7. In the IP Address Assignment screen, select the method you want to use for
assigning IP addresses to remote access clients. Your choices are “Automatically”
(this is the default setting), or “From a specified range of addresses.” Select
Automatically if you use a DHCP server on your network. Click Next.
TIP
If you choose to use a DHCP server to assign IP addresses to Remote
Access clients, and the DHCP service is not installed on the Remote
Access Server, you must install the DHCP Relay Agent on the Remote
Access server to enable remote clients to receive IP Addresses from
your DHCP server.
8. In the Managing Multiple Remote Access Servers screen, choose whether this
remote access server will authenticate remote access clients directly, or will use a
RADIUS server for client authentication. If you choose to use a RADIUS server,
you will be prompted for a primary and alternate RADIUS server host name and
for a shared secret password that this server will use to connect to the RADIUS
server. Make your selection and click Next.
9. In the Completing the Routing and Remote Access Server Setup Wizard screen,
click Finish.
10. If you chose to use a DHCP server for IP address assignments in Step 7, and this
server is not a DHCP server, a warning dialog box appears, indicating that you
must install and configure the DHCP Relay Agent on this server. (See Chapter 16
for information on installing and configuring this routing protocol.) Click OK.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1157
11. Windows 2000 starts the Routing and Remote Access service. Your Windows
2000 Server computer is now configured as a remote access server (or a VPN
server). Close Routing and Remote Access.
STEP BY STEP
4. A Routing and Remote Access warning message appears, indicating that the
router must be stopped and restarted. Click Yes.
5. Windows 2000 stops and restarts the Routing and Remote Access service.
Close Routing and Remote Access.
Once remote access is enabled, you want to configure it, and you’ll cer-
tainly want to add and configure inbound connection ports. I’ll describe
how to perform these tasks in the following sections.
STEP BY STEP
installed on the server, and event logging. I’ll discuss each of these proper-
ties in the following sections.
Configuring Security
You can configure an authentication provider and an accounting provider
on the Security tab in a Windows 2000 remote access server’s Properties
dialog box.You can also select the authentication methods this server will
use. Figure 17-3 shows the Security tab.
The first item you can configure on this tab is a check box that enables
IP routing on the remote access server. Select this check box to enable
remote access clients to access services on the network (to which the
remote access server is connected) by using TCP/IP. If you clear this check
box (which is selected by default), remote access clients will only be able to
use TCP/IP to access resources on the remote access server.
The next item you can configure on this tab is the “Allow IP-based
remote access and demand-dial connections” check box. If you clear this
check box (which is selected by default), remote access clients won’t be
able to use TCP/IP to connect to the remote access server.
The next configuration option determines how the remote access server
assigns IP addresses to remote access clients. If you select the Dynamic Host
Configuration Protocol (DHCP) option, the remote access server will be
configured for integration with the DHCP server on the network, and the
DHCP server (not the remote access server) will automatically assign IP
addresses to remote access clients. If you select this option and a DHCP
server is not available when a remote access client connects, the remote
access server will assign an IP address to the client by using the Windows
2000 automatic private IP addressing feature. If you select the “Static address
pool” option, you can specify one or more ranges of IP addresses that the
remote access server will use to assign to remote access clients.
Finally, in the Adapter drop-down list box, either select the Local Area
Connection you want the remote access server to use to obtain DHCP,
DNS, and WINS addresses for remote access clients, or select the option
that enables the remote access server to automatically select a connection.
Configuring IPX
You can configure several IPX settings on the IPX tab in a Windows 2000
remote access server’s Properties dialog box.This tab is only available when
the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol is
installed on the remote access server. Figure 17-6 shows the IPX tab.
The first item you can configure on this tab is the “Allow IPX-based
remote access and demand-dial connections” check box. If you clear this
check box (which is selected by default), remote access clients won’t be
able to use IPX-based protocols, such as NWLink IPX/SPX/NetBIOS
Compatible Transport Protocol, to connect to the remote access server.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1164
The next item you can configure is a check box that enables network
access for remote clients and demand-dial connections. Selecting this
check box enables IPX routing on the remote access server.This check box
is selected by default. Select this check box if remote access clients will
access services on the network to which the remote access server is con-
nected by using an IPX-based protocol. If you clear this check box, remote
access clients will only be able to use IPX to access resources on the
remote access server, but not the network.
The next several options control how the remote access server assigns
IPX network and node numbers to remote access clients.You can either
configure the remote access server to automatically assign IPX network
numbers, or configure the server to assign these numbers from a prede-
fined range.
You can configure the remote access server to use the same IPX net-
work number for all IPX remote access clients. (This option is selected by
default.) If you clear this check box, the remote access server will assign a
different IPX network number to each remote access client.
Finally, you can configure the remote access server to permit remote
access clients to request a specific IPX node number.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1165
Configuring NetBEUI
There are a couple of configurable options on the NetBEUI tab in a
Windows 2000 remote access server’s Properties dialog box. This tab is
only available when NetBEUI is installed on the remote access server.
Figure 17-7 shows the NetBEUI tab. Notice that by default, remote access
clients that use NetBEUI are permitted to access the remote access server
and the entire network to which the remote access server is connected.
Configuring AppleTalk
There is only one configurable option on the AppleTalk tab in a Windows
2000 remote access server’s Properties dialog box.This tab is only available
when the AppleTalk protocol is installed on the remote access server.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1166
Configuring PPP
You can configure several PPP settings on the PPP tab in a Windows 2000
remote access server’s Properties dialog box. Figure 17-8 shows the PPP
tab. Notice that all of the options in this dialog box are selected by default.
There are three levels of event logging you can select from: log errors
only (this setting logs the least amount of information), log errors and
warnings, and log the maximum amount of information. These logging
events are written to the System log, which you can view by using Event
Viewer. Or, you can disable event logging altogether.
Finally, you can choose whether to enable Point-to-Point Protocol
(PPP) logging. If you select this check box, the remote access server will
log information about the establishment of all PPP connections to the
SystemRoot\Tracing\ppp.log file on the remote access server. If you
select this option, you must stop and restart the Routing and Remote
Access service before PPP logging will occur.
PPP logging can be used as an advanced troubleshooting tool when
remote access clients are unable to establish PPP connections with the
remote access server.You can use Notepad or your favorite text editor to
view the ppp.log file.
CROSS-REFERENCE
For more information on using Add/Remove Hardware, see Chapter 5.
For detailed steps on installing and configuring modems by using Phone
and Modem Options, see Chapter 15.
You can view and modify the configurable properties of all remote
access ports (both hardware and VPN) by using Routing and Remote
Access. However, not all options are available for each port type.
STEP BY STEP
FIGURE 17-12 Remote access server configured to support 256 L2TP ports
STEP BY STEP
You can also use Routing and Remote Access to configure or edit any
existing remote access policy.
STEP BY STEP
In the following sections I’ll show you how to specify conditions for a
remote access policy, how to configure remote access permission options,
and how to configure a profile for a remote access policy. I’ll also discuss
the order in which multiple remote access policies are applied.
Condition Description
STEP BY STEP
There are numerous options you can configure in this dialog box:
Allow access: Select this option if you want to permit this user to connect
to the remote access server.
Deny access: Select this option if you want to prevent this user from con-
necting to the remote access server.
Control access through Remote Access Policy: Select this option if you
want the remote access policy — not the user account — to determine whether
the user can connect to the remote access server.
TIP
Remote access permissions configured in a user’s properties dialog box
override permission settings in a remote access policy unless the user
account is configured to “Control access through Remote Access Policy.”
Verify Caller-ID: Select this option if you want to prevent the user from
using any telephone number — except the one number you specify — to initiate
a connection with the remote access server. If you select this option, you’ll
need to enter the number from which the user is permitted to connect. Often
this is a user’s home telephone number.
No Callback: Select this option if you want to prevent the user from
requesting that the remote access server break the connection and call the
user back. When this option is selected, it ensures that the user dialing in —
not the server — is billed for any long-distance telephone charges.
Set by Caller (Routing and Remote Access Service only): Select this
option if you want to permit the user to request that the remote access
server break the connection and call the user back at a user-specified tele-
phone number.
Always Callback to: Select this option if you want the remote access
server to automatically break the connection and call the user back at a pre-
specified telephone number. This option provides a measure of security,
because the remote access server will only call the user back at one pre-
specified number. If you select this option, you must specify the telephone
number that the remote access server will call back.
Assign a Static IP Address: Select this option when the user dialing in
requires a specific static IP address. If you select this option, you must specify
an IP address that will be assigned to the user during remote access connec-
tions. This option is often used when a user account is used to authenticate a
demand-dial routing connection.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1178
Apply Static Routes: Select this option if this user account is used to
authenticate a demand-dial routing connection, and you want to specify sta-
tic routes that will be added to the remote router’s routing table when the
connection is established. If you select this option, you must also configure
the static routes.
When you finish configuring options on this tab, click OK.
5. Close Active Directory Users and Computers.
You can specify a remote access policy’s permissions either when you first
create the remote access policy, or later in the policy’s Properties dialog box.
To access the policy’s Properties dialog box in Routing and Remote Access,
see the steps titled “Configuring a Remote Access Policy” in the “Using
Remote Access Policies to Control Access” section earlier in this chapter.
Figure 17-14 shows the Properties dialog box for the default remote access
policy, which is named “Allow access if dial-in permission is enabled.”
As Figure 17-14 shows, there are only two permissions options in this
dialog box:
■ Grant remote access permission: If this option is selected, the
user is permitted to connect to the remote access server as long as
the remote access client meets the policy’s conditions, unless the
user’s account properties are configured to “Deny access.”
■ Deny remote access permission: If this option is selected, the
user is prevented from connecting to the remote access server if the
remote access client meets the policy’s conditions, unless the user’s
account properties are configured to “Allow access.”
CROSS-REFERENCE
Configuring TCP/IP packet filters was covered in Chapter 16.
The options in this dialog box are virtually identical to the authentica-
tion methods that can be configured for the remote access server. If you
need more information on any of the authentication methods listed on this
tab, see the “Configuring Security” section earlier in this chapter.
Configuring Encryption
You can select one or more encryption options that the remote access
client can choose to use on the connection.The remote access client must
use one of the options selected. Figure 17-19 shows the Encryption tab.
Notice the four options on this tab.The last option, Strongest, is only avail-
able after you’ve downloaded and installed the Windows 2000 High
Encryption Pack from the Microsoft Web site (http://www.microsoft.
com/windows2000/downloads/).
Here’s a list of the encryption options and what each specifies:
■ No Encryption: If you select this option, remote access clients
can connect to the remote access server without using any encryp-
tion. If you want to require the remote access client to use encryp-
tion, ensure that this check box is cleared.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1185
■ Basic: If you select this option, remote access clients can use IPSec
56-bit DES or MPPE 40-bit encryption. If the remote access client
uses “basic” encryption, it will use IPSec for all L2TP VPN con-
nections, and Microsoft Point-to-Point Encryption (MPPE) 40-bit
encryption for all other types of remote access connections.
■ Strong: If you select this option, remote access clients can use
IPSec 56-bit DES or MPPE 56-bit encryption. If the remote
access client uses “strong” encryption, it will use IPSec for all L2TP
VPN connections, and MPPE 56-bit encryption for all other types
of remote access connections.
■ Strongest: If you select this option, remote access clients can use
IPSec Triple DES (3DES) or MPPE 128-bit encryption. If the
remote access client uses “strongest” encryption, it will use IPSec
3DES for all L2TP VPN connections, and MPPE 128-bit encryp-
tion for all other types of remote access connections.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1186
To add additional parameters, click Add and select from the numerous
available RADIUS attributes.As you might guess, you only need to config-
ure options on this tab if you’re using a RADIUS server for authentication.
EXAM TIP
After reading a detailed description and a flow chart, you’re probably
getting the idea that how remote access policies are applied is impor-
tant. Make sure you completely understand and memorize this process,
and don’t be surprised if you see a couple of tough exam questions on
this topic.
I want to emphasize that the remote access server processes remote access
policies in the order they’re listed in the Routing and Remote Access console.You
might want to change the order in which policies are applied. Typically,
administrators place the most specific policies at the top of the list, and the
most general policies at the bottom of the list. If you don’t order policies in
4701-1 ch17.f.qc 4/24/00 09:44 Page 1188
this manner, but instead place policies with few conditions at the top of the
list, remote users that have specially configured policies won’t be assigned
these policies because a more general policy will be applied first.
Remote access
client initiates a
connection
Are
there any No Deny the
remote access
connection
policies?
Yes
Examine remote
Go to the next
access policy
policy
conditions
Yes
Yes No
What
Allow access is the remote Deny access Deny the
access permission
connection
for the user?
Does the
remote access No
permission on
the policy allow
access?
Yes
Do the
conditions and
settings in the No
profile match the
conditions of the
connection?
Yes
Apply the profile
settings and
establish the
connection
STEP BY STEP
There are several valuable monitoring tasks you can perform in the
Routing and Remote Access console.You can view the status of the remote
access server, view a list of remote access clients currently connected to the
server, send a pop-up message to one (or all) remote access users, disconnect
a remote user, view the status of a remote access connection, view current
connections by port, and configure remote access logging.
STEP BY STEP
6. To configure remote access logging (so you can later use the log file), in the
left pane of Routing and Remote Access, highlight Remote Access Logging. In
the right pane, double-click Local File.
7. The Local File Properties dialog box appears. On the Settings tab, you can con-
figure the types of information that Windows 2000 will write to the log file. You
can select one or more of these options:
Log accounting requests (for example, accounting start or stop) —
recommended
Log authentication requests (for example, access-accept or access-reject) —
recommended
Log periodic status (for example, interim accounting requests)
On the Local File tab in this dialog box, you can select either a database-compati-
ble file format or an IAS format. If you select the IAS format, Windows 2000 cre-
ates a text file that uses comma-separated values. You can also specify how often
a new log file will be created. Finally, you can select a location in which the log file
will be stored. When you finish configuring logging, click OK.
To view log files created in IAS format, use Notepad or any text editor.
8. Close Routing and Remote Access.
In addition to using Routing and Remote Access, you can use System
Monitor, a Performance tool, to monitor the performance of the Windows
2000 remote access server. Remote access objects include RAS Port and
RAS Total. Each of these objects has multiple counters associated with it.
You can also use System Monitor to determine if your Windows 2000
remote access server has adequate memory, processor, and disk resources.
CROSS-REFERENCE
I’ll cover how to use System Monitor in Chapter 21.
While these features make the service very flexible, they can also make
troubleshooting difficult when problems arise.
Table 17-2 lists some of the more common remote access problems you
may encounter and some possible solutions to these problems.
TABLE 17-2 Remote Access Problems and Solutions
Problem Recommended Solution
A remote access client can’t If the remote access client is using a modem, verify
establish a connection with that the correct telephone number is being dialed. If
a Windows 2000 remote the modem doesn’t have a speaker, use a regular
access server. telephone to dial the remote access server and verify
that a modem answers.
If the client is attempting to establish a
VPN connection, make sure your Internet connection
is working properly by pinging the FQDN of the VPN
server.
A remote access user is Ensure that the user has typed the user name and
denied access by the remote password correctly (remember, passwords are case-
access server after the user sensitive).
provides a user name and Verify that the user has remote access permissions.
password. Verify that there is at least one remote access policy
defined on the remote access server.
Verify that a remote access policy applies to this user,
and that the policy’s permission setting grants access.
You’ve configured Callback Make sure that the correct “Always Callback to”
but the remote access server telephone number is configured on the Dial-in tab in
isn’t calling the client back. the user’s Properties dialog box.
Verify that LCP extensions are enabled on the PPP tab
in the remote access server’s Properties dialog box.
When a remote access client Ensure that computer (machine) certificates are
uses L2TP to initiate a VPN installed on both the remote access server and the
connection, the user is unable remote access client.
to connect. However, the (Certificate Services is covered in Chapter 18.).
remote access client can
establish a VPN connection
by using PPTP.
A remote access client can Ensure that the IPX protocol has been installed and
access a Web server on the configured on both the remote access client and the
remote access server’s local remote access server.
area network, but can’t Ensure that the “Enable network access for remote
access a NetWare server on access clients and demand-dial connections” check
that network. box is selected on the IPX tab in the remote access
server’s Properties dialog box.
Continued
4701-1 ch17.f.qc 4/24/00 09:44 Page 1194
A remote access client can Make sure that the network protocol used by the
connect to the remote access remote access client is installed and configured on the
server, but can’t access remote access server.
resources on the remote If the remote access client is using TCP/IP, ensure that
access server’s local area the “Enable IP routing” check box is selected on the IP
network. tab in the remote access server’s Properties dialog box.
If the remote access client is using NetBEUI, ensure
that the “Allow NetBEUI based remote access clients to
access” check box and the “The entire network” option
are selected on the NetBEUI tab in the remote access
server’s Properties dialog box.
If the remote access client is using AppleTalk, ensure
that the “enable AppleTalk remote access” check box is
selected on the AppleTalk tab in the remote access
server’s Properties dialog box.
■ The connection protocols Windows 2000 supports for remote access include
Point-to-Point Protocol (PPP), Point-to-Point Multilink Protocol, Point-to-Point
Tunneling Protocol, Layer Two Tunneling Protocol (L2TP), Serial Line Internet
Protocol (SLIP), and the Microsoft RAS protocol (also called AsyBEUI).
■ You can use Routing and Remote Access to configure numerous properties
of a Windows 2000 remote access server, including: security options, PPP
options, event logging options, and specific remote access options for
installed protocols, such as TCP/IP, IPX, NetBEUI, and AppleTalk.
■ RADIUS is an industry standard authentication service. IAS, which stands for
Internet Authentication Service, is a Windows 2000 Server service that
enables a Windows 2000 Server computer to function as a RADIUS server.
■ You can also use Routing and Remote Access to configure inbound connec-
tion ports for remote access, which may include hardware ports (such as
modems, parallel ports, infrared ports, and so on) and VPN ports, including
PPTP and L2TP ports.
■ In Windows 2000, access to the remote access server is controlled by remote
access policies. A remote access policy consists of conditions, permissions,
and a profile.
■ A user can connect to a Windows 2000 remote access server only if a remote
access policy permits the user to do so.
■ Remote access policies are not stored in Active Directory. They are stored on
the Windows 2000 remote access server.
■ There are numerous options you can configure in a remote access policy’s pro-
file, including dial-in constraints, IP address assignment options, multilink con-
nection options, authentication methods, encryption options, and advanced
connection attributes.
■ When multiple remote access policies exist, the remote access server selects
the policy to apply to the connection by matching conditions of the connection
to conditions of a remote access policy. Remote access policies are examined
by the server in the order in which they appear in the Routing and Remote
Access console.
■ You can use Routing and Remote Access to monitor many aspects of remote
access, including server status, ports, and connections. You can also configure
logging of remote access events in this console.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1196
1196
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about deploying Windows 2000 and to help you prepare for
the Professional, Server, and Directory Services exams:
■ Assessment Questions: These questions test your knowledge
of the remote access topics covered in this chapter.You’ll find the
answers to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge
you to apply your understanding of the material to solve a hypo-
thetical problem. In this chapter’s scenarios, you are asked to trou-
bleshoot remote access problems and answer the question or
questions listed for each problem.You don’t need to be at a com-
puter to do scenarios.Answers to this chapter’s scenarios are pre-
sented at the end of this chapter.
■ Lab Exercise: These exercises are hands-on practice activities that
you perform on a computer.The lab in this chapter gives you an
opportunity to practice enabling, configuring, and using remote
access.
Assessment Questions
1. Your Windows 2000 domain operates in native-mode.You recently
enabled remote access on a Windows 2000 Server computer on the
network.What must you do before remote access users can connect
to the remote access server?
A. Authorize the Windows 2000 remote access server in Active
Directory.
B. Restart the Windows 2000 remote access server.
C. Change the default remote access policy so that it grants remote
access permission.
D. Change the Windows 2000 remote access server’s authentication
provider to Windows Authentication.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1197
1197
1198
C. The server will deny access to the remote user because the
remote access policy’s profile prohibits connections at 9:00 P.M.
D. The server will deny access to the remote user because both the
condition and profile of the remote access policy prohibit con-
nections at 9:00 P.M.
7. You recently configured encryption options within a profile of
a remote access policy.You only selected the check box next to
“Strongest.”Which encryption method can be used by remote access
clients that establish PPTP VPN connections by using this remote
access policy?
A. IPSec 56-bit DES
B. IPSec 3DES
C. MPPE 56-bit
D. MPPE 128-bit
8. Which tool can you use to add hardware ports to a Windows 2000
remote access server?
A. Routing and Remote Access
B. Add/Remote Programs
C. Add/Remove Hardware
D. Network and Dial-up Connections folder
Scenarios
Troubleshooting remote access on your network can be a difficult task. For
each of the following problems, consider the given facts and answer the
question or questions that follow.
1. A remote user reports that she is initially able to dial up to a Windows
2000 remote access server on your network, but as soon as the con-
nection is established, she receives a message indicating that the remote
access server will call her back.The connection is broken. However,
the user doesn’t receive a call back.What would you do to resolve the
problem?
4701-1 ch17.f.qc 4/24/00 09:44 Page 1199
1199
Lab Exercise
Lab 17-1 Enabling, Configuring, and Monitoring
Remote Access
Server
Networking
EXAM
MATERIAL
1200
1201
10. In the left pane of the Routing and Remote Access dialog box, right-
click the Ports container, and select Properties from the menu that
appears.
11. In the Ports Properties dialog box, highlight WAN Miniport (PPTP)
and click Configure.
12. In the Configure Device – WAN Miniport (PPTP) dialog box, ensure
that the check box next to “Remote access connections (inbound
only)” is selected.To create five additional PPTP ports, change the
“Maximum ports” spin box to 10. Click OK.
13. In the Ports Properties dialog box, notice that the number of WAN
Miniport (PPTP) ports is now 10. Click OK. Continue to Part 2.
1202
12. On the Authentication tab, clear the check box next to “Microsoft
Encrypted Authentication (MS-CHAP).” Ensure that the check box
next to “Microsoft Encrypted Authentication version 2 (MS-CHAP
v2)” is selected. Click the Encryption tab.
13. On the Encryption tab, clear the check box next to No Encryption.
Click OK.
14. In the User Profile screen, click Finish.
15. In the right pane of the Routing and Remote Access dialog box,
right-click the Grant Administrators Dial-in Access policy. Select
Move Up from the menu that appears, so that this policy is the first
policy listed.
16. Close Routing and Remote Access.
17. Select Start ➪ Programs ➪ Administrative Tools ➪ Active Directory
Users and Computers.
18. In the left pane of Active Directory Users and Computers, highlight the
Users folder.Then, in the right pane, right-click the Administrator user
account, and select Properties from the menu that appears.
19. In the Administrator Properties dialog box, click the Dial-in tab.
20. On the Dial-in tab, select the “Control access through Remote Access
Policy.” Click OK.
21. Close Active Directory Users and Computers.
1203
1204
Assessment Questions
1. C. By default, the default remote access policy is configured to deny
remote access permission.You must either modify the default remote
access policy to grant remote access permission, create another remote
access policy that grants permission to remote access users, or config-
ure each remote user account’s dial-in settings to “Allow access.”
