Course 20410b Installing and Configuring Windows Server 2012
Course 20410b Installing and Configuring Windows Server 2012
20410B
Installing and Configuring
Windows Server® 2012
MCT USE ONLY. STUDENT USE PROHIBITED
ii 20410B: Installing and Configuring Windows Server® 2012
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with
any real company, organization, product, domain name, e-mail address, logo, person, place or event is
intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the
user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property
rights covering subject matter in this document. Except as expressly provided in any written license
agreement from Microsoft, the furnishing of this document does not give you any license to these
patents, trademarks, copyrights, or other intellectual property.
The names of manufacturers, products, or URLs are provided for informational purposes only and
Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding
these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a
manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links
may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not
responsible for the contents of any linked site or any link contained in a linked site, or any changes or
updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission
received from any linked site. Microsoft is providing these links to you only as a convenience, and the
inclusion of any link does not imply endorsement of Microsoft of the site or the products contained
therein.
Released: 12/2012
MCT USE ONLY. STUDENT USE PROHIBITED
MICROSOFT LICENSE TERMS
OFFICIAL MICROSOFT LEARNING PRODUCTS
MICROSOFT OFFICIAL COURSE Pre-Release and Final Release Versions
These license terms are an agreement between Microsoft Corporation and you. Please read them. They apply to
the Licensed Content named above, which includes the media on which you received it, if any. These license
terms also apply to any updates, supplements, internet based services and support services for the Licensed
Content, unless other terms accompany those items. If so, those terms apply.
BY DOWNLOADING OR USING THE LICENSED CONTENT, YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT
THEM, DO NOT DOWNLOAD OR USE THE LICENSED CONTENT.
If you comply with these license terms, you have the rights below.
1. DEFINITIONS.
a. “Authorized Learning Center” means a Microsoft Learning Competency Member, Microsoft IT Academy
Program Member, or such other entity as Microsoft may designate from time to time.
b. “Authorized Training Session” means the Microsoft-authorized instructor-led training class using only
MOC Courses that are conducted by a MCT at or through an Authorized Learning Center.
c. “Classroom Device” means one (1) dedicated, secure computer that you own or control that meets or
exceeds the hardware level specified for the particular MOC Course located at your training facilities or
primary business location.
d. “End User” means an individual who is (i) duly enrolled for an Authorized Training Session or Private
Training Session, (ii) an employee of a MPN Member, or (iii) a Microsoft full-time employee.
e. “Licensed Content” means the MOC Course and any other content accompanying this agreement.
Licensed Content may include (i) Trainer Content, (ii) software, and (iii) associated media.
f. “Microsoft Certified Trainer” or “MCT” means an individual who is (i) engaged to teach a training session
to End Users on behalf of an Authorized Learning Center or MPN Member, (ii) currently certified as a
Microsoft Certified Trainer under the Microsoft Certification Program, and (iii) holds a Microsoft
Certification in the technology that is the subject of the training session.
g. “Microsoft IT Academy Member” means a current, active member of the Microsoft IT Academy
Program.
h. “Microsoft Learning Competency Member” means a Microsoft Partner Network Program Member in
good standing that currently holds the Learning Competency status.
i. “Microsoft Official Course” or “MOC Course” means the Official Microsoft Learning Product instructor-
led courseware that educates IT professionals or developers on Microsoft technologies.
MCT USE ONLY. STUDENT USE PROHIBITED
j. “Microsoft Partner Network Member” or “MPN Member” means a silver or gold-level Microsoft Partner
Network program member in good standing.
k. “Personal Device” means one (1) device, workstation or other digital electronic device that you
personally own or control that meets or exceeds the hardware level specified for the particular MOC
Course.
l. “Private Training Session” means the instructor-led training classes provided by MPN Members for
corporate customers to teach a predefined learning objective. These classes are not advertised or
promoted to the general public and class attendance is restricted to individuals employed by or
contracted by the corporate customer.
m. “Trainer Content” means the trainer version of the MOC Course and additional content designated
solely for trainers to use to teach a training session using a MOC Course. Trainer Content may include
Microsoft PowerPoint presentations, instructor notes, lab setup guide, demonstration guides, beta
feedback form and trainer preparation guide for the MOC Course. To clarify, Trainer Content does not
include virtual hard disks or virtual machines.
2. INSTALLATION AND USE RIGHTS. The Licensed Content is licensed not sold. The Licensed Content is
licensed on a one copy per user basis, such that you must acquire a license for each individual that
accesses or uses the Licensed Content.
2.1 Below are four separate sets of installation and use rights. Only one set of rights apply to you.
ii. Use of Instructional Components in Trainer Content. You may customize, in accordance with the
most recent version of the MCT Agreement, those portions of the Trainer Content that are logically
associated with instruction of a training session. If you elect to exercise the foregoing rights, you
agree: (a) that any of these customizations will only be used for providing a training session, (b) any
customizations will comply with the terms and conditions for Modified Training Sessions and
Supplemental Materials in the most recent version of the MCT agreement and with this agreement.
For clarity, any use of “customize” refers only to changing the order of slides and content, and/or
not using all the slides or content, it does not mean changing or modifying any slide or content.
2.2 Separation of Components. The Licensed Content components are licensed as a single unit and you
may not separate the components and install them on different devices.
2.4 Third Party Programs. The Licensed Content may contain third party programs or services. These
license terms will apply to your use of those third party programs or services, unless other terms accompany
those programs and services.
2.5 Additional Terms. Some Licensed Content may contain components with additional terms,
conditions, and licenses regarding its use. Any non-conflicting terms in those conditions and licenses also
apply to that respective component and supplements the terms described in this Agreement.
3. PRE-RELEASE VERSIONS. If the Licensed Content is a pre-release (“beta”) version, in addition to the other
provisions in this agreement, then these terms also apply:
a. Pre-Release Licensed Content. This Licensed Content is a pre-release version. It may not contain the
same information and/or work the way a final version of the Licensed Content will. We may change it
for the final version. We also may not release a final version. Microsoft is under no obligation to
provide you with any further content, including the final release version of the Licensed Content.
b. Feedback. If you agree to give feedback about the Licensed Content to Microsoft, either directly or
through its third party designee, you give to Microsoft without charge, the right to use, share and
commercialize your feedback in any way and for any purpose. You also give to third parties, without
charge, any patent rights needed for their products, technologies and services to use or interface with
any specific parts of a Microsoft software, Microsoft product, or service that includes the feedback. You
will not give feedback that is subject to a license that requires Microsoft to license its software,
technologies, or products to third parties because we include your feedback in them. These rights
MCT USE ONLY. STUDENT USE PROHIBITED
survive this agreement.
c. Term. If you are an Authorized Training Center, MCT or MPN, you agree to cease using all copies of the
beta version of the Licensed Content upon (i) the date which Microsoft informs you is the end date for
using the beta version, or (ii) sixty (60) days after the commercial release of the Licensed Content,
whichever is earliest (“beta term”). Upon expiration or termination of the beta term, you will
irretrievably delete and destroy all copies of same in the possession or under your control.
4. INTERNET-BASED SERVICES. Microsoft may provide Internet-based services with the Licensed Content,
which may change or be canceled at any time.
a. Consent for Internet-Based Services. The Licensed Content may connect to computer systems over an
Internet-based wireless network. In some cases, you will not receive a separate notice when they
connect. Using the Licensed Content operates as your consent to the transmission of standard device
information (including but not limited to technical information about your device, system and
application software, and peripherals) for internet-based services.
b. Misuse of Internet-based Services. You may not use any Internet-based service in any way that could
harm it or impair anyone else’s use of it. You may not use the service to try to gain unauthorized access
to any service, data, account or network by any means.
5. SCOPE OF LICENSE. The Licensed Content is licensed, not sold. This agreement only gives you some rights
to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more
rights despite this limitation, you may use the Licensed Content only as expressly permitted in this
agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only
allows you to use it in certain ways. Except as expressly permitted in this agreement, you may not:
• install more copies of the Licensed Content on devices than the number of licenses you acquired;
• allow more individuals to access the Licensed Content than the number of licenses you acquired;
• publicly display, or make the Licensed Content available for others to access or use;
• install, sell, publish, transmit, encumber, pledge, lend, copy, adapt, link to, post, rent, lease or lend,
make available or distribute the Licensed Content to any third party, except as expressly permitted
by this Agreement.
• reverse engineer, decompile, remove or otherwise thwart any protections or disassemble the
Licensed Content except and only to the extent that applicable law expressly permits, despite this
limitation;
• access or use any Licensed Content for which you are not providing a training session to End Users
using the Licensed Content;
• access or use any Licensed Content that you have not been authorized by Microsoft to access and
use; or
• transfer the Licensed Content, in whole or in part, or assign this agreement to any third party.
6. RESERVATION OF RIGHTS AND OWNERSHIP. Microsoft reserves all rights not expressly granted to you in
this agreement. The Licensed Content is protected by copyright and other intellectual property laws and
treaties. Microsoft or its suppliers own the title, copyright, and other intellectual property rights in the
Licensed Content. You may not remove or obscure any copyright, trademark or patent notices that
appear on the Licensed Content or any components thereof, as delivered to you.
MCT USE ONLY. STUDENT USE PROHIBITED
7. EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and regulations. You
must comply with all domestic and international export laws and regulations that apply to the Licensed
Content. These laws include restrictions on destinations, End Users and end use. For additional
information, see www.microsoft.com/exporting.
8. LIMITATIONS ON SALE, RENTAL, ETC. AND CERTAIN ASSIGNMENTS. You may not sell, rent, lease, lend or
sublicense the Licensed Content or any portion thereof, or transfer or assign this agreement.
9. SUPPORT SERVICES. Because the Licensed Content is “as is”, we may not provide support services for it.
10. TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you fail
to comply with the terms and conditions of this agreement. Upon any termination of this agreement, you
agree to immediately stop all use of and to irretrievable delete and destroy all copies of the Licensed
Content in your possession or under your control.
11. LINKS TO THIRD PARTY SITES. You may link to third party sites through the use of the Licensed Content.
The third party sites are not under the control of Microsoft, and Microsoft is not responsible for the
contents of any third party sites, any links contained in third party sites, or any changes or updates to third
party sites. Microsoft is not responsible for webcasting or any other form of transmission received from
any third party sites. Microsoft is providing these links to third party sites to you only as a convenience,
and the inclusion of any link does not imply an endorsement by Microsoft of the third party site.
12. ENTIRE AGREEMENT. This agreement, and the terms for supplements, updates and support services are
the entire agreement for the Licensed Content.
b. Outside the United States. If you acquired the Licensed Content in any other country, the laws of that
country apply.
14. LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the laws of
your country. You may also have rights with respect to the party from whom you acquired the Licensed
Content. This agreement does not change your rights under the laws of your country if the laws of your
country do not permit it to do so.
15. DISCLAIMER OF WARRANTY. THE LICENSED CONTENT IS LICENSED "AS-IS," "WITH ALL FAULTS," AND "AS
AVAILABLE." YOU BEAR THE RISK OF USING IT. MICROSOFT CORPORATION AND ITS RESPECTIVE
AFFILIATES GIVE NO EXPRESS WARRANTIES, GUARANTEES, OR CONDITIONS UNDER OR IN RELATION TO
THE LICENSED CONTENT. YOU MAY HAVE ADDITIONAL CONSUMER RIGHTS UNDER YOUR LOCAL LAWS
WHICH THIS AGREEMENT CANNOT CHANGE. TO THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS,
MICROSOFT CORPORATION AND ITS RESPECTIVE AFFILIATES EXCLUDE ANY IMPLIED WARRANTIES OR
CONDITIONS, INCLUDING THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NON-INFRINGEMENT.
MCT USE ONLY. STUDENT USE PROHIBITED
16. LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. TO THE EXTENT NOT PROHIBITED BY
LAW, YOU CAN RECOVER FROM MICROSOFT CORPORATION AND ITS SUPPLIERS ONLY DIRECT
DAMAGES UP TO USD$5.00. YOU AGREE NOT TO SEEK TO RECOVER ANY OTHER DAMAGES, INCLUDING
CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES FROM MICROSOFT
CORPORATION AND ITS RESPECTIVE SUPPLIERS.
It also applies even if Microsoft knew or should have known about the possibility of the damages. The
above limitation or exclusion may not apply to you because your country may not allow the exclusion or
limitation of incidental, consequential or other damages.
Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this agreement
are provided below in French.
Remarque : Ce le contenu sous licence étant distribué au Québec, Canada, certaines des clauses dans ce
contrat sont fournies ci-dessous en français.
EXONÉRATION DE GARANTIE. Le contenu sous licence visé par une licence est offert « tel quel ». Toute
utilisation de ce contenu sous licence est à votre seule risque et péril. Microsoft n’accorde aucune autre garantie
expresse. Vous pouvez bénéficier de droits additionnels en vertu du droit local sur la protection dues
consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties
implicites de qualité marchande, d’adéquation à un usage particulier et d’absence de contrefaçon sont exclues.
Elle s’applique également, même si Microsoft connaissait ou devrait connaître l’éventualité d’un tel dommage.
Si votre pays n’autorise pas l’exclusion ou la limitation de responsabilité pour les dommages indirects,
accessoires ou de quelque nature que ce soit, il se peut que la limitation ou l’exclusion ci-dessus ne s’appliquera
pas à votre égard.
EFFET JURIDIQUE. Le présent contrat décrit certains droits juridiques. Vous pourriez avoir d’autres droits prévus
par les lois de votre pays. Le présent contrat ne modifie pas les droits que vous confèrent les lois de votre pays
si celles-ci ne le permettent pas.
Acknowledgments
Microsoft Learning would like to acknowledge and thank the following for their contribution towards
developing this title. Their effort at various stages in the development has ensured that you have a good
classroom experience.
Contents
Module 1: Deploying and Managing Windows Server 2012
Lesson 1: Windows Server 2012 Overview 1-2
Lesson 2: Overview of Windows Server 2012 Management 1-14
Lesson 3: Installing Windows Server 2012 1-20
Lesson 4: Post-Installation Configuration of Windows Server 2012 1-25
Lesson 5: Introduction to Windows PowerShell 1-34
Lab: Deploying and Managing Windows Server 2012 1-39
Course Description
This course is part one of a three-part series that provides the skills and knowledge necessary to
implement a core Windows Server 2012 infrastructure in an existing enterprise environment. The
three courses collectively cover implementing, managing, maintaining, and provisioning services and
infrastructure in a Windows Server 2012 environment. While there is some cross-over in skills and tasks
across the courses, this course primarily covers the initial implementation and configuration of core
services including Active Directory® Domain Services (AD DS), networking services, and Microsoft®
Hyper-V® Server 2012 configuration.
Audience
This course is intended for Information Technology (IT) Professionals who have good Windows® operating
system knowledge and experience, and want to acquire the skills and knowledge necessary to implement
the core infrastructure services in an existing Windows Server 2012 environment.
The secondary audience consists of those seeking certification in the 70-410, Installing and Configuring
Windows Server 2012 exam.
Student Prerequisites
This course requires that students meet the following prerequisites:
• A good understanding of networking fundamentals
• Good hands-on Windows client operating system experience with Windows Vista®, Windows 7, or
Windows 8
Students would also benefit from having some previous Windows Server operating system experience.
Course Objectives
After completing this course, students will be able to:
• Describe AD DS.
• Manage Active Directory objects.
• Implement IPv4.
• Implement Dynamic Host Configuration Protocol (DHCP).
• Implement IPv6.
MCT USE ONLY. STUDENT USE PROHIBITED
xviii About This Course
Course Outline
This section provides an outline of the course:
This module discusses creating and managing specific Active Directory objects such as users,
groups, and computer accounts. This is a core part of what a beginning server administrator
does on a daily basis. Some of these tasks are also delegated to help desk staff.
Module 4, Automating Active Directory Domain Services Administration
This module expands on the knowledge gained in Module 3 by providing students with
methods for automating the creation and management of Active Directory objects. This is a
relatively advanced topic, but logically flows after module 3.
This module begins a new thread of learning in the course. Configuring and understanding
IPv4 is fundamental to working as a system administrator.
This module discusses how to use DHCP to distribute IPv4 address information.
This module introduces IPv6 configuration, which is likely to be new content for the students.
Module 8 is separated from Module 5 because both are theory-intensive and may overwhelm
students if they are sequential. IPv6 knowledge is not required for Modules 6 and 7.
MCT USE ONLY. STUDENT USE PROHIBITED
About This Course xix
This module includes content on storage configuration for Windows Server 2012. This is
prerequisite information for Module 10, which discusses creating and securing file shares.
Module 10, Implementing File and Print Services
This module discusses file shares and printing at the same time because both are commonly
used network services. Security for file shares and printing uses the knowledge about user
accounts and groups covered in Modules 2 and 3.
This module builds on the information students have already learned about AD DS to
introduce the creation and management of GPOs.
This module then covers specific Group Policy settings that can be used to increase security.
The settings include security policies, application restriction policies, and Windows Firewall
rules.
Exam/Course Mapping
This course, 20410B: Installing and Configuring Windows Server® 2012, has a direct mapping of its content
to the objective domain for the Microsoft exam 70-410: Installing and Configuring Windows Server 2012.
The table below is provided as a study aid that will assist you in preparation for taking this exam and to
show you how the exam objectives and the course content fit together. The course is not designed
exclusively to support the exam but rather provides broader knowledge and skills to allow a real-world
implementation of the particular technology. The course will also contain content that is not directly
covered in the examination and will utilize the unique experience and skills of your qualified Microsoft
Certified Trainer.
Note: The exam objectives are available online at the following URL:
http://www.microsoft.com/learning/en/us/exam.aspx?ID=70-410&locale=en-us#tab2.
MCT USE ONLY. STUDENT USE PROHIBITED
xx About This Course
Note: Attending this course in itself will not successfully prepare you to pass any associated
certification exams.
The taking of this course does not guarantee that you will automatically pass any certification exam. In
addition to attendance at this course, you should also have the following:
• Real-world, hands-on experience Installing and configuring a Windows Server 2012 Infrastructure
There may also be additional study and preparation resources, such as practice tests, available for you
to prepare for this exam. Details of these are available at the following URL:
http://www.microsoft.com/learning/en/us/exam.aspx?ID=70-410&locale=en-us#tab3
You should familiarize yourself with the audience profile and exam prerequisites to ensure you are
sufficiently prepared before taking the certification exam. The complete audience profile for this exam
is available at the following URL:
http://www.microsoft.com/learning/en/us/exam.aspx?ID=70-410&locale=en-us#tab1
The exam/course mapping table outlined above is accurate at the time of printing, however it is subject to
change at any time and Microsoft bears no responsibility for any discrepancies between the version
published here and the version available online and will provide no notification of such changes.
MCT USE ONLY. STUDENT USE PROHIBITED
xxiv About This Course
Course Materials
The following materials are included with your kit:
• Course Handbook A succinct classroom learning guide that provides all the critical technical
information in a crisp, tightly-focused format, which is just right for an effective in-class learning
experience.
• Lessons: Guide you through the learning objectives and provide the key points that are critical to
the success of the in-class learning experience.
• Labs: Provide a real-world, hands-on platform for you to apply the knowledge and skills learned
in the module.
• Module Reviews and Takeaways: Provide improved on-the-job reference material to boost
knowledge and skills retention.
• Lab Answer Keys: Provide step-by-step lab solution guidance at your fingertips when it’s
needed.
• Modules: Include companion content, such as questions and answers, detailed demo steps and
additional reading links, for each lesson. Additionally, they include Lab Review questions and
answers and Module Reviews and Takeaways sections, which contain the review questions and
answers, best practices, common issues and troubleshooting tips with answers, and real-world
issues and scenarios with answers.
• Resources: Include well-categorized additional resources that give you immediate access to the
most up-to-date premium content on TechNet, MSDN®, and Microsoft Press®.
Student Course files on the http://www.microsoft.com/learning/companionmoc Site: Includes the
Allfiles.exe, a self-extracting executable file that contains all the files required for the labs and
demonstrations.
• Course evaluation At the end of the course, you will have the opportunity to complete an online
evaluation to provide feedback on the course, training facility, and instructor.
Important At the end of each lab, you must close the virtual machine and must not save any
changes. To close a virtual machine without saving the changes, perform the following steps:
1. On the virtual machine, on the Action menu, click Close.
2. In the Close dialog box, in the What do you want the virtual machine to do? list, click Turn
off and delete changes, and then click OK.
The following table shows the role of each virtual machine used in this course.
20410B-LON-SVR1 A member server running Windows Server 2012 in the Adatum.com domain.
20410B-LON-SVR3 A blank virtual machine on which students will install Windows Server 2012.
20410B-LON-HOST1 A bootable VHD for running Windows Server 2012 as the host for Hyper-V.
20410B-LON-RTR A router that is used for network activities that require a separate subnet.
20410B-LON-CL1 A client computer running Windows 8 and Microsoft® Office 2010 Service
Pack 1 (SP1) in the Adatum.com domain.
20410B-LON-CL2 A client computer running Windows 8 and Office 2010 SP1 in the
Adatum.com domain that is located in a second subnet.
Software Configuration
The following software is installed on each virtual machine:
• Microsoft Network Monitor 3.4 is installed on LON-SVR2.
Classroom Setup
Each classroom computer will have the same virtual machine configured in the same way.
MCT USE ONLY. STUDENT USE PROHIBITED
xxvi About This Course
• Move your mouse to the lower right corner of the desktop to open a menu with:
• Windows+C: Opens the same menu as moving the mouse to the lower right corner.
• Windows+I: Opens Settings.
Module 1
Deploying and Managing Windows Server 2012
Contents:
Module Overview 1-1
Module Overview
Understanding the capabilities of a new Windows Server® 2012 operating system enables you to leverage
that operating system effectively. If you do not understand the capabilities of your new Windows Server
2012 operating system, you may end up using it the same way that you used the previous operating
system, and you may forego the advantages of the new system. By understanding how to utilize your new
Windows Server 2012 operating system fully, and by understanding the tools that are available to manage
that functionality, you can provide your organization with more value.
This module introduces the new Windows Server 2012 administrative interface. In this module, you will
learn about the different roles and features that are available with the Windows Server 2012 operating
system. You will also learn about the different installation options that you can use when you install
Windows Server 2012.
This module discusses the configuration steps that you can perform both during installation and after
deployment to ensure that the servers can begin functioning in its assigned role. You will also learn how
to use Windows PowerShell® to perform common administrative tasks in Windows Server 2012.
Objectives
After completing this module, you will be able to:
Lesson 1
Windows Server 2012 Overview
Before deploying Windows Server 2012, you need to understand how each of the Windows Server 2012
editions might benefit your organization’s servers. You also need to know whether a particular hardware
configuration is appropriate for Windows Server 2012, whether a virtual deployment might be more
suitable than a physical deployment, and which installation source allows you to deploy Windows Server
2012 in an efficient manner. If you do not have an understanding of these issues, you could end up
costing your organization time and money by making a choice that you must later correct.
This lesson provides an overview of the various Windows Server 2012 editions, installation options, roles,
and features. Using this information, you will be able to determine which Windows Server 2012 edition
and installation options are right for your organization.
Lesson Objectives
After completing this lesson, you will be able to:
• Describe the role of on-premises servers on a modern network.
• Explain the function of the server roles that are available on computers running Windows Server2012.
On-Premises Servers
As an IT professional, you most likely have heard
about cloud computing. You might have heard
how software and services are being moved to
a public or private cloud because the cloud is
predicted to be an important aspect of the future
of enterprise computing. You also may have heard
that Windows Server 2012 is ready for the cloud.
As an IT professional who has worked with
locally-deployed servers, it would be reasonable
to ask why, If everything is moving to cloud
computing, do you need to learn about deploying
Windows Server 2012 locally?
The reality is, not every service and application that is used on a daily basis should be hosted by cloud
computing. Locally deployed servers form the backbone of an organizational network, and provide the
following resources to clients:
• Infrastructure services. Servers provide clients with infrastructure resources, including Domain Name
System (DNS) and Dynamic Host Configuration Protocol (DHCP) services. These services allow clients
to connect and communicate with other resources. Without these services, clients would not be able
to connect either to each other or to remote resources—including resources that are hosted by cloud
computing.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-3
• Shared files and printers. Servers provide a centralized location that allows users to store and share
documents. Servers also host resources such as shared printers that allow groups of users to leverage
resources more efficiently. Without these centralized, locally deployed resources, sharing and backing
up files centrally would be a more complex and time-intensive process. While it might be possible to
host some of this information with cloud computing, it does not always make sense to send a job to a
printer that is in the next room through a server that is hosted at a remote location.
• Hosted applications. Servers host applications such as Microsoft® Exchange Server, Microsoft SQL
Server®, Microsoft Dynamics®, and Microsoft System Center. Clients access these applications to
accomplish different tasks, such as accessing email or self-service deployment of desktop applications.
In some cases, these resources can be deployed to cloud computing. In many cases these resources
must be hosted locally for performance, cost, and regulatory reasons. Whether it is best to host these
resources locally or with cloud computing depends on the specifics of the individual organization.
• Network access. Servers provide authentication and authorization resources to clients on the network.
By authenticating against a server, a user and client can prove their identity. Even when many of an
organization’s servers are located in a public or private cloud, people still need to have some form of
local authentication and authorization infrastructure.
• Application, Update, and Operating System deployment. Servers are often deployed locally to assist
with the deployment of applications, updates, and operating systems to clients on the organizational
network. Because of intensive bandwidth utilization, these servers must be in proximity to the clients
to which they are providing this service.
Each organization will have its own requirements. An organization in an area that has limited Internet
connectivity will need to rely more on on-premises servers than an organization that has access to
high-speed bandwidth. It is important that, even in a case of Internet connectivity issues, work in an
organization can continue. Productivity will be negatively affected if the failure of the organization’s
Internet connection suddenly means that no one is able to access his or her shared files and printers.
While Windows Server 2012 is ready for integration with cloud computing, it is also still eminently suited
to the traditional tasks that Windows Server operating systems have performed historically. Therefore, you
will still be able to configure and deploy Windows Server 2012 to perform the same or similar workloads
that you configured for servers running Windows Server 2003, and maybe even for the Microsoft
Windows NT® Server 4.0.
Question: What is the difference between a server and a client operating system?
Question: How has the role of the server evolved over time from the Microsoft
Windows NT 4.0 Server operating system to Windows Server 2012?
MCT USE ONLY. STUDENT USE PROHIBITED
1-4 Deploying and Managing Windows Server 2012
• Software as a Service (SaaS). The cloud hosting provider hosts your application and the entire
infrastructure that supports that application. You purchase and run a software application from a
cloud hosting provider. Windows InTune™ and Microsoft Office 365 are examples of SaaS.
Question: Which type of cloud would you use to deploy a custom virtual machine running
Windows Server 2012?
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-5
Edition Description
The Windows Server 2012 Provides all roles and features available on the Windows Server 2012
Standard operating system platform. Supports up to 64 sockets and up to 4 terabytes (TB) of
random access memory (RAM). Includes two virtual machine licenses.
The Windows Server 2012 Provides all roles and features that are available on the Windows
Datacenter operating Server 2012 platform. Includes unlimited virtual machine licenses for
system virtual machines that are run on the same hardware. Supports 64
sockets, up to 640 processor cores, and up to 4 TB of RAM.
The Windows Server 2012 Designed for small business owners, allows only 15 users, cannot be
Foundation operating joined to a domain, and includes limited server roles. Supports one
system processor core and up to 32 gigabytes (GB) of RAM.
The Windows Server 2012 Next edition of Small Business Server. Must be root server in domain. It
Essentials operating system cannot function as a Hyper-V®, Failover Clustering, Server Core, or
Remote Desktop Services server. It has limits for 25 users and 50
devices. Supports two processor cores and 64 GB of RAM.
Microsoft Hyper-V Server Stand-alone Hyper-V platform for virtual machines with no UI. No
2012 licensing cost (free) for host operating system, but virtual machines are
licensed normally. Supports 64 sockets and 4 TB of RAM. Supports
domain join. Does not support other Windows Server 2012 roles other
than limited file services features.
The Windows Storage Entry-level unified storage appliance. Limited to 50 users, one
Server°2012 Workgroup processor core, 32 GB of RAM. Supports domain join.
operating system
The Windows MultiPoint Supports multiple users accessing the same host computer directly
Server 2012 Standard using separate mouse, keyboard, and monitors. Limited to one socket,
operating system 32 GB of RAM, and a maximum of 12 sessions. Supports some roles
including DNS and DHCP Server roles, but does not support others
including AD DS, AD CS, and AD FS. Does not support domain join.
MCT USE ONLY. STUDENT USE PROHIBITED
1-6 Deploying and Managing Windows Server 2012
Edition Description
The Windows MultiPoint Supports multiple users accessing the same host computer directly
Server 2012 Premium using separate mouse, keyboard, and monitors. Limited to two sockets,
operating system 4 TB of RAM, and a maximum of 22 sessions. Supports some roles
including DNS and DHCP Server roles, but does not support others
including AD DS, AD CS, and AD FS. Supports domain join.
• Reduced update requirements. Because Server Core installs fewer components, its deployment
requires you to install fewer software updates. This reduces the number of monthly reboots required
and the amount of time required for an administrator to service Server Core.
• Reduced hardware footprint. Server Core computers require less RAM and less hard disk space. When
virtualized, this means that you can deploy more servers on the same host.
Increasing numbers of Microsoft server applications are designed to run on computers with Server Core–
installed operating systems. For example, you can install SQL Server 2012 on computers that are running
the Server Core–installed version of Windows Server 2008 R2.
There are two ways of installing Windows Server 2012 in a Server Core configuration:
• Server Core. This is the standard deployment of Server Core. It is possible to convert to the full version
of Windows Server 2012 with the graphical administration components, but only if you have access to
an installation source with all server files, such as a mounted Windows image file (.wim) image.
• Server Core with Minimal Server Interface. This works the same as a deployment of Windows Server
2012 with the graphical component, except that the graphical components are not installed, nor are
they removed. You can convert between Server Core with Minimal Interface and Windows Server
2012 with a graphical interface by installing the graphical features, but without needing to specify an
installation source.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-7
You can switch from Server Core to the graphical version of Windows Server 2012 by running the
following Windows PowerShell cmdlet, where c:\mount is the root directory of a mounted image that
hosts the full version of the Windows Server 2012 installation files:
Import-Module ServerManager
Install-WindowsFeature -IncludeAllSubFeature User-Interfaces-Infra -Source c:\mount
Installing the graphical components gives you the option of performing administrative tasks using the
graphical tools. You can also add the graphical tools using the sconfig.cmd menu-driven command-line
tool.
Once you have performed the necessary administrative tasks, you can return the computer to its original
Server Core configuration. You can switch a computer that has the graphical version of Windows Server
2012 to Server Core by removing the following features:
• Graphical Management Tools and Infrastructure
Note: Be careful when removing graphical features, as some servers will have other
components installed that are dependent upon those features.
When connected locally, you can use the tools that are listed in the following table to manage Server Core
deployments of Windows Server 2012.
Tool Function
Cmd.exe Allows you to run traditional command-line tools such as ping.exe, ipconfig.exe,
and netsh.exe.
PowerShell.exe Launches a Windows PowerShell session on the Server Core deployment. You
can then perform Windows PowerShell tasks normally.
Notepad.exe Allows you to use the Notepad.exe text editor within the Server Core
environment.
Msinfo32.exe Allows you to view system information about the Server Core deployment.
Note: If you accidentally close the command window on a computer that is running Server
Core, you can recover the command window by performing the following steps:
2. From the File menu, click New Task (Run…), and then type cmd.exe.
MCT USE ONLY. STUDENT USE PROHIBITED
1-8 Deploying and Managing Windows Server 2012
Server Core supports most Windows Server 2012 roles and features. However, you cannot install the
following roles on a computer running Server Core:
• AD FS
• Application Server
Note: You can check which roles on Server Core are available and which are not by running
the query Get-WindowsFeature | where-object {$_.InstallState -eq “Removed”}.
The Windows Server 2012 administration paradigm focuses more on managing many servers from one
console than the traditional method of managing each server separately. This means that when you want
to perform an administrative task, you are more likely to manage multiple computers that are running the
Server Core operating system from one computer, than you are to connect to each computer individually.
You can enable remote management of a computer that is running Server Core through sconfig.cmd, or
by running the following command:
Windows Server 2012 supports the server roles that are listed in the following table.
Role Function
Role Function
Active Directory Rights Allows you to apply rights management policies to prevent
Management Services unauthorized access to sensitive documents.
(AD RMS)
Fax Server Supports sending and receiving of faxes. Also allows you to manage
fax resource on the network.
File and Storage Services Supports the management of shared folders storage, distributed file
system (DFS), and network storage.
Hyper-V® Enables you to host virtual machines on computers that are running
Windows Server 2012.
Network Policy and Access Authorization infrastructure for remote connections, including Health
Services Registration Authority (HRA) for Network Access Protection (NAP).
Remote Access Supports Seamless Connectivity, Always On, and Always Managed
features based on the Windows 7 DirectAccess feature. Also supports
remote access through virtual private network (VPN) and dial-up
connections.
Remote Desktop Services Supports access to virtual desktops, session-based desktops, and
(RDS) RemoteApp programs.
Volume Activation Services Allows you to automate and simplify the management of volume
license keys and volume key activation. Allows you to manage a Key
Management Service (KMS) host or configure AD DS–based activation
for computers that are members of the domain.
Web Server (IIS) The Windows Server 2012 web server component.
Windows DS Allows you to deploy server operating systems to clients over the
network.
Windows Server Update Provides a method of deploying updates for Microsoft products to
Services (WSUS) network computers.
MCT USE ONLY. STUDENT USE PROHIBITED
1-10 Deploying and Managing Windows Server 2012
When you deploy a role, Windows Server 2012 automatically configures aspects of the server’s
configuration (such as firewall settings), to support the role. Windows Server 2012 also automatically and
simultaneously deploys role dependencies. For example, when you install the WSUS role, the Web Server
(IIS) role components that are required to support the WSUS role are also installed automatically.
You add and remove roles using the Add Roles and Features Wizard, which is available from the Windows
Server 2012 Server Manager console. If you are using Server Core, then you can also add and remove
roles using the Install-WindowsFeature and Remove-WindowsFeature Windows PowerShell cmdlets.
Question: Which roles are often co-located on the same server?
Feature Description
.NET Framework 4.5 Features Installs .NET Framework 4.5 technologies. This feature is
installed by default.
Background Intelligent Transfer Allows asynchronous transfer of files to ensure that other
Service (BITS) network applications are not adversely impacted.
Windows BitLocker® Drive Supports full-disk and full-volume encryption, and startup
Encryption environment protection.
BitLocker network unlock Provides a network-based key protector that can unlock
locked BitLocker–protected domain-joined operating systems.
Windows BranchCache® Allows the server to function as either a hosted cache server or
a BranchCache content server for BranchCache clients.
Client for NFS Provides access to files stored on network file system (NFS)
servers.
Feature Description
Failover Clustering A high availability feature that allows Windows Server 2012 to
participate in failover clustering.
Ink and Handwriting Services Allows use of Ink Support and Handwriting Recognition.
Internet SCSI (iSCSI) Target Storage Provides iSCSI target and disk management services to
Provider Windows Server 2012.
Internet Storage name Service (iSNS) Supports discovery services of iSCSI storage area networks
Server service (SANs).
Line Printer Remote (LPR) Port Allows computer to send print jobs to printers that are shared
Monitor using the Line Printer Daemon (LPD) service.
Management Open Data Protocol Allows you to expose Windows PowerShell cmdlets through
(OData) IIS Extension an OData–based web service running on the Internet
Information Services (IIS) platform.
Peer Name Resolution Protocol Name resolution protocol that allows applications to resolve
(PNRP) names on the computer.
Quality Windows Audio Video Supports audio and video streaming applications on IP home
Experience networks.
Remote Access Server (RAS) Allows you to create connection manager profiles that simplify
Connection Manager Administration remote access configuration deployment to client computers.
Kit
Remote Differential Compression Transfers the differences between files over a network,
(RDC) minimizing bandwidth utilization.
Remote Server Administration Tools Collection of consoles and tools for remotely managing roles
and features on other servers.
Remote Procedure Call (RPC) over Relays RPC traffic over HTTP as an alternative to VPN
HTTP Proxy connections.
MCT USE ONLY. STUDENT USE PROHIBITED
1-12 Deploying and Managing Windows Server 2012
Feature Description
Simple TCP/IP Services Supports basic TCP/IP services, including Quote of the Day.
Simple Network Management Includes SNMP agents that are used with the network
Protocol (SNMP) Service management services.
Subsystem for UNIX-based Supports Portable Operating System Interface for UNIX
Applications (POSIX)–compliant UNIX-based applications.
Telnet Server Allows clients to connect to the server using the Telnet
protocol.
Trivial File Transfer Protocol (TFTP) Allows you to access TFTP servers.
Client
User Interfaces and Infrastructure Contains the components necessary to support the graphical
interface installation option on Windows Server 2012. On
graphical installations, this feature is installed by default.
Windows Identity Foundation 3.5 Set of .NET Framework classes that support implementing
claims based identity on .NET applications.
Windows Internal Database Relational data store that can only be used by Windows roles
and features such as WSUS.
Windows Search service Allows fast searches of files hosted on a server for clients
compatible with the Windows Search service.
Windows Server Backup Backup and recovery software for Windows Server 2012.
Windows Server Migration Tools Collection of Windows PowerShell cmdlets that assist in the
migration of server roles, operating system settings, files, and
shares from computers running previous versions of Windows
Server operating systems to Windows Server 2012.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-13
Feature Description
Windows Standards-Based Storage Set of Application Programming Interfaces (APIs) that allow
Management the discovery, management, and monitoring of storage
devices that use standards such as Storage Management
Initiative Specification (SMI-S).
Windows System Resource Manager Allows you to control the allocation of CPU and memory
(WSRM) resources.
Windows TIFF IFilter Supports Optical Character Recognition on Tagged Image File
Format (TIFF) 6.0-compliant files.
Windows Internet Naming Service Supports name resolution for NetBIOS names.
(WINS) Server
Wireless local area network (LAN) Allows the server to use a wireless network interface.
Service
Features on Demand
Features on Demand enables you to add and remove role and feature files, also known as feature payload,
from the Windows Server 2012 operating system to conserve space. You can install roles and features
where the feature payload is not present by using a remote source, such as a mounted image of the full
operating system. If an installation source is not present but an internet connection is, source files will
be downloaded from Windows Update. The advantage of a Features on Demand installation is that it
requires less hard disk space than a traditional installation. The disadvantage is that if you want to add
a role or feature, you must have access to a mounted installation source. This is something that is not
necessary if you perform an installation of Windows Server 2012 with the graphical features enabled.
Question: Which feature do you need to install to support NetBIOS name resolution for
client computers running a Microsoft Windows NT® 4.0 operating system workstation?
MCT USE ONLY. STUDENT USE PROHIBITED
1-14 Deploying and Managing Windows Server 2012
Lesson 2
Overview of Windows Server 2012 Management
Configuring a server correctly can save you from substantial problems later. Windows Server 2012
provides multiple tools to perform specific administrative tasks, each of which is appropriate for a given
set of circumstances. The Windows Server 2012 management interface also enhances your ability to
perform administrative tasks on more than one server simultaneously.
In this lesson you will learn about the different management tools that you can use to perform
administrative tasks on computers that are running the Windows Server 2012 operating system.
Lesson Objectives
After completing this lesson, you will be able to:
• Active Directory Administrative Center. With this console, you can perform Active Directory
administrative tasks such as raising domain and forest functional levels, and enabling the Active
Directory Recycle Bin. You also use this console to manage Dynamic Access Control.
• Active Directory Users and Computers. With this tool, you can create and manage Active Directory
users, computers, and groups. You can also use this tool to create Organizational Units (OUs).
• DNS console. With the DNS console, you can configure and manage the DNS Server role. This
includes creating forward and reverse lookup zones, and managing DNS records.
• Event Viewer. You can use the Event Viewer to view events recorded in the Windows Server 2012
event logs.
• Group Policy Management Console. With this tool, you can edit Group Policy Objects (GPOs) and
manage their application in AD DS.
• IIS Manager Tool. You can use this tool to manage websites.
• Performance Monitor. You can use this console to view record performance data by selecting
counters associated with specific resources that you want to monitor.
• Resource Monitor. You can use this console to view real-time information on CPU, memory, and disk
and network utilization.
• Task Scheduler. You can use this console to manage the execution of scheduled tasks.
You can access each of these tools in Server Manager by accessing the Tools menu.
Note: You can also pin frequently used tools to the Windows Server 2012 taskbar, or to the
Start menu.
MCT USE ONLY. STUDENT USE PROHIBITED
1-16 Deploying and Managing Windows Server 2012
• Sign in to Windows Server 2012 and view the Windows Server 2012 desktop.
• Add a feature by using the Add Roles and Features Wizard.
Demonstration Steps
Sign in to Windows Server 2012 and view the Windows Server 2012 desktop
• Sign in to LON-DC1 with the Adatum\Administrator account and the password Pa$$w0rd, and
then close the Server Manager console.
4. Click Select a server from the server pool, verify that LON-DC1.Adatum.com is selected, and then
click Next.
5. On the Select server roles page, select Fax Server.
6. In the Add Roles and Features Wizard dialog box, click Add Features.
10. On the Confirmation page, select the Restart the destination server automatically if required
check box, click Yes, click Install, and then click Close.
11. Click the flag icon next to Server Manager Dashboard, and review the messages.
Note: You can close this console without terminating the task.
2. In the Roles and Server Groups pane, under DNS, click Events.
3. On the DNS - Events Detail View, change the time period to 48 hours, and the Event Sources
to All.
2. Select All on the Severity Levels drop-down menu, and then click OK.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-17
2. Sign back in to LON-DC1 using the Adatum\Administrator account and the password Pa$$w0rd.
Shutdown /r /t 15
Configuring Services
Services are programs that run in the background
and provide services to clients and to the host
server. You can manage services through the
Services console, which is available in Server
Manager from the Tools menu. When securing a
computer, you should disable all services except
those that are required by the roles, features, and
applications that are installed on the server.
Startup Types
Services use one of the following startup types:
• Automatic. The service starts automatically
when the server boots.
• Automatic (Delayed Start). The service starts automatically after the server has booted.
• Manual. The service must be started manually, either by a program or by an administrator.
Note: If a server is behaving problematically, open the Services console, sort by startup
type, and then locate those services that are configured to start automatically, and which are not
in a running state.
Service Recovery
Recovery options determine what a service does in the event that it fails. You access the Recovery tab
from the DNS Server Properties window. On the Recovery tab, you have the following recovery options:
• Take no action. The service remains in a failed state until attended to by an administrator.
• Restart the Computer. The computer restarts after a preconfigured number of minutes.
You can configure different recovery options for the first failure, the second failure, and subsequent
failures. You can also configure a period of time after which the service failure clock resets.
MCT USE ONLY. STUDENT USE PROHIBITED
1-18 Deploying and Managing Windows Server 2012
You also can enable WinRM from a command line by running the command WinRM -qc. You disable
WinRM by using the same method that you use to enable it. You can disable WinRM on a computer
running the Server Core installation option using the sconfig.cmd tool.
Remote Desktop
Remote Desktop is the traditional method by which systems administrators connect remotely to the
servers that they manage. You can configure Remote Desktop on a computer that running the full version
of Windows Server 2012 by performing the following steps:
3. In the System Properties dialog box, on the Remote tab, select one of the following options:
o Don’t allow connections to this computer. The default state of remote desktop is disabled.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-19
o Allow connections from computers running any version of Remote Desktop. Allows
connections from Remote Desktop clients that do not support Network Level Authentication.
o Allow Connections only from Computers running Remote Desktop with Network Level
Authentication. Allows secure connections from computers running Remote Desktop clients that
support network-level authentication.
You can enable and disable Remote Desktop on computers that are running the Server Core installation
option by using the sconfig.cmd command-line tool.
MCT USE ONLY. STUDENT USE PROHIBITED
1-20 Deploying and Managing Windows Server 2012
Lesson 3
Installing Windows Server 2012
When preparing to install Windows Server 2012, you need to understand whether a particular hardware
configuration is appropriate. You also need to know whether a Server Core deployment might be more
suitable than a full GUI deployment, and which installation source allows you to deploy Windows Server
2012 in an efficient manner.
In this lesson you will learn about the process of installing Windows Server 2012, including the methods
that you can use to install the operating system, the different installation options, the minimum system
requirements, and the decisions that you need to make when using the Installation Wizard.
Lesson Objectives
After completing this lesson, you will be able to:
• Describe the different methods that you can use to install Windows Server 2012.
• Identify the different installation types that you can choose when installing the Windows Server 2012.
• Determine whether a computer or virtual machine meets the minimum hardware requirements
necessary to install Windows Server 2012.
• Describe the decisions that you need to make when performing a Windows Server 2012 installation.
Installation Methods
Microsoft distributes Windows Server 2012 on
optical media and in an .iso (ISO) image format.
ISO format is becoming more common as
organizations acquire software over the Internet
rather than obtaining physical removable media.
• Optical Media
o Advantages include:
Traditional method of deployment.
o Disadvantages include:
Requires that the computer have access to a DVD-ROM drive.
Is typically slower than USB media.
You cannot update the installation image without replacing the media.
You can only perform one installation per DVD-ROM at a time.
• USB Media
o Advantages include:
All computers with USB drives allow boot from USB media.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-21
The image can be updated as new software updates and drivers become available.
The answer file can be stored on a USB drive, minimizing the amount of interaction that the
administrator must perform.
o Disadvantages include:
Requires the administrator perform special steps to prepare USB media from an ISO file.
• Mounted ISO image
o Advantages include:
With virtualization software, you can mount the ISO image directly, and install Windows
Server 2012 on the virtual machine.
o Disadvantages include:
None.
• Network Share
o Advantages include:
It is possible to boot a server off a boot device (DVD or USB drive) and install from
installation files that are hosted on a network share.
o Disadvantages include:
This method is much slower than using Windows DS. If you already have access to a DVD or
USB media, it is simpler to use those tools for operating system deployment.
• Windows DS
o Advantages include:
You can deploy Windows Server 2012 from .wim image files or specially prepared VHD files.
You can use the Windows Automated Installation Kit (AIK) to configure lite-touch
deployment.
Clients perform a Preboot eXecution Environment (PXE) boot to contact the Windows DS
server, and the operating system image is transmitted to the server over the network.
Windows DS allows multiple concurrent installations of Windows Server 2012 using multicast
network transmissions.
• System Center Configuration Manager
o Advantages include:
Configuration Manager allows you to fully automate the deployment of Windows Server
2012 to new servers that do not have an operating system installed. This process is called
Zero Touch deployment.
• Virtual Machine Manager Templates
o Advantages include:
Windows Server 2012 is typically deployed in private cloud scenarios from preconfigured
virtual machine templates. You can configure multiple components of the System Center
suite to allow self-service deployment of Windows Server 2012 virtual machines.
Question: What is another method that you can use to deploy Windows Server 2012?
MCT USE ONLY. STUDENT USE PROHIBITED
1-22 Deploying and Managing Windows Server 2012
Installation Types
How you deploy Windows Server 2012 on a
specific server depends on the circumstances
of that installation. Installing on a server that
is running Windows Server 2008 R2 requires
different actions than installing on a server
running an x86 edition of Windows Server 2003.
Fresh installation Allows you to perform a fresh install on a new disk or volume. Fresh
installations are the most frequently used, and take the shortest amount of
time. You can also use this option to configure Windows Server 2012 to
perform a dual boot if you want to keep the existing operating system.
Upgrade An upgrade preserves the files, settings, and applications that are installed
already on the original server. You perform an upgrade when you want to
keep all of these items, and want to continue to use the same server
hardware. You can only upgrade to an equivalent or newer edition of
Windows Server 2012 from x64 versions of Windows Server 2003, Windows
Server 2003 R2, Windows Server 2008, and Windows Server 2008 R2. You
launch an upgrade by running setup.exe from within the original Windows
Server operating system.
Migration Use migration when migrating from an x86 version of Windows Server 2003,
Windows Server 2003 R2, or Windows Server 2008 to Windows Server 2012.
You can use the Windows Server Migration Tools feature in Windows Server
2012 to transfer files and settings.
When you perform a fresh installation, you can deploy Windows Server 2012 to an unpartitioned disk, or
to an existing volume. You can also install Windows Server 2012 to a specially prepared VHD file in a
“boot to VHD” scenario. Boot to VHD requires special preparation, and is not an option that you can
choose when performing a typical installation using the Windows Setup Wizard.
Each role service and feature places a unique load on network, disk I/O, processor, and memory resources.
For example, the file server role places different stresses on server hardware than the DHCP role.
When considering hardware requirements, remember that Windows Server 2012 can be deployed
virtually. Windows Server 2012 is supported on Hyper-V and some other non-Microsoft virtualization
platforms. Windows Server 2012 virtualized deployments need to match the same hardware specifications
as physical deployments. For example, when creating a virtual machine to host Windows Server 2012, you
need to ensure that you configure the virtual machine with enough memory and hard disk space.
Windows Server 2012 has the following minimum hardware requirements:
• Hard disk drive space: 32 GB, more if the server has more than 16 GB of RAM
The Datacenter edition of Windows Server 2012 supports the following hardware maximums:
• 640 logical processors
• 4 TB of RAM
• 63 failover cluster nodes
Additional Reading: For more information about the Windows Server Virtualization
Validation Program, see http://go.microsoft.com/fwlink/?LinkID=266736.
Question: Why does a server need more hard disk drive space if it has more than 16 GB of
RAM?
2. On the first page of the Windows Setup Wizard, select the following:
o Language to install
MCT USE ONLY. STUDENT USE PROHIBITED
1-24 Deploying and Managing Windows Server 2012
3. On the second page of the Windows Setup Wizard, click Install now. You can also use this page to
select Repair Your Computer. You use this option in the event that an installation has become
corrupted, and you are no longer able to boot into Windows Server 2012.
4. In the Windows Setup Wizard, on the Select The Operating System You Want To Install page,
choose from the available operating system installation options. The default option is Server Core
Installation.
5. On the License Terms page, review the terms of the operating system license. You must choose to
accept the license terms before you can proceed with the installation process.
6. On the Which Type Of Installation Do You Want page, you have the following options:
o Upgrade. Select this option if you have an existing installation of Windows Server that you want
to upgrade to Windows Server 2012. You should launch upgrades from within the previous
version of Windows Server rather than booting from the installation source.
Lesson 4
Post-Installation Configuration of Windows Server 2012
The Windows Server 2012 installation process involves answering a minimal number of questions. Once
you have completed installation, you need to perform several post-installation configuration steps before
you can deploy it in a production environment. These steps allow you to prepare the server for the role it
will perform on your organization’s network.
This lesson includes how to perform a range of post-installation configuration tasks, including configuring
network addressing information, setting a server’s name and joining it to the domain, and understanding
product activation options.
Lesson Objectives
After completing this lesson, you will be able to:
Note: If you are using only an IPv6 network, then an IPv4 address in this range is not
problematic, and IPv6 address information is still configured automatically.
1. In the Server Manager console, click on the address next to the network adapter that you want to
configure.
2. In the Network Connections window, right-click on the network adapter for which you want to
configure an address, and then click Properties.
3. In the Adapter Properties dialog box, click Internet Protocol Version 4 (TCP/IPv4), and then click
Properties.
4. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, enter the following IPv4
address information, and then click OK twice:
o IP address
o Subnet Mask
o Default Gateway
Netsh interface ipv4 set address “Local Area Connection” static 10.10.10.10 255.255.255.0
You can use the same context of the netsh.exe command to configure DNS configuration.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-27
For example, to configure the adapter named Local Area Connection to use the DNS server at IP address
10.10.10.5 as the primary DNS server, type the following command:
Netsh interface ipv4 set dnsservers “Local Area Connection” static 10.10.10.5 primary
1. Ensure that the server has more than one network adapter.
2. In Server Manager, click the Local Server node.
3. Next to Network Adapter Teaming, click Disabled. This will launch the NIC Teaming dialog box.
4. In the NIC Teaming dialog box, hold down the Ctrl key, and then click each network adapter that
you want to add to the team.
5. Right-click on these selected network adapters, and then click Add to New Team.
6. In the New Team dialog box, provide a name for the team, and then click OK.
You change this name using the Server Manager console by performing the following steps:
1. In Server Manager, click the Local Server node.
2. In the Properties window, click the active text next to Computer Name. This will launch the System
Properties dialog box.
3. In the System Properties dialog box, in the Computer Name tab, click Change.
4. In the Computer Name/Domain Changes dialog box, enter the new name that you want to assign
to the computer.
Prior to joining the domain, be sure to complete the following steps to verify that the new server is ready
to be domain-joined:
• Ensure that you are able to resolve the IP address of the domain controller, and can contact that
domain controller. Use the PING protocol to ping the domain controller by hostname to accomplish
both of these goals.
o Create a computer account in the domain that matches the name of the computer that you want
to join to the domain. This is often done when large numbers of computers need to be joined to
the domain automatically.
o Join the computer to the domain using a security account that has the right to perform
domain-join operations.
• Verify that the security account that is used for the domain operation already exists within the
domain.
Now that you have renamed your Windows Server 2012 server and have verified that it is ready to be
domain-joined, you can join the server to the domain.
To join the domain using Server Manager, perform the following steps:
1. In Server Manager, click the Local Server node.
3. In the System Properties dialog box, on the Computer Name tab, click Change.
4. In the Computer Name/Domain Changes dialog box, in the Member Of area, click the Domain
option. Enter the new domain name, and then click OK.
5. In the Windows Security dialog box, enter domain credentials that allow you to join the computer to
the domain.
2. Open an elevated command prompt and use the djoin.exe command with the /provision option.
You also need to specify the domain to which you want to join the computer, the name of the
computer you will be joining to the domain, and the name of the savefile that you will transfer to the
target of the offline domain join.
For example, to join the computer Canberra to the domain adatum.com using the savefile
Canberra-join.txt, type the following command:
3. Transfer the generated savefile to the new computer, and then run the djoin.exe command with the
/requestODJ option.
For example, to perform the offline domain join, after transferring the savefile Canberra-join.txt to
computer Canberra, you would run the following command from an elevated command prompt on
Canberra:
• Manual activation. Suitable when you are deploying a small number of servers.
• Automatic activation. Suitable when you are deploying larger numbers of servers.
Manual Activation
With manual activation, you enter the product key, and the server contacts Microsoft. Alternatively, an
administrator performs the activation over the phone or through a special clearinghouse website.
You can perform manual activation from the Server Manager console by performing the following steps:
4. If a direct connection cannot be established to the Microsoft activation servers, details will display
about performing activation using a website from a device that has an Internet connection, or by
using a local telephone number.
Because computers running the Server Core installation option do not have the Server Manager
console, you can also perform manual activation using the slmgr.vbs command. Use the slmgr.vbs /ipk
command to enter the product key, and slmgr.vbs /ato to perform activation once the product key is
installed.
You can perform manual activation using either the retail product key, or the multiple activation key. You
can use a retail product key to activate only a single computer. However, a multiple activation key has a
set number of activations that you can use. Using a multiple activation key, you can activate multiple
computers up to a set activation limit.
OEM keys are a special type of activation key that are provided to a manufacturer and allow automatic
activation when a computer is first powered on. This type of activation key is typically used with
computers that are running client operating systems such as Windows 7 and Windows 8. OEM keys are
rarely used with computers that are running server operating systems.
Performing activation manually in large-scale server deployments can be cumbersome. Microsoft provides
a method of activating large numbers of computers automatically without having to enter product keys
on each system manually.
Automatic Activation
In previous versions of the Windows Server operating system, you could use KMS to perform centralized
activation of multiple clients. The Volume Activation Services server role in Windows Server 2012 allows
you to manage a KMS server through a new interface. This simplifies the process of installing a KMS key
on the KMS server. When you install Volume Activation Services, you can also configure Active Directory–
based activation. Active Directory–based activation allows automatic activation of domain-joined
computers. When you use Volume Activation Services, each computer activated must periodically contact
the KMS server to renew its activation status.
You use the Volume Activation Management Tool (VAMT) 3.0 in conjunction with Volume Activation
Services to perform activation of multiple computers on networks that are not connected directly to the
Internet. You can use VAMT to generate license reports and manage client and server activation on
enterprise networks.