2. A, B, D. Remote access policies are composed of conditions, permis-
sions, and a profile.While you can configure encryption options
within a profile, it is not considered a part of the remote access policy.
3. B. Only the Extensible authentication protocol (EAP) has the ability
to support smart cards.
4. A. Microsoft encrypted authentication version 2 (MS-CHAP v2) is
the most secure authentication method.
5. A, C, D, E. All answer choices except encryption can be configured
in the user’s Properties dialog box. Encryption settings are configured
in the profile portion of a remote access policy.
4701-1 ch17.f.qc 4/24/00 09:44 Page 1205
1205
Scenarios
1. Ensure that the correct “Always Callback to” telephone number is
configured on the Dial-in tab in the user’s Properties dialog box, and
instruct the user to only call in from that number. (It’s possible that
the callback telephone number is configured correctly, but the user is
not calling from this telephone number.)
2. The most likely cause of this problem is the remote user is explicitly
denied remote access permission, either on the Dial-in tab in the
user’s Properties dialog box, or by the remote access policy that
applies to the remote user.To enable the remote user to access the
remote access server, either grant the user the “Allow access” permis-
sion on the Dial-in tab, or reconfigure a remote access policy (that
grants remote access permission) to include the user.
3. The most likely cause of this problem is that the remote access client,
the remote access server, or both, are not correctly configured to sup-
port IPX on the remote access connection.To resolve the problem,
ensure that NWLink IPX/SPX/NetBIOS Compatible Transport
Protocol is installed and configured on both the remote access client
and the remote access server.Also ensure that the “Enable network
access for remote access clients and demand-dial connections” check
box is selected on the IPX tab in the remote access server’s Properties
dialog box.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1206
Professional
Server
EXAM
MATERIAL Network
EXAM OBJECTIVES
C HAP TE R
18
Managing Web and
Certificate Services
1207
4701-1 ch18.f.qc 4/24/00 09:45 Page 1208
Chapter Pre-Test
1. List three commonly used components of Internet Information
Services (IIS).
2. Which component of IIS provides Web server functionality to a
Windows 2000 computer?
3. What is Personal Web Manager?
4. What is a virtual directory?
5. What is a virtual server?
6. List three things you can do to increase security of a Windows
2000 Web server.
7. The __________ __________ is a Windows 2000 service that
indexes Web site content and other documents on a Windows
2000 computer so these items can be searched by users.
8. What is Certificate Services?
9. What term is used to refer to an organization that uses a com-
puter to create, issue, and manage certificates, and is also used
to refer to the actual server that performs the task of issuing and
managing certificates?
4701-1 ch18.f.qc 4/24/00 09:45 Page 1209
STEP BY STEP
In the steps that follow, I’ll show you the basics of configuring the
Default Web Site.You can also use these same steps to configure any other
Web site on your Windows 2000 Web server.
STEP BY STEP
Configure the settings on the various tabs to meet your needs. (I’ll discuss each
of these tabs in the rest of this section.) Click OK.
4. Close the Internet Information Services dialog box.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1213
There are numerous tabs in a Web site’s Properties dialog box. On the
Web Site tab, which is shown in Figure 18-2, you can assign one of the
computer’s IP addresses to this Web site.You can also configure the TCP
port number that will be used by Web clients to access this Web site. The
default port number of 80 is used for most Web sites.You can also config-
ure connection limits and connection time-outs on this tab. Windows
2000 Professional computers have a maximum limit of ten connections.
You can also enable logging and select a log file format on this tab.
On the Operators tab, you can specify which user accounts in the
domain can manage this Web site. This tab is not available on Windows
2000 Professional computers.
On the Performance tab, you can configure three performance options
for your Windows 2000 Web server. Figure 18-3 shows the Performance tab.
Use the Performance tuning slider to tune the performance of your Web
server, based on the number of anticipated hits the site will receive each day.
This slider configures the amount of the computer’s RAM that is reserved
for this Web site. If you want to prevent your Web server from using all of
the available bandwidth on its network segment, select the check box next
to “Enable bandwidth throttling” and specify the maximum amount of
4701-1 ch18.f.qc 4/24/00 09:45 Page 1214
bandwidth you want the Web server to use, in kilobytes per second. Finally,
if you want to limit the amount of processor time used by this Web site, you
can select the “Enable process throttling” check box and specify a maximum
percentage of CPU usage. You must also select the check box next to
“Enforce limits,” or the CPU limitation you specified won’t be enforced —
Windows 2000 will simply write an event to the Event log when the limit
is exceeded.
On the ISAPI Filters tab, you can add and order ISAPI filters for the
Web site. An ISAPI filter is a custom Web server application that extends
the capabilities of a Web server.
On the Home Directory tab, you can manage and configure the home
folder for this Web site. Figure 18-4 shows the Home Directory tab. Notice
the path in the Local Path text box.This path specifies the location of the
Web site’s home folder. By default, for the Default Web Site, this is C:\
Inetpub\wwwroot.
On this tab you can configure the location of the home directory.The
home directory for the Web site can be either a folder located on this com-
puter or a shared folder or URL on another computer.You can also spec-
ify Web permissions and application settings for the home directory.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1215
On the Documents tab, you can specify which document will be dis-
played as the Web site’s home page to Web clients. Figure 18-5 shows the
Documents tab.
Notice that you can add and remove documents, and configure the
order of documents on this tab. The document at the top of the list
becomes the default document. If the check box next to “Enable Default
Document” is not selected,Web clients will have to specify the name of the
document they want to access in the URL they type in their browser — if
they don’t specify a document, an error message is displayed.
On the Directory Security tab, you can configure anonymous access
and authentication methods.You can also configure IP address and domain
name restrictions. Finally, you can assign a certificate to the Web site, and
configure secure, encrypted communications between the Web server and
Web clients. I’ll discuss this tab in greater detail in the “Managing Web
Server Security” section later in this chapter.
On the HTTP Headers tab, you can configure content expiration set-
tings, custom HTTP headers, and content ratings for the Web site. An
HTTP header is a value that is appended to all responses from the Web
server to the Web client. Content ratings are used to identify the level of
4701-1 ch18.f.qc 4/24/00 09:45 Page 1216
violence, sex, nudity, and offensive language in the Web site’s content.
These levels range from 0 (least offensive) to 4 (most offensive) for each
category. If you don’t assign content ratings to your Web site, Web clients
who have configured content ratings in their Web browsers won’t be able
to access your Web site.
On the Custom Errors tab, you can specify a custom HTML document
that will be displayed to Web clients when the associated HTTP error
occurs on your Web server. Instead of using the default documents sup-
plied by Microsoft, you can associate a custom document (that perhaps has
a better explanation of the error) with a specific HTTP error number. For
most situations, the default documents are adequate.
The Server Extensions tab is not operational until you configure your
Windows 2000 Web server to use FrontPage Server Extensions.To accom-
plish this task, in the left pane of the Internet Information Services dialog
box, right-click the Default Web Site and select All Tasks ➪ Configure
Server Extensions. Then complete the Server Extensions Configuration
wizard. Once the server is configured to use FrontPage Server Extensions,
you can use the Server Extensions tab to configure Web content authoring
options and security settings.
STEP BY STEP
STEP BY STEP
7. In the “You have successfully completed the Virtual Directory Creation Wizard”
screen, click Finish.
8. Internet Services Manager creates the virtual directory and displays it in the left
pane of the Internet Information Services dialog box under the Web site in which
you created it.
9. If you want to configure the properties of the virtual directory, right-click the virtual
directory and select Properties from the menu that appears. Configuring a virtual
directory is similar to configuring a Web site.
10. Close the Internet Information Services dialog box.
STEP BY STEP
1. On the Windows 2000 Web server, right-click My Computer, and select Explore
from the menu that appears.
2. In the left pane, click the + next to the local drive that contains the folder you want
to designate as a virtual directory. Expand folders until the folder you want to des-
ignate is displayed in the left pane. Right-click this folder, and select Properties
from the menu that appears.
3. In the folder’s Properties dialog box, click the Web Sharing tab.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1221
4. On the Web Sharing tab, select the Web site on the local computer that will con-
tain the virtual directory from the “Share on” drop-down list box. Then select the
“Share this folder” option.
5. In the Edit Alias dialog box, enter the user-friendly name that Web clients will use
to access this virtual directory in the Alias text box. Then select the appropriate
access permissions for the virtual directory. The selected permissions are granted
to all users who access the virtual directory. Click OK.
6. In the folder’s Properties dialog box, click OK.
7. Windows 2000 creates the virtual directory. Close Windows Explorer. (If you
want to configure the properties of the virtual directory, use Internet Services
Manager to do so.)
STEP BY STEP
FIGURE 18-8 Configuring IP address and port settings for a virtual server
TIP
You must specify either an IP address, a port number other than 80, or a
host header in this dialog box to differentiate the virtual server from all
other Web sites on this Windows 2000 Web server. Otherwise, the vir-
tual server won’t work. The most common item used to differentiate the
virtual server from other Web sites is an IP address.
Click Next.
6. In the Web Site Home Directory screen, enter the path to the home folder you
want to assign to the virtual server. This can be either a local path to the home
folder for this virtual server, or a UNC path to the shared folder on another server
that will function as the home folder for this virtual server. You can browse for this
folder if you need to. Click Next.
7. In the Web Site Access Permissions screen, select the appropriate access per-
missions for the virtual server’s home folder. The selected permissions are
granted to all users who access this home folder. The “Read” and “Run scripts”
check boxes are selected by default. Click Next.
8. In the “You have successfully completed the Web Site Creation Wizard” screen,
click Finish.
9. Internet Services Manager creates the virtual server, and displays it in the left
pane of the Internet Information Services dialog box. If you need to configure your
new virtual server, right-click the virtual server and select Properties from the
menu that appears. Configuring a virtual server is the same as configuring any
other Web site. Close Internet Information Services.
EXAM TIP
The Server exam has two objectives on controlling access to Web sites
and the files and folders they contain. Be sure you have Web server
security down cold when you take this exam.
There are several things you can do to enhance your Windows 2000
Web server’s security.You can:
■ Specify the authentication methods a particular Web site (or virtual
directory) will permit, including whether that site will permit
anonymous access.
■ Grant or deny access to a particular Web site (or virtual directory)
based on the Web client’s IP address or Internet domain name.
■ Configure encrypted communications to and from the Web server
by obtaining a certificate for the Web server.
■ Configure home directory security settings for a particular Web
site (or virtual directory).
■ Place all Web content on NTFS volumes.
■ Use physical and network security methods to protect the
Web server.
You can perform the first four items in this list by configuring the
Properties of the Web site. (For details on how to access this dialog box, see
the step-by-step section titled “Configuring the Default Web Site” earlier
in this chapter.) If you have more than one Web site on your Web server,
you must configure these security options for each Web site. Figure 18-9
shows the Directory Security tab in a Web site’s Properties dialog box (in
this case, the Default Web Site). Notice the three types of security that can
be configured on this tab.
To configure authentication methods, in the “Anonymous access and
authentication control” section on the Directory Security tab, click Edit.
The Authentication Methods dialog box appears, as shown in Figure 18-10.
Notice that, by default, anonymous access to the Web site is allowed. This
means that users are not required to provide a user name and password to
access this Web site.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1225
To grant or deny access to the Web site based on the Web client’s IP address
or Internet domain name, in the “IP address and domain name restrictions”
section on the Directory Security tab, click Edit.The IP Address and Domain
Name Restrictions dialog box appears, as shown in Figure 18-11.
If you select the “Granted Access” option, all Web clients will be granted
access to this Web site except those whose IP addresses or domain names
are explicitly listed in this dialog box. If you select the “Denied Access”
option, all Web clients will be denied access to this Web site except those
whose IP addresses or domain names are explicitly listed in this dialog box.
To add IP addresses (or domain names) to this dialog box, click Add.
To configure encrypted communications to and from the Web server by
obtaining a certificate for the Web server, in the “Secure communications”
section on the Directory Security tab, click Server Certificate.Then follow
the directions presented on-screen in the IIS Certificate Wizard to obtain a
certificate for this Web server. Once you’ve installed a certificate, you can
use Web server applications that use Secure Sockets Layer (SSL) encryption
on traffic to and from the Web server. In addition, you can configure the
Web server to authenticate Web clients by using certificates (such as those
contained on smart cards) instead of user names and passwords. (I’ll cover
how to use certificates in more detail later in this chapter.)
To configure home directory security settings for a Web site, you’ll need
to access the Home Directory tab in the Web site’s Properties dialog box.
Figure 18-12 shows the Home Directory tab.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1228
There are several settings that affect your Web site’s security on this tab:
■ Script source access: If you select this option,Web clients will
be permitted to view the source code for scripts that run on this
Web site.This practice is normally not recommended if security
is a concern.
■ Read: This option, which is selected by default, enables Web
clients to access this Web site.You must ensure this option is
selected or else Web clients will be unable to open this Web
site’s Web pages.
■ Write: If you select this option,Web clients will be able to upload
files to this Web site.This practice is normally not recommended if
security is a concern.
■ Directory browsing: If you select this option,Web clients will be
able to use their Web browser to view a list of subfolders and files
contained in this Web site.This practice is normally not recom-
mended if security is a concern.
■ Log visits: This option, which is selected by default, causes the
Windows 2000 Web server to log each access to the Web site.This
option is recommended if you want to monitor Web site usage.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1229
CAUTION
If you select Scripts and Executables, and you enable the Write permis-
sion to the Web site, you may end up exposing data in the Web site, and
potentially the entire Web server, to hackers, who could upload a file con-
taining a damaging executable (such as a virus).
You can also increase your Web server’s security by only placing Web con-
tent on NTFS volumes, and configuring NTFS permissions for the Web
content.
CROSS-REFERENCE
See Chapter 11 for detailed information on assigning NTFS permissions
to files and folders.
Finally, you can use physical and network security to safeguard your
Windows 2000 Web server. Physical security usually involves placing the
server in a locked room that only administrators have access to. Network
security often involves the use of firewalls to protect the Web server (and
the network to which it is attached) from unauthorized access.
CROSS-REFERENCE
Auditing of files and folders was covered in Chapter 13.
You can also use System Monitor, a Performance tool, to monitor the
Web Service object and its many counters.The Web Service object and its
counters are available in System Monitor when the World Wide Web
Server component of IIS is installed on a Windows 2000 computer.You
can also use System Monitor to determine if your Web server has adequate
memory, processor, and disk resources.
CROSS-REFERENCE
I’ll cover how to use System Monitor in Chapter 21.
Users report that they can’t Try to access the Web site by typing the IP address
access a Web site on your of the Web server instead of its FQDN in your Web
Windows 2000 Web server browser. If this works, ensure that the Web server,
by typing the FQDN of the Web including all of its aliases, is correctly listed in your
server in their Web browser. domain’s DNS server, and that the DNS server is
operating.
Users report that they are Verify that the anonymous user account
prompted to enter a user name (IUSR_Server_name) has the appropriate NTFS
and password to access a Web permissions to the files and folders in the Web site.
site even though you configured
that Web site to permit
anonymous access.
Your Web content developer Ensure that the properties of the Web site are
reports that the executables he configured so that the Execute Permissions (on
has included in your company’s the Home Directory tab) option specifies that both
Web site don’t run when he Scripts and Executables can be run in this Web
accesses this Web site from site. (The default setting for this option is Scripts
a Web browser. only.)
A user reports that she is able If you have implemented IP address and domain
to access your company’s Web name restrictions on this Web site, ensure that the
site from her computer at the user’s home computer is not denied access to the
office, but is unable to access Web site by IP address or domain name. Or, if
the Web site from her home you’re using a firewall, configure the firewall so that
computer. the user can connect to the Web site through the
firewall. Or, if security is critical to this Web site,
you may need to instruct the user to only access
the Web site from her computer at the office.
Users who use older versions of Because older Web browsers require an IP address
Internet Explorer and Netscape when accessing a virtual server, ensure that the
Navigator report that they are virtual server is configured with its own IP address.
unable to access a virtual server
on your Windows 2000
Web server.
CAUTION
The Indexing Service requires a fair amount of disk space (as much as 40
percent of the space used by indexable documents) for the catalogs it
generates. If space on your hard disk is an issue, you may not want to
enable this service.
Using the Index Service is as easy as starting the service (and changing
its startup type to automatic), waiting for the service to create the catalog,
and then performing searches.There are several search tools you can use:
■ The Search tool in the Start menu
■ The Search tool in Windows Explorer
■ The Indexing Service’s query tool in Computer Management
4701-1 ch18.f.qc 4/24/00 09:45 Page 1233
TIP
Depending on the amount of data on your computer’s local hard disk, the
Indexing Service may require from 1 to 24 hours, or sometimes even
longer, to create the catalog.
STEP BY STEP
1. Right-click My Computer, and select Manager from the menu that appears.
2. In the left pane of the Computer Management dialog box, click the + next to
Services and Applications. Highlight Services. Then, in the right pane, right-click
the Indexing Service, and select Properties from the menu that appears.
3. In the Indexing Service Properties (Local Computer) dialog box, select Automatic
from the “Startup type” drop-down list box. Then click Start. Click OK.
4. The Indexing Service is started, and is configured to automatically start every time
the computer starts. Close Computer Management.
STEP BY STEP
1. Right-click My Computer, and select Manager from the menu that appears.
2. In the left pane of the Computer Management dialog box, click the + next to
Services and Applications. Click the + next to Indexing Service. Click the + next
to either Web or System, depending on whether you want to search the com-
puter’s Web sites or its other documents. Highlight Query the Catalog.
3. In the right pane, an Indexing Service Query Form appears, as shown in
Figure 18-13.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1234
In the “Enter your free text query below” text box, type in the word or phrase you
want to search for. For information on constructing better queries, click the “Tips
for searching” link. Click Search.
4. The results of the search are returned in the right pane. Close Computer
Management.
EXAM TIP
The Network exam has five objectives on using Certificate Services. If
you don’t use this feature regularly on your network, spend some time
learning how to issue and manage certificates before you take this exam.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1236
In the following sections, I’ll show you how to install and configure
Certificate Services, how to create and issue certificates, how to revoke
certificates, and finally, how to manage Encrypting File System (EFS)
recovery agents.
STEP BY STEP
Stand-alone root CA: Select this option if you’re installing the first certifi-
cate server that will become the root of a certificate authority hierarchy, and
you want to be able to isolate the CA from your network for security reasons.
This type of CA does not require the use of Active Directory.
Stand-alone subordinate CA: Select this option if you have already
installed a stand-alone root CA and you need an additional CA. This CA
must obtain its CA certificate from another CA in the hierarchy. This type of
CA does not require the use of Active Directory.
To configure advanced CA options, such as cryptographic service providers, hash
algorithms, or key lengths, select the check box next to “Advanced options,” and
select the appropriate options on the following screen.
Click Next.
8. In the CA Identifying Information screen, enter the CA name, organization, city,
state, description, and so on, to identify the CA. Click Next.
9. In the Data Storage Location screen, either accept the default database and log
locations, or specify different locations. Click Next.
10. A warning dialog box appears, as shown in Figure 18-15. Notice that IIS must be
stopped to complete the installation of Certificate Services. Click OK.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1238
11. When prompted, insert your Windows 2000 Server compact disc into the com-
puter’s CD-ROM drive and click OK. When the Microsoft Windows 2000 CD
dialog box appears, close it. Windows 2000 installs Certificate Services. In the
Completing the Windows Components Wizard screen, click Finish.
12. Close Add/Remove Programs. Then close Control Panel.
STEP BY STEP
Once you’ve specified the types of certificates the CA can create and
issue, users and client computers can request the certificates they need
from the CA.When certificates are first implemented, the users and com-
puters that require certificates request and receive them from the CA.
Once issued, certificates are typically valid for one year. After certificates
are implemented on a network, users and computers don’t normally
request certificates very often. Users and computers only request certifi-
cates when they need to perform a task, such as code signing, for which a
certificate is required.
Users must manually request certificates for themselves. Users can also
manually request certificates for their computers. There are two methods
you can use to manually request certificates. Users of Windows 2000 com-
puters can use the Certificate snap-in to the MMC. Users of all other
computers can request certificates by using their Web browsers to access
the CA’s Web site at http://server_name_of_CA/certsrv.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1240
STEP BY STEP
If you don’t want users to have to manually request certificates for their
computers, you can use Group Policy to configure a computer, or all of the
computers in an Active Directory container, such as a domain or OU, to
automatically request certificates from the CA.
4701-1 ch18.f.qc 4/24/00 09:45 Page 1241
STEP BY STEP
In this screen, highlight the type of certificate you want all of the computers in this
OU to automatically request. Click Next.
9. In the Certification Authority screen, select one or more CAs from which the com-
puters in this OU can automatically request certificates. Click Next.
10. In the Completing the Automatic Certificate Request Setup screen, click Finish.
11. The Automatic Certificate Request policy is displayed in the right pane. If you want
all of the computers in this OU to automatically request more than one type of cer-
tificate, repeat Steps 6 through 10 as needed. Close the Group Policy dialog box.
12. In the OU’s Properties dialog box, click OK.
13. Close Active Directory Users and Computers.
Revoking Certificates
Certificates should be revoked when the user (or computer) that uses the
certificate no longer performs the task for which the certificate was
requested. For example, if an employee leaves the company, you should
revoke all of the user certificates assigned to that employee. Or, if an
employee was issued a Code Signing certificate, but has recently been pro-
moted to a management position and no longer performs code signing
tasks, you should revoke that user’s certificate.
You can use the Certification Authority administrative tool to revoke
certificates.
STEP BY STEP
REVOKING A CERTIFICATE
TIP
If you think you might want to reinstate this certificate at a later date,
select a reason code of Certificate Hold. You can reinstate a held certifi-
cate by using the certutil.exe command-line utility.
Click Yes.
4. The certificate is revoked. The certificate is moved from the Issued
Certificates folder to the Revoked Certificates folder. Close
Certification Authority.
EXAM TIP
One of the objectives for the Network exam mentions removing “the
Encrypting File System (EFS) recovery keys.” What this objective is really
referring to is the entire process of designating a recovery agent, and
then removing all EFS Recovery Agent certificates.
TIP
Only the user that will receive a certificate can request a certificate. If
someone other than yourself is designated as the recovery agent, that
user should log on and request an EFS Recovery Agent certificate. That
user should also export the certificate and later delete the certificate.
4701-1 ch18.f.qc 4/24/00 09:46 Page 1245
STEP BY STEP
After the designated user requests and receives an EFS Recovery Agent
certificate, that user should export the certificate to a floppy disk.
STEP BY STEP
1. Insert a floppy disk that will contain the EFS Recovery Agent certificate into your
computer’s A: drive.
4701-1 ch18.f.qc 4/24/00 09:46 Page 1246
2. In the right pane of the MMC console that you opened and configured in the pre-
vious section, right-click the EFS Recovery Agency certificate, and select All
Tasks ➪ Export.
3. The Certificate Export wizard starts. Click Next.
4. In the Export Private Key screen, select the “No, do not export the private key”
option. Click Next.
5. In the Export File Format screen, ensure that the “DER encoded binary X.509
(.CER)” format is selected. Click Next.
6. In the File to Export screen, type an appropriate name for the certificate, such as
a:\efscert, and click Next.
7. In the Completing the Certificate Export Wizard screen, click Finish.
8. A Certificate Export Wizard message appears, indicating the export was success-
ful. Click OK.
9. Close the MMC console.
The next step in the process is designating the user as a recovery agent
by using Group Policy.An Administrator should perform this task.
TIP
Even if a user has requested and received an EFS Recovery Agent cer-
tificate, that user can’t unencrypt any files until they have been desig-
nated as a recovery agent in Group Policy.
STEP BY STEP
5. In the left pane of the Group Policy dialog box, click the + next to the Windows
Settings folder in the Computer Configuration section. Click the + next to the
Security Settings container. Click the + next to the Public Key Policies
folder. Highlight the Encrypted Data Recovery Agents folder. Select
Action ➪ Add.
6. The Add Recovery Agent Wizard starts. Click Next.
7. The Select Recovery Agents screen appears. The easiest way to add a user to
the list of recovery agents is to retrieve the EFS Recovery Agent certificate from
the floppy disk. To do this, click Browse Folders.
8. In the Open dialog box, in the “File name” text box, type the full path to the
exported certificate file, for example, a:\efscert. Click Open.
9. In the Select Recovery Agents screen, click Next.
10. In the Completing the Add Recovery Agent Wizard screen, click Finish.
11. The newly designated recovery agent is displayed in the right pane. (If you have
previously designated other recovery agents that you no longer wish to use, high-
light them in the right pane, one at a time, and select Action ➪ Delete.) Close
Group Policy.
12. In the domain or OU’s Properties dialog box, click OK.
13. Close Active Directory Users and Computers.
The last part in the process is removing the designated user’s EFS
Recovery Agent certificate. The user who requested the EFS Recovery
Agent certificate should perform this task (or you should be logged on as
that user).You can use either the Internet Options application in Control
Panel or the Certificates snap-in to the MMC to remove the certificate.
STEP BY STEP
Before you delete the certificate, take special note of the “Certificate intended
purposes” section in the lower portion of this dialog box. Ensure that the
intended purpose of the certificate you’re deleting is “File Recovery.”
Click Remove.
6. A warning dialog box is displayed. Click Yes.
7. The certificate is deleted. In the Certificates dialog box, click Close.
8. In the Internet Properties dialog box, click OK.
9. Close Control Panel.
This chapter introduced several important Web and Certificate Services topics:
■ Internet Information Services (IIS) is Windows 2000’s Web server. IIS is a col-
lection of many services. Some of the most commonly used components are
World Wide Web Server, File Transfer Protocol (FTP) Server, FrontPage 2000
Server Extensions, the SMTP Service, and the NNTP Service.
■ Some IIS components are installed by default during the installation of
Windows 2000. You can add additional components by using Add/Remove
Programs.
■ IIS requires the use of TCP/IP.
■ You can manage and configure the Default Web Site and any other Web sites
on your computer by using the Internet Services Manager administrative tool.
■ Personal Web Manager is an easy-to-use Windows 2000 Professional tool
that enables a novice user to manage and monitor a Web site on the local
Windows 2000 Professional computer.
■ A virtual directory is a child Web site that doesn’t contain Web content. Rather,
it is a pointer to an actual folder that contains its Web content.
■ A virtual server is a pseudo WWW server with its own unique fully qualified
domain name (FQDN), and often has its own IP address. To the Internet user
accessing the virtual server, a virtual server appears to be a separate server;
but in reality, a virtual server is not a separate server.
4701-1 ch18.f.qc 4/24/00 09:46 Page 1249
■ You can do several things to increase security of your Windows 2000 Web
server, including:
Specify the authentication methods a particular Web site (or virtual direc-
tory) will permit.
Grant or deny access to a particular Web site (or virtual directory) based
on the Web client’s IP address or Internet domain name.
Configure encrypted communications to and from the Web server by
obtaining a certificate for the Web server.
Configure home directory security settings for a particular Web site (or vir-
tual directory).
Place all Web content on NTFS volumes.
Use physical and network security methods to protect the Web server.
■ Certificate Services is a Windows 2000 Server service used to create, issue,
and manage certificates on a Windows 2000 network.
■ An organization that uses a computer to create, issue, and manage certificates
is called a certification authority (CA). This term is also used to refer to the
actual server that performs the task of issuing and managing certificates.
■ You can use the Certification Authority administrative tool to manage the CA,
to specify the types of certificates the CA can issue, and to revoke certificates.
4701-1 ch18.f.qc 4/24/00 09:46 Page 1250
1250
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about IIS and Certificate Services, and to help you prepare for
the Professional, Server, and Network exams:
■ Assessment Questions: These questions test your knowledge of
the IIS and Certificate Services topics covered in this chapter.
You’ll find the answers to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge
you to apply your understanding of the material to solve a hypo-
thetical problem. In this chapter’s scenarios, you are asked to trou-
bleshoot IIS problems and provide answers to the questions.You
don’t need to be at a computer to do scenarios.Answers to this
chapter’s scenarios are presented at the end of this chapter.
■ Lab Exercise: These exercises are hands-on practice activities that
you perform on a computer.The lab in this chapter gives you an
opportunity to practice installing and configuring IIS and
Certificate Services.
Assessment Questions
1. You want to install some additional Internet Information Services
components that were not installed during the installation of
Windows 2000 Server.Which tool should you use?
A. Internet Services Manager
B. Personal Web Server
C. Add/Remove Programs
D. Networking and Dial-up Connections folder
2. What protocol is required by Internet Information Services (IIS), the
Indexing Service, and Certificate Services?
A. TCP/IP
B. NWLink IPX/SPX/NetBIOS Compatible Transport Protocol
C. NetBEUI
D. RIP Version 2 for Internet Protocol
4701-1 ch18.f.qc 4/24/00 09:46 Page 1251
1251
1252
7. You are preparing to install Certificate Services for the first time on
your Windows 2000 network.You plan to install Certificate Services
on a Windows 2000 Server computer that is a member of the domain.
You want the certification authority (CA) to be able to use Active
Directory.Which CA type should you select when you install
Certificate Services?
A. Enterprise root CA
B. Enterprise subordinate CA
C. Stand-alone root CA
D. Stand-alone subordinate CA
8. What must be true before a user can perform the role of an EFS
recovery agent? (Choose all that apply.)
A. The user must have an EFS Recovery Agent certificate.
B. The user must be an Administrator.
C. The user must be designated as an EFS recovery agent in Group
Policy.
D. The user must be logged on to a domain controller.
Scenarios
Troubleshooting access to Web servers and Web sites (and the files and
folders they contain) can be a complex task. For each of the following sit-
uations, consider the given facts and answer the question or questions that
follow.
1. Several users on your Windows 2000 network report that they are
prompted to enter a user name and password each time they access
an HTML file in a Web site on your company’s Windows 2000 Web
server, even though you configured that Web site to permit anony-
mous access.
a. What is the most likely cause of this problem?
b. What should you do to resolve the problem?
4701-1 ch18.f.qc 4/24/00 09:46 Page 1253
1253
Lab Exercise
Lab 18-1 Managing Web and Certificate Services
Professional
Server
EXAM
MATERIAL
Network
1254
1255
20. In the Web Site Home Directory screen, enter a path of c:\inetpub\
virtualwww and click Next.
21. In the Web Site Access Permissions screen, select the check box next
to Execute. Click Next.
22. In the “You have successfully completed the Web Site Creation
Wizard” screen, click Finish.
23. Internet Services Manager creates the virtual server and displays it in
the left pane of the Internet Information Services dialog box.To con-
figure your new virtual server, right-click Virtual Server and select
Properties from the menu that appears.
24. In the Virtual Server Properties dialog box, click the Directory
Security tab.
25. On the Directory Security tab, in the “IP address and domain name
restrictions” section, click Edit.
26. In the IP Address and Domain Name Restrictions dialog box, select
the “Denied Access” option.Then click Add.
27. In the Grant Access On dialog box, select the “Group of computers”
option.Type in a Network ID of 192.168.59.0 and enter a subnet
mask of 255.255.255.0.This setting enables all computers on the
192.168.59.0 subnet to access this Web site. Click OK.
28. In the IP Address and Domain Name Restrictions dialog box,
click OK.
29. On the Directory Security tab, click OK. Close the Internet
Information Services dialog box.
30. Right-click My Computer, and select Explore from the menu that
appears.
31. In the left pane, click the + next to Local Disk (C:). Click the + next
to the WINNT folder. Click the + next to the system32 folder. Click
the + next to the LogFiles folder. Highlight the W3SVC1 folder. In
the right pane, double-click the last log file listed.
32. Notepad opens the log file. Scroll down and view the contents of the
log file. Notice that you can view the users who have accessed the
Web site, and the IP addresses of the users’ computers. Close Notepad.
33. Close Windows Explorer.
4701-1 ch18.f.qc 4/24/00 09:46 Page 1256
1256
1257
1258
36. In the Completing the Certificate Export Wizard screen, click Finish.
37. A Certificate Export Wizard message appears, indicating the export
was successful. Click OK.
38. In the right pane of the MMC console, right-click the EFS Recovery
Agent certificate that has a Friendly Name of EFS Recovery, and
select Delete from the menu that appears.
39. When a Certificates warning dialog box appears, click Yes.
40. Close the MMC console.When prompted to save console settings,
click No.
41. Select Start ➪ Programs ➪ Administrative Tools ➪ Active Directory
Users and Computers.
42. In the left pane of the Active Directory Users and Computers dialog
box, right-click domain1.mcse, and select Properties from the menu
that appears.
43. In the domain1.mcse Properties dialog box, click the Group Policy tab.
44. On the Group Policy tab, double-click the Default Domain Policy.
45. In the left pane of the Group Policy dialog box, click the + next to the
Windows Settings folder in the Computer Configuration section.
Click the + next to the Security Settings container. Click the + next to
the Public Key Policies folder. Highlight the Encrypted Data
Recovery Agents folder. Select Action ➪ Add.
46. The Add Recovery Agent Wizard starts. Click Next.
47. The Select Recovery Agents screen appears. Click Browse Folders.
48. In the Open dialog box, type a:\efscert.cer in the File name text
box. Click Open.
49. In the Select Recovery Agents screen, click Next.
50. In the Completing the Add Recovery Agent Wizard screen, click
Finish.
51. The newly designated recovery agent is displayed in the right pane.
Close Group Policy.
52. In the domain1.mcse Properties dialog box, click OK.
53. Close Active Directory Users and Computers.
54. Select Start ➪ Programs ➪ Administrative Tools ➪ Certification
Authority.
4701-1 ch18.f.qc 4/24/00 09:46 Page 1259
1259
55. In the left pane of the Certification Authority dialog box, click the +
next to domain1. Highlight the Issued Certificates folder. In
the right pane, there should be two certificates listed. Double-click
the last certificate in the list to open it.
56. In the Certificate dialog box, verify that this certificate is intended to
allow data on disk to be encrypted, protect e-mail messages, and prove
your identity to a remote computer. Click OK. If the certificate you
opened was intended for a different purpose, try double-clicking
another certificate in the console until you find the one just described.
57. In the right pane of the console, right-click the certificate that met the
criteria specified in Step 56, and select All Tasks ➪ Revoke Certificate.
58. A Certificate Revocation dialog box appears, asking if you’re sure you
want to revoke the certificate. Click Yes.
59. The certificate is revoked.The certificate is moved from the Issued
Certificates folder to the Revoked Certificates folder. Close
Certification Authority.
1260
tual directory) will permit, including whether that site will permit
anonymous access.
Grant or deny access to a particular Web site (or virtual directory)
Web server.
7. The Indexing Service is a Windows 2000 service that indexes Web site
content and other documents on a Windows 2000 computer so these
items can be searched by users.
8. Certificate Services is a Windows 2000 Server service used to create,
issue, and manage certificates on a Windows 2000 network. Certificate
Services can be installed on any Windows 2000 Server computer, but
can’t be installed on Windows 2000 Professional computers.
9. Certification authority (CA)
Assessment Questions
1. C. Use the Add/Remove Programs application in Control Panel to
install additional IIS components.
2. A. When you think Internet (or anything Internet-related), think
TCP/IP.
3. D. Of the tools mentioned in the list, only Personal Web Manager
can be used to configure a Web site.
4. B. Use Internet Services Manager to configure the Web site.You
can’t use Personal Web Services in this situation because Personal
Web Services is a Windows 2000 Professional–only tool.
4701-1 ch18.f.qc 4/24/00 09:46 Page 1261
1261
5. B. Virtual servers are just what you need in this situation.You can use
Internet Services Manager to create them.
6. B, C, E. Placing Web content on FAT volumes doesn’t provide secu-
rity, but placing content on NTFS volumes does. Selecting Basic
authentication also provides no security — user names and passwords
are sent in clear text if this authentication method is selected.
7. A. Select Enterprise root CA if you’re installing the first certificate
server in the forest.This type of CA requires the use of Active
Directory.
8. A, C. To perform the role of an EFS recovery agent, a user must have
an EFS Recover Agent certificate, and must be designated as an EFS
recovery agent in Group Policy.
Scenarios
1. The most likely cause of this problem is that you have configured
NTFS permissions on the file, but have not granted the Web server’s
anonymous user account (IUSR_Server_name) permissions to access
this file.To resolve this problem, assign the Web server’s anonymous
user account NTFS permissions to the file.
2. The most likely cause of this problem is that you have enabled IP
address restrictions on the Web site.To resolve this problem, either
remove the IP address restrictions, or add the IP address of John’s
home computer to the list of IP addresses explicitly granted access
to the Web site.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1262
Professional
Server
EXAM
MATERIAL Directory Services
EXAM OBJECTIVES
C HAP TE R
19
Deploying Windows 2000
on Your Network
I n the “olden days” of computer networks, which weren’t so very long ago,
deployment wasn’t a major issue. After all, most computer networks were
fairly simple and relatively small. Today, however, many computer networks are
vast enterprises encompassing several sites and thousands of workstations.
Because of this, deployment has become vastly more important. After all, who
wants to install Windows 2000 Professional on a thousand desktops?
Windows 2000 includes technologies to enable you to deploy Windows
2000 Professional and Server in a logical, organized, and — in most cases —
automated manner. In this chapter, I’ll examine the deployment tools and issues
you need to know as an administrator, and for the Windows 2000 exams.
1263
4701-1 ch19.f.qc 4/24/00 09:47 Page 1264
Chapter Pre-Test
1. Where are the Windows 2000 deployment tools located?
2. Which deployment tool can you use to create answer files by
using a wizard?
3. What is the default name of a Windows 2000 unattended
installation answer file?
4. Which tool can be used to prepare a Windows 2000 computer
for disk duplication?
5. When using Sysprep, what additional tools do you need?
6. What must you do before a RIS server can respond to RIS
client requests?
7. What operating systems can you deploy by using RIS?
4701-1 ch19.f.qc 4/24/00 09:47 Page 1265
STEP BY STEP
1. Insert your Windows 2000 compact disc (either Professional or Server) into your
computer’s CD-ROM drive. Close the Microsoft Windows 2000 CD dialog box.
2. From the desktop, right-click My Computer, and select Explore from the menu
that appears.
3. In the left pane, highlight Local Disk (C:). Select File ➪ New ➪ Folder.
4. In the right pane, type in a new folder name of Deployment and press Enter.
5. In the left pane, click the + next to your CD-ROM drive. Click the + next to the
SUPPORT folder. Highlight the TOOLS folder. In the right pane, double-click the
DEPLOY file. Select Edit ➪ Select All. Select Edit ➪ Copy To Folder.
6. In the Browse For Folder dialog box, click the + next to My Computer. Click the +
next to Local Disk (C:). Highlight Deployment. Click OK.
7. Windows 2000 extracts and copies the contents of the DEPLOY.CAB file to the
DEPLOYMENT folder. Close Windows Explorer.
STEP BY STEP
1. Right-click My Computer, and select Explore from the menu that appears.
2. In the left pane, click the + next to Local Disk (C:). Highlight the Deployment
folder. In the right pane, double-click setupmgr.
3. The Windows 2000 Setup Manager wizard starts. Click Next.
4. The New or Existing Answer File screen appears. There are three basic options
on this screen:
Create a new answer file: Select this option to create a new answer file.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1267
6. In the Platform screen, select the operating system this answer file will be used
to install. Choose either Windows 2000 Professional or Windows 2000 Server.
Click Next.
7. The User Interaction Level screen appears, as shown in Figure 19-2. Notice
that a description of the selected option is displayed across the lower part of
the dialog box.
Select the appropriate option for the answer file you’re creating:
Provide defaults: The user has full interaction with the Setup program.
The answer file provides the default Setup answers, and the user must
interact with the Setup program by accepting the default selections or
making changes. This is the default setting.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1268
FIGURE 19-2 Selecting the level of user interaction during Windows Setup
Fully automated: The user has no interaction with the Setup program
except for possibly entering a product key. A product key must be entered
for all OEM and retail versions of Windows 2000, but is not required for
versions purchased through a “select” agreement with Microsoft. All of the
answers are provided in the answer file, and the user cannot intervene or
make changes.
Hide pages: The user has some interaction with the Setup program. Setup
screens for which the answer file provides answers are not displayed to the
user. Setup screens that are not answered are displayed to the user. This
feature enables you to automate some portions of Setup, but to collect
user-specific information as necessary.
Read only: The user has no interaction with the Setup program. All Setup
screens are displayed to the user, but the user can’t make any changes to
these screens.
GUI attended: The user has some interaction with the Setup program. The
text mode phase of the installation is automated, but the user must respond
to all of the screens in the Windows 2000 Setup Wizard phase.
Click Next.
8. If you selected the “Fully automated” option, the License Agreement screen
appears. Select the check box to accept the terms of the license agreement.
Click Next.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1269
9. In the Customize the Software screen, enter the default name and organization
name you want to use. Click Next.
10. The next several screens prompt you to enter information that the answer file
will use to install Windows 2000. The screens vary, depending on whether you
selected Windows 2000 Professional or Windows 2000 Server.
11. The Distribution Folder screen appears. In this screen, choose one of the following
options and click Next.
Yes, create or modify a distribution folder: Select this option if this
answer file will be used for an over-the-network installation. If you select
this option, Setup Manager copies the Windows 2000 source files to a
folder on the local hard disk, and shares this folder, so that over-the-network
installations can be performed. If you select this option, Steps 12 through
17 prompt you to enter information about this distribution folder, including
its name and any additional files and drivers you may want copied to the
distribution folder.
No, this answer file will be used to install from a CD: Select this
option if this answer file will be used to perform an installation using a
compact disc. If you select this option, skip to Step 18.
12. The Distribution Folder Name screen appears, as shown in Figure 19-3. Notice
the default names of the distribution folder and distribution share.
When Setup Manager creates your answer file, it stores it in one of two
places. If you chose to create a distribution folder, the answer file is stored
4701-1 ch19.f.qc 4/24/00 09:47 Page 1271
TIP
For more information on the format and parameters used in an answer
file, I recommend you print the unattend.doc file, which is located in
the folder in which you installed Setup Manager.
If you’re installing Windows 2000 from a compact disc, the first thing
you should do is use MS-DOS (or Windows 95 DOS, or Windows 98
DOS) to partition and format the hard disk on the computer on which
you want to perform the installation (the target computer). Next, boot this
computer to DOS, and load CD-ROM drivers for the computer’s
4701-1 ch19.f.qc 4/24/00 09:47 Page 1272
CD-ROM drive. Then place the Windows 2000 compact disc in the
CD-ROM drive. Next, copy the unattend.txt, the unattend.bat,
and, if appropriate, the unattend.udf files to a floppy disk and place this
disk in the A: drive on the target computer. At the DOS prompt, type A:
and press Enter, then type unattend and press Enter. (Or, if you have a
.udf file, type unattend computer_name and press Enter.) This starts the
unattended installation of Windows 2000.
To install Windows 2000 over-the-network by using a shared distribution
folder, the target computer must have a network adapter card installed in it.
The first thing you should do is use MS-DOS (or Windows 95 DOS, or
Windows 98 DOS) to partition and format the hard disk on the target
computer. Next, boot this computer to DOS, and load Client for Microsoft
Networks (or equivalent client software) to enable this computer to function
on the network.This software doesn’t ship with Windows 2000; however, it
was included with Windows NT Server 4.0. Map a network drive to the
shared distribution folder on the network server. At the DOS prompt,
change the default drive to the mapped network drive, then type unattend
and press Enter. (Or, if you have a .udf file, type unattend computer_name
and press Enter.) This starts the unattended installation of Windows 2000.
Using Sysprep
The System Preparation Tool (sysprep.exe), often referred to as Sysprep in
Microsoft documentation, is a Windows 2000 deployment tool designed for
large organizations and OEMs. Sysprep prepares a Windows 2000 computer’s
hard disk for duplication, thus making it possible for that computer’s hard disk
to be copied to other computers.This feature is particularly useful to OEMs
who install Windows 2000 along with a number of custom applications and
other data on multiple computers.
TIP
Sysprep works on both Windows 2000 Professional and Windows
2000 Server computers. However, it doesn’t work on Windows 2000
Server domain controllers.
Here’s how Sysprep is typically used. First, you install Windows 2000
and all desired applications and services on a computer — this is called the
master computer. Then you prepare the master computer’s hard disk for
duplication by using Sysprep. Sysprep works by removing user-specific data
from the original master computer and by placing a Mini-Setup routine
on the master computer’s hard disk. Next, you use a third-party software
utility, such as PowerQuest’s Drive Image Pro, to copy the master
computer’s hard disk, and to duplicate this copy on the hard disk of each
target computer. Finally, when the target computer boots for the first time,
a Mini-Setup wizard runs, which gathers user-specific information from
the user and assigns the target computer a unique SID.The whole process
enables you to deploy one disk image to many computers. The result —
cloned machines that are user unique.
In the next several sections I’ll show you how to perform the many steps
in this process.
CROSS-REFERENCE
If you’ve forgotten how to copy user profiles, see Chapter 9.
STEP BY STEP
1. Right-click My Computer, and select Explore from the menu that appears.
2. In the left pane, click the + next to Local Disk (C:). Highlight the Deployment
folder. In the right pane, double-click setupmgr.
3. The Windows 2000 Setup Manager wizard starts. Click Next.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1275
4. In the New or Existing Answer file screen, select the “Create a new answer file”
option. Click Next.
5. In the Product to Install screen, select the Sysprep Install option, as shown in
Figure 19-4. Click Next.
12. In the Network Settings screen, select either the Typical or Custom settings
option. If you select Custom settings, you will be prompted to select the
networking components you want to install. Click Next.
13. In the Workgroup or Domain screen, choose whether you want the computer
to be a member of a workgroup or a domain. Click Next.
14. In the Time Zone screen, specify a time zone if desired by using the drop-down
list box. Click Next.