• Configure WinRM
• Sign out
• Restart the server
3. Choose the index number of the network adapter to which you want to assign an IP address.
4. In the Network Adapter Settings area, choose between one of the following options:
You can change a server’s name using sconfig.cmd by performing the following steps:
For example, to join the adatum.com domain using the Administrator account, and to be prompted for a
password, type the following command:
Note: Prior to joining the domain, verify that you are able to ping the DNS server by
hostname.
To join a Server Core computer to the domain using sconfig.cmd, perform the following steps:
5. Provide the details in domain\username format, of an account that is authorized to join the domain.
You can also install a Windows role or feature using the Install-WindowsFeature cmdlet. For example, to
install the NLB feature, execute the command:
Install-WindowsFeature NLB
Not all features are available directly for installation on a computer running the Server Core operating
system. You can determine which features are not directly available for installation by running the
following command:
You can add a role or feature that is not directly available for installation by using the -Source parameter
of the Install-WindowsFeature cmdlet. You must specify a source location that hosts a mounted
installation image that includes the full version of Windows Server 2012. You can mount an installation
image using the DISM.exe command-line tool. If you do not specify a source path when installing a
component that is not available and the server has internet connectivity, Install-WindowsFeature will
attempt to retrieve source files from Windows Update.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-33
Note: You can add or remove the graphical component of the Windows Server 2012
operating system by using the Install-WindowsFeature cmdlet.
You can also use the dism.exe command-line tool to add and remove Windows roles and features from a
Server Core deployment, even though this tool is used primarily for managing image files.
MCT USE ONLY. STUDENT USE PROHIBITED
1-34 Deploying and Managing Windows Server 2012
Lesson 5
Introduction to Windows PowerShell
Windows PowerShell is a command-line interface and task-based scripting technology that is built into
the Windows Server 2012 operating system. Windows PowerShell simplifies the automation of common
systems administration tasks. With Windows PowerShell, you can automate tasks, leaving you more time
for more difficult systems administration tasks.
In this lesson, you will learn about Windows PowerShell, and why Windows PowerShell is a critical piece of
a server administrator’s toolkit.
This lesson describes how to use Windows PowerShell’s built-in discoverability features to learn how to
use specific cmdlets and to find related cmdlets. This lesson also discusses how to leverage the Windows
PowerShell Integrated Scripting Environment (ISE) to assist you in creating effective Windows PowerShell
scripts.
Lesson Objectives
After completing this lesson, you will be able to:
• Describe the purpose of Windows PowerShell.
• Describe Windows PowerShell cmdlet syntax, and explain how to determine commands associated
with a particular cmdlet.
• Describe common Windows PowerShell cmdlets used to manage services, processes, roles and
features.
• Describe the functionality of Windows PowerShell ISE.
You can extend Windows PowerShell functionality by adding modules. For example, the Active Directory
module includes Windows PowerShell cmdlets that are specifically useful for performing Active
Directory–related management tasks. The DNS Server module includes Windows PowerShell cmdlets that
are specifically useful for performing DNS server-related management tasks. Windows PowerShell includes
features such as tab completion, which allows administrators to complete commands by pressing the tab
key rather than having to type the complete command. You can learn about the functionality of any
Windows PowerShell cmdlet by using the Get-Help cmdlet.
You can learn the available Windows PowerShell nouns for a specific verb by executing the following
command:
Windows PowerShell parameters start with a dash. Each Windows PowerShell cmdlet has its own
associated set of parameters. You can learn what the parameters are for a particular Windows PowerShell
cmdlet by executing the following command:
Get-Help CmdletName
MCT USE ONLY. STUDENT USE PROHIBITED
1-36 Deploying and Managing Windows Server 2012
You can determine which Windows PowerShell cmdlets are available by executing the Get-Command
cmdlet. The Windows PowerShell cmdlets that are available depend on which modules are loaded. You
can load a module using the Import-Module cmdlet.
Service Cmdlets
You can use the following Windows PowerShell
cmdlets to manage services on a computer that is
running Windows Server 2012:
• Remove-EventLog. Removes a custom event log and unregisters all event sources for the log.
Process Cmdlets
You can use the following Windows PowerShell cmdlets to manage processes on a computer that is
running Windows Server 2012:
ServerManager Module
The ServerManager module allows you to add one of three cmdlets that are useful for managing features
and roles. These cmdlets are:
• Get-WindowsFeature. View a list of available roles and features. Also displays whether the feature is
installed, and whether the feature is available. You can only install an unavailable feature if you have
access to an installation source.
• Install-WindowsFeature. Installs a particular Windows Server role or feature. The
Add-WindowsFeature cmdlet is aliased to this command and is available in previous versions of
Windows operating systems.
Windows PowerShell ISE provides color-coded cmdlets to assist with troubleshooting. The ISE also
provides you with debugging tools that you can use to debug simple and complex Windows PowerShell
scripts.
You can use the Windows PowerShell ISE environment to view available cmdlets by module. You can then
determine which Windows PowerShell module you need to load to access a particular cmdlet.
MCT USE ONLY. STUDENT USE PROHIBITED
1-38 Deploying and Managing Windows Server 2012
Demonstration Steps
Use Windows PowerShell to display the running services and processes on a server
1. On LON-DC1, open a Windows PowerShell session.
3. On the taskbar, right-click on the Windows PowerShell icon, and then click Run as Administrator.
Demonstration Steps
Use Windows PowerShell ISE to import the ServerManager module
1. Ensure that you are signed in to LON-DC1 as Administrator.
2. In Server Manager, click Tools, and then click Windows PowerShell ISE.
You have been working for A. Datum for several years as a desktop support specialist and have recently
accepted a promotion to the server support team.
The marketing department has purchased a new web-based application. You need to install and configure
the servers in the data center for this application. One server has a GUI interface, and the other server is
configured as Server Core.
Objectives
After completing this lab, you will be able to:
• Deploy Windows Server 2012.
Lab Setup
Estimated Time: 60 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:
1. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Hyper-V® Manager, click 20410B-LON-DC1, and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
b. Password: Pa$$w0rd
5. Repeat steps 1 to 3 for 20410B-LON-CORE and 20410B-LON-SVR3. Do not sign in until directed to
do so.
MCT USE ONLY. STUDENT USE PROHIBITED
1-40 Deploying and Managing Windows Server 2012
The first server you are installing for the new marketing application is for a SQL Server 2012 database. This
server will have the full GUI to allow the application vendor to run support tools directly on the server.
The main tasks for this exercise are as follows:
3. Start 20410B-LON-SVR3. In the Windows Setup Wizard, on the Windows Server 2012 page, verify
the following settings, click Next, and then click Install Now.
4. Click to install the Windows Server Windows Server 2012 Datacenter Evaluation (Server with a
GUI) operating system.
5. Accept the license terms, and then click Custom: Install Windows only (advanced).
Note: Depending on the speed of the equipment, the installation will take approximately 20
minutes. The virtual machine will restart several times during this process.
7. Enter the password Pa$$w0rd in both the Password and Reenter password boxes, and then click
Finish to complete the installation.
2. In Server Manager, on the Local Server node, click the randomly-generated name next to Computer
name.
3. In the System Properties dialog box, on the Computer Name tab, click Change.
4. In the Computer name box, type LON-SVR3, and then click OK.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-41
2. On the taskbar, click the time display, and then click Change date and time settings.
3. Click Change Time Zone, and set the time zone to your current time zone.
4. Click Change Date and Time, and verify that the date and time that display in the Date and Time
Settings dialog box match those in your classroom.
3. Right-click on the selected network adapters, and then click Add to New Team.
4. Enter LON-SVR3 in the Team name, box, click OK, and then close the NIC Teaming dialog box.
Refresh the console pane.
4. Click the Domain option, and in the Domain box, enter adatum.com.
o Password: Pa$$w0rd
6. In the Computer Name/Domain Changes dialog box, click OK.
Results: After completing this exercise, you should have deployed Windows Server 2012 on LON-SVR3.
You also should have configured LON-SVR3, including name change, date and time, networking, and
network teaming.
7. At the command prompt, type hostname, and then press Enter to verify the computer’s name.
4. Click Change time zone, and then set the time zone to the same time zone that your classroom uses.
5. In the Date and Time dialog box, click Change Date and Time, and verify that the date and time
match those in your location.
6. Exit sconfig.cmd.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-43
4. Type the number of the network adapter that you want to configure.
7. At the Type the password associated with the domain user prompt, type Pa$$w0rd.
8. At the prompt, click No.
10. Sign in to server LON-CORE with the Adatum\Administrator account using the password
Pa$$w0rd.
Results: After completing this exercise, you should have configured a Windows Server 2012 Server Core
deployment, and verified the server’s name.
MCT USE ONLY. STUDENT USE PROHIBITED
1-44 Deploying and Managing Windows Server 2012
You also need to configure the World Wide Web Publishing service on LON-CORE.
3. Click the Active Directory tab, and then click Find Now.
4. In the Server group name box, type LAB-1.
5. Add LON-CORE and LON-SVR3 to the server group.
6. Add the Windows Authentication role service, and then click Next.
7. Select the Restart the destination server automatically if required check box, and then click
Install.
8. Click Close.
9. Right-click LON-SVR3, click Add Roles and Features, and then click Next.
10. In the Add Roles and Features Wizard, click Role-based or feature-based installation, and then
click Next.
11. Verify that LON-SVR3.Adatum.com is selected, and then click Next twice.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-45
13. Select the Restart the destination server automatically if required check box, click Install, and
then click Close.
14. In Server Manager, click the IIS node, and verify that LON-CORE is listed.
4. In Server Manager, click LAB-1, right-click LON-CORE, and then click Computer Management.
6. Verify that the Startup type of the World Wide Web Publishing service is set to Automatic.
7. Verify that the service is configured to use the Local System account.
9. Configure the Restart Computer option to 2 minutes, and then close the Service Properties dialog
box.
Results: After completing this exercise, you should have created a server group, deployed roles and
features, and configured the properties of a service.
8. Review the IP addresses assigned to the server by typing the following command:
Get-NetIPAddress | Format-table
9. Review the most recent 10 items in the security log by typing the following command:
4. To deploy the XPS Viewer feature on LON-SVR3, type the following command, and then press Enter:
5. Type the following command to verify that the XPS Viewer feature has now been deployed on
LON-SVR3:
6. In the Server Manager console, in the Tools drop-down menu, click Windows PowerShell ISE.
Import-Module ServerManager
Install-WindowsFeature WINS -ComputerName LON-SVR3
Install-WindowsFeature WINS -ComputerName LON-CORE
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 1-47
Results: After completing this exercise, you should have used Windows PowerShell to perform a remote
installation of features on multiple servers.
Question: What are the advantages to performing a Server Core deployment compared to
the full GUI deployment?
Question: What tool can you use to determine which cmdlets are contained in a Windows
PowerShell module?
Module 2
Introduction to Active Directory Domain Services
Contents:
Module Overview 2-1
Module Overview
Active Directory® Domain Services (AD DS) and its related services form the foundation for enterprise
networks that run Windows® operating systems. The AD DS database is the central store of all the domain
objects, such as user accounts, computer accounts, and groups. AD DS provides a searchable hierarchical
directory, and provides a method for applying configuration and security settings for objects in the
enterprise. This module covers the structure of AD DS and its various components, such as forest, domain,
and organizational units (OUs).
The process of installing AD DS on a server is refined and improved with Windows Server® 2012. This
module examines some of the choices that are available with Windows Server 2012 for installing AD DS
on a server.
Objectives
After completing this module, you will be able to:
Lesson 1
Overview of AD DS
The AD DS database stores information on user identity, computers, groups, services and resources. AD DS
domain controllers also host the service that authenticates user and computer accounts when they log on
to the domain. Because AD DS stores information about all of the objects in the domain, and all users and
computers must connect to AD DS domain controllers when signing into the network, AD DS is the
primary means by which you can configure and manage user and computer accounts on your network.
This lesson covers the core logical components that make up an AD DS deployment.
Lesson Objectives
After completing this lesson you will be able to:
• Describe AD DS forests and trees, and explain how you can deploy them in a network.
• Explain how an AD DS schema provides a set of rules that manage the objects and attributes that are
stored in the AD DS domain database.
Overview of AD DS
AD DS is composed of both physical and logical
components. You need to understand the way the
components of AD DS work together so that you
can manage your network efficiently, and control
what resources your users can access. In addition,
you can use many other AD DS options, including
installing and configuring of software and
updates, managing the security infrastructure,
enabling Remote Access and DirectAccess, and
certificate handling.
Physical Components
AD DS information is stored in a single file on each domain controller’s hard disk. The following table lists
some of the physical components and where they are stored.
Data store The file on each domain controller that stores the AD DS information.
Global catalog servers Host the global catalog, which is a partial, read-only copy of all the objects
in the forest. A global catalog speeds up searches for objects that might be
stored on domain controllers in a different domain in the forest.
Read-only domain A special install of AD DS in a read-only form. These are often used in
controllers (RODC) branch offices where security and IT support are often less advanced than
in the main corporate centers.
Logical Components
AD DS logical components are structures that you use to implement an Active Directory design that is
appropriate for an organization. The following table describes some of the types of logical structures that
an Active Directory database might contain.
Partition A section of the AD DS database. Although the database is one file named
NTDS.DIT, it is viewed, managed, and replicated as if it consisted of distinct
sections or instances. These are called partitions, which are also referred to as
naming contexts.
Schema Defines the list of object types and attributes that all objects in AD DS can
have.
Domain tree A collection of domains that share a common root domain and a Domain
Name System (DNS) namespace.
Additional Reading: For more information about domains and forests, see Domains and
Forests Technical Reference at http://go.microsoft.com/fwlink/?LinkId=104447.
MCT USE ONLY. STUDENT USE PROHIBITED
2-4 Introduction to Active Directory Domain Services
The AD DS domain is also a replication boundary. When changes are made to any object in the domain,
that change is replicated automatically to all other domain controllers in the domain.
An AD DS domain is an administrative center. It contains an Administrator account and a Domain
Admins group, which both have full control over every object in the domain. Unless they are in the forest
root domain, however, their range of control is limited to the domain. Password and account rules are
managed at the domain level by default. The AD DS domain provides an authentication center. All user
accounts and computer accounts in the domain are stored in the domain database, and users and
computers must connect to a domain controller to authenticate.
A single domain can contain more than 1 million objects, so most organizations need to deploy only a
single domain. Organizations that have decentralized administrative structures, or that are distributed
across multiple locations, might instead implement multiple domains in the same forest.
You can use OUs to represent the hierarchical, logical structures within your organization. For example,
you can create OUs that represent the departments within your organization, the geographic regions
within your organization, or a combination of both departmental and geographic regions. You can use
OUs to manage the configuration and use of user, group, and computer accounts based on your
organizational model.
Every AD DS domain contains a standard set of containers and OUs that are created when you install
AD DS, including the following:
• Domain container. Serves as the root container to the hierarchy.
• Users container. The default location for new user accounts and groups that you create in the
domain. The users container also holds the administrator and guest accounts for the domain, and
some default groups.
• Computers container. The default location for new computer accounts that you create in the domain.
• Domain Controllers OU. The default location for the computer accounts for domain controller
computer accounts. This is the only OU that is present in a new installation of AD DS.
Note: None of the default containers in the AD DS domain can have GPOs linked to them,
except for the default Domain Controllers OU and the domain itself. All the other containers are
just folders. To link GPOs to apply configurations and restrictions, create a hierarchy of OUs, and
then link GPOs to them.
Hierarchy Design
The design of an OU hierarchy is dictated by the administrative needs of the organization. The design
could be based on geographic, functional, resource, or user classifications. Whatever the order, the
hierarchy should make it possible to administer AD DS resources as effectively and with as much flexibility
as possible. For example, if all computers that IT administrators use must be configured in a certain way,
you can group all the computers in an OU, and then assign a GPO to manage its computers. To simplify
administration, you also can create OUs within other OUs.
For example, your organization might have multiple offices, and each office might have a set of
administrators who are responsible for managing user and computer accounts in their office. In addition,
each office might have different departments with different computer configuration requirements. In this
situation, you could create an OU for the office that is used to delegate administration, and then create a
department OU within the office OU to assign desktop configurations.
Although there is no technical limit to the number of levels in your OU structure, for the purpose of
manageability, limit your OU structure to a depth of no more than 10 levels. Most organizations use five
levels or fewer to simplify administration. Note that Active Directory–enabled applications can have
restrictions on the OU depth within the hierarchy. These applications can also have restrictions on the
number of characters that can be used in the distinguished name, which is the full Lightweight Directory
Access Protocol (LDAP) path to the object in the directory.
MCT USE ONLY. STUDENT USE PROHIBITED
2-6 Introduction to Active Directory Domain Services
What Is an AD DS Forest?
A forest is a collection of one or more domain
trees. A tree is a collection of one or more
domains. The first domain that is created in the
forest is called the forest root domain. The forest
root domain contains a few objects that do not
exist in other domains in the forest. For example,
the forest root domain contains two special
domain controller roles, the schema master and
the domain naming master. In addition, the
Enterprise Admins group and the Schema Admins
group exist only in the forest root domain. The
Enterprise Admins group has full control over
every domain within the forest.
The AD DS forest is a security boundary. This means that, by default, no users from outside the forest can
access any resources inside the forest. It also means that administrators from outside the forest have no
administrative access within the forest. One of the primary reasons why organizations deploy multiple
forests is because they need to isolate administrative permissions between different parts of the
organization.
The AD DS forest is also the replication boundary for the configuration and schema partitions in the
AD DS database. This means that all domain controllers in the forest must share the same schema. A
second reason why organizations deploy multiple forests is because they must deploy incompatible
schemas in two parts of the organization.
The AD DS forest is also the replication boundary for the global catalog. This makes most forms of
collaboration between users in different domains easier. For example, all Microsoft® Exchange Server 2010
recipients are listed in the global catalog, making it easy to send mail to any of the users in the forest,
even those users in different domains.
By default, all the domains in a forest automatically trust the other domains in the forest. This makes it
easy to enable access to resources such as file shares and websites for all users in a forest, regardless of
the domain in which the user account is located.
AD DS uses objects as units of storage. All object types are defined in the schema. Each time that the
directory handles data, the directory queries the schema for an appropriate object definition. Based on
the object definition in the schema, the directory creates the object and stores the data.
Object definitions control both the types of data that the objects can store, and the syntax of the data.
Using this information, the schema ensures that all objects conform to their standard definitions. As a
result, AD DS can store, retrieve, and validate the data that it manages, regardless of the application that
is the original source of the data. Only data that has an existing object definition in the schema can be
stored in the directory. If a new type of data needs to be stored, a new object definition for the data must
first be created in the schema.
• Rules that define what types of objects you can create, what attributes must be defined (mandatory)
when you create the object, and what attributes are optional
• Structure and content of the directory itself
You can use an account that is a member of the Schema Administrators to modify the schema
components in a graphical form. Examples of objects that are defined in the schema include user,
computer, group, and site. Among the many attributes are location, accountExpires, buildingName,
company, manager, and displayName.
The schema master is one of the single master operations domain controllers in AD DS. Because it is a
single master, you must make changes to the schema by targeting the domain controller that holds the
schema master operations role.
The schema is replicated among all domain controllers in the forest. Any change that is made to the
schema is replicated to every domain controller in the forest from the schema operations master role
holder, typically the first domain controller in the forest.
Because the schema dictates how information is stored, and because any changes that are made to the
schema affect every domain controller, changes to the schema should be made only when necessary.
Before making any changes, you should review the changes through a tightly-controlled process, and
then implement them only after you have performed testing to ensure that the changes will not adversely
affect the rest of the forest and any applications that use AD DS.
Although you might not make any change to the schema directly, some applications make changes to the
schema to support additional features. For example, when you install Exchange Server 2010 into your
AD DS forest, the installation program extends the schema to support new object types and attributes.
MCT USE ONLY. STUDENT USE PROHIBITED
2-8 Introduction to Active Directory Domain Services
Lesson 2
Overview of Domain Controllers
Because domain controllers authenticate all users and computers in the domain, domain controller
deployment is critical to the correct functioning of the network.
This lesson examines domain controllers, the logon process, and the importance of the DNS in that
process. In addition, this lesson discusses the purpose of the global catalog.
All domain controllers are essentially the same, with two exceptions. RODCs contain a read-only copy
of the AD DS database, while other domain controllers have a read-write copy. There are also certain
operations that can only be performed on specific domain controllers called operations masters, which are
discussed at the end of this lesson.
Lesson Objectives
After completing this lesson, you will be able to:
• Describe the purpose of domain controllers.
• Describe the AD DS logon process, and the importance of DNS and SRV records in the logon process.
• Describe the functionality of SRV records.
An AD DS domain should always have a minimum of two domain controllers. This way, if one of the
domain controllers fails, there is a backup to ensure continuity of the AD DS domain services. When you
decide to add more than two domain controllers, consider the size of your organization and the
performance requirements.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 2-9
When you deploy a domain controller in a branch office where physical security is less than optimal, there
are some additional measures that you can use to reduce the impact of a breach of security. One option is
to deploy an RODC.
The RODC contains a read only copy of the AD DS database, and by default, it does not cache any user
passwords. You can configure the RODC to cache the passwords for users in the branch office. If an RODC
is compromised, the potential loss of information is much lower than with a full read-write domain
controller. Another option is to use Windows BitLocker® Drive Encryption to encrypt the domain
controller hard drive. If the hard drive is stolen, BitLocker encryption ensures that there is a very low
chance of a malicious user getting any useful information from it.
Note: BitLocker is a drive encryption system that is available for Windows Server®
operating systems, and for certain Windows client operating system versions. BitLocker securely
encrypts the entire operating system so that the computer cannot start without being supplied a
private key and (optionally) passing an integrity check. A disk remains encrypted even if you
transfer it to another computer.
The global catalog does not contain all attributes for each object. Instead, the global catalog maintains
the subset of attributes that are most likely to be useful in cross-domain searches. These attributes might
include firstname, displayname, and location. There are a variety of reasons why you might perform a
search against a global catalog rather than a domain controller that is not a global catalog. For example,
when an Exchange server receives an incoming email, it needs to search for the recipient’s account so that
it can decide how to route the message. By automatically querying a global catalog, the Exchange server
is able to locate the recipient in a multiple domain environment. When a user logs on to their Active
Directory account, the domain controller that is performing the authentication must contact a global
catalog to check for universal group memberships before the user is authenticated.
MCT USE ONLY. STUDENT USE PROHIBITED
2-10 Introduction to Active Directory Domain Services
In a single domain, all domain controllers should be configured as holders of the global catalog; however,
in a multiple domain environment, the infrastructure master should not be a global catalog server. Which
domain controllers are configured to hold a copy of the global catalog depends on replication traffic and
network bandwidth. Many organizations are opting to make every domain controller a global catalog
server.
• The first four blocks of letters and numbers (S-1-5-21) represents the type of ID
• The next three blocks of numbers (4130086281-3752200129-271587809) are the number of the
database where the account is stored (usually the AD DS domain)
• The last section (500) is the relative ID (RID), which is the part of the SID that uniquely identifies that
account in the database
Every user and computer account and every group that you create has a unique SID. They only
differ from each other by virtue of the unique RID. You can tell that this particular SID is the SID
for the administrator account because it ends with RID 500.
Sites
Sites are used by a client system when it needs to contact a domain controller. It starts by looking up SRV
records in DNS. The client system then attempts to connect to a domain controller in the same site before
trying elsewhere.
Administrators can define sites in AD DS. Sites usually align with the parts of the network that have good
connectivity and bandwidth. For example, if a branch office is connected to the main data center by an
unreliable wide area network (WAN) link, it would be better to define the data center and the branch
office as separate sites in AD DS.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 2-11
SRV records are registered in DNS by the Net Logon service that is running on each domain controller.
If the SRV records are not entered in DNS correctly, you can trigger the domain controller to reregister
those records by restarting the Net Logon service on that domain controller. This process only reregisters
the SRV records; if you want to reregister the host (A) record information in DNS, you must run ipconfig
/registerdns from a command prompt, just as you would for any other computer.
Although the logon process appears to the user as a single event, it is actually made up of two parts:
• The user provides credentials, usually a user account name and password, which are then checked
against the AD DS database. If the user account name and the password match the information that
is stored in the AD DS database, the user becomes an authenticated user and is issued a TGT by the
domain controller. At this point, the user does not have access to any resources on the network.
• A secondary process in the background submits the TGT to the domain controller and requests access
to the local machine. The domain controller issues a service ticket to the user, who is then able to
interact with the local computer. At this point in the process, the user is authenticated to AD DS and
logged on to the local machine.
When a user subsequently attempts to connect to another computer on the network, the secondary
process is run again, and the TGT is submitted to the nearest domain controller. When the domain
controller returns a service ticket, the user can access the computer on the network, which generates a
logon event at that computer.
Demonstration Steps
View the SRV records by using DNS Manager
1. Open the DNS Manager window, and explore the underscore DNS domains.
2. View the SRV records that are registered by domain controllers. These records provide alternate paths
so that clients can discover them.
MCT USE ONLY. STUDENT USE PROHIBITED
2-12 Introduction to Active Directory Domain Services
• Operations masters
• Single master roles
• Each AD DS domain has one RID master, one infrastructure master, and one primary domain
controller (PDC) emulator
• Schema master. This is the domain controller where all schema changes are made. To make changes
you would typically log on to the schema master as a member of both the Schema Admins and
Enterprise Admins groups. A user who is a member of both of these groups and who has the
appropriate permissions could also edit the schema by using a script.
• RID master. Whenever an object is created in AD DS, the domain controller where the object is
created assigns the object a unique identifying number known as a SID. To ensure that no two
domain controllers assign the same SID to two different objects, the RID master allocates blocks of
RIDs to each domain controller within the domain.
• Infrastructure master. This role is responsible for maintaining inter-domain object references, such
as when a group in one domain contains a member from another domain. In this situation, the
infrastructure master is responsible for maintaining the integrity of this reference. For example, when
you look at the security tab of an object, the system looks up the SIDs that are listed and translates
them into names. In a multi-domain forest, the infrastructure master looks up SIDs from other
domains.
The Infrastructure role should not reside on a global catalog server. The exception is when you follow
best practices and make every domain controller a global catalog. In that case, the Infrastructure role
is disabled because every domain controller knows about every object in the forest.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 2-13
• PDC emulator master. The domain controller that holds the PDC emulator role is the time source
for the domain. The domain controllers that hold the PDC emulator role in each domain in a forest
synchronize their time with the domain controller that has the PDC emulator role in the forest root
domain. You set the PDC emulator in the forest root domain to synchronize with an external atomic
time source.
The PDC emulator is also the domain controller that receives urgent password changes. If a user’s
password is changed, the information is sent immediately to the domain controller holding the PDC
emulator role. This means that if the user subsequently tried to log on and they were authenticated
by a domain controller in a different location that had not yet received an update about the
new password, the domain controller in the location to which the user tried to log on would
contact the domain controller holding the PDC emulator role and check for recent changes.
The PDC emulator is also used when editing GPOs. When a GPO other than a local GPO is opened for
editing, the copy that is edited is the one stored on the PDC emulator.
Note: The global catalog is not one of the operations master roles.
Question: Why would you make a domain controller a global catalog server?
MCT USE ONLY. STUDENT USE PROHIBITED
2-14 Introduction to Active Directory Domain Services
Lesson 3
Installing a Domain Controller
Sometimes you need to install additional domain controllers on your Windows Server 2012 operating
system. It might be that the existing domain controllers are overworked and you need additional
resources. Perhaps you are planning for a new remote office that requires you to deploy one or more
domain controllers. You also might be setting up a test lab or a backup site. The installation method that
you use varies with the circumstances.
This lesson examines several ways to install additional domain controllers. It also demonstrates the process
of using Server Manager to install AD DS on a local machine and on a remote server. This lesson also
discusses installing AD DS on a Server Core installation, and installing AD DS on a computer using a
snapshot of the AD DS database that is stored on removable media. Finally, it examines the process of
upgrading a domain controller from an earlier Windows operating system to Windows Server 2012.
Lesson Objectives
After completing this lesson, you will be able to:
• Explain how to install a domain controller by using the GUI.
• Explain how to install a domain controller on a Server Core installation of Windows Server 2012.
When you run Server Manager, you can choose whether the operation is performed on the local
computer, on a remote computer, or by members of a server pool. Then you add the AD DS role. At the
end of the initial installation process, the AD DS binaries are installed, but AD DS is not yet set up on that
server. A message to that effect displays in Server Manager.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 2-15
You can select the link to Promote this server to a domain controller, and then the Active Directory
Domain Services Configuration Wizard runs. You can then provide the information listed in the following
table about the proposed structure.
Add a new domain to an existing forest Create a new domain in the forest.
Specify the domain information for this Supply information about the existing domain to
operation which the new domain controller will connect.
Supply the credentials to perform this Enter the name of a user account that has the rights
operation to perform this operation.
Some additional information that you need to have prior to running the domain controller promotion is
listed in the following table.
Whether the new forest needs to support For example, if you are considering deploying Windows
domain controllers running previous Server 2008 R2 domain controllers, you should select the
versions of Windows operating systems Windows Server 2008 R2 domain and forest functional
(affects choice of functional level) level.
Whether this domain controller will also Your DNS must be functioning well to support AD DS.
be a DNS server
Location to store the database files, for By default, these files will be stored in C:\Windows\NTDS.
example, NTDS.DIT, edb.log, or edb.chk
The Active Directory Domain Services Configuration Wizard continues through several different pages
where you can enter prerequisites such as the NetBIOS domain name, DNS configuration, whether this
domain controller should be a global catalog server, and the Directory Services Restore Mode password.
Finally, you must restart to complete the installation.
Note: If you need to restore the AD DS database from a backup, restart the domain
controller in Directory Services Restore Mode. When the domain controller starts up, it is not
running the AD DS services; instead, it is running as a member server in the domain. To log on
to that server in the absence of AD DS, sign in using the Directory Services Recovery Mode
password.
MCT USE ONLY. STUDENT USE PROHIBITED
2-16 Introduction to Active Directory Domain Services
• In Server Manager, click the notification icon to complete the post-deployment configuration. This
starts the configuration and setup of the domain controller.
• Run the Windows PowerShell command Install-ADDSDomainController –domainname
“Adatum.com”, with other arguments as required.
Run dcpromo /unattend at a command prompt with the appropriate switches, for example:
To perform an in-place upgrade of a computer that has the AD DS role installed, you must first use the
command-line commands Adprep.exe /forestprep and Adprep.exe /domainprep to prepare the forest
and domain. An in-place operating system upgrade does not perform automatic schema and domain
preparation. Adprep.exe is included on the installation media in the \Support\Adprep folder. There are
no additional configuration steps after that point, and you can continue to run the Windows Server 2012
operating system upgrade.
When you promote a Windows Server 2012 server to be a domain controller in an existing domain, and if
you are logged in as a member of the Schema Admins and Enterprise Admins groups, the AD DS schema
will be updated automatically to Windows Server 2012. In this scenario, you do not need to run the
Adprep.exe commands before starting the installation.
Note: With this type of upgrade, there is no need to preserve users’ settings and reinstall
applications; everything is upgraded in place. Remember to check for hardware and software
compatibility before performing an upgrade.
To introduce a clean install of Windows Server 2012 as a domain controller, perform the following steps:
1. Deploy and configure a new installation of Windows Server 2012 and join it to the domain.
2. Promote the new server to be a domain controller in the domain by using Server Manager 2012 or
one of the other methods described previously.
Note: You can upgrade directly from Windows Server 2008 and Windows Server 2008 R2
to Windows Server 2012.
MCT USE ONLY. STUDENT USE PROHIBITED
2-18 Introduction to Active Directory Domain Services
To install a domain controller by using IFM, browse to a domain controller that is not an RODC. Use
the Ntdsutil tool to create a snapshot of the AD DS database, and then copy the snapshot to the server
that will be promoted to a domain controller. Use Server Manager to promote the server to a domain
controller by selecting the Install from Media option, and then providing the local path to the IFM
directory that you created previously.
1. On the full domain controller, at an administrative command prompt, type the following commands
(where C:\IFM is the destination directory that will contain the snapshot of the AD DS database) and
press Enter after each line:
Ntdsutil
activate instance ntds
ifm
create SYSVOL full C:\IFM
2. On the server that you are promoting to a domain controller, perform the following steps:
c. In Server Manager, click the notification icon to complete the post-deployment configuration.
The Active Directory Domain Services Configuration Wizard runs.
d. At the appropriate time during the wizard, select the option to install from IFM, and then provide
the local path to the snapshot directory.
AD DS then installs from the snapshot. When the domain controller restarts, it contacts other domain
controllers in the domain and updates AD DS with any changes that were made since the snapshot was
created.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 2-19
Question: What is the reason to specify the Directory Services Restore Mode password?
MCT USE ONLY. STUDENT USE PROHIBITED
2-20 Introduction to Active Directory Domain Services
You have been asked by your manager to install a new domain controller in the data center to improve
logon performance. You have been asked also to create a new domain controller for a branch office by
using IFM.
Objectives
After performing this lab, you will be able to:
Lab Setup
Estimated Time: 45 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must
complete the following steps:
1. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Hyper-V® Manager, click 20410B-LON-DC1, and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
o Password: Pa$$w0rd
o Domain: Adatum
1. Add an Active Directory® Domain Services (AD DS) role to a member server.
2. Configure a server as a domain controller.
3. Configure a server as a Global Catalog server.
Task 1: Add an Active Directory Domain Services (AD DS) role to a member server
1. On LON-DC1, in Server Manager, add LON-SVR1 to the server list.
2. Add the Active Directory Domain Services server role to LON-SVR1. Add all required features as
prompted.
3. Installation will take several minutes. When the installation completes, click Close to close the Add
Roles and Features Wizard.
o For Domain Controller Options, install the Domain Name System, but remove the selection to
install the global catalog.
o The DSRM password is Pa$$w0rd.
Results: After completing this exercise, you should have explored Server Manager and promoted a
member server to be a domain controller.
MCT USE ONLY. STUDENT USE PROHIBITED
2-22 Introduction to Active Directory Domain Services
It has been determined that the branch office requires a domain controller to support local logons. To
avoid problems with the slow network connection, you are using IFM to install the domain controller in
the branch office.
The main tasks for this exercise are as follows:
Ntdsutil
Activate instance ntds
Ifm
Create sysvol full c:\ifm
2. On LON-SVR2, use Server Manager with the following options to perform the post-deployment
configuration of AD DS:
o Use the IFM media to configure and install AD DS. Use the location C:\IFM for the IFM media.
Results: After completing this exercise, you should have installed an additional domain controller for the
branch office by using IFM.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 2-23
Question: Why would you need to deploy an additional tree in the AD DS forest?
Question: Which deployment method would you use if you had to install an additional
domain controller in a remote location that had a limited WAN connection?
Question: If you needed to promote a Server Core installation of Windows Server 2012 to be
a domain controller, which tool or tools could you use?
MCT USE ONLY. STUDENT USE PROHIBITED
3-1
Module 3
Managing Active Directory Domain Services Objects
Contents:
Module Overview 3-1
Module Overview
User accounts are fundamental components of network security. Stored in Active Directory® Domain
Services (AD DS), user accounts identify users for the purposes of authentication and authorization.
Because of their importance, an understanding of user accounts and the tasks related to supporting
them is a critical aspect of administering a Windows® Server operating system enterprise network.
Although users and computers, and even services, change over time, business roles and rules tend to
remain more stable. Your business probably has a finance role, which requires certain capabilities in the
enterprise. The user or users who perform that role might change over time, but the role will remain
relatively the same. For that reason, it is not sensible to manage an enterprise network by assigning
rights and permissions to individual users, computers, or service identities. Instead, you should associate
management tasks with groups. Consequently, it is important that you know how to use groups to
identify administrative and user roles, to filter Group Policy, to assign unique password policies, and to
assign rights and permissions.
• They have an account with a logon name and password that Windows Server changes automatically
on a periodic basis.
• They can belong to groups, have access to resources, and you can configure them by using Group
Policy.
Managing computers—both the objects in AD DS and the physical devices—is one of the day-to-day
tasks of most IT pros. New computers are added to your organization, taken offline for repairs, exchanged
between users or roles, and retired or upgraded. Each of these activities requires managing the
computer’s identity, which is represented by its object, or account, and AD DS. As a result, it is important
that you know how to create and manage computer objects.
MCT USE ONLY. STUDENT USE PROHIBITED
3-2 Managing Active Directory Domain Services Objects
In small organizations, one person might be responsible for performing all of these day-to-day
administrative tasks. However, in large enterprise networks, with thousands of users and computers,
that is not feasible. It is important for an enterprise administrator to know how to delegate specific
administrative tasks to designated users or groups to ensure that enterprise administration is efficient
and effective.
Objectives
After completing this module, you will be able to:
Lesson 1
Managing User Accounts
A user object in AD DS is far more than just properties related to the user’s security identity, or account. It
is the cornerstone of identity and access in AD DS. Therefore, consistent, efficient, and secure processes
regarding the administration of user accounts are the cornerstone of enterprise security management.
Lesson Objectives
After completing this lesson, you will be able to:
AD DS Administration Tools
Before you can begin creating and managing user,
group, and computer accounts, it is important
that you understand which tools you can use to
perform these various management tasks.
• Active Directory Sites and Services. This snap-in manages replication, network topology, and related
services.
• Active Directory Domains and Trusts. This snap-in configures and maintains trust relationships and
the forest functional level.
• Active Directory Schema snap-in. This snap-in examines and modifies the definition of Active
Directory attributes and object classes. It is the blueprint for AD DS. It is rarely viewed, and even more
rarely changed. Therefore, the Active Directory Schema snap-in is not installed, by default.
Note: To administer AD DS from a computer that is not a domain controller, you must
install Remote Server Administration Tools (RSAT). RSAT is a feature that can be installed from the
Features node of Server Manager on Windows Server® 2012.
MCT USE ONLY. STUDENT USE PROHIBITED
3-4 Managing Active Directory Domain Services Objects
You also can install RSAT on Windows clients, including Windows Vista® Service Pack 1 (or
newer), Windows 7, and Windows 8. After you download the RSAT installation files from the
Microsoft website, run the Setup Wizard, which steps you through the installation. After installing
RSAT, you must turn on the tool or tools that you want to use. To do this, in Control Panel, in the
Programs And Features application, use the Turn Windows Features On or Off command.
Additional Reading: To download the RSAT installation files, see the Microsoft Download
Center at http://go.microsoft.com/fwlink/?LinkID=266735.
• Connect to, and manage multiple domains within a single instance of the Active Directory
Administrative Center.
Windows PowerShell
You can use the Active Directory module for Windows PowerShell (Active Directory module) to create and
manage objects in AD DS. Windows PowerShell is not only a scripting language; it also enables you to run
commands that perform administrative tasks, such as creating new user accounts, configuring services,
deleting mailboxes, and similar functions.
Windows PowerShell is installed by default on Windows Server 2012, but the Active Directory module is
only present when:
• You install the AD DS or Active Directory Lightweight Directory Services (AD LDS) server roles.
• Dsquery. Use to query AD DS for objects that match criteria that you supply.
• Dsrm. Use to delete objects.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 3-5
Note: It is possible to pipe the results of the Dsquery command to other Directory Service
commands. For example, typing the following at a command prompt returns the office telephone
number of all users that have a name starting with John:
dsquery user –name John* | dsget user –office
• Allow or deny users permission to log on to a computer based on their user account identity.
• Grant users access to processes and services for a specific security context.
• Manage users’ access to resources such as AD DS objects and their properties, shared folders, files,
directories, and printer queues.
A user account enables a user to log on to computers and domains with an identity that the domain can
authenticate. When creating a user account, you must provide a user logon name, which must be unique
in the domain/forest in which the user account is created.
To maximize security, you should avoid multiple users sharing a single account, and instead ensure that
each user who logs on to the network has a unique user account and password.
Note: Although AD DS accounts are the focus of this course, you also can store user
accounts in the local security accounts manager (SAM) database of each computer, enabling local
logon and access to local resources. Local user accounts are, for the most part, beyond the scope
of this course.
You can use the Active Directory Users and Computers snap-in, Active Directory Administrative Center,
Windows PowerShell, or the dsadd.exe command-line tool to create a user object.
MCT USE ONLY. STUDENT USE PROHIBITED
3-6 Managing Active Directory Domain Services Objects
• The Full name user account property is used to create several attributes of a user object, most
notably, the common name (CN) and display name properties. The CN of a user is the name
displayed in the details pane of the snap-in, and it must be unique within the container or OU. If
you are creating a user object for a person with the same name as an existing user in the same OU
or container, you need to enter a unique name in the Full name field.
• The User UPN logon property consists of a user logon name prefix and a user principal name (UPN)
suffix that will be appended to the user logon name following the @ symbol.
o User names in AD DS can contain special characters, including periods, hyphens, and
apostrophes. These special characters let you generate accurate user names, such as O’Hare and
Smith-Bates. However, certain applications might have other restrictions, so we recommend that
you use only standard letters and numerals until you fully test the applications in your enterprise
environment for compatibility with special characters.
o You can manage the list of available UPN suffixes by using the Active Directory Domains and
Trusts snap-in. Right-click the root of the snap-in, click Properties, and then use the UPN
Suffixes tab to add or remove suffixes. The DNS name of your AD DS domain is always available
as a suffix, and you cannot remove it.
Note: It is important that you implement a user account naming strategy, especially in
large networks where users might share the same full name. A combination of last name and first
name, and where necessary, additional characters, should yield a unique user account name.
Specifically, it is only the UPN name that must be unique within your AD DS forest. The Full name
needs to be unique only within the organizational unit where it resides, while the User
SamAccountName name must be unique within that domain.
When you create a new user object, you are not required to define many attributes beyond those
required to allow the user to log on by using the account. Since you can associate a user object with many
attributes, it is important that you understand what these attributes are, and how you can use them in
your organization.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 3-7
Attribute Categories
The attributes of a user object fall into several broad categories. These categories display in the navigation
pane of the User Properties dialog box in the Active Directory Administrative Center, and include the
following:
• Account. In addition to the user’s name properties (First name, Middle initial, Last name, Full
name) and the user’s various logon names (User UPN logon, User SamAccountName logon), you
can configure the following additional properties:
o Log on hours. This property defines when the account can be used to access domain computers.
You can use the weekly calendar style view to define Logon permitted hours and Logon denied
hours.
o Log on to. Use this property to define which computers a user can use to log on to the domain.
Specify the computer’s name and add it to a list of allowed computers.
o Account expires. This value is useful when you want to create temporary-use user accounts. For
example, you might want to create user accounts for interns that are used for just one year. You
can use this value to set an account expiration date in advance. The account cannot be used after
the expiration date until manually reconfigured by an administrator.
o User must change password at next log on. This property enables you to force a user to reset
their own password the next time they log on. This is typically something you might enable after
you have reset a user’s password.
o Smart card is required for interactive log on. This value resets the user’s password to a
complex, random sequence of characters, and sets a property that requires that the user use a
smart card to authenticate during logon.
o Password never expires. This is a property that you normally use with service accounts; that is,
those accounts that are not used by regular users but by services. By setting this value, you must
remember to update the password manually on a periodic basis; however, you are not forced to
do so at a predetermined interval. Consequently, the account can never be locked out due to
password expiration—a feature that is particularly important for service accounts.
o User cannot change password. Again, this option is generally used for service accounts.
o Store password using reversible encryption. This policy provides support for applications that
use protocols that require knowledge of the user's password for authentication purposes. Storing
passwords using reversible encryption is essentially the same as storing plaintext versions of the
passwords. For this reason, this policy should never be enabled unless application requirements
outweigh the need to protect password information. This policy is required when using Challenge
Handshake Authentication Protocol (CHAP) authentication through remote access or Internet
Authentication Service (IAS). It is also required when using Digest Authentication in Internet
Information Services (IIS).
o Account is trusted for delegation. You can use this property to allow a service account to
impersonate a standard user to access network resources on behalf of a user.
• Organization. This includes properties such as the user’s Display name, Office, Email address,
various contact telephone numbers, managerial structure, department and company names,
addresses and so forth.
• Member of. This section enables you to define the group memberships for the user.
MCT USE ONLY. STUDENT USE PROHIBITED
3-8 Managing Active Directory Domain Services Objects
• Profile. This section enables you to configure a location for the user’s personal data, and to define a
location in which to save the user’s desktop profile when he or she logs out.
• Extensions. This section exposes many additional user properties, most of which do not normally
require manual configuration.
• Profile path. This path is either a local, or more usually, a Universal Naming Convention (UNC) path.
The user’s desktop settings are stored in the profile. Once you define a user profile by using a UNC
path, then whichever domain computer services a user’s logon, their desktop settings will be
available. This is known as a roaming profile.
Note: As a best practice, use a subfolder of the user’s home folder for the user’s profile
path.
• Logon script. This script is the name of a batch file that contains commands that execute when the
user logs on. Typically, you use these commands to create drive mappings. Rather than use a logon
script batch file, administrators typically implement logon scripts by using Group Policy Objects
(GPOs) or Group Policy preferences. If you use a login script, this value should be in the form of a
filename (with extension) only. Scripts should be stored in the C:\Windows\SYSVOL\domain\scripts
folder on all domain controllers.
• Home folder. This value enables you to create a personal storage area in which users can save their
personal documents. You can specify either a local path, or more usually, a UNC path to the user’s
folder. You also must specify a drive letter that is used to map a network drive to the specified UNC
path. You can then configure a user’s personal documents to this redirected home folder.
You can use these sub-nodes to configure all aspects of a user’s desktop profile and application settings.
For a given sub-node, such as Documents, you can choose between Basic and Advanced redirection. In
Basic redirection, all users affected by the GPO have their Documents folder redirected to an individual
named subfolder off a common root folder defined by a UNC name, for example, \\LON-SVR1\Users\.
Advanced redirection enables you to use security group membership to determine where a user’s settings
and documents will be stored.
Demonstration Steps
Open the Active Directory Administrative Center
• On LON-DC1, open the Active Directory Administrative Center.
Lesson 2
Managing Group Accounts
While it might be practical to assign permissions and abilities to individual user accounts in small
networks, it becomes impractical and inefficient in large enterprise networks. For example, if many users
need the same level of access to a folder, it is more efficient to create a group that contains the required
user accounts, and then assign the group the required permissions. This has the added benefit of enabling
you to change a user’s file permissions by adding or removing them from groups rather than editing the
file permissions directly.
Before implementing groups in your organization, you must understand about the scope of various
Windows Server group types, and how best to use these to manage access to resources or to assign
management rights and abilities.
Lesson Objectives
After completing this lesson, you will be able to:
• Describe group types.
Group Types
In a Windows Server 2012 enterprise network,
there are two types of groups: security, and
distribution. When you create a group, you
choose the group type and scope.
Because you can use security groups for both resource access and email distribution, many organizations
use only security groups. However, we recommend that if a group is used only for email distribution, you
should create the group as a distribution group. Otherwise, the group is assigned a SID, and the SID is
added to the user’s security access token, which can lead to an unnecessary size increase of the security
token.
Note: Consider that when you add a user to a security group, the user’s access token—
which authenticates user processes—updates only when the user signs in. Therefore, if the user is
currently logged on, they must log off and log back on to update their access token with any
changed group memberships.
Note: The benefit of using distribution groups becomes more evident in large-scale
Exchange Server deployments, especially where there is a need to nest these distribution groups
across the enterprise.
Group Scopes
Windows Server 2012 supports group scoping.
The scope of a group determines both the range
of a group’s abilities or permissions, and the
group membership.
There are four group scopes:
o You can assign abilities and permissions only on domain local resources, meaning on all
computers in the local domain.
MCT USE ONLY. STUDENT USE PROHIBITED
3-12 Managing Active Directory Domain Services Objects
o Members can be only from the local domain, and can include:
Users, computers, and global groups from then local domain.
• Universal. This group type is most useful in multidomain networks because it combines the
characteristics of both domain local groups and global groups. Specifically, the important
characteristics of universal groups are:
o You can assign abilities and permissions anywhere in the forest, as with global groups.
o Members can be from anywhere in the AD DS forest, and can include:
Users, computers, and global groups from any domain in the forest.
Universal groups defined in any domain in the forest.
o Properties of universal groups are propagated to the global catalog, and made available
across the enterprise network on all domain controllers that host the global catalog role. This
makes universal groups’ membership lists more accessible, which can be useful in multidomain
scenarios. For example, if a universal group is used for email distribution purposes, the process
for determining the membership list typically is quicker in distributed multidomain networks.
• Identities
• Global groups
• Access
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 3-13
Identities (user and computer accounts) are members of global groups, which represent business roles.
Those role groups (global groups) are members of domain local groups, which represent management
rules—for example, determining who has Read permission to a specific collection of folders. These rule
groups (domain local groups) are granted access to resources. In the case of a shared folder, access is
granted by adding the domain local group to the folder’s ACL, with a permission that provides the
appropriate level of access.
In a multidomain forest, there are universal groups also, which fit in between global and domain local
groups. Global groups from multiple domains are members of a single universal group. That universal
group is a member of domain local groups in multiple domains. You can remember the nesting as
IGUDLA.
IGDLA Example
This figure on the slide represents a group implementation that reflects the technical view of group
management best practices (IGDLA), and the business view of role-based, rule-based management.
The sales force at Contoso, Ltd has just completed its fiscal year. Sales files from the previous year are in a
folder called Sales. The sales force needs Read access to the Sales folder. Additionally, a team of auditors
from Woodgrove Bank, a potential investor, require Read access to the Sales folder to perform the audit.
You would perform the following steps to implement the security required by this scenario:
1. Assign users with common job responsibilities or other business characteristics to role groups
implemented as global security groups. Do this separately in each domain. Salespeople at Contoso
are added to a Sales role group; Auditors at Woodgrove Bank are added to an Auditors role group.
2. Create a group to manage access to the Sales folders with Read permission. You implement this in the
domain containing the resource that is being managed. In this case, the Sales folder resides in the
Contoso domain. Therefore, you create the resource access management rule group as a domain
local group named ACL_Sales Folders_Read.
3. Add the role groups to the resource access management rule group to represent the management
rule. These groups can come from any domain in the forest or from a trusted domain, such as
Woodgrove Bank. Global groups from trusted external domains, or from any domain in the same
forest, can be members of a domain local group.
4. Assign the permission that implements the required level of access. In this case, grant the Allow Read
permission to the domain local group.
This strategy results in two single points of management, reducing the management burden. One point of
management defines who is in Sales, the other point of management defines who is an Auditor. Because
these roles are likely to have access to a variety of resources beyond the Sales folder, you have another
single point of management to determine who has Read access to the Sales folder. Furthermore, the Sales
folder might not be a single folder on a single server; it could be a collection of folders across multiple
servers, each of which assigns the Allow Read permission to the single domain local group.
MCT USE ONLY. STUDENT USE PROHIBITED
3-14 Managing Active Directory Domain Services Objects
Default Groups
The Windows Server 2012 server creates a number
of groups automatically. These are called default
local groups, and they include well-known groups
such as Administrators, Backup Operators, and
Remote Desktop Users. There are additional
groups that are created in a domain, both in the
Builtin and Users containers, including Domain
Admins, Enterprise Admins, and Schema Admins.
• Enterprise Admins (in the Users container of the forest root domain). This group is a member
of the Administrators group in every domain in the forest, which gives it complete access to the
configuration of all domain controllers. It also owns the Configuration partition of the directory and
has full control of the domain naming context in all forest domains.
• Schema Admins (Users container of the forest root domain). This group owns and has full control of
the Active Directory schema.
• Administrators (Built-in container of each domain). Members of this group have complete
control over all domain controllers and data in the domain naming context. They can change the
membership of all other administrative groups in the domain, and the Administrators group in the
forest root domain can change the membership of Enterprise Admins, Schema Admins, and Domain
Admins. The Administrators group in the forest root domain is arguably the most powerful service
administration group in the forest.
• Domain Admins (Users container of each domain). This group is added to the Administrators group of
its domain. It therefore inherits all of the capabilities of the Administrators group. It is also, by default,
added to the local Administrators group of each domain member computer, giving Domain Admins
ownership of all domain computers.
• Server Operators (Built-in container of each domain). Members of this group can perform
maintenance tasks on domain controllers. They have the right to log on locally, start and stop
services, perform backup and restore operations, format disks, create or delete shares, and shut down
domain controllers. By default, this group has no members.
• Account Operators (Built-in Container of each domain). Members of this group can create, modify,
and delete accounts for users, groups, and computers located in any OU in the domain (except the
Domain Controllers OU), and in the Users and Computers container. Account Operator group
members cannot modify accounts that are members of the Administrators or Domain Admins groups,
nor can they modify those groups. Account Operator group members also can log on locally to
domain controllers. By default, this group has no members.
• Backup Operators (Built-in container of each domain). Members of this group can perform backup
and restore operations on domain controllers, and log on locally and shut down domain controllers.
By default, this group has no members.
• Print Operators (Built-in container of each domain). Members of this group can maintain print queues
on domain controllers. They also can log on locally and shut down domain controllers.
You need to carefully manage the default groups that provide administrative privileges, because they
typically have broader privileges than are necessary for most delegated environments, and because they
often apply protection to their members.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 3-15
The Account Operators group is a good example of this. If you examine the capabilities of the Account
Operators group in the preceding list, you can see that members of this group have very broad rights—
they can even log on locally to a domain controller. In very small networks, such rights would probably be
appropriate for one or two individuals who typically would be domain administrators anyway. In large
enterprises, the rights and permissions granted to Account Operators usually are far too broad.
Additionally, the Account Operators group is, like the other administrative groups, a protected group.
Protected groups are defined by the operating system and cannot be unprotected. Members of a
protected group become protected by association. The result of protection is that the permissions (ACLs)
of members are modified so that they no longer inherit permissions from their OU, but rather receive a
copy of an ACL that is quite restrictive. For example, if you add Jeff Ford to the Account Operators group,
his account becomes protected, and the help desk, which can reset all other user passwords in the
Employees OU, cannot reset Jeff Ford’s password.
You should try to avoid adding users to the groups that do not have members by default (Account
Operators, Backup Operators, Server Operators, and Print Operators). Instead, create custom groups to
which you assign permissions and user rights that achieve your business and administrative requirements.
For example, if Scott Mitchell should be able to perform backup operations on a domain controller, but
should not be able to perform restore operations that could lead to database rollback or corruption, and
should not be able to shut down a domain controller, do not put Scott in the Backup Operators group.
Instead, create a group and assign it only the Backup Files And Directories user right, and then add Scott
as a member.
Special Identities
Windows and AD DS also support special
identities, which are groups for which membership
is controlled by the operating system. You cannot
view the groups in any list (in the Active Directory
Users and Computers snap-in, for example), you
cannot view or modify the membership of these
special identities, and you cannot add them to
other groups. You can, however, use these groups
to assign rights and permissions.
• Authenticated Users. This represents identities that have been authenticated. This group does not
include Guest, even if the Guest account has a password.
• Everyone. This identity includes Authenticated Users and the Guest account. (On computers that are
running versions of the Windows Server operating system that precede Windows Server 2003, this
group includes Anonymous Logon.)
MCT USE ONLY. STUDENT USE PROHIBITED
3-16 Managing Active Directory Domain Services Objects
• Interactive. This represents users accessing a resource while logged on locally to the computer that is
hosting the resource, as opposed to accessing the resource over the network. When a user accesses
any given resource on a computer to which the user is logged on locally, the user is added to the
Interactive group automatically for that resource. Interactive also includes users who log on through
a Remote Desktop connection.
• Network. This represents users accessing a resource over the network, as opposed to users who
are logged on locally at the computer that is hosting the resource. When a user accesses any given
resource over the network, the user is added automatically to the Network group for that resource.
The importance of these special identities is that you can use them to provide access to resources based
on the type of authentication or connection, rather than the user account. For example, you could create
a folder on a system that allows users to view its contents when they are logged on locally to the system,
but that does not allow the same users to view the contents from a mapped drive over the network. You
could achieve this by assigning permissions to the interactive special identity.
Demonstration Steps
Create a new group
1. On LON-DC1, open the Active Directory Administrative Center.
2. Create a new Global Security group in the IT OU called IT Managers.
Lesson 3
Managing Computer Accounts
A computer account begins its life cycle when you create it and join it to your domain. Thereafter,
day-to-day administrative tasks include the following:
• Renaming, resetting, disabling, enabling, and eventually deleting the computer object.