15. In the Additional Settings screen, you can choose whether to edit additional
Windows settings. If you choose to edit additional settings, other screens will
prompt you to configure various Windows components. Make your selection
and click Next.
16. The Sysprep Folder screen appears, shown in Figure 19-5. This window enables
you to create a Sysprep folder where Setup Manager will store your Sysprep
files. I recommend that you create this folder. Select the Yes option, then click Next.
17. In the Additional Commands window, you can specify additional commands
or scripts that will run at the end of Mini-Setup. Add commands as needed and
click Next.
18. In the OEM Branding screen, you can specify a path to a custom logo and a path
to a custom background. Configure this screen as needed and click Next.
19. In the Additional Files and folders screen, specify any additional files and folders
you want copied to the hard disk of the target computer. Click Next.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1277
20. The OEM Duplicator String screen appears. In this screen you can enter Sysprep
information that will be written to the target computer’s registry. This information
enables you to determine which master computer was used to create the target
computer. Configure this screen as appropriate, then click Next.
21. In the Answer File Name screen, accept the default name for the sysprep.inf
file, and ensure that it will be saved in the C:\sysprep folder on the master
computer. Click Next.
TIP
The sysprep.inf file must be stored in the C:\sysprep folder on
the master computer, or it will not be used by Sysprep.
22. In the Completing the Windows 2000 Setup Manager Wizard screen, click Finish.
You’re almost ready to run Sysprep, but there are a few last tasks that
must be done. First, if you didn’t create a sysprep.inf file, you must
create a C:\sysprep folder on the master computer.Then, you must copy
setupcl.exe and sysprep.exe from the folder in which you’ve
installed Setup Manager to the C:\sysprep folder. This folder will also
contain the sysprep.inf file if you created one. Now you’re ready to run
Sysprep on the master computer.
STEP BY STEP
5. Sysprep runs on the master computer. This may take a few minutes, and once this
is done, your computer should automatically shut down. If, after several minutes,
there is no activity on the master computer, power it off. The master computer
is now ready for disk duplication.
6. Later, after you’ve used a third-party utility to duplicate the master computer’s
hard disk, you can reboot the master computer. When you reboot the computer,
the Mini-Setup wizard runs. You are prompted to enter user-specific settings
for the master computer. Complete the Mini-Setup wizard to restore the
master computer to a usable state. The Mini-Setup wizard also removes
the C:\sysprep folder.
EXAM TIP
Microsoft intends for RIS to be the preferred method of rolling
out Windows 2000 Professional. So, make sure you know all about it
for the Windows 2000 exams, especially the Directory Services exam.
RIS can only be used on Windows 2000 networks that use DHCP, DNS,
and Active Directory. RIS requires all of these components to function.
In the next sections I’ll explain how to install and configure RIS, how to
manage RIS images, how to prestage RIS clients, and finally, how to install
a RIS image on a client computer. I’ll also provide you with some tips for
troubleshooting RIS problems.
STEP BY STEP
STEP BY STEP
STEP BY STEP
6. In the Installation Source Files Location screen, you specify the location of the
Windows 2000 Professional source files that the wizard will copy to create the
default RIS image. Either accept the default path to the Windows 2000
Professional installation files, or specify a new path. This path can be to
a CD-ROM drive or to a network share. Click Next.
7. In the Windows Installation Image Folder Name screen, either accept the default
name for the folder that will contain the default RIS image, or type in a new name.
By default, the folder name is win2000.pro. Click Next.
8. In the Friendly Description and Help Text screen, you can enter a description
and any help text you wish to enter for the default RIS image. The purpose of
this information is to help an end user or a technician select the appropriate
RIS image. Configure this screen as desired, and click Next.
9. In the Review settings screen, click Finish. The RIS server copies files, creates
the remote installation folder, creates the default image of Windows 2000
Professional, and sets up the RIS server. This process takes several minutes.
When this process completes, click Done.
STEP BY STEP
8. In the Completing the Delegation of Control Wizard screen, click Finish. The
users or groups you selected have now been assigned the “Create Computer
Objects” advanced Active Directory permission.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1284
STEP BY STEP
1. On the RIS server, right-click My Computer and select Explore from the menu
that appears.
2. In the left pane, click the + next to the volume that contains the RIS installation
folder. Click the + next to RemoteInstall. Click the + next to Admin. Highlight the
i386 folder. In the right pane, double-click rbfg.exe.
3. The Windows 2000 Remote Boot Disk Generator dialog box appears, as shown
in Figure 19-7. Notice the Adapter List button. Click this button to view a list of
network adapter cards for which a RIS boot disk can be used. Only PCI-based
network adapter cards are supported.
TIP
Since RIS only supports PCI network adapter cards, this means most
laptop computers can’t use RIS.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1285
Insert a blank, formatted floppy disk into drive A:, then click Create Disk.
4. The Remote Boot Disk Generator creates the RIS boot disk. Click No when
asked if you want to create another disk.
5. In the Windows 2000 Remote Boot Disk Generator dialog box, click Close.
Close Windows Explorer.
STEP BY STEP
If you didn’t configure the RIS server to respond to client requests when you set
up the RIS server, select the check box next to “Respond to client computers
requesting service.”
4701-1 ch19.f.qc 4/24/00 09:47 Page 1287
On the New Clients tab, select how the RIS server will assign computer names
to client computers that use the RIS server by selecting a naming scheme from
the drop-down list box. By default, the RIS server uses the user’s logon name
(username) when assigning computer names. This means that the username of
the person performing the installation will be used as the computer name. If one
technician performs multiple RIS installations, this naming scheme may not be
your best choice.
In the “Client account location” section, choose where in Active Directory com-
puter accounts for new client computers will be created. The default selection is
“Default directory service location.” This means that new computer accounts will
be created in the Computers container.
Configure options on this tab as appropriate, then click OK.
6. In the RIS server’s Properties dialog box, click OK.
computers” check box in the RIS server’s Properties dialog box.This check
box is located on the Remote Install tab that was shown in Figure 19-8.
When selected, this option prevents a RIS server from responding to a client
computer unless the client computer has been prestaged for RIS installation in Active
Directory. I’ll get into the details of prestaging client computers a bit later in
this chapter, but prestaging essentially consists of creating a computer object
for the new client computer in Active Directory, and assigning the user(s) of
the new client computer appropriate Active Directory permissions to the
computer object. If you select this check box, you can rest at ease, knowing
that only computers that you have authorized will be able to install Windows
2000 Professional by using your RIS server.
To control access to the RIS server’s properties in Active Directory, you
can configure the Security tab in the Remote-Installation-Services
Properties dialog box for the RIS server. To access this Security tab, start
Active Directory Users and Computers, access the Properties of the RIS
server, click the Remote Install tab, then click Advanced Settings, and
finally, click the Security tab. Figure 19-10 shows the Security tab.
On the Security tab, you can assign Active Directory permissions to the
RIS server object to appropriate users and groups. Assigning permissions
4701-1 ch19.f.qc 4/24/00 09:47 Page 1290
CROSS-REFERENCE
For more information on configuring permissions on Active Directory
objects, see Chapter 8.
STEP BY STEP
Deny: If this option is selected, the Client Installation wizard will not display
this option to users affected by this GPO.
Select the appropriate options in this dialog box, and click OK.
7. Close the Group Policy dialog box.
8. In the domain or OU’s Properties dialog box, click OK.
9. Close Active Directory Users and Computers.
Finally, because all RIS images and their associated answer files are
stored on an NTFS volume, you can increase RIS security by assigning
NTFS permissions to RIS answer files once these files have been associated
with a RIS image. All RIS answer files have a file extension of .sif, and,
once associated with a RIS image, are stored in:
\\RIS_server_name\REMINST\Setup\language\Images\image_name\i386\templates
4701-1 ch19.f.qc 4/24/00 09:47 Page 1292
CROSS-REFERENCE
For more information on assigning NTFS permissions to files and folders,
see Chapter 11.
STEP BY STEP
TIP
If your RIS server is not a domain controller, you can install the
ADMINPAK on this computer to make Active Directory Users and
Computers available on the RIS server.
Select the appropriate option, and click Next. (The steps that follow assume that
you selected the “Associate a new answer file to an existing image” option. If you
chose to “Add a new installation image,” follow the instructions presented on-
screen to create this image.)
8. In the Unattended Setup Answer File Source screen, select the source where the
answer file you want to associate with the image can be found. Your choices are:
Windows image sample files: Select this option if you want to use one of
the two sample RIS answer files included with Windows 2000.
Another remote installation server: Select this option if you want to use
a RIS answer file located on a different RIS server.
An alternate location: Select this option if you want to specify the path to
a RIS answer file you’ve created by using Setup Manager.
9. Depending on the selection you make, you are either presented with the available
RIS answer files or prompted to browse for one. Specify the answer file you want
to associate with the image and click Next.
10. In the Select an Installation Image screen, specify the image with which you want
to associate the RIS answer file you selected. Click Next.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1295
11. In the Friendly Description and Help Text screen, you can enter a description and
any help text you wish to enter for this RIS image. The purpose of this information
is to help an end user or a technician select the appropriate RIS image. Configure
this screen as desired, and click Next.
12. In the Review Settings screen, click Finish.
13. The RIS image is created, and is added to the list on the Images tab. Click OK.
14. In the RIS server’s Properties dialog box, click OK.
15. Close Active Directory Users and Computers.
When preparing your master computer for RIPrep, there are a couple
of things you should be careful of.
■ Install Windows 2000 Professional and all applications on the master
computer’s C: drive. RIPrep will only copy the master computer’s
C: drive.
■ Try to use the smallest volume size for the master computer’s C:
drive as possible that will still accommodate the Windows 2000
Professional operating system and all desired applications. If the C:
drive is larger than it needs to be, you might not be able to copy
the image of this drive to client computers that have a smaller
hard disk than the master computer.
Once you’ve prepared your master computer for imaging, you’re ready
to use RIPrep on it to create an RIPrep image. Before you start RIPrep,
close all other applications that may be running on the master computer.
STEP BY STEP
If this screen appears, write down all programs, services, or applications that
need to be stopped. Don’t close the wizard.
First, close any open applications. Then, use the Services tool in Computer
Management to stop each of the listed services.
Back in the Programs or Services are Running screen, click Next.
8. In the Review Settings screen, click Next.
9. In the Completing the Remote Installation Preparation Wizard screen, click Next.
10. RIPrep copies the master computer’s hard disk, creates the RIPrep image, and
stores this image in the specified folder on the RIS server. This process takes
quite a while. When it completes, RIPrep shuts down the master computer.
11. The next time you start the master computer, the Mini-Setup wizard runs, and
you must complete this wizard to return the master computer to a usable state.
One final note about using RIPrep images.You must have at least one
CD-based image installed on your RIS server, in addition to the RIPrep
image(s), in order to perform a RIS installation of an RIPrep image on a
client computer. The reason for this requirement is that if a client
computer needs a specific hardware driver that wasn’t used on the master
computer, RIS can obtain that driver for the client from the CD-based
4701-1 ch19.f.qc 4/24/00 09:47 Page 1298
STEP BY STEP
TIP
Only computers that are PC98 or Net PC–compliant have GUIDs. If the
client computer doesn’t have a GUID, you can’t prestage it.
Figure 19-14 shows this dialog box after it has been configured. Notice the
beginning and ending brackets on the GUID. These brackets are required.
Click Next.
5. In the “Host server” dialog box, select one of these options:
Any available remote installation server
The following remote installation server
If you select “The following remote installation server” option, specify the FQDN
of the RIS server you want this client computer to use. You can browse for the
RIS server’s name if you need to.
Click Next.
6. In the New Object - Computer dialog box, click Finish to create the computer
object.
7. In the left pane of the Active Directory Users and Computers dialog box, ensure
that the domain or OU in which you created the computer account is highlighted.
Then, in the right pane, right-click the new computer object and select Properties
from the menu that appears.
8. In the computer’s Properties dialog box, click the Security tab.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1300
STEP BY STEP
1. If the client computer has a network adapter that supports PXE, power on the
computer, then type y to boot from the network.
Or, if the client computer has a network adapter that doesn’t support PXE but
that is supported by a RIS boot disk, insert the RIS boot disk into the computer’s
A: drive and power on the computer.
When prompted, press F12.
2. The Client Installation wizard starts. A Welcome message appears, indicating that
you need a valid logon name and password to begin the RIS installation.
3. In the Logon screen, enter your user name and password. After the logon is
complete, if you are using a RIS boot disk, remove the disk from the A: drive.
4. When the Setup Options screen appears, choose the type of installation you
want to perform: Automatic, Custom, Restart, Maintenance, or Troubleshooting.
(The actual options displayed in this screen depend on how the administrator
configured Choice Options in Group Policy.)
5. The Operating System Choice screen appears, listing the available images that
can be installed on this computer. Select the appropriate image.
6. The Caution screen is displayed, warning that the client computer’s hard disk will
be formatted by this process.
7. The Summary screen is displayed, which lists the options you’ve selected for
this installation.
8. RIS starts the Windows 2000 Professional installation. Follow the instructions
presented onscreen to complete the installation of Windows 2000 Professional.
Depending on the answer file associated with the RIS image, you may have little
or no interaction during the installation. Depending on the type of image you
selected, you may have to reboot the client computer one or more times to
complete the installation.
CROSS REFERENCE
See Chapter 3 for detailed information on how to respond to the screens
displayed during the installation of Windows 2000 Professional.
4701-1 ch19.f.qc 4/24/00 09:47 Page 1302
1304
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about deploying Windows 2000 and to help you prepare for
the Professional, Server, and Directory Services exams:
■ Assessment Questions: These questions test your knowledge of
the Windows 2000 deployment topics covered in this chapter.
You’ll find the answers to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge
you to apply your understanding of the material to solve a
hypothetical problem. In this chapter’s scenarios, you are asked
to analyze Windows 2000 deployment scenarios, and then answer
the question or questions that follow each scenario.You don’t need
to be at a computer to do scenarios.Answers to this chapter’s
scenarios are presented at the end of this chapter.
■ Lab Exercise: These exercises are hands-on practice activities that
you perform on a computer.The lab in this chapter gives you an
opportunity to practice several Windows 2000 deployment tasks.
Assessment Questions
1. You want to create an answer file that duplicates the computer’s
configuration on which you are creating the answer file.What is
the easiest way to do this?
A. Manually create an answer file
B. Use Setup Manager
C. Use RIS
D. This type of answer file cannot be created
2. You want to use Sysprep to prepare a Windows 2000 Server domain
controller for disk duplication, but you can’t get the utility to work.
What is the problem?
A. The server is not authorized in Active Directory
B. You do not have Administrative permissions
4701-1 ch19.f.qc 4/24/00 09:47 Page 1305
1305
1306
8. What can you use to create a RIS image that contains an operating
system and applications?
A. RIPrep
B. Sysprep
C. Setup Manager
D. Third-party disk imaging software
Scenarios
Deploying Windows 2000 on a network is a complex task. For each of the
following situations, consider the given facts and answer the question or
questions that follow.
1. You want to perform an unattended over-the-network installation
of Windows 2000 Professional.What basic steps should you take to
accomplish this?
2. You want to perform an unattended CD-based installation of
Windows 2000 Server.What basic steps should you take to
accomplish this?
3. You want to use Sysprep to install Windows 2000 Professional on 100
identical computers. How should you prepare the master computer?
4. You want to use the RIS server on your network to install Windows
2000 Professional and several applications on 100 client computers.
The computers don’t have identical mass storage device controllers,
and don’t have identical hard disks.
a. What type of image should you create?
b. How should you create this image?
5. Your company’s network has two RIS servers. Over the next few
weeks you want to deploy Windows 2000 Professional on 1,000
client computers.The RIS servers are configured to “not respond
to unknown client computers.”
a. What should you do to prestage the client computers?
b. How can you distribute the load between the two RIS servers?
4701-1 ch19.f.qc 4/24/00 09:47 Page 1307
1307
6. You create a RIS boot disk, but it does not work on some of your
client computers.
a. What is the most likely cause of this problem?
b. What should you do to solve the problem?
7. You want to deploy Windows 2000 Professional to 200 client
computers on your network by using a RIS server. Each of the
client computers has a network adapter that has a PXE ROM.You
create an RIPrep image on the RIS server.What steps should you
take to install the image on each of the client computers?
Lab Exercise
Lab 19-1 Deploying Windows 2000
Professional
Server
EXAM Directory Services
MATERIAL
1308
1309
15. In the Customize the Software screen, enter a default user name
of User. Enter your company’s name in the Organization text box.
Click Next.
16. In the Computer Names screen, enter a computer name of w2ktest,
then click Add. Click Next.
17. In the Administrator Password screen, type in a password of
password and confirm it by retyping it. Click Next.
18. In the Display Settings screen, accept the default settings and click
Next.
19. In the Network Settings screen, accept the default option of
“Typical settings” and click Next.
20. In the Workgroup or Domain screen, accept the default option of
Workgroup and click Next.
21. In the Time Zone screen, select your time zone from the drop-down
list box, and click Next.
22. In the Additional Settings screen, select the “No, do not edit the
additional settings” option and click Next.
23. In the Distribution Folder screen, accept the default selection of Yes
and click Next.
24. In the Distribution Folder Name screen, accept the default folder
name and share name. Click Next.
25. In the Additional Mass Storage Drivers screen, click Next.
26. In the Hardware Abstraction Layer screen, click Next.
27. In the Additional Commands screen, click Next.
28. In the OEM Branding screen, click Next.
29. In the Additional Files or Folders screen, click Next.
30. In the Answer File Name screen, accept the default answer filename
and location. Click Next.
31. In the Location of Setup Files screen, accept the default option of
“Copy the files from CD” and click Next. Setup Manager copies the
files from the compact disc.
32. In the Completing the Windows 2000 Setup Manager Wizard screen,
click Finish. Remove the Windows 2000 compact disc from your
computer’s CD-ROM drive. Close Windows Explorer.
4701-1 ch19.f.qc 4/24/00 09:48 Page 1310
1310
1311
CAUTION
Skip the rest of this part, and Parts 4 and 5 unless you have a second
hard disk in your Windows 2000 computer that is formatted with NTFS.
4701-1 ch19.f.qc 4/24/00 09:48 Page 1312
1312
21. Insert your Windows 2000 Professional compact disc into your
computer’s CD-ROM drive. Close the Microsoft Windows 2000
CD dialog box. From the desktop, select Start ➪ Run.
22. In the Run dialog box, type risetup and click OK.
23. The Remote Installation Services Setup wizard starts. Click Next.
24. In the Remote Installation Folder location screen, accept the default
path and click Next.
25. In the Initial Settings screen, select the check box next to “Respond
to client computers requesting service.” Click Next.
26. In the Installation Source Files Location screen, accept the default
path to your computer’s CD-ROM drive. Click Next.
27. In the Windows Installation Image Folder Name screen, accept the
default name for the folder that will contain the default RIS image.
Click Next.
28. In the Friendly Description and Help Text screen, accept the default
friendly description and help text, and click Next.
29. In the Review settings screen, click Finish.The RIS server copies
files, creates the remote installation folder, creates the default image of
Windows 2000 Professional, and sets up the RIS server.This process
takes several minutes.When this process completes, click Done.
1313
4. The Remote Boot Disk Generator creates the RIS boot disk. Click
No when asked if you want to create another disk.
5. In the Windows 2000 Remote Boot Disk Generator dialog box, click
Close. Close Windows Explorer.
1314
10. In the left pane of the Group Policy dialog box, in the User
Configuration section, click the + next to Windows Settings.
Then highlight Remote Installation Services. In the right pane,
double-click Choice Options.
11. In the Choice Options Properties dialog box, in the Automatic Setup
section, select the Allow option. In the Custom Setup section, select
the Allow option. Click OK.
12. Close the Group Policy dialog box.
13. In the domain1.mcse Properties dialog box, click OK.
14. Close Active Directory Users and Computers.
Assessment Questions
1. B. Setup Manager provides you with an option to create an answer
file that “duplicates this computer’s configuration.”
2. D. You can use Sysprep on Windows 2000 Professional and Windows
2000 Server computers, but you can’t use Sysprep on Windows 2000
Server domain controllers.
4701-1 ch19.f.qc 4/24/00 09:48 Page 1315
1315
Scenarios
1. Use Setup Manager to create an answer file for the unattended
installation, and to create a shared distribution folder on your
network server.Then, on the target computer, partition and format
the computer’s hard disk by using MS-DOS (or Windows 95 or
Windows 98 DOS).Then load the Client for Microsoft Networks
on the target computer, and map a network drive to the shared
distribution folder.At the command prompt, change the default
drive to the mapped network drive, then type unattend.bat and
press Enter to begin the unattended installation.
2. Use Setup Manager to create an answer file for the unattended
installation, and copy the unattend.txt and unattend.bat files
to a floppy disk.Then, on the target computer, partition and format the
computer’s hard disk by using MS-DOS (or Windows 95 or Windows
98 DOS). Next, boot the computer to DOS and load CD-ROM
drivers for the computer’s CD-ROM drive.Then place the floppy
disk in drive A: and the Windows 2000 Server compact disc in the
CD-ROM drive.At the command prompt, type A:\unattend.bat
and press Enter to begin the unattended installation.
3. Install Windows 2000 Professional and all desired applications on
the master computer. Configure desktop settings, shortcuts, and other
configurable options exactly the way you want them to appear on the
target computers.Then, copy the contents of the Administrator’s profile
folder over the contents of the Default User profile folder.
4701-1 ch19.f.qc 4/24/00 09:48 Page 1316
1316
Server
EXAM
MATERIAL
EXAM OBJECTIVES
C HAP TE R
20
Managing Terminal
Services
1319
4701-1 ch20.f.qc 4/24/00 09:48 Page 1320
Chapter Pre-Test
1. Which Terminal Services mode allows you to remotely manage
the Terminal server?
2. What tool do you use to install Terminal Services?
3. How does Terminal Services run 16-bit applications?
4. After installing Terminal Services in application server mode,
what must you do to previously installed applications so they
can function with Terminal Services?
5. What are application compatibility scripts?
6. What two methods can be used to install Terminal Services
Client software?
7. What tool can you use to end a client’s Terminal Services session?
8. What command-line utility can be used to remotely control a
Terminal Services session?
9. What licensing requirements are necessary for remote
administration mode?
10. How much time do you have before licensing is required in
application server mode?
4701-1 ch20.f.qc 4/24/00 09:48 Page 1321
TIP
A Terminal server is also called a Terminal Services server. In Microsoft
documentation, these two terms are used interchangeably.
When a user logs onto a Terminal server, the user sees the Terminal
server’s desktop interface, but keyboard strokes and mouse clicks made on
the user’s end are returned to the Terminal server for processing. In essence,
the user’s computer becomes a “dumb terminal.”All processing is performed
on the server’s end, and the Terminal server can host many Terminal Services
sessions at one time.
So, why would you want to use Terminal Services on your network?
First, if you use Terminal Services for application sharing, you can allow
users to access applications that might not run on their current system.This
feature allows you to have a powerful server computer that can host various
applications without having to provide user desktop systems with the power
to support those applications.