It is important that you know how to perform these various computer-management tasks so you can
configure and maintain the computer objects within your organization.
Lesson Objectives
After completing this lesson, you will be able to:
Note: You can use the Redircmp.exe command-line tool to reconfigure the default
computer container. For example, if you want to change the default computer container to an
OU called mycomputers, use the following syntax:
redircmp ou=mycomputers,DC=contoso,dc=com
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 3-19
• You must not have exceeded the maximum number of computer accounts that you can add to the
domain. By default, users can only add a maximum of ten computers to the domain; this value is
known as the machine account quota and is controlled by the MS-DS-MachineQuota value. You can
modify this value by using the ADSIEdit snap-in.
Note: You do not have to create a computer object in the directory service, but it is
recommended. Many administrators join computers to a domain without first creating a
computer object. However, when you do this, Windows Server attempts to join the domain to
an existing object. When Windows Server does not find the object, it fails back and creates a
computer object in the default Computer container.
The process of creating a computer account in advance is called prestaging a computer. There are two
major advantages of prestaging a computer:
• The account is placed into the correct OU, and is therefore delegated according to the security policy
defined by the ACL of the OU.
• The computer is within the scope of GPOs linked to the OU, before the computer joins the domain.
After you have been given permission to create computer objects, you can do so by right-clicking the
OU and from the New menu, clicking Computer. Next, enter the computer name, following the naming
convention of your enterprise, and select the user or group that will be allowed to join the computer
to the domain with this account. The two computer names—Computer Name and Computer Name
(previous to Windows 2000)—should be the same. Very rarely is there a justification for configuring them
separately.
Delegating Permissions
By default, the Enterprise Admins, Domain Admins, Administrators, and Account Operators groups have
permission to create computer objects in any new OU. However, as discussed earlier, we recommend that
you tightly restrict membership in the first three groups, and that you do not add Administrators to the
Account Operators group.
Instead, you should delegate the permission to create computer objects (called Create Computer Objects)
to appropriate administrators or support personnel. This permission, which is assigned to an OU’s group,
allows group members to create computer objects in that OU. For example, you might allow your desktop
support team to create computer objects in the clients OU, and allow your file server administrators to
create computer objects in the file servers OU.
MCT USE ONLY. STUDENT USE PROHIBITED
3-20 Managing Active Directory Domain Services Objects
To delegate permissions to create computer accounts, you can use the Delegate Control Wizard to choose
a custom task to delegate.
When you delegate permissions to manage computer accounts, you might consider granting additional
permissions beyond those required to create computer accounts. For example, you might decide to allow
a delegated administrator to manage the properties of existing computer accounts, to delete the
computer account, or to move the computer account.
• After reinstalling the operating system on a workstation, the workstation is unable to authenticate,
even though the technician used the same computer name as was used in the previous installation.
Because the new installation generated a new SID, and because the new computer does not know the
original computer account password in the domain, it does not belong to the domain and cannot
authenticate to the domain.
• A computer has not been used for an extended period, perhaps because the user is on vacation or
working away from the office. Computers change their passwords every 30 days, and AD DS
remembers the current and previous password. If the computer is unused within this period,
authentication can fail.
• A computer’s LSA secret gets out of synchronization with the password that the domain knows. You
can think of this as the computer forgetting its password. Although it did not forget its password, it
just disagrees with the domain over what the password really is. When this happens, the computer
cannot authenticate, and the secure channel cannot be created.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 3-21
When the secure channel fails, you must reset it. Many administrators do this by removing the computer
from the domain, putting it in a workgroup, and then rejoining the domain. However, this is not a good
practice because it has the potential to delete the computer account altogether. Deleting the computer
account removes the computer’s SID, and more importantly, its group memberships. When you rejoin the
domain using this procedure, even though the computer has the same name, the account has a new SID,
and all the group memberships of the previous computer object must be recreated to include the new
SID. Therefore, if the trust with the domain has been lost, do not remove a computer from the domain
and then rejoin it. Instead, reset the secure channel. This will ensure that the existing computer account
can be reused.
To reset the secure channel between a domain member and the domain, use the Active Directory Users
and Computers snap-in, DSMod.exe, NetDom.exe, or NLTest.exe. If you reset the account, the computer’s
SID remains the same, and it maintains its group memberships.
To reset the secure channel by using the Active Directory Administrative Center:
3. Rejoin the computer to the domain, and then restart the computer.
2. Rejoin the computer to the domain, and then restart the computer.
MCT USE ONLY. STUDENT USE PROHIBITED
3-22 Managing Active Directory Domain Services Objects
To reset the secure channel by using NetDom.exe, type the following command at a command prompt,
where the credentials belong to the local Administrators group of the computer:
This command resets the secure channel by attempting to reset the password on both the computer and
the domain, so it does not require rejoining or rebooting.
To reset the secure channel by using NLTest.exe, on the computer that has lost its trust, type the following
command at a command prompt:
You also can use Windows PowerShell with Active Directory module to reset a computer account. The
following example demonstrates how to reset the secure channel between the local computer and the
domain to which it is joined.
You must run this command on the local computer:
Note: You also can reset a remote computer’s password with Windows PowerShell:
invoke-command -computername Workstation1 -scriptblock {reset-computermachinepassword}
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 3-23
Lesson 4
Delegating Administration
Although a single person can manage a small network with a few user and computer accounts, as the
network grows, so too does the volume of work that relates to network management. At some point,
teams with particular specializations evolve, each with responsibility for some specific aspect of network
management. In AD DS environments, it is common practice to create OUs to bring departmental or
geographic structure to the networked objects, and to enable configuration of administrative delegation.
It is important that you know why and how to create OUs, and how to delegate administrative tasks to
users on objects within those OUs.
Lesson Objectives
After completing this lesson, you will be able to:
• Describe AD DS permissions.
AD DS Permissions
All AD DS objects, such as users, computers,
and groups, can be secured by using a list of
permissions. The permissions on an object are
called access control entries (ACEs), and they are
assigned to users, groups, or computers, which are
also known as security principals. ACEs are saved
in the object’s discretionary access control list
(DACL), which is part of the object’s ACL. The ACL
contains the system access control list (SACL) that
includes auditing settings.
Each object in AD DS has its own ACL. If you
have sufficient permissions, you can modify the
permissions to control the level of access on a specific AD DS object. The delegation of administrative
control involves assigning permissions that manage access to objects and properties in AD DS. Just as you
can give a group the ability to change files in a folder, you can give a group the ability, for example, to
reset passwords on user objects.
The DACL of an object also allows you to assign permissions to an object’s specific properties. For
example, you can allow (or deny) permission to change phone and email options. This is, in fact, not just
one property. It is a property set that includes multiple, specific properties. Using property sets, you can
easily manage permissions to commonly used collections of properties. However, you can also assign
more granular permissions and allow or deny permission to change just some of the information, such as
the mobile telephone number or the street address.
Assigning the help desk permission to reset passwords for each individual user object is tedious. Even so,
in AD DS, it is not a good practice to assign permissions to individual objects. Instead, you should assign
permissions at the level of OUs.
MCT USE ONLY. STUDENT USE PROHIBITED
3-24 Managing Active Directory Domain Services Objects
The permissions that you assign to an OU are inherited by all objects in the OU. Therefore, if you give
the help desk permission to reset passwords for user objects and attach that permission to the OU that
contains the users, all user objects within that OU will inherit that permission. In just one step, you have
delegated that administrative task.
Child objects inherit the permissions of the parent container or OU. That container or OU in turn inherits
its permissions from its parent container OU. If it is a first-level container or OU, it inherits the permissions
from the domain itself. The reason child objects inherit permissions from their parents is that, by default,
each new object is created with the Include inheritable permissions from this object’s parent option
enabled.
Effective AD DS Permissions
Effective permissions are the resulting permissions
for a security principal (such as a user or group),
based on the cumulative effect of each inherited
and explicit ACE. Your ability to reset a user’s
password, for example, might be due to your
membership in a group that is allowed the Reset
Password permission on an OU several levels
above the user object. The inherited permission
assigned to a group to which you belong results
in an effective permission of Allow: Reset
Password. Your effective permissions can be
complicated when you consider Allow and Deny
permissions, explicit and inherited ACEs, and the fact that you might belong to multiple groups, each of
which might be assigned different permissions.
Permissions, whether assigned to your user account or to a group to which you belong, are equivalent.
This means that ultimately an ACE applies to you, the user. The best practice is to manage permissions
by assigning them to groups, but it is also possible to assign ACEs to individual users or computers. A
permission that has been assigned directly to you, the user, is neither more important nor less important
than a permission assigned to a group to which you belong.
The Allow permissions, which allow access, are cumulative. When you belong to several groups, and when
those groups have been granted permissions that allow a variety of tasks, you will be able to perform all
of the tasks assigned to all of those groups, and tasks assigned directly to your user account.
Deny permissions, which deny access, override equivalent Allow permissions. If you are in one group that
has been allowed the permission to reset passwords, and you are also another group that has been
denied permission to reset passwords, the Deny permission prevents you from resetting passwords.
Note: Use Deny permissions rarely. In fact, it is unnecessary to assign Deny permissions,
because if you do not assign an Allow permission, users cannot perform the task. Before
assigning a Deny permission, check to see if you could achieve your goal instead by removing
an Allow permission. For example, if you want to delegate an Allow permission to a group, but
exempt only one member from that group, you can use a Deny permission on that specific user
account while the group still has an Allow permission.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 3-25
Every permission is granular. Even if you have been denied the ability to reset passwords, you might still
have the ability through other Allow permissions to change the user’s logon name or email address.
Because child objects inherit the inheritable permissions of parent objects by default, and because explicit
permissions can override inheritable permissions, an explicit Allow permission will actually override an
inherited Deny permission.
Unfortunately, the complex interaction of user, group, explicit, inherited, Allow, and Deny permissions can
make evaluating effective permissions tedious. You can use the permissions reported by the DSACL
command, or listed on the Effective Access tab of the Advanced Security Settings dialog box to begin
evaluating effective permissions, but it is still a manual task.
Demonstration Steps
Delegate a standard task
1. Open Active Directory Users and Computers.
2. Use the Delegate Control Wizard to grant the IT group the following standard management tasks on
the IT OU:
You have been working for A. Datum as a desktop support specialist and have visited desktop computers
to troubleshoot application and network problems. You have recently accepted a promotion to the server
support team. One of your first assignments is configuring the infrastructure service for a new branch
office.
To begin deployment of the new branch office, you are preparing AD DS objects. As part of this
preparation, you need to create an OU for the branch office and delegate permission to manage it. Then
you need to create users and groups for the new branch office. Finally, you need to reset the secure
channel for a computer account that has lost connectivity to the domain in the branch office.
Objectives
After completing this lab, you will be able to:
Lab Setup
Estimated Time: 60 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:
1. On the host computer, from Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Hyper-V® Manager, click 20410B-LON-DC1, and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
b. Password: Pa$$w0rd
c. Domain: Adatum
o Managers\Ed Meadows
o Marketing\Connie Vrettos
o Research\Barbara Zighetti
o Sales\Arlene Huff
5. Move the LON-CL1 computer to the Branch Office 1 OU, and then restart the LON-CL1 computer.
6. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.
7. On LON-DC1, in Active Directory Users and Computers, use the Delegate Control Wizard to delegate
administration of the Branch Office 1 OU to the Branch 1 Administrators security group by
delegating the following common and custom tasks:
Task 2: Delegate a user administrator for the Branch Office Help Desk
1. On LON-DC1, in Active Directory Users and Computers, use the Delegate Control Wizard to delegate
administration of the Branch Office 1 OU to the Branch 1 Help Desk security group.
2. Add the Branch 1 Administrators global group to the Server Operators domain local group. Sign
out from LON-DC1.
3. Sign in as Adatum\Holly with the password Pa$$w0rd. You can log on locally at a domain controller
because Holly belongs indirectly to the Server Operators domain local group.
4. From Server Manager, open Active Directory Users and Computers. Confirm Holly’s current
credentials in the User Account Control dialog box.
5. Attempt to delete Sales\Aaren Ekelund. You are unsuccessful, because Holly lacks the required
permissions.
6. Try to delete Branch Office 1\Ed Meadows. You are successful, because Holly has the required
permissions.
3. Open Server Manager, and then open Active Directory Users and Computers. In the User
Account Control dialog box, specify Adatum\Administrator and Pa$$w0rd as the required
credentials.
Note: To modify the Server Operators membership list, you must have permissions beyond those
available to the Branch 1 Administrators group.
4. Add the Branch 1 Help Desk global group to the Server Operators domain local group. Sign out
from LON-DC1.
5. Sign in as Adatum\Bart with the password Pa$$w0rd. You can log on locally at a domain controller
because Bart belongs, indirectly, to the Server Operators domain local group.
6. Open Server Manager, and then open Active Directory Users and Computers. Confirm your
current credentials in the User Account Control dialog box.
7. Try to delete Branch Office 1\Connie Vrettos. You are unsuccessful, because Bart lacks the required
permissions.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 3-29
9. After confirming the password reset is successful, sign out from LON-DC1.
Results: After completing this exercise, you should have successfully created an OU and delegated
administration of it to the appropriate group.
3. From Server Manager, open Active Directory Users and Computers, and then create a new user
with the following properties in the Branch Office 1 OU:
o Password: Pa$$w0rd
o Account is disabled
Task 3: Create a new user for the branch office, based on the template
1. On LON-DC1, copy the _Branch_template user account, and configure the following properties:
o First name: Ed
o Password: Pa$$w0rd
2. Verify that the following properties have been copied during account creation:
o City: Slough
3. Verify that you have a drive mapping for drive Z to Ed’s home folder on LON-DC1.
Results: After completing this exercise, you should have successfully created and tested a user account
created from a template.
3. View the Advanced system settings, and then click the Computer Name tab.
4. In the System Properties dialog box, use the Network ID button to rejoin the computer to the
domain.
o Domain: Adatum
7. Sign in as Adatum\Ed with the password of Pa$$w0rd. You are successful because the computer had
been successfully rejoined.
Results: After completing this exercise, you should have successfully reset a trust relationship.
2. In the Virtual Machines list, right-click 20410B-LON-CL1, and then click Revert.
Question: You are responsible for managing accounts and access to resources for your
group members. A user in your group transfers to another department within the company.
What should you do with the user’s account?
Question: What is the main difference between the Computers container and an OU?
Question: When should you reset a computer account? Why is it better to reset the
computer account rather than to disjoin and then rejoin it to the domain?
Question: A project manager in your department is starting a group project that will
continue for the next year. Several users from your department and other departments will
be dedicated to the project during this time. The project team must have access to the same
shared resources. The project manager must be able to manage the user accounts and group
accounts in AD DS; however, you do not want to give the project manager permission to
manage anything else in AD DS. What is the best way to do this?
Question: You are working as an IT technician in Contoso, Ltd. You are managing the
Windows Server–based infrastructure. You have to find a method for joining new
Windows 8-based computers to a domain during the installation process, without
intervention of a user or an administrator. What is the best way to do this?
Tools
Tool Use Where to find it
Best Practices
Best Practices for User Account Management
• Do not let users share user accounts. Always create a user account for each individual, even if that
person will not be with your organization for long.
• Ensure that you choose a naming strategy for user accounts that enables you to identify the user to
whom the account relates. Also ensure that your naming strategy uses unique names within your
domain.
• Use universal groups only when necessary because they add weight to replication traffic.
• Use Windows PowerShell with Active Directory Module for batch jobs on groups.
Module 4
Automating Active Directory Domain Services
Administration
Contents:
Module Overview 4-1
Module Overview
You can use command-line tools and Windows PowerShell® to automate Active Directory® Domain
Services (AD DS) administration. Automating administration speeds up processes that you might
otherwise perform manually. Windows PowerShell includes cmdlets for performing AD DS administration
and for performing bulk operations. You can use bulk operations to change many AD DS objects in a
single step rather than updating each object manually.
Objectives
After completing this module, you will be able to:
Lesson 1
Using Command-line Tools for AD DS Administration
Windows Server® 2012 includes several command-line tools that you can use to perform AD DS
administration. Many organizations create scripts that use command-line tools to automate the creation
and management of AD DS objects, such as user accounts and groups. You must understand how to use
these command-line tools to ensure that if required, you can modify the scripts that your organization
uses.
Lesson Objectives
After completing this lesson, you will be able to:
• Faster implementation of bulk operations. For example, you can export a list of new user accounts
from a human resources application. You use a command-line tool or script to create the new user
accounts based on the exported information. This is much faster than creating each new user account
manually.
• Customized processes for AD DS administration. You can use a customized graphical program to
gather information about a new group, and then create the new group. When the information is
gathered, the graphical program can verify that the information format—such as the naming
convention—is correct. Then, the graphical program uses a command-line tool to create the new
group. This process allows company-specific rules to be enforced.
• AD DS administration on Server Core. The Server Core installation of Windows Server cannot run
graphical administration tools such as Active Directory Users and Computers. However, you can use
command-line tools on Server Core.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 4-3
Note: You can administer Server Core remotely by using graphical tools.
What Is Csvde?
Csvde is a command-line tool that exports
or imports Active Directory objects to or from
a comma-separated values (.csv) file. Many
applications are capable of exporting or
importing data from .csv files. This makes csvde
useful for interoperability with other applications,
such as databases or spreadsheets.
csvde f filename
Other options that you can use with csvde are listed in the following table.
Option Description
-d RootDN Specifies the distinguished name of the container from which the export
will begin. The default is the domain.
-p SearchScope Specifies the scope of the search relative to the container specified by the
option -d. The SearchScope option can be either base (this object only),
onelevel (objects within this container), or subtree (this container and all
subcontainers). The default is subtree.
-r Filter Limits the objects returned to those that match the filter. The filter is
based on Lightweight Directory Access Protocol (LDAP) query syntax.
-l ListOfAtrributes Specifies the attributes to be exported. Use the LDAP name for each
attribute, and separate them with commas.
After the export completes, the .csv file will contain a header row and one row for each object that was
exported. The header row is a comma-separated list with the names of the attributes for each object.
MCT USE ONLY. STUDENT USE PROHIBITED
4-4 Automating Active Directory Domain Services Administration
csvde i f filename k
The -i parameter specifies import mode. The -f parameter identifies the file name from which to import.
The -k parameter instructs csvde to ignore error messages, including the “Object Already Exists” error
message. The suppress errors option is useful when importing objects to ensure that all of the objects
possible are created, instead of stopping when partially complete.
The .csv file that is being used for an import must have a header row that contains names of LDAP
attributes for the data in the .csv file. Each row must contain exactly the correct number of items as
specified in the header row.
You cannot use csvde to import passwords, because passwords in a .csv file are not protected. As a result,
user accounts that you create with csvde have a blank password and are disabled.
Note: For more information about parameters for csvde, at a command prompt, type
csvde /?, and then press Enter.
Additional Reading: For more information about LDAP query syntax, see LDAP Query
Basics at http://go.microsoft.com/fwlink/?LinkId=168752.
What Is Ldifde?
Ldifde is a command-line tool that you can use
to export, create, modify, or delete AD DS objects.
Like csvde, ldifde uses data that is stored in a file.
The file must be in LDAP Data Interchange Format
(LDIF). Most applications cannot export or import
data in LDIF format. It is more likely that you will
obtain data in LDIF format from another directory
service.
An LDIF file is text-based, with blocks of lines
composing a single operation such as creating
or modifying a user object. Each line within
the operation specifies something about the
operation, such as an attribute or the type of operation. A blank line separates multiple operations within
the LDIF file.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 4-5
For each operation in an LDIF file, the changetype line defines the operation to be performed. The valid
values are add, modify, or delete.
ldifde f filename
Some other options you can use when exporting objects ldifde are listed in the following table.
Option Description
-d RootDN The root of the LDAP search. The default is the root of the domain.
ldifde i f filename k
MCT USE ONLY. STUDENT USE PROHIBITED
4-6 Automating Active Directory Domain Services Administration
The -i parameter specifies import mode. The -f parameter identifies the file name from which to import.
The -k parameter instructs ldifde to ignore errors, including the “Object Already Exists” error. The option
suppress errors is useful when importing objects to ensure that all objects possible are created, instead
of stopping when partially complete.
You cannot use ldifde to import passwords, because passwords in an LDIF file would not be secure. As a
result, user accounts created by ldifde have a blank password and are disabled.
Tool Description
Question: What criteria would you use to select between using csvde, ldifde, and the DS
commands?
MCT USE ONLY. STUDENT USE PROHIBITED
4-8 Automating Active Directory Domain Services Administration
Lesson 2
Using Windows PowerShell for AD DS Administration
Windows PowerShell is the preferred scripting environment in Windows Server 2012. It is much easier
to use than previous scripting languages such as Microsoft® Visual Basic Scripting Edition (VBScript).
Windows PowerShell includes an extensive list of cmdlets to manage AD DS objects. You can use cmdlets
to create, modify, and remove user accounts, groups, computer accounts, and organizational units (OUs).
Lesson Objectives
After completing this lesson, you will be able to:
Cmdlet Description
• If you do not use the -AccountPassword parameter, no password is set and the user account is
disabled. The -Enabled parameter cannot be set as $true when no password is set.
• If you use the -AccountPassword parameter to specify a password, then you must specify a variable
that contains the password as a secure string, or choose to be prompted for the password. A secure
string is encrypted in memory. If you set a password then you can enable the user account by setting
the -Enabled parameter as $true.
Some commonly used parameters for the New-ADUser cmdlet are listed in the following table.
Parameter Description
ChangePasswordAtLogon Requires the user account to change passwords at the next logon.
HomeDirectory Defines the location of the home directory for a user account.
HomeDrive Defines the drive letters that are mapped to the home directory for a
user account.
Path Defines the OU or container where the user account will be created.
The following is an example of a command that you could use to create a user account with a prompt for
a password:
New ADUser "Sten Faerch" AccountPassword (Read Host AsSecureString "Enter password")
Department IT
Question: Are all cmdlet parameters that you use to manage user accounts the same?
MCT USE ONLY. STUDENT USE PROHIBITED
4-10 Automating Active Directory Domain Services Administration
Cmdlet Description
Parameter Description
GroupScope Defines the scope of the group as DomainLocal, Global, or Universal. You
must provide this parameter.
Parameter Description
SamAccountName Defines a name that is backward compatible with older operating systems.
The following command is an example of what you could type at a Windows PowerShell prompt to create
a new group:
Note: When you pipe a list of objects to a cmdlet, you pass a list of objects to a cmdlet.
Some of the cmdlets for managing computer accounts are listed in the following table.
Cmdlet Description
Parameter Description
Path Defines the OU or container where the computer account will be created.
Enabled Defines whether the computer account is enabled or disabled. By default, the
computer account is enabled and a random password is generated.
The following is an example that you can use to create a computer account:
The following is a command that you could use to repair the trust relationship for a computer account:
Cmdlet Description
Parameter Description
The following is an example you can use when you want to create a new OU:
Lesson 3
Performing Bulk Operations with Windows PowerShell
Windows PowerShell is a powerful scripting environment that you can use to perform bulk operations,
which would normally be tedious to perform manually. You can also perform some bulk operations in
graphical tools.
To perform bulk operations using Windows PowerShell, you must first understand how to create queries
for a list of AD DS objects, and how to work with .csv files. Then you can create scripts that perform the
bulk operations that you require.
Lesson Objectives
After completing this lesson, you will be able to:
2. Modify the objects defined by the query. When using graphical tools, you typically select the objects
that you want to modify, and then edit the properties of those objects. When using command-line
tools, you might use a list of objects or variables to identify the objects that you want to modify.
You can perform bulk operations with graphical tools, at a command prompt, or by using scripts. Each
method for performing bulk operations has different capabilities.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 4-15
For example:
• Graphical tools tend to be limited in the properties that they can modify.
• Command-line tools tend to be more flexible than graphical tools when defining queries, and they
have more options for modifying object properties.
• Scripts can combine multiple command-line actions for the most complexity and flexibility.
Note: When you use graphical tools to modify multiple user accounts simultaneously, you
are limited to modifying the properties that display in the user interface.
To perform a bulk operation using graphical tools, perform the following steps:
1. Perform a search or create a filter to display the objects that you want to modify.
Demonstration Steps
Create a query for all users
1. Start 20410B-LON-DC1 and sign in as Adatum\Administrator by using the password Pa$$w0rd.
3. Browse to Global Search, and add the criteria Object type is user/inetOrgPerson/computer
/group/organization unit.
4. Verify that the criteria that you added is for the type User, and perform the search.
Parameter Description
SearchBase Defines the AD DS path to begin searching, for example, the domain or an OU.
SearchScope Defines at what level below the SearchBase a search should be performed. You
can choose to search only in the base, one level down, or the entire subtree.
ResultSetSize Defines how many objects to return in response to a query. To ensure that all
objects are returned, you should set this to $null.
Properties Defines which object properties to return and display. To return all properties,
type an asterisk (*). You do not need to use this parameter to use a property for
filtering.
Create a Query
You can use the Filter parameter or the LDAPFilter parameter to create queries for objects with the
Get-AD* cmdlets. The Filter parameter is used for queries written in Windows PowerShell. The
LDAPFilter parameter is used for queries written as LDAP query strings.
The following table lists commonly used operators that you can use in Windows PowerShell.
Operator Description
-eq Equal to
Operator Description
The following is a command that you use to display all of the properties for a user account:
The following is a command that you use to return all the user accounts in the Marketing OU, and all of
its child OUs:
The following is a command that you use to show all of the user accounts with a last logon date older
than a specific date:
The following is a command that you use to show all of the user accounts in the Marketing department
that have a last logon date older than a specific date:
Additional Reading: For more information about filtering with Get-AD* cmdlets, see
about_ActiveDirectory_Filter at http://go.microsoft.com/fwlink/?LinkID=266740.
Question: What is the difference between using -eq and -like when comparing strings?
The following is a command that you could use to generate a list of user accounts that have not logged
on since a specific date, and then disable them:
When you use a text file to specify a list of objects, the text file needs to have the name of each object on
a single line.
The following is a command that you could use to disable the user accounts that are listed in a text file:
Question: Which attributes of a user account can you use when creating a query by using
the Filter parameter?
FirstName,LastName,Department
Greg,Guzik,IT
Robin,Young,Research
Qiong,Wu,Marketing
The following is a command that you could use to import a .csv file into a variable, and use a foreach
loop to display the first name from each row in a .csv file:
$users=Import-CSV C:\users.csv
Foreach ($i in $users) {
Write Host "The first name is:" $i.FirstName"
}
The execution policy on a server determines whether scripts are able to run. The default execution policy
on Windows Server 2012 is RemoteSigned. This means that local scripts can run without being digitally
signed. You can control the execution policy by using the Set-ExecutionPolicy cmdlet.
Demonstration Steps
Configure a department for users
1. Start 20410B-LON-DC1, and sign in as Adatum\Administrator by using the password of
Pa$$w0rd.
3. At the Windows PowerShell prompt, search for user accounts in the Research OU using the following
command:
4. Set the department attribute of all users in the Research OU using the following command:
5. Display a table-formatted list of users in the Research department. Display the distinguished name
and department by using the following command:
6. Use the Properties parameter to allow the previous command to display the department correctly.
Use the following command:
Create an OU
• At the Windows PowerShell prompt, create a new OU named LondonBranch using the following
command:
2. Edit DemoUsers.ps1, and review the contents of the script. Note that the script:
o Refers to the location of the .csv file.
.\DemoUsers.ps1
You have been working for A. Datum for several years as a desktop support specialist. In this role, you
visited desktop computers to troubleshoot application and network problems. You have recently accepted
a promotion to the server support team. One of your first assignments is configuring the infrastructure
service for a new branch office.
As part of configuring a new branch office, you need to create user and group accounts. Creating multiple
users with graphical tools is inefficient, so, you will be using Windows PowerShell.
Objectives
After completing this lab, you will be able to:
Lab Setup
Estimated Time: 45 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:
1. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Hyper-V® Manager, click 20410B-LON-DC1, and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
• Password: Pa$$w0rd
5. Repeat steps 2-3 for 20410B-LON-CL1. Do not sign in to LON-CL1 until directed to do so.
MCT USE ONLY. STUDENT USE PROHIBITED
4-22 Automating Active Directory Domain Services Administration
New-ADOrganizationalUnit LondonBranch
3. Create a new user account for Ty Carlson in the LondonBranch OU using the following command:
4. Change the blank password for the new account to Pa$$w0rd, using the following command:
Set-ADAccountPassword Ty
Enable-ADAccount Ty
2. At the Windows PowerShell prompt, add Ty as a member of LondonBranchUsers, using the following
command:
3. At the Windows PowerShell prompt, confirm that Ty has been added as a member of
LondonBranchUsers, using the following command:
Get-ADGroupMember LondonBranchUsers
Results: After completing this exercise, you should have created user accounts and groups by using
Windows PowerShell.
o $csvfile: E:\Labfiles\Mod04\labUsers.csv
o $OU: "ou=LondonBranch,dc=adatum,dc=com"
2. Save the modified LabUsers.ps1.
Results: After completing this exercise, you should have used Windows PowerShell to create user
accounts in bulk.
MCT USE ONLY. STUDENT USE PROHIBITED
4-24 Automating Active Directory Domain Services Administration
Task 1: Force all user accounts in LondonBranch to change their passwords at next
logon
1. On LON-DC1, open a Windows PowerShell prompt.
2. At the Windows PowerShell prompt, create a query for user accounts in the LondonBranch OU using
the following command:
3. At the Windows PowerShell prompt, modify the previous command to force all user accounts to
change their password at the next logon using the following command:
o City: London
o Country/Region: United Kingdom
Results: After completing this exercise, you should have modified user accounts in bulk.
2. In the Virtual Machines list, right-click 20410B-LON-CL1, and then click Revert.
Question: The Research department in your organization has been renamed “Research and
Development.” You need to update the Department property of users in the Research
department to reflect this change.
You have created a query for user accounts with the department property set to Research,
by using the Get-ADUser cmdlet and the -Filter parameter. What is the next step to update
the department property to Research and Development?
MCT USE ONLY. STUDENT USE PROHIBITED
MCT USE ONLY. STUDENT USE PROHIBITED
5-1
Module 5
Implementing IPv4
Contents:
Module Overview 5-1
Module Overview
IPv4 is the network protocol used on the Internet and local area networks. To ensure that you can you
understand and troubleshoot network communication, it is essential that you understand how IPv4 is
implemented. In this module, you will see how to implement an IPv4 addressing scheme, and determine
and troubleshoot network-related problems.
Objectives
After completing this module, you will be able to:
• Describe the TCP/IP protocol suite.
Lesson 1
Overview of TCP/IP
TCP/IP is an industry standard suite of protocols that provides communication in a heterogeneous
network. This lesson provides an overview of IPv4, and how it relates to other protocols to enable network
communication. It also covers the concept of sockets, which applications use to accept network
communications. Combined together this lesson provides a foundation for understanding and
troubleshooting network communication.
Lesson Objectives
After completing this lesson, you will be able to:
• Network interface layer. The network interface layer protocols define how datagrams from the
Internet layer are transmitted on the media.
• Creating or modifying protocols to support new standards does not require modification of the entire
protocol stack.
• Having multiple protocols operating at the same layer makes it possible for applications to select the
protocols that provide only the level of service required.
• Because the stack is split into layers, the development of the protocols can proceed simultaneously by
personnel who are uniquely qualified in the operations of the particular layers.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 5-3
Application Layer
The application layer of the TCP/IP model
corresponds to the application, presentation,
and session layers of the OSI model. This layer
provides services and utilities that enable
applications to access network resources.
Transport Layer
The transport layer corresponds to the transport layer of the OSI model and is responsible for end-to-end
communication using TCP or User Datagram Protocol (UDP). The TCP/IP protocol suite offers application
programmers the choice of TCP or UDP as a transport layer protocol:
Internet Layer
The Internet layer corresponds to the network layer of the OSI model and consists of several separate
protocols, including: IP; Address Resolution Protocol (ARP); Internet Group Management Protocol (IGMP);
and Internet Control Message Protocol (ICMP). The protocols at the Internet layer encapsulate transport
layer data into units called packets, address them, and then route them to their destinations.
The Internet layer protocols are:
• IP. IP is responsible for routing and addressing. The Windows® 8 operating system and the Windows
Server® 2012 operating system implement a dual-layer IP protocol stack, including support for both
IPv4 and IPv6.
• ARP. ARP is used by IP to determine the media access control (MAC) address of local network
adapters—that is, adapters installed on computers on the local network—from the IP address of a
local host. ARP is broadcast-based, meaning that ARP frames cannot transit a router and are therefore
localized. Some implementations of TCP/IP provide support for Reverse ARP (RARP) in which the MAC
address of a network adapter is used to determine the corresponding IP address.
• IGMP. IGMP provides support for multitasking applications over routers in IPv4 networks.
TCP/IP Applications
Applications use application layer protocols to
communicate over the network. A client and
server must be using the same application layer
protocol to communicate. The following table lists
some common application layer protocols.
Protocol Description
Remote Desktop Protocol (RDP) Used to remotely control a computer that is running Windows
operating systems over a network.
Server Message Block (SMB) Used by servers and client computers for file and printer sharing.
Simple Mail Transfer Protocol Used to transfer email messages over the Internet.
(SMTP)
Post Office Protocol version 3 Used to retrieve messages from some email servers.
(POP3)
Internet Message Application Used to retrieve messages from some email servers.
Protocol (IMAP)
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 5-5
What Is a Socket?
When an application wants to establish
communication with an application on a
remote host, it creates a TCP or a UDP socket,
as appropriate. A socket identifies the following
as part of the communication process:
Well-Known Ports
Applications are assigned a port number between 0 and 65,535. The first 1,024 ports are known as
well-known ports and have been assigned to specific applications. Applications listening for connections
use consistent port numbers to make it easier for client applications to connect. If an application listens on
a non-standard port number, then you need to specify the port number when connecting to it. Client
applications typically use a random source port number above 1,024. The following table identifies some
of these well-known ports.
You need to know the port numbers that applications use so you can configure firewalls to allow
communication. Most applications have a default port number for this purpose, but it can be changed
when required. For example, some web-based applications run on a port other than port 80 or port 443.
Question: Are there other well-known ports that you can think of?
MCT USE ONLY. STUDENT USE PROHIBITED
5-6 Implementing IPv4
Lesson 2
Understanding IPv4 Addressing
Understanding IPv4 network communication is critical to ensuring that you can implement, troubleshoot,
and maintain IPv4 networks. One of the core components of IPv4 is addressing. Understanding
addressing, subnet masks, and default gateways allows you to identify the proper communication
between hosts. To identify IPv4 communication errors, you need to understand how the communication
process is supposed to work.
Lesson Objectives
After completing this lesson, you will be able to:
IPv4 Addressing
To configure network connectivity, you must be
familiar with IPv4 addresses and how they work.
Network communication for a computer is
directed to the IPv4 address of that computer.
Therefore, each networked computer must be
assigned a unique IPv4 address.
Each IPv4 address is 32 bits long. To make IP
addresses more readable, they are displayed in
dotted decimal notation. Dotted decimal notation
divides a 32-bit IPv4 address into four groups of
8 bits, which are converted to a decimal number
between zero and 255. The decimal numbers are
separated by a period (dot). Each decimal number is called an octet.
Subnet Mask
Each IPv4 address is composed of a network ID and a host ID. The network ID identifies the network on
which the computer is located. The host ID uniquely identifies the computer on that specific network. A
subnet mask identifies which part of an IPv4 address is the network ID, and which part is the host ID.
In the simplest scenarios, each octet in a subnet mask is either 255 or 0. A 255 represents an octet that is
part of the network ID, while a 0 represents an octet that is part of the host ID. For example, a computer
with an IP address of 192.168.23.45 and a subnet mask of 255.255.255.0 has a network ID of 192.168.23.0
and a host ID of 0.0.0.45.
Note: The terms network, subnet, and VLAN (Virtual Local Area Network) are often used
interchangeably. A large network is often subdivided into subnets, and VLANs are configured on
switches to represent subnets.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 5-7
Default Gateway
A default gateway is a device (usually a router), on a TCP/IP network that forwards IP packets to other
networks. The multiple internal networks in an organization can be referred to as an intranet.
On an intranet, any given network might have several routers that connect it to other networks, both local
and remote. You must configure one of the routers as the default gateway for local hosts. This enables the
local hosts to communicate with hosts on remote networks.
Before a host sends an IPv4 packet, it uses its own subnet mask to determine whether the destination
host is on the same network, or on a remote network. If the destination host is on the same network, the
sending host transmits the packet directly to the destination host. If the destination host is on a different
network, the host transmits the packet to a router for delivery.
When a host transmits a packet to a remote network, IPv4 consults the internal routing table to determine
the appropriate router for the packet to reach the destination subnet. If the routing table does not
contain any routing information about the destination subnet, IPv4 forwards the packet to the default
gateway. The host assumes that the default gateway contains the required routing information. The
default gateway is used in most cases.
Client computers usually obtain their IP addressing information from a Dynamic Host Configuration
Protocol (DHCP) server. This is more straightforward than assigning a default gateway manually on each
host. Most servers have a static IP configuration that is assigned manually.
Question: How is network communication affected if a default gateway is configured
incorrectly?
IANA defines the address ranges in the following table as private. Internet-based routers do not forward
packets originating from, or destined to, these ranges.
Network Range
10.0.0.0/8 10.0.0.0-10.255.255.255
172.16.0.0/12 172.16.0.0-172.31.255.255
192.168.0.0/16 192.168.0.0-192.168.255.255
Most of the time, you can use a calculator to convert decimal numbers to binary and vice versa. The
Calculator application included in Windows operating systems can perform decimal-to-binary
conversions, as shown in the following example.
Note: The Internet no longer uses routing based on the default subnet mask of IPv4
address classes.
Note: The IPv4 address 127.0.0.1 is used as a loopback address; you can use this address to
test the local configuration of the IPv4 protocol stack. Consequently, the network address 127 is
not permitted for configuring IPv4 hosts.
MCT USE ONLY. STUDENT USE PROHIBITED
5-10 Implementing IPv4
172.16.0.0/255.255.240.0
In many cases, rather than using a dotted decimal
representation of the subnet mask, the number of bits in the network ID is specified instead. This is called
Classless Interdomain Routing (CIDR). The following is an example of CIDR notation:
172.16.0.0/20
Lesson 3
Subnetting and Supernetting
In most organizations, you need perform subnetting to divide your network into smaller subnets and
allocate those subnets for specific purposes or locations. To do this you need to understand how to select
the correct number of bits to include in the subnet masks. In some cases, you may also need to combine
multiple networks into a single larger network through supernetting.
Lesson Objectives
After completing this lesson, you will be able to:
• Describe supernetting.
You can identify the network ID of a subnet mask by the 1s. You can identify the host ID by the 0s.
Any bits taken from the host ID and allocated to the network ID must be contiguous with the original
network ID.
The mathematical process that is used to compare an IP address and a subnet mask is called ANDing.
When you use more bits for the subnet mask, you can have more subnets, but fewer hosts on each
subnet. Using more bits than you need allows for subnet growth, but limits growth for hosts. Using fewer
bits than you need allows for growth in the number of hosts you can have, but limits growth in subnets.
MCT USE ONLY. STUDENT USE PROHIBITED
5-12 Implementing IPv4
• Increase security by dividing the network and using firewalls to control communication.
• Overcome limitations of current technologies, such as exceeding the maximum number of hosts that
each segment can have.
Number of Number of
Number of bits (n) Number of bits (n)
subnets (2n) subnets (2n)
1 2 4 16
2 4 5 32
3 8 6 64
To determine the subnet addresses quickly, you can use the lowest value bit in the subnet mask. For
example, if you choose to subnet the network 172.16.0.0 by using 3 bits, this mean the subnet mask is
255.255.224.0. The decimal 224 is 11100000 in binary, and the lowest bit has a value of 32, so that is the
increment between each subnet address.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 5-13
The following table shows the subnet addresses for this example; the 3 bits that you have chosen to use to
subnet the network are shown in bold type.
172.16.00000000.00000000 172.16.0.0
172.16.00100000.00000000 172.16.32.0
172.16.01000000.00000000 172.16.64.0
172.16.01100000.00000000 172.16.96.0
172.16.10000000.00000000 172.16.128.0
172.16.10100000.00000000 172.16.160.0
172.16.11000000.00000000 172.16.192.0
172.16.11100000.00000000 172.16.224.0
Note: You can use a subnet calculator to determine the appropriate subnets for your
network, rather than calculating them manually. Subnet calculators are widely available on the
Internet.
The following table shows how many hosts a class C network has available based on the number of host
bits.
1 0
2 2
3 6
4 14
5 30
6 62
You can calculate each subnet’s range of host addresses by using the following process:
1. The first host is one binary digit higher than the current subnet ID.
2. The last host is two binary digits lower than the next subnet ID.
The following table shows examples of calculating host addresses.
To create an appropriate addressing scheme for your organization, you must know how many subnets
you need, and how many hosts you need on each subnet. Once you have that information, you can
calculate an appropriate subnet mask.
You also need to allocate a subnet for the server data center that will hold up to 100 servers.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 5-15
What Is Supernetting?
Supernetting combines multiple small networks
into a single large network. This may be
appropriate when you have a small network that
has grown and you need to expand the address
space. For example, a branch office that is using
the network 192.168.16.0/24 and that exhausts
all of its IP addresses could be allocated the
additional network 192.168.17.0/24. If you use the
default subnet mask of 255.255.255.0 for these
networks then you must perform routing between
them. You can use supernetting to combine them
into a single network.
To perform supernetting, the networks that you are combining must be contiguous. For example,
192.168.16.0/24 and 192.168.17.0/24 can be supernetted, but you cannot supernet 192.168.16.0/24 and
192.168.54.0/24.
Supernetting is the opposite of subnetting. When you perform supernetting, you allocate bits from the
network ID to the host ID. The following table shows how many networks that you can combine by using
a specific number of bits.
1 2
2 4
3 8
4 16
The following table shows an example of supernetting two class C networks. The portion of the subnet
mask that you are using as part of the network ID is shown in bold type.
Network Range
192.168.00010000.00000000/24 192.168.16.0-192.168.16.255
192.168.00010001.00000000/24 192.168.17.0-192.168.17.255
192.168.00010000.00000000/23 192.168.16.0-192.168.17.255
MCT USE ONLY. STUDENT USE PROHIBITED
5-16 Implementing IPv4
Lesson 4
Configuring and Troubleshooting IPv4
If IPv4 is configured incorrectly, then it affects the availability of services that are running on a server. To
ensure the availability of network services, you need to understand how to configure and troubleshoot
IPv4. Windows Server 2012 introduces the ability to configure IPv4 by using Windows PowerShell which is
useful for scripting.
The troubleshooting tools in Windows Server 2012 are similar to previous versions of Windows client
operating systems and server operating systems. However, you may not be familiar with Network Monitor,
which you can use to perform detailed analysis of your network communication.
Lesson Objectives
After completing this lesson, you will be able to:
• Configure IPv4 manually to provide a static configuration for a server.
• Configure a server so that it obtains an IPv4 configuration automatically.
• Explain how to use IPv4 troubleshooting tools.
• Explain how to use Windows PowerShell cmdlets for troubleshooting IPv4.
• Describe the troubleshooting process used to resolve fundamental IPv4 problems.
• Describe the function of Network Monitor.
• Use Network Monitor to capture and analyze network traffic.
You can configure a static IP address either in the properties of the network connection or by using the
netsh command-line tool. For example, the following command configures the interface Local Area
Connection with the following parameters:
• Static IP address 10.10.0.10
• Subnet mask 255.255.255.0
• Default gateway 10.10.0.1
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 5-17
Windows Server 2012 also has Windows PowerShell cmdlets that you can use to manage network
configuration. The following table describes some of the available Windows PowerShell cmdlets that are
available for configuring IPv4.
The following code is an example of the Windows PowerShell cmdlets that you can use to configure the
interface Local Area Connection with the following parameters:
• Static IP address 10.10.0.10
DHCP helps simplify the IP configuration process; however, you must be aware that if you use DHCP to
assign IPv4 information and the service is business-critical, you must do the following:
• Include resilience in your DHCP service design so that the failure of a single server does not prevent
the service from functioning.
• Configure the scopes on the DHCP server carefully. If you make a mistake, it can affect the entire
network and prevent communication.
If you use a laptop to connect to multiple networks (such as at work and at home), each network might
require a different IP configuration. Windows operating systems support the use of Automatic Private IP
Addressing (APIPA) or an alternate static IP address for this situation.
When you configure Windows-based computers to obtain an IPv4 address from DHCP, use the Alternate
Configuration tab to control the behavior if a DHCP server is not available. By default, Windows uses
APIPA to assign itself an IP address automatically from the 169.254.0.0 to 169.254.255.255 address range,
but with no default gateway or DNS server; this enables limited functionality.
APIPA is useful for troubleshooting DHCP; if the computer has an address from the APIPA range, it is an
indication that the computer cannot communicate with a DHCP server.
Windows Server 2012 also has Windows PowerShell cmdlets that you can use to enable DHCP for an
interface. The following table describes some of the available Windows PowerShell cmdlets that are
available for configuring DHCP on an interface.
Cmdlet Description
Get-NetIPInterface Obtains a list of interfaces and their configuration. This does not include
IPv4 configuration of the interface.
Restart-NetAdapter Disables and re-enables a network adapter. This forces a DHCP client to
obtain a new DHCP lease.
The following code is an example of how you can enable DHCP for the adapter Local Area Connection,
and ensure that it receives an address:
Ipconfig
Ipconfig is a command-line tool that displays
the current TCP/IP network configuration.
Additionally, you can use the ipconfig command
to refresh DHCP and DNS settings. The following
table describes the command-line options for
ipconfig.
Command Description
ipconfig /release Release the leased configuration back to the DHCP server
Ping
Ping is a command-line tool that verifies IP-level connectivity to another TCP/IP computer. It sends
ICMP echo request messages and displays the receipt of corresponding echo reply messages. Ping is the
primary TCP/IP command that you use to troubleshoot connectivity; however, firewalls might block the
ICMP messages.
Tracert
Tracert is a command-line tool that identifies the path taken to a destination computer by sending a
series of ICMP echo requests. Tracert then displays the list of router interfaces between a source and a
destination. This tool also determines which router has failed, and what the latency (or speed) is. These
results might not be accurate if the router is busy, because the ICMP packets are assigned a low priority
by the router.
Pathping
Pathping is a command-line tool that traces a route through the network in a manner similar to Tracert.
However, Pathping provides more detailed statistics on the individual steps, or hops, through the network.
Pathping can provide greater detail, because it sends 100 packets for each router, which enables it to
establish trends.
Route
Route is a command-line tool that allows you to view and modify the local routing table. You can use this
to verify the default gateway, which is listed as the route 0.0.0.0. In Windows Server 2012, you can also use
Windows PowerShell cmdlets to view and modify the routing table. The cmdlets for viewing and
modifying the local routing table include Get-NetRoute, New-NetRoute, and Remove-NetRoute.
MCT USE ONLY. STUDENT USE PROHIBITED
5-20 Implementing IPv4
Telnet
You can use the Telnet Client feature to verify whether a server port is listening. For example, the
command telnet 10.10.0.10 25 attempts to open a connection with the destination server, 10.10.0.10, on
port 25, SMTP. If the port is active and listening, it returns a message to the Telnet client.
Netstat
Netstat is a command-line tool that enables you to view network connections and statistics. For example,
the command netstat –ab returns all listening ports and the executable that is listening.
Resource Monitor
Resource Monitor is a graphical tool that allows you to monitor system resource utilization. You can use
Resource Monitor to view TCP and UDP ports that are in use. You can also verify which applications are
using specific ports and the amount of data that they are transferring on those ports.
Network Diagnostics
Use Windows Network Diagnostics to diagnose and correct networking problems. In the event of a
Windows Server networking problem, the Diagnose Connection Problems option helps you diagnose
and repair the problem. Windows Network Diagnostics returns a possible description of the problem and
a potential remedy. However, the solution might require manual intervention from the user.
Event Viewer
Event logs are files that record significant events on a computer, such as when a process encounters an
error. When these events occur, the Windows operating system records the event in an appropriate event
log. You can use Event Viewer to read the event log. IP conflicts, which might prevent services from
starting, are listed in the System event log.
Cmdlet Purpose
Cmdlet Purpose
Get-DNSClientCache Obtains the list of resolved DNS names that are stored in the DNS
client cache.
Get-DNSClientServerAddress Obtains the list of DNS servers that are used for each interface.
To troubleshoot network communication problems, you need to understand the overall communication
process. You can identify where the process is breaking down and preventing communication only if you
understand how the overall communication process works. To understand the overall communication
process, you need to understand the routing and firewall configuration on your network. To help identify
the routing path through your network, you can use tracert.
Some of the steps that you can use to identify that cause of network communication problems are:
1. If you know what the correct network configuration for the host should be, then use ipconfig to
verify that it is configured that way. If ipconfig returns an address on the 169.254.0.0/16 network, it
indicates that the host failed to obtain an IP address from DHCP.
2. Use ping to see if the remote host responds. If you use ping to return the DNS name of the remote
host, you verify both name resolution and whether the host responds. Be aware that Windows
Firewall on member servers and client computers often blocks ping attempts. In such a case, lack of a
ping response may not indicate that the remote host is not functional. If you can ping other remote
hosts on the same network, it often indicates that the problem is on the remote host.
3. You can use an application to test the service you are connecting to on the remote host. For example,
use Windows Internet Explorer® to test connectivity to a web server. You can also use Telnet to
connect to the port of the remote application.
4. Use ping to see if the default gateway responds. Most routers respond to ping requests. If you do not
get a response when you ping the default gateway, then there is likely a configuration error on the
client computer, such as the default gateway being configured incorrectly. It is also possible that the
router is experiencing errors.
MCT USE ONLY. STUDENT USE PROHIBITED
5-22 Implementing IPv4
Note: You can force ping to use IPv4 instead of IPv6 by using the -4 option.
Question: Are there any other steps that you use to troubleshoot network connectivity
problems?
The Frame Summary pane displays all captured packets, and provides the following information:
• Time and date: this enables you to determine in which order the packets were transmitted.
• Source and destination: this provides the source and destination IP addresses so that you can
determine which computers are involved in the dialog.
• Protocol name: the highest-level protocol that Network Monitor can identify is listed—for example,
ARP, ICMP, TCP, and SMB. Knowing the high-level protocol enables you to pinpoint which services
might be experiencing or causing the problem that you are troubleshooting.
When you select a frame in the Frame Summary pane, the Frame Details pane updates with the contents
of that particular frame. You can step through the frame’s details, examining the content of each element
as you proceed.
Each layer in the network architecture—from the application on down—encapsulates its data in the
container of the layer below. In other words, an HTTP request is encapsulated in an IPv4 packet, which in
turn is encapsulated in an Ethernet frame.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 5-23
When you have gathered a large amount of data, it can be difficult to determine which frames are
relevant to your specific problem. You can use filtering to show only those frames of interest. For example,
you can select to show only DNS–related packets.
Demonstration Steps
Capture network traffic with Network Monitor
Prepare to perform a packet capture
1. Sign in to LON-SVR2 as Adatum\Administrator with a password of Pa$$w0rd.
2. Open a Windows PowerShell prompt and run the following command:
o ipconfig /flushdns
2. Expand the Icmp portion of the packet to view that it is an Echo Request. This is a ping request.
3. Expand the Ipv4 portion of the packet to view the source and destination IP addresses.
4. Expand the Ethernet portion of the packet to view the source and destination MAC addresses.
After a security review, your manager has asked you to calculate new subnets for the branch office to
support segmenting network traffic. You also need to troubleshoot a connectivity problem on a server in
the branch office.
Objectives
After completing this lab, you will be able to:
Lab Setup
Estimated Time: 45 minutes
Password: Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:
1. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Hyper-V® Manager, click 20410B-LON-DC1, and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
o Password: Pa$$w0rd
The current network for your branch office is 192.168.98.0/24. This network needs to be subdivided into
three subnets as follows:
Task 1: Calculate the bits required to support the hosts on each subnet
1. How many bits are required to support 100 hosts on the client subnet?
2. How many bits are required to support 10 hosts on the server subnet?
3. How many bits are required to support 40 hosts on the future expansion subnet?
6. How many host bits will you use for each subnet? Use the simplest allocation possible, which is one
large subnet and two equal sized smaller subnets.
o The client subnet is using 7 bits for the host ID. Therefore, you will use 25 bits for the subnet
mask.
Binary Decimal
2. Given the number of host bits allocated, what is the subnet mask that you will use for the server
subnet? Calculate the subnet mask in binary and decimal.
o The server subnet is using 6 bits for the host ID. Therefore, you will use 26 bits for the subnet
mask.
Binary Decimal
3. Given the number of host bits allocated, what is the subnet mask that you will use for the future
expansion subnet? Calculate the subnet mask in binary and decimal.
o The future expansion subnet is using 6 bits for the host ID. Therefore, you will use 26 bits for the
subnet mask.
Binary Decimal
MCT USE ONLY. STUDENT USE PROHIBITED
5-26 Implementing IPv4
4. For the client subnet, define the network ID, first available host, last available host, and broadcast
address. Assume that the client subnet is the first subnet allocated from the available address pool.
Calculate the binary and decimal versions of each address.
Network ID
First host
Last host
Broadcast
5. For the server subnet, define the network ID, first available host, last available host, and broadcast
address. Assume that the server subnet is the second subnet allocated from the available address
pool. Calculate the binary and decimal versions of each address.
Network ID
First host
Last host
Broadcast
6. For the future allocation subnet, define the network ID, first available host, last available host, and
broadcast address. Assume that the future allocation subnet is the third subnet allocated from the
available address pool. Calculate the binary and decimal versions of each address.
Network ID
First host
Last host
Broadcast
Results: After completing this exercise, you will have identified the subnets required to meet the
requirements of the lab scenario.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 5-27
o Ipconfig
o Ping
o Tracert
o Route
o Network Monitor
2. When you have repaired the problem, ping LON-DC1 from LON-SVR2 to confirm that the problem is
resolved.
Note: If you have additional time, run an additional break script from
\\LON-DC1\E$\Labfiles\Mod05 and troubleshoot that problem.
Results: After completing this lab, you will have resolved an IPv4 connectivity problem.
2. In the Virtual Machines list, right-click 20410B-LON-DC1, and then click Revert.
• Allow for growth when planning IPv4 subnets. This ensures that you do not need to change you IPv4
configuration scheme.
• Define purposes for specific address ranges and subnets. This allows you to easily identify hosts based
on their IP address and use firewalls to increase security.
• Use dynamic IPv4 addresses for clients. It is much easier to manage the IPv4 configuration for client
computers by using DHCP than with manual configuration.
• Use static IPv4 addresses for servers. When servers have a static IPv4 address, it is easier to identify
where services are located on the network.
IP conflicts
Review Questions
Question: You have just started as a server administrator for a small organization with a
single location. The organization is using the 131.107.88.0/24 address range for the internal
network. Is this a concern?
Question: You are working for an organization that provides web hosting services to other
organizations. You have a single /24 network from your ISP for the web hosts. You are almost
out of IPv4 addresses and have asked ISP for an additional range of addresses. Ideally, you
would like to supernet the existing network with the new network. Are there any specific
requirements for supernetting?
Question: You have installed a new web-based application that runs on a non-standard port
number. A colleague is testing access to the new web-based application, and indicates that
he cannot connect to it. What are the most likely causes of his problem?
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 5-29
Tools
Tool Use for Where to find it
Network Monitor Capture and analyze network traffic Download from Microsoft website
Event Viewer View network related system events Tools in Server Manager
MCT USE ONLY. STUDENT USE PROHIBITED
MCT USE ONLY. STUDENT USE PROHIBITED
6-1
Module 6
Implementing Dynamic Host Configuration Protocol
Contents:
Module Overview 6-1
Module Overview
Dynamic Host Configuration Protocol (DHCP) plays an important role in the Windows Server® 2012
infrastructure. It is the primary means of distributing important network configuration information to
network clients, and it provides configuration information to other network-enabled services, including
Windows® Deployment Services (Windows DS) and Network Access Protection (NAP). To support and
troubleshoot a Windows Server–based network infrastructure, it is important that you understand how to
deploy, configure, and troubleshoot the DHCP server role.
Objectives
After completing this module, you will be able to:
• Install the DHCP server role.