For example, let’s say you want to provide Microsoft Office to a number
of clients that have older computers, older operating systems, and a definite
lack of RAM and processing power.With Terminal Services, those users can
connect to the Terminal server and use those applications just as though
they were installed locally.To the users, it appears as though their systems are
running the applications, when in reality, the applications are being run on
the server’s end. This feature allows you to implement new applications
without having to upgrade current PC hardware and software at the same
time. In conjunction with Group Policy,Terminal Services can provide an
end-user a highly effective desktop configuration and application bank
without having to perform any of the configuration or processing locally.
Aside from providing end-user applications, you can also use Terminal
Services to remotely administer the Terminal servers on your network.
This feature allows you, as the administrator, to remain at your desk while
4701-1 ch20.f.qc 4/24/00 09:48 Page 1322
EXAM TIP
You can’t run Terminal Services in application server mode and remote
administration mode at the same time. The selections are mutually exclu-
sive. Keep this in mind when you take the Server exam.
STEP BY STEP
Select the “Remote administration mode” option if you only want to use Terminal
Services to remotely administer this server.
Select the “Application server mode” option if you want to configure this server for
application sharing. If this mode is selected, you will get the capability of remote
administration of the Terminal server, as well.
Click Next.
6. On the next Terminal Services Setup screen select the appropriate permissions
setting from the two options provided.
4701-1 ch20.f.qc 4/24/00 09:48 Page 1324
CPU cycles.This point alone should make you stop and take a look at both
your applications and your Terminal server. The Terminal server needs a
large hard drive, a fast CPU (probably 600 MHz or higher), and plenty of
RAM (probably 512MB or more). In addition, the applications you use
need to identify users by a username, not a computer name.
When you are choosing applications for use with Terminal Services,
always try to use 32-bit applications. You may have 16-bit applications
you used with previous versions of Windows, such as 3.11, that you
want to make available to the clients of the Terminal server. Although
Terminal Services can run 16-bit applications by translating them using
Win16-on-Win32 (WOW), you can expect a serious performance hit
on the server. Many 16-bit applications will increase the memory each
user needs by 50 percent and processor by 40 percent. In short, if you
use 16-bit applications, you will see performance problems, and not as
many people will be able to use the Terminal server at the same time.
For similar reasons, MS-DOS applications are not recommended for use
with Terminal Services since they tend to consume more system
resources than 32-bit applications.
You must install the applications that you want to use after you install
Terminal Services in application server mode. If the applications you want
to make available to clients are already installed on the Terminal server, you
must uninstall them and reinstall them. In order to install applications for
use with Terminal Services, you must use Add/Remove Programs in
Control Panel to install the application.The reason for this is simple: most
applications are installed for use by a single user — if multiple users are to
use an application, it must be installed in a multiuser format.
Terminal Services provides two application installation modes: execute
mode and install mode. In execute mode, the Terminal server runs an appli-
cation or installs it for a single user. In install mode, the Terminal server
installs the application for use in a multi-user environment. By using
Add/Remove Programs in Control Panel, the server is automatically put in
install mode. If you try to install the application by using the application’s
installation/setup program, the setup will fail on a Terminal server and you
will receive a failure notice.
The following steps explain how to use Add/Remove Programs in
Control Panel to install applications for use with Terminal Services.
4701-1 ch20.f.qc 4/24/00 09:48 Page 1326
STEP BY STEP
Once you have installed all of the applications you want to use on your
Terminal server, your next task is to try to tweak these applications so that
they work as well as possible with Terminal Services.Windows 2000 Server
includes a collection of application compatibility scripts to optimize many
common applications for use with Terminal Services.The scripts are stored
in the SystemRoot\Application Compatibility Scripts\Install
folder on a Windows 2000 Server computer that has Terminal Services
installed on it, as shown in Figure 20-2.
As Figure 20-2 shows, common scripts include Microsoft Office,
Microsoft Word, Microsoft Excel, Netscape Communicator, and so on.The
content of each script varies depending on the application.The scripts are
designed to perform tasks such as editing the registry as needed, turning off
CPU-intensive features, and adding multiuser support. To use the scripts,
install your application first, locate its script in the Install folder, then
double-click the script’s icon to run the script.You need to run the script
before any users try to access the application on the Terminal server.When
the script completes its processing, log off and log back on before accessing
the application.
4701-1 ch20.f.qc 4/24/00 09:48 Page 1327
Aside from running available scripts, there are a few other things you
can do to enhance the performance of your applications with Terminal
Services. First, a serious performance problem can be intensive video
usage. Some applications have very active video usage, and these features
can push the Terminal server’s CPU to the max. If possible, reconfigure the
application to use less intensive video settings.
Next, look for features that always run in the background. For example,
Microsoft Word has a spelling checker that constantly runs in the background.
As you type, the spelling checker examines your words and underlines any
words it believes you have misspelled. Although a helpful feature, this does
cause Word to consume more system resources. Once you have identified fea-
tures, like the spelling checker, that run in the background of the application,
turn those features off.
Another option is to identify features in an installed application that are
helpful in a limited way, but that users can live without. For example, the
Office Assistant in Microsoft Office — you know, the little cartoon
paperclip — can be helpful, but users can access the Help files without it.
These little features can consume resources and degrade performance. Look
for ways to turn them off.
4701-1 ch20.f.qc 4/24/00 09:48 Page 1328
A final issue you should think about is application programs that start
other programs. For example, Microsoft Office programs often have a tool-
bar that allows the users to launch other Microsoft applications from that
application.While good on a desktop PC, you should try to remove these
toolbars and features so that users can only open one application at a time.
This conserves system resources, especially memory.
In some cases, the registry can be used to tweak applications so they use
less system resources.This technique is not recommended. If at all possible,
you should use the application’s graphical user interface to configure the
application to work well with Terminal Services.
CAUTION
Editing the registry is a serious operation. Changes made to the registry
become effective immediately, and incorrect changes to the registry can
cause systemwide problems, or even cause Windows 2000 to fail to boot.
STEP BY STEP
2. The Create Installation Disk(s) dialog box appears, as shown in Figure 20-3. Notice
the two Network client options available in this dialog box. Also notice that Terminal
Services Client Creator tells you how many disks you will need for the selected
client software option.
3. Highlight the appropriate option. Then select the destination floppy drive from the
“Destination drive” spin box. Optionally, you can select the Format Disk(s) check box
to allow the Client Creator to format your floppy disks before the Terminal Services
Client software is copied to them. When you have completed the appropriate selec-
tions in this dialog box, click OK.
4. A dialog box appears telling you to insert the first disk into your disk drive. Insert
the disk, then click OK. Follow any additional instructions that appear to insert
and remove disks as needed.
STEP BY STEP
2. In the left pane, highlight the drive that contains the Terminal Services Client
setup files — this is either the network drive that is connected to the shared
folder that contains the Terminal Services Client software, or the floppy drive
that contains the Terminal Services Client installation/setup floppy disk. In the
right pane, double-click Setup.exe.
3. In the Terminal Services Client Setup welcome dialog box, click Continue.
4. Enter your name and organization in the dialog box provided. Click OK.
5. A confirmation dialog box appears. Click OK.
6. The License Agreement dialog box appears. Read the agreement and click I Agree.
7. In the Terminal Services Client Setup dialog box, click the large installer button.
8. The Terminal Services Client - Choose Program Group dialog box appears. Either
accept the default Program Group selection or choose a new one. Click Continue.
9. Terminal Services Client software files are copied. Insert additional disks if
prompted. When a dialog box notifies you that Terminal Services Client Setup
was completed successfully, click OK. You don’t need to reboot your computer.
10. Close Windows Explorer (or Windows NT Explorer).
STEP BY STEP
2. Select the name of the Terminal server to which you want to connect from the list of
available servers. If the server you want to access is not listed, type in the server’s
name or IP address in the Server text box.
Select the desired screen area from the “Screen area” drop-down list box. You can
select any screen size up to the current resolution setting on the client computer.
Select the appropriate check boxes:
Enable data compression: This check box is selected by default, and
should be selected to reduce network traffic to and from the Terminal server.
Cache bitmaps to disk: Select this check box if you want the local computer
to cache bitmaps to disk to save network traffic. This option is especially useful
when connecting to a Terminal server over a Dial-up Networking connection.
This option is not selected by default.
Click Connect.
3. The Log On to Windows dialog box appears. Enter a user name and password
and click OK.
4. You are now connected to the server that is running Terminal Services. The desktop
of the Terminal server is displayed in the Terminal Services Client dialog box. You
can now run applications and remotely administer the Terminal server as if you were
logged on interactively to the Terminal server.
4701-1 ch20.f.qc 4/24/00 09:49 Page 1333
STEP BY STEP
9. The Icon and Program Group screen is displayed. In this dialog box you can
accept the default icon and program group for this connection, or you can specify
different ones. Configure the options on this screen as desired and click Next.
10. In the Completing the Client Connection Manager Wizard screen, click Finish.
The shortcut to the connection now appears in the Client Connection Manager
dialog box, as shown in Figure 20-6.
You can use this same wizard to create shortcuts for multiple connections,
with each shortcut having a different set of predefined Terminal Services
connection properties. Once created, these shortcuts appear in the Client
Connection Manager dialog box, which you can access by selecting Start ➪
Programs ➪ Terminal Services Client ➪ Client Connection Manager.
To use a shortcut to establish a Terminal Services session, in Client
Connection Manager, right-click the shortcut you want to use and click
Connect.You can also right-click the shortcut and select Properties from the
menu that appears to modify the properties used to establish that particular
Terminal Services connection.The Properties dialog box provides you with
the same options you configured when you originally created the shortcut
to the connection.
TIP
If at any time you need to change the options you selected for a shortcut
to a Terminal Services connection, simply access the Properties dialog
box for the shortcut and make the desired changes. You don’t need to
create a new shortcut to the connection.
change logon Used to disable and enable logons to the Terminal server
change port Used to modify COM port mappings for
MS-DOS programs
change user Used to change the current user’s .ini file mapping
cprofile Used to remove file associations from a user’s profile
dbgtrace Used to enable and disable debug tracing
flattemp Used to enable and disable flat temporary directories
logoff Used to end a client’s session
msg Used to send messages to Terminal Services clients
query process Used to display information about processes
query session Used to display information about Terminal
Services sessions
query termserver Used to display a list of Terminal servers on the network
query user Used to display information about currently logged
on users
register Used to register programs
reset session Used to reset/delete Terminal Services sessions
shadow Used to remotely control or monitor Terminal
Services sessions
tscon Used to start a Terminal Services session
tsdiscon Used to end a Terminal Services session
4701-1 ch20.f.qc 4/24/00 09:49 Page 1337
Command Explanation
Aside from using the command-line utilities, you can also use the GUI
Terminal Services Manager to manage Terminal Services sessions. You can
access Terminal Services Manager (which is physically located on the
Terminal server) from either a client after a Terminal Services session has been
established, or on the Terminal server itself. To access Terminal Services
Manager, select Start ➪ Programs ➪ Administrative Tools ➪ Terminal Services
Manager.The Terminal Services Manager dialog box is shown in Figure 20-7.
TIP
Some Terminal Services Manager actions, such as Remote Control and
Connect, work only when Terminal Services Manager is run from a
Terminal Services client session. When the Terminal Services Manager is
run on the Terminal server console, these features are disabled.
■ Reset: This action resets the Terminal Services clients session and
closes any applications the user has open. Unsaved data is lost.
■ Status: This status option displays input/output statistics for the user’s
session. Figure 20-8 shows a Status dialog box. Notice the various
session statistics displayed in this dialog box.
■ Log Off: This action logs the user off the Terminal server.
Many of these Terminal Services Manager actions are available on toolbar
buttons as well. In the next section, I’ll show you how to perform actions in
Terminal Services Manager that affect users.
STEP BY STEP
MANAGING USERS
1. Select Start ➪ Programs ➪ Administrative Tools ➪ Terminal Services Manager.
2. In the left pane, expand the domain that contains the Terminal server you want
to manage. Then highlight the desired Terminal server.
3. In the right pane, highlight the user you want to manage.
4. Select the Actions menu, and then select the action you wish to perform, such
as Disconnect, Send Message, Reset, Status, or Log Off.
4701-1 ch20.f.qc 4/24/00 09:49 Page 1340
Managing Sessions
The Sessions tab in the right pane of the Terminal Services Manager console
presents much of the same types of information displayed on the User tab, but
interprets that information in terms of the session in progress. Figure 20-9
shows the Sessions tab.
The Sessions tab lists the sessions in progress, both by console and by
RDP-Tcp connection number.The Console session refers to the user that
is logged on interactively to the Terminal server. For each session the user
name is listed, as well as the state, type, client name, idle time, logon time,
and so forth. If you highlight a session, then click the Actions menu, you
can choose to disconnect the session, send a message, reset the session, or
view the session’s status.The basic difference between the Sessions tab and
the Users tab is the perspective or point of view — on the Sessions tab you
can view your Terminal Services usage by sessions, and on the Users tab
you can view Terminal Services usage by users.
Managing Processes
The Processes tab in the right pane of the Terminal Services Manager console
enables you to view the system processes in use by the connected users.The
Processes tab is shown in Figure 20-10.
4701-1 ch20.f.qc 4/24/00 09:49 Page 1341
The Processes tab lists the user, session, session ID, PID, and image being
used by each process.The PID, or process ID, gives you an ID number for
each image.An image is an executable file that is being run. By examining
the Processes tab, you can determine which user is using which resource. If
the user should not be using the resource, or has been using the resource
for too long, you can end the process.
CAUTION
You should be aware, however, that ending a process in Terminal
Services Manager does not give the user any warning, and all of the
user’s unsaved data will be lost.
STEP BY STEP
ENDING A PROCESS
4. On the Processes tab, locate the user and the process you want to terminate.
Highlight the user’s name, then select Actions ➪ End Process.
5. A Terminal Services Manager warning message appears. Click OK.
TIP
You cannot end all processes for a user at one time. You must individually
select each process the user is running, then end them one at a time.
EXAM TIP
Make sure you’re ultra-clear on this point — you can only use remote control
from a Terminal Services client session. Remote control is disabled when
you run the Terminal Services Manager on the Terminal server console.
Before you can use Terminal Services remote control for a specific user
account, you’ll need to enable remote control, configure whether the user’s
permission is required for you to remotely control his or her session, and
configure your level of control over the user’s session.You can choose to
simply view the user’s session, or to interact with it.The interaction option
allows you to essentially take over the user’s session. For example, if a user
is having problems saving a document in Microsoft Word, you could take
over the session and save the document for the user. If you select the check
box next to “Require user’s permission,” when you attempt to remotely
control the user’s session, the user is sent a message asking the user to either
accept or deny your request for remote control.
The following step-by-step instructions show you how to configure a
user’s account for remote control.
4701-1 ch20.f.qc 4/24/00 09:49 Page 1344
STEP BY STEP
Once your user accounts are configured for remote control, you can
then access the desired sessions and view or interact with the session. Using
remote control is straightforward, but there is one thing you should know
before you use it. When you connect to a user’s session by using remote
control, you will be presented with a Remote Control hot key dialog box.
This dialog box prompts you to select a desired hot key combination
which you can use to end your remote control session. Once you select a
hot key combination, you should be sure to memorize it because you’ll
need it to end your remote control session.
CAUTION
You can use the shadow command-line utility to establish a remote con-
trol session, but you will not be presented with the Remote Control hot
key dialog box. The default Remote Control hot key combination (Ctrl + *
on the numeric keypad) will be used, so be certain you know this hot key
combination before using the shadow command.
STEP BY STEP
EXAM TIP
Keep the licensing requirements in mind for the Server exam — using
Terminal Services in remote administration mode requires no license;
however, running Terminal Services in application server mode requires
licenses, but you have 90 days to implement the necessary licensing.
4701-1 ch20.f.qc 4/24/00 09:49 Page 1346
STEP BY STEP
Managing Licenses
Installing the Terminal Services Licensing application is simple. Unfortunately,
understanding Terminal Services licensing is a bit more complex. Terminal
Services licensing is on per seat basis, not on a per user basis. In other words,
computers — not users — are licensed to access the Terminal server.
Let’s start with the Windows 2000 Server computer on which Terminal
Services is installed — that’s your Terminal server. For that computer, you’ll
need a Windows 2000 Server license. This license is included when you
buy Windows 2000 Server.
Next, you’ll need a Windows 2000 Server Client Access License for
each and every computer or Windows-based Terminal that will connect
to the Terminal server, because they’re connecting to a Windows 2000
Server computer.
4701-1 ch20.f.qc 4/24/00 09:49 Page 1348
The process goes like this.The Administrator logs on to the computer that
is running Terminal Services Licensing — this is the computer that will
become the license server. Then, the Administrator starts Terminal Services
Licensing and uses this program to contact the Microsoft Clearinghouse,
typically over the Internet. Microsoft Clearinghouse activates the license
server, and provides the server with a digital certificate to validate it. Once
this is established, the licensing server can then make transactions with the
Microsoft Clearinghouse for additional client licenses. In addition to using
the Internet, the Microsoft Clearinghouse can be contacted by fax and tele-
phone, although the Internet is the preferred and fastest approach.
The following steps explain how to start Terminal Services Licensing
and how to activate the license server.
STEP BY STEP
In the right pane of the Terminal Services Licensing dialog box, highlight the
server you want to activate, and select Action ➪ Activate Server.
3. The Licensing Wizard starts. Click Next.
4701-1 ch20.f.qc 4/24/00 09:49 Page 1350
4. In the “Connection method” screen, select the method you want to use to connect
to the Microsoft Clearinghouse from the drop-down list box. Options you can select
from include the Internet, World Wide Web, Fax, or Telephone.
5. The remaining steps very considerably depending on the connection method
you chose in Step 4. Follow the instructions presented onscreen to complete
the activation of your license server and to purchase client licenses.
Once you have activated the license server and purchased client
licenses, your next task is to examine the licenses for the software you are
making available to Terminal Service clients. In general, the software
licensing that applies to the product in a single-session environment also
applies in a Terminal Services environment. For example, Microsoft Office
97 requires a per-seat license. To meet the licensing requirements in a
multi-user environment, each user that will use Microsoft Office in a
Terminal Services session must have an Office license. Once you meet
these requirements, you’re ready to go.
1353
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about Terminal Services, and to help you prepare for the
Server exam:
■ Assessment Questions: These questions test your knowledge of
the Terminal Services topics covered in this chapter.You’ll find the
answers to these questions at the end of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge you
to apply your understanding of the material to solve a hypothetical
problem. In this chapter’s scenarios, you are asked to analyze Terminal
Services problems, and provide answers to the questions.You don’t
need to be at a computer to do scenarios.Answers to this chapter’s
scenarios are presented at the end of this chapter.
■ Lab Exercise: These exercises are hands-on practice activities
that you perform on a computer.The lab in this chapter gives
you an opportunity to practice installing, configuring, and using
Terminal Services.
Assessment Questions
1. An administrator wants to use both remote administration mode and
application server mode on a Terminal server, but cannot seem to get
the configuration to work.What is the problem?
A. The server does not have the necessary system resources to provide
both modes.
B. The server is not in licensing compliance.
C. Terminal Services does not support using both modes on the
same server.
D. The administrator does not have DNS configured correctly.
2. You want to remotely control a Terminal Services client session
to assist a user.You are logged in as Administrator from a Terminal
Services client, but you receive an error message when you try to
use remote control.What is the most likely cause of the problem?
4701-1 ch20.f.qc 4/24/00 09:49 Page 1354
1354
1355
D. SystemRoot\Application Compatibility
Scripts\Install
7. You would like to use the command line to end an application that a
Terminal Services client is running.What command can you use?
A. Tscon
B. Tsprof
C. Tsend
D. Tskill
8. When using remote control, how do you end the remote control session
without ending your Terminal Services session as well?
A. Use the hot key combination you selected.
B. Use the Shut Down command.
C. Use the Kill Session command.
D. Just close the Terminal Services window.
Scenarios
The following scenarios provide you with an opportunity to apply the
knowledge you’ve gained in this chapter about Terminal Services. For each
of the following situations, consider the given facts and answer the question
or questions that follow.
1. After installing Terminal Services in application server mode, an
administrator realizes that the applications he wants to make
available do not work.
a. What is the cause of this problem?
b. How would you resolve the problem?
2. An administrator is logged onto the Terminal Services console.
The administrator wants to remotely control a user’s session,
and he verifies that remote control is enabled on the user’s
account. However, the Remote Control option is not available
in the Terminal Services Manager console.
a. What is the cause of this problem?
b. How would you resolve the problem?
4701-1 ch20.f.qc 4/24/00 09:49 Page 1356
1356
Lab Exercise
Lab 20-1 Installing, Configuring, and Using
Terminal Services
Server
EXAM
MATERIAL
1357
1358
1359
1360
Assessment Questions
1. C. You cannot use remote administration mode and application server
mode on the same Terminal server at the same time.
2. B. While it is true that there could be a TCP/IP connectivity problem,
the most likely cause of this problem is the user’s account properties.You
must enable remote control for the client by accessing the user account’s
Properties dialog box and selecting the “Enable remote control” check
box on the Remote control tab.
4701-1 ch20.f.qc 4/24/00 09:49 Page 1361
1361
Scenarios
1. In Terminal Services application server mode, applications must be
installed after Terminal Services is installed on the Windows 2000 Server
computer.To solve this problem, uninstall the applications, then reinstall
them by using Add/Remove Programs in Control Panel.You must use
Add/Remove Programs in Control Panel and not the application’s
setup program.
2. In order to use remote control, you must be logged on to the
Terminal server from a Terminal Services client session, and you
must be logged on either as Administrator or as an a user with
administrative privileges.You cannot remotely control a client
when you are logged onto the Terminal server console.To solve
the problem, log on to the Terminal server as Administrator by
using a Terminal Services client session — then remote control
will be available.
4701-1 ch21.f.qc 4/24/00 09:55 Page 1364
Professional
Server
EXAM
MATERIAL Networking
EXAM OBJECTIVES
C HAP TE R
21
Monitoring, Optimizing,
and Troubleshooting
Performance
I n a perfect world, we could simply configure our computers, walk away, and
they would perform optimally all of the time. Unfortunately, this scenario is
simply not reality. Windows 2000, as with any advanced operating system,
requires monitoring, optimizing, and occasional troubleshooting in order to keep
it working in peak condition. In this chapter, I’ll examine the Windows 2000
processes and tools available to help you monitor and optimize it for its complex
operations. In this chapter, I’ll explain how to use System Monitor, Network
Monitor, and Task Manager, how to monitor shared network folders, and how to
optimize system components and troubleshoot performance problems.
1365
4701-1 ch21.f.qc 4/24/00 09:55 Page 1366
Chapter Pre-Test
1. Which Windows 2000 tool replaces Windows NT 4.0’s
Performance Monitor?
2. System Monitor functions by using objects, instances, and
__________.
3. Which System Monitor object would you use to examine the
performance of your computer’s hard disk?
4. What does Network Monitor capture?
5. You want to stop a process on your Windows 2000 Server
computer. Which tool can you use to accomplish this?
6. Which Windows 2000 tool can be used to easily monitor shared
network folders?
7. In most cases, what is the best solution to resolve poor memory
performance on a Windows 2000 computer?
8. If your Windows 2000 computer’s hard disk performance
decreases over time, what is the most likely cause of the
problem?
4701-1 ch21.f.qc 4/24/00 09:55 Page 1367
Monitoring Performance
As with any computer, your Windows 2000 computer’s performance is
based on many factors. Many people are under the mistaken impression
that a fast CPU and plenty of memory will solve any performance prob-
lems they could possibly ever have.While it is true that your hardware dri-
ves much of your system’s performance, a smart network administrator
realizes that it is not only hardware and software that drive performance,
but also how your computer uses that hardware and software.
In a nutshell, you monitor a computer’s performance to determine how
that computer is using its available resources. By monitoring performance,
you can gain a clear picture of which components in your computer are
performing optimally, and which components in your computer may have
some trouble spots. By monitoring performance, you can learn what works
well in your computer, and what doesn’t work well in your computer.
Then you can plan an appropriate course of action to correct any system
problems that are degrading the performance of the Windows 2000 com-
puter or your Windows 2000 network.
Unfortunately, performance tends to be a category of network adminis-
tration that is ignored until there is a problem — this is a reactive approach.
A better approach is a proactive one.Try to get in the habit of periodically
monitoring different components in your computers to make sure that all
hardware and software are working at their peak.This approach ensures the
fastest performance, optimal server availability, and a way for you to solve
computer and network problems proactively — before they ever begin.
Fortunately, the tools you may have used in Windows NT 4.0, such as
Performance Monitor, Network Monitor, and Task Manager, return in
Windows 2000 without too many changes. In the remainder of this chap-
ter, I’ll explain how to use these tools to solve performance problems on
your Windows 2000 computers and on your Windows 2000 network.
In the following sections I’ll show you how to configure and use
System Monitor to examine the performance of your computer’s system
components.
4701-1 ch21.f.qc 4/24/00 09:55 Page 1369
TIP
Many BackOffice products, such as Systems Management Server, Proxy
Server, Exchange, SQL Server, and so on, add their own counters to
System Monitor when they are installed. You can then use System
Monitor to examine the performance of these products.
So, you have a lot of objects and even more counters to choose from.
Which are the most helpful? And how do you know when you should use
a particular object or counter? Table 21-1 lists the most common counters
used to monitor the performance of memory, physical disk, network,
processor, and application performance.
EXAM TIP
The exams are likely to have questions on using some of the System
Monitor objects and counters described in Table 21-1. Study this table
carefully before you take the exams!
4701-1 ch21.f.qc 4/24/00 09:55 Page 1370
STEP BY STEP
At the top of the dialog box, select from one of the two options:
Use local computer counters: Select this option if you want to view per-
formance data from the computer on which you are running System Monitor.
Select counters from computer: Select this option if you want to view
performance data from this computer, or from other computers on the net-
work. If you select this option (which is selected by default), you must also
select or type in a computer name (in the format \\computer_name) in
the drop-down list box.
4701-1 ch21.f.qc 4/24/00 09:55 Page 1373
Next, select the object you want to monitor from the “Performance object” drop-
down list box.
Then, select from the following two options:
All counters: Select this option if you want to measure and view all coun-
ters associated with the object you selected.
Select counters from list: Select this option if you want to measure and
view only specific counters associated with the object you selected. If you
select this option, also select the counters you want to use from the list box.
Finally, select from the following two options:
All instances: Select this option if you want to measure and view all
instances of the selected counter(s).
Select instances from list: Select this option if you want to measure and
view only specific instances of the counters you selected. If you select this
option, also select the instance(s) you want to monitor.
TIP
When you’re configuring this dialog box, click the Explain button at any
time to view a detailed description of the highlighted object and counter
combination. The description is displayed in the Explain Text dialog box
that appears directly below the Add Counters dialog box.
When you finish selecting options for this object, click Add. Repeat this step to
add additional objects and counters as necessary. When you finish selecting
objects and counters, click Close.
4. System Monitor displays measurements of the objects and counters you selected
in a chart in the right pane.
If you have difficulty determining which line on the chart represents the
highlighted counter, you can press Ctrl + H to highlight that counter’s line.
Press Ctrl + H again to stop highlighting the counter’s line on the chart.
In addition to viewing the data collected by System Monitor in a chart,
you can also view this data in a report.To view data in a report, click the
View Report button in the toolbar (this button appears as a writing tablet
with lines on it, and is located to the left of the Add button).
4701-1 ch21.f.qc 4/24/00 09:55 Page 1375
TIP
To find out what each of the buttons in the toolbar can do, place your cur-
sor over that button, and an identification box is displayed.
Finally, you can use System Monitor to view historical log file data as
opposed to viewing a computer’s current performance activity.You can cre-
ate log files that can be viewed in System Monitor by using Performance
Logs and Alerts, which is also a snap-in to the Performance MMC.
STEP BY STEP
Monitor Capture Window dialog box, or the Capture Window dialog box
for short.
To access Network Monitor, select Start ➪ Programs ➪ Administrative
Tools ➪ Network Monitor. The Capture Window dialog box is shown,
after a capture has been performed, in Figure 21-5. (Until a capture is per-
formed, no statistics appear in this dialog box. I’ll explain how to perform
a capture a little later in this section.)
Graph pane Session Stats pane Total Stats pane Station Stats pane
As Figure 21-5 shows, the Capture Window dialog box has four panes:
the Graph pane, the Session Stats pane, the Total Stats pane, and the Station
Stats pane.You can use the Windows menu or the various buttons on the
toolbar to configure which panes are displayed in this dialog box.
The Graph pane, which is the scrolling box located in the upper left
corner of the Capture Window dialog box, displays five bar graphs. Each of
these bar graphs depicts various network statistics, including % Network
Utilization, Frames Per Second, Bytes Per Second, Broadcasts Per Second,
and Multicasts Per Second.
The Session Stats pane, which is the scrolling list box located in the mid-
dle of the left side of the Capture Window dialog box, displays a summary
4701-1 ch21.f.qc 4/24/00 09:55 Page 1378
STEP BY STEP
CAPTURING PACKETS
STEP BY STEP
8. The Address Expression dialog box appears, as shown in Figure 21-8. Note the
Station 1 and Station 2 list boxes.
First, select the Include or Exclude option at the top of the dialog box, depending
on whether you want to capture or exclude from capturing packets associated
with a particular pair of computer names or network addresses.
Highlight a computer name or network address from the Station 1 list box. Then,
highlight a direction arrow in the Direction list box to indicate whether the com-
puter name or network address highlighted in the Station 1 list box is the packets’
source address (--->), destination address (<--- ), or can be either the source or
destination address (<-->).
Finally, highlight a computer name or network address from the Station 2 list box.
Click OK. The new address appears in the Capture Filter dialog box. Network
Monitor enables you to configure up to three address pairs in a single capture
filter.
9. To configure a capture filter to capture packets by a specific byte pattern con-
tained in those packets, double-click (Pattern Matches) in the Capture Filter
dialog box.
10. The Pattern Match dialog box appears. Configure the Pattern and Offset (in hex)
text boxes. Click OK.
4701-1 ch21.f.qc 4/24/00 09:55 Page 1382
CAUTION
Configuring a capture filter by byte pattern is normally done only by
advanced users of Network Monitor. Detailed knowledge of packet con-
struction is required to configure a pattern match filter.
Saving Captured Data After you finish performing a capture, you can save
the captured data to a file for later analysis if you like.This feature is help-
ful because you can gather a collection of packet captures over a period of
time, then analyze them at a time that is convenient for you.
To save captured packets to a file, select File ➪ Save As in the Capture
Window dialog box after you stop a capture.Type in a name for the cap-
ture and click Save.
To view the saved file at a later time, select File ➪ Open in the Capture
Window dialog box, and then select the file you saved in the Open dia-
log box.
The following sections explain how to view and interpret captured data
by using the Capture Window and Capture Summary dialog boxes.
Using the Capture Window Dialog Box The Capture Window dialog box is
the main Network Monitor dialog box that was shown in Figure 21-5. As
previously mentioned, this dialog box has four panes: the Graph pane, the
Session Stats pane, the Total Stats pane, and the Station Stats pane. In this
section I’ll show you how to use this dialog box to perform some of the
most common network analysis tasks on captured data.
One common task is determining current network utilization.To deter-
mine the current utilization of a network segment, start a Network
Monitor capture, and then watch the % Network Utilization bar graph in
the Graph pane during the entire capture period.This graph displays only the
most recent one-second’s worth of network activity, so you must view it
during the entire capture period to get a feel for overall network utiliza-
tion. A high number on the graph (any number consistently over 50%)
may indicate that there is too much traffic on the network segment.
Another common task is determining which computer is sending or
receiving the most of a specific type of network traffic.You can sort any of
the columns in the Session Stats and Station Stats panes to determine pre-
cisely which computer is sending (or receiving) the most of a specific type
of network traffic. For example, you can sort the Frames Sent column in
the Station Stats pane to determine which computer on the network seg-
ment sent the most packets during the capture period. Similarly, you can
sort the Broadcasts Sent column in the Station Stats pane to determine
which computer sent the most broadcasts during the capture period.You
can also sort the Frames Received column in the Station Stats pane to
determine which computer received the most packets during the capture
period. All the other columns can be sorted, as well, to determine which
computer was responsible for generating the most bytes sent, most directed
frames sent, most multicasts sent, and so forth. When you sort a column,
Network Monitor displays the output in descending order, with the largest
number appearing at the top of the column.To sort a column, right-click
anywhere in the column and select Sort Column.
Using the Capture Summary Dialog Box To access the Capture Summary
dialog box, in the Capture Window dialog box, select Capture ➪ Display
Captured Data. Figure 21-9 shows the Capture Summary dialog box.
4701-1 ch21.f.qc 4/24/00 09:55 Page 1384
Notice the dialog box lists, by frame number, all of the packets captured by
Network Monitor during the capture period.
You can double-click any frame listed in this dialog box to obtain
detailed information about the contents of that packet. For example,
Figure 21-10 shows the packet details view for a specific packet. Notice
the middle pane in the dialog box shows protocol decode information, and
the lower pane in the dialog box shows, in hexadecimal, the entire contents
of the packet.
If there are too many packets displayed in the Capture Summary dialog
box, you can configure a display filter to limit the number of captured
packets displayed. Configuring a display filter is very similar to configuring
a capture filter.
FIGURE 21-10 Viewing packet detail in the Capture Summary dialog box
STEP BY STEP
1. Press Ctrl+Shift+Esc.
2. In the Windows Task Manager dialog box, click the Performance tab if it is not dis-
played.
3. On the Performance tab, monitor the CPU Usage and Memory Usage statistics.
You can also view the CPU Usage History and Memory Usage History graphs.
When you finish monitoring performance statistics, exit Windows Task Manager.
STEP BY STEP
5. In the left pane, highlight the Open Files folder. In the right pane, a list of files
currently open in shared folders on this computer is displayed. To close a file,
right-click the file, and select Close Open File from the menu that appears. Click
OK to confirm the action you want to take.
6. Close Computer Management.
EXAM TIP
You can expect the Windows 2000 exams — particularly the Professional
exam — to have several questions on these optimizing and troubleshoot-
ing topics. I recommend you review the following sections carefully
before taking the exams.
Adding RAM can reduce how often the computer reads or writes vir-
tual memory pages to or from the paging file on the hard disk. This is
called reducing paging. Because paging uses both processor time and disk
time, when paging is reduced, the performance of the processor and the
disk are also improved.
When RAM is added to the computer, Windows 2000 automatically
increases the allocation of RAM made available to the disk cache.The disk
cache temporarily stores user requested files from the hard disk in RAM.
Because the disk doesn’t need to be accessed when a file is retrieved from
the cache, files in the cache are more quickly available to users than files on
the disk. Thus, increasing the size of the cache can improve disk perfor-
mance because the number of disk accesses is reduced.
4701-1 ch21.f.qc 4/24/00 09:55 Page 1390
the problem is the processor, when in fact you don’t have enough RAM to
handle the processing jobs.
So, use System Monitor and Windows Task Manager to check both your
processor and your memory, so you know exactly what the problem is. If
you determine that your processor is too slow, you have a few decisions to
make. First, you can simply upgrade the processor to a faster one. Or, you
can add a processor so that your computer uses two, or you can keep your
existing processor and remove some of the server’s load by moving other
processes or tasks to different servers.
Before upgrading your processor, take a good look at your entire com-
puter. It may be time for a new computer, in which case, it would probably
be a waste of money to buy a new processor if the entire computer needs
to be replaced anyway.
EXAM TIP
You should know that mirrored volumes, while they are an effective fault
tolerance solution, don’t improve disk performance in Windows 2000.
For example, when users access a Windows 2000 domain controller for
logon authentication across a WAN link (and slow server response time is
reported), consider placing an additional domain controller on the same
side of the WAN link as the client computers that need to access it. Placing
the domain controller physically close to the client computers will improve
server response time and reduce WAN link traffic.
STEP BY STEP
If a Task Manager Warning dialog box appears, click Yes to change the
process’s base priority.
3. When you finish managing processes, close Windows Task Manager.
must update a large database or generate a large report on a daily basis, and
it isn’t critical that this task be done during business hours, consider sched-
uling the task to run after business hours (and before the tape backup is
run for the night). If the task must be done during business hours, consider
scheduling it to run during a period of lower activity, such as during a
lunch hour.
STEP BY STEP
1. From the desktop, right-click My Network Places, then select Properties from the
menu that appears.
2. In the Network and Dial-up Connections folder, right-click any Local
Area Connection, then select Properties from the menu that appears.
3. In the Local Area Connection Properties dialog box, highlight File and Printer
Sharing for Microsoft Networks, then click Properties.
4. The File and Printer Sharing for Microsoft Networks Properties dialog box
appears, as shown in Figure 21-14. Notice the four optimization options.
Select the option that will provide the best performance for your Windows 2000
Server computer. Click OK.
5. In the Local Area Connection Properties dialog box, click OK.
6. Close the Network and Dial-up Connections folder.
4701-1 ch21.f.qc 4/24/00 09:55 Page 1399
■ If you determine, by using Network Monitor and System Monitor, that there is
too much network traffic on a network segment, consider further segmenting
that network segment by installing a router or a switch.
■ Windows 2000 handles applications based on their priorities. You can use the
start command to start applications at various base priorities. You can also
use Windows Task Manager to start, stop, and change the base priority of a
process.
■ There are several ways to optimize a Windows 2000 Server computer, includ-
ing: configuring load balancing across multiple servers; disabling unused ser-
vices, protocols, and drivers; scheduling server-intensive jobs for nonpeak
hours; and optimizing the Server service.
4701-1 ch21.f.qc 4/24/00 09:55 Page 1401
1401
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about monitoring, optimizing, and troubleshooting Windows
2000, and to help you prepare for the Professional, Server and Networking
exams:
■ Assessment questions: These questions test your knowledge of
the monitoring, optimization, and troubleshooting topics covered
in this chapter.You’ll find the answers to these questions at the end
of this chapter.
■ Scenarios: The situation-based questions in scenarios challenge
you to apply your understanding of the material to solve a hypo-
thetical problem. In this chapter’s scenarios, you are asked to ana-
lyze performance situations, and to provide answers to the question
or questions presented for each situation.You don’t need to be at a
computer to do scenarios.Answers to this chapter’s scenarios are
presented at the end of this chapter.
■ Lab Exercise: These exercises are hands-on practice activities that
you perform on a computer.The lab in this chapter gives you an
opportunity to practice using several Windows 2000 tools to moni-
tor and optimize performance.
Assessment Questions
1. You want to use System Monitor to see how much of the paging file
on your Windows 2000 computer is being utilized.Which counter
should you use?
A. Paging File-% Usage
B. Paging File-% Usage Peak
C. Memory-Pages/sec
D. Memory-Pool Paged Bytes
4701-1 ch21.f.qc 4/24/00 09:55 Page 1402
1402
2. You want to use System Monitor to see how many disk reads and
writes are having to wait to be serviced.Which PhysicalDisk counter
should you use?
A. % Disk Read Time
B. Split IO/Sec
C. % Idle Time
D. Avg Disk Queue Length
3. You want to examine several counters to determine how applications
are performing on your Windows 2000 computer.Which System
Monitor object should you monitor?
A. PhysicalDisk
B. Process
C. Processor
D. Redirector
4. You want to use Network Monitor to capture network data, but you
only want to capture packets that use a specific protocol.What should
you do?
A. Configure a network filter
B. Configure a capture filter
C. Configure a protocol filter
D. Configure a packet filter
5. You want to determine which users are currently connected to shared
folders on your Windows 2000 computer. In Computer Management,
which subfolder of the Shared Folders tool should you use?
A. Shares
B. Sessions
C. Open Files
6. Which base priority is assigned to most applications, by default?
A. Realtime
B. High
C. Normal
D. Low
4701-1 ch21.f.qc 4/24/00 09:55 Page 1403
1403
Scenarios
Monitoring, optimizing, and troubleshooting performance on your net-
work can be complex tasks. For each of the following situations, consider
the given facts and answer the question or questions that follow.
1. A Windows 2000 computer seems to be running slowly, especially
when several applications are used at the same time.The hard disk
drive indicator light is on almost all of the time, even when users are
not accessing data from the hard disk.
a. What is the most likely cause of the problem?
b. What can you do to verify the cause of the problem?
c. How can you resolve the problem and optimize the situation?
2. A user reports that tasks are taking longer than normal to complete
on a particular Windows 2000 computer, especially when the com-
puter has several tasks to complete at the same time.
a. What is the most likely cause of the problem?
b. What can you do to verify the cause of the problem?
c. How can you resolve the problem and optimize the situation?
4701-1 ch21.f.qc 4/24/00 09:55 Page 1404
1404
Lab Exercise
Lab 21-1 Monitoring and Optimizing Performance
Professional
Server
EXAM Networking
MATERIAL
The purpose of this lab is to provide you with an opportunity to use sev-
eral Windows 2000 tools to practice monitoring and optimizing the per-
formance of your computer.
There are five parts to this lab:
■ Part 1: Monitoring System Performance by Using System Monitor
■ Part 2: Monitoring Network Performance by Using Network
Monitor
■ Part 3: Using Windows Task Manager to Manage Processes
4701-1 ch21.f.qc 4/24/00 09:55 Page 1405
1405
1406
1407
1408
1409
Assessment Questions
1. A.The Paging File-% Usage counter is used to measure the percent-
age of paging file utilization.
2. D. The Avg Disk Queue Length counter is used to measure the
average number of disk reads and writes waiting to be performed.
3. B. The Process object can be used to monitor application perfor-
mance. (The Thread object is also useful for this task.)
4. B. Configure a capture filter to specify that only packets using a
specific network protocol will be captured.
5. B. The Sessions folder lists the users currently connected to shared
files and folders on the computer.
6. C. By default, most applications are assigned a base priority of Normal.
7. B. Windows Task Manager is used to start and stop processes.
8. C. The Maximize data throughput for file sharing setting is the
default setting, and is appropriate for Windows 2000 Server comput-
ers that are functioning primarily as file servers.The Maximize data
throughput for network applications setting is the preferred setting
for domain controllers.
Scenarios
1. The problem in this scenario is most likely physical memory (RAM).
The computer does not have enough memory to handle all of the
application tasks. Use System Monitor to examine the Memory-
Pages/sec and the Paging File-% Usage counters to confirm the
memory problem.Your best and only practical solution is to add
more RAM to the computer.
2. The most likely cause of this problem is the computer’s processor.You
should, however, rule out the possibility of insufficient RAM first.To
verify the cause of the problem, view the System Monitor Memory-
Pages/sec and the Processor-% Processor Time counters.You can
resolve this problem by upgrading the processor, adding an additional
processor, or removing some of the computer’s workload.
4701-1 ch21.f.qc 4/24/00 09:56 Page 1410
1410
Directory Services
EXAM
MATERIAL
EXAM OBJECTIVES
C HAP TE R
22
Managing, Optimizing,
and Troubleshooting
Active Directory
Performance
1413
4701-1 ch22.f.qc 4/24/00 09:56 Page 1414
Chapter Pre-Test
1. List the three replication partitions in Active Directory.
2. What is intrasite replication?
3. What is intersite replication?
4. What Windows 2000 Server service is responsible for generating
the replication topology?
5. Until _________ _________ are created and assigned to a site, the
site has no definition and no functionality — it’s just an empty
Active Directory object.
6. True or False: Bridging is automatically configured for all site
links, by default.
7. What are the five operations master roles?
8. What tool can you use to specifically monitor Active Directory
Replication?
4701-1 ch22.f.qc 4/24/00 09:56 Page 1415
EXAM TIP
Study this chapter carefully before you take the Directory Services exam.
This chapter alone covers material for 15 of this exam’s objectives. Make
sure you’re thoroughly comfortable with Active Directory replication
before you spend the time and money to take this exam.
For the most part, Windows 2000 Active Directory uses a multimaster
replication model. In multimaster replication, changes can be made on any
domain controller. In addition, changes made on any domain controller are
replicated to all other domain controllers. No one domain controller con-
trols changes made to Active Directory or Active Directory replication, and
so Active Directory is said to use a multimaster model.This is in contrast to
synchronization in Windows NT 4.0, which uses a single-master model,
and all changes to objects are controlled by the primary domain controller.
Active Directory uses update sequence numbers (USNs), along with
stamps, to track changes made to objects stored in the Active Directory
data store. When an object (or any of its attributes) is changed, Active
Directory increases the object’s USN, and assigns the object a unique
stamp that contains a version number, a timestamp, and the GUID of the
domain controller on which the change was made. Because each Active
Directory object exists on all domain controllers in the domain, during
4701-1 ch22.f.qc 4/24/00 09:56 Page 1416
replication, Active Directory must compare the USNs and stamps of each
object being replicated to determine which version of the object is the
most current. Active Directory replicates only the most current version of
each object, and only replicates objects that have changed since the last
time replication occurred.
In the next few sections I’ll explain three basic Active Directory replica-
tion concepts: replication partitions, intrasite replication, and intersite
replication.
CROSS-REFERENCE
If it’s been a while since you’ve read Chapter 2, you might want to reread
it now before you try to take on the many complex Active Directory con-
cepts in this chapter.
Replication Partitions
The information contained in the Active Directory data store is logically
separated into three categories, which Microsoft calls partitions. Each of
these partitions is replicated separately, on a partition-by-partition basis,
and is replicated to a specified set of replication partners. The Active
Directory replication partitions are:
■ Schema partition: This partition contains the rules that define
how objects are created within a forest.The schema partition is
replicated to all domain controllers in the forest.
■ Configuration partition: This partition contains information
about the logical structure of Active Directory for the entire forest,
including the structure and use of domains, trees, sites, and trust
relationships within the forest.The configuration partition is repli-
cated to all domain controllers in the forest.
■ Domain partition: This partition contains complete, detailed
information about every object in the domain.The domain parti-
tion is replicated only to the domain controllers within this domain.