Lesson 1
Installing a DHCP Server Role
Using DHCP can help simplify client computer configuration. This lesson describes the benefits of DHCP,
explains how the DHCP protocol works, and discusses how to control DHCP in a Windows Server 2012
network with Active Directory® Domain Services (AD DS).
Lesson Objectives
After completing this lesson, you will be able to:
With the DHCP server role, you can help to ensure that all clients have appropriate configuration
information, which helps to eliminate human error during configuration. When key configuration
information changes in the network, you can update it using the DHCP server role without having to
change the information directly on each computer.
DHCP is also a key service for mobile users who change networks often. DHCP enables network
administrators to offer complex network-configuration information to nontechnical users, without users
having to deal with their network-configuration details.
DHCP version 6 (v6) stateful and stateless configurations are supported for configuring clients in an IPv6
environment. Stateful configuration occurs when the DHCPv6 server assigns the IPv6 address to the client,
along with additional DHCP data. Stateless configuration occurs when the subnet router assigns the IPv6
address automatically, and the DHCPv6 server only assigns other IPv6 configuration settings.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 6-3
NAP is part of a new toolset that can prevent full access to the intranet for computers that do not comply
with system health requirements. NAP with DHCP helps isolate potentially malware-infected computers
from the corporate network. DHCP NAP enables administrators to ensure that DHCP clients are compliant
with internal security policies. For example, all network clients must be up-to-date and have a valid, up-
to-date antivirus program installed before they are assigned an IP configuration that allows full access to
the intranet.
You can install DHCP as a role on a Server Core installation of Windows Server 2012. A Server Core
installation allows you to create a server with a reduced attack surface. To manage DHCP from the Server
Core, you must install and configure the role from the command-line interface. You also can manage the
DHCP role running on Server Core installation of Windows Server 2012 from a graphical user interface
(GUI)-based console where the DHCP role is installed already.
2. A DHCP Server responds with a DHCPOFFER packet. This packet contains a potential address for the
client.
3. The client receives the DHCPOFFER packet. It might receive packets from multiple servers; in that
case, it usually selects the server that made the fastest response to its DHCPDISCOVER. This typically
is the DHCP server closest to the client. The client then broadcasts a DHCPREQUEST that contains a
server identifier. This informs the DHCP servers that receive the broadcast which server’s DHCPOFFER
the client has chosen to accept.
4. The DHCP servers receive the DHCPREQUEST. Those servers that the client has not accepted use
the message as notification that the client declines that server’s offer. The chosen server stores the IP
address client information in the DHCP database and responds with a DHCPACK message. If for some
reason, the DHCP server cannot provide the address that was offered in the initial DHCPOFFER, the
DHCP server sends a DHCPNAK message.
Client computers also attempt renewal during the startup process. This is because client computers might
have been moved while they were offline; for example, a laptop computer might be plugged into a new
subnet. If renewal is successful, the lease period is reset. The DHCP role on Windows Server 2012 supports
a new feature, DHCP Server Failover protocol. This protocol enables synchronization of lease information
between DHCP servers and increases DHCP service availability. If one DHCP server is not available, the
other DHCP servers continue to service clients in the same subnet.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 6-5
With the DHCP relay agent, the DHCP broadcast packets can be relayed into another IP subnet
across a router. Then, you can configure the DHCP relay agent in the subnet that requires IP addresses.
Additionally, you can configure the agent with the IP address of the DHCP server. The agent can then
capture the client broadcasts and forward them to the DHCP server in another subnet. You can also relay
DHCP packets into other subnets using a router that is compatible with RFC 1542.
Demonstration Steps
Note: Leave all virtual machines in their current state for the next demonstration.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 6-7
Lesson 2
Configuring DHCP Scopes
After you install the DHCP role on a server, you must configure the DHCP scopes. A DHCP scope is the
primary method by which you can configure options for a group of IP addresses. A DHCP scope is based
on an IP subnet, and can have settings specific to hardware or custom groups of clients. This lesson
explains DHCP scopes, and how to manage them.
Lesson Objectives
After completing this lesson, you will be able to:
Note: Remember that the DHCP server, if deployed to the same subnet, consumes an IPv4
address. This address should be excluded from the IPv4 address range.
• IP address range. This property lists the range of addresses that can be offered for lease, and usually
lists the entire range of addresses for a given subnet.
• Subnet mask. This property is used by client computers to determine their location in the
organization’s network infrastructure.
• Exclusions. This property lists single addresses or blocks of addresses that fall within the IP address
range, but that will not be offered for lease.
• Delay. This property is the amount of time to delay before making DHCPOFFER.
MCT USE ONLY. STUDENT USE PROHIBITED
6-8 Implementing Dynamic Host Configuration Protocol
• Lease duration. This property lists the lease duration. Use shorter durations for scopes with limited IP
addresses, and longer durations for more static networks.
• Options. You can configure many optional properties on a scope, but typically you will configure:
o option 003 – Router (the default gateway for the subnet)
IPv6 Scopes
You can configure the IPv6 scope options as a separate scope in the DHCP console’s IPv6 node. The IPv6
node contains several different options that you can modify, and an enhanced lease mechanism.
When configuring a DHCPv6 scope, you must define the following properties:
• Name and description. This property identifies the scope.
• Prefix. The IPv6 address prefix is analogous to the IPv4 address range; in essence, it defines the
network address.
• Exclusions. This property lists single addresses or blocks of addresses that fall within the IPv6 prefix
but will not be offered for lease.
• Preferred lifetimes. This property defines how long leased addresses are valid.
Option
Name
code
1 Subnet mask
3 Router
6 DNS servers
47 NetBIOS scope ID
51 Lease time
33 Static route
43 Vendor-specific information
If DHCP option settings are applied at each level and they conflict, then the option that is applied last
overrides the previously applied setting. For example, if the default gateway is configured at the scope
level, and a different default gateway is applied for a reserved client, then the reserved client setting
becomes the effective setting.
You can also configure address assignment policies at the server level or scope level. Address
assignment policy contains a set of conditions that you define in order to lease different DHCP IP
addresses and settings to different types of DHCP clients, such as computers, laptops, network printers,
or IP phones. The conditions defined in these policies differentiate various types of clients, and include
multiple criteria, such as MAC address or vendor information.
In this demonstration, you will see how to configure scope and scope options in DHCP.
Demonstration Steps
o Length: 16
o Exclusions: 172.16.0.190-172.16.0.200
3. Use default settings for all other pages, and then activate the scope.
MCT USE ONLY. STUDENT USE PROHIBITED
6-12 Implementing Dynamic Host Configuration Protocol
Lesson 3
Managing a DHCP Database
The DHCP database stores information about the IP address leases. If there is a problem, it is important
that you understand how to back up the database and resolve database issues. This lesson explains how to
manage the database and its data.
Lesson Objectives
After completing this lesson, you will be able to:
File Description
Dhcp.tmp Dhcp.tmp is a temporary file that the DHCP database uses as a swap file during
database index maintenance operations. Following a system failure, Dhcp.tmp
sometimes remains in the Systemroot\System32\Dhcp directory.
J50.log and J50.log and J50#####.log are logs of all database transactions. The DHCP
J50#####.log database uses this log to recover data when necessary.
Note: You should not remove or alter any of the DHCP service database files.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 6-13
The DHCP server database is dynamic. It updates as DHCP clients are assigned, or as they release their
TCP/IP configuration parameters. Because the DHCP database is not a distributed database like the
Windows Internet Name Service (WINS) server database, maintaining the DHCP server database is less
complex.
By default, the DHCP database and related registry entries are backed up automatically at 60-minute
intervals. You can change this default interval by changing the value of BackupInterval in the following
registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCPServer\Parameters
• All scopes
• Reservations
• Leases
• All options, including server options, scope options, reservation options, and class options
• All registry keys and other configuration settings (for example, audit log settings and folder location
settings) that are set in DHCP server properties. These settings are stored in the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCPServer\Parameters
To back up this key, open Registry Editor and save the specified key to a text file.
Note: The DNS dynamic update credentials (user name, domain, and password) that the
DHCP server uses when registering DHCP client computers in DNS are not backed up with any
backup method.
MCT USE ONLY. STUDENT USE PROHIBITED
6-14 Implementing Dynamic Host Configuration Protocol
Restoring a Database
If you need to restore the database, use the Restore function in the DHCP server console. You will be
prompted for the backup’s location. Once you have selected the location, DHCP service stops, and the
database is restored. To restore the database, the user account must either have administrative-level
permissions, or be a member of the DHCP administrators group.
Backup Security
When the DHCP database file is backed up, it should be in a protected location that only the DHCP
administrators can access. This ensures that any network information in the backup files remains
protected.
Using Netsh
You also can use commands in the Netsh DHCP context to back up the database; this is useful for backing
up the database to a remote location using a script file.
The following command is a script that you can use from the Netsh DHCP prompt to back up the DHCP
data for all scopes:
Note: The Netsh DHCP context does not exist on server computers that do not have the
DHCP server role installed.
Lesson 4
Securing and Monitoring DHCP
DHCP protocol has no built-in method for authenticating users. This means that if you do not take
precautions, IP leases could be granted to devices and users who are unauthorized.
DHCP is a core service in many organization’s network environments. If the DHCP service is not working
properly, or if there is a situation that is causing problems with the DHCP server, it is important that you
can identify the problem and determine potential causes to resolve the problem.
This lesson explains how to prevent unauthorized users from obtaining a lease, how to manage
unauthorized DHCP servers, and how to configure DHCP servers so that a specific group can manage
them.
Lesson Objectives
After completing this lesson, you will be able to:
• Enabling audit logging on all DHCP servers: This can provide an historical view of activity, in addition
to allowing you to trace when an unauthorized user obtained an IP address in the network. Make sure
to schedule time at regular intervals to review the audit logs.
• Requiring authenticated Layer 2 connections to the network: Most enterprise hardware switches now
support Institute of Electrical and Electronics Engineers, Inc. (IEEE) 802.1X authentication. This allows
for port-level user authentication. Secure wireless standards, such as Wi-Fi Protected Access (WPA)
Enterprise and WPA2 Enterprise, also use 802.1X authentication.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 6-17
• Implementing NAP: NAP allows administrators to validate that a client computer is compliant with
system health requirements, such as running all the latest Windows operating system updates, or
running an up-to-date antivirus client. If users who do not meet security requirements try to access
the network, they receive an IP address configuration to access a remediation network where they
can receive the necessary updates. The administrator can restrict access to the network by allowing
only healthy computers access to the internal local area network (LAN).
You can use the DHCP Server Locator utility (Dhcploc.exe) to locate the DHCP servers that are active on a
subnet.
Field Description
Date The date on which the entry was logged on the DHCP server.
Time The time at which the entry was logged on the DHCP server.
MAC Address The MAC address used by the client’s network adapter hardware.
• 55,06/22/99,22:45:38,Authorized(servicing),,domain1.local
You have recently accepted a promotion to the server support team. One of your first assignments is to
configure the infrastructure service for a new branch office. As part of this assignment, you need to
configure a DHCP server that will provide IP addresses and configuration to client computers. Servers are
configured with static IP addresses and do not use DHCP.
Objectives
After completing this lab, you will be able to:
• Implement DHCP.
• Implement a DHCP relay agent (optional).
Lab Setup
Estimated Time: 45 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must
complete the following steps:
1. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Microsoft Hyper-V® Manager, click 20410B-LON-DC1, and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
o Password: Pa$$w0rd
o Domain: Adatum
6. For the optional Exercise 2, you should repeat steps 2 to 4 for 20410B-LON-RTR and
20410B-LON-CL2.
MCT USE ONLY. STUDENT USE PROHIBITED
6-22 Implementing Dynamic Host Configuration Protocol
One of the client computers in the branch office needs to access an accounting application in the head
office. The network team uses firewalls based on IP addresses to restrict access to this application. The
network team has requested that you assign a static IP address to this client computer. Rather than
configuring a static IP address on the client computer manually, you decide to create a reservation in
DHCP for the client computer.
Task 1: Install the Dynamic Host Configuration Protocol (DHCP) server role
1. Switch to LON-SVR1.
o Length: 16
Task 3: Configure client to use DHCP, and then test the configuration
1. Switch to LON-CL1.
3. Open the Command Prompt window, and initiate the DHCP process using the ipconfig /renew
command.
4. To test the configuration, verify that LON-CL1 has received an IP address from the DHCP scope by
typing ipconfig /all in the Command Prompt window.
This command will return information such as IP address, subnet mask, and DHCP enabled status,
which should be Yes.
5. Create a new reservation for LON-CL1 using the physical address of the LON-CL1 network adapter,
and the IP address 172.16.0.155.
6. On LON-CL1, use the ipconfig command to renew and then verify the IP address.
Results: After completing this exercise, you will have implemented DHCP, configured DHCP scope and
options, and configured a DHCP reservation.
3. Use the following steps to add the DHCP relay agent to the router:
o In the navigation pane, expand IPv4, right-click General and then click New Routing Protocol.
o In the Routing protocols list, click DHCP Relay Agent, and then click OK.
o In the navigation pane, right-click DHCP Relay Agent, and then click New Interface.
o In the New Interface for DHCP Relay Agent dialog box, click Local Area Connection 2, and
then click OK.
o In the DHCP Relay Agent Properties – Local Area Connection 2 Properties dialog box,
click OK.
o Right-click DHCP Relay Agent, and then click Properties.
o In the DHCP Relay Agent Properties dialog box, in the Server address box, type 172.16.0.21,
click Add, and then click OK.
1. Switch to LON-SVR1.
2. Open the DHCP console.
3. In DHCP, in the navigation pane, expand lon-svr1.adatum.com, expand IPv4, right-click IPv4, and
then click New Scope.
o Length: 16
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 6-25
o Exclusions: 10.10.0.190-10.10.0.200
7. Open the Network and Sharing Center window and configure Local Area Connection, Internet
Protocol Version 4 (TCP/IPv4) properties with following settings:
ipconfig /renew
10. Verify that IP address and DNS server settings on LON-CL2 are obtained from DHCP Server scope
installed on LON-SVR1.
Results: After completing this exercise, you will have implemented a DHCP relay agent.
2. In the Virtual Machines list, right-click 20410B-LON-DC1, and then click Revert.
• Determine which devices need DHCP reservations, such as network printers, network scanners, or IP-
based cameras.
• Secure your network from unauthorized DHCP servers.
• Configure the DHCP database on highly available disk drive configurations, such as redundant array
of independent disks (RAID)-5 or RAID-1, to provide DHCP service availability in case of single disk
failure.
• Back up the DHCP database regularly, and test the restore procedure in an isolated, non-production
environment.
• Monitor the system utilization of DHCP servers, and upgrade the DHCP server hardware if needed to
provide better service performance.
Review Questions
Question: You have two subnets in your organization and want to use DHCP to allocate
addresses to client computers in both subnets. You do not want to deploy two DHCP servers.
What factors must you consider?
Question: Your organization has grown, and your IPv4 scope is almost out of addresses.
What should you do?
Question: What information do you require to configure a DHCP reservation?
Question: Can you configure option 003 – Router as a Server-level DHCP scope option?
Tools
Tool Use for Where to find it
DHCP Graphical User Interface for managing DHCP Server Server Manager
PowerShell Command line interface for managing DHCP Server Windows Taskbar on
the Desktop
Regedit.exe Editing and fine-tuning settings, including those for Windows interface or
the DHCP server role Command-line
MCT USE ONLY. STUDENT USE PROHIBITED
7-1
Module 7
Implementing Domain Name System
Contents:
Module Overview 7-1
Module Overview
Name resolution is the process of software translating between names that users can read and
understand, and numerical IP addresses, which are necessary for TCP/IP communications. Because of
this, name resolution is one of the most important concepts of every network infrastructure. You can
think about DNS as being like the Internet’s phone book for computers. Client computers use the name
resolution process when locating hosts on the Internet and when locating other hosts and services in
an internal network. Doman Name System (DNS) is one of the most common technologies for name
resolution. Active Directory® Domain Services (AD DS) depends heavily on DNS, as does Internet traffic.
This module discusses some basic name resolution concepts, and installing and configuring a DNS Server
service and its components.
Objectives
After completing this module, you will be able to:
• Describe name resolution for Windows® operating system clients and Windows Server® servers.
• Install and manage DNS Server service.
Lesson 1
Name Resolution for Windows Clients and Servers
You can configure a computer to communicate over a network by using a name in place of an IP address.
The computer then uses name resolution to find an IP address that corresponds to a name, such as a host
name. This lesson focuses on different types of computer names, the methods used to resolve them, and
how to troubleshoot problems with name resolution.
Lesson Objectives
After completing this lesson you will be able to:
• Describe DNS.
Name Type
The type of name (host name or NetBIOS name) that an application uses is determined by the application
developer. If the application developer designs an application to request network services through
Windows sockets, then host names are used. If, on the other hand, the application developer designs
an application to request services through NetBIOS, a NetBIOS name is used. Most current applications,
including Internet applications, use Windows sockets—and thus use host names—to access network
services. NetBIOS is used by many earlier Windows operating system applications.
Earlier versions of Windows operating systems, such as Microsoft® Windows 98 and Windows Millennium
Edition, require NetBIOS to support networking capabilities such as file sharing. However, since Microsoft
Windows 2000, all operating systems support NetBIOS for backward compatibility with earlier versions of
Windows, but do not require NetBIOS themselves.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 7-3
Note: You can use Windows sockets applications to specify the destination host either by IP
address or by host name. NetBIOS applications require the use of a NetBIOS name.
Host Names
A host name is a user-friendly name that is associated with a computer’s IP address to identify it as a
TCP/IP host. The host name can be up to 255 characters long, and can contain alphabetic and numeric
characters, periods, and hyphens.
You can use host names in various forms. The two most common forms are as an alias, and as a fully
qualified domain name (FQDN). An alias is a single name that is associated with an IP address, such as
payroll. You can combine an alias with a domain name to create an FQDN. An FQDN is structured for use
on the Internet, and includes periods as separators. An example of an FQDN is payroll.contoso.com.
NetBIOS Names
A NetBIOS name is a 16-character name that identifies a NetBIOS resource on the network. A NetBIOS
name can represent a single computer or a group of computers. The first 15 characters are used for the
name; the final character identifies the resource or service that is being referred to on the computer. The
15-character name may include the computer name, the domain name, and the name of the user who is
logged on. The sixteenth character is a 1-byte hexadecimal identifier.
The NetBIOS namespace is flat, meaning that names can be used only once within a network. You cannot
organize NetBIOS names into a hierarchical structure, as you can with FQDNs.
Additional Reading: For more information about NetBIOS name resolution, see NetBIOS
Name Resolution at http://go.microsoft.com/fwlink/?LinkId=269710.
What Is DNS?
DNS is a service that resolves FQDNs and other
host names to IP addresses. All Windows Server
operating systems include a DNS Server service.
DNS uses a database (stored in a file or in AD DS) of names and IP addresses to provide this service.
DNS client software performs queries on and updates to the DNS database. For example, within an
organization, a user who is trying to locate a print server can use the DNS name printserver.contoso.com,
and the DNS client software will resolve the name to a printer’s IP address, such as 172.16.23.55. Even if
the printer’s IP address changes, the user-friendly name can remain the same.
MCT USE ONLY. STUDENT USE PROHIBITED
7-4 Implementing Domain Name System
Originally, there was one file on the Internet that contained a list of all domain names and their
corresponding IP addresses. This list quickly became too long to manage and distribute. DNS was
developed to solve the problems associated with using a single internet file. With the adoption of IPv6,
DNS becomes even more important, because IPv6 addresses are even more complex than IPv4 addresses
(for example, 2001:db8:4136:e38c:384f:3764:b59c:3d97).
DNS groups information about network resources into a hierarchical structure of domains. The
hierarchical structure of domains is an inverted tree structure beginning with a root domain at its apex,
and descending into separate branches with common levels of parent domains, and descending
downward even further into individual child domains. The representation of the entire hierarchical
domain structure is known as a DNS namespace.
The Internet uses a single DNS namespace with multiple root servers. To participate in the Internet DNS
namespace, a domain name must be registered with a DNS registrar. This ensures that no two
organizations attempt to use the same domain name.
If hosts that are located on the Internet do not need to resolve names in your domain, you can host a
domain internally, without registering it. However, you must still ensure that the domain name is unique
from Internet domain names, or connectivity to Internet resources might be affected. A common way to
ensure uniqueness is to create an internal domain in the .local domain. The .local domain is reserved for
internal use in much the same way that private IP addresses are reserved for internal use.
In addition to resolving host names to IP addresses, DNS can be used to:
• Locate domain controllers and global catalog servers. This is used when logging on to AD DS.
• Resolve IP addresses to host names. This is useful when a log file contains only the IP address of a
host.
• Locate a mail server for email delivery. This is used for the delivery of all Internet email.
The most commonly used types of zones in Windows Server DNS are forward lookup zones and reverse
lookup zones.
Many standard Internet protocols rely on reverse zone lookup data to validate forward zone information.
For example, if the forward lookup indicates that training.contoso.com is resolved to 192.168.2.45, you
can use a reverse lookup to confirm that 192.168.2.45 is associated with training.contoso.com.
Note: In Windows Server 2008 R2 and Windows Server 2012, you can also use DNSSec
technology to perform similar type of verification.
Many email servers use a reverse lookup as one way of reducing spam. By performing a reverse lookup,
email servers try to detect open Simple Mail Transfer Protocol (SMTP) servers (open relays).
Having a reverse zone is important if you have applications that rely on looking up hosts by their IP
addresses. Many applications record this information in security or event logs. If you see suspicious activity
from a particular IP address, you can look up the host name using the reverse zone information.
Resource Records
The DNS zone file stores resource records. Resource records specify a resource type, and the IP address to
locate the resource. The most common resource record is a host (A) resource record. This is a simple
record that resolves a host name to an IP address. The host can be a workstation, server, or another
network device, such as a router.
Resource records also help find resources for a particular domain. For instance, when a Microsoft
Exchange Server needs to find the server that is responsible for delivering mail for another domain, it
requests the mail exchanger (MX) resource record for that domain. This record points to the host (A)
resource record of the host that is running the SMTP mail service.
Resource records also can contain custom attributes. MX records, for instance, have a preference attribute,
which is useful if an organization has multiple mail servers. The MX record tells the sending server which
mail server the receiving organization prefers. SRV records also contain information regarding on which
port the service is listening, and the protocol that you should use to communicate with the service.
To see how these servers work together to resolve a DNS name, look at the following name resolution
process for the name www.microsoft.com:
1. A workstation queries the local DNS server for the IP address www.microsoft.com.
2. If the local DNS server does not have the information, then it queries a root DNS server for the
location of the .com DNS servers.
3. The local DNS server queries a .com DNS server for the location of the microsoft.com DNS servers.
4. The local DNS server queries the microsoft.com DNS server for the IP address of www.microsoft.com.
5. The IP address of www.microsoft.com is returned to the workstation.
• Forwarding. Instead of querying root servers, you can configure a DNS server to forward DNS
requests to another DNS server. For example, requests for all Internet names can be forwarded to a
DNS server at an Internet service provider (ISP).
LLMNR is supported on Windows Vista®, Windows Server 2008, and all newer Windows operating
systems. It uses a simple system of request and reply messages to resolve computer names to IPv6 or IPv4
addresses. For a node to respond to a LLMNR request Network Discovery must be enabled, but Network
Discovery is not needed just to make a request for name resolution.
To use LLMNR, you need to turn on the Network Discovery feature for all nodes on the local subnet. This
feature is available in the Network and Sharing Center. Be aware that Network Discovery is usually
disabled for any network that you designate as Public.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 7-7
If you want to control the use of LLMNR on your network, you can configure it via Group Policy. To
disable LLMNR via Group Policy, set the following Group Policy value:
DNS
As previously discussed, DNS is the Microsoft
standard for resolving host names to IP Addresses.
For more information on DNS, refer back to
second topic of this Lesson, What Is DNS.
WINS
WINS provides a centralized database for
registering dynamic mappings of a network’s NetBIOS names. Windows operating systems retain support
for WINS to provide backward compatibility.
• Broadcast messages. Broadcast messages, however, do not work well on large networks because
routers do not propagate broadcasts.
• Lmhosts file on all computers. Using an Lmhosts file for NetBIOS name resolution is a high
maintenance solution, because you must maintain the file manually on all computers.
• Hosts file on all computers. Similar to an Lmhosts file, you can also use a hosts file for NETBIOS name
resolution. This file is also stored locally on each machine, and it is used for fixed mappings of names
to IP addresses, on local network segment.
Note: The DNS server role in Windows Server 2008 R2 and Windows Server 2012 also
provides a new zone type, the GlobalNames zone. You can use GlobalNames zone to resolve
single-label names that are unique across an entire forest. This eliminates the need to use the
NetBIOS-based WINS to provide support for single-label names.
Windows operating systems resolve host names by performing the following tasks in this specific order:
1. Checking whether the host name is the same as the local host name.
2. Searching the DNS resolver cache. In the DNS client resolver cache, entries from hosts file are
preloaded.
4. Converting the host name to a NetBIOS name and checking the local NetBIOS name cache.
5. Contacting the host’s configured WINS servers.
6. Broadcasting as many as three NetBIOS name query request messages on the subnet that is attached
directly.
Note: You can control the order used to resolve names. For example, if you disable
NetBIOS over TCP/IP, none of the NetBIOS name resolution methods are attempted.
Alternatively, you can modify the NetBIOS node type, which changes the order in which the
NetBIOS name resolution methods are attempted.
• Nslookup: Use this tool to query DNS information. The tool is flexible and can provide valuable
information about DNS server status. You also can use it to look up resource records and validate
their configuration. Additionally, you can test zone transfers, security options, and MX record
resolution.
• DNSCmd: Use this command-line tool to manage the DNS server role. This tool is useful in scripting
batch files to help automate routine DNS management tasks or to perform simple unattended setup
and configuration of new DNS servers on your network.
• Dnslint: Use this tool to diagnose common DNS issues. This tool diagnoses configuration issues in
DNS quickly, and can generate a report in HTML format regarding the status of the domain that you
are testing.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 7-9
• Ipconfig: Use this command to view and modify IP configuration details that the computer uses. This
tool includes additional command-line options that you can use to troubleshoot and support DNS
clients. You can view the client local DNS cache using the command ipconfig/displaydns, and you
can clear the local cache using ipconfig/flushdns. If you want to reregister a host in DNS, you can
use ipconfig /registerdns.
• Monitoring on DNS server: To test if the server can communicate with upstream servers, you can
perform simple local queries and recursive queries from the DNS server Monitoring tab. You also can
schedule these tests for regular intervals. The DNS server Monitoring tab is available only in
Windows Server 2008 and Windows Server 2012 in the DNS Server Name Properties dialog box.
In Windows Server 2012 there is a new set of Windows PowerShell® cmdlets in that you can use for DNS
client and server management. Some of the most commonly used cmdlets are as follows:
• Clear-DNSClientCache. This cmdlet clears the client cache, similar to ipconfing /flushdns.
• Get-DNSClient. This cmdlet displays the details of the network interfaces.
• Get-DNSClientCache. This cmdlet displays the content of the local DNS client cache.
• Register-DNSClient. This cmdlet registers all of the IP addresses on the computer onto the
configured DNS server.
• Resolve-DNSName. This cmdlet performs a DNS name resolution for a specific name, similar to
Nslookup.
• Set-DNSClient. This cmdlet sets the interface-specific DNS client configurations on the computer.
These cmdlets also let you use several switches and options with them, thereby providing additional
options and functionalities.
1. Open an elevated command prompt, and then clear the DNS resolver cache by typing ipconfig
/flushdns. Alternatively, you can open Windows PowerShell and use the equivalent cmdlet
Clear-DNSClientCache.
2. Attempt to ping the remote host by its IP address. This helps identify whether the issue is related to
name resolution. If the ping succeeds with the IP address but fails by its host name, then the problem
is related to name resolution.
3. Attempt to ping the remote host by its host name. For accuracy, use the FQDN with a trailing period.
For example, if you were working at Contoso, Ltd, you would enter the following command at the
command prompt: Ping LON-dc1.contoso.com.
4. If the ping is successful, then the problem is most likely not related to name resolution. If the ping is
unsuccessful, edit the C:\windows\system32\drivers\etc\hosts text file, and add the appropriate entry
to the end of the file. In the previous Contoso, Ltd example, you would add the following line and
save the file:
10.10.0.10 LON-dc1.contoso.com
5. Perform the Ping-by-host-name test once more. Name resolution should now be successful. Verify
that the name was resolved correctly by examining the DNS resolver cache. To display the DNS
resolver cache, at a command prompt type IPConfig /displaydns, or use the equivalent Windows
PowerShell cmdlet.
MCT USE ONLY. STUDENT USE PROHIBITED
7-10 Implementing Domain Name System
6. Remove the entry that you added to the hosts file, and then clear the resolver cache once more.
7. At the command prompt, type the following command, and then examine the contents of the
filename.txt file to identify the failed stage in name resolution:
Note: You also should know how to interpret the DNS resolver cache output so that you
can identify whether the name resolution problem lies with the client computer’s configuration,
the name server, or the configuration of records within the name server zone database.
Interpreting the DNS resolver cache output is beyond the scope of this lesson.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 7-11
Lesson 2
Installing and Managing a DNS Server
To use a DNS Server service, you must first install it. Installing the DNS Server service on a DNS server is a
simple procedure. To manage your DNS Server service, it is important that you understand the DNS server
components and their purpose. In this lesson, you will learn about DNS components, and about how to
install and manage the DNS Server role.
Lesson Objectives
After completing this lesson, you will be able to:
DNS Server
A DNS server answers recursive and iterative
DNS queries. DNS servers also can host one or
more zones of a particular domain. Zones contain
different resource records. DNS servers also can
cache lookups to save time for common queries.
DNS Resolver
The DNS resolver generates and sends iterative or recursive queries to the DNS Server. A DNS resolver can
be any computer that is performing a DNS lookup requiring interaction with the DNS server. DNS servers
also can issue DNS requests to other DNS servers.
MCT USE ONLY. STUDENT USE PROHIBITED
7-12 Implementing Domain Name System
When a DNS server communicates with a root hint server, it uses only an iterative query. If you select the
Do Not Use Recursion For This Domain option (on the DNS server Properties dialog box), the server
will not be able to perform queries on the root hints. If you configure the server using a forwarder, it will
attempt to send a recursive query to its forwarding server; if the forwarding server does not answer this
query, the first server responds that the host could not be found.
It is important to understand that recursion on a DNS server and recursive queries are not the same thing.
Recursion on a DNS server means that the server uses its root hints to try to resolve a DNS query, whereas
a recursive query is a query that is made to a DNS server in which the requester asks the server to assume
the responsibility for providing a complete answer to the query. The next topics discuss recursive queries
in more detail.
Authoritative or Non-Authoritative
Responses
The two types of responses are:
• Authoritative. An authoritative response is one in which the server returns an answer that it knows is
correct, because the request is directed to the authoritative server that manages the domain. A DNS
server is authoritative when it hosts a primary or secondary copy of a DNS zone.
• Non-authoritative. A non-authoritative response is one where the DNS server that contains the
requested domain in its cache answers a query by using forwarders or root hints. Because the answer
provided might not be accurate (because only the authoritative DNS server for the given domain can
issue that information), it is called a non-authoritative response.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 7-13
If the DNS server is authoritative for the query’s namespace, the DNS server checks the zone and then
does one of the following:
Note: An authoritative answer can be given only by the server with direct authority for the
queried name.
If the local DNS server is non-authoritative for the query’s namespace, then the DNS server does one of
the following:
Recursive Queries
In a recursive query, the requester asks the DNS server to obtain a fully resolved IP address of the
requested resource, before returning the answer to the requestor. The DNS server may have to perform
several queries to other DNS servers before it finds the answer. Recursive queries are generally made by a
DNS client to a DNS server, or by a DNS server that is configured to pass unresolved queries to another
DNS server, in the case of a DNS server configured to use a forwarder.
For security reasons, it sometimes is necessary to disable recursive queries on a DNS server. In doing so,
the DNS server in question will not attempt to forward its DNS requests to another server. This is useful
when you do not want a particular DNS server to communicate outside its local network.
Iterative Queries
Iterative queries access domain name information that resides across the DNS system; by using iterative
queries, you can resolve names across many servers quickly and efficiently. When a DNS server receives a
request that it cannot answer using its local information or its cached lookups, it makes the same request
to another DNS server by using an iterative query. When a DNS server receives an iterative query, it might
answer with either the IP address for the domain name (if known), or with a referral to the DNS servers
that are responsible for the domain being queried. The DNS server continues this process until it locates a
DNS server that is authoritative for the queried name, or until an error or time-out condition is met.
MCT USE ONLY. STUDENT USE PROHIBITED
7-14 Implementing Domain Name System
What Is Forwarding?
A forwarder is a network DNS server that forwards
queries for external names to DNS servers outside
of its network. You also can create and use
conditional forwarders to forward queries
according to specific domain names.
Best Practice: Use a central forwarding DNS server for Internet name resolution. This can
improve security because you can isolate the forwarding DNS server in a perimeter network,
which ensures that no server within the network is communicating directly to the Internet.
Conditional Forwarder
A conditional forwarder is a DNS server on a network that forwards DNS queries according to the query’s
DNS domain name. For example, you can configure a DNS server to forward all queries that it receives for
names ending with corp.contoso.com to the IP address of a specific DNS server, or to the IP addresses of
multiple DNS servers. This can be useful when you have multiple DNS namespaces in a forest.
Best Practice: Use conditional forwarders if you have multiple internal namespaces. This
provides for faster name resolution.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 7-15
A caching-only server is the ideal type of DNS server to use as a forwarder. It will not host any DNS zone
data; it only answers lookup requests for DNS clients.
In Windows Server 2012, you can access the content of the DNS server cache by selecting the Advanced
view in the DNS Manager console. When you enable this view, cached content displays as a node in DNS
Manager. You can also delete single entries (or the entire cache) from the DNS server cache. Alternatively,
you can use the Windows PowerShell Get-DNSServerCache cmdlet to view the cache content.
The DNS client cache is stored on the local computer by the DNS client service. To view client-side
caching, at a command prompt run the ipconfig /displaydns command. This will display the local DNS
client cache. If you need to clear the local cache, you can use ipconfig /flushdns. For this purpose you
can also use the Windows PowerShell Get-DNSClientCache and Clear-DNSClientCache cmdlets.
To prevent DNS client caches from being overwritten, use the DNS Cache Locking feature that is available
in Windows Server 2008 R2 and Windows Server 2012. When enabled, the cached records will not be
overwritten for the duration of the time-to-live (TTL) value. Cache locking provides improved security
against cache poisoning attacks.
You can also add the DNS server role when you
promote your server to a domain controller. You
do this from the domain controller Options page
of the Active Directory Domain Services
Installation Wizard.
When you install the DNS server role, the dnscmd.exe command-line tool is also added. You can use the
DNSCmd tool to script and automate DNS configuration. For help with this tool, at the command prompt,
type: dnscmd.exe /?.
In Windows Server 2012, you can also use Windows PowerShell to manage a DNS server. It is
recommended that you use Windows PowerShell cmdlets for command-line-based management of the
DNS server. In addition, you can use the command-line tools Nslookup, DNSCmd, Dnslint, and Ipconfig in
the Windows PowerShell environment.
To administer a remote DNS server, add the Remote Server Administrative tools to your administrative
workstation, which must be running a Windows Vista Service Pack 1 (SP1) or newer Windows operating
system.
• Configure forwarding.
Demonstration Steps
Install a second DNS server
1. Sign in to LON-DC1 and LON-SVR1 as Adatum\Administrator with a password of Pa$$w0rd.
2. On LON-SVR1, open Server Manager.
Configure forwarding
• Configure the DNS Server with a forwarder on IP address 172.16.0.10.
Note: Leave all virtual machines in their current state for the next demonstration.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 7-17
Lesson 3
Managing DNS Zones
The DNS server hosts zone data in an Active Directory database or in the zone file. Also, the DNS server
can host several types of zones. In this lesson, you will learn about DNS zone types and about Active
Directory–integrated DNS zones.
Lesson Objectives
After completing this lesson, you will be able to:
• Secondary
• Stub
• Active Directory–integrated
Primary Zone
A primary zone is a zone for which the DNS
server is both the host and the primary source for
information about this zone. In addition, the DNS
server stores the master copy of zone data either
in a local file or in AD DS. When the DNS server stores the zone in a file, the primary zone file by default is
named zone_name.dns, and is located on the server in the %windir%\System32\Dns folder. When the
zone is not stored in AD DS, this is the only DNS server that has a writable copy of the database.
Secondary Zone
A secondary zone is a zone for which the DNS server is the host, but is the secondary source for zone
information. The information about the zone at this server must be obtained from another remote DNS
server that also hosts the zone. This DNS server must have network access to the remote DNS server to
receive updated zone information. Because a secondary zone is a copy of a primary zone that another
server hosts, the secondary zone cannot be stored in AD DS. Secondary zones can be useful if you are
replicating data from non-Windows DNS zones.
Stub Zone
A stub zone is a replicated copy of a zone that contains only those resource records that are necessary to
identify that zone’s authoritative DNS servers. A stub zone resolves names between separate DNS
namespaces, which might be necessary when a corporate merger requires that the DNS servers for two
separate DNS namespaces resolve names for clients in both namespaces.
MCT USE ONLY. STUDENT USE PROHIBITED
7-18 Implementing Domain Name System
• The delegated zone’s SOA resource record, NS resource records, and A resource records.
• The IP address of one or more master servers that you can use to update the stub zone.
The master servers for a stub zone are one or more DNS servers that are authoritative for the child zone.
Usually this is the DNS server that is hosting the primary zone for the delegated domain name.
• When an administrator runs the command-line command ipconfig /registerdns or executes the
Windows PowerShell cmdlet Register-DNSClient
The process of dynamic updates is as follows:
1. The client identifies a name server and sends an update. If the name server hosts only a secondary
zone, then the name server refuses the client’s update. If the zone is not an Active Directory–
integrated zone, the client may have to do this several times.
2. If the zone supports dynamic updates, the client eventually reaches a DNS server that can write to the
zone. This DNS server is the primary server for a standard, file-based zone, or any domain controller
that is a name server for an Active Directory–integrated zone.
3. If the zone is configured for secure dynamic updates, the DNS server refuses the change. The client
then authenticates and resends the update.
In some configurations, you may not want clients to update their records even in a dynamic update zone.
In this case, you can configure the DHCP server to register the records on the clients’ behalf. By default, a
client registers that it is a (host/address) record, and the DHCP server registers the PTR (pointer/reverse
lookup) record.
By default, Windows operating systems attempt to register their records with their DNS server. You can
modify this behavior in the client IP configuration, or through Group Policy. Domain Controllers also
register their SRV records in DNS, in addition to their host records. SRV records are registered each time
the NETLOGON service starts.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 7-19
• Granular security. As with other Active Directory objects, an Active Directory-integrated zone allows
you to delegate administration of zones, domains, and resource records by modifying the access
control list (ACL) on the zone.
Question: Can you think of any disadvantages to storing DNS information in AD DS?
• Create a record.
Demonstration Steps
Promote LON-SVR1 as an additional domain controller
1. Install the AD DS server role.
2. Start the Active Directory Domain Services Configuration Wizard.
Create a record
• Create a New Host record in Contoso.com zone named www, and have it point to 172.16.0.100.
Your manager has asked you to configure the domain controller in the branch office as a DNS server. You
have also been asked to create some new host records to support a new application that is being
installed. Finally, you need to configure forwarding on the DNS server in the branch office to support
Internet name resolution.
Objectives
After completing this lab you will be able to:
Lab Setup
Estimated Time: 40 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must
complete the following steps:
1. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Hyper-V® Manager, click 20410B-LON-DC1, and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
o Password: Pa$$w0rd
o Domain: Adatum
1. Configure LON-SVR1 as a domain controller without installing the Domain Name System (DNS) server
role.
3. Review configuration settings on the existing DNS server to confirm root hints.
4. Add the DNS server role for the branch office on the domain controller.
Task 4: Add the DNS server role for the branch office on the domain controller
• Use Server Manager to add the DNS Server role to LON-SVR1.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 7-23
2. Expand Forward Lookup Zones, and verify that both the Adatum.com and _msdcs.Adatum.com
zones are replicated.
If you do not see these zones, open Active Directory Sites and Services, force replication between
LON-DC1 and LON-SVR1, and then try again.
3. Open a Windows PowerShell window on LON-SVR1, and try to resolve www.nwtraders.msft with
the Resolve-DNSName cmdlet.
Results: After completing this exercise, you will have installed and configured DNS on LON-SVR1.
2. Create several host records in the Adatum.com domain for web apps.
3. Open the Properties dialog box for the Local Area Network Connection adapter.
4. Configure the preferred DNS server to be 172.16.0.21.
MCT USE ONLY. STUDENT USE PROHIBITED
7-24 Implementing Domain Name System
Task 2: Create several host records in the Adatum.com domain for web apps
1. On LON-DC1, open DNS Manager.
Task 4: Use the ping command to locate new records from LON-CL1
1. On LON-CL1, open a Command Prompt window.
2. Ping www.adatum.com. Ensure that ping resolves this name to 172.16.0.100.
3. Ping ftp.adatum.com. Make sure that ping resolves this name to 172.16.0.200.
Results: After completing this exercise, you will have configured DNS records.
Task 1: Use the ping command to locate an Internet record from LON-CL1
1. On LON-CL1, in the Command Prompt window use ping to locate www.nwtraders.msft.
2. Ensure that the name resolves to an IP address, and document the IP address.
5. Note that you will still have this record resolved with the old IP.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 7-25
2. Browse the content of the Cached Lookups container for msft namespace.
2. Retry the ping to www.nwtraders.msft on LON-CL1 (The result will still return the old IP address.)
3. Clear the client resolver cache on LON-CL1 by typing ipconfig /flushdns in a Command Prompt
window.
Results: After completing this exercise, you will have examined the DNS server cache.
Question: You are deploying DNS servers into an Active Directory domain, and your customer
requires that the infrastructure is resistant to single points of failure. What must you consider
when planning the DNS configuration?
Tools
Name of tool Used for Where to find it
Best Practices
When implementing DNS, use the following best practices:
Module 8
Implementing IPv6
Contents:
Module Overview 8-1
Module Overview
IPv6 is a technology that helps the Internet support a growing user base and an increasingly large
number of IP-enabled devices. IPv4 has been the underlying Internet protocol for almost thirty years.
Its robustness, scalability, and limited feature set is now challenged by the growing need for new IP
addresses. This is due in large part to the rapid growth of new network-aware devices.
Objectives
After completing this module, you will be able to:
• Describe the features and benefits of IPv6.
Lesson 1
Overview of IPv6
IPv6 has been included with Windows® client operating systems and servers beginning with Windows
Server® 2008 and Windows Vista®. The use of IPv6 is becoming more common on corporate networks
and parts of the Internet.
It is important for you to understand how this technology affects current networks, and how to integrate
IPv6 into those networks. This lesson discusses the benefits of IPv6, and how it differs from IPv4.
Lesson Objectives
After completing this lesson, you will be able to:
Benefits of IPv6
IPv6 support is included in Windows Server 2012
and Windows 8. The following list of benefits
describes why IPv6 is being implemented.
End-to-End Communication
One of the design goals for IPv6 is to provide sufficient address space so that you do not have to use
translation mechanisms such as network address translation (NAT). This simplifies communication because
IPv6 hosts can communicate directly with each other over the Internet. This also simplifies support for
applications such as video conferencing and other peer-to-peer applications. However, many
organizations may choose to continue using translation mechanisms as a security measure.
Extensibility
IPv6 has been designed so that developers can extend it with much fewer constraints than IPv4. As a
network administrator, you will not be extending IPv6, but applications that you purchase may take
advantage of this to enhance IPv6 functionality.
IPv4 IPv6
Address Resolution Protocol (ARP) uses ARP Request frames are replaced with multicast
broadcast ARP Request frames to resolve an Neighbor Solicitation messages.
IPv4 address to a link-layer address.
Internet Group Management Protocol (IGMP) IGMP is replaced with Multicast Listener Discovery
manages local subnet group membership. (MLD) messages.
Internet Control Message Protocol (ICMP) ICMP Router Discovery is replaced with required
Router Discovery—which is optional— ICMP version 6 (v6) Router Solicitation and Router
determines the IPv4 address of the best default Advertisement messages.
gateway.
Uses host (A) resource records in the DNS to Uses IPv6 host (AAAA) resource records in DNS to
map host names to IPv4 addresses. map host names to IPv6 addresses.
Uses pointer (PTR) resource records in the Uses pointer (PTR) resource records in the
IN-ADDR.ARPA DNS domain to map IPv4 IP6.ARPA DNS domain to map IPv6 addresses to
addresses to host names. host names.
Must support a 576-byte packet size (possibly Must support a 1280-byte packet size (without
fragmented). fragmentation).
2001:DB8:0:2F3B:2AA:FF:FE28:9C5A
This might seem complex for end users, but the assumption is that users will rely on DNS names to resolve
hosts and will rarely type IPv6 addresses manually. The IPv6 address in hexadecimal is also easier to
convert between binary and hexadecimal than it is to convert between binary and decimal. This simplifies
working with subnets, and calculating hosts and networks.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 8-5
Note: You can use the Calculator application included with Windows Server 2012 to
convert between binary, decimal, and hexadecimal numbers.
To convert an IPv6 binary address that is 128 bits long, you break it into eight blocks of 16 bits. You then
convert each of these eight blocks of 16 bits into four hexadecimal characters. For each of the blocks, you
evaluate four bits at a time. You should number each section of four binary numbers 1, 2, 4, and 8,
starting from the right and moving left. That is:
To calculate the hexadecimal value for this section of four bits, add up the value of each bit that is set to
1. In the example of 0010, the only bit that is set to 1 is the bit assigned the value 2. The rest are set to
zero. Therefore, the hexadecimal value of this section of four bits is 2.
The following example is a single IPv6 address in binary form. Note that the binary representation of the
IP address is quite long. The following two lines of binary numbers represents one IP address:
0010000000000001000011011011100000000000000000000010111100111011
0000001010101010000000001111111111111110001010001001110001011010
The 128-bit address is now divided along 16-bit boundaries (eight blocks of 16 bits):
Each block is further broken into sections of four bits. The following table shows the binary and
corresponding hexadecimal values for each section of four bits:
Binary Hexadecimal
[0010][0000][0000][0001] [2][0][0][1]
[0000][1101][1011][1000] [0][D][B][8]
[0000][0000][0000][0000] [0][0][0][0]
MCT USE ONLY. STUDENT USE PROHIBITED
8-6 Implementing IPv6
Binary Hexadecimal
[0010][1111][0011][1011] [2][F][3][B]
[0000][0010][1010][1010] [0][2][A][A]
[0000][0000][1111][1111] [0][0][F][F]
[1111][1110][0010][1000] [F][E][2][8]
[1001][1100][0101][1010] [9][C][5][A]
Each 16-bit block is expressed as four hexadecimal characters, and is then delimited with colons. The
result is as follows:
2001:0DB8:0000:2F3B:02AA:00FF:FE28:9C5A
You can simplify IPv6 representation further by removing the leading zeros within each 16-bit block.
However, each block must have at least a single digit. With leading zero suppression, the address
representation becomes the following:
2001:DB8:0:2F3B:2AA:FF:FE28:9C5A
Compressing Zeros
When multiple contiguous zero blocks occur, you can compress these and represent them in the address
as a double-colon (::); this further simplifies the IPV6 notation. The computer recognizes "::" and
substitutes it with the number of blocks necessary to make the appropriate IPv6 address.
In the following example, the address is expressed using zero compression:
2001:DB8::2F3B:2AA:FF:FE28:9C5A
To determine how many 0 bits are represented by the "::", you can count the number of blocks in the
compressed address, subtract this number from eight, and then multiply the result by 16. Using the
previous example, there are seven blocks. Subtract seven from eight, and then multiply the result (one)
by 16. Thus, there are 16 bits or 16 zeros in the address where the double colon is located.
You can use zero compression only once in a given address. If you use it twice or more, then there is no
way to show how many 0 bits are represented by each instance of the double-colon (::).
To convert an address into binary, use the reverse of the method described previously:
Lesson 2
IPv6 Addressing
An essential part of working with IPv6 is understanding the different address types and when they are
used. This allows you to understand the overall communication process between IPv6 hosts and perform
troubleshooting. You also need to understand the processes available for configuring a host with an IPv6
address to ensure that hosts are configured properly.
Lesson Objectives
After completing this lesson, you will be able to:
When a unicast IPv6 address is assigned to a host, the prefix is 64 bits. The remaining 64-bits are allocated
to the interface identifier, which uniquely identifies the host on that network. The interface identifier can
be either randomly generated, assigned by DHCPv6, or based on the media access control (MAC) address
of the network. By default, the host bits are generated randomly unless assigned by DHCPv6.
Note: The routes on an IPv6 router have varying prefix sizes that are determined by the
size of the network.
MCT USE ONLY. STUDENT USE PROHIBITED
8-8 Implementing IPv6
Note: The network 2001:0db8::/32 is reserved for documentation and is not routable.
• Global routing prefix. This field identifies the global routing prefix for a specific organization’s site.
The combination of the three fixed bits and the 45-bit global routing prefix is used to create a 48-bit
site prefix, which is assigned to an organization’s individual site. Once the assignment occurs, routers
on the IPv6 Internet then forward IPv6 traffic that matches the 48-bit prefix to the routers of the
organization’s site.
• Subnet ID. The Subnet ID is used within an organization’s site to identify subnets. This field’s size is 16
bits. The organization’s site can use these 16 bits within its site to create 65,536 subnets, or multiple
levels of addressing hierarchy, and an efficient routing infrastructure.
• Interface ID. The Interface ID identifies the interface on a specific subnet within the site. This field’s
size is 64 bits. This is either randomly generated or assigned by DHCPv6. In the past, the Interface ID
was based on the MAC address of the network interface card to which the address was bound.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 8-9
To avoid the duplication problems experienced with IPv4 private addresses, the IPv6 unique local address
structure allocates 40 bits to an organization identifier. The 40-bit organization identifier is randomly
generated. The likelihood of two randomly generated 40-bit identifiers being the same is very small. This
ensures that each organization has a unique address space.
The first seven bits of the organization identifier have the fixed binary value of 1111110. All unique local
addresses have the address pref0ix of FC00::/7. The Local (L) flag is set 1 to indicate a local address. An L
flag value set to 0 has not yet been defined. Therefore, unique local addresses with the L flag set to 1 have
the address prefix of FD::/8.
The prefix for link-local addresses is always FE80::/64. The final 64-bits are the interface identifier.
Zone ID
Regardless of the number of network interfaces in the host, each IPv6 host has a single link-local address.
If the host has multiple network interfaces, the same link-local address is reused on each network
interface. To allow hosts to identify link-local communication on each unique network interface, a zone ID
is added to the link-local address.
A zone ID is used in the following format:
Address%zone_ID
MCT USE ONLY. STUDENT USE PROHIBITED
8-10 Implementing IPv6
Each sending host determines the zone ID that it will associate with each interface. There is no negotiation
of zone ID between hosts. For example, on the same network, host A might use 3 for the zone ID on its
interface, and host B might use 6 for the zone ID on its interface.
Each interface in a Windows-based host is assigned a unique interface index, which is an integer. In
addition to physical network cards, interfaces also include loopback and tunnel interfaces. Windows-based
IPv6 hosts use the interface index of an interface as the zone ID for that interface.
In the following example, the interface ID for the network interface is 3.
fe80::2b0:d0ff:fee9:4143%3
Types of Autoconfiguration
Types of autoconfiguration include:
• Both. With both, configuration is based on both receipt of router advertisement messages, and on
DHCPv6.
Stateful Configuration
With stateful configuration, organizations can control how IPv6 addresses are assigned using DHCPv6. If
there are any specific scope options that you need to configure—such as the IPv6 addresses of DNS
servers—then a DHCPv6 server is necessary.
When IPv6 attempts to communicate with a DHCPv6 server, it uses multicast IPv6 addresses. This is
different from with IPv4, which uses broadcast IPv4 addresses.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 8-11
• Tentative. In the tentative state, verification is occurring to determine if the address is unique.
Duplicate address detection performs verification. When an address is in the tentative state, a node
cannot receive unicast traffic.
• Valid. In the valid state, the address has been verified as unique, and can send and receive unicast
traffic.
• Preferred. In the preferred state, the address enables a node to send and receive unicast traffic to and
from it.
• Deprecated. In a deprecated state, the address is valid, but its use is discouraged for new
communication.
• Invalid. In the invalid state, the address no longer allows a node to send or receive unicast traffic.
Demonstration Steps
View IPv6 configuration by using IPconfig
1. Sign in to LON-DC1 and LON-SVR1 as Adatum\Administrator using the password of Pa$$w0rd.
2. On LON-DC1, open a Windows PowerShell® prompt.
3. Use ipconfig to view the link-local IPv6 address on Local Area Connection.
4. Use the Get-NetIPAddress cmdlet to view network configuration.
2. Open the Internet Protocol Version 6 (TCP/IPv6) Properties dialog box, and enter the following:
o Use the following IPv6 address
2. Use ipconfig to view the IPv6 address for Local Area Connection.
3. Use ping -6 to test IPv6 communication with LON-DC1.
Note: Leave all virtual machines in their current state for the subsequent demonstration.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 8-13
Lesson 3
Coexistence with IPv4
From its inception, IPv6 was designed for long-term coexistence with IPv4; in most cases your network will
use both IPv4 and IPv6 for many years. Consequently, you need to understand how they coexist.
This lesson provides an overview of the technologies that support the two IP protocols’ coexistence. This
lesson also describes the different node types and IP stack implementations of IPv6. Finally, this lesson
explains how DNS resolves names to IPv6 addresses and the various types of IPv6 transition technologies.
Lesson Objectives
After completing this lesson, you will be able to:
• IPv6-only node. This is a node that implements only IPv6 (and has only IPv6 addresses) and does not
support IPv4. This node is able to communicate only with IPv6 nodes and applications, and is not
common today. However, it might become more prevalent as smaller devices (such as cellular phones
and handheld computers), use the IPv6 protocol exclusively.
• IPv6/IPv4 node. This is a node that implements both IPv4 and IPv6. Windows Server 2008 and newer
Windows Server operating systems, and Windows Vista and newer Windows client operating systems
use IPv4 and IPv6 by default.
• IPv4 node. This is a node that implements IPv4. It can be an IPv4-only node or an IPv6/IPv4 node.
• IPv6 node. This is a node that implements IPv6. It can be an IPv6-only node or an IPv6/IPv4 node.
Coexistence occurs when the largest number of nodes (IPv4 or IPv6 nodes) can communicate using an
IPv4 infrastructure, an IPv6 infrastructure, or an infrastructure that is a combination of IPv4 and IPv6.
You will achieve true migration when all IPv4 nodes are converted to IPv6-only nodes. However, for the
foreseeable future, you can achieve practical migration when as many IPv4-only nodes as possible are
converted to IPv6/IPv4 nodes. IPv4-only nodes can communicate with IPv6-only nodes only when you
are using an IPv4-to-IPv6 proxy or translation gateway.
MCT USE ONLY. STUDENT USE PROHIBITED
8-14 Implementing IPv6
• Reverse lookup pointer (PTR) resource records for IPv4 and IPv6 nodes
Note: In most cases, the IPv6 host (AAAA) resource records that IPv6 nodes require are
registered in DNS dynamically.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 8-15
When a name can be resolved to both an IPv4 and IPv6 address, both addresses are returned to the client.
The client then chooses which address to use based on prefix polices. In these prefix policies each prefix
has a precedence level assigned to it. A higher precedence is preferred over a lower precedence. The
following table displays typical prefix policies for Windows Server 2012.
2002::/16 7 2 6to4
2001::/32 5 5 Teredo
Note: You can view the prefix policies in Windows Server 2012 by using the Windows
PowerShell Get-NetPrefixPolicy cmdlet.
Additional Reading: For more information about prefix policies, see Source and
Destination Address Selection for IPv6 at http://go.microsoft.com/fwlink/?LinkId=269711.
Demonstration Steps
Configure an IPv6 host (AAAA) resource record
1. On LON-DC1, in Server Manager, open the DNS tool and browse to the Adatum.com forward
lookup zone.
2. In DNS Manager, verify that IPv6 addresses have been registered dynamically for LON-DC1 and
LON-SVR1.