Intrasite Replication
Intrasite replication is Active Directory replication that takes place within a sin-
gle site. A site, as you may remember, consists of one or more TCP/IP sub-
nets, which are specified by an administrator and are connected by
4701-1 ch22.f.qc 4/24/00 09:56 Page 1417
Intersite Replication
Intersite replication is Active Directory replication that takes place between
sites. Unlike intrasite replication, intersite replication is not automatically
configured and performed by Windows 2000.An Administrator must man-
ually create and configure sites and other Active Directory components
before intersite replication will occur.
Because intersite replication takes place between domain controllers in
different sites that are typically separated by WAN links, intersite replica-
tion is normally slower than intrasite replication, and often should be
scheduled by the administrator so that use of network bandwidth for repli-
cation is minimized during the network’s peak activity hours. All intersite
replication is sent in a compressed format to save network bandwidth.
Two different Windows 2000 protocols can be used for intersite replica-
tion: Remote Procedure Call (RPC) over IP, and Simple Mail Transfer
Protocol (SMTP). RPC over IP is the preferred protocol and requires the
use of fully routed TCP/IP connections between sites. RPC over IP is
faster than SMTP.
However, if you don’t have fully routed TCP/IP connections between
sites, SMTP is your only choice. SMTP can also be used when fully routed
TCP/IP connections exist between sites (but this is not recommended) or
when other protocols that support SMTP (such as X.400) are used
between sites.Another reason SMTP is not recommended is because it can
only be used to replicate the schema and configuration partitions.You can’t
use SMTP to replicate the domain partition.
I’ll also explain how to move server objects between sites, and how to
manage and maintain operations master roles.
Creating Sites
Sites provide a means of grouping computers so that required services (such
as logon and authentication) are provided by nearby computers instead of
by computers located across costly, slow links. If your network consists of
several locations that are connected by slow-to-medium speed WAN links,
you might want to consider using sites to manage your network.
Active Directory replication uses sites to determine replication areas and
their boundaries. Intrasite replication occurs freely and automatically over
high-speed local area connections. Intersite replication, in contrast, can be
carefully controlled by an administrator to limit the amount of replication
traffic transmitted over WAN links.
When Active Directory is installed,Windows 2000 creates a single, orig-
inal site named Default-First-Site-Name. All other sites must be manually
created by the Administrator.You can use the Active Directory Sites and
Services administrative tool to create and manage sites. Active Directory
Sites and Services is available on all domain controllers, and on all other
Windows 2000 computers on which the ADMINPAK has been installed.
EXAM TIP
The primary tool for creating and configuring Active Directory compo-
nents and replication is Active Directory Sites and Services. I recom-
mend you use this tool to practice creating sites and other components
that affect replication. You’ll be glad you did.
STEP BY STEP
CREATING SITES
3. In the New Object – Site dialog box, enter a name for the new site. Then select a
site link object for this site from the list box. If you have not yet created any site
links, highlight DEFAULTIPSITELINK. Click OK.
4. Active Directory confirms that the site has been created, as shown in Figure 22-2.
Notice the various tasks you should perform to complete the configuration of the
site. I’ll explain how to perform many of these tasks in the sections that follow.
Click OK.
5. The new site appears in the AD Sites and Services dialog box. Close Active
Directory Sites and Services.
4701-1 ch22.f.qc 4/24/00 09:56 Page 1421
If you want to configure your newly created site, right-click the site in
Active Directory Sites and Services, and select Properties from the menu
that appears. In the site’s Properties dialog box you can configure a descrip-
tion of the site, the location of the site, and Active Directory permissions
for the site object.You can also view the object’s properties, and create and
configure Group Policy objects (GPOs) for the site in this dialog box.
Creating Subnets
A site, by definition, is a grouping of TCP/IP subnets. Before you created
an additional site, you never really had to think about subnets, because
when only the default site exists,Windows 2000 assumes that if no subnets
are specified, all existing subnets belong to the default site.
However, now that you’ve created one or more additional sites, you
must specify the TCP/IP subnets that belong to each site. Until subnet
objects are created and assigned to a site, the site has no definition and no
functionality — it’s just an empty Active Directory object.
You can create and manage subnets, like sites, by using Active Directory
Sites and Services.
STEP BY STEP
If you have more than two sites, you should manually create a site link for
each pair of sites that are connected to each other. Normally, an admini-
strator creates a site link for each WAN link used by the company’s network.
Because of this practice, a site link is usually associated with exactly two sites.
Figure 22-4 shows two common configurations of site links.
Seattle-Boston Boston-Miami
Houston-Omaha
Houston
However, it’s possible to create a site link that is associated with more
than two sites. In this situation, the site link implies that each site associated
with the site link has a WAN link connection to every other site associated
with the site link.This configuration also implies that the WAN links are of
the same speed and cost. Figure 22-5 shows one site link that is associated
with three sites. Note that there are three WAN links involved, and that
each WAN link has the same speed.
4701-1 ch22.f.qc 4/24/00 09:56 Page 1424
London
T1 Link T1 Link
Site Link:
Paris-London-Munich
T1 Link
Paris Munich
Site links can be configured to use either IP or SMTP for intersite replication.
CAUTION
You should decide which protocol you want to use for intersite replication
before you create a site link — you can’t change a site link’s protocol after
it is created.
Site links, like other site components, are created and managed by using
Active Directory sites and services.
STEP BY STEP
TIP
When you select the IP container, you’re actually selecting the RPC over
IP protocol.
On the General tab, you can enter a description for the site link. You can also add
and remove sites from the site link.
You can also assign a higher or lower cost to the site link. The default cost associ-
ated with a new site link is 100. The range for this setting is 1 – 32,767.
You can change the replication interval, which is 180 minutes (3 hours), by
default. This setting must be changed in 15 minute increments.
Finally, you can schedule when intersite replication can and can’t occur by click-
ing Change Schedule and configuring a replication schedule. (This dialog box
looks and works just like the dialog box used to set a user’s logon hours.)
Make any needed configurations on the General tab. You can view the object’s
properties by clicking the Object tab, and you can set Active Directory permis-
sions for the site link object by clicking the Security tab.
When you finish configuring the site link, click OK.
6. Close Active Directory Sites and Services.
You can create a site link bridge that specifies Site_Link A-B and
Site_Link B-C.This site link bridge would enable Site A to replicate data
to Site C by using Site_Link A-B and Site_Link B-C.
4701-1 ch22.f.qc 4/24/00 09:56 Page 1427
So why would you ever want to use a site link bridge? Well, the fact of
the matter is that in the large majority of cases, you would never want to
use a site link bridge, because by default, all site links are bridged.This means
that replication takes place between all sites, by default, even if a specific
pair of sites is not directly associated by the use of site links. So, going back
to my earlier example, this means replication will occur between Site A
and Site C even if I never configure the site link bridge.
So why am I even talking about site link bridges? Well, for one reason,
because they’re tested on the Directory Services exam. And because an
administrator of an extremely large, complex network might someday
want to disable Active Directory’s automatic bridging feature and manually
configure site link bridges so he or she can finely control how intersite
replication occurs.
Before you create a site link bridge, you should disable Active Directory’s
feature that automatically bridges all site links. Then, after you create site
link bridges, you should be prepared to maintain and update your site link
bridges every time you add or remove a site or a site link.
Site link bridges, like other site components, are created and managed
by using Active Directory sites and services.
STEP BY STEP
TIP
When you disable automatic site link bridging, it is disabled for all site
links that use the selected protocol, either IP or SMTP.
3. In the IP (or SMTP) Properties dialog box, clear the check box next to “Bridge all
site links.” Click OK.
4. In the left pane, right-click the IP or SMTP container, depending on the protocol
for which you want to create a site link bridge. Select New Site Link Bridge from
the menu that appears.
4701-1 ch22.f.qc 4/24/00 09:56 Page 1428
5. In the New Object – Site Link Bridge dialog box, enter a name for the site link
bridge in the Name text box. Then, in the “Site links not in this site link bridge” list
box, highlight the site links that you want to associate with this site link bridge.
Click Add to cause these site links to be moved to the “Site links in this site link
bridge” list box. Click OK.
6. The site link bridge is created. Close Active Directory Sites and Services.
STEP BY STEP
TIP
It’s kind of confusing, but domain controllers actually have two objects in
Active Directory. One object is stored in the Domain Controller’s con-
tainer within a domain, and the second is stored in the Servers container
within a site.
When you later create sites, the server objects for the existing domain
controllers will not automatically be moved to the Servers container in the
appropriate site, even if the IP addresses of these domain controllers belong
to a subnet that has been created and associated with one of the new sites.
4701-1 ch22.f.qc 4/24/00 09:56 Page 1430
STEP BY STEP
Highlight the site to which you want to move the server object. Click OK.
4. The server is moved. Close Active Directory Sites and Services.
4701-1 ch22.f.qc 4/24/00 09:56 Page 1431
After you’ve moved servers into your new sites, you may want to spec-
ify a particular domain controller in each site that will be used for intersite
replication.This domain controller is called the bridgehead server.The KCC
automatically chooses a bridgehead server for each site, but you can man-
ually override the KCC’s choice.
When you designate a domain controller as a preferred bridgehead
server, it’s generally a good idea to specify the domain controller located
closest to the router that connects the two sites.
STEP BY STEP
In the “Transports available for inter-site data transport” list box, highlight the pro-
tocol (or protocols) for which this server will function as a bridgehead server for
this site. Click Add to move this protocol (or protocols) to the “This server is a
preferred bridgehead server for the following transports” list box. Click OK.
4. Close Active Directory Sites and Services.
CROSS-REFERENCE
See the “Understanding Flexible Single Master Operations (FSMO)”
section in Chapter 2 for detailed descriptions of each of the operations
master roles.
4701-1 ch22.f.qc 4/24/00 09:56 Page 1433
When you first install Active Directory on the first domain controller in
the forest, that domain controller automatically assumes all five of the
operations master roles. As you add domain controllers, you can manually
reassign or transfer these operations master roles to other domain con-
trollers as needed.
In the following sections I’ll explain how to transfer operations master
roles and how to seize operations master roles.
TIP
Microsoft recommends that the infrastructure master role be assigned to
a domain controller that does not also function as a global catalog server.
However, the infrastructure master should have a high-speed network
connection to a global catalog server.
STEP BY STEP
CAUTION
If you bring a domain controller that previously performed an operations
master role back on-line after its role has been seized, serious Active
Directory problems may result. Never seize a role unless you’re sure the
server that failed will not be used again on your network.
4701-1 ch22.f.qc 4/24/00 09:57 Page 1436
STEP BY STEP
and press Enter. For example, you could type seize PDC, seize RID master,
seize schema master, seize domain naming master, or seize infrastruc-
ture master.
TIP
If you want to use the ntdsutil.exe command-line utility to transfer
roles, instead of typing seize (and the name of the role), type transfer
and the name of the role.
8. A Role Seizure Confirmation Dialog box appears. Click Yes to seize the role.
9. At the fsmo maintenance prompt, type quit and press Enter.
10. At the ntdsutil prompt, type quit and press Enter.
11. At the command prompt, type Exit.
4701-1 ch22.f.qc 4/24/00 09:57 Page 1437
TIP
You can configure when scheduled replication takes place, but you can’t
schedule update replication.
Here’s how you can change when scheduled Active Directory intrasite
replication occurs.
STEP BY STEP
4. The Schedule for NTDS Site Settings dialog box appears, as shown in Figure
22-11. Notice that, by default, replication is scheduled to occur once per hour,
seven days a week, 24 hours a day.
You can configure, for each hour of each day, whether scheduled replication will
occur once per hour, twice per hour, four times per hour, or not at all. For example,
maybe you don’t want replication to occur during the hours you schedule for tape
backup throughout the site. To make these configurations, highlight the hour(s) you
want to configure, then select the appropriate option for that time period.
CAUTION
If you select the “None” option for all days and all hours, replication will
not occur until you manually force it to do so. This is not a preferred
practice.
When you finish configuring the replication schedule for the site, click OK.
5. In the NTDS Site Settings Properties dialog box, click OK.
6. Close Active Directory Sites and Services.
STEP BY STEP
TIP
If you create a connection that duplicates an automatically generated
connection, the next time the KCC runs it will delete the duplicate auto-
matically generated connection.
4701-1 ch22.f.qc 4/24/00 09:57 Page 1441
System Monitor counters that you might find helpful for monitoring
performance of domain controllers include:
■ Memory - Pages/sec
■ Network Interface - Bytes Total/sec
■ Processor - % Processor Time
■ PhysicalDisk - Avg. Disk Queue Length
These counters will help you determine if the system resources, such as
memory, disk, processor, and network, are sufficient for the domain con-
troller. In addition, domain controllers have an additional object in System
Monitor that is useful for monitoring domain controller operations and
replication. The object is named NTDS, and it has numerous counters. A
couple of counters that are particularly useful for monitoring replication are:
■ NTDS - DRA Outbound Bytes Total/sec
■ NTDS - DRA Inbound Bytes Total/sec
These counters measure the amount of replication traffic sent and
received by the domain controller. If you want to monitor only intrasite
traffic, use counters that measure uncompressed traffic only. To monitor
only intersite traffic, use counters that measure compressed traffic only.
CROSS-REFERENCE
Details on how to use System Monitor are presented in Chapter 21.
STEP BY STEP
1. Insert your Windows 2000 server compact disc into your computer’s CD-ROM
drive. When the Microsoft Windows 2000 CD dialog box appears, click Browse
This CD.
2. In the right pane, double-click the SUPPORT folder. Double-click the TOOLS
folder. Double-click SETUP.
3. The Windows 2000 Support Tools Setup wizard starts. Click Next.
4. In the User Information screen, type your name and organization. Click Next.
5. In the Select An Installation Type screen, select the Typical option. Click Next.
6. In the Begin Installation screen, click Next.
7. Windows 2000 installs the Support Tools. In the Completing the Windows 2000
Support Tools Setup Wizard screen, click Finish.
8. Close the TOOLS dialog box. Close the Microsoft Windows 2000 CD dialog box.
Now that you’ve installed the Windows 2000 Support Tools, you can use
Active Directory Replication Monitor.
STEP BY STEP
6. Repeat Steps 3 through 5 until you’ve added all of the domain controllers you
want to monitor. Figure 22-13 shows Active Directory Replication Monitor after
four servers have been added. Notice that for each server the three replication
partitions are displayed: schema, configuration, and domain. Also notice that
when you expand a replication partition, a list of domain controllers to which that
partition is replicated is displayed.
Also notice that when a server is highlighted in the left pane, replication statistics
for that server are displayed in the right pane. Finally, notice the globe on the
server named NAT. This globe indicates that this server is a global catalog server.
7. To manually force replication to occur on any of the partitions displayed, right-click
the partition, and select Synchronize This Directory Partition with All Servers from
the menu that appears.
8. In the Synchronizing Naming Context with Replication Partners dialog box, click OK.
9. In the Replication Monitor confirmation dialog box, click Yes to force replication to
occur. When notified that the synchronization completed successfully, click OK.
4701-1 ch22.f.qc 4/24/00 09:57 Page 1446
10. To view the replication connections (which this tool calls replication topology)
for a domain controller, right-click the domain controller, then select Show
Replication Topologies from the menu that appears. Figure 22-14 shows select-
ing this option. Notice all of the tasks you can perform and information you can
view for each server by using this tool.
11. In the View Replication Topology dialog box, select View ➪ Connection
Objects Only.
12. A graphical representation of the domain controllers you are monitoring is dis-
played. Right-click any domain controller displayed, and select Show Intra-Site
Connections.
13. Active Directory Replication Monitor displays the connections from the selected
domain controller to all other monitored servers in the site to which the domain
controller has connections. Figure 22-15 shows the intrasite connections from
SERVER01 to three other domain controllers in the site.
Close the View Replication Topology dialog box.
14. Close Active Directory Replication Monitor.
4701-1 ch22.f.qc 4/24/00 09:57 Page 1447
If performance problems are indicated, here are a few things you might
choose to do to optimize Active Directory performance:
■ If monitoring indicates a hardware bottleneck on one or more
domain controllers (such as memory, disk, or processor), consider
upgrading the servers’ hardware or replacing the server with a
more powerful computer.
■ If users at a remote location (that does not have a domain con-
troller) report slow authentication and other Active Directory
operations, consider creating a site for the remote location and
placing one or more domain controllers, a DNS server, and a
global catalog server at the remote site.
■ If users within a site report slow authentication and other Active
Directory operations, consider adding one or more domain con-
trollers to the site.
■ If replication is consuming excessive amounts of network band-
width, either within a site or between sites, considering scheduling
replication to occur less frequently during peak usage hours.
■ If you become aware that an inappropriate domain controller is
being used for intersite replication, consider designating a more
appropriate domain controller as the bridgehead server for that site.
A user in your Los Angeles site The most likely cause of this problem is that
reports that he can’t log on using the user’s account information has not yet
his new user account. You created been replicated to the Los Angeles site.
the user’s account 10 minutes ago Either wait for replication to occur, or force
in your New York site. replication to occur immediately by using
either Active Directory Sites and Services or
Active Directory Replication Monitor.
You recently created additional sites, The most likely cause of this problem is that
and created subnets for these sites. existing server objects have not been moved
However, users in the new sites are to the new sites.
being authenticated by domain Move the server objects for the domain
controllers in the original site. In controllers that are physically located in the
addition, uncompressed replication new sites to the appropriate site by using
traffic is being sent across a WAN Active Directory Sites and Services.
link between sites.
Monitoring indicates that processor The possible causes of this problem are: the
utilization on one of your domain server doesn’t have enough RAM, or a fast
controllers (that is also a global enough processor; or the server is
catalog server, a DNS server, a overloaded, or both.
DHCP server, and a WINS server) Possible solutions include: upgrading the
is consistently over 70 percent. server’s hardware or replacing the server with
Users report slow response time a more powerful computer. Or, consider
from this server. transferring some of the services currently
provided by this domain controller to another
domain controller or server.
Users in one large site report slow The most likely cause of this problem is that
logon authentication and long the domain controllers in the site are
computer boot times. overburdened by client requests.
Add one or more additional domain
controllers to this site.
You recently disabled automatic The most likely cause of this problem is that
bridging and created a site link bridge. the site link to the site not receiving the
However, one of your sites is not replication updates is not specified in the
receiving all replication updates from site link bridge.
the other sites. Reconfigure the site link bridge to include the
site link to the affected site, or create an
additional site link bridge, depending on your
network and site configuration.
You are unable to create a new The most likely cause of this problem is that
domain in the forest after the failure the failed domain controller performed the
of one your domain controllers. domain naming master role.
Either bring the failed domain controller back
on line, or have another domain controller
seize the domain naming master role.
4701-1 ch22.f.qc 4/24/00 09:57 Page 1450
This chapter introduced several important Windows 2000 Active Directory replica-
tion and performance topics:
■ There are three replication partitions in Active Directory: the schema partition,
the configuration partition, and the domain partition.
■ Intrasite replication is Active Directory replication that takes place within a
single site. Windows 2000 automatically configures and performs intrasite
replication.
■ Intersite replication is Active Directory replication between sites. Unlike
intrasite replication, intersite replication is not automatically configured and
performed by Windows 2000, but must be manually configured by an
Administrator.
■ There are numerous Active Directory components that affect replication,
including sites, subnets, site links, and site link bridges. You can create and
manage all of these components by using Active Directory Sites and Services.
■ There are five operations master roles: schema master, domain naming master,
PDC emulator, relative ID master, and infrastructure master. You can manually
transfer these roles to different domain controllers if necessary.
■ You can manage intrasite replication by configuring when scheduled replica-
tion will occur. You can also create connection objects to manually specify
replication partners if needed.
■ It’s important to have a comprehensive plan in place before you implement
intersite replication.
■ There are two primary tools you can use to monitor the performance of Active
Directory objects: System Monitor and Active Directory Replication Monitor.
4701-1 ch22.f.qc 4/24/00 09:57 Page 1451
1451
STUDY GUIDE
This section contains several exercises that are designed to solidify your
knowledge about managing, optimizing, and troubleshooting Active
Directory replication and performance.These exercises will also help you
prepare for the Directory Services exam:
■ Assessment Questions: These questions test your knowledge of
the Active Directory replication and performance topics covered in
this chapter.You’ll find the answers to these questions at the end of
this chapter.
■ Scenarios: The situation-based questions in scenarios challenge
you to apply your understanding of the material to solve a hypo-
thetical problem. In this chapter’s scenarios, you are asked to evalu-
ate several replication and performance-related situations, and to
answer the questions that follow each scenario.You don’t need to
be at a computer to do scenarios.Answers to this chapter’s scenar-
ios are presented at the end of this chapter.
■ Lab Exercise: These exercises are hands-on practice activities
that you perform on a computer.The lab in this chapter gives
you an opportunity to practice creating various Active Directory
components.
Assessment Questions
1. You want to create additional sites to manage replication on your
Windows 2000 network.What tool should you use to create the sites?
A. Active Directory Users and Computers
B. Active Directory Domains and Trusts
C. Active Directory Sites and Services
D. Active Directory Replication Monitor
2. You recently created two additional sites on your Windows 2000
network, and created and assigned subnets to those sites.You had 20
existing domain controllers before you created the new sites. Eight
of these domain controllers will be used in the two new sites.What
should you do to ensure that intersite replication occurs?
4701-1 ch22.f.qc 4/24/00 09:57 Page 1452
1452
A. Move the server objects for the eight domain controllers to their
new sites.
B. Add new objects to the Domain Controllers container for each of
the eight domain controllers.
C. Change the IP addresses of each of the eight domain controllers
so the IP addresses are within the range of IP addresses used by
subnets in the new sites.
D. Nothing — Active Directory will automatically move the server
objects for the eight domain controllers to their new sites.
3. You decide to add a global catalog server to your site.What tool
should you use to cause a domain controller to function as a global
catalog server?
A. Active Directory Users and Computers
B. Active Directory Sites and Services
C. Network and Dial-up Connections folder
D. The System application
4. You decide to transfer the infrastructure master role to a different
domain controller.There are five domain controllers in the domain.
To what domain controller should you not transfer the infrastructure
master role?
A. The domain controller that is also the schema master
B. The domain controller that is located physically close to a router
C. The domain controller located in the same site as your senior
network administrator
D. The domain controller that also is a global catalog server
5. What is the minimum number of sites you must have before you can
create a site link bridge?
A. 1
B. 2
C. 3
D. 4
6. You have fully routed TCP/IP connections between the three sites on
your Windows 2000 network.You want to accomplish replication as
quickly as possible between these sites.Which protocol should you
use for intersite replication?
4701-1 ch22.f.qc 4/24/00 09:57 Page 1453
1453
A. RPC over IP
B. SMTP
C. DHCP Relay Agent
D. RIP Version 2 for Internet Protocol
7. You use two sites on your Windows 2000 network.You decide you
want to manually specify a particular domain controller in each site
that will be used for intersite replication.What should you do?
A. Create a site link to connect the two domain controllers.
B. Designate the desired domain controller in each site as a bridge-
head server.