MCT USE ONLY. STUDENT USE PROHIBITED
8-16 Implementing IPv6
o Name: WebApp
o IP address: FD00:AAAA:BBBB:CCCC::A
You can manually configure IPv6 over IPv4 tunneling, or use automated technologies such as ISATAP,
6to4, or Teredo that implement IPv6 over IPv4 tunneling.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 8-17
Lesson 4
IPv6 Transition Technologies
Transitioning from IPv4 to IPv6 requires coexistence between the two protocols. Too many applications
and services rely on IPv4 for it to be removed quickly. However, several technologies exist that aid
transition by allowing communication between IPv4-only and IPv6-only hosts. There are also technologies
that allow IPv6 communication over IPv4 networks.
This lesson provides information about Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), 6to4,
and Teredo, which help provide connectivity between IPv4 and IPv6 technology. This lesson also
addresses PortProxy, which provides compatibility for applications.
Lesson Objectives
After completing this lesson, you will be able to:
• Describe ISATAP.
• Describe 6to4.
• Describe Teredo.
• Describe PortProxy.
What Is ISATAP?
ISATAP is an address-assignment technology that
you can use to provide unicast IPv6 connectivity
between IPv6/IPv4 hosts over an IPv4 intranet.
IPv6 packets are tunneled in IPv4 packets for
transmission over the network. Communication
can occur directly between two ISATAP hosts
on an IPv4 network, or communication can go
through an ISATAP router if one network has only
IPv6-only hosts.
An ISATAP address that is based on a public IPv4 address is formatted like the following example:
If there are IPv6-only hosts, then the ISATAP router also unpacks IPv6 packets. ISATAP hosts send packets
to the IPv4 address of the ISATAP router. The ISATAP router then unpacks the IPv6 packets and sends
them on to the IPv6-only network.
You can also define ISATAP name resolution in a hosts file, but this is not recommended because it is
difficult to manage.
Note: By default, DNS servers on Windows Server 2008 or newer Windows Server operating
systems have a global query block list that prevents ISATAP resolution, even if the host record is
created and properly configured. You need to remove ISATAP from the global query block list in
DNS if you are using an ISATAP host record to configure ISATAP clients.
Other ways you can configure hosts with an ISATAP router are:
• Use the Windows PowerShell cmdlet Set-NetIsatapConfiguration -Router x.x.x.x.
• Use Netsh Interface IPv6 ISATAP Set Router x.x.x.x.
Note: All ISATAP nodes are connected to a single IPv6 subnet. This means that all ISATAP
nodes are part of the same Active Directory® Domain Services (AD DS) site, which may not be
desirable.
As such, you should use ISATAP only for limited testing. For intranet-wide deployment, you
should instead deploy native IPv6 support.
What Is 6to4?
6to4 is a technology that you use to provide
unicast IPv6 connectivity over the IPv4 Internet.
You can use 6to4 to provide IPv6 connectivity
between two IPv6 sites or between an IPv6 host
and an IPv6 site. However, 6to4 is not suitable for
scenarios that require NAT.
configure client computers, the internal interface advertises the 6to4 network. Any client computer that
begins to use the 6to4 network address is a 6to4 host. The 6to4 hosts in the site send 6to4 packets to the
6to4 router for delivery to other sites over the IPv4 Internet.
The IPv6 network address that is used for 6to4 is based on the IPv4 address of the external interface on an
IPv6 router. The format of the IPv6 is 2002:WWXX:YYZZ:Subnet_ID:Interface_ID, where WWXX:YYZZ is the
colon-hexadecimal representation of w.x.y.z, a public IPv4 address.
When a single host on the IPv4 Internet participates in 6to4, it is configured as a host/router. A 6to4
host/router does not perform routing for other hosts, but does generate its own Ipv6 network used
for 6to4.
• Enable Internet Connection Sharing (ICS). When you enable ICS, Windows Server 2012 is configured
automatically as a 6to4 router.
• Use Windows PowerShell. You can use the Set-Net6to4Configuration cmdlet to configure 6to4.
What Is Teredo?
Teredo is similar to 6to4 in that it allows you
to tunnel IPv6 packets over the IPv4 Internet.
However, Teredo functions correctly even when
NAT is used for Internet connectivity. Teredo is
required because many organizations use private
IP addresses, which require NAT to access the
Internet. If a NAT device can be configured as a
6to4 router, then Teredo is not required.
IPv6 communication between two Teredo clients over the IPv4 Internet requires a Teredo server that is
hosted on the IPv4 Internet. The Teredo server facilitates communication between the two Teredo clients
by acting as a known central point for initiating communication. Typically, hosts behind a NAT device are
allowed to initiate outbound communication, but are not allowed to accept inbound communication. To
work around this problem, both Teredo clients initiate communication with the Teredo server. After
connection is initiated with the Teredo server, and after the NAT device has allowed outbound
communication, any further communication occurs directly between the two Teredo clients.
Note: Several public Teredo servers are available for use on the Internet. Windows
operating systems use the Microsoft-provided Teredo server at teredo.ipv6.microsoft.com by
default.
Teredo can also facilitate communication with IPv6-only hosts on the IPv6 Internet by using a Teredo
relay. The Teredo relay forwards packets from a Teredo client to the IPv6 Internet.
MCT USE ONLY. STUDENT USE PROHIBITED
8-20 Implementing IPv6
You can configure Windows Server 2012 as a Teredo client, Teredo relay, or Teredo server. To configure
Teredo use the Windows PowerShell cmdlet Set-NetTeredoConfiguration. The default configuration for
Teredo is as a client. When configured as a client, Teredo is disabled when attached to a domain network.
To enable Teredo on a domain network, you must configure it as an enterprise client.
• 2001::/32 (32 bits). This is the Teredo-specific prefix that is used by all Teredo addresses.
• Teredo server IPv4 address (32 bits). This identifies the Teredo server.
• Options (16 bits). There are a number of options that describe the communication configuration, such
as whether the client is behind NAT.
• Obscured external port (16 bits). This is the external port used for communication by the NAT device
for this communication. It is obscured to prevent the NAT device from translating it.
• Obscured external IP address (32 bits). This is the external IP address of the NAT device. It is obscured
to prevent the NAT device from translating it.
What Is PortProxy?
Application developers use specific network
application programmer interfaces (APIs) to
access network resources when they are writing
applications. Modern APIs are able to use either
IPv4 or IPv6, and leave the responsibility of
choosing the IP version to the operating system.
However, some older applications use APIs that
can only use IPv4.
You use the PortProxy service to allow
applications that do not support IPv6 to
communicate with IPv6 hosts. You enable
PortProxy on the server where the application is
running. Incoming IPv6 packets for the application are translated to IPv4, and then passed on to the
application.
You can also use PortProxy as a proxy between IPv4-only and IPv6-only hosts. To do this, you must
configure DNS to resolve the name of the remote host as the address of the PortProxy computer. For
example, an IPv4-only host would resolve the name of an IPv6-only host as the IPv4 address of the
PortProxy computer. Packets would then be sent to the PortProxy computer, which would then proxy
them to the IPv6-only computer.
• It cannot change address information that is embedded in the data portion of the packet. If the
application (such as File Transfer Protocol (FTP)) embeds address information in the data portion,
then it will not work.
You can configure PortProxy on Windows Server 2012 by using netsh interface portproxy. However, it is
generally preferred to use a tunneling technology instead of PortProxy.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 8-21
• Upgrade devices to support IPv6. The majority of current networking hardware supports IPv6, but
many other types of devices do not. You need to verify that all network attached devices—such as
printers and scanners—also support IPv6.
• Update the DNS infrastructure to support IPv6 address and pointer (PTR) resource records. You
might have to upgrade the DNS infrastructure to support the new IPv6 host address (AAAA) resource
records (required) and pointer (PTR) resource records in the IP6.ARPA reverse domain, but this is
optional. Additionally, ensure that the DNS servers support both DNS traffic over IPv6, and DNS
dynamic update for IPv6 host address (AAAA) resource records so that IPv6 hosts can register their
names and IPv6 addresses automatically.
• Upgrade hosts to IPv6/IPv4 nodes. You must upgrade hosts to use both IPv4 and IPv6. This allows
hosts to access both IPv4 and IPv6 resources during the migration process.
Most organizations will probably add IPv6 to an existing IPv4 environment and continue to have
coexistence for an extended time. Many legacy applications and devices that do not support IPv6 are still
in existence, and coexistence is much simpler than using transition technologies such as ISATAP. You
should only remove IPv4 after resources that depend on it are either removed or updated to use IPv6.
IPv6 is enabled by default for Windows Vista and newer Windows client operating systems, and Windows
Server 2008 and newer Windows Server operating systems. As a best practice, you should not disable IPv6
unless there is a technical reason to do so. Some features in Windows operating systems rely on IPv6.
MCT USE ONLY. STUDENT USE PROHIBITED
8-22 Implementing IPv6
The IT manager at A. Datum has been briefed by several application vendors about newly added support
for IPv6 in their products. A. Datum does not have IPv6 support in place at this time. The IT manager
would like you to configure a test lab that uses IPv6. As part of the test lab configuration, you also need to
configure ISATAP to allow communication between an IPv4 network and an IPv6 network.
This is the layout of the completed test environment.
Objectives
After completing this lab, you will be able to:
Lab Setup
Estimated Time: 30 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must
complete the following steps:
1. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Hyper-V® Manager, click 20410B-LON-DC1, and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 8-23
o Password: Pa$$w0rd
o Domain: Adatum
2. Disable IPv6 for Local Area Connection to make LON-DC1 an IPv4-only host.
2. Disable IPv4 for Local Area Connection, to make LON-SVR2 an IPv6-only host.
3. Allow clients to obtain the IPv6 network address automatically from LON-RTR by using the following
Set-NetIPInterface cmdlet to enable router advertisements on Local Area Connection 2:
4. Use ipconfig to verify that Local Area Connection 2 has an IPv6 address on the 2001:db8:0:1::/64
network. This address is used for communication on the IPv6-only network.
Results: After completing the exercise, students will have configured an IPv6–only network.
To enable ISATAP automatically on clients, you need to create an ISATAP host record in DNS. Clients that
can resolve this name automatically become ISATAP clients. To allow clients to resolve this name, you
must remove ISATAP from the global query block list on the DNS server.
The main tasks for this exercise are as follows:
5. Test connectivity.
2. Add an ISATAP host record in the Adatum.com domain that resolves to 172.16.0.1. ISATAP clients
resolve this host name to find the ISATAP router.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 8-25
2. Use the following Get-NetIPAddress cmdlet to identify the interface index of the ISATAP interface
with 172.16.0.1 in the link-local address.
3. Use the Get-NetIPInterface cmdlet to verify the following on the ISATAP interface:
o Forwarding is enabled
o Advertising is disabled
4. The ISATAP interface for an ISATAP router must have forwarding enabled and advertising enabled.
Use the following Set-NetIPInterface cmdlet to enable router advertisements on the ISATAP
interface:
5. Create a new IPv6 network that will be used for the ISATAP network. Use the following
New-NetRoute cmdlet to configure a network route for the ISATAP interface:
6. Use the following Get-NetIPAddress cmdlet to verify that the ISATAP interface has an IPv6 address
on the 2001:db8:0:2::/64 network:
4. Ping isatap to verify it can be resolved. The name should resolve and you should receive four replies
from 172.16.0.1.
2. Use ipconfig to verify that the Tunnel adapter for ISATAP has an IPv6 address on the 2001:db8:0:2/64
network. Notice that this address includes the IPv4 address of NYC-DC1.
MCT USE ONLY. STUDENT USE PROHIBITED
8-26 Implementing IPv6
ping 2001:db8:0:2:0:5efe:172.16.0.10
2. User Server Manager to modify the properties of TCP/IPv6 on the Local Area Connection, and add
2001:db8:0:2:0:5efe:172.16.0.10 as the preferred DNS server.
Note: A ping from LON-DC1 to LON-SVR2 does not respond because the firewall
configuration on LON-SVR2 blocks ping requests.
Results: After completing this exercise, students will have configured an ISATAP router on LON-RTR to
allow communication between an IPv6–only network and an IPv4–only network.
2. In the Virtual Machines list, right-click 20410B-LON-DC1, and then click Revert.
Question: How can you provide a DNS server to an IPv6 host dynamically?
Question: Your organization is planning to implement IPv6 internally. After some research, you
have identified unique local IPv6 addresses as the correct type of IPv6 addresses to use for
private networking. To use unique local IPv6 addresses, you must select a 40-bit identifier that is
part of the network. A colleague suggests using all zeros for the 40 bits. Why is this not a good
idea?
Question: How many IPv6 addresses should an IPv6 node be configured with?
Best Practices
Use the following best practices when implementing IPv6:
• Do not disable IPv6 on Windows 8 or Windows Server 2012.
• Enable coexistence of IPv4 and IPv6 in your organization rather than using transition technologies.
Module 9
Implementing Local Storage
Contents:
Module Overview 9-1
Module Overview
Storage is one of the key components that you must consider when planning and deploying a Windows
Server® 2012 operating system. Most organizations require a great deal of storage because users work
regularly with applications that create new files requiring storage in a central location. When users keep
their files for longer periods of time, storage demands increase. Every time a user logs on to a server, an
audit trail is created in an event log; this also uses storage. Even as files are created, copied, and moved,
storage is required.
This module introduces you to different storage technologies. It discusses how to implement the storage
solutions in Windows Server 2012, and how to use Storage Spaces, a new feature that you can use to
combine disks into pools that are then managed automatically.
Objectives
After completing this module you will be able to:
Lesson 1
Overview of Storage
When you plan a server deployment, one of the key components that you will require is storage. There
are various types of storage that you can utilize, from locally attached storage, to storage that is remotely
accessed via Ethernet, or even connected with optical fiber. You should be aware of each solution’s
benefits and its limitations.
As you prepare to deploy storage for your environment, you will need to make some important decisions.
This lesson addresses questions you might consider, such as the following:
• Does the storage need to be fast?
Lesson Objectives
After completing this lesson, you will be able to:
• Describe disk types and performance.
• Serial Advanced Technology Attachment (SATA). SATA is a computer bus interface, or channel, for
connecting the motherboard or device adapters to mass storage devices such as hard disk drives
and optical drives. SATA was designed to replace EIDE. It is able to use the same low-level commands,
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-3
but SATA host adapters and devices communicate via a high-speed serial cable over two pairs of
conductors. SATA was introduced in 2003. It can operate at speeds of 1.5, 3.0, and 6.0 GB per second,
depending on the SATA revision (1, 2 or 3 respectively). SATA drives are less expensive than other
drive options, but also provide less performance. Organizations may choose to deploy SATA drives
when they require large amounts of storage but not high performance. SATA disks are generally low-
cost disks that provide mass storage. However, for the lower cost they are also less reliable compared
to serial attached SCSI (SAS) disks.
A variation on the SATA interface is eSATA, which is designed to enable high-speed access to
externally-attached SATA drives.
• Small computer system interface (SCSI). SCSI is a set of standards for physically connecting and
transferring data between computers and peripheral devices. SCSI was originally introduced in
1978 and was designed as an interface on a lower-level communication, subsequently allowing it
to take less processing power and perform transactions at higher speeds. SCSI became a standard in
1986. Similar to EIDE, SCSI was designed to run over parallel cables; however, recently the usage has
been expanded to run over other mediums. The 1986 parallel specification of SCSI had initial speed
transfers of 5 MB per second. The more recent 2003 implementation, Ultra 640 SCSI, also known as
Ultra 5, can transfer data at speeds of 640 MB per second. SCSI disks provide higher performance
than SATA disks, but are also more expensive.
• SAS. SAS is a further implementation of the SCSI standard. SAS depends on a point-to-point serial
protocol that replaces the parallel SCSI bus technology, and uses the standard SCSI command set. SAS
offers backward-compatibility with second generation SATA drives. SAS drives are reliable and made
for 24 hours-a-day, seven-days-a-week (24/7) operation in data centers. With up to 15,000 rotations
per minute (RPM), these disks are also the fastest traditional hard disks.
• Solid State Drives (SSDs). SSDs are data storage devices that use solid-state memory to store data
rather than using the spinning disks and movable read/write heads that are used in other disks. SSDs
use microchips to store the data and do not contain any moving parts. SSDs provide fast disk access,
use less power, and are less susceptible to failure from being dropped than traditional hard disks
(such as SAS drives), but are also much more expensive per GB of storage. SSDs typically use a SATA
interface, so you can usually replace hard disk drives with SSDs without any modifications.
Note: Fibre Channel, fire-wire, or USB-attached disks are also available storage options.
They define either the transport bus or the disk type. For example, USB-attached disks use mostly
with SATA or SSD drives to store data.
Primarily, DAS storage is physically connected to the server. Because of this, if the server suffers a power
failure, the storage is unavailable. DAS comes in various disk types such as SATA, SAS or SSD, which affect
the speed and the performance of the storage, and has both advantages and disadvantages.
DAS is also usually the least expensive storage available today, and is widely available in various speeds
and sizes to accommodate various installations. In addition to being inexpensive, DAS is very easy to
configure. In most instances, you would simply plug in the device, ensure that the running Windows®
operating system recognizes it, and then use Disk Management to configure the disks.
DAS also has drawbacks in its access methodologies. Due to the way reads and writes are handled by the
server operating system, DAS can be slower than other storage technologies. Another drawback is that
DAS shares the processing power and server memory to which it is connected. This means that on very
busy servers, disk access may slow when the operating system is overloaded.
Today, most SAN solutions offer SAN and NAS together. The backend head units, disks, and technologies
are identical; the access method is the only thing that changes. Enterprises often provision storage from
the SAN to the servers using Fibre Channel over Ethernet (FCOE) or Internet Small Computer System
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-5
Interface (iSCSI), while NAS services are made available via CIFS and NFS; the disk drives (aggregates) are
the same, the methods for writing are the same, and the overhead and reliability are the same.
NAS also fits nicely into the market as a mid-priced solution; it is not expensive, but it suits more needs
than DAS in the following ways:
• NAS storage is usually much larger than DAS.
• NAS offers a single location for all critical files, rather than inter-dispersing them on various servers or
devices with DAS.
NAS is affordable for small to mid-size businesses, and similar to DAS, has overheads of an operating
system that reads and writes data differently than a SAN solution. As such, NAS systems are more
frequently prone to the possibility of data loss depending on the size of the data being copied.
Additional Reading: For more information about Windows Storage Server 2012, see
http://go.microsoft.com/fwlink/?LinkID=199647.
What Is a SAN?
The third type of storage is a SAN. A SAN is a
specialized high ‐speed network that connects
computer systems or host servers to high-
performance storage subsystems. A SAN usually
includes various components such as host bus-
adapters (HBAs), special switches to help route
traffic, and storage disk arrays with logical unit
numbers (LUNs) for storage.
A SAN enables multiple servers to access a pool of
storage in which any server can potentially access
any storage unit. A SAN uses a network like any
other network, such as a local area network (LAN).
MCT USE ONLY. STUDENT USE PROHIBITED
9-6 Implementing Local Storage
Therefore, you can use a SAN to connect many different devices and hosts to provide access to any device
from anywhere.
Unlike DAS or NAS, a SAN is controlled by a hardware device, offers the fastest access to the storage, and
offers methods to minimize overhead (such as using raw disks).
• Centralization of storage into a single pool, which enables storage resources and server resources to
grow independently. They also enable storage to be dynamically assigned from the pool when it is
required. Storage on a given server can be increased or decreased as needed without complex
reconfiguring or re-cabling of devices.
• Common infrastructure for attaching storage, which enables a single common management model
for configuration and deployment.
• A high level of redundancy. Most SANs are deployed with multiple network devices and paths
through the network. As well, the storage device contains redundant components such as power
supplies and hard disks.
Note: You can implement SANs using a variety of technologies. The most common options
are Fibre Channel and iSCSI.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-7
What Is RAID?
RAID is a technology that you can use to
configure storage systems that provide high
reliability and (potentially) high performance.
RAID implements storage systems by combining
multiple disks into a single logical unit called a
RAID array. Depending on the configuration, a
RAID array can withstand the failure of one or
more of the physical hard disks, or provide higher
performance than is available by using a single
disk.
• Disk mirroring. With disk mirroring, all of the information that is written to one disk is also written to
another disk. If one of the disks fails, the other disk is still available.
• Parity information. Parity information is used in the event of a disk failure to calculate the information
that was stored on a disk. If you use this option, the server or RAID controller calculates the parity
information for each block of data that is written to the disks, and then stores this information on
another disk or across multiple disks. If one of the disks in the RAID array fails, the server can use the
data that is still available on the functional disks along with the parity information to recreate the
data that was stored on the failed disk.
RAID subsystems can also provide potentially better performance than single disks by distributing disk
reads and writes across multiple disks. For example, when implementing disk striping, the server can read
information from all hard disks in the stripe set. When combined with multiple disk controllers, this can
provide significant improvements in disk performance.
Note: Although RAID can provide a greater level of tolerance for disk failure, you should
not use RAID to replace traditional backups. If a server has a power surge or catastrophic failure
and all of the disks fail, then you would still need to rely on standard backups.
supports the use of software RAID, and you can use Disk Management to configure several different levels
of RAID.
• To configure hardware RAID, you need to access the disk controller management program. Normally,
you can access this during the server boot process or by using a webpage that runs management
software.
• Implementing disk mirroring for the disk containing the system and boot volume with software RAID
can require additional configuration when a disk fails. Because the RAID configuration is managed by
the operating system, you must configure one of the disks in the mirror as the boot disk. If that disk
fails, you may need to modify the boot configuration for the server to start the server. This is not an
issue with hardware RAID, because the disk controller accesses the available disk and exposes it to the
operating system.
• In older servers, you may get better performance with software RAID when using parity, because the
server processor can calculate parity more quickly than the disk controller can. This is no longer an
issue with newer servers, where you may get better performance on the server because you can
offload the parity calculations to the disk controller.
RAID Levels
When implementing RAID, you need to decide
what level of RAID to implement.
The table below lists the features for each
different RAID level.
RAID 0 Striped set High read and All space on the A single disk Use only in
without parity or write disks is available failure situations
mirroring performance results in the where you
Data is written loss of all require high
sequentially to data performance
each disk and can
tolerate data
loss
RAID 1 Mirrored set Good Can only use the Can tolerate Frequently used
without parity or performance amount of space a single disk for system and
striping that is available failure boot volumes
Data is written on the smallest with hardware
to both disks disk RAID
simultaneously
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-9
RAID 2 Data is written in Extremely high Uses one or Can tolerate Requires that
bits to each disk performance more disks for a single disk all disks be
with parity parity failure synchronized
written to Not currently
separate disk or used
disks
RAID 3 Data is written in Very high Uses one disk for Can tolerate Requires that
bytes to each performance parity a single disk all disks be
disk with parity failure synchronized
written to Rarely used
separate disk or
disks
RAID 4 Data is written in Good read Uses one disk for Can tolerate Rarely used
blocks to each performance, parity a single disk
disk with parity poor write failure
written to a performance
dedicated disk
RAID 5 Striped set with Good read Uses the Can tolerate Commonly
distributed performance, equivalent of a single disk used for data
parity poor write one disk for failure storage where
Data is written in performance parity performance
blocks to each is not critical,
disk with parity but maximizing
spread across all disk usage is
disks important
RAID 6 Striped set with Good read Uses the Can tolerate Commonly
dual distributed performance, equivalent of two disk used for data
parity poor write two disks for failures storage where
Data is written in performance parity performance is
blocks to each not critical but
disk with double maximizing disk
parity written usage and
across all disks availability are
important
RAID Striped sets in a Very good Only half the Can tolerate Not commonly
0+1 mirrored set read and write disk space is the failure used
A set of drives is performance available due to of two or
striped, and then mirroring more disks
the strip set is as long as all
mirrored failed disks
are in the
same striped
set
MCT USE ONLY. STUDENT USE PROHIBITED
9-10 Implementing Local Storage
RAID Mirrored set in a Very good Only half the Can tolerate Frequently used
1+0 stripe set read and write disk space is the failure in scenarios
(or 10) Several drives performance available due to of two or where
are mirrored to a mirroring more disks performance
second set of as long as and
drives, and then both disks in redundancy are
one drive from a mirror do critical, and the
each mirror is not fail cost of the
striped required
additional disks
is acceptable
RAID Striped set with Good read The equivalent Provides This level is
5+0 distributed performance, of at least two better fault recommended
(or 50) parity in a stripe better write disks is used for tolerance for applications
set performance parity than a single that require
Drives are than RAID 5 RAID level high fault
striped with tolerance,
RAID 5, and then capacity, and
striped without random
parity positioning
performance
Requires at
least six drives
Note: The most common RAID levels are RAID 1 (also known as mirroring), RAID 5 (also
known as striped set with distributed parity), and RAID 1+0 (also known as mirrored set in a
stripe set).
Question: Should all disks be configured with the same amount of fault tolerance?
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-11
Lesson 2
Managing Disks and Volumes
Identifying which storage technology that you want to deploy is the first critical step in making sure that
your environment is prepared for data storage requirements. This, however, is only the first step. There are
other steps that you need to take to prepare for data storage requirements.
For example, once you have identified the best storage solution, or have chosen a mix of storage
solutions, you need to figure out the best way to manage that storage. Ask yourself the following
questions:
• What disks will you allocate to a storage pool?
• Will the type of file systems be the same for all disks?
This lesson addresses these and similar questions, including why it is important to manage disks and what
tools you need to manage disks.
Lesson Objectives
After completing this lesson, you will be able to:
• Explain how to select a partition table format.
MBR
The MBR partition table format is the standard
partitioning scheme that has been used on hard
disks since the first personal computers came out
in the 1980s. The MBR partition table format has
the following characteristics:
• If you initialize a disk larger than 2 TB using MBR, the disks are only able to store volumes up to 2 TB
and the rest of the storage will not be used. You must convert the disk to GPT if you want to use all of
its space.
MCT USE ONLY. STUDENT USE PROHIBITED
9-12 Implementing Local Storage
Note: You can use the MBR partition table format for disk drives that never surpass 2 TB in
size. This provides you with a bit more space because GPT requires more disk space than MBR.
However, Microsoft recommends always using GPT as a best practice.
GPT
The GPT was introduced with Windows Server 2003 and Windows XP 64-bit Edition to overcome the
limitations of MBR, and to address larger disks. GPT has the following characteristics:
• A hard disk can have up to 18 exabytes (EB), with 512 kilobytes (KB) logical block addressing (LBA).
• To boot from a GPT partition table, your BIOS must support GPT.
Note: If your hard disk is larger than 2 TB, you must use the GPT partition table format.
Additional Reading: For frequently asked questions about the GUID partitioning table disk
architecture, see http://go.microsoft.com/fwlink/?LinkID=266748.
Basic Disk
Basic storage uses normal partition tables that
are used by all versions of the Windows operating
system. A disk that is initialized for basic storage
is called a basic disk. A basic disk contains basic
partitions, such as primary partitions and
extended partitions. You can subdivide extended
partitions into logical drives.
By default, when you initialize a disk in the Windows operating system, the disk is configured as a basic
disk. You can easily convert basic disks to dynamic disks without any loss of data; however, when
converting a dynamic disk to basic disk, all data on the disk is lost.
There is no performance gain by converting basic disks to dynamic disks, and some applications cannot
address data that is stored on dynamic disks.. For these reasons, most administrators do not convert basic
disks to dynamic disks unless they need to use some of the additional volume configuration options that
are available with dynamic disks.
Dynamic Disk
Dynamic storage was introduced in the Microsoft Windows 2000 Server operating system. A disk that is
initialized for dynamic storage is called a dynamic disk. A dynamic disk contains dynamic volumes. With
dynamic storage, you can perform disk and volume management without the need to restart computers
running Windows operating systems.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-13
When you configure dynamic disks, you create volumes rather than partitions. A volume is a storage unit
that is made from free space on one or more disks. You can format the volume with a file system, and can
assign it a drive letter or configure it with a mount point.
• Spanned volumes. A spanned volume is created from free disk space that is linked together from
multiple disks. You can extend a spanned volume onto a maximum of 32 disks. A spanned volume
cannot be mirrored, and is not fault-tolerant; therefore, if you lose one disk, you will lose the entire
spanned volume.
• Striped volumes. A striped volume has data that is spread across two or more physical disks. The data
on this type of volume is allocated alternately and evenly to each of the physical disks. A striped
volume cannot be mirrored or extended, and is not fault-tolerant. This means that the loss of one disk
causes the immediate loss of all the data. Striping is also known as RAID-0.
• Mirrored volumes. A mirrored volume is a fault-tolerant volume that has all data duplicated onto two
physical disks. All of the data on one volume is copied to another disk to provide data redundancy. If
one of the disks fails, the data can still be accessed from the remaining disk. A mirrored volume
cannot be extended. Mirroring is also known as RAID-1.
• RAID-5 volumes. A RAID-5 volume is a fault-tolerant volume that has data striped across a minimum
of three or more disks. Parity is also striped across the disk array. If a physical disk fails, the portion of
the RAID-5 volume that was on that failed disk can be re-created from the remaining data and the
parity. A RAID-5 volume cannot be mirrored or extended.
Note: When you install the Windows 8 operating system or the Windows Server 2012
operating system in a clean installation, a separate system volume is created to enable encrypting
the boot volume by using Windows BitLocker® drive encryption.
Additional Reading:
• For more information about how basic disks and volumes work, see
http://go.microsoft.com/fwlink/?LinkID=199648.
• For more information about dynamic disks and volumes, see
http://go.microsoft.com/fwlink/?LinkID=199649.
MCT USE ONLY. STUDENT USE PROHIBITED
9-14 Implementing Local Storage
FAT
The FAT file system is the most simplistic of the
file systems that Windows operating systems
support. The FAT file system is characterized by a
table that resides at the very top of the volume.
To protect the volume, two copies of the FAT file
system are maintained in case one becomes
damaged. In addition, the file allocation tables
and the root directory must be stored in a fixed location so that the system’s boot files can be correctly
located.
A disk formatted with the FAT file system is allocated in clusters, whose sizes are determined by the size
of the volume. When a file is created, an entry is created in the directory, and the first cluster number
containing data is established. This entry in the table indicates either that this is the last cluster of the file,
or points to the next cluster. There is no organization to the FAT directory structure, and files are given the
first open location on the drive.
Because of the size limitation with the file allocation table, the original release of FAT could only access
partitions that were less than 2 GB in size. To enable larger disks, Microsoft developed FAT32. FAT32
supports partitions of up to 2 TB.
FAT does not provide any security for files on the partition. You should never use FAT or FAT32 as the file
system for disks attached to Windows Server 2012 servers. You might consider using FAT or FAT32 to
format external media such as USB flash media.
The file system designed especially for flash drives is Extended FAT (exFAT). It can be used where FAT32 is
not suitable, such as when you need a disk format that works with a television, which requires a disk that
is larger than 2 TB. A number of media devices support exFAT, such as modern flat panel TVs, media
centers, and portable media players.
NTFS
NTFS is the standard file system for all Windows operating systems beginning with Windows NT® Server
4.0. Unlike FAT, there are no special objects on the disk, and there is no dependence on the underlying
hardware, such as 512-byte sectors. In addition, in NTFS there are no special locations on the disk, such as
the tables.
NTFS is an improvement over FAT in several ways, such as better support for metadata, and the use of
advanced data structures to improve performance, reliability, and disk space utilization. NTFS also has
additional extensions such as security access control lists (ACLs), which you can use for auditing, file
system journaling, and encryption.
NTFS is required for a number of Windows Server 2008 R2 roles and features such as Active Directory®
Domain Services (AD DS), Volume Shadow Services (VSS), Distributed File System (DFS) and File
Replication Services (FRS). NTFS also provides a much higher level of security than FAT or FAT 32.
other items. Additionally, ReFS offers greater resiliency, meaning better data verification, error correction,
and scalability.
ReFS uses features from NTFS, and is designed to maintain backward compatibility with its older Windows
operating system versions. Windows 8 clients and older Windows client operating systems can read and
write to ReFS disk drive partitions and to shares on a server, just as they can with those running NTFS.
You should use ReFS with very large volumes and very large file shares to overcome the NTFS limitation
of error checking and correction. Because ReFS was not available prior to Windows Server 2012 (the only
choice was NTFS), it makes sense to use ReFS with Windows Server 2012 instead of NTFS to achieve better
error checking, better reliability, and less corruption.
Additional Reading:
• For more information on how FAT works, see http://go.microsoft.com/fwlink/?LinkID=199652.
Question: What file system do you currently use on your file server? Will you continue to use it?
What Is ReFS?
ReFS is a new feature in Windows Server 2012.
ReFS is based on the NTFS file system, and
provides the following advantages:
• Metadata integrity with checksums
• Expanded protection against data corruption
• Maximizes reliability, especially during a loss
of power (while NTFS has been known to
experience corruption in similar
circumstances)
• Large volume, file, and directory sizes
• Storage pooling and virtualization, which
makes creating and managing file systems easier
• Data striping for performance (bandwidth can be managed)
• Redundancy for fault tolerance
• Disk scrubbing for protection against latent disk errors
• Resiliency to corruptions with recovery for maximum volume availability
• Shared storage pools across machines for additional failure tolerance and load balancing
Because ReFS uses a subset of features from NTFS, it is designed to maintain backward compatibility with
NTFS. Therefore, applications that run on Windows Server 2012 can access files on ReFS just as they would
on NTFS. However, an ReFS–formatted drive is not recognized when placed in computers that are running
Windows Server operating systems previous to Windows Server 2012.
With NTFS, you can change the size of a cluster; however, with ReFS, each cluster has a fixed size of 64 KB,
which you cannot change. Encrypted File System (EFS) for files is not supported in ReFS.
As its name implies, the new file system offers greater resiliency, meaning better data verification, error
correction, and scalability.
Beyond its greater resiliency, ReFS also surpasses NTFS by offering larger maximum sizes for individual
files, directories, disk volumes, and other items, as listed in the following table.
Attribute Limit
Maximum size of a single volume 2^78 bytes with 16 KB cluster size (2^64 * 16 * 2^10)
Windows stack addressing allows 2^64 bytes
Mount Points
Mount points are used in Windows operating
systems to make a portion of a disk or the entire
disk useable by the operating system. Most
commonly, mount points are associated with
drive-letter mappings so that the operating
system can gain access to the disk through the
drive letter.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-17
Since the Windows 2000 Server was first introduced, you have been able to enable volume mount points,
which you can then use to mount a hard disk to an empty folder that is located on another drive. For
example, if you add a new hard disk to a server, rather than mounting the drive using a drive letter, you
can assign a folder name such as C:\datadrive to the drive. When you do this, any time you access the
C:\datadrive folder, you are actually accessing the new hard disk.
• If you are running out of available letters to assign to partitions or volumes. If you have several hard
disks that are attached to the server, you may run out of available letters in the alphabet to which to
assign drive letters. By using a volume mount point, you can add additional partitions or volumes
without using more drive letters.
• If you need to separate disk input/output (I/O) within a folder structure. For example, if you are using
an application that requires a specific file structure, but which uses the hard disks extensively, you can
separate the disk I/O by creating a volume mount point within the folder structure.
Note: You can assign volume mount points only to empty folders on an NTFS partition.
This means that if you want to use an existing folder name, you must first rename the folder,
create and mount the hard disk using the required folder name, and then copy the data to the
mounted folder.
Links
A link is a special type of file that contains a reference to another file or directory in the form of an
absolute or relative path. Windows supports the following two types of links:
Note: In Hyper-V, you can use a differencing virtual hard disk (VHD) to save space by
making changes only to the child VHD, when the child VHD is part of a parent/child VHD
relationship.
Links are sometimes easier to manage than mount points. Mount points force you to place the files on the
root of the volumes, whereas with links you can be more flexible with where you save files.
Demonstration Steps
Create a mount point
1. Sign in to LON-SVR1 with the username Adatum\Administrator and the password Pa$$w0rd.
7. On the taskbar, open a Windows Explorer window, and then click Local Disk (C:). You should now
see the MountPoint folder with a size of 4,095,996 KB assigned to it. Notice the icon that is assigned
to the mount point.
2. Create a folder in C:\ called CustomApp, and run the following: copy C:\windows\system32
\notepad.exe C:\CustomApp.
3. At the command prompt, type mklink /j AppLink CustomApp, and then press Enter.
4. In a Windows Explorer window, browse to C:\AppLink. Notice that because it is a link, the directory
path in the address bar is not updated to C:\CustomApp.
2. In Windows Explorer, notice that Notepad2.exe appears exactly the same as Notepad.exe. Both file
names point to the same file.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-19
• You can extend a volume using free space on the same disk and on other disks. When you extend a
volume with other disks, you create a dynamic disk with a striped volume. In a striped volume, if one
disk fails, all data on the volume is lost. In addition, a striped volume cannot contain boot or system
partitions, thus you cannot extend your boot partitions by using another disk.
• If bad clusters exist on the partition, you cannot shrink it.
• When you want to shrink a partition, immovable files such as page files are not relocated. This means
that you cannot reclaim space beyond the location where these files are on the volume. If you have
the requirement to shrink a partition further, you need to delete or move the immovable files. For
example, you can remove the page file, shrink the volume, and then add the page file back again.
Note: As a best practice for shrinking volumes, you should defragment the files on the
volume before you shrink it. This method returns the maximum amount of free disk space.
During the defragment process, you can identify any immoveable files.
To modify a volume, you can use Disk Management, the Diskpart.exe tool, or the Resize-Partition cmdlet
in Windows PowerShell®.
Additional Reading:
Lesson 3
Implementing Storage Spaces
Managing physical disks that are attached directly to a server has proven to be a tedious task for
administrators. To overcome this problem, many organizations use SANs that essentially group physical
disks together.
SANs require specialized configuration and sometimes specialized hardware, which makes them
expensive. To overcome these issues, you can use Storage Spaces, which is a Windows Server 2012 feature
that pools disks together and presents them to the operating system as a single disk. This lesson explains
how to configure and implement the Storage Spaces feature.
Lesson Objectives
After completing this lesson, you will be able to:
• Disk drive. This is a volume that you can access from your Windows operating system, for example, by
using a drive letter.
• Virtual disk (or storage space). This is similar to a physical disk from the perspective of users and
applications. However, virtual disks are more flexible because they include thin provisioning or just-
in-time (JIT) allocations, and they include resiliency to physical disk failures with built-in functionality
such as mirroring.
• Storage pool. A storage pool is a collection of one or more physical disks that you can use to create
virtual disks. You can add to a storage pool any available physical disk that is not formatted or
attached to another storage pool.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-21
• Physical disk. Physical disks are disks such as SATA or SAS disks. If you want to add physical disks to a
storage pool, the disks need to satisfy the following requirements:
o One physical disk is required to create a storage pool; a minimum of two physical disks is
required to create a resilient mirror virtual disk.
o A minimum of three physical disks are required to create a virtual disk with resiliency through
parity.
o Disks can be attached using a variety of bus interfaces including iSCSI, SAS, SATA, SCSI, and USB.
If you want to use failover clustering with storage pools, you cannot use SATA, USB or SCSI disks.
Storage Layout
This feature defines the number of disks from the
storage pool that are allocated. Valid options
include:
• Simple. A simple space has data striping but no redundancy. In data striping, logically sequential
data is segmented across all disks in a way that access to these sequential segments can be made
to different physical storage drives. Striping makes it possible to access multiple segments of data
concurrently. Do not host important data on a simple volume, because it provides no failover
capabilities when the disk that is storing the data fails.
• Two-way and three-way mirrors. Mirror spaces maintain two or three copies of the data that they
host (two data copies for two-way mirrors and three data copies for three-way mirrors). Duplication
happens with every write to ensure that all data copies are always current. Mirror spaces also stripe
the data across multiple physical drives. Mirror spaces provide the benefit of greater data throughput
and lower access latency. They also do not introduce a risk of corrupting at-rest data, and do not
require the extra journaling stage when writing data.
• Parity. A parity space is similar to RAID 5. Data, along with parity information, is striped across
multiple physical drives. Parity enables Storage Spaces to continue to service read and write requests
even when a drive has failed. Parity is always rotated across available disks to enable I/O optimization.
Storage spaces require a minimum of three physical drives for parity spaces. Parity spaces have
increased resiliency through journaling.
MCT USE ONLY. STUDENT USE PROHIBITED
9-22 Implementing Local Storage
Drive Allocation
This defines how the drive is allocated to the pool. Options are:
• Data Store. This is the default allocation when any drive is added to a pool. Storage Spaces can
automatically select available capacity on data-store drives for both storage space creation and JIT
allocation.
• Manual. Administrators can choose to specify Manual as the usage type for drives that are added
to a pool. A manual drive is not used automatically as part of a storage space unless it is specifically
selected at the creation of that storage space. This usage property makes it possible for administrators
to specify particular types of drives for use by only certain Storage Spaces.
• Hot Spare. Drives added as Hot-Spares to a pool are reserve drives that are not used in the creation of
a storage space. If a failure occurs on a drive that is hosting columns of a storage space, a reserve
drive is called upon to replace the failed drive.
Provisioning Schemes
You can provision a virtual disk by using two different schemes:
• Thin provisioning space. Thin provisioning is a mechanism that allows storage to be easily allocated
on a just-enough and JIT basis. Storage capacity in the pool is organized into provisioning slabs that
are not allocated until the point in time when datasets grow to require the storage. As opposed to
the traditional fixed storage allocation method—where large pools of storage capacity are allocated
but may remain unused—thin provisioning optimizes utilization of available storage. Organizations
are also able to save on operating costs such as electricity and floor space that are associated with
keeping unused drives operating. The downside of using thin provisioning is lower disk performance.
• Fixed provisioning space. With Storage Spaces, fixed provisioned spaces also employ the flexible
provisioning slabs. The difference between thin provisioning and a fixed provisioning space is that the
storage capacity in the fixed provisioning space is allocated at the same time that the space is
created.
Note: You can use Storage Spaces to create both thin and fixed provisioning virtual
disks within the same storage pool. Having both provisioned types in the same storage pool
is convenient, particularly when they are related to the same workload. For example, you can
choose to have a thin provisioning space to host a database and a fixed provisioning space to
host its log.
Question: What is the name for a virtual disk that is larger than the amount of disk space
available on the physical disks portion of the storage pool?
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-23
Windows PowerShell provides advanced management options for virtual disks and storage pools. Some
examples of management cmdlets are listed in the following table.
Additional Reading: To learn more about storage cmdlets in Windows PowerShell, see
http://go.microsoft.com/fwlink/?LinkID=266751.
Demonstration Steps
Create a storage pool
1. Sign in as Adatum\Administrator with the password Pa$$w0rd.
2. On LON-SVR1, in Server Manager, access File and Storage Services and Storage Pools.
3. In the STORAGE POOLS pane, create a New Storage Pool named StoragePool1, and add all of the
available disks.
2. On the View results page, wait until the task completes, make sure the Create a volume when this
wizard closes check box is selected.
You have been working for A. Datum for several years as a desktop support specialist. In this role, you
visited desktop computers to troubleshoot application and network problems. You have recently accepted
a promotion to the server support team. One of your first assignments is configuring the infrastructure
service for a new branch office.
Your manager has asked to add disk space to a file server. After creating volumes, your manager has also
asked you to resize those volumes based on updated information he has been given. Finally, you need to
make data storage redundant by creating a three-way mirrored virtual disk.
Objectives
After completing this lab, you will be able to:
• Install and configure a new disk.
• Resize volumes.
• Configure a redundant storage space.
Lab Setup
Estimated Time: 30 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must
complete the following steps:
On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
1. In Hyper-V® Manager, click 20410A-LON-DC1, and in the Actions pane, click Start.
2. In the Actions pane, click Connect. Wait until the virtual machine starts.
o Password: Pa$$w0rd
o Domain: Adatum
2. In Server Manager, open Computer Management, and then access Disk Management.
o Drive Letter: F
o File system: NTFS
2. In the Computer Management console, on Disk 2, create a Simple Volume with the following
attributes:
o Drive Letter: G
o File system: ReFS
o Volume2 (G:)
Results: After completing this exercise, you should have initialized a new disk, and then created two
simple volumes and formatted them. You should also have verified that the drive letters are available in
Windows Explorer.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-27
2. Extend Volume2.
Results: After completing this exercise, you should have made one volume smaller, and extended
another.
1. Create a storage pool from five disks that are attached to the server.
Task 1: Create a storage pool from five disks that are attached to the server
1. On LON-SVR1, open Server Manager.
2. In the left pane, click File and Storage Services, and then in the Servers pane, click Storage Pools.
MCT USE ONLY. STUDENT USE PROHIBITED
9-28 Implementing Local Storage
o Name: StoragePool1
o Physical disks:
o PhysicalDisk3
o PhysicalDisk4
o PhysicalDisk5
o PhysicalDisk6
o PhysicalDisk7
o Drive letter: H
o File system: ReFS
Task 3: Copy a file to the volume, and verify that it is visible in Windows Explorer
1. Open a Command Prompt window.
2. Type the following command:
3. Open Windows Explorer from the taskbar, and access Mirrored Volume (H:). You should now see
write.exe in the file list.
2. Open Windows Explorer and browse to H:\write.exe to ensure access to the file is still available.
3. In Server Manager, in the STORAGE POOLS pane, on the menu bar, click the Refresh “Storage
Pools” button. Notice the warning that displays next to Mirrored Disk.
4. Open the Mirrored Disk Properties dialog box, and access the Health pane. Notice that the Health
Status indicates a Warning. The Operational Status should indicate Incomplete or Degraded.
Task 6: Add a new disk to the storage pool and remove a broken disk
1. Switch to LON-SVR1.
2. In Server Manager, in the STORAGE POOLS pane, on the menu bar, click the Refresh “Storage
Pools” button.
3. In the STORAGE POOLS pane, right-click StoragePool1, click Add Physical Disk, and then click
PhysicalDisk8 (LON-SVR1).
4. In the PHYSICAL DISKS pane, right-click the disk that displays a warning next to it, and then select
Remove Disk.
5. Click the Refresh “Storage Pools” button to see the warnings disappear.
Results: After completing this exercise, you should have created a storage pool and added five disks to
it. Then you should have created a three-way mirrored, thinly provisioned virtual disk from the storage
pool. You should have also copied a file to the new volume and verified that it is accessible. Next, after
removing a physical drive, you should have verified that the virtual disk was still available and could be
accessed. Finally, you should have added another physical disk to the storage pool.
Question: What are the two different types of disks in Disk Management?
Question: What are the most important implementations of RAID?
Question: You attach five 2 TB disks to your Windows Server 2012 computer. You want to
manage them almost automatically, and if one disk fails, you want to make sure the data is
not lost. What feature can you implement to accomplish this?
Tools
Tool Use Where to find it
Best Practices
The following are recommended best practices:
• If you want to shrink a volume, defragment the volume first so you can reclaim more space from the
volume.
• Use the GPT partition table format for disks larger than 2 TB.
• Use the Storage Spaces feature to have the Windows operating system manage your disks.
MCT USE ONLY. STUDENT USE PROHIBITED
10-1
Module 10
Implementing File and Print Services
Contents:
Module Overview 10-1
Lesson 2: Protecting Shared Files and Folders by Using Shadow Copies 10-15
Lesson 3: Configuring Network Printing 10-18
Module Overview
Accessing files and printers on the network is one of the most common activities in the Windows Server®
environment. Reliable, secure access to files and folders and print resources is often the first requirement
of a Windows Server 2012-based network. To provide access to file and print resources on your network,
you must understand how to configure these resources within Windows Server 2012 server, and how to
configure appropriate access to the resources for users in your environment.
This module discusses how to provide these important file and print resources with Windows Server 2012.
You will learn how to enable and configure file and print services in Windows Server 2012, and you will
learn important considerations and best practices for working with file and print services.
Objectives
After completing this module, you will be able to:
• Secure shared files and folders.
Lesson 1
Securing Files and Folders
The files and folders that your servers store typically contain your organization’s business and functional
data. Providing appropriate access to these files and folders, usually over the network, is an important part
of managing file and print services in Windows Server 2012.
This lesson gives you information necessary to secure files and folders on your Windows Server 2012
servers, so that your organization’s data is available yet protected.
Lesson Objectives
After completing this lesson, you will be able to:
• NTFS permissions are controlled by denying or granting specific types of NTFS file and folder access,
such as Read or Write.
• NTFS permissions can be inherited from parent folders. By default, the NTFS permissions that are
assigned to a folder are also assigned to newly created folders or files within that parent folder.
Standard Permissions
Standard permissions provide the most commonly used permission settings for files and folders. You
assign standard permissions in the NTFS Permissions Assignment window.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-3
The following table details the standard permissions options for NTFS files and folders.
Full Control Grants the user complete control of the file or folder, including control of
permissions.
Modify Grants the user permission to read, write, or delete a file or folder, including
creating a file or folder. It also grants permission to execute files.
Read and Execute Grants the user permission to read a file and start programs.
List folder contents Grants the user permission to view a list of the folder’s contents.
(folders only)
Note: Granting users Full Control permissions on a file or a folder gives them the ability to
perform any file system operation on the object, and the ability to change permissions on the
object. They can also remove permissions on the resource for any or all users, including you.
Advanced Permissions
Advanced permissions can provide a much greater level of control over NTFS files and folders. Advanced
permissions are accessible by clicking the Advanced button from the Security tab of a file or folder’s
Properties dialog box.
The following table details the Advanced permissions for NTFS files and folders.
Traverse Folder/Execute The Traverse Folder permission applies only to folders. This permission
File grants or denies users the right to browse through folders to reach other
files or folders, even if the user has no permissions for the traversed folders.
The Traverse Folder permission takes effect only when the group or user is
not granted the Bypass Traverse Checking user right. By default, the
Everyone group is given the Bypass Traverse Checking user right.
The Execute File permission grants or denies access to run program files.
If you set the Traverse Folder permission on a folder, the Execute File
permission is not automatically set on all files in that folder.
List Folder/Read Data The List Folder permission grants the user permission to view file names
and subfolder names. The List Folder permission applies only to folders and
affects only the contents of that folder—it does not affect whether the
folder itself will be listed. In addition, this setting has no effect on viewing
the file structure from a command-line interface.
The Read Data permission grants or denies the user permission to view
data in files. The Read Data permission applies only to files.
Read Attributes The Read Attributes permission grants the user permission to view the
basic attributes of a file or a folder such as Read-only and Hidden
attributes. Attributes are defined by NTFS.
MCT USE ONLY. STUDENT USE PROHIBITED
10-4 Implementing File and Print Services
Read Extended The Read Extended Attributes permission grants the user permission to view
Attributes the extended attributes of a file or folder. Extended attributes are defined by
applications, and can vary by application.
Create Files/Write Data The Create Files permission applies only to folders, and grants the user
permission to create files in the folder.
The Write Data permission grants the user permission to make changes to
the file and overwrite existing content by NTFS. The Write Data permission
applies only to files.
Create Folders/Append The Create Folders permission grants the user permission to create folders
Data within the folder. The Create Folders permission applies only to folders.
The Append Data permission grants the user permission to make changes to
the end of the file, but not to delete or overwrite existing data. The Append
Data permission applies only to files.
Write Attributes The Write Attributes permission grants the user permission to change the
basic attributes of a file or folder, such as Read-only or Hidden. Attributes
are defined by NTFS.
The Write Attributes permission does not imply that you can create or
delete files or folders; it includes only the permission to make changes to
the attributes of a file or folder. To grant Create or Delete permissions, see
the Create Files/Write Data, Create Folders/Append Data, Delete Subfolders
and Files, and Delete entries in this table.
Write Extended The Write Extended Attributes permission grants the user permission to
Attributes change the extended attributes of a file or folder. Extended attributes are
defined by programs, and can vary by program.
The Write Extended Attributes permission does not imply that the user can
create or delete files or folders; it includes only the permission to make
changes to the attributes of a file or folder. To grant Create or Delete
permissions, see the Create Files/Write Data, Create Folders/Append Data,
Delete Subfolders and Files, and Delete entries in this table.
Delete Subfolders and The Delete Subfolders and Files permission grants the user permission to
Files delete subfolders and files, even if the Delete permission is not granted on
the subfolder or file. The Delete Subfolders and Files permission applies only
to folders.
Delete The Delete permission grants the user permission to delete the file or folder.
If you have not been assigned Delete permission on a file or folder, you can
still delete the file or folder if you are granted Delete Subfolders and Files
permissions on the parent folder.
Read Permissions Read Permissions grants the user permission to read permissions about the
file or folder, such as Full Control, Read, and Write.
Change Permissions Change Permissions grants the user permission to change permissions on
the file or folder, such as Full Control, Read, and Write.
Take Ownership The Take Ownership permission grants the user permission to take
ownership of the file or folder. The owner of a file or folder can change
permissions on it, regardless of any existing permissions that protect the file
or folder.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-5
Synchronize The Synchronize permission assigns different threads to wait on the handle
for the file or folder, and then synchronize with another thread that may
signal it. This permission applies only to multiple-threaded, multiple-process
programs.
• For the Marketing Pictures folder, an administrator has chosen to assign Adam Carter Allow
permissions for the Read permission type. Under default NTFS permissions behavior, Adam Carter will
have Read access to the files and folders that are contained in the Marketing Pictures folder.
• When applying NTFS permissions, the results are cumulative. For example, in the previous example,
say that Adam Carter is also a part of the Marketing group. The Marketing group has been given
Write permissions on the Marketing Pictures folder. When we combine the permissions assigned to
Adam Carter’s user account with the permissions assigned to the Marketing group, Adam would have
both Read and Write permissions for the Marketing Pictures folder.
• Explicit vs. Inherited. When you apply NTFS permissions, permissions that are explicitly applied to a
file or a folder take precedence over those that are inherited from a parent folder.
• Deny vs. Allow. After NTFS permissions have been divided into explicit and inherited permissions, any
existing Deny permissions will override conflicting Allow permissions within the group.
Therefore, taking these rules into account, NTFS permissions will apply in the following order:
1. Explicit Deny
2. Explicit Allow
3. Inherited Deny
4. Inherited Allow
It is important to remember that NTFS permissions are cumulative, and these rules apply only when two
NTFS permission settings conflict with each other.
1. Right-click the file or folder for which you want to assign permissions, and then click Properties.
2. In the Properties dialog box, click the Security tab. In this tab, you can select the current users or
groups that have been assigned permissions to view the specific permissions assigned to each
principal.
3. To open an editable permissions dialog box so that you can modify existing permissions or add new
users or groups, click the Edit button.
MCT USE ONLY. STUDENT USE PROHIBITED
10-6 Implementing File and Print Services
Note: The sharing process applies only to the folder level. You cannot share an individual
file or a group of files.
• Use the File Sharing Wizard, either from the folder’s right-click menu, or by clicking the Share button
on the Sharing tab of the folder’s Properties dialog box.
• Use Advanced Sharing by clicking the Advanced Sharing button on the Sharing tab of the folder’s
Properties dialog box.
Note: When sharing a folder, you will be asked to give the shared folder a name. This name
does not have to be the same name as the actual folder; it can be a descriptive name that better
describes the folder contents to network users.
Administrative Shares
You can create administrative (or hidden) shared folders that need to be available from the network,
but should be hidden from users browsing the network. You can access an administrative shared folder
by typing in its UNC path, but the folder will not display if you browse the server by using a Windows®
Explorer window. Administrative shared folders also typically have a more restrictive set of permissions
assigned to the shared folder to reflect the administrative nature of the folder’s contents.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-7
To hide a shared folder, append the dollar symbol ($) to the folder’s name. For example, a shared folder
on LON-SVR1 named Sales can be made into a hidden shared folder by naming it Sales$. The shared
folder is accessible over the network by using the UNC path \\LON-SVR1\Sales$.
Note: Shared folder permissions apply only to users who access the folder over the
network. They do not affect users who access the folder locally on the computer where the folder
is stored.
The following table lists the permissions that you can grant to a shared folder.
Shared folder
Description
permission
Read Users can view folder and file names, view file data and attributes, run program
files and scripts, and navigate the folder structure within the shared folder.
Change Users can create folders, add files to folders, change data in files, append data
to files, change file attributes, delete folders and files, and perform all tasks
permitted by the Read permission.
Full Control Users can change file permissions, take ownership of files, and perform all tasks
permitted by the Change permission.
Note: When you assign Full Control permissions on a shared folder to a user, that user can
modify permissions on the shared folder, which includes removing all users (including
administrators), from the shared folder’s permissions list. In most cases, you should grant Change
Permission instead of Full Control permission.
Permissions Inheritance
By default, NTFS and shared folders use
inheritance to propagate permissions throughout
a folder structure. When you create a file or a
folder, it is automatically assigned the permissions
that are set on any folders that exist above it
(parent folders) in the hierarchy of the folder
structure.
MCT USE ONLY. STUDENT USE PROHIBITED
10-8 Implementing File and Print Services
In this example, Adam is a member of two groups that are assigned permissions for files or folders within
the folder structure. They are as follows:
• The top-level folder, Marketing, has an assigned permission for the Marketing Group giving them
Read access.
• In the next level, the Marketing Pictures folder has no explicit permissions set, but because of
permissions inheritance Adam has Read access to this folder and its contents from the permissions
that are set on the Marketing folder.
• In the third level, the New York folder has Write permissions assigned to one of Adam’s groups—New
York Editors. In addition to this explicitly assigned Write permission, the New York folder also inherits
the Read permission from the Marketing folder. These permissions pass down to file and folder
objects, cumulating with any explicit Read and Write permissions set on those files.
• The fourth and last level is the Fall_Composite.jpg file. Even though no explicit permissions have been
set for this file, Adam has both Read and Write access to the file due to the inherited permissions
from both the Marketing folder and the New York folder.
Permission Conflicts
Sometimes, explicitly set permissions on a file or folder will conflict with permissions inherited from a
parent folder. In these cases, the explicitly assigned permissions always override the inherited permissions.
In the given example, if Adam Carter was denied Write access to the parent Marketing folder, but then
explicitly granted Write access to the New York folder, the granted Write access permissions would take
precedence over the inherited deny Write access permission.
Blocking Inheritance
You can also disable the inheritance behavior for a file or a folder (and its contents) on an NTFS drive to
explicitly define permissions for a set of objects without including any of the inherited permissions from
any parent folders. Windows Server 2012 provides an option for blocking inheritance on a file or a folder.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-9
• Right-click the file or folder where you want to block inheritance, and then click Properties.
• In the Properties window, click the Security tab, and then click the Advanced button.
• In the Advanced Security Settings window, click the Change Permissions button.
• In the next Advanced Security Settings window, click the Disable inheritance button.
At this point, you are prompted to either convert the inherited permissions into explicit permissions or
remove all inherited permissions from the object to start with a blank permissions slate.
Effective Permissions
Access to a file or folder in Windows Server 2012
is granted based on a combination of permissions.
When a user attempts to access a file or folder,
the permission that applies is dependent on
various factors, including:
Effective NTFS permissions are the cumulative permissions that are assigned to a user for a file of folder
based on the factors listed above. The following principles determine effective NTFS permissions:
• Cumulative permissions are the combination of the highest NTFS permissions granted to the user and
to all the groups of which the user is a member. For example, if a user is a member of a group that
has Read permission and is a member of a group that has Modify permission, the user is assigned
cumulative Modify permissions.
• Deny permissions override equivalent Allow permissions. However, an explicit Allow permission can
override an inherited Deny permission. For example, if a user is denied Write access to a folder via an
inherited Deny permission, but is explicitly granted Write access to a subfolder or a particular file, the
explicit Allow overrides the inherited Deny for the particular subfolder or file.
• You can apply permissions to a user or to a group. Assigning permissions to groups is preferred
because they are more efficient than managing permissions that are set for many individuals.
MCT USE ONLY. STUDENT USE PROHIBITED
10-10 Implementing File and Print Services
• NTFS file permissions take priority over folder permissions. For example, if a user has Read permission
to a folder, but has been granted Modify permission to certain files in that folder, the effective
permission for those files will be set to Modify.
• Every object in an NTFS drive or in Active Directory® Domain Services (AD DS) is owned. The owner
controls how permissions are set on the object and to whom permissions are granted. For example, a
user who creates a file in a folder where they have Modify permissions can change the permissions on
the file to Full Control.
1. Right-click the file or folder for which you want to analyze permissions, and then click Properties.
2. In the Properties dialog box, click the Advanced button.
3. In the Advanced Security Settings window, click the Effective Permissions tab.
• Likewise, if you set the shared folder permission to Full Control, and you set the NTFS permissions to
Write, then the user will have no restrictions at the shared folder level, but the NTFS permissions on
the folder will grant only Write permissions to that folder.
The user must have appropriate permissions on both the NTFS file or folder and the shared folder. If no
permissions exist for the user (either as an individual or as the member of a group) on either resource,
access is denied.
• Grant permissions to groups instead of users. Groups can always have individuals added or deleted,
while permissions on a case-by-case basis are difficult to track and cumbersome to manage.
• Use Deny permissions only when necessary. Because Deny permissions are inherited, assigning deny
permissions to a folder can result in users not being able to access files further down in the folder
structure tree. You should assign Deny permissions only in the following situations:
• To exclude one specific permission when you have granted Full Control permissions to a user or a
group
• Never deny the Everyone group access to an object. If you deny the Everyone group access to an
object, you deny Administrators access—including yourself. Instead, remove the Everyone group from
the permissions list, as long as you grant permissions for the object to other users, groups, or
computers.
• Grant permissions to an object that is as high in the folder structure as possible, so that the security
settings are propagated throughout the tree. For example, instead of bringing groups representing all
departments of the company together into a Read folder, assign Domain Users (which is a default
group for all user accounts on the domain) to the share. In this manner, you eliminate the need to
update department groups before new users receive the shared folder.
• Use NTFS permissions instead of shared permissions for fine-grained access. Configuring both NTFS
and shared folder permissions can be difficult. Consider assigning the most restrictive permissions for
a group that contains many users at the shared folder level, and then use NTFS permissions to assign
permissions that are more specific.
4. In the Shares pane, right-click the shared folder for which you want to enable access-based
enumeration, and then click Properties.
5. In the Properties dialog box, click Settings, and then select the Enable access-based enumeration
check box.
When the Enable access-based enumeration check box is selected, access-based enumeration is
enabled on the shared folder. This setting is unique to each shared folder on the server.
Note: The File and Storage Services console is the only place in the Windows Server 2012
interface where you can configure access-based enumeration for a shared folder. Access-based
enumeration is not available in any of the properties dialog boxes that are accessible by
right-clicking the shared folder in Windows Explorer.
MCT USE ONLY. STUDENT USE PROHIBITED
10-12 Implementing File and Print Services
• Windows 7
• Windows Vista®
• Windows Server 2003
• Windows XP
With Windows Server 2012, you view the Offline Settings window for a shared folder by clicking the
Caching button in the Advanced Sharing window. The following options are available within the Offline
Settings window:
• Only the files and programs that users specify are available offline. This is the default option when
you set up a shared folder. When you use this option, no files or programs are available offline by
default, and users control which files and programs they want to access when they are not connected
to the network. Alternatively, you can choose the Enable BranchCache option. This option enables
computers that are accessing the files to cache files downloaded from the folder using Windows
BranchCache®. You must install and configure BranchCache on the Windows Server 2012 server to
select this option.
• No files or programs from the shared folder are available offline. This option blocks client computers
from making copies of the files and programs on the shared folder.
• All files and programs that users open from the shared folder are automatically available offline.
Whenever a user accesses the shared folder or drive and opens a file or program in it, that file or
program is made automatically available offline to that user. Files and programs that are made
automatically available offline remain in the offline files cache and synchronize with the version on
the server until the cache is full or the user deletes the files. Files and programs that are not opened
are not available offline.
• Optimized for performance. If you select the Optimized for performance check box, executable
files (.exe, .dll) that are run from the shared folder by a client computer are cached on that client
computer automatically. The next time the client computer runs the executable files, it will access its
local cache instead of the shared folder on the server.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-13
Note: The Offline Files feature must be enabled on the client computer for files and
programs to be cached automatically. In addition, the Optimized for performance option does
not have any effect on client computers that use Windows Vista or older Windows operating
systems, because these operating systems perform the program-level caching automatically, as
specified by this option.
This configuration typically results in faster access to files for client computers, especially when
connectivity or speed of a network connection is intermittent. Synchronization with the files on the server
occurs according to the offline files configuration of the client computer.
Demonstration Steps
Create a shared folder
2. Navigate to the Share pane in the File and Storage Services management console.
3. Open the Data Properties dialog box for \\LON-SVR1\Data, and enable access-based enumeration.
MCT USE ONLY. STUDENT USE PROHIBITED
10-14 Implementing File and Print Services
2. Navigate to the Sharing tab, and open the Advanced Sharing settings.
Note: Leave all virtual machines in their current state for the subsequent demonstration.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-15
Lesson 2
Protecting Shared Files and Folders by Using Shadow
Copies
You use shadow copies to restore previous versions of files and folders. It is much faster to restore a
previous version of a file from a shadow copy than from a traditional backup copy, which might be stored
offsite. Files and folders can be recovered by administrators, or directly by end users.
This lesson introduces you to shadow copies, and shows you how to configure a schedule of shadow
copies in Windows Server 2012.
Lesson Objectives
After completing this lesson, you will be able to:
By default, the changed disk blocks are stored on the same drive as the original file, but you can modify
this behavior. You can also define how much disk space is allocated for shadow copies. Multiple snapshots
are retained until the allocated disk space is full, after which, older snapshots are removed to make room
for new snapshots. The amount of disk space that is used by a snapshot is based on the size of disk
changes between snapshots.
Because a snapshot is not a complete copy of files, you cannot use shadow copies as a replacement for
traditional backups. If the disk containing a drive is lost or damaged, then the snapshots of that drive are
also lost.
Shadow copies are suitable for recovering data files, but not for more complex data (such as databases),
that need to be logically consistent before a backup is performed. A database that is restored from
previous versions is likely to be corrupt and require database repairs.
MCT USE ONLY. STUDENT USE PROHIBITED
10-16 Implementing File and Print Services
• Increase the frequency of shadow copies for important data. This increases the likelihood that recent
file changes are captured.
When viewing previous versions of a folder, you can browse the available files and select only the file that
you need. If multiple versions of files are available, you can review each version before deciding which one
to restore. Finally, you can copy a previous version of a file to an alternate location instead of restoring it
to its previous location. This prevents overwriting the current file version.
Windows XP with Service Pack 2 (SP2) or newer, Windows Vista, and Windows 7 operating system clients
are capable of accessing previous file versions without installing any additional software. The ability to
access previous file versions is no longer supported in Windows operating systems prior to Windows XP
with SP2.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-17
Demonstration Steps
Configure shadow copies
4. Change the contents of TestFile.txt by adding and saving the text Version 1.
Create a shadow copy
1. In Windows Explorer, right-click Local Disk (C:), and then click Configure Shadow Copies.
1. In Windows Explorer, right-click TestFile.txt, and then click Restore previous versions.
2. Restore the most recent version.
Note: Leave all virtual machines in their current state for the subsequent demonstration.
MCT USE ONLY. STUDENT USE PROHIBITED
10-18 Implementing File and Print Services
Lesson 3
Configuring Network Printing
By using the Print and Document Services role in Windows Server 2012, you can share printers on a
network and centralize print server and network printer management. By using the Print Management
console, you can monitor print queues, and receive important notifications regarding print server activity.
Windows Server 2012 introduces new features and important changes to the Print and Document Services
role that you can use to manage your network printing environment better. This lesson explains the
important aspects of network printing, and introduces new network printing features that are available in
Windows Server 2012.
Lesson Objectives
After completing the lesson, you will be able to:
• Lower costs. A network printer is more expensive than those typically used for local printing, but it
also has significantly lower consumables costs and better quality printing. Therefore, the cost of
printing is still minimized, because the initial cost of the printer is spread over all the computers that
connect to that printer. For example, a single network printer could service 100 users or more.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-19
• Users can search for printers easily. You can also publish network printers in AD DS, which allows
users to search for printers in their domain.
• Sharing a printer does not require provisioning drivers that match the client architecture.
• Driver files are isolated on a per-driver basis, preventing driver file naming conflicts.
• Driver packages are smaller and more streamlined than v3 drivers, resulting in faster driver installation
times.
• The printer driver and the printer user interface can be deployed independently.
With Enhanced Point and Print, the print device drivers no longer need to be maintained on the print
server. Driver installation for network print devices becomes faster because printer drivers no longer need
to be transferred over the network from server to client.
If the driver store on the client machine does not contain a driver for the network printer that is being
installed, and if an appropriate driver cannot be obtained from Windows Update or Windows Server
Update Services, Windows uses a fallback mechanism to enable cross-platform printing using the print
driver from the print server.
• Manage this printer: This permission allows users to modify printer settings, including updating
drivers. By default, this permission is given to Administrators, Server Operators, and Print Operators.
• Manage documents: This permission allows users to modify and delete print jobs in the queue. This
permission is assigned to CREATOR OWNER, which means that the user who creates a print job
manages that job. Administrators, Server Operators, and Print Operators also have this permission
for all print jobs.
Demonstration Steps
Create a shared printer
2. Add a printer using the LPT1 local port, and the Brother Color Leg Type1 Class driver.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-21
2. Add a printer using the LPT1 local port, and the Brother Color Leg Type1 Class driver.
A printer pool is configured on a server by specifying multiple ports for a printer. Each port is the location
of one physical printer. In most cases, the ports are an IP address on the network, instead of a local LPT or
USB connection.
• Printers must use the same driver: Clients use a single printer driver for generating print jobs. All
printers must accept print jobs in the same format. In many cases, this means that a single printer
model is used.
• Printers should be in the same location: The printers in a printer pool should be located physically
close together. When users retrieve their print jobs, they must check all printers in the printer pool to
find their document. There is no way for users to know which printer has printed their document.
MCT USE ONLY. STUDENT USE PROHIBITED
10-22 Implementing File and Print Services
To configure Branch Office Direct Printing from the Print Management console, use the following steps:
1. In Server Manager, open the Print Management console.
2. In the navigation pane, expand Print Servers, and then expand the print server that is hosting the
network printer for which Branch Office Direct Printing will be enabled.
3. Click the Printers node, right-click on the desired printer, and then click Enable Branch Office
Direct Printing.
To configure Branch Office Direct Printing using Windows PowerShell, type the following cmdlet at a
Windows PowerShell prompt:
Set-Printer -name "<Printer Name Here>" -ComputerName <Print Server Name Here>
-RenderingMode BranchOffice
computer account, and can be targeted by group. For Windows XP computers, you must install the
Group Policy Preference Client Extension.
• GPO created by Print Management. The Print Management administrative tool can add printers to a
GPO for distribution to client computers based on either a user account or a computer account.
Windows XP computers must be configured to run PushPrinterConnections.exe.
• Manual installation. Each user can add printers manually by either browsing the network or using the
Add Printer Wizard. It is important to note that network printers that are installed manually are
available only to the user that installed them. If multiple users share a computer, they must each
install the printer manually.
MCT USE ONLY. STUDENT USE PROHIBITED
10-24 Implementing File and Print Services
Objectives
After performing this lab you will be able to:
Lab Setup
Estimated Time: 45 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must
complete the following steps:
1. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Hyper-V® Manager, click 20410B-LON-DC1 and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
• Password: Pa$$w0rd
• Domain: Adatum
5. Repeat steps 2 to 4 for 20410B-LON-SVR1. Repeat steps 2-3 for 20410B-LON-CL1. Do not sign in
to LON-CL1 until directed to do so.
There have been problems in other branch offices with conflicts when offline files are used for shared data
structures. To avoid conflicts, you need to disable Offline Files for this share.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-25
• E:\Data
• E:\Data\Development
• E:\Data\Marketing
• E:\Data\Research
• E:\Data\Sales
3. In Windows Explorer, add the following NTFS permissions for the folder structure:
Folder Permissions
E:\Data No change
3. Navigate to \\LON-SVR1\Data.
Note: Bernard should have access to the Development folder. However, although Bernard can still
see the other folders, he does not have access to their contents.
4. Click Shares.
5. Open the Properties window for the Data share, and from the Settings page, enable Access-based
enumeration.
Note: Bernard can now view only the Development folder, the folder for which he has been
assigned permissions.
4. Open the Properties window for the Data folder, and disable Offline file caching.
Results: After finishing this exercise, you will have created a new shared folder for use by multiple
departments.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-27
Your manager has asked you to ensure that shadow copies are enabled on the file server so you can
restore recently modified or deleted files without using a backup tape. Because the data in this branch
office changes frequently, you have been asked to configure a shadow copy to be created once per hour.
The main tasks for this exercise are as follows:
3. Switch back to the Allfiles (E:) Properties dialog box; it should still be opened on the Shadow Copies
tab. Click Create Now.
4. Open the most recent version of the Development folder, and then copy the Report.txt file.
5. Paste the file back into the Development folder.
Results: After finishing this exercise, you will have enabled shadow copies on the file server.
MCT USE ONLY. STUDENT USE PROHIBITED
10-28 Implementing File and Print Services
To ensure high availability of this printer, you need to format it as a pooled printer. Two physical print
devices of the same model have been installed in the branch office for this purpose.
The main tasks for this exercise are as follows:
2. Install a printer.
3. Configure printer pooling.
• IP Address: 172.16.0.201
Results: After finishing this exercise, you will have installed the Print and Document Services server role
and installed a printer with printer pooling.
Question: How does implementing access-based enumeration benefit the users of the Data
shared folder in this lab?
Question: Is there another way you could recover the file in the shadow copy exercise? What
benefit do shadow copies provide in comparison?
Question: In Exercise 3, how could you configure Branch Office Direct Printing if you were in
a remote location and did not have access to the Windows Server 2012 GUI for the print
server?
MCT USE ONLY. STUDENT USE PROHIBITED
10-30 Implementing File and Print Services
Question: Why should you not use shadow copies as a means for data backup?
Tools
Name of tool Used for Where to find it
Effective Permissions Assessing combined permissions Under Advanced, on the Security tab
Tool for a file, folder, or shared folder. of the Properties dialog box of a file,
folder or shared folder.
Print Management Managing the print environment The Tools menu in Server Manager.
console in Windows Server 2012.
MCT USE ONLY. STUDENT USE PROHIBITED
11-1
Module 11
Implementing Group Policy
Contents:
Module Overview 11-1
Module Overview
Maintaining a consistent computing environment across an organization is challenging. Administrators
need a mechanism to configure and enforce user and computer settings and restrictions. Group Policy can
provide that consistency by enabling administrators to centrally manage and apply configuration settings.
This module provides an overview of Group Policy and provides details about how to implement GPOs.
Objectives
After completing this module, you will be able to:
• Create and manage Group Policy Objects.
Lesson 1
Overview of Group Policy
Group Policy allows you to control the computing environment. It is important to understand how Group
Policy functions, so you can apply Group Policy correctly. This lesson provides an overview of Group Policy
structure, and defines local and domain-based Group Policy Objects (GPOs). It also describes the types of
settings available for users and groups.
Lesson Objectives
After completing this lesson, you will be able to:
GPOs
A GPO is an object that contains one or more
policy settings that apply configuration setting
for users, computers, or both. GPOs are stored in
SYSVOL, and can be managed by using the Group
Policy Management Console (GPMC). Within the GPMC, you can open and edit a GPO by using the Group
Policy Management Editor. GPOs are logically linked to Active Directory® containers to apply settings to
the objects in those containers.
• Not Configured. The GPO will not modify the existing configuration of the particular setting for the
user or computer.
• Enabled. The policy setting will be applied.
Note: Some settings are multi-valued or have text string values. These are typically used
to provide specific configuration details to applications or operating system components. For
example, a setting might provide the URL of the home page for Windows Internet Explorer® or
for blocked applications.
The effects of the configuration change depends on the policy setting. For example, if you enable
the Prohibit Access to Control Panel policy setting, users will be unable to open Control Panel. If you
disable the policy setting, you ensure that users can open Control Panel. Notice the double negative in
this policy setting: You disable a policy that prevents an action, thereby allowing the action.
• User settings. These are settings that modify the HKey Current User hive of the registry.
• Computer settings. These are settings that modify the HKEY Local Machine hive of the registry.
User and computer settings each have three areas of configuration, as described in the following table.
Section Description
Software settings Contain software settings that can be deployed to either the user or the
computer. Software that is deployed to a user is specific to that user.
Software that is deployed to the computer is available to all users of
that computer.
Windows operating system Contain script settings and security settings for both user and computer,
settings and Internet Explorer maintenance for the user configuration.
Administrative templates Contain hundreds of settings that modify the registry to control various
aspects of the user and computer environment. New administrative
templates might be created by Microsoft or other vendors. You can add
these new templates to the GPMC. For example, Microsoft has Office
2010 templates that are available for download, and that you can add
to the GPMC.
Windows 8 and Windows Server 2012 provide this ability with the following three layers of local GPOs:
Note: The exception to this feature is domain controllers. Due to the nature of their role,
domain controllers cannot have local GPOs.
With the exception of the categories of Administrator or Non-Administrator, it is not possible to apply
local GPOs to groups, but only to individual local user accounts. Domain users are subject to the local
Group Policy, or the Administrator or Non-Administrator settings, as appropriate.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-5
Note: Domain administrators can disable processing local GPOs on clients that are running
Windows client operating systems and Windows Server operating systems by enabling the Turn
Off Local Group Policy Objects Processing policy setting in a domain GPO.
The Group Policy Client can identify an updated GPO by its version number. Each GPO has a version
number that is incremented each time a change is made. The version number is stored as an attribute
of the Group Policy container, and in a text file, GPT.ini, in the Group Policy Template folder. The Group
Policy Client knows the version number of each GPO that it has previously applied. If, during Group Policy
refresh, the Group Policy Client discovers that the version number of the Group Policy container has been
changed, the CSEs will be informed that the GPO is updated.
When editing a Group Policy, the version on the computer that has the primary domain controller (PDC)
emulator Flexible Single Master Operations (FSMO) role is the version being edited. It does not matter
what computer you are using to perform the editing, the GPMC is focused on the PDC emulator by
default. It is possible to change the focus of the GPMC to edit a version on a different domain controller.
MCT USE ONLY. STUDENT USE PROHIBITED
11-6 Implementing Group Policy
Characteristics of Preferences
Preferences have the following characteristics:
• Preferences can be managed through the Remote Server Administration Tool (RSAT).
• Preferences can be applied only once at startup or logon, or refreshed at intervals.
• Unlike Group Policy settings, preferences are not removed when the GPO is no longer applied, but
you can change this behavior.
• Preferences can easily be targeted to certain users or computers through a variety of ways, such as
security group membership or operating system version.
• Map printers
Available Settings
Starter GPOs can only contain settings from
the Administrative Templates node of either
the User Configuration section or the Computer
Configuration section. The Software Settings and
Windows Settings nodes of Group Policy are not
available, because these nodes involve interaction
of services and are more complex and domain-dependent.
• Creating GPOs
• Editing GPOs
The Group Policy Creator Owners group lets its members create new GPOs, and edit or delete GPOs that
they have created.
• Domain Admins
• Enterprise Admins
• Creator Owner
• Local System
The Authenticated User group has Read and Apply Group Policy permissions only.
• Explicitly grant the group or user permission to create GPOs by using GPMC
Demonstration Steps
Create a GPO by using the GPMC
• Sign in to LON-DC1 as Administrator with a password of Pa$$w0rd, and create a policy named
Prohibit Windows Messenger.
Lesson 2
Group Policy Processing
Understanding how Group Policy is applied is the key to being able to develop a Group Policy strategy.
This lesson shows you how Group Policy is associated with Active Directory objects, how it is processed,
and how to control the application of Group Policy. After creating the GPOs and configuring the settings
you want to apply, they must be linked to containers. GPOs are applied in a specific order. This order
might determine what settings are applied to objects. There are two default policies that are automatically
created. These policies are used to deliver password and security settings for the domain and for domain
controllers. The application of policies can also be controlled through security filtering.
Lesson Objectives
After completing this lesson, you will be able to:
GPO Links
Once you have created a GPO and defined all the
settings that you want it to deliver, the next step is
to link the policy to an Active Directory container.
A GPO link is the logical connection of the policy
to a container. You can link a single GPO to
multiple containers by using the GPMC. You can
link GPOs to the following types of containers:
• Sites
• Domains
• OUs
You can disable links to containers, which removes the configuration settings. You can also delete links.
Deleting links does not delete the actual GPO, only the logical connection to the container.
GPOs cannot be linked directly to users, groups, or computers. In addition, GPOs cannot be linked to the
system containers in AD DS, including Builtin, Computers, Users, or Managed Service Accounts. The AD DS
system containers receive Group Policy settings from GPOs that are linked to the domain level only.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-11
Applying GPOs
Computer configuration settings are applied at
startup, and then are refreshed at regular
intervals. Any startup scripts are run at computer
startup. The default interval is every 90 minutes,
but this is configurable. The exception to the set
interval is domain controllers, which have their
settings refreshed every five minutes.
You can change the refresh interval by configuring a Group Policy setting. For computer settings,
the refresh interval setting is found in the Computer Configuration\Policies\Administrative Templates
\System\Group Policy node. For user settings, the refresh interval is found at the corresponding settings
under User Configuration. An exception to the refresh interval is security settings. The security settings
section of the Group Policy will be refreshed at least every 16 hours, regardless of the interval that you set
for the refresh interval.
You can also refresh Group Policy manually. The command line utility Gpupdate refreshes and delivers
any new Group Policy configurations. The Gpupdate /force command refreshes all the Group Policy
settings. There is also a new Windows PowerShell Invoke-Gpupdate cmdlet, which performs the same
function.
A new feature in Windows Server 2012 is Remote Policy Refresh. This feature allows administrators to
use the GPMC to target an OU and force Group Policy refresh on all of its computers and their currently
logged-on users. To do this, you right-click any OU, and then click Group Policy Update. The update
occurs within 10 minutes.
2. Site GPOs. Policies that are linked to sites are processed next.
3. Domain GPOs. Policies that are linked to the domain are processed next. There are often multiple
polices at the domain level. These policies are processed in order of preference.
4. OU GPOs. Policies linked to OUs are processed next. These policies contain settings that are unique to
the objects in that OU. For example, the Sales users might have special required settings. You can link
a policy to the Sales OU to deliver those settings.
5. Child OU policies. Any policies that are linked to child OUs are processed last.
Objects in the containers receive the cumulative effect of all polices in their processing order. In the case
of a conflict between settings, the last policy applied takes effect. For example, a domain-level policy
might restrict access to registry editing tools, but you could configure an OU-level policy and link it to the
IT OU to reverse that policy. Because the OU-level policy is applied later in the process, access to registry
tools would be available.
Note: Other methods such as Enforcement and Inheritance Blocking can change the effect
of policies on containers.
If multiple policies are applied at the same level, the administrator can assign a preference value to
control the order of processing. The default preference order is the order in which the policies were
linked.
You can also disable the user or computer configuration of a particular GPO. If one section of a policy is
known to be empty, then you should disable the empty section to speed up policy processing. For
example, if you have a policy that only delivers user desktop configuration, you could disable the
computer-side of the policy.
Note: The Authenticated Users group includes all user and computer accounts that have
been authenticated to AD DS.
Note: As a best practice, you should never deny access to the Authenticated User group. If
you do, then security principles would never receive the GPO settings.
The ACL of a GPO is accessed in the GPMC by selecting the GPO in the Group Policy Object folder, and
then clicking the Delegation>Advanced tab.
MCT USE ONLY. STUDENT USE PROHIBITED
11-14 Implementing Group Policy
Scenario
The following illustration represents a portion
of the A. Datum Corporation’s AD DS structure,
which contains the Sales OU with its child OUs and
the Servers OU.
Some users in the Sales OU have administrative rights on their computers, and have created local policies
to specifically grant access to Control Panel.
Discussion Questions
Based on this scenario, answer the following questions:
Question: What power options will the servers in the Servers OU receive?
Question: What power options will the laptops in the Sales Laptops OU receive?
Question: What power options will all other computers in the domain receive?
Question: Will users in the Sales Users OU who have created local policies to grant access to
Control Panel be able to access Control Panel?
Question: If you needed to grant access to Control Panel to some users, how would you do
it?
Question: Can GPO2 be applied to other department OUs?
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-15
Demonstration Steps
Use Gpupdate to refresh Group Policy
• On LON-DC1, use Gpupdate to refresh the GPOs.
Lesson 3
Implementing a Central Store for Administrative
Templates
Larger organizations might have many GPOs with multiple administrators managing them. When an
administrator edits a GPO, the template files are pulled from the local workstation. The central store
provides a single folder in SYSVOL that contains all of the templates required to create and edit GPOs.
This lesson discusses the files that make up the templates, and discusses how to create a central store
location to provide consistency in the templates that administrators use.
Lesson Objectives
After completing this lesson, you will be able to:
The Central Store addresses this issue. The Central Store provides a single point from which administration
workstations can download the same ADMX and ADML files when editing a GPO. The Central Store is
detected automatically by Windows operating systems that are the Windows Vista version or newer, and
Windows Server 2008 operating systems. As such, the local workstation that the administrator uses to
perform administration always checks to see if a Central Store exists before loading the local ADMX and
ADML files in the Group Policy Object Editor. When the local workstation detects a Central Store, it then
downloads the template files from there. In this way, there is a consistent administration experience
among multiple workstations.
You must create and provision the Central Store manually. First you must create a folder on a domain
controller, name the folder PolicyDefinitions, and store the folder at C:\Windows\SYSVOL\sysvol
\{Domain Name}\Policies\. This folder will now be your Central Store. You must then copy all the contents
of the C:\Windows\PolicyDefinitions folder to the Central Store. The ADML files in this folder are also in a
language-specific folder (such as en-US).
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-17
• They are organized into subfolders that house configuration options for specific areas of the
environment, such as network, system, and Windows components.
• The settings in the Computer section edit the HKEY_LOCAL_MACHINE registry hive, and settings in
the User section edit the HKEY_CURRENT_USER registry hive.
• Some settings exist for both User and Computer. For example, there is a setting to prevent Windows
Messenger from running in both the User and the Computer templates. In case of conflicting settings,
the Computer setting prevails.
• Some settings are available only to certain versions of Windows operating systems, such as several
new settings that can be applied only to the Windows 7 and newer operating systems versions.
Double-clicking the settings will display the supported versions for that setting. Any setting that
cannot be processed by an older Windows operating system is simply ignored by that system.
ADM Files
Prior to Windows Vista, administrative templates had an .adm file extension (ADM). ADM files were
language-specific, and were difficult to customize. ADM files are stored in SYSVOL as part of the Group
Policy template. If an ADM file is used in multiple GPOs, then the file is stored multiple times. This
increases the size of SYSVOL, and therefore increases the size of Active Directory replication traffic.
Section Nodes
Most of the nodes contain multiple subfolders to further organize settings into logical groupings. Even
with this organization, finding the setting that you need might be a daunting task. To help you locate
settings, in the All Settings folder you can filter the entire list of settings in either the computer or the user
section. The following filter options are available:
• Managed or unmanaged
• By platform
You can also combine multiple criteria. For example, you could filter to find all the configured settings
that apply to Internet Explorer 10 by using the keyword ActiveX.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-19
By default, the Group Policy Management Editor hides unmanaged policy settings to discourage you from
implementing a configuration that is difficult to revert. Many of the settings that are available in Group
Policy preferences are unmanaged settings.
MCT USE ONLY. STUDENT USE PROHIBITED
11-20 Implementing Group Policy
In your role as a member of the server support team, you help to deploy and configure new servers and
services into the existing infrastructure based on the instructions given to you by your IT manager.
Your manager has asked you to create a central store for ADMX files to ensure that everyone can edit
GPOs that have been created with customized ADMX files. You also need to create a starter GPO that
includes Internet Explorer settings, and then configure a GPO that applies GPO settings for the Marketing
department and the IT department.
Objectives
After completing this lab, you will be able to:
• Configure a Central Store.
• Create GPOs.
Lab Setup
Estimated Time: 40 minutes
Password Pa$$w0rd
2. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
5. Repeat steps 2 and 3 for 20410B-LON-CL1. Do not sign in until directed to do so.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-21
After implementation, you noticed that you are unable to modify the application settings in the GPO from
any location other than the workstation that was originally used by your colleague. To resolve this issue,
your manager has asked you to create a Central Store for administrative templates. After you create the
Central Store, your colleague will copy the vendor ADMX template from the workstation into the Central
Store.
Task 1: View the location of administrative templates in a Group Policy Object (GPO)
1. Sign in to LON-DC1 as Administrator with a password of Pa$$w0rd.
Results: After completing this exercise, you should have configured a Central Store.
Your manager has asked you to create a starter GPO that can be used for all departments with default
restriction settings for Internet Explorer. You then need to create the GPOs that will deliver the settings for
members of all departments except for the IT department.
MCT USE ONLY. STUDENT USE PROHIBITED
11-22 Implementing Group Policy
5. Use security filtering to exempt the IT Department from the Internet Explorer Restrictions policy.
6. Test the GPO application for IT department users.
2. Type a comment that states This GPO disables the General page in Internet Options.
Hint: Select All Settings in Administrative Templates and filter for an exact match by the
keywords General Page.
Task 3: Create an Internet Explorer Restrictions GPO from the Internet Explorer
Restrictions starter GPO
• Create a new GPO named IE Restrictions that is based on the Internet Explorer Restrictions starter
GPO, and link it to the Adatum.com domain.
Task 5: Use security filtering to exempt the IT Department from the Internet Explorer
Restrictions policy
1. On LON-DC1, open GPMC.
2. Configure security filtering on the Internet Explorer Restrictions policy to deny access to the IT
department.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-23
3. Attempt to change your home page. Verify that the Internet Properties dialog box opens to the
General tab, and all settings are available.
4. Open Internet Options to verify that the General tab has been restricted.
5. Sign out of LON-CL1.
Results: After completing this lab, you should have created a GPO.
2. In the Virtual Machines list, right-click 20410B-LON-DC1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.
4. Repeat steps 2 and 3 for 20410B-LON-CL1.
MCT USE ONLY. STUDENT USE PROHIBITED
11-24 Implementing Group Policy
Question: You have a number of logon scripts that map network drives for users. Not all
users need these drive mappings, so you must ensure that only the desired users receive the
mappings. You want to move away from using scripts. What is the best way to map network
drives without using scripts for selected users?
Tools
Tool Use Where to find it
Group Policy Management Controls all aspects of Group In Server Manager, on the Tools
Console (GPMC) Policy menu
Group Policy Object Editor Configure settings in GPOs Accessed by editing any GPO
Local Group Policy Editor Configure Group Policy Accessed by creating a new Microsoft
settings that apply only to the Management Console (MMC) on
local computer the local computer, and adding the
Group Policy Object Editor snap-in
Best Practices
The following are recommended best practices:
• Do not use the Default Domain and Default Domain Controllers policies for other uses. Instead, create
new policies.
• Limit the use of security filtering and other mechanisms that make diagnostics more complex.
• Disable the User or Computer sections of policies if they have no settings configured.
• Add comments to your GPOs to explain what the policies are doing.
• Design your OU structure to support Group Policy application.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-25
Module 12
Securing Windows Servers Using Group Policy Objects
Contents:
Module Overview 12-1
Module Overview
Protecting IT infrastructure has always been a priority for organizations. Many security risks threaten
companies and their critical data. When companies fail to have adequate security policies, they can lose
data, experience server unavailability, and lose credibility.
To protect against security threats, companies must have well-designed security policies that include
many organizational and IT-related components. Security policies must be evaluated on a regular basis
because as security threats evolve, so must IT evolve.
Before you begin designing security policies to help protect your organization’s data, services, and IT
infrastructure, you must learn how to identify security threats, plan your strategy to mitigate security
threats, and secure your Windows Server® 2012 infrastructure.
Objectives
After completing this module, you will be able to:
• Describe Windows Server operating system security.
Lesson 1
Windows Operating Systems Security Overview
As organizations expand their availability of network data, applications, and systems, ensuring the security
of network infrastructure becomes more challenging. Security technologies in Windows Server 2012
enable organizations to provide better protection for their network resources and organizational assets in
increasingly complex environments and business scenarios. This lesson reviews the tools and concepts that
are available for implementing security within a Windows 8 and Windows Server 2012 infrastructure.
Windows Server 2012 includes numerous features that provide different methods for implementing
security. These features combine to form the core of the security functionality of Windows Server 2012.
Understanding these features and their associated concepts and being familiar with their basic
implementation are critical to maintaining a secure environment.
Lesson Objectives
After completing this lesson, you will be able to:
• Identify security risks for Windows Server 2012 and the costs associated with them.
• Apply the defense-in-depth model to increase security.
Applying Defense-In-Depth to
Increase Security
You can mitigate risks to your organization’s
computer network by providing security at various
infrastructure layers. The term defense-in-depth is
often used to describe the use of multiple security
technologies at different points throughout your
organization.
Physical Security
If any unauthorized person can gain physical access to a computer on your network, then most other
security measures are not useful. You must ensure that computers containing the most sensitive data
(such as servers) are physically secure, and that access is granted only to authorized personnel.
Perimeter
These days, no organization is an isolated enterprise. Organizations operate within the Internet, and
many organizational network resources are available from the Internet. This might include a website that
describes your organization’s services, or internal services that you make available externally—such as web
conferencing and email—so that users can work from home or from branch offices.
Perimeter networks mark the boundary between public and private networks. Providing reverse proxy
servers in the perimeter network enables you to provide more secure corporate services across the public
network.
Many organizations implement network access quarantine control, where computers that connect to the
corporate network are checked for different security criteria, such as whether the computer has the latest
security updates, antivirus updates, and other company-recommended security settings. If these criteria
are met, the computer is allowed to connect to corporate network. If not, the computer is placed in an
isolated network, called a quarantine, with no access to corporate resources. Once the computer has its
security settings remediated, it is removed from the quarantine network and is allowed to connect to
corporate resources.
Note: A reverse proxy, such as Microsoft® Forefront® Threat Management Gateway 2010
(Forefront TMG), enables you to publish services such as email or web services, from the
corporate intranet without placing the email or web servers in the perimeter or exposing them
to external users. Forefront TMG acts as both reverse proxy and as a firewall solution.
Networks
Once you connect your computers to a network (either internal or public), they are susceptible to
a number of threats including eavesdropping, spoofing, denial of service, and replay attacks. By
implementing Internet Protocol Security (IPsec), you can encrypt network traffic and protect data while in
transfer between computers.
When communication takes place over public networks, such as by employees who are working from
home or from remote offices, as a best practice they should connect to a firewall solution such as
Forefront TMG 2010 to protect from different types of network threats.
MCT USE ONLY. STUDENT USE PROHIBITED
12-4 Securing Windows Servers Using Group Policy Objects
• Consistently use the Windows Update feature in Windows operating systems to keep your
applications up-to-date.
• Test applications to determine if they have any security vulnerabilities that might allow an external
attacker to compromise applications or other network components.
Data Security
The final layer of security is data security. To help ensure the protection of your network, you should:
• Ensure the proper use of file user permissions by using Access Control Lists (ACLs).
• Implement the encryption of confidential data with Encryption File System (EFS).
• Perform regular data backups.
Additional Reading:
• For the latest Microsoft security bulletin and advisory information, see Security for IT Pros at
http://go.microsoft.com/fwlink/?LinkID=266741.
Question: How many layers of the defense-in-depth model should you implement in your
organization?
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-5
• Restrict physical access. If someone has physical access to your servers, that person has virtually
unlimited access to the data on that server. An unauthorized person could use a wide variety of tools
to quickly reset the password on local administrator accounts and allow local access, or use a USB
drive to introduce malware.
Additional Reading: For more information about best practices for enterprise security, see
http://go.microsoft.com/fwlink/?LinkID=266743.
MCT USE ONLY. STUDENT USE PROHIBITED
12-6 Securing Windows Servers Using Group Policy Objects
Lesson 2
Configuring Security Settings
Once you have learned about security threats, risks, and best practices for increasing security, you can
start configuring security for your Windows 8 and Windows Server 2012 environment. This lesson explains
how to configure security settings.
To apply those security settings to multiple users and computers in your organization, you can use Group
Policy. For example, you can configure password policy settings by using Group Policy, and then deploy
them to multiple users.
Group Policy has a large security component that you can use to configure security for both users and
computers. You can apply security consistently across the organization in Active Directory® Domain
Services (AD DS) by defining security settings in a Group Policy Object (GPO) that is associated with a site,
domain, or Organizational Unit (OU).
Lesson Objectives
After completing this lesson, you will be able to:
• Describe how to configure security templates.
Additional Reading: Click the following link to search for a detailed list of Group Policy
settings: http://go.microsoft.com/fwlink/?LinkID=266744.
When you configure a security template, you can use it to configure a single computer or to configure
multiple computers on the network. The following are a few ways that you can configure and distribute
security templates:
• Secedit.exe. The secedit.exe command-line tool configures and analyzes system security by
comparing the current configuration of a computer running Windows Server 2012 to specified
security templates.
• Security Templates snap-in. The Security Templates snap-in is a snap-in that you can use to create a
security policy by using security templates.
• Security Configuration and Analysis Wizard. This wizard is a tool you can use to analyze and configure
computer security.
• Group Policy. Group Policy is a technology you can use to analyze and configure computer settings,
including distribution of specific security settings.
• Security Compliance Manager. The Security Compliance Manager is a tool that provides centralized
security baseline management features and security baseline export functionality.
• Logon rights define who is authorized to log on to a computer, and how they can log on. For
example, logon rights may define the right to log on to a system locally.
You can configure rights through Group Policy. Initially, the default domain policy has no user rights
defined.
You can configure settings for User Rights by accessing Computer Configuration\Policies\Windows
Settings\Security Settings\Local Policies\User Rights Assignment from the Group Policy Management
Console (GPMC).
Some examples of commonly used user rights (and policies configured by them) are:
• Add workstations to domain. Determines which users or groups can add workstations to the
domain.
• Allow log on locally. Determines which users can log on the computer.
• Allow log on through Remote Desktop Services. Determines which users or groups have
permission to log on as Remote Desktop Services Client.
MCT USE ONLY. STUDENT USE PROHIBITED
12-8 Securing Windows Servers Using Group Policy Objects
• Back up files and directories. Determines which users have permissions to back up files and folders
on a computer.
• Change the system time. Determines which users or groups have the rights to change the time and
date on the internal clock of the computer.
• Force shutdown from a remote system. Determines which users are allowed to shut down a
computer from a remote location on the network.
• Shut down the system. Determines which of the users who are locally logged on to a computer are
allowed to shut down the computer.
You can also configure settings for Security Options by accessing the following location from the GPMC:
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options.
The following are examples of commonly used Security Options:
• Prompt user to change password before expiration. Determines how many days prior to a user’s
password expiring that the operating system provides a warning.
• Interactive logon: Do not display last user name. Determines whether the name of the last user to
log on to the computer displays in the Windows logon window.
• Devices: Restrict CD-ROM access to locally logged-on user only. Determines whether a CD-ROM
is accessible to both local and remote users simultaneously.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-9
When an application requires administrator-level permission, UAC notifies the user as follows:
• If the user is an administrator, the user confirms to elevate his or her permission level and continue.
This process of requesting approval is known as Admin Approval Mode.
Note: In Windows Server 2012, the built-in Administrator account does not run in Admin
Approval Mode. The result is that no UAC prompts display when using the local Administrator
account.
• If the user is not an administrator, then a username and password for an account that has
administrative permissions needs to be entered. Providing administrative credentials temporarily
gives the user administrative privileges, but only to complete the current task. After the task is
complete, permissions change back to those of a standard user.
When using this process of notification and elevation to administrator account privileges, changes cannot
be made to the computer without the user knowing, because a prompt asks the user for permission or for
administrator credentials. This can help prevent malicious software (malware) and spyware from being
installed on or making changes to a computer.
UAC allows the following system-level changes to occur without prompting, even when a user is logged
on as a local user:
• Install drivers from Windows Update or those that are packaged with the operating system
• Reset the network adapter, and perform other network diagnostic and repair tasks
MCT USE ONLY. STUDENT USE PROHIBITED
12-10 Securing Windows Servers Using Group Policy Objects
You can also configure UAC settings by accessing the following location from the GPMC: Computer
Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options.
The following are examples of some GPO settings that you can configure for UAC:
• User Account Control: Run all administrators in Admin Approval Mode. Controls the behavior of
all UAC policy settings for the computer. If this setting is disabled, UAC will not run on this computer.
• User Account Control: Administrator Approval Mode for the built-in Administrator account.
When you enable this setting, the built-in Administrator account uses Admin Approval Mode.
• User Account Control: Detect application installations and prompt for elevation. This setting
controls the behavior of application installation detection for the computer.
• User Account Control: Only elevate executables that are signed and validated. When you enable
this setting, a Public Key Infrastructure (PKI) check is performed on the executable file to verify that it
originates from a trusted source. If the file is verified, then the file is permitted to run.
• An employee within a defined group that has accessed an important folder containing data from
different departments.
• A user who is trying to log on to his or her account repeatedly without success from an internal
company computer. You might find that the employee who owns that user account was on a vacation
that week, which means some other employee was trying to log on with a different user account.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-11
You can configure Security Auditing settings by accessing the following location from the GPMC:
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy.
The following are examples of some GPO settings that you can configure for auditing:
• Audit account logon events. Determines whether the operating system audits each time the
computer validates an account’s credentials.
• Audit accounting management. Determines whether to audit each event of account management,
such as creating, changing, renaming, or deleting a user account, changing a password, or enabling
or disabling a user account.
• Audit object access. Determines whether operating system audits have access to non-Active
Directory objects, such as folders or files. Before configuring audit settings with Group Policy, you
must configure system access control lists (SACLs) on folders or files to allow auditing for a specific
type of action, such as write, read, or modify.
• Audit system events. Determines whether the operating system audits system-related events, such
as attempting to change the system time, attempting a system startup or shutdown, or the security
log size exceeding a configurable threshold warning.
Additional Reading: For more information about security auditing, see What’s New in
Security Auditing at http://go.microsoft.com/fwlink/?LinkID=266747.
Although you can control domain groups by assigning Restricted Groups policies to domain controllers,
you should use this setting primarily to configure membership of critical groups such as Enterprise Admins
and Schema Admins. You can also use this setting to control the membership of built-in local groups on
workstations and member servers. For example, you can place the Helpdesk group into the local
Administrators group on all workstations.
You cannot specify local users in a domain GPO. Local users who currently are in the local group that the
Restricted Groups policy controls will be removed. The only exception to this is that the local
Administrators account is always in the local Administrators group.
You can configure the settings for Restricted Groups by accessing the following location from the GPMC:
Computer Configuration\Policies\Windows Settings\Security Settings\Restricted Groups.
MCT USE ONLY. STUDENT USE PROHIBITED
12-12 Securing Windows Servers Using Group Policy Objects
Account Policies
Account policy components include password
policies, account lockout policies, and Kerberos Policy.
The policy settings under Account policies are implemented at the domain level. A Windows Server 2012
domain can have multiple password and account lockout policies, which are called fine-grained password
policies. You can apply these multiple policies to a user or to a global security group in a domain, but not
to an OU.
Note: If you need to apply a fine-grained password policy to users of an OU, you can use a
shadow group, which is a global security group that is logically mapped to an OU.
You can configure Account policy settings by accessing the following location from the GPMC: Computer
Configuration\Policies\Windows Settings\Security Settings\Account Policies.
Password Policy
Password policies that you can configure are listed in the following table.
Password must • Requires passwords to: Enable this setting. These complexity
meet complexity requirements can help ensure a strong
o Be at least six characters long.
requirements password. Strong passwords are more
o Contain a combination of at difficult to decrypt than those
least three of the following containing simple letters or numbers.
types of characters:
uppercase letters, lowercase
letters, numbers, and symbols
(punctuation marks).
o Must not contain the user’s
user name or screen name.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-13
Enforce password Prevents users from creating a new The greater number ensures better
history password that is the same as their security. The default value is 24.
current password or a recently used Enforcing password history ensures
password. that passwords that have been
To specify how many passwords are compromised are not used repeatedly.
remembered, provide a value. For
example, a value of 1 means that
only the last password will be
remembered, and a value of 5
means that the previous five
passwords will be remembered.
Maximum Sets the maximum number of days The default value is 42 days, but it
password age that a password is valid. After this but best practice is to set it at 90 days.
number of days, the user will have Setting the number of days too high
to change the password. provides hackers with an extended
window of opportunity to determine the
password. Setting the number of days
too low frustrates users who have to
change their passwords too frequently,
and could result in more frequent calls
to the IT help desk.
Minimum Sets the minimum number of days Set the minimum password age to at
password age that must pass before a password least 1 day. By doing so, you require that
can be changed. the user can only change their password
once a day. This will help enforce other
settings.
For example, if the past five passwords
are remembered, this will ensure that
at least five days must pass before the
user can reuse the original password. If
the minimum password age is set to 0,
the user can change their password
six times on the same day and begin
reusing the original password on the
same day.
Minimum Specifies the fewest number of Set the length to between 8 and 12
password length characters that a password can have. characters (provided that they also meet
complexity requirements). A longer
password is more difficult to crack than
a shorter password, assuming the
password is not a word or a common
phrase.
Store passwords Provides support for applications Do not use this setting unless you use a
by using that require knowledge of a user program that requires it. Enabling this
reversible password for authentication setting decreases the security of stored
encryption purposes. passwords.
MCT USE ONLY. STUDENT USE PROHIBITED
12-14 Securing Windows Servers Using Group Policy Objects
Account lockout Specifies the number of failed login A setting of 5 allows for reasonable
threshold attempts that are allowed before the user error, and limits repeated login
account is locked. attempts for malicious purposes.
For example, if the threshold is set to 3,
the account will be locked out after a
user enters incorrect login information
three times.
Account lockout Allows you to specify a timeframe, in After the threshold has been reached
duration minutes, after which the account and the account is locked out, the
automatically unlocks and resumes account should remain locked long
normal operation. If you specify 0, then enough to block or deter any
the account will be locked indefinitely potential attacks, but short enough
until an administrator manually unlocks not to interfere with productivity of
it. legitimate users. A duration of 30 to
90 minutes should work well in most
situations.
Reset account Defines a timeframe for counting the Using a timeframe between 30 and
lockout counter incorrect login attempts. If the policy 60 minutes is usually sufficient to
after is set for one hour, and the account deter automated attacks and manual
lockout threshold is set for three attempts by an attacker to guess a
attempts, a user can enter the incorrect password.
login information three times within
one hour. If they enter incorrect
information twice, but get it correct
the third time, the counter will reset
after one hour has elapsed (from the
first incorrect entry) so that future
failed attempts will again start counting
at one.
Kerberos Policy
This policy is for domain user accounts, and determines Kerberos-related settings such as ticket lifetimes
and enforcement. Kerberos policies do not exist in Local Computer Policy.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-15
You have been working for A. Datum for several years as a desktop support specialist. In this role, you
visited desktop computers to troubleshoot application and network problems. You have recently accepted
a promotion to the server support team. As a new member of the team you help to deploy and configure
new servers and services into the existing infrastructure based on the instructions given to you by your
IT manager.
Your manager has given you some security-related settings that need to be implemented on all member
servers. You also need to implement file system auditing for a file share used by the Marketing
department. Finally, you need to implement auditing for domain logons.
Objectives
After completing this lab, you will be able to:
Lab Setup
Estimated Time: 60 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:
1. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Hyper-V® Manager, click 20410B-LON-DC1, and in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
o Password: Pa$$w0rd
5. Repeat steps 2-4 for 20410B-LON-SVR1 and steps 2-3 for 20410B-LON-CL1. Do not sign in to
LON-CL1 until directed to do so.
MCT USE ONLY. STUDENT USE PROHIBITED
12-16 Securing Windows Servers Using Group Policy Objects
To ensure that the Computer Administrators group is always given permission to manage member servers,
your manager has asked you to create a GPO that sets the membership of the local Administrators group
on member servers to include Computer Server Administrators. This GPO also needs to enable Admin
Approval Mode for UAC.
1. Create a Member Servers organizational unit (OU) and move servers into it.
3. Create a Member Server Security Settings Group Policy Object (GPO) and link it to the Member
Servers OU.
4. Configure group membership for local administrators to include Server Administrators and Domain
Admins.
5. Verify that Computer Administrators has been added to the local Administrators group.
6. Modify the Member Server Security Settings GPO to remove Users from Allow log on locally.
7. Modify the Member Server Security Settings GPO to enable User Account Control: Admin Approval
Mode for the Built-in Administrator account.
Task 1: Create a Member Servers organizational unit (OU) and move servers into it
1. On LON-DC1, open Active Directory Users and Computers.
2. Create a new OU named Member Servers OU.
Task 3: Create a Member Server Security Settings Group Policy Object (GPO) and link
it to the Member Servers OU
1. On LON-DC1, open the Group Policy Management Console.
2. In the Group Policy Management Console (GPMC), in the Group Policy Objects container, create a
new GPO with a name Member Server Security Settings.
3. In the Group Policy Management Console, link the Member Server Security Settings to Member
Servers OU.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-17
3. Navigate to Computer Configuration, click Policies, click Windows Settings, click Security
Settings, and then click Restricted Groups.
4. Add the Server Administrators and Domain Admins groups to the Administrators group.
Task 5: Verify that Computer Administrators has been added to the local
Administrators group
1. Switch to LON-SVR1, and sign in as Adatum\Administrator with a password of Pa$$w0rd.
2. Open a Windows PowerShell® window, and at the Windows PowerShell command prompt, type
following command:
Gpupdate /force
3. Open Server Manager, open the Computer Management console, and then expand Local Users
and Groups.
4. Confirm that the Administrators group contains both ADATUM\Domain Admins and
ADATUM\Server Administrators as members.
Task 6: Modify the Member Server Security Settings GPO to remove Users from
Allow log on locally
1. Switch to LON-DC1.
2. On LON-DC1, in the GPMC, edit the Member Server Security Settings GPO.
Task 7: Modify the Member Server Security Settings GPO to enable User Account
Control: Admin Approval Mode for the Built-in Administrator account
1. On LON-DC1, in the Group Policy Management Editor window, browse to Computer Configuration
\Policies\Windows Settings\Security Settings\Local Policies\Security Options.
2. Enable User Account Control: Admin Approval Mode for the Built-in Administrator account.
3. Close the Group Policy Management Editor.
2. Open a Windows PowerShell window, and at the Windows PowerShell prompt, type following
command:
Gpupdate /force
6. To prepare for the next exercise, log off of LON-SVR1, and log back on to LON-SVR1 as
Adatum\Administrator with a password of Pa$$w0rd.
Results: After completing this exercise, you should have used Group Policy to secure Member servers.
1. Modify the Member Server Security Settings GPO to enable object access auditing.
2. Create and share a folder.
Task 1: Modify the Member Server Security Settings GPO to enable object access
auditing
1. Switch to LON-DC1.
2. Sign in to LON-DC1 as Adatum\Administrator with a password of Pa$$w0rd.
4. Configure the Marketing folder with Read/Write sharing permissions for user Adam.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-19
gpupdate /force
gpupdate /force
5. Sign out from LON-CL1, and then sign in again as Adatum\Adam with a password of Pa$$w0rd.
6. Open the Marketing folder on LON-SVR1, by using following Universal Naming Convention (UNC)
path: \\LON-SVR1\Marketing.
Task 5: View the results in the security log on the domain controller
1. Switch to LON-SVR1, and start Event Viewer.
2. In the Event Viewer window, expand Windows Logs, and then open Security.
3. Verify that following event and information displays:
Results: After completing this exercise, you should have enabled file system access auditing.
MCT USE ONLY. STUDENT USE PROHIBITED
12-20 Securing Windows Servers Using Group Policy Objects
2. Run GPUpdate.
6. Enable Audit account logon events with both Success and Failure settings.
gpupdate /force
4. Close the Command Prompt window, and sign out from LON-CL1.
Note: This password is intentionally incorrect to generate a security log entry that shows
that that an unsuccessful login attempt has been made.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-21
2. In the Event Viewer window, expand Windows Logs, and then click Security.
3. Review the event logs for the following message: “Event ID 4771 Kerberos pre-authentication
failed. Account Information: Security ID: ADATUM\Adam.”
Note: This password is correct, and you should be able to sign in successfully as Adam.
2. In the Event Viewer window, expand Windows Logs, and then click Security.
3. Review the event logs for the following message: “Event ID 4624 An account was successfully
logged on. New Logon: Security ID: ADATUM\Adam.”
Results: After completing this exercise, you should have enabled domain logon auditing.