C. Configure the desired domain controller in each site to be a
global catalog server.
D. Create a new connection object for the desired domain controller
in each site.
8. You want to view a graphic representation of the replication topology
connections on a specific domain controller.What tool should you
use to do this?
A. Active Directory Users and Computers
B. Active Directory Sites and Services
C. Active Directory Replication Monitor
D. Network and Dial-up Connections folder
Scenarios
Managing Active Directory components and replication on your network
can be an extremely complex task. For each of the following situations,
consider the given facts and answer the question or questions that follow.
1. Users in your large, rapidly expanding site report that searches of
Active Directory are becoming slower.What can you do to speed up
Active Directory search response time for users?
2. You recently created sites and subnets on your Windows 2000 net-
work.Your company’s existing domain controllers will be used in the
new sites.What should you do next?
4701-1 ch22.f.qc 4/24/00 09:57 Page 1454
1454
1455
Lab Exercise
Lab 22-1 Managing Active Directory Components
that Affect Replication
Directory Services
EXAM
MATERIAL
1456
10. The New Object – Subnet dialog box appears. In the Address text
box, type 192.168.0.0. In the Mask text box, type 255.255.255.0.
Then, highlight the Seattle site in the Site Name list box. Click OK.
11. In the left pane of the AD Sites and Services dialog box, right-click
the Subnets container, and select New Subnet from the menu that
appears.
12. The New Object – Subnet dialog box appears. In the Address text
box, type 192.168.101.0. In the Mask text box, type 255.255.255.0.
Then, highlight the Denver site in the Site Name list box. Click OK.
13. In the left pane of the AD Sites and Services dialog box, right-click
the Subnets container, and select New Subnet from the menu that
appears.
14. The New Object – Subnet dialog box appears. In the Address text
box, type 10.1.1.0. In the Mask text box, type 255.255.255.0.Then,
highlight the Houston site in the Site Name list box. Click OK.
15. In the left pane of the AD Sites and Services dialog box, click the +
next to the Inter-Site Transports container.Then right-click the IP
container, and select New Site Link from the menu that appears.
16. In the New Object – Site Link dialog box, type in a name of
Seattle-Denver. Next, in the “Sites not in this site link” list box,
highlight Seattle and Denver. Click Add. Click OK.
17. In the left pane of the AD Sites and Services dialog box, right-click the
IP container, and select New Site Link from the menu that appears.
18. In the New Object – Site Link dialog box, type in a name of
Denver-Houston. Next, in the “Sites not in this site link” list box,
highlight Seattle and Denver. Click Add. Click OK.
19. In the left pane of the AD Sites and Services dialog box, right-click
the IP container. Select Properties from the menu that appears.
20. In the IP Properties dialog box, clear the check box next to “Bridge
all site links.” Click OK.
21. In the left pane of the AD Sites and Services dialog box, right-click
the IP container. Select New Site Link Bridge from the menu that
appears.
4701-1 ch22.f.qc 4/24/00 09:57 Page 1457
1457
22. In the New Object – Site Link Bridge dialog box, type in a name of
Seattle-Denver-Houston.Then, in the “Site links not in this site
link bridge” list box, highlight Seattle-Denver and Denver-Houston.
Click Add. Click OK.
23. The site link bridge is created. Close Active Directory Sites and
Services.
Assessment Questions
1. C. Active Directory Sites and Services is the appropriate tool to cre-
ate and manage sites.
4701-1 ch22.f.qc 4/24/00 09:57 Page 1458
1458
2. A. You must use Active Directory Sites and Services to move the
server objects for the eight domain controllers to their new sites.
3. B. Use Active Directory Sites and Services to modify the NTDS
settings for the server object to configure the server as a global
catalog Server.
4. D. Microsoft recommends that you not transfer the infrastructure
master role to the domain controller that also serves as a global cata-
log server. If you do this (and you have more than one domain con-
troller in the domain), the infrastructure master won’t function.
5. C. Because you must have a minimum of two site links to create a
site link bridge, and because each site link requires a minimum of two
sites, you must have a minimum of three site links to create a site link
bridge. See Figure 22-7.
6. A. RPC over IP and SMTP are the only replication protocols you
can use, and RPC is much faster.
7. B. The server that is designated as the bridgehead server is used for
intersite replication.
8. C. Although you can view a list of a specific domain controller’s
replication connections by using Active Directory Sites and Services,
Active Directory Replication Monitor is a better answer because it is
the only tool that enables you to view a graphic representation of a
server’s connections.
Scenarios
1. Probably the best thing you can do to speed up searches of Active
Directory is to add an additional global catalog server to the site.
2. Use Active Directory Sites and Services to move the server objects
(for the existing domain controllers that will be used in the new sites)
to the new sites.You may also need to create and configure site links.
3. Either designate a different domain controller to function as the global
catalog server (by using Active Directory Sites and Services), or trans-
fer the infrastructure master role to a different domain controller (by
using Active Directory Users and Computers or the ntdsutil.exe
command-line utility).
4701-1 ch22.f.qc 4/24/00 09:57 Page 1459
1459
AP P E N D IX
A
Windows 2000 MCSE
Core Exam Objectives
I n this appendix, you’ll find four tables listing the exam objectives for each
of the four core Microsoft Windows 2000 MCSE certification exams. Each
table is an exhaustive cross-reference chart that links every exam objective to
the corresponding materials (text and labs) in this book where the subject mat-
ter is covered.
The tables you’ll find in this appendix are:
1463
4701-1 AppA.f.qc 4/24/00 10:11 Page 1464
1464 Resources
Continued
4701-1 AppA.f.qc 4/24/00 10:11 Page 1466
1466 Resources
Convert from one file Chapter 6 Converting from FAT or FAT32 to NTFS
system to another file
system.
Configure file systems by Chapter 6 Working with File Systems
using NTFS, FAT32, or FAT. Creating and Formatting Partitions
Continued
4701-1 AppA.f.qc 4/24/00 10:11 Page 1468
1468 Resources
Continued
4701-1 AppA.f.qc 4/24/00 10:11 Page 1470
1470 Resources
1472 Resources
Continued
4701-1 AppA.f.qc 4/24/00 10:11 Page 1474
1474 Resources
Continued
4701-1 AppA.f.qc 4/24/00 10:11 Page 1476
1476 Resources
Continued
4701-1 AppA.f.qc 4/24/00 10:11 Page 1478
1478 Resources
Continued
4701-1 AppA.f.qc 4/24/00 10:12 Page 1480
1480 Resources
1482 Resources
Continued
4701-1 AppA.f.qc 4/24/00 10:12 Page 1484
1484 Resources
Continued
4701-1 AppA.f.qc 4/24/00 10:12 Page 1486
1486 Resources
AP P E N D IX
B
What You Need to Know
to Prepare for the Exams
1487
4701-1 AppB.f.qc 4/24/00 10:12 Page 1488
1488 Resources
If for some reason you aren’t able to access the Exam Preparation Guides
at these sites, try the main Microsoft Training & Certification Web site:
http://www.microsoft.com/train_cert
Or even better, visit the Microsoft Certified Professional Program Web site:
http://www.microsoft.com/mcp
While you’re visiting this site, there are a number of pages I recommend
you take a look at, including: the “Step-by-Step Guide” to certification,
“How Microsoft Certified Professional Exams Are Developed,” “Practice
Test,” “MCP Programs in Forefront of Testing Innovations,” “What to
Expect at the Testing Center,” “Your Exam Results,” and so on. By the
time you’re finished, you’ll have a much better feel for the exams.
I want to say just a few words about exam format and the types of ques-
tions to expect. When the Microsoft Windows 2000 MCSE certification
exams are first released, the exams will probably include around 50 to 70
items each. Later on, after Microsoft has had time to gather and process sta-
tistics from each of these exams, it will probably convert the exams to
adaptive exams. A computer adaptive exam typically involves fewer ques-
tions (normally about 15 to 30) than a standard, fixed-form exam, and
based on whether the examinee answers each question correctly or incor-
4701-1 AppB.f.qc 4/24/00 10:12 Page 1489
Appendix B ▼ What You Need to Know to Prepare for the Exams 1489
rectly, the computer determines the difficulty of the next question pre-
sented. Aside from the number of questions and the amount of time
allowed to take the exam, the main difference between a traditional, fixed-
form exam and an adaptive exam is that in a fixed-form exam you can skip
questions, or go back and review previously answered items, but on an
adaptive exam you can’t do this.
In addition to standard multiple-choice items, you may see some non-
standard types of questions on the Windows 2000 MCSE certification
exams. For example, plan on finding some really long, complex multiple-
choice questions in which you have to determine, for a specific action
taken, precisely what results are achieved.You might encounter a “Select-
and-Place” item that requires you to drag-and-drop an answer on an
appropriate field.You may also find (particularly after the exam has been
out for a while) some simulation questions in which you’re asked to per-
form a Windows 2000 task by working with a simulated user interface.
To become familiar with the types of questions found on the exams, I
recommend you download and run the demos from the Microsoft
Certified Professional Program Web site, and I strongly urge you do as many
practice tests as you can get your hands on, such as those included on the
compact disk that accompanies this book, before you take any of the exams.
1490 Resources
On Exam Day
■ Dress comfortably.The more comfortable you are, the more you’ll
be able to focus on the exam.
■ Don’t drink a lot of coffee or other beverage before taking an
exam. I think you know where I’m headed.You don’t want to
spend precious exam time running back and forth to the restroom.
4701-1 AppB.f.qc 4/24/00 10:12 Page 1491
Appendix B ▼ What You Need to Know to Prepare for the Exams 1491
1492 Resources
TIP
Microsoft has revised its policy for retaking exams, primarily to increase
security. If you don’t pass an exam the first time, you can take it again at
any time. If you don’t pass the exam the second time, you must wait at
least 14 days until you retake it again.
■ Don’t get discouraged if you don’t pass an exam the first time — or
the second time. Many highly intelligent, seasoned professionals fail
a test once, twice, or more times before eventually passing it. If at
first you don’t succeed, try, try again.
4701-1 appC.f.qc 4/24/00 10:12 Page 1493
AP P E N D IX
C
What’s on the CD-ROM
BeachFront Quizzer
The version of the BeachFront Quizzer software included
on the CD-ROM gives you the opportunity to test your
1493
4701-1 appC.f.qc 4/24/00 10:12 Page 1494
1494 Resources
STEP BY STEP
1. Open My Computer. Double-click your CD-ROM drive (usually D:). Double click
the BFQuiz folder. Double-click plain_quiz32a.exe. The BeachFront
Quizzer setup program starts.
2. On the welcome screen, click Next to continue to the license agreement screen.
Read the agreement, and click I Agree to continue.
3. On the Choose Destination Location screen, click Next to accept the default file
location (C:\Quizzer). If you want to install the files to a different location, click
Browse and select the file location. After you click Next, the installation begins.
4. After the installation, you will be asked to install Adobe Acrobat Reader. You need
Acrobat Reader to enhance the BeachFront Quizzer product. The test questions
are mapped to the contents of the book, which you access with the Acrobat
(PDF) files. Click the check box marked “Install Adobe Acrobat Reader,” and
click Next.
5. The Acrobat Reader installation program starts. The Acrobat Reader welcome
screen appears first. Click next to continue. The License agreement screen
appears next. Read the agreement, and click I Accept to continue.
6. The Choose Destination Location screen appears. If you want to choose a differ-
ent location, click Browse and select the destination to install the files to. To
accept the default, click Next to continue.
7. The Acrobat Reader installation program runs. After the installer is finished, a dia-
log box will appear that reads “Thank you for choosing Acrobat Reader.” Click OK
to finish.
8. You’re returned to the BeachFront Quizzer installation process. The next screen
gives you the option to install the online books. These are the Acrobat (PDF) files
that contain the text of the book and are linked to the questions. You should install
these to get the most benefit out of BeachFront Quizzer. Check the “Install sup-
plied online books” checkbox, and click Next.
4701-1 appC.f.qc 4/24/00 10:12 Page 1495
9. The online books install. When they’re done, click Finish to complete the installa-
tion. You have the option of starting the BeachFront Quizzer engine now, or later.
Lab Demonstrations
The lab demos folder contains .avi files with visual tutorials for perform-
ing some of the labs presented in this book.
STEP BY STEP
1. Start Windows Explorer, and then open the Acrobat Reader folder in
\\IDGBcert\software\acrobat.
2. In the acrobat folder, double-click rs40eng.exe and follow the instructions
presented on-screen for installing Adobe Acrobat Reader.
3. To view the electronic version of the book, after you have installed Adobe Acrobat
Reader, start Windows Explorer and open the books folder.
4. In the books folder, double-click the Acrobat (PDF) file for the chapter or appen-
dix file you want to view.
4701-1 appC.f.qc 4/24/00 10:12 Page 1496
1496 Resources
VMware
VMware, from VMware, Inc., is an application that enables you to manage
multiple computers from one workstation. It enables you to run multiple
operating systems at once without dual booting.
STEP BY STEP
INSTALLING VMWARE
1. Start Windows Explorer, and then open the Acrobat Reader folder in
\\IDGBcert\software\acrobat.
2. In the acrobat folder, double-click rs40eng.exe and follow the instructions
presented on-screen for installing Adobe Acrobat Reader.
3. To view the electronic version of the book, after you have installed Adobe Acrobat
Reader, start Windows Explorer and open the books folder.
4. In the books folder, double-click the Acrobat (PDF) file for the chapter or appen-
dix file you want to view.
STEP BY STEP
INSTALLING DISKEEPER
1. Start Windows Explorer, and then open the Acrobat Reader folder in
\\IDGBcert\software\acrobat.
2. In the acrobat folder, double-click rs40eng.exe and follow the instructions
presented on-screen for installing Adobe Acrobat Reader.
3. To view the electronic version of the book, after you have installed Adobe Acrobat
Reader, start Windows Explorer and open the books folder.
4. In the books folder, double-click the Acrobat (PDF) file for the chapter or appen-
dix file you want to view.
4701-1 appC.f.qc 4/24/00 10:12 Page 1497
STEP BY STEP
1. Start Windows Explorer, and then open the Acrobat Reader folder in
\\IDGBcert\software\acrobat.
2. In the acrobat folder, double-click rs40eng.exe and follow the instructions
presented on-screen for installing Adobe Acrobat Reader.
3. To view the electronic version of the book, after you have installed Adobe Acrobat
Reader, start Windows Explorer and open the books folder.
4. In the books folder, double-click the Acrobat (PDF) file for the chapter or appen-
dix file you want to view.
4701-1 appC.f.qc 4/24/00 10:12 Page 1498
4701-1 GL.f.qc 4/24/00 10:12 Page 1499
Glossary
1499
4701-1 GL.f.qc 4/24/00 10:12 Page 1500
1500 Glossary
attributes
Attributes are specific properties of Windows
2000 files and folders. Many attributes are
assigned by administrators or users to protect
files and folders. Other file and folder attributes
are automatically applied to system files during
the installation of Windows 2000.
4701-1 GL.f.qc 4/24/00 10:12 Page 1501
Glossary 1501
1502 Glossary
Glossary 1503
1504 Glossary
Glossary 1505
1506 Glossary
Glossary 1507
1508 Glossary
Glossary 1509
GUID
GUID stands for globally unique identifier. A
GUID is typically a 32-digit hexadecimal number
that uniquely identifies an object within the entire
Active Directory.
4701-1 GL.f.qc 4/24/00 10:12 Page 1510
1510 Glossary
Glossary 1511
1512 Glossary
Glossary 1513
1514 Glossary
Glossary 1515
multiprocessing NTFS
Multiprocessing refers to the capability of an See Windows NT file system.
operating system to use more than one processor
in a single computer simultaneously. NTFS permissions
NTFS permissions are permissions assigned to
multithreading individual files and folders on NTFS volumes th
When an application has more than one thread, at are used to control access to these files and
each thread can be executed independently of folders. NTFS permissions apply to local users as
the other. This is referred to as multithreading. well as to users who connect to a shared folder
See also thread. over the network. If NTFS permissions are more
restrictive than share permissions, the NTFS
NetBIOS name resolution permissions will be applied. See also shared
When a user attempts to connect to a computer folder permissions.
selected from a browse list by the remote
computer’s NetBIOS name, the user’s computer object
must first obtain the IP address associated with An Active Directory object is a record in the
the remote computer’s NetBIOS name. This directory that is defined by a distinct set of
process is called NetBIOS name resolution. attributes. There are many classes of objects.
Once the user’s computer has resolved the See also Active Directory, class.
remote computer’s NetBIOS name to its IP
address, it can then establish TCP/IP network ODBC
communications with the remote computer. ODBC stands for Open Database Connectivity.
ODBC is a software specification that enables
network adapter card ODBC-enabled applications (such as Microsoft
A network adapter is an adapter card in a Excel) to connect to databases (such as
computer that enables the computer to connect Microsoft SQL Server and Microsoft Access).
to a network.
offline files
network authentication Offline files are files that are stored on a network
Network authentication is the process of verifying server and, in addition, are configured on the
a user’s credentials for the purpose of local computer so they can be used when the
determining whether the user is permitted to computer is not connected to the network.
access network resources, such as a shared
folder, a shared printer, or a network service. one-way trust
See also user authentication, interactive logon A one-way trust means that a single trust
authentication. relationship exists between two domains. See
also intransitive trust, trust relationship, two-way
trust.
4701-1 GL.f.qc 4/24/00 10:12 Page 1516
1516 Glossary
Glossary 1517
1518 Glossary
query
A DNS request is called a query. See also simple
query, recursive query.
4701-1 GL.f.qc 4/24/00 10:12 Page 1519
Glossary 1519
1520 Glossary
Glossary 1521
1522 Glossary
service ShowSounds
A service is a program that performs specific ShowSounds is an Accessibility Options feature.
tasks for other programs. When ShowSounds is enabled, applications
display captions for the speech and sounds they
service dependencies generate.
Service dependencies are the services and
drivers that must be running before the service SID
in question can start. SID stands for security identifier. A SID is a
unique number created by the Windows 2000
Setup Manager Security subsystem that is assigned to security
The Windows 2000 Setup Manager wizard principal objects when they are created. A SID
(called Setup Manager for short) is a tool that consists of two parts: a domain SID and a relative
enables you to create answer files in order to ID. Windows 2000 uses SIDs to grant or deny a
automate the installation and setup of Windows security principal object access to other objects
2000 Professional and Windows 2000 Server. and network resources. See also domain SID,
relative ID, security principal object.
share
A share is another name for a shared folder. See simple query
also shared folder. A simple query is a query that a DNS server can
resolve without contacting any other DNS
share permissions servers. See also query, DNS server.
Share permissions are another name for shared
folder permissions. See also shared folder simple volume
permissions. A simple volume is a volume that consists of
formatted disk space on a single hard disk.
shared folder Simple volumes can only be created on dynamic
In Windows 2000, folders are shared to enable disks. See also dynamic disk, volume.
users to access network resources. A folder can’t
be accessed by users across the network until it single master operation
is shared or placed within another folder that is When only one domain controller can perform a
shared. Once a folder is shared, users with the specific task, that task is referred to as a single
appropriate permissions can access the shared master operation. See also multiple master
folder (and all subfolders and files that the shared operation, flexible single master operations.
folder contains) over the network.
site
shared folder permissions A site consists of one or more TCP/IP subnets,
Shared folder permissions control user access to which are specified by an administrator.
shared folders. Shared folder permissions only Additionally, if a site contains more than one
apply when users connect to the folder over the subnet, the subnets should be connected by high-
network — they do not apply when users access speed, reliable links. Sites do not correspond to
the folder on the local computer. Shared folder domains — you can have two or more sites within a
permissions apply to the shared folder, its files, single domain, or you can have multiple domains
and subfolders (in other words, to the entire in a single site. A site is solely a grouping based
directory tree under the shared folder). on IP addresses. Sites are configured by using
Active Directory Sites and Services.
4701-1 GL.f.qc 4/24/00 10:12 Page 1523
Glossary 1523
1524 Glossary
StickyKeys synchronization
StickyKeys is an Accessibility Options feature that Synchronization is a process performed by the
enables a user to execute keyboard commands NetLogon service on a Windows NT Server
that normally require striking two or more keys computer. In this process, domain user and group
simultaneously by striking one key at a time. account update information is periodically copied
from the Primary Domain Controller (PDC) to
striped volume each backup domain controller (BDC) in the
A striped volume consists of identical-sized areas domain.
of formatted disk space located on two or more
dynamic disks. In a striped volume, data is stored, Sysprep
a block at a time, evenly and sequentially, among Sysprep (sysprep.exe) is a Windows 2000
all of the disks in the striped volume. Striped deployment tool designed for large organizations
volumes are also known as RAID level 0, and are and OEMs. Sysprep prepares a Windows 2000
sometimes referred to as disk striping. See also computer’s hard disk for duplication, thus making
disk striping, dynamic disk, RAID. it possible for that computer’s hard disk to be
copied to other computers. Sysprep can be
subfolder used on either Windows 2000 Professional or
A subfolder is a folder that is located within Windows 2000 Server computers, but can’t
another folder. Subfolders can contain other be used on a Windows 2000 Server domain
subfolders, as well as files. controller. Sysprep requires the use of third-party
disk duplication software.
subnet mask
A subnet mask specifies which portion of an IP System Monitor
address represents the network ID and which System Monitor is a Windows 2000 tool that is
portion represents the host ID. A subnet mask used to monitor and chart the performance of
enables TCP/IP to correctly determine whether system components in a Windows 2000
network traffic destined for a given IP address computer. System Monitor replaces Windows NT
should be transmitted on the local subnet, or 4.0’s Performance Monitor. System Monitor
whether it should be routed to a remote subnet. functions as an MMC snap-in.
A subnet mask should be the same for all
computers and other network devices on a given System Policy
network segment. A subnet mask is a 32-bit System Policy is a collection of Administrator-
binary number, broken into four 8-bit sections created user, group, and computer system
(octets), that is normally represented in a dotted policies that enable an administrator to manage
decimal format. A common subnet mask is non-Windows 2000 client computers (and their
255.255.255.0. This particular subnet mask users) on a Windows 2000 network.
specifies that TCP/IP will use the first three
octets of an IP address as the network ID, and system environment variables
use the last octet as the host ID. System environment variables are environment
variables that apply to all users and to the
symmetric multiprocessing operating system. See also environment variables
Symmetric multiprocessing is an efficient type of and user environment variables.
multiprocessing in which system processes and
applications can be run on any available
processor. See also multiprocessing.
4701-1 GL.f.qc 4/24/00 10:12 Page 1525
Glossary 1525
1526 Glossary
Glossary 1527
TTL UPS
TTL stands for Time-To-Live. TTL is often used by UPS stands for uninterruptible power supply.
protocols such as TCP/IP and IPX/SPX to A UPS is a fault-tolerance device that enables
determine the number of routers a packet can a computer to continue operations for a short
cross before it is discarded (killed). period of time after a power outage.
1528 Glossary
Glossary 1529
1530 Glossary
zone
A zone is a storage database for either a DNS
domain or for a DNS domain and one or more of
its subdomains. See also zone file.