Lesson 3
Restricting Software
Users need to have access to the applications that help them do their jobs. However, unnecessary or
unwanted applications often get installed on client computers, whether unintentionally or for malicious
or non-business purposes. Unsupported or unused software is not maintained or secured by the
administrators, and could be used as an entry point for attackers to gain unauthorized access or spread
computer viruses. Consequently, it is of the utmost importance for you to ensure that only necessary
software is installed on all the computers in your organization. It is also vital that you prevent software
from running that is not allowed or is no longer used or supported.
Lesson Objectives
After completing this lesson, you will be able to:
• Explain how to use software restriction policies to restrict unauthorized software from running on
servers and clients.
Rules
Rules govern how SRP responds to an application that is being run or installed. Rules are the key
constructs within an SRP, and a group of rules together determines how an SRP responds to applications
that are being run. Rules can be based on one of the following criteria that apply to the primary
executable file for the application in question:
Security Levels
Each applied SRP is assigned a security level that governs the way that the operating system reacts when
the application that is defined in the rule is run. The three available security level settings are as follows:
• Disallowed. The software identified in the rule will not run, regardless of the access rights of the user.
• Basic User. Allows the software identified in the rule to run as a standard, non-administrative user.
• Unrestricted. Allows the software identified in the rule to run unrestricted by SRP.
Using these three settings, there are two primary ways to use SRPs:
• If an administrator has a comprehensive list of all the software that should be allowed to run on
clients, the Default Security Level can be set to Disallowed. All applications that should be allowed to
run can be identified in SRP rules that would apply either the Basic User or Unrestricted security
level to each individual application, depending on the security requirements.
• If an administrator does not have a comprehensive list of the software that should be allowed to run
on clients, the Default Security Level can be set to Unrestricted or Basic User, depending on security
requirements. Any applications that should not be allowed to run can then be identified by using SRP
rules, which would use a security level setting of Disallowed.
Software Restriction Policy settings can be found in Group Policy at the following location:
Computer Configuration\Policies\Windows Settings\Security Settings\Software Restriction Policies.
What Is AppLocker?
AppLocker, which was introduced in the
Windows 7 operating system and Windows
Server 2008 R2, is a security setting feature that
controls which applications users are allowed
to run.
AppLocker provides administrators a variety of
methods for determining quickly and concisely
the identity of applications that they may want
to restrict, or to which they may want to permit
access. You apply AppLocker through Group
Policy to computer objects within an OU. You can
also apply Individual AppLocker rules to individual
AD DS users or groups.
AppLocker also contains options for monitoring or auditing the application of rules. AppLocker can
help organizations prevent unlicensed or malicious software from executing, and can selectively restrict
ActiveX® controls from being installed. It can also reduce the total cost of ownership by ensuring that
workstations are standardized across the enterprise, and that users are running only the software and
applications that are approved by the enterprise.
Using AppLocker technology, companies can reduce administrative overhead and help administrators
control how users can access and use files, such as .exe files, scripts, Windows Installer files (.msi and .msp
files), and DLLs.
MCT USE ONLY. STUDENT USE PROHIBITED
12-24 Securing Windows Servers Using Group Policy Objects
• Is not allowed to be used in the company. For example, software that can disrupt employees’ business
productivity, such as social networking software, or software that streams video files or pictures that
can use a large amounts of network bandwidth and disk space.
• Is no longer used or it has been replaced with a newer version. For example, software that is no
longer maintained, or for which licenses have expired.
• Is no longer supported in the company. Software that is not updated with security updates might
pose a security risk.
Note: AppLocker uses the Application Identity service to verify the attributes of a file. This
service must be configured to start automatically on each computer where AppLocker should be
applied. If the Application Identity service is not running, then AppLocker policies are not be
enforced.
Additional Reading: For more information about AppLocker, see AppLocker overview at
http://go.microsoft.com/fwlink/?LinkID=266745.
AppLocker Rules
AppLocker defines rules based on file attributes
that are derived from the digital signature of the
file. File attributes in the digital signature include:
• Publisher name
• Product name
• File name
• File version
Default Configuration
The default configuration for AppLocker contains
a set of default rules for each rule collection. This
set of rules ensures that files that are allowed to run are necessary for Windows operating systems to run
and operate normally.
Demonstration Steps
Create a GPO to enforce the default AppLocker Executable rules
1. Sign in as Adatum\Administrator with the password Pa$$w0rd.
2. On LON-DC1, open the GPMC.
5. Set the permission of the new rule to Deny, the condition to Publisher, and then select
wordpad.exe. If prompted, click OK to create default rules.
9. Configure Application Identity Properties with Define this policy setting, and Select service
startup mode with Automatic.
2. Open a Command Prompt window, type gpupdate /force, and then press Enter.
3. Start and then sign in to 20410B-LON-CL1 as Adatum\Alan, with the password, Pa$$w0rd.
4. In the Command Prompt window, type gpupdate /force, and then press Enter. Wait for the policy to
update.
Lesson 4
Configuring Windows Firewall with Advanced Security
Windows Firewall with Advanced Security is an important tool for enhancing the security of Windows
Server 2012. This snap-in helps to prevent several different security issues such as port scanning or
malware. Windows Firewall with Advanced Security has multiple firewall profiles, each of which applies
unique settings to different types of networks. You can manually configure Windows Firewall rules on
each server, or configure them centrally by using Group Policy.
Lesson Objectives
After completing this lesson, you will be able to:
Outbound rules control communication that is initiated by the host computer, and is destined for a device
or computer on the network. By default, all outbound communication is allowed except the traffic that is
explicitly blocked by an outbound rule. If you choose to block all outbound communication except the
traffic that is explicitly allowed, you must carefully catalog the software that is allowed to run on that
computer and the network communication required by that software.
You can create inbound and outbound rules based on User Datagram Protocol (UDP) and Transmission
Control Protocol (TCP) ports. You can also create inbound and outbound rules that allow a specific
executable network access, regardless of the port number that is being used.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-27
Additional Enhancements
Windows Firewall with Advanced Security is a Microsoft Management Consoles (MMC) snap-in that allows
you to perform advanced configuration of Windows Firewall.
Windows Firewall in Windows 8 and Windows Server 2012 has the following enhancements:
Note: Windows Server 2012 introduces the additional option for administering Windows
Firewall by using the Windows PowerShell command-line interface.
Firewall Profiles
Windows Firewall with Advanced Security
uses firewall profiles to provide a consistent
configuration for networks of a specific type, and
allows you to define a network as either a domain
network, a public network, or a private network.
With Windows Firewall with Advanced Security,
you can define a configuration set for each type
of network; each configuration set is referred to as
a firewall profile. Firewall rules are activated only
for specific firewall profiles.
MCT USE ONLY. STUDENT USE PROHIBITED
12-28 Securing Windows Servers Using Group Policy Objects
Windows Firewall with Advanced security includes the profiles in the following table.
Profile Description
Domain Use when your computer is part of a Windows operating system domain.
Windows operating systems automatically identify networks on which it can
authenticate access to the domain controller. No other networks can be placed in this
category. This profile is referred to as the Work profile in Windows Vista, Windows 7,
and Windows 8.
Windows Server 2012 allows multiple firewall profiles to be active on a server simultaneously. This means
that a multi-homed server that is connected to both the internal network and the perimeter network can
apply the domain firewall profile to the internal network, and the public or private firewall profile to the
perimeter network.
• Authentication Exemption. You can use an authentication exemption to designate connections that
do not require authentication. You can designate computers by a specific IP address, an IP address
range, a subnet, or a predefined group such as a gateway.
• Server-to-Server. A server-to-server rule protects connections between specific computers. This type
of rule usually protects connections between servers. When creating the rule, specify the network
endpoints between which communications are protected. Then designate requirements and the
authentication that you want to use.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-29
• Tunnel. With a tunnel rule, you can protect connections between gateway computers. Typically, you
would use a tunnel rule when connecting across the Internet between two security gateways.
• Custom. Use a custom rule to authenticate connections between two endpoints when you cannot set
up authentication rules that you need by using the other rules available in the new Connection
Security Rule Wizard.
Note: When you import firewall rules, they are treated as a complete set, and replace all
currently-configured firewall rules.
MCT USE ONLY. STUDENT USE PROHIBITED
12-30 Securing Windows Servers Using Group Policy Objects
You have been working for A. Datum for several years as a desktop support specialist. In this role, you
visited desktop computers to troubleshoot application and network problems. You have recently accepted
a promotion to the server support team. As a new member of the team, you help to deploy and configure
new servers and services into the existing infrastructure based on the instructions given to you by your IT
manager.
Your manager has asked you to implement AppLocker to restrict non-standard applications from running.
He also has asked you to create new Windows Firewall rules for any member servers running web-based
applications.
Objectives
After completing this lab, you will be able to:
Lab Setup
Estimated Time: 60 minutes
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:
1. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager.
2. In Hyper-V Manager, click 20410B-LON-DC1, and in the Actions pane, click Connect.
o Password: Pa$$w0rd
4. Repeat steps 2-4 for 20410B-LON-SVR1 and 20410B-LON-CL1.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-31
You also need to add an exception to run a custom-developed application that resides in a non-standard
location. The first stage of the implementation will log compliance with rules. The second stage of
implementation will prevent unauthorized programs from running.
The main tasks for this exercise are as follows:
4. Run GPUpdate.
Task 3: Create a Software Control GPO and link it to the Client Computers OU
1. On LON-DC1, open the GPMC.
2. In the GPMC, in the Group Policy Objects container, create a new GPO with a name Software
Control GPO.
3. Edit the Software Control GPO.
o Executable Rules
o Script Rules
6. Configure rule enforcement with the Audit only option for the following:
o Executable Rules
o Script Rules
8. In the Application Identity Properties dialog box, click Define this policy setting and under Select
service startup mode, click Automatic, and then click OK.
gpupdate /force
gpresult /R
Review the result of the command and ensure that Software Control GPO is displayed under
Computer Settings, Applied Group Policy Objects. If Software Control GPO is not displayed, restart
LON-CL1 and repeat steps from 1 to 2.
C:\CustomApp\app1.bat
3. Click MSI and Scripts and review event log 8005 that contains the following text:
%OSDRIVE%\CUSTOMAPP\APP1.BAT was allowed to run.
Note: If no events display, ensure that the Application Identity service has started, and try again.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-33
Task 7: Create a rule that allows software to run from a specific location
1. On LON-DC1, edit the Software Control GPO.
2. Browse to the following setting location: Computer Configuration/ Policies/ Windows Settings/
Security Settings/ Application Control Policies/ AppLocker.
3. Create a new script rule with the following configuration:
o Permissions: Allow
o Conditions: Path
o Path: %OSDRIVE%\CustomApp\app1.bat
o Script Rules
o Packaged app Rules
gpupdate /force
2. Verify that application cannot be run from Documents folder, and that the following message
appears: “This program is blocked by Group Policy. For more information, contact your system
administrator.”
Results: After completing this exercise, you should have configured AppLocker policies for all users
whose computer accounts are located in the Client Computers OU organizational unit. The policies you
configured should allow these users to run applications that are located in the folders C:\Windows and
C:\Program Files, and run the custom-developed application app1.bat in the C:\CustomApp folder.
MCT USE ONLY. STUDENT USE PROHIBITED
12-34 Securing Windows Servers Using Group Policy Objects
5. Use security filtering to limit the Application Server GPO to members of Application Server group.
2. In the GPMC, in the Group Policy Objects container, create a new GPO with a name Application
Servers GPO.
o Profile: Domain (clear both the Private and Public check boxes)
Task 5: Use security filtering to limit the Application Server GPO to members of
Application Server group
1. On LON-DC1, open the GPMC.
2. Expand the Member Servers OU, and then click Application Servers GPO.
3. In the right-hand pane, under Security Filtering, remove Authenticated Users, and configure
Application Servers GPO to apply only to the Application Servers security group.
gpupdate /force
4. Restart LON-SVR1 and then log back on as Adatum\Administrator with the password of
Pa$$w0rd.
4. Verify that you cannot edit Application Server Department Firewall Rule, because it is configured
through Group Policy.
Results: After completing this exercise, you should have used Group Policy to configure Windows Firewall
with Advanced Security to create rules for application servers.
2. In the Virtual Machines list, right-click 20410B-LON-DC1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.
Question: What setting must you configure to ensure that users are allowed only three
invalid logon attempts?
Question: You are creating a GPO with standardized firewall rules for the servers in your
organization. You tested the rules on a standalone server in your test lab. The rules appear
on the servers after the GPO is applied, but they are not taking effect. What is the most likely
cause of this problem?
Question: Last year, your organization developed a security strategy that included all aspects
of a defense-in-depth model. Based on that strategy, your organization implemented
security settings and policies on the entire IT infrastructure environment. Yesterday, you read
in an article that new security threats were detected on the Internet, but now you realize that
your company strategy does not include a risk analysis and mitigation plan for those new
threats. What should you do?
Tools
Tool Use for Where to find it
Security Compliance Deploying security policies based Download from the Microsoft
Manager on Microsoft Security Guide website at http://go.microsoft.com
recommendations and industry /fwlink/?LinkID=266746.
best practices
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-37
Best Practices
The following are best practices:
• Always make a detailed security risk assessment before planning which security features your
organization should deploy.
• Create a separate GPO for security settings that apply to different type of users in your organization,
because each department might have differing security needs.
• Ensure that the security settings that you configure are reasonably easy to use so that employees
accept them. Frequently, very strong security policies are too complex or difficult for employees to
adopt.
• Always test security configurations that you plan to implement with a GPO in an isolated, non-
production environment. Only deploy policies in your production environment after you complete
this testing successfully.
Module 13
Implementing Server Virtualization with Hyper-V
Contents:
Module Overview 13-1
Module Overview
Server virtualization has only been a part of the Windows Server® operating system since the release
of Windows Server 2008 and the introduction of the Hyper-V® role. By using Server virtualization, your
organization can save money through server consolidation. However, to use Server Virtualization more
efficiently server administrators need to be able to decide which server workloads will run effectively in
virtual machines, and which server workloads must remain deployed in a more traditional server
environment.
This module introduces you to the Hyper-V role in Windows Server 2012, the components of the role,
how best to deploy the role, and the new features of the Hyper-V role that are introduced with Windows
Server 2012.
Objectives
After completing this module, you will be able to:
• Implement Hyper-V.
Lesson 1
Overview of Virtualization Technologies
You can deploy many different types of virtualization technologies on networks where Windows®
operating systems are deployed. The types of virtualization technologies that you select depends on what
your organization needs to accomplish. Although this module is focused primarily on server virtualization,
in this lesson you will learn about other types of virtualization technologies, and the situations in which it
is appropriate to deploy them.
Lesson Objectives
After completing this lesson, you will be able to:
• Explain the benefits of Microsoft Application Virtualization over traditional application deployment.
This is a simplified example. In real-world environments, you must make adequate preparations before
co-locating virtual machines. You have to ensure that the hardware resource needs of all the virtual
machines that are hosted on the virtualization server do not exceed the server's hardware resources.
Server Consolidation
With server virtualization, you can consolidate servers that would otherwise need to run on separate
hardware onto a single virtualization server. Because each virtual machine on a virtualization server
is isolated from the other virtual machines on the same server, it is possible to deploy services and
applications that are incompatible with one another on the same physical computer, provided that
you host them within virtual machines. Examples of such services and applications include Microsoft®
Exchange Server 2010, SQL Server® 2012, and Active Directory® Domain Services (AD DS). This means that
an organization only needs to deploy one physical server in place of the three servers that they would
have needed in the past.
Best Practice: We recommend that you do not deploy a Microsoft Exchange mailbox
server on the same computer that contains a domain controller role. We also recommend that
you do not deploy a SQL Server 2012 database engine instance on the same computer that
contains the domain controller role. Instead, deploy each of these workloads on separate virtual
machines and then run those virtual machines as guests on the same virtualization server; this is a
supported configuration.
• Virtual machine templates for common server configurations are included with products such as
Microsoft System Center 2012 - Virtual Machine Manager (VMM). In these templates, many of the
parameters have been preconfigured with common settings so you do not have to configure the
setting of every parameter yourself.
• You can also create virtual machine self-service portals that enable end users to provision approved
servers and applications automatically. This lessens the workload of the systems administration team.
You create these virtual machine self-service portals with VMM and Microsoft System Center 2012 -
Service Manager.
MCT USE ONLY. STUDENT USE PROHIBITED
13-4 Implementing Server Virtualization with Hyper-V
Desktop Virtualization
Client Hyper-V
You can install the Hyper-V role on computers
that are running the Windows 8 Pro and Windows
8 Enterprise operating systems. This allows you to
run virtual machine guests on client computers.
Client Hyper-V, the Hyper-V feature in Windows 8
Pro and Windows 8 Enterprise operating systems,
has slightly different processor requirements than
Hyper-V on Windows Server 2012. Specifically,
with the Windows 8 client operating systems,
the computer must have an x64 platform that
supports Second-Level Address Translation (SLAT), and have a minimum of 4 gigabytes (GB) of random
access memory (RAM). This differs from Hyper-V on Windows Server 2012 which does not require SLAT.
• If a client computer fails, ensuring that users can still access their virtual machine using other RDC
methods.
You can also use VDI to implement a Bring Your Own Device (BYOD) policy. In this scenario, workers bring
their own computer to the office and use RDC software to connect to the virtual machine to which they
are assigned.
MCT USE ONLY. STUDENT USE PROHIBITED
13-6 Implementing Server Virtualization with Hyper-V
Presentation Virtualization
Presentation virtualization differs from desktop
virtualization in the following ways:
• Full Desktop. Clients can use a remote desktop client such as RDC to access a full desktop session and
run applications on the Windows Server 2012 virtualization server.
• RemoteApp applications. Rather than use a full desktop client such as RDC, the Windows Server
feature RemoteApp makes it possible for applications that run on the Windows Server 2012 server to
display on the client computer. You can deploy RemoteApp applications as Windows Installer (.msi)
files using traditional software deployment methods. This allows you to associate file types with
RemoteApp applications.
• Remote Desktop Web Access. Using Remote Desktop Web Access (RD Web Access), clients can access
a website on a specially configured server, and then launch RemoteApp applications and Remote
Desktop sessions from their browser.
Application Isolation
App-V isolates the application from the operating system and runs it in a separate virtual environment.
This means that applications that you cannot install and run directly on a host operating system because
of compatibility problems can run on a server that is running Hyper-V, as App-V applications. For
example, applications written for Windows XP that cannot run on the Windows 8 operating system can
run on Windows 8 if deployed through App-V. With App-V, you can also run applications that might
be compatible with the management operating system when they are run by themselves, but may be
problematic when run together. For example, you can use App-V to deploy and run different versions of
Microsoft Office Word simultaneously.
Application Streaming
Another useful feature of App-V is application streaming. When an application is streamed, only those
parts of the application that are being used are transmitted to the client computer. This speeds up
application deployment because only part of the application must be transmitted across the network
to the client computer.
Application Portability
When App-V is deployed with Microsoft System Center 2012 Configuration Manager, users can use the
same applications on multiple client computers, without requiring a traditional installation on those client
computers. For example, a user can sign in to a colleague's computer and then have App-V stream an
application to them so that they can use it on that computer. The application is not installed locally, and
when the user signs out, the application is no longer available to other users on that computer.
Lesson 2
Implementing Hyper-V
Understanding how Hyper-V works and how virtual machines function is critical to deploying server
virtualization effectively in a Windows Server 2012 network environment. This lesson discusses Hyper-V,
and the hardware requirements for deploying Hyper-V on a computer running Windows Server 2012. This
lesson also discusses the components of a virtual machine (with an emphasis on Dynamic Memory), and
the benefits of virtual machine integration services. Finally, it discusses how to measure virtual machine
resource use with Windows PowerShell cmdlets.
Lesson Objectives
After completing this lesson, you will be able to:
What is Hyper-V?
Hyper-V is the hardware virtualization role that
is available in Windows Server 2012. Hardware
virtualization provides virtual machines with direct
access to the virtualization server's hardware. This
is in contrast to software virtualization products
such as Microsoft Virtual Server 2005 R2, that
use the virtualization server's operating system to
provide indirect access to the server's hardware.
You can deploy Hyper-V to a computer that is
running Windows Server 2012 by using the Add
Roles and Features Wizard. You can configure
Windows Server 2012 as a virtualization server by
using the Hyper-V role. Windows Server 2012 can then host virtual machine guests that are running
supported operating systems. You can manage virtual machine administration locally through Windows
PowerShell, or you can manage it remotely through the Hyper-V Manager console.
You can install the Hyper-V role on both the Server Core installation of Windows Server 2012, and
Windows Server 2012 in the non-server core configuration. There is also a Microsoft Hyper-V Server 2012
edition, which includes only the components necessary to host virtual machines.
Note: In some documentation, the virtualization server (for example, the Windows Server
2012 computer that is running Hyper-V) is called the parent partition, and a virtual machine that
is running on the server is called the child partition.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-9
• The server must have enough memory to support all of the virtual machines that must run
concurrently, plus enough memory to run the host Windows Server 2012 operating system.
The server must have at least 4 GB of RAM.
A virtual machine hosted on Hyper-V in Windows Server 2012 can support a maximum of 2 terabytes
(TB) of RAM.
• The storage subsystem performance must meet the input/output (I/O) needs of the guest virtual
machines. Whether deployed locally or on storage area networks (SANs), you may have to place
different virtual machines on separate physical disks, or you may have to deploy a high performance
redundant array of independent disks (RAID), solid-state drives (SSD), hybrid-SSD, or a combination of
all three.
• The virtualization server's network adapters must be able to support the network throughput needs
of the guest virtual machines. You can improve network performance by installing multiple network
adapters and using multiple Network Interface Cards (NICs).
o From which device the virtual machine boots (for example, from a DVD drive, Integrated Drive
Electronics (IDE), legacy network adapter, or floppy disk)
• IDE controller 0. A virtual machine can support only two IDE controllers and, by default, two are
allocated to each virtual machine. Each IDE controller can support two devices.
You can connect virtual hard drives (VHDs) or virtual DVD drives to an IDE controller. If the virtual
machine boots from a VHD or a virtual DVD drive, the boot device must be connected to an IDE
controller. You can use IDE controllers to connect VHDs and DVD drives to virtual machines that use
any operating system that does not support integration services.
• IDE controller 1. Allows additional virtual hard drives and DVD drives to be deployed to the virtual
machine.
• SCSI controller. You can use a small computer system interface (SCSI) controller only on virtual
machines that have operating systems that support integration services.
• Synthetic network adapter. Synthetic network adapters represent computer network adapters. You
can only use synthetic network adapters with supported virtual machine guest operating systems.
You can add the following hardware to a virtual machine by editing the virtual machine's properties and
then clicking Add Hardware:
• SCSI controller. You can add up to four virtual SCSI devices. Each controller supports up to 64 disks.
• Network adapter. A single virtual machine can have a maximum of eight synthetic network adapters.
• Legacy network adapter. You can use legacy network adapters with any operating systems that do
not support integration services. You can also use legacy network adapters to deploy operating
system images throughout the network. A single virtual machine can have up to four legacy network
adapters.
• Fibre Channel adapter. If you add a Fibre Channel adapter to a virtual machine, the virtual machine
can then connect directly to a Fibre Channel SAN. You can only add a Fibre Channel adapter to a
virtual machine if the virtualization server has a Fibre Channel host bus adapter (HBA) that also has a
Windows Server 2012 driver that supports virtual Fibre Channel.
• RemoteFX 3D video adapter. If you add a RemoteFX 3D video adapter to a virtual machine, the virtual
machine can then display high performance graphics by leveraging Microsoft DirectX® and graphics
processing power on the host Windows Server 2012 server.
Additional Reading: For more information about virtual Fibre Channel adapters, see
Hyper-V Virtual Fibre Channel Overview at http://go.microsoft.com/fwlink/?LinkId=269712.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-11
• Allow the virtual machine to request additional memory as the virtual machine needs it.
• Configure a maximum amount of memory to a virtual machine.
Thus, by using Dynamic Memory you no longer have to guess how much memory a virtual machine
requires; instead, you can configure Hyper-V so that the virtual machine is allocated as much memory as it
needs.
With Windows Server 2012, you can modify some of the Dynamic Memory minimum and maximum
memory values while the virtual machine is running. This was not possible with Windows Server 2008 R2
SP1. You can perform this task from a Virtual Machine's Settings dialog box.
Note: Virtual machines must support Hyper-V integration services to use Dynamic Memory.
Smart Paging
Virtual machines may need more memory during startup than they need during normal operation. Smart
Paging, which is a new feature in Windows Server 2012, assigns additional temporary memory to a virtual
machine when it is starting up. This means that you can allocate memory based on what the virtual
machine needs when it is operating normally, rather than the amount that it needs during startup. Smart
Paging uses disk paging to assign additional temporary memory to a virtual machine when it is starting
up. However, using Smart Paging may result in lower performance because it uses disk resources that
would otherwise be used by the host server and other virtual machines.
Note: About configuration: You can configure virtual machine memory using the
Set-VMMemory Windows PowerShell cmdlet.
Additional Reading: For more information about Hyper-V Dynamic Memory, see Hyper-V
Dynamic Memory Overview at http://go.microsoft.com/fwlink/?LinkId=269713.
MCT USE ONLY. STUDENT USE PROHIBITED
13-12 Implementing Server Virtualization with Hyper-V
• CentOS 6.0-6.2
• CentOS 5.5-5.7
• Red Hat Enterprise Linux 6.0-6.2
Note: Support for the Windows XP operating system expires in April 2014. Support for
Windows Server 2003 and Windows Server 2003 R2 expires in July 2015.
You can install the Hyper-V integration services components on an operating system by accessing the
Virtual Machine Connection window, and then in the Action menu, clicking the Insert Integration
Services Setup Disk item. You can then install the relevant operating system drivers either manually
or automatically. You can also enable the following virtual machine integration components:
• Operating system shutdown. Allows the server running Hyper-V to initiate a graceful shutdown of the
guest virtual machine.
• Time synchronization. Allows the virtual machine to use the virtualization server's processor for the
purpose of time synchronization.
• Data exchange. Allows the server running Hyper-V to write data to the registry of the virtual machine.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-13
• Heartbeat. Allows Hyper-V to determine if the virtual machine has become unresponsive.
• Backup (volume snapshot). Allows the Volume Shadow Copy Service (VSS) provider to create
snapshots of the virtual machine for the purposes of backup operation, without interrupting the
virtual machine’s normal operations.
• Automatically start if it was running when the service stopped. The virtual machine restarts if it was
running when the server running Hyper-V received the command to shut down, or if the virtual
machine was running when the server suffered a failure that caused it to be powered off.
• Always start this virtual machine automatically. The virtual machine always starts when the server
running Hyper-V starts. You can configure a startup delay to ensure that multiple virtual machines do
not attempt to all start up at the same time.
• Turn off the virtual machine. The virtual machine is turned off when the server receives a shutdown
command. Data may be lost when this happens.
• Shut down the guest operating system. The virtual machine is shut down in a graceful manner when
the server receives a shutdown command. This option is available only if integration services
components are installed on the virtual machine.
Note: You can also configure virtual machine automatic start and stop actions by using the
Windows PowerShell cmdlet Set-VM with the AutomaticStartAction and
AutomaticStopAction parameters.
MCT USE ONLY. STUDENT USE PROHIBITED
13-14 Implementing Server Virtualization with Hyper-V
By measuring how much of these resources each virtual machine uses, an organization can bill
departments or customers based on how much resources their virtual machines use, rather than charging
a flat fee per virtual machine. An organization with only internal customers can also use these
measurements to see patterns of use and plan future expansions. You perform resource metering tasks
from a Windows PowerShell command-line interface using the following cmdlets:
• Enable-VMResourceMetering. Starts collecting data on a per virtual machine basis.
Note: There is no GUI tool that you can use to perform resource metering.
Additional Reading: For more information about resource metering for Hyper-V, see
Hyper-V Resource Metering Overview at http://go.microsoft.com/fwlink/?LinkId=269714.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-15
Lesson 3
Managing Virtual Machine Storage
Hyper-V provides many different virtual machine storage options. By knowing which option is appropriate
for a given situation, you can help ensure that a virtual machine performs well. However, if you do not
understand the different virtual machine storage options, you may end up deploying VHDs that consume
unnecessary space or that place an unnecessary performance burden on the virtualization server.
In this lesson, you will learn about different VHD types, different VHD formats, and the benefits and
limitations of using virtual machine snapshots.
Lesson Objectives
After completing this lesson, you will be able to:
What Is a VHD?
A VHD is a file that represents a traditional hard
disk drive that you can configure a VHD with
partitions and an operating system. You can use
VHDs on virtual machines, and you can mount
VHDs as local volumes using the Windows Server
2008, Windows Server 2008 R2, Windows Server
2012, and Windows 8, and Windows 7 operating
systems. Windows Server 2012 supports boot to
VHD; this makes it possible for you to configure a
computer to boot into a Windows Server 2012
operating system that is deployed on a VHD, or
into certain editions of the Windows 8 operating
system that are deployed on a VHD. You can create a VHD using:
• The Hyper-V Manager console.
Note: Some editions of Windows 7 and Windows Server 2008 R2 also support boot
to VHD.
MCT USE ONLY. STUDENT USE PROHIBITED
13-16 Implementing Server Virtualization with Hyper-V
• VHDs with the .vhdx format can be as large as 64 TB, whereas VHDs with the, vhd format are limited
to 2 TB.
• VHDs with the .vhdx format are less likely to be corrupted if the virtualization server suffers an
unexpected power outage.
• The .vhdx format supports better alignment when deployed to a large sector disk.
• VHDs with the .vhdx format can hold larger dynamic and differencing VHDs, which means that the
dynamic and differencing VHDs perform better.
You can convert a VHD with the .vhd format to the .vhdx format using the Edit Virtual Hard Disk Wizard;
you may want to do this if you have upgraded a Windows Server 2008 or Windows Server 2008 R2
virtualization server to Windows Server 2012. You can also convert a VHD with the .vhdx format to the
.vhd format.
Additional Reading: For more information about VHD formats, see Hyper-V Virtual Hard
Disk Format Overview at http://go.microsoft.com/fwlink/?LinkId=269715.
Note: Disk fragmentation is less of an issue when VHDs are hosted on RAID volumes, or on
SSDs. Improvements in Hyper-V (since it was first introduced with Windows Server 2008) also
minimize the performance differences between dynamic and fixed VHDs.
2. On the Actions pane, click New, and then click Hard Disk.
3. On the Before You Begin page of the New Virtual Hard Disk Wizard, click Next.
4. In the New Virtual Hard Disk Wizard, on the Choose Disk Format page, click either VHD or VHDX,
and then click Next.
5. On the Choose Disk Type page, click Fixed size, and then click Next.
6. On the Specify Name and Location page, enter a name for the VHD, and then specify a folder in
which to host the VHD file.
o Copy the contents of a specified physical disk. With this option you can replicate an existing
physical disk on the server as a VHD. The fixed VHD will be the same size as the physical disk.
Replicating an existing physical hard disk does not change the data on that disk.
o Copy the contents of a specified virtual hard disk. With this option, you can create a new
fixed hard disk based on the contents of an existing VHD.
Note: You can create a new fixed hard disk using the Windows PowerShell cmdlet
New-VHD with the -Fixed parameter.
To create a dynamically expanding VHD you follow the steps for creating a fixed VHD shown above
except that on the Choose Disk Type page (in step 5), you click Dynamically Expanding instead of Fixed
Size.
Note: You can create a new dynamic hard disk using the Windows PowerShell cmdlet
New-VHD with the -Dynamic parameter.
MCT USE ONLY. STUDENT USE PROHIBITED
13-18 Implementing Server Virtualization with Hyper-V
Direct-attached Storage
Direct-attached storage makes it possible for a virtual machine to access a physical disk drive. You can use
direct-attached storage to connect a virtual machine directly to an iSCSI logical unit number (LUN). When
you use direct-attached storage, the virtual machine must have exclusive access to the target disk; to
ensure this, you must take the disk offline.
2. Use the Hyper-V Manager console to edit the existing virtual machine's properties.
3. Click on an IDE or SCSI controller, click Add, and then click Hard Drive.
4. In the Hard Drive dialog box, click Physical Hard Disk. From the drop-down menu, select the disk
that you want to use as direct-attached storage.
Note: If you connect direct-attached storage to a virtual machine's SCSI controller, then
you do not have to shut down the virtual machine. If you want to connect to a virtual machine's
IDE controller, then you must first shut down the virtual machine.
Question: Why might you consider using fixed VHDs instead of dynamically expanding
VHDs?
Question: In what situations might you encounter difficulties if you use dynamically
expanding disks?
Managing VHDs
From time to time, you need to perform
maintenance operations on VHDs. For example,
you might want to convert a VHD to another
format as your needs change, or you might want
to compact a VHD to free up space. You can
perform the following maintenance operations
on VHDs:
Converting a Disk
When you convert a VHD, the contents of the existing VHD are copied to a newly created VHD. For
example, when you convert a fixed VHD to a dynamically expanding VHD, a new dynamic disk is created,
then the contents of the fixed disk are copied to the new dynamic disk, and then the fixed disk is deleted.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-19
To convert a VHD from fixed to dynamic or from dynamic to fixed, perform the following steps:
1. In the Hyper-V Manager console, from the Actions pane, click Edit Disk.
2. In the Edit Virtual Hard Disk Wizard, on the Before You Begin page, click Next.
3. On the Local Virtual Hard Disk page, click Browse, and then select the VHD that you want to
convert.
4. On the Choose Action page, click Convert, and then click Next.
5. On the Convert Virtual Hard Disk page, choose between VHD and VHDX format.
6. On the Convert Virtual Hard Disk page, choose between Fixed Size and Dynamically Expanding.
If you also want to convert the hard disk type, choose the appropriate type, and then click Next.
7. On the Configure Disk page, choose the destination location for the disk.
You can use one of two methods to change the size of a VHD. They are:
You can reconnect a differencing VHD to the parent using the Inspect Disk tool, which is available in the
Actions pane of the Hyper-V Manager console. You can also use the Inspect Disk tool to locate the parent
disk of a differencing VHD.
You can create a differencing VHD using the Hyper-V Manager console or using the Windows PowerShell
cmdlet New-VHD.
To create a differencing VHD using the Hyper-V Manager console, perform the following steps:
3. In the New Virtual Hard Disk Wizard, on the Before You Begin page, click Next.
MCT USE ONLY. STUDENT USE PROHIBITED
13-20 Implementing Server Virtualization with Hyper-V
4. On the Choose Disk Format page, click VHD, and then click Next.
5. On the Choose Disk Type page, click Differencing, and then click Next.
6. On the Specify Name and Location page, provide the location of the parent hard disk.
To create a differencing VHD using the New-VHD Windows PowerShell cmdlet, follow the pattern of the
following example. To create a new differencing VHD named c:\diff-disk.vhd that uses the VHD
c:\parent.vhd, use the following Windows PowerShell command:
Using Snapshots
Snapshots are a static image of the data on a
virtual machine at a given moment. Snapshots are
stored in either .avhd or .avhdx format depending
on the VHD format. You can take a snapshot of
a virtual machine from the Action menu of the
Virtual Machine Connection window, or from the
Hyper-V Manager console. Each virtual machine
can have a maximum of 50 snapshots.
You can take snapshots at any time, even when
a virtual machine is shut down. When you take
a snapshot of a running virtual machine, the
snapshot includes the contents of the virtual
machine’s memory.
When taking snapshots of multiple virtual machines that are part of the same group, for example a virtual
domain controller and virtual member server, you should take these snapshots simultaneously. This
ensures that items such as computer account passwords are the same on all of the snapshots.
Remember that when you revert to a snapshot, you are reverting to a computer’s state at that point in
time. If you take a computer back to a point before it had performed a computer password change with a
domain controller, you need to rejoin that computer to the domain or run the netdom resetpwd
command.
Exporting Snapshots
You can perform a virtual machine export of a snapshot. When you do this, Hyper-V creates full VHDs
that represent the state of the virtual machine at the time the snapshot was taken. If you choose to export
an entire virtual machine, all snapshots associated with the virtual machine are also exported.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-21
• If you delete the most recent snapshot, the data is discarded. With Hyper-V in Windows Server 2012,
this space is reclaimed immediately rather than when the virtual machine is shut down.
• If you delete the second-most recent snapshot, the data is merged so that the earlier and latter
snapshot states of the virtual machine retain their integrity.
Managing Snapshots
When you apply a snapshot, the virtual machine reverts to the configuration as it existed at the time
the snapshot was taken. Reverting to a snapshot does not delete existing snapshots. If you revert to a
snapshot after making a configuration change, you are prompted to take a snapshot. It is only necessary
to create a new snapshot if you want to return to that current configuration.
It is possible to create snapshot trees that have different branches. For example, consider the following
scenario:
You take a snapshot of a virtual machine on Monday, Tuesday, and Wednesday. On Thursday you apply
the Tuesday snapshot. Immediately after applying the Tuesday snapshot, you make changes to the virtual
machine's configuration.
In this scenario, the original branch is the series of snapshots taken on Monday, Tuesday, and Wednesday.
You create a new branch by applying the Tuesday snapshot and making changes to the virtual machine.
You can have multiple branches as long as you do not exceed the 50 snapshots per virtual machine limit.
MCT USE ONLY. STUDENT USE PROHIBITED
13-22 Implementing Server Virtualization with Hyper-V
Lesson 4
Managing Virtual Networks
Hyper-V provides several different options for network communication between virtual machines. You can
configure virtual machines that communicate with an external network in a manner similar to traditionally
deployed physical hosts. You can configure virtual machines to communicate only with a limited number
of other virtual machines that are hosted on the same server. Knowing the options available for Hyper-V
virtual networks ensures that you can leverage those options to best meet your organization's needs.
Lesson Objectives
After completing this lesson, you will be able to:
• External. This type of switch maps a network to a specific network adapter or network adapter team.
Windows Server 2012 supports mapping an external network to a wireless network adapter if you
have installed the wireless local area network (LAN) service on the virtualization server, and if the
virtualization server has a compatible adapter.
• Internal. Internal virtual switches communicate between the virtual machines on the virtualization
server, and between the virtual machines and the virtualization server itself.
• Private. Private switches communicate only between virtual machines on the virtualization server. You
cannot use private switches to communicate between the virtual machines and the virtualization
server itself.
When configuring a virtual network, you can also configure a virtual LAN (VLAN) ID to be associated with
the network. This allows you to extend existing VLANs on the external network to VLANs within the
virtualization server's network switch. VLANs allow you to partition network traffic, and they function as
separate logical networks. Traffic can only pass from one VLAN to another if it passes through a router.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-23
You can configure the following extensions for each virtual switch type:
• Microsoft NDIS Capture. This extension allows data that is travelling across the virtual switch to be
captured.
• Microsoft Windows Filtering Platform. This extension allows data that is travelling across the virtual
switch to be filtered.
Additional Reading: For more information about virtual switches, see Hyper-V Virtual
Switch Overview at http://go.microsoft.com/fwlink/?LinkId=269716.
When you configure Network Virtualization, each guest virtual machine has two IP addresses that function
as follows:
• Customer IP address. This address is assigned by the customer to the virtual machine. This IP address
is configured so that communication with the customer's internal network occurs even though the
virtual machine might be hosted on a virtualization server that is connected to a separate public IP
network. To display the customer IP address, at a command prompt on the virtual machine, execute
IPCONFIG.
• Provider IP address. This address is assigned by the hosting provider. This address is visible to the
hosting provider and to other hosts on the physical network, but it is not visible from the virtual
machine.
Network Virtualization allows you to host multiple machines that use the same customer address—for
example, 192.168.15.101—on the same a server that is running Hyper-V, because the virtual machines
have different provider IP addresses.
Additional Reading: For more information about network virtualization, see Hyper-V
Network Virtualization Overview at http://go.microsoft.com/fwlink/?LinkId=269717.
MCT USE ONLY. STUDENT USE PROHIBITED
13-24 Implementing Server Virtualization with Hyper-V
• Bandwidth Management. You allocate a minimum and a maximum bandwidth for the adapter. The
minimum bandwidth allocation is reserved by Hyper-V for the network adapter, even when virtual
network adapters on other virtual machines are working at capacity.
Both synthetic network adapters and legacy network adapters support the following advanced features:
• MAC address allocation. You can configure a MAC address to be assigned from the MAC address
pool, or you can configure the network adapter to use a fixed MAC address. You can also configure
MAC address spoofing. This is useful when the virtual machine needs to provide specific network
access, such as when the virtual machine is running a mobile device emulator that requires network
access.
• DHCP Guard. This feature drops DHCP messages from virtual machines that are functioning as
unauthorized DHCP servers. This may be necessary in scenarios where you are managing a server
running Hyper-V that hosts virtual machines for others, but does not have direct control over the
configuration of those virtual machines.
• Router Guard. This feature drops router advertisement and redirection messages from virtual
machines that are configured as unauthorized routers. This may be necessary in scenarios where you
do not have direct control over the configuration of virtual machines.
• Port Mirroring. This feature allows you to copy incoming and outgoing packets from a network
adapter to another virtual machine that you have configured for monitoring.
• NIC Teaming. This feature allows you to add the virtual network adapter to an existing team on the
server running Hyper-V.
Synthetic network adapters require the guest operating system to support integration services. In addition
to the advanced features listed earlier, synthetic network adapters support the following hardware
acceleration features:
• Virtual Machine Queue. This feature uses hardware packet filtering to deliver network traffic directly
to the guest. This improves performance because the packet does not need to be copied from the
management operating system to the virtual machine. Virtual Machine Queue requires that the host
computer has a network adapter that supports this feature.
• IPsec task offloading. This feature allows calculation-intensive security association tasks to be
performed by the host's network adapter. In the event that sufficient hardware resources are not
available, the guest operating system performs these tasks. You can configure a maximum number of
offloaded security associations between 1 and 4,096. IP security (IPsec) task offloading requires guest
operating system support and network adapter support.
MCT USE ONLY. STUDENT USE PROHIBITED
13-26 Implementing Server Virtualization with Hyper-V
• SR-IOV. Single-root I/O virtualization (SR-IOV) allows multiple virtual machines to share the same
Peripheral Component Interconnect (PCI) Express physical hardware resources. If sufficient resources
are not available, then network connectivity falls back to be provided through the virtual switch.
SR-IOV requires specific hardware and special drivers to be installed on the guest operating system.
Legacy network adapters emulate common network adapter hardware. You use legacy network adapters
in the following situations:
• You want to support network boot installation scenarios for virtual machines. For example, you want
to deploy an operating system image from a Windows Deployment Services (Windows DS) server or
through Configuration Manager.
• You need to support operating systems that do not support integration services and do not have
drivers for the synthetic network adapter.
Legacy network adapters do not support the hardware acceleration features that synthetic network
adapters support. You cannot configure virtual machine queue, IPsec task offloading, or Single-root I/O
virtualization for legacy network adapters.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-27
To use the server hardware that is currently available at branch offices more effectively, your manager
has decided that all branch office servers will run as virtual machines. You must now configure a virtual
network and a new virtual machine for these branch offices.
Objectives
After performing this lab, you will be able to:
Lab Setup
Estimated Time: 75 minutes
Password Pa$$w0rd
1. Reboot the classroom computer and from the Windows Boot Manager, select 20410B-LON-HOST1.
2. Sign in to LON-HOST1 with the Administrator account and the password Pa$$w0rd.
o IP Address: 172.16.0.31
2. Use the Add Roles and Features Wizard to add the Hyper-V role to LON-HOST1 with the following
options:
3. After a few minutes, the server restarts automatically. Ensure that you restart the machine from the
boot menu as 20410B-LON-HOST1. The computer will restart several times.
4. Edit the Hyper-V settings of LON-HOST1, and configure the following settings:
Results: After completing this exercise, you will have installed the Hyper-V role onto a physical server.
2. Use the Virtual Switch Manager to create a new virtual switch with the following properties.
2. Use the Virtual Switch Manager to create a new virtual switch with the following properties.
o Name: Internal Network
o Minimum: 00-15-5D-0F-AB-A0
o Maximum: 00-15-5D-0F-AB-EF
Results: After completing this exercise, you will have configured virtual switch options on a physically
deployed Windows Server 2012 server running the Hyper-V role.
Note: The drive letter may depend upon the number of drives on the physical host machine.
MCT USE ONLY. STUDENT USE PROHIBITED
13-30 Implementing Server Virtualization with Hyper-V
2. In the Hyper-V Manager console, create a VHD with the following properties:
o Name: LON-GUEST1.vhd
3. Open Windows PowerShell, import the Hyper-V module using the following command:
Import-Module Hyper-V
o Name: LON-GUEST1
o Location: E:\Program Files\Microsoft Learning\Base\LON-GUEST1\
o Memory: 1024 MB
3. Open Windows PowerShell, import the Hyper-V module using the following command:
Import-Module Hyper-V
5. Use the Hyper-V Manager console to edit the settings of LON-GUEST2 by configuring the following:
Enable-VMResourceMetering LON-GUEST1
Enable-VMResourceMetering LON-GUEST2
Results: After completing this exercise, you will have deployed two separate virtual machines using a
sysprepped VHD file as a parent disk for two differencing VHDs.
In this exercise, you will deploy Windows Server 2012 in a virtual machine. You will then create a stable
configuration for that virtual machine, and take a virtual machine snapshot. Finally, you will modify the
configuration, and roll back to the snapshot.
o On the Settings page, click Next to accept the Region and Language settings.
o On the Settings page, enter the password Pa$$w0rd twice, and then click Finish.
3. Sign in to the virtual machine using the account Administrator and the password Pa$$w0rd.
4. Reset the name of the virtual machine to LON-GUEST1, and then restart the virtual machine.
MCT USE ONLY. STUDENT USE PROHIBITED
13-32 Implementing Server Virtualization with Hyper-V
Measure-VM LON-GUEST1
3. Note the average CPU, average RAM, and total disk use figures, and then close Windows PowerShell.
Shutdown /r /t 5
3. From the Windows Boot Manager, click Windows Server 2008 R2.
Results: After completing this exercise, you will have used virtual machine snapshots to recover from a
virtual machine misconfiguration.
Question: What type of virtual network switch would you create if you wanted to allow the
virtual machine to communicate with the LAN that is connected to the Hyper-V virtualization
server?
Question: How can you ensure that no one single virtual machine uses all available
bandwidth provided by the Hyper-V virtualization server?
Question: What Dynamic Memory configuration task was not possible on previous versions
of Hyper-V, but which you can now perform on a virtual machine that is hosted on the
Hyper-V role on a Windows Server 2012 server?
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-33
Best Practices
When implementing server virtualization with Hyper-V, use the following best practices:
• Ensure that the processor on the computer that will run Hyper-V supports hardware assisted
virtualization.
• Ensure that a virtualization server is provisioned with adequate RAM. Having multiple virtual
machines paging the hard disk drive because they have inadequate memory decreases performance
for all virtual machines on the server.
• Monitor virtual machine performance carefully. A virtual machine that uses a disproportionate
amount of server resources can reduce the performance of all other virtual machines that are hosted
on the same virtualization server.
Tools
You can use the following tools with Hyper-V to deploy and manage virtual machines.
Sysinternals Use to convert physical hard disks to VHD Microsoft TechNet website.
disk2vhd tool format.
MCT USE ONLY. STUDENT USE PROHIBITED
13-34 Implementing Server Virtualization with Hyper-V
Course Evaluation
Your evaluation of this course will help Microsoft
understand the quality of your learning experience.
8. In the Virtual Machine Connection window, in the Action menu, click Start.
9. In the Windows Setup Wizard, on the Windows Server 2012 page, verify the following settings, and
then click Next.
12. On the License terms page, review the operating system license terms. Select the I accept the
license terms check box, and then click Next.
13. On the Which type of installation do you want? page, click Custom: Install Windows only
(advanced).
14. On the Where do you want to install Windows? page, verify that Drive 0 Unallocated Space has
enough space for the Windows Server 2012 operating system, and then click Next.
Note: Depending on the speed of the equipment, the installation will take approximately
20 minutes. The virtual machine will restart several times during this process.
15. On the Settings page, in both the Password and Reenter password boxes, enter the password
Pa$$w0rd, and then click Finish.
MCT USE ONLY. STUDENT USE PROHIBITED
L1-2 Deploying and Managing Windows Server 2012
4. In the System Properties dialog box, on the Computer Name tab, click Change.
5. In the Computer Name/Domain Changes dialog box, in the Computer name text box, enter the
name LON-SVR3, and then click OK.
6. In the Computer Name/Domain Changes dialog box, click OK.
6. In the Date and Time dialog box, click Change Date and Time.
7. Verify that the date and time that display in the Date and Time Settings dialog box match those in
your classroom, and then click OK.
4. Right-click the selected network adapters, and then click Add to New Team.
5. In the New Teaming dialog box, in the Team name field. type LON-SVR3, and then click OK.
6. Close the NIC Teaming dialog box. Refresh the Server Manager console.
7. In the Server Manager console, next to LON-SVR3, click IPv4 Address Assigned by DHCP, IPv6
Enabled.
8. In the Network Connections dialog box, right-click LON-SVR3, and then click Properties.
9. In the LON-SVR3 Properties dialog box, click Internet Protocol Version 4 (TCP/IPv4), and then
click Properties.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L1-3
10. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, enter the following IP address
information, and then click OK:
o IP address: 172.16.0.101
o Subnet Mask: 255.255.0.0
4. In the Computer Name/Domain Changes dialog box, in the Member Of area, click the Domain
option.
5. In the Domain box, type adatum.com, and then click OK.
6. In the Windows Security dialog box, enter the following details, and then click OK:
o Username: Administrator
o Password: Pa$$w0rd
8. When informed that you must restart the computer to apply changes, click OK.
9. In the System Properties dialog box, click Close.
11. After LON-SVR3 restarts, sign in as Adatum\Administrator with the password Pa$$w0rd.
Results: After finishing this exercise, you will have deployed Windows Server 2012 on LON-SVR3. You also
will have configured LON-SVR3, including name change, date and time, networking, and network
teaming.
6. Sign in to server LON-CORE using the Administrator account with the password Pa$$w0rd.
7. At the command prompt, type hostname, and then press Enter to verify the computer’s name.
4. In the Date and Time dialog box, click Change time zone. Set the time zone to the same time zone
that your classroom uses, and then click OK.
5. In the Date and Time dialog box, click Change Date and Time, and verify that the date and time
match those in your location. To dismiss the dialog boxes, click OK two times.
6. In the Command Prompt window, type 15, and then press Enter to exit Server Configuration.
4. Type the index number of the network adapter that you want to configure, and then press Enter.
5. On the Network Adapter Settings page, type 1, and then press Enter. This sets the Network Adapter
Address.
8. At the Enter subnet mask prompt, Type 255.255.0.0, and then press Enter.
9. At the Enter default gateway prompt, type 172.16.0.1, and then press Enter.
10. On the Network Adapter Settings page, type 2, and then press Enter. This configures the DNS
server address.
11. At the Enter new preferred DNS server prompt, type 172.16.0.10, and then press Enter.
14. Type 4, and then press Enter to return to the main menu.
5. At the Name of domain to join prompt, type adatum.com and press Enter.
6. At the Specify an authorized domain\user prompt, type Adatum\Administrator, and then press
Enter.
7. At the Type the password associated with the domain user prompt, type Pa$$w0rd and then
press Enter.
Results: After finishing this exercise, you will have configured a Windows Server 2012 Server Core
deployment, and verified the server’s name.
3. In the Create Server Group dialog box, click the Active Directory tab, and then click Find Now.
4. In the Server group name box, type LAB-1.
5. Use the arrow to add LON-CORE and LON-SVR3 to the server group. Click OK to close the Create
Server Group dialog box.
6. In the Server Manager console, click LAB-1. Press and hold the Ctrl key, and then select both
LON-CORE and LON-SVR3.
7. Scroll down, and under the Performance section, select both LON-CORE and LON-SVR3.
2. Scroll to the top of the pane, right-click LON-CORE, and then click Add Roles and Features.
5. On the Select destination server page, verify that LON-CORE.Adatum.com is selected, and then
click Next.
6. On the Select server roles page, select Web Server (IIS), and then click Next.
7. On the Features page, select Windows Server Backup, and then click Next.
9. On the Select Role Services page, add the Windows Authentication role service, and then
click Next.
10. On the Confirm installation selections page, select the Restart the destination server
automatically if required check box, and then click Install.
11. Click Close to close the Add Roles and Features Wizard.
12. In Server Manager, right-click LON-SVR3, and then click Add Roles and Features.
13. In the Add Roles and Features Wizard, on the Before you begin page, Click Next.
14. On the Select installation type page, click Role-based or feature-based installation. Click Next.
15. On the Select destination server page, verify that LON-SVR3.Adatum.com is selected, and then
click Next.
17. On the Select features page, click Windows Server Backup, and then click Next.
18. On the Confirm installation selections page, select the Restart the destination server
automatically if required check box, and then click Install.
2. In the Command Prompt window, type the following command, and then press Enter:
3. Sign in to LON-DC1 with the Adatum\Administrator account and the password Pa$$w0rd.
4. In Server Manager, click LAB-1.
8. In the World Wide Web Publishing Service dialog box, on the Log On tab, verify that the service is
configured to use the Local System account.
9. On the Recovery tab, configure the following settings, and then click the Restart Computer Options
button:
o First failure: Restart the Service
11. Click OK to close the World Wide Web Publishing Services Properties dialog box.
Results: After finishing this exercise, you will have created a server group, deployed roles and features,
and configured the properties of a service.
4. At the command prompt, type Import-Module ServerManager, and then press Enter.
5. Type Get-WindowsFeature and then press Enter to review the roles and features installed on
LON-CORE.
6. Type the following command to review the running services on LON-CORE and then press Enter:
7. Type get-process, and then press Enter to view a list of processes on LON-CORE.
8. Type the following command to review the IP addresses assigned to the server and then press Enter:
Get-NetIPAddress | Format-table
9. Type the following command to review the most recent 10 items in the security log and then press
Enter:
3. To verify that the XPS Viewer feature has not been installed on LON-SVR3, type the following
command, and then press Enter:
4. To deploy the XPS Viewer feature on LON-SVR3, type the following command, and then press Enter:
5. To verify that the XPS Viewer feature has now been deployed on LON-SVR3, type the following
command and then press Enter:
6. In the Server Manager console, from the Tools drop-down menu, click Windows PowerShell ISE.
7. In the Windows PowerShell ISE window, in the Untitled1.ps1 script pane, type the following, pressing
Enter after each line:
Import-Module ServerManager
Install-WindowsFeature WINS -ComputerName LON-SVR3
Install-WindowsFeature WINS -ComputerName LON-CORE
8. Click the Save icon. Select the root of Local Disk (C:). Create a new folder named Scripts, and then
save the script in that folder as InstallWins.ps1.
Results: After finishing this exercise, you will have used Windows PowerShell to perform a remote
installation of features on multiple servers.
2. In the Virtual Machines list, right click 20410B-LON-DC1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.
3. In the Add Servers dialog box, in the Name (CN) box, type LON-SVR1, and then click Find Now.
4. Under Name, click LON-SVR1, and then click the arrow to add the server to the Selected column.
6. In Server Manager, in the Servers window, right-click LON-SVR1, and then select Add Roles and
Features.
7. In the Add Roles and Features Wizard, click Next.
8. In the Select installation type window, ensure that Role-based or feature-based installation is
selected, and then click Next.
9. On the Select destination server page, ensure that Select a server from the server pool is
selected. In the Server Pool window, verify that LON-SVR1.Adatum.com is highlighted, and then
click Next.
10. On the Select server roles page, select the Active Directory Domain Services check box, click Add
Features, and then click Next.
11. On the Select features page, click Next.
12. On the Active Directory Domain Services page, click Next.
13. On the Confirm installation selections page, select the Restart the destination server
automatically if required check box, and then click Install.
14. Installation will take several minutes. When the installation completes, click Close to close the Add
Roles and Features Wizard.
3. In the Active Directory Domain Services Configuration Wizard, on the Deployment Configuration
page, ensure that the Add a domain controller to an existing domain radio button is selected, and
then, beside the Domain line, click Select.
4. In the Windows Security dialog box, in the Username box, type Adatum\Administrator, in the
Password box, type Pa$$w0rd, and then click OK.
5. In the Select a domain from the forest window, click adatum.com, and then click OK.
7. On the Domain Controller Options page, ensure that Domain Name System (DNS) server is
selected, and then deselect the check box next to Global Catalog (GC).
MCT USE ONLY. STUDENT USE PROHIBITED
L2-10 Introduction to Active Directory Domain Services
Note: You would usually also want to enable the global catalog, but for the purpose of this
lab, this is done in the next lab task.
8. In the Type the Directory Services Restore Mode (DSRM) password section, type Pa$$w0rd in
both text boxes, and then click Next.
11. On the Paths page, accept the default folders, and then click Next.
12. On the Review Options page, click View Script, examine the Windows PowerShell script that the
wizard generates. Close the Notepad window.
13. On the Review Options page, click Next.
14. On the Prerequisites Check page, read any warning messages, and then click Install.
2. In Server Manager, click Tools, and then click Active Directory Sites and Services.
3. When the Active Directory Sites and Services window opens, expand Sites, expand
Default-First-Site-Name, expand Servers, and then expand LON-SVR1.
4. In the left column, right-click NTDS Settings, and then click Properties.
5. In the NTDS Settings Properties dialog box, select the Global Catalog check box, and then
click OK.
Results: After completing this exercise, you will have explored Server Manager and promoted a member
server to be a domain controller.
Ntdsutil
Activate instance ntds
Ifm
Create sysvol full c:\ifm
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L2-11
2. Point the mouse at the lower-right corner of the desktop, and click the Start charm when it appears.
3. On the Start screen, type CMD, and then press Enter.
10. On the Select destination server page, verify that LON-SVR2.Adatum.com is highlighted, and then
click Next.
11. On the Select server roles page, click Active Directory Domain Services.
12. In the Add Roles and Features Wizard, click Add Features, and then click Next.
15. On the Confirm installation selections page, click Restart the destination server automatically if
required. Click Yes at the message box.
Note: If you see a message stating that a delegation for the DNS server cannot be created,
click OK.
5. In the Post-deployment Configuration window, click Promote this server to a domain controller.
6. On the Deployment Configuration page, ensure that Add a domain controller to an existing
domain is selected, and confirm that adatum.com is the target domain. Click Next.
MCT USE ONLY. STUDENT USE PROHIBITED
L2-12 Introduction to Active Directory Domain Services
7. On the Domain Controller Options page, ensure that both Domain Name System (DNS) server
and global catalog are selected. For the DSRM password, enter Pa$$w0rd in both boxes, and then
click Next.
12. On the Review Options page, click Next, and then observe the Active Directory Domain Services
Configuration Wizard as it performs a check for prerequisites.
13. Click Install, and wait while AD DS is configured. While this task is running, read the information
messages that display on the screen.
Results: After completing this exercise, you will have installed an additional domain controller for the
branch office by using IFM.
2. In the Virtual Machines list, right-click 20410B-LON-DC1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.
2. From Server Manager, click Tools, and then click Active Directory Users and Computers.
3. In Active Directory Users and Computers, click Adatum.com.
5. In the New Object – Organizational Unit dialog box, in the Name box, type Branch Office 1, and
then click OK.
7. In the New Object – Group dialog box, in the Group name box, type Branch 1 Help Desk, and then
click OK.
8. Right-click Branch Office 1, point to New, and then click Group.
9. In the New Object – Group dialog box, in the Group name box, type Branch 1 Administrators, and
then click OK.
10. Right-click Branch Office 1, point to New, and then click Group.
11. In the New Object – Group dialog box, in the Group name box, type Branch 1 Users, and then click
OK.
12. In the navigation pane, click IT.
13. In the details pane, right-click Holly Dickson, and then click Move.
14. In the Move dialog box, click Branch Office 1, and then click OK.
15. In the navigation pane, click the Development organizational unit (OU).
16. In the details pane, right-click Bart Duncan, and then click Move.
17. In the Move dialog box, click Branch Office 1, and then click OK.
18. In the navigation pane, click the Managers OU.
19. In the details pane, right-click Ed Meadows, and then click Move.
20. In the Move dialog box, click Branch Office 1, and then click OK.
22. In the details pane, right-click Connie Vrettos, and then click Move.
23. In the Move dialog box, click Branch Office 1, and then click OK.
25. In the details pane, right-click Barbara Zighetti, and then click Move.
MCT USE ONLY. STUDENT USE PROHIBITED
L3-14 Maintaining Active Directory Domain Services Objects
26. In the Move dialog box, click Branch Office 1, and then click OK.
28. In the details pane, right-click Arlene Huff, and then click Move.
29. In the Move dialog box, click Branch Office 1, and then click OK.
32. In the details pane, right-click LON-CL1, and then click Move.
33. In the Move dialog box, click Branch Office 1, and then click OK.
35. Pause your mouse pointer in the lower-right corner of the display, and then click Settings.
37. When the computer has restarted, sign in as Adatum\Administrator with the password of
Pa$$w0rd.
40. In the navigation pane, right-click Branch Office 1, click Delegate Control, and then click Next.
41. On the Users or Groups page, click Add.
42. In the Select Users, Computers, or Groups dialog box, in the Enter the object names to select
(examples) box, type Branch 1 Administrators, and then click OK.
43. On the Users or Groups page, click Next.
44. On the Tasks to Delegate page, in the Delegate the following common tasks list, select the
following check boxes, and then click Next:
o Create, delete, and manage user accounts
45. On the Completing the Delegation of Control Wizard page, click Finish.
46. In the navigation pane, right-click Branch Office 1, click Delegate Control, and then click Next.
50. On the Tasks to Delegate page, click Create a custom task to delegate, and then click Next.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L3-15
51. On the Active Directory Object Type page, select Only the following objects in the folder, select
the following check boxes, and then click Next:
o Computer objects
o Create selected objects in this folder
52. On the Permissions page, select both the General check box and the Full Control check box, and
then click Next.
53. On the Completing the Delegation of Control Wizard page, click Finish.
Task 2: Delegate a user administrator for the Branch Office Help Desk
1. On LON-DC1, in the navigation pane, right-click Branch Office 1, click Delegate Control, and then
click Next.
3. In the Select Users, Computers, or Groups dialog box, in the Enter the object names to select
(examples) box, type Branch 1 Help Desk and then click OK.
4. On the Users or Groups page, click Next.
5. On the Tasks to Delegate page, in the Delegate the following common tasks list, select the
following check boxes, and then click Next:
o Reset user passwords and force password change at next logon
3. In the Select Groups dialog box, in the Enter the object names to select (examples) box, type
Branch 1 Administrators, and then click OK.
4. In the Active Directory Domain Services dialog box, click OK.
5. In the details pane, right-click Branch 1 Administrators, and then click Add to a group.
6. In the Select Groups dialog box, in the Enter the object names to select (examples) box, type
Server Operators, and then click OK.
8. On your host computer, in the 20410B-LON-DC1 window, on the Action menu, click Ctrl+Alt+Delete.
10. Sign in to LON-DC1 as Adatum\Holly with the password Pa$$w0rd. You can log on locally at a
domain controller because Holly belongs indirectly to the Server Operators domain local group.
11. On the desktop, in the taskbar, click Server Manager.
12. In the User Account Control dialog box, in the User name box, type Holly. In the Password box,
type Pa$$w0rd, and then click Yes.
MCT USE ONLY. STUDENT USE PROHIBITED
L3-16 Maintaining Active Directory Domain Services Objects
13. From Server Manager, click Tools, and then click Active Directory Users and Computers.
16. In the details pane, right-click Aaren Ekelund, and then click Delete.
18. Click OK to acknowledge that you do not have permissions to perform this task.
20. In the details pane, right-click Ed Meadows, and then click Delete.
21. Click Yes to confirm. You are successful because you have the required permissions.
Note: To modify the Server Operators membership list, you must have permissions beyond
those available to the Branch 1 Administrators group.
12. In the details pane, right-click Branch 1 Help Desk, and then click Add to a group.
13. In the Select Groups dialog box, in the Enter the object names to select (examples) box, type
Server Operators, and then click OK.
14. In the Active Directory Domain Services dialog box, click OK.
15. On your host computer, in the 20410B-LON-DC1 window, on the Action menu, click Ctrl+Alt+Delete.
19. In the User Account Control dialog box, in the User name box, type Bart. In the Password box,
type Pa$$w0rd, and then click Yes.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L3-17
24. In the details pane, right-click Connie Vrettos, and then click Delete.
25. Click Yes to confirm. You are unsuccessful because Bart lacks the required permissions. Click OK.
27. In the Reset Password dialog box, in the New password and Confirm password boxes, type
Pa$$w0rd, and then click OK.
28. Click OK to confirm the successful password reset.
29. On your host computer, in the 20410B-LON-DC1 window, on the Action menu, click Ctrl+Alt+Delete.
Results: After this exercise, you should have successfully created an OU, and delegated administration of
it to the appropriate group.
7. In the branch1-userdata Properties dialog box, on the Sharing tab, click Advanced Sharing.
8. Select the Share this folder check box, and then click Permissions.
9. In the Permissions for branch1-userdata dialog box, select the Full Control Allow check box, and
then click OK.
10. In the Advanced Sharing dialog box, click OK, and then in the branch1-userdata Properties dialog
box, click Close.
11. In Server Manager, click Tools, and then click Active Directory Users and Computers, and then
expand Adatum.com.
12. Right-click Branch Office1, point to New, and then click User.
13. In the New Object – User dialog box, in the Full name box, type _Branch_template.
14. In the User logon name box, type _Branch_template, and then click Next.
16. Select the Account is disabled check box, and then click Next.
2. In the _Branch_template Properties dialog box, on the Address tab, in the City box, type Slough.
4. In the Select Groups dialog box, in the Enter the object names to select (examples) box, type
Branch 1 Users, and then click OK.
Task 3: Create a new user for the branch office, based on the template
1. On LON-DC1, right-click _Branch_template, and then click Copy.
2. In the New Object – User dialog box, in the First name box, type Ed.
6. Clear the User must change password at next logon check box.
7. Clear the Account is disabled check box, and then click Next.
8. Click Finish.
11. Click the Profile tab. Notice that the home folder location is already configured.
12. Click the Member Of tab. Notice that Ed belongs to the Branch 1 Users group. Click OK.
13. On your host computer, in the 20410B-LON-DC1 window, on the Action menu, click Ctrl+Alt+Delete.
11. On your host computer, in the 20410B-LON-CL1 window, on the Action menu, click Ctrl+Alt+Delete.
Results: After this exercise, you should have successfully created and tested a user account created from a
template.
3. In the User Account Control dialog box, in the User name box, type Holly. In the Password box,
type Pa$$w0rd, and then click Yes.
4. From Server Manager, click Tools, and then click Active Directory Users and Computers.
8. In the Active Directory Domain Services dialog box, click Yes, and then click OK.
3. A message displays stating that The trust relationship between this workstation and the primary
domain failed.
4. Click OK.
2. On the Start screen, right-click the display, click All apps, and in the Apps list, click Control Panel.
3. In Control Panel, in the View by list, click Large icons, and then click System.
6. On the Select the option that describes your network page, click Next.
9. On the Type your user name, password, and domain name for your domain account page, in
the Password box, type Pa$$w0rd. Leave the other fields completed, and then click Next.
10. In the User Account and Domain Information dialog box, click Yes.
11. On the Do you want to enable a domain user account on this computer? page, click Do not add
a domain user account, and then click Next.
Results: After this exercise, you should have successfully reset a trust relationship.
2. At the Windows PowerShell prompt, type the following command, and then press Enter:
New-ADOrganizationalUnit LondonBranch
Set-ADAccountPassword Ty
7. When prompted to repeat the password, type Pa$$w0rd, and then press Enter.
8. At the Windows PowerShell prompt, type Enable-ADAccount Ty, and then press Enter.
9. On LON-CL1, sign in as Ty using a password of Pa$$w0rd.
10. Verify that sign in is successful and then sign out of LON-CL1.
Get-ADGroupMember LondonBranchUsers
Results: After completing this exercise, you will have created user accounts and groups by using Windows
PowerShell.
MCT USE ONLY. STUDENT USE PROHIBITED
L4-22 Automating Active Directory Domain Services Administration
2. In the Windows Explorer window, expand E:, expand Labfiles, and then click Mod04.
3. Right-click LabUsers.ps1, and then click Edit.
4. In Windows PowerShell Integrated Scripting Environment (ISE), read the comments at the top of the
script, and then identify the requirements for the header in the .csv file.
7. In the How do you want to open this type of file (.csv) window, click Notepad.
8. In Notepad, type the following line at the top of the file:
FirstName,LastName,Department,DefaultPassword
9. Click File, and then click Save.
2. At the Windows PowerShell prompt, type cd E:\Labfiles\Mod04, and then press Enter.
3. Type .\LabUsers.ps1, and then press Enter.
Results: After completing this exercise, you will have used Windows PowerShell to create user accounts in
bulk.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L4-23
2. At the Windows PowerShell Prompt, type the following command, and then press Enter:
3. Verify that only users from the LondonBranch organizational unit (OU) are listed.
4. At the Windows PowerShell prompt, type the following command, and then press Enter:
2. In Active Directory Administrative Center, in the Navigation pane, expand Adatum (local) and
double-click LondonBranch.
3. Click the Type column header to sort based on the object type.
4. Select all user accounts, right-click the user accounts, and then click Properties.
5. In the Multiple Users window, under Organization, select the Address check box.
Results: After completing this exercise, you will have modified user accounts in bulk.
Seven bits are required to support 100 hosts on the client subnet (27-2=126, 26-2=62).
2. How many bits are required to support 10 hosts on the server subnet?
Four bits are required to support 10 hosts on the server subnet (24-2=14,23-2=6).
3. How many bits are required to support 40 hosts on the future expansion subnet?
Six bits are required to support 40 hosts on the future expansion subnet (26-2=62, 25-2=30).
4. If all subnets are the same size, can they be accommodated?
No. If all subnets are the same size, then all subnets must use 7 bits to support 126 hosts. Only a
single class C–sized address with 254 hosts has been allocated. Three subnets of 126 hosts would not
fit.
5. Which feature allows a single network to be divided into subnets of varying sizes?
Variable length subnet masking allows you to define different subnet masks when subnetting.
Therefore, variable length subnet masking allows you to have subnets of varying sizes.
6. How many host bits will you use for each subnet? Use the simplest allocation possible, which is one
large subnet and two equal sized smaller subnets.
The client subnet is 7 host bits. This allows for up to 126 hosts and uses half of the allocated address
pool.
The server and future expansion subnets are 6 host bits. This allows for up to 62 hosts on each subnet
and uses the other half of the address pool.
Binary Decimal
11111111.11111111.11111111.10000000 255.255.255.128
MCT USE ONLY. STUDENT USE PROHIBITED
L5-26 Implementing IPv4
2. Given the number of host bits allocated, what is the subnet mask that you will use for the server
subnet? Calculate the subnet mask in binary and decimal.
• The server subnet is using 6 bits for the host ID. Therefore, you will use 26 bits for the subnet
mask.
Binary Decimal
11111111.11111111.11111111.11000000 255.255.255.192
3. Given the number of host bits allocated, what is the subnet mask that you will use for the future
expansion subnet? Calculate the subnet mask in binary and decimal.
• The future expansion subnet is using 6 bits for the host ID. Therefore, you will use 26 bits for the
subnet mask.
Binary Decimal
11111111.11111111.11111111.11000000 255.255.255.192
4. For the client subnet, define the network ID, first available host, last available host, and broadcast
address. Assume that the client subnet is the first subnet allocated from the available address pool.
Calculate the binary and decimal versions of each address.
In this table, the bits in bold are part of the network ID.
5. For the server subnet, define the network ID, first available host, last available host, and broadcast
address. Assume that the server subnet is the second subnet allocated from the available address
pool. Calculate the binary and decimal versions of each address.
In this table, the bits in bold are part of the network ID.
6. For the future allocation subnet, define the network ID, first available host, last available host, and
broadcast address. Assume that the future allocation subnet is the third subnet allocated from the
available address pool. Calculate the binary and decimal versions of each address.
In this table, the bits in bold are part of the network ID.
Results: After completing this exercise, you will have identified the subnets required to meet the
requirements of the lab scenario.
3. Type ipconfig, and then press Enter. Notice that the default gateway is configured correctly.
4. Type ping 10.10.0.1, and then press Enter. Notice that the default gateway is responding, but that
packets are not being routed there.
5. Type Get-NetRoute, and then press Enter. Notice that the entry for the default gateway (0.0.0.0) is
correct, but there is an unnecessary entry for the 172.16.0.0 network.
6. Type Remove-NetRoute –DestinationPrefix 172.16.0.0/16, and then press Enter. This removes the
unnecessary route to the 172.16.0.0 network. The default gateway will be used for routing instead.
MCT USE ONLY. STUDENT USE PROHIBITED
L5-28 Implementing IPv4
7. Press Y, and then press Enter to confirm removal of the route from active routes.
8. Type ping LON-DC1, and then press Enter. Notice that the ping is now successful.
Results: After completing this lab, you will have resolved an IPv4 connectivity problem.
7. In the Add Roles and Features Wizard, click Add Features, and then click Next.
11. On the Installation progress page, wait until the Installation succeeded on lon-svr1.adatum.com
message displays, and then click Close.
2. In the DHCP console, expand and right-click on lon-svr1.adatum.com, and then click Authorize.
3. In the DHCP console, right-click lon-svr1.adatum.com, and then click Refresh. Notice that the icons
next to IPv4 IPv6 changes color from red to green, which means that DHCP server has been
authorized in Active Directory® Domain Services (AD DS).
4. In the DHCP console, in the navigation pane, click lon-svr1.adatum.com, expand and right-click
IPv4, and then click New Scope.
6. On the Scope Name page, in the Name box, type Branch Office, and then click Next.
7. On the IP Address Range page, complete the page using the following information, and then click
Next:
o Length: 16
8. On the Add Exclusions and Delay page, complete the page using the following information:
12. On the Router (Default Gateway) page, in the IP address box, type 172.16.0.1, click Add, and then
click Next.
13. On the Domain Name and DNS Servers page, click Next.
14. On the WINS Servers page, click Next.
16. On the Completing the New Scope Wizard page, click Finish.
Task 3: Configure client to use DHCP, and then test the configuration
1. Switch to the LON-CL1 computer.
2. Move the mouse on the lower right corner of the screen, click Search icon.
3. In the Search box, type Control Panel, and then press Enter.
4. In Control Panel, under Network and Internet, click View Network Status and Tasks.
5. In the Network and Sharing Center window, click Change Adapter Settings.
6. In the Network Connections window, right-click Local Area Connection, and then click Properties.
7. In the Local Area Connection Properties window, click Internet Protocol Version 4 (TCP/IPv4), and
then click Properties.
8. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, select the Obtain an IP
address automatically radio button, select the Obtain DNS server address automatically radio
button, click OK, and then click Close.
9. Move the mouse on the lower right corner of the screen, and then click the Search icon.
10. In the Search box, type Command Prompt, and then press Enter.
11. In the Command Prompt window, at the command prompt, type ipconfig /renew, and then press
Enter.
12. Test the configuration, verify that LON-CL1 has received an IP address from the DHCP scope by
typing ipconfig /all at a command prompt.
This command will return information such as IP address, subnet mask, and DHCP enabled status,
which should be Yes.
3. Switch to LON-SVR1.
4. In the Server Manager dashboard, click Tools, and then click DHCP.
5. In the DHCP console, expand lon-svr1.adatum.com, expand IPv4, expand Branch Office, right-click
Reservations, and then click New Reservation.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L6-31
o In the MAC address field, type the physical address you wrote down in step 2.
7. Switch to LON-CL1.
8. In the Command Prompt window, at a command prompt, type ipconfig /release, and then press
Enter. This causes LON-CL1 to release any currently leased IP addresses.
9. At a command prompt, type ipconfig /renew, and then press Enter. This causes LON-CL1 to lease
any reserved IP addresses.
Results: After completing this exercise, you will have implemented DHCP, configured DHCP scope and
options, and configured a DHCP reservation.
2. In Server Manager, click Tools, and then click Routing and Remote Access.
3. In the navigation pane, expand LON-RTR (local), expand IPv4, right-click General, and then click
New Routing Protocol.
4. In the Routing protocols list, click DHCP Relay Agent, and then click OK.
2. In the New Interface for DHCP Relay Agent dialog box, click Local Area Connection 2, and then
click OK.
3. In the DHCP Relay Agent Properties – Local Area Connection 2 Properties dialog box, click OK.
5. In the DHCP Relay Agent Properties dialog box, in the Server address box, type 172.16.0.21, click
Add, and then click OK.
Note: To test how a client receives an IP address from the DHCP relay agent in another
subnet, we need to create another DHCP scope.
1. Switch to LON-SVR1.
2. In the Server Manager Dashboard, click Tools, and then click DHCP.
4. In the DHCP console, in the navigation pane, click lon-svr1.consoto.com, expand IPv4, right-click
IPv4, and then click New Scope.
5. In the New Scope Wizard, click Next.
6. On the Scope Name page, in the Name box, type Branch Office 2, and then click Next.
7. On the IP Address Range page, complete the page using the following information, and then click
Next:
8. On the Add Exclusions and Delay page, complete the page using the following information, click
Add, and then click Next:
11. On the Router (Default Gateway) page, in the IP address box, type 10.10.0.1, click Add, and then
click Next.
12. On the Domain Name and DNS Servers page, click Next.
15. On the Completing the New Scope Wizard page, click Finish.
17. On the Start screen, in the Start box, type Control Panel, and then press Enter.
18. Under Network and Internet, click View network status and tasks.
19. In the Network and Sharing Center window, click Change Adapter Settings, right-click Local Area
Connection, and then click Properties.
20. In the Local Area Connection Properties window, click Internet Protocol Version 4 (TCP/IPv4) and
then click Properties.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L6-33
21. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, click Obtain an IP address
automatically, click Obtain DNS server address automatically, click OK, and then click Close.
22. Navigate to the lower right corner, from the right menu, click Search, type cmd, and then press Enter.
23. In the Command Prompt window, at a command prompt, type ipconfig /renew, and then press
Enter.
24. Verify that IP address and DNS server settings on LON-CL2 are obtained from DHCP Server scope
Branch Office 2, installed on LON-SVR1.
Results: After completing this exercise, you will have implemented a DHCP relay agent.
2. In the Virtual Machines list, right-click 20410B-LON-DC1, and then click Revert.
4. On the Select destination server page, ensure that LON-SVR1.Adatum.com is selected, and then
click Next.
5. On the Select server roles page, select Active Directory Domain Services.
6. When Add Roles and Features Wizard displays, click Add Features, and then click Next.
7. On the Select features page, click Next.
10. On the Installation progress page, when the Installation succeeded message displays, click Close.
11. In the Server Manager console, on the navigation page, click AD DS.
12. On the title bar where Configuration required for Active Directory Domain Services at
LON-SVR1 displays, click More.
13. On the All Server Task Details and Notifications page, click Promote this server to a domain
controller.
14. In the Active Directory Domain Services Configuration Wizard, on the Deployment Configuration
page, ensure that Add a domain controller to an existing domain is selected, and then click Next.
15. On the Domain Controller Options page, clear the Domain Name System (DNS) server check box,
and leave the Global Catalog (GC) check box selected. Type Pa$$w0rd in both text fields, and then
click Next.
Note: The LON-SVR1 server will restart automatically as part of the procedure.
2. Expand LON-DC1, and then right click Forward Lookup Zones and select New Zone….
MCT USE ONLY. STUDENT USE PROHIBITED
L7-36 Implementing Domain Name System
3. In the New Zone Wizard, on the Welcome to the New Zone Wizard page, click Next.
4. On the Zone Type page, clear the check mark from the option Store the zone in Active Directory
and click Next.
5. On the Zone Name page, type nwtraders.msft and click Next.
10. In the New Host window, in the Name textbox, type www.
11. In the IP address box, type 172.16.0.100.
3. Click the Forwarders tab. Ensure that the list displays no entries, and that the Use root hints if no
forwarders are available option is selected.
4. Click Cancel.
Task 4: Add the DNS server role for the branch office on the domain controller
1. On LON-SVR1, in the Server Manager console, click Add roles and features.
2. On the Before you begin page, click Next.
4. On the Select destination server page, ensure that LON-SVR1.Adatum.com is selected, and then
click Next.
6. When the Add Roles and Features Wizard displays, click Add Features, and then click Next.
7. On the Select Features page, click Next.
3. In the DNS Manager console, expand LON-SVR1, and then expand Forward Lookup Zones. This
container will most likely be empty.
4. Switch back to Server Manager, click Tools, and then click Active Directory Sites and Services.
5. In the Active Directory Sites and Services console, expand Sites, expand Default-First-Site-Name,
expand Servers, expand LON-DC1, and then click NTDS Settings.
6. In the right pane, right-click the LON-SVR1 replication connection, and select Replicate Now.
Note: If you receive an error message, proceed to the next step and then retry this step
after 3-4 minutes.
7. In the navigation pane, expand LON-SVR1, and then click NTDS Settings.
8. In the right pane, right-click the LON-DC1 replication connection, click Replicate Now, and then
click OK.
9. Switch back to the DNS Manager console, right-click Forward Lookup Zones, and then click
Refresh.
10. Ensure that both the _msdcs.Adatum.com and Adatum.com containers display.
11. Close DNS Manager.
6. In the preferred DNS server field, remove the IP address, type 127.0.0.1, click OK, and then click
Close.
2. In the DNS Manager console, right-click LON-SVR1, and then click Properties.
3. In the LON-SVR1 Properties dialog box, click the Forwarders tab, and then click Edit.
4. In the Edit Forwarders window, type 172.16.0.10, and then click OK two times.
5. In the DNS Manager console, right click LON-SVR1, select All Tasks, and then click Restart.
MCT USE ONLY. STUDENT USE PROHIBITED
L7-38 Implementing Domain Name System
2. In the Command Prompt window, type nslookup, and then press Enter.
4. Ensure that you receive an IP address for this host as a non-authoritative answer.
Results: After completing this exercise, you will have installed and configured DNS on LON-SVR1.
6. In the Local Area Network Connection Properties dialog box, click Internet Protocol Version 4
(TCP/Ipv4), and then click Properties.
7. Delete the IP address for preferred DNS server. In the preferred DNS server box, type 172.16.0.21,
click OK, and then click Close.
Task 2: Create several host records in the Adatum.com domain for web apps
1. On LON-DC1, in the Server Manager console, click Tools, and then click DNS.
2. In the DNS Manager console, expand LON-DC1, expand Forward Lookup Zones, and then click on
Adatum.com.
o IP address: 172.16.0.200
o Name: ftp
o IP address: 172.16.0.201
7. Click Add Host, click OK, and then click Done.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L7-39
2. In the DNS Manager console, expand LON-SVR1, expand Forward Lookup Zones, and then click
Adatum.com.
3. Ensure that both www and ftp resource records display. (If they do not display, right-click
Adatum.com, and then click Refresh). It may take a couple of minutes for the records to display.
Task 4: Use the ping command to locate new records from LON-CL1
1. On LON-CL1, right-click the taskbar, and then click Task Manager.
4. In the Create new task window, type cmd, and then press Enter.
5. In the Command Prompt window, at a command prompt, type ping www.adatum.com, and then
press Enter.
6. Make sure that the name resolves to 172.16.0.200. (You will not receive replies.)
Results: After completing this exercise, you will have configured DNS records.
2. Ping will not work, but ensure that the name resolves to an IP address 172.16.0.100.
2. In the DNS Manager console, expand LON-DC1, expand Forward Lookup Zones, and then click
nwtraders.msft.
3. In the right pane, right-click www, and then click Properties.
6. In the Command Prompt window, at a command prompt, type ping www.nwtraders.msft, and then
press Enter. Note that ping will not work, and that the old IP address (which is 172.16.0.100) will still
display.
MCT USE ONLY. STUDENT USE PROHIBITED
L7-40 Implementing Domain Name System
2. In the Server Manager console, click Tools, and then click DNS.
3. Click LON-SVR1, click the View menu, and then click Advanced.
4. Expand LON-SVR1, expand the Cached Lookups node, expand .(root), expand msft, and then click
nwtraders.
5. In the right pane, examine the cached content. You will see that www record has the IP address
172.16.0.100.
6. Switch to LON-CL1.
7. In the Command Prompt window, at a command prompt, type ipconfig /displaydns, and then press
Enter.
8. Look for cached entries. You will notice that www.nwtraders.msft is resolving to 172.16.0.100.
3. Switch to LON-CL1.
4. In a Command Prompt window, at a command prompt, type ping www.nwtraders.msft, and then
press Enter. The return will still be the old IP address.
5. In the Command Prompt window, type ipconfig /flushdns, and then press Enter.
6. In the Command Prompt window, type ping www.nwtraders.msft, and then press Enter.
Results: After completing this exercise, you will have examined the DNS server cache.
2. At the Windows PowerShell prompt, type ping lon-dc1, and then press Enter. Notice that there are
four replies from 172.16.0.10.
3. Type ipconfig, and then press Enter.
4. Verify that the only IPv6 address listed is a link-local address that cannot be routed.
3. In the Network Connections window, right-click Local Area Connection, and then click Properties.
4. In the Local Area Connection Properties dialog box, clear the Internet Protocol Version 6
(TCP/IPv6) check box, and then click OK.
5. Close the Network Connections window.
6. In Server Manager, verify that Local Area Connection lists only 172.16.0.10. You may need to
refresh the view. LON-DC1 is now an IPv4-only host.
2. In the Local Server Properties dialog box, next to Local Area Connection, click 10.10.0.24, IPv6
enabled.
3. In the Network Connections window, right-click Local Area Connection, and then click Properties.
4. In the Local Area Connection Properties dialog box, clear the Internet Protocol Version 4
(TCP/IPv4) check box, and then click OK.
6. In Server Manager, verify that Local Area Connection now lists only IPv6 enabled. You may need to
refresh the view. LON-SVR2 is now an IPv6-only host.
2. Configure a network address that will be used on the IPv6 network. At the Windows PowerShell
prompt, type the following cmdlet, and then press Enter:
3. Allow clients to obtain the IPv6 network address automatically from LON-RTR. At the Windows
PowerShell prompt, type the following cmdlet, and then press Enter:
4. Type ipconfig, and then press Enter. Notice that Local Area Connection 2 now has an IPv6 address on
the 2001:db8:0:1::/64 network. This address is used for communication on the IPv6-only network.
2. At the Windows PowerShell prompt, type ipconfig, and then press Enter. Notice that Local Area
Connection now has an IPv6 address on the on the 2001:db8:0:1::/64 network. The network address
was obtained from the router through stateless configuration.
Results: After completing the exercise, students will have configured an IPv6–only network.
3. Record the InterfaceIndex of the ISATAP interface that has an IPv6 address that includes 172.16.0.1.
Interface index:
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L8-43
5. Verify that Forwarding is enabled for the interface and that Advertising is disabled.
6. The ISATAP interface for an ISATAP router must have forwarding enabled and advertising enabled.
Type the following command, and then press Enter:
7. Create a new IPv6 network that will be used for the ISATAP network. Type the following command,
and then press Enter:
8. View the IP address configuration for the ISATAP interface. Type the following command, and then
press Enter:
3. In the Edit Multi-String window, delete isatap, and then click OK.
4. If an error displays indicating that there was an empty string, click OK to continue.
7. Type ping isatap, and then press Enter. The name should resolve and you should receive four replies
from 172.16.0.1.
3. Verify that the Tunnel adapter for ISATAP has an IPv6 address on the 2001:db8:0:2/64 network.
Notice that this address includes the IPv4 address of NYC-DC1.
MCT USE ONLY. STUDENT USE PROHIBITED
L8-44 Implementing IPv6
ping 2001:db8:0:2:0:5efe:172.16.0.10
3. In the Local Server Properties dialog box, next to Local Area Connection, click IPv6 enabled.
4. In the Network Connections window, right-click Local Area Connection, and then click Properties.
5. In the Local Area Connection Properties dialog box, click Internet Protocol Version 6 (TCP/IPv6),
and then click Properties.
6. In the Internet Protocol Version 6 (TCP/IPv6) Properties dialog box, click Use the following DNS
server addresses.
7. In the Preferred DNS server box, type 2001:db8:0:2:0:5efe:172.16.0.10, and then click OK.
Note: A ping from LON-DC1 to LON-SVR2 does not respond because the firewall
configuration on LON-SVR2 blocks ping requests.
Results: After completing this exercise, students will have configured an ISATAP router on LON-RTR to
allow communication between an IPv6–only network and an IPv4–only network.
2. In the Virtual Machines list, right-click 20410B-LON-DC1, and then click Revert.
2. In Server Manager, click the Tools menu, and then click Computer Management.
3. In the Computer Management console, under the Storage node, click Disk Management.
6. In the Initialize Disk dialog box, select the Disk 2 check box, ensure that all other Disk check boxes
are cleared, click GPT (GUID Partition Table), and then click OK.
3. On the Specify Volume Size page, in the Simple volume size MB field, type 4000, and then click
Next.
4. On Assign Drive Letter or Path page, ensure that the Assign the following drive letter check box
is selected, and that F is selected in from the drop-down menu, and then click Next.
5. On the Format Partition page, from the File system drop-down menu, click NTFS, in the Volume
label text box, type Volume1, and then click Next.
7. In the Disk Management window, right-click the black marked box right of Disk 2, and then click New
Simple Volume.
8. In the New Simple Volume Wizard, on Welcome to the New Simple Volume Wizard page, click
Next.
9. On the Specify Volume Size page, in the Simple volume size in MB field, type 5000, and then click
Next.
10. On the Assign Drive Letter or Path page, ensure that the Assign the following drive letter check
box is selected, and that G is selected in from the drop-down list, and then click Next.
11. On the Format Partition page, from the File system drop-down menu, click ReFS, in the Volume
label text box, type Volume2, and then click Next.
12. On the Completing the New Simple Volume Wizard page, click Finish.
MCT USE ONLY. STUDENT USE PROHIBITED
L9-46 Implementing Local Storage
2. In Windows Explorer, click Volume2 (G:), right-click Volume2 (G:), point to New, and then click
Folder.
3. In the New folder field, type Folder1, and then press Enter.
Results: After you complete this lab, you should have initialized a new disk, and then created two simple
volumes and formatted them. You should also have verified that the drive letters are available in Windows
Explorer.
3. In the Shrink F: window, in the Enter the amount of space to shrink in MB field, type 1000, and
then click Shrink.
3. On the Select Disks page, in the Select the amount of space in MB field, type 1000, and then click
Next.
4. On the Completing the Extended Volume Wizard page, click Finish.
5. In a Windows Explorer window, click Volume2 (G:), and verify that Folder1 is available on the
volume.
Results: After this lab, you should have made one volume smaller, and extended another.
2. In Server Manager, in the left pane, click File and Storage Services, and then in the Servers pane,
click Storage Pools.
3. In the STORAGE POOLS pane, click TASKS, and then in the TASKS drop-down menu, click New
Storage Pool.
4. In the New Storage Pool Wizard window, on the Before you begin page, click Next.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L9-47
5. On the Specify a storage pool name and subsystem page, in the Name box, type StoragePool1,
and then click Next.
6. On the Select physical disks for the storage pool page, click the following physical disks, and then
click Next:
o PhysicalDisk3
o PhysicalDisk4
o PhysicalDisk5
o PhysicalDisk6
o PhysicalDisk7
7. On the Confirm selections page, click Create.
8. On the View results page, wait until the task completes, then click Close.
3. In the New Virtual Disk Wizard window, on the Before you begin page, click Next.
4. On the Select the storage pool page, click StoragePool1, and then click Next.
5. On the Specify the virtual disk name page, in the Name box, type Mirrored Disk, and then click
Next.
6. On the Select the storage layout page, in the Layout list, click Mirror, and then click Next.
7. On the Configure the resiliency settings page, click Three-way mirror, and then click Next.
8. On the Specify the provisioning type page, click Thin, and then click Next.
9. On the Specify the size of the virtual disk page, in the Virtual disk size box, type 10, and then click
Next.
11. On the View results page, wait until the task completes. Ensure that the Create a volume when this
wizard closes check box is selected, and then click Close.
12. In the New Volume Wizard window, on the Before you begin page, click Next.
13. On the Select the server and disk page, in the Disk pane, click the Mirrored Disk virtual disk, and
then click Next.
14. On the Specify the size of the volume page, click Next to confirm the default selection.
15. On the Assign to a drive letter or folder page, in the Drive letter drop-down menu, ensure that H
is selected, and then click Next.
16. On the Select file system settings page, in the File system drop-down menu, click ReFS, in the
Volume label box, type Mirrored Volume, and then click Next.
18. On the Completion page, wait until the creation completes, and then click Close.
MCT USE ONLY. STUDENT USE PROHIBITED
L9-48 Implementing Local Storage
Task 3: Copy a file to the volume, and verify that it is visible in Windows Explorer
1. Click to the Start screen, type command prompt, and then press Enter.
2. In the Command Prompt window, at the command prompt, type the following command, and then
press Enter:
3. In the Hard Drive pane, click Remove, in Settings dialog box click Continue, and then click OK.
7. In the VIRTUAL DISK pane, right-click Mirrored Disk, and then click Properties.
8. In the Mirrored Disk Properties dialog box, in the left pane, click Health. Notice that the Health
Status indicates a Warning. The Operational Status should indicate Incomplete, Unknown or
Degraded.
9. Click OK to close the Mirrored Disk Properties dialog box.
Task 6: Add a new disk to the storage pool and remove a broken disk
1. Switch to LON-SVR1.
2. In Server Manager, in the STORAGE POOLS pane, on the menu bar, click the Refresh “Storage
Pools” button.
3. In the STORAGE POOLS pane, right-click StoragePool1, and then click Add Physical Disk.
4. In the Add Physical Disk window, click PhysicalDisk8 (LON-SVR1), and then click OK.
5. In the PHYSICAL DISKS pane, right-click the disk that has a warning that displays beside it, and then
click Remove Disk.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L9-49
7. In the STORAGE POOLS pane, on the menu bar, click the Refresh “Storage Pools” button to see the
warnings disappear.
Results: After completing this lab, you should have created a storage pool and added five disks to it. Then
you should have created a three-way mirrored, thinly provisioned virtual disk from the storage pool. You
should have also copied a file to the new volume and verified that it is accessible. Next, after removing a
physical drive, you should have verified that the virtual disk was still available and could be accessed.
Finally, you should have added another physical disk to the storage pool.
2. In the Virtual Machines list, right-click 20410B-LON-DC1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.
2. In a Windows Explorer window, in the navigation pane, expand Computer, and then click
Allfiles (E:).
3. On the menu toolbar, click Home, click New folder, type Data, and then press Enter.
5. On the menu toolbar, click Home, click New folder, type Development, and then press Enter.
6. Repeat Step 5 for the following new folder names:
• Marketing
• Research
• Sales
2. In the Data Properties dialog box, click Security, and then click Advanced.
3. In the Advanced Security Settings for Data window, click Disable Inheritance.
4. In the Block Inheritance window, click Convert inherited permissions into explicit permissions on
this object.
5. Click OK to close the Advanced Security Settings for Data window.
10. In the Advanced Security Settings for Development window, click Disable Inheritance.
11. In the Block Inheritance window, click Convert inherited permissions into explicit permissions on
this object.
12. Remove the two permissions entries for Users (LON-SVR1\Users), and then click OK.
15. Type Development, click Check names, and then click OK.
16. Select the check box for Allow Modify in the Permissions for Development section.
19. Repeat steps 8 through 18 for the Marketing, Research, and Sales folders, assigning Modify
permissions to the Marketing, Research, and Sales groups for their respective folders.
2. On the Data Properties dialog box, click the Sharing tab, and then click Advanced Sharing.
3. In the Advanced Sharing window, select the Share this folder check box, and then click Permissions.
5. Type Authenticated Users, click Check names, and then click OK.
6. In the Permissions for Data window, click Authenticated Users, and then select the Allow check box
for the Change permission.
6. Attempt to access the Marketing, Research, and Sales folders. NTFS permissions on these folders will
prevent you from doing this.
Note: Bernard can still see the other folders, even though he does not have access to their
contents.
3. In Server Manager, in the navigation pane, click File and Storage Services.
4. On the File and Storage Services page, in the navigation pane, click Shares.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L10-53
6. Click Settings, and then select the Enable access-based enumeration check box.
4. In Windows Explorer, in the address bar, type \\LON-SVR1\Data, and then press Enter.
Note: Bernard can now view only the Development folder, the folder for which he has been
assigned permissions.
4. In the Data Properties dialog box, click the Sharing tab, click Advanced Sharing, and then click
Caching.
5. In the Offline Settings window, click No files or programs from the shared folder are available
offline, and then click OK.
Results: After finishing this exercise, you will have created a new shared folder for use by multiple
departments.
3. Navigate to drive E, right-click Allfiles (E:), and then click Configure Shadow Copies.
MCT USE ONLY. STUDENT USE PROHIBITED
L10-54 Implementing File and Print Services
4. In the drive Allfiles (E:) Properties dialog box, on the Shadow Copies tab, click drive E, and then
click Enable.
7. In the Settings dialog box, click Schedule. This opens the drive E dialog box.
8. In the drive Allfiles (E:) dialog box, change Schedule Task to Daily, change Start time to 12:00 AM,
and then click Advanced.
9. In the Advanced Schedule Options dialog box, select Repeat task, and then set the frequency to
every 1 hours.
13. Leave the drive Allfiles (E:) Properties dialog box open; it will be opened on the Shadow Copies
tab.
4. On the menu toolbar, click Home, click New item, and then click Text Document.
5. Type Report, and then press Enter.
6. Switch back to the Allfiles (E:) Properties dialog box; it should still be opened on the Shadow
Copies tab. Click Create Now.
3. In Windows Explorer, right-click the Development folder, and then click Properties.
4. In the Development Properties dialog box, click the Previous Versions tab.
5. Click the most recent folder version for Development, and then click Open.
6. Confirm that the Report .txt is in the folder, right-click Report.txt, and then click Copy.
Results: After finishing this exercise, you will have enabled shadow copies on the file server.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L10-55
5. On the Select destination server page, click the server on which you want to install the Print and
Document Services. The default server is the local server. Click Next.
6. On the Select Server Roles page, select the Print and Document Services check box. In the Add
Roles and Features Wizard window, click Add Features, and then click Next in the Select server
roles window.
8. On the Print and Document Services page, review the Notes for the administrator, and then click
Next.
9. On the Select Role Services page, click Next until the Confirm Installation Selections page
displays. Click Install to install the required role services.
10. Click Close.
3. On the Network Printer Installation Wizard page, click Add a TCP/IP or Web Services Printer by
IP address or hostname, and then click Next.
4. Change the Type of Device to TCP/IP Device.
5. In the Host name box, type 172.16.0.200, clear the Auto detect printer driver to use check box,
and then click Next.
6. Under Device Type, click Generic Network Card, and then click Next.
8. Click Microsoft as the Manufacturer, under Printers, click Microsoft XPS Class Driver, and then
click Next.
9. Change the Printer Name to Branch Office Printer, and then click Next.
10. Click Next two times to accept the default printer name and share name, and to install the printer.
12. In the Print Management console, right-click the Branch Office Printer, and then click Enable
Branch Office Direct Printing.
13. In the Print Management console, right-click the Branch Office Printer, and then select Properties.
14. Click the Sharing tab, select the List in the directory check box, and then click OK.
MCT USE ONLY. STUDENT USE PROHIBITED
L10-56 Implementing File and Print Services
2. In the Printer Ports window, click Standard TCP/IP Port, and then click New Port.
4. In the Printer Name or IP Address field, type 172.16.0.201, and then click Next.
6. Click Finish to close the Add Standard TCP/IP Printer Port Wizard.
8. In the Print Management console, click Printers, right-click Branch Office Printer, and then click
Properties.
9. On the Branch Office Printer Properties page, click the Ports tab, select the Enable printer
pooling check box, and then click the 172.16.0.201 port to select it as the second port.
2. On LON-CL1, point to the bottom left of the screen, and click the Start charm.
3. In the Start box, type Control Panel, and then press Enter.
5. In the Add a device window, click Branch Office Printer on LON-SVR1, and then click Next. The
device installs automatically.
Results: After finishing this exercise, you will have installed the Print and Document Services server role
and installed a printer with printer pooling.
MCT USE ONLY. STUDENT USE PROHIBITED
L11-57
2. In Server Manager, click Tools, and then click Group Policy Management.
3. In the Group Policy Management Console (GPMC), expand Forest: Adatum.com, expand Domains,
expand Adatum.com, and then expand the Group Policy Objects folder.
5. In the Group Policy Management Editor, expand the Default Domain Policy, expand User
Configuration, expand Policies, and then click Administrative Templates.
6. Point your mouse over the Administrative Templates folder, and note that the location is
Administrative Templates: Policy definitions (.admx files) retrieved from the local computer.
7. Close the Group Policy Management Editor.
2. In the Windows Explorer window, expand Local Disk (C:), expand Windows, expand SYSVOL,
expand sysvol, expand Adatum.com, and then double-click Policies.
3. In the details pane, right-click on a blank area, click New, and then click Folder.
Hint: Click in the details pane, and then use the Ctrl+A keys to select all of the content.
4. Expand Local Disk (C:), expand Windows, expand SYSVOL, expand sysvol, expand Adatum.com,
and open the PolicyDefinitions folder.
2. In the Group Policy Management Editor, expand Polices, point your mouse over the Administrative
Templates folder, and view the local information text. Note that it now says Administrative
Templates: Policy definitions (ADMX files) retrieved from the Central Store.
3. Close the Group Policy Management Editor.
Results: After completing this exercise, you will have configured a Central Store.
MCT USE ONLY. STUDENT USE PROHIBITED
L11-58 20410B: Installing and Configuring Windows Server® 2012
2. In the New Starter GPO dialog box, in the Name field, type Internet Explorer Restrictions, and
in the Comment field, type This GPO disables the General page in Internet Options, and then
click OK.
2. In the Group Policy Management Editor, expand User Configuration, Administrative Templates,
and then click All Settings.
3. Right-click All Settings, and then click Filter Options.
4. In the Filter Options dialog box, select the Enable Keyword Filters check box.
5. In the Filter for word(s): field, type General page.
6. In the drop-down box, click Exact, and then click OK.
7. Double-click the Disable the General page setting, click Enabled, and then click OK.
8. Close the Group Policy Management Editor.
Task 3: Create an Internet Explorer Restrictions GPO from the Internet Explorer
Restrictions starter GPO
1. In the GPMC, right-click the Adatum.com domain, and then click Create a GPO in this domain, and
link it here.
2. In the New GPO dialog box, in the Name field, type IE Restrictions.
3. Under Source Starter GPO, click the drop down box, select Internet Explorer Restrictions, and then
click OK.
6. In the Network and Internet dialog box, click Change your homepage. A message box displays
informing you that this feature has been disabled.
8. In the Control Panel, click Internet Options. Notice that in the Internet Properties dialog box the
General tab does not display.
Task 5: Use security filtering to exempt the IT Department from the Internet Explorer
Restrictions policy
1. Switch to LON-DC1.
2. In the GPMC, expand the Group Policy Objects folder, and in the left pane, click the IE Restrictions
policy.
3. In the details pane, click the Delegation tab.
7. In the IE Restrictions Security Settings dialog box, click the IT (Adatum\IT) group, next to the
Apply group policy permission, select the Deny check box, and then click OK.
2. Point the mouse at the lower-right corner of the screen, and when the sidebar displays, click the
Search charm.
6. In the Network and Internet dialog box, click Change your homepage. The Internet Properties
dialog box opens to the General tab, and all settings are available.
7. Close all open windows, and sign out.
2. Point the mouse at the lower-right corner of the screen, and when the sidebar displays, click the
Search charm.
6. In the Network and Internet dialog box, click Change your homepage. A message box displays
informing you that this feature has been disabled.
8. Click Internet Options. In the Internet Properties dialog box, notice that the General tab does not
display.
Results: After completing this lab, you should have created a GPO.
MCT USE ONLY. STUDENT USE PROHIBITED
L11-60 20410B: Installing and Configuring Windows Server® 2012
2. In the Active Directory Users and Computers console, in the navigation pane, right-click
Adatum.com, click New, and then click Organizational Unit.
3. In the New Object - Organizational Unit window, in the Name box, type Member Servers OU, and
then click OK.
4. In the Active Directory Users and Computers console, in the navigation pane, click Computers
container.
5. Press and hold the Ctrl key. In the details pane, click both LON-SVR1 and LON-SVR2, right-click the
selection, and then click Move.
6. In the Move window, click Member Servers OU, and then click OK.
3. In the New Object – Group window, in the Group Name field, type Server Administrators, and then
click OK.
Task 3: Create a Member Server Security Settings Group Policy Object (GPO) and link
it to the Member Servers OU
1. On LON-DC1, in the Server Manager window, click Tools, and then click Group Policy
Management.
2. In the Group Policy Management Console (GPMC), expand Forests: Adatum.com, expand Domains,
expand Adatum.com, right-click Group Policy Objects, and then click New.
3. In the New GPO window, in the Name field, type Member Server Security Settings, and then click
OK.
4. In the Group Policy Management Console window, right-click Member Servers OU, and then click
Link an Existing GPO.
5. In the Select GPO window, in Group Policy Objects window, click Member Server Security Settings,
and then click OK.
MCT USE ONLY. STUDENT USE PROHIBITED
L12-62 Securing Windows Servers Using Group Policy Objects
2. In the Group Policy Management Editor window, under Computer Configuration, expand Policies,
expand Windows Settings, expand Security Settings, and then click Restricted Groups.
3. Right-click Restricted Groups, and then click Add Group.
4. In the Add Group dialog box, in the Group name field, type Administrators, and then click OK.
5. In the Administrators Properties dialog box, next to Members of this group, click Add.
6. In the Add Member dialog box, type Adatum\Server Administrators, and then click OK.
Task 5: Verify that Computer Administrators has been added to the local
Administrators group
1. Switch to LON-SVR1.
2. Sign in to LON-SVR1 as Adatum\Administrator with a password of Pa$$w0rd.
4. At the Windows PowerShell command prompt, type the following command, and then press Enter:
Gpupdate /force
5. In the Server Manager window, click Tools, and then click Computer Management.
6. In the Computer Management console, expand Local Users and Groups, click Groups, and then in
the right pane, double-click Administrators.
7. Confirm that the Administrators group contains both ADATUM\Domain Admins and
ADATUM\Server Administrators as members. Click Cancel.
Task 6: Modify the Member Server Security Settings GPO to remove Users from
Allow log on locally
1. Switch to LON-DC1.
2. On LON-DC1, in the GPMC, expand Forest: Adatum.com, expand Domains, expand Adatum.com,
and then click Group Policy Objects.
3. In the right pane, right-click Member Server Security Settings, and then click Edit.
4. In the Group Policy Management Editor window, under Computer Configuration, expand Policies,
expand Windows Settings, expand Security Settings, expand Local Policies, and then click User
Rights Assignment.
5. In the right pane, right-click Allow log on locally, and then click Properties.
6. In the Allow log on locally Properties dialog box, select the Define these policy settings check
box, and then click Add User or Group.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L12-63
7. In the Add User or Group window, type Domain Admins, and then click OK.
9. In the Add User or Group window, type Administrators, and then click OK twice.
Task 7: Modify the Member Server Security Settings GPO to enable User Account
Control: Admin Approval Mode for the Built-in Administrator account
1. On LON-DC1, in the Group Policy Management Editor window, under Computer Configuration,
expand Policies, expand Windows Settings, expand Security Settings, expand Local Policies, and
then click Security Options.
2. In the right pane, right-click User Account Control: Admin Approval Mode for the Built-in
Administrator account, and then click Properties.
3. In the User Account Control: Admin Approval Mode for the Built-in Administrator account
Properties dialog box, select the Define this policy settings check box, ensure that Enabled radio
button is selected, and then click OK.
3. At the Windows PowerShell prompt, type following command, and then press Enter:
Gpupdate /force
6. Verify that you cannot sign in to LON-SVR1, and that a logon error message displays.
7. To prepare for the next exercise, sign out from LON-SVR1, and log back on to LON-SVR1 as
Adatum\Administrator with a password of Pa$$w0rd.
Results: After completing this exercise, you should have used Group Policy to secure Member servers.
4. In the right pane, right-click Member Server Security Settings, and then click Edit.
5. In the Group Policy Management Editor window, under Computer Configuration, expand Policies,
expand Windows Settings, expand Security Settings, expand Local Policies, click Audit Policy, and
then in the right pane, right-click Audit object access, and then click Properties.
MCT USE ONLY. STUDENT USE PROHIBITED
L12-64 Securing Windows Servers Using Group Policy Objects
6. In the Audit object access Properties dialog box, select the Define these policy settings check
box, select both the Success and Failure check boxes, and then click OK.
5. In the Computer window, double-click Local Disk (C), click Home, click New folder, and then type
Marketing.
6. In the Computer window, right-click the Marketing folder, click Share with, and then click Specific
people.
7. In the File Sharing window, type Adam, and then click Add.
8. Change the Permission Level to Read/Write, click Share, and then click Done.
3. In the Advanced Security Settings for Marketing window, click the Auditing tab, click Continue, and
then click Add.
7. In the Auditing Entry for Marketing window, under the Permission list, select the Write check box,
and then click OK three times.
8. On the taskbar, click the Windows PowerShell icon.
9. At the Windows PowerShell prompt, type following command, and then press Enter:
gpupdate /force
3. Point to the lower-right corner of the screen, click the Search charm, and then in the Search box,
type cmd.
4. Open a Command Prompt window, and at the command prompt, type the following command, and
then press Enter:
gpupdate /force
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L12-65
6. Sign out from LON-CL1, and then sign in again as Adatum\Adam with a password of Pa$$w0rd.
7. Point to the lower-right corner of the screen, click the Search charm, in the Search box, type
\\LON-SVR1\Marketing, and then press Enter.
8. In the Marketing window, click Home, click New item, click Text Document, in the file name field,
type Employees, and then press Enter.
Task 5: View the results in the security log on the domain controller
1. Switch to LON-SVR1.
2. In the Server Manager window, click Tools, and then click Event Viewer.
3. In the Event Viewer window, expand Windows Logs, and then click Security.
Results: After completing this exercise, you should have enabled file system access auditing.
4. In the Server Manager window, click on Tools, and then click on Group Policy Management.
5. On LON-DC1, in the GPMC, expand Forest: Adatum.com, expand Domains, expand Adatum.com,
and then click Group Policy Objects.
6. In the right pane, right-click Default Domain Policy, and then click Edit.
7. In the Group Policy Management Editor window, under Computer Configuration, expand Policies,
expand Windows Settings, expand Security Settings, expand Local Policies, and then click Audit
Policy. In the right pane, right-click Audit account logon events, and then click Properties.
8. In the Audit account logon events Properties dialog box, select the Define these policy settings
check box, select both the Success and Failure check boxes, and then click OK.
9. Point to the lower-right corner of the screen, and then click the Search charm.
10. In the Search box, type cmd, and then press Enter.
MCT USE ONLY. STUDENT USE PROHIBITED
L12-66 Securing Windows Servers Using Group Policy Objects
11. At the command prompt, type the following command, and then press Enter:
gpupdate /force
5. At the command prompt, type the following command, and then press Enter:
gpupdate /force
6. Close the Command Prompt window, and sign out from LON-CL1.
Note: This password is intentionally incorrect to generate a security log entry that shows
that that an unsuccessful login attempt has been made.
2. In the Event Viewer window, expand Windows Logs, and then click Security.
3. Review the event logs for following message: “Event ID 4771 Kerberos pre-authentication failed.
Account Information: Security ID: ADATUM\Adam.”
Note: This password is correct, and you should be able to sign in successfully as Adam.
2. In the Server Manager window, click Tools, and then click Event Viewer.
3. In the Event Viewer window, expand Windows Logs, and then click Security.
4. Review the event logs for the following message: “Event ID 4624 An account was successfully
logged on. New Logon: Security ID: ADATUM\Adam.”
Results: After completing this exercise, you should have enabled domain logon auditing.
2. In Server Manager, click Tools, and then click Active Directory Users and Computers.
3. In the Active Directory® Users and Computers console, in the navigation pane, right-click
Adatum.com, click New, and then click Organizational Unit.
4. In the New Object - Organizational Unit window, type Client Computers OU, and then click OK.
3. In the Move window, click Client Computers OU, and then click OK.
Task 3: Create a Software Control GPO and link it to the Client Computers OU
1. On LON-DC1, in Server Manager, click Tools, and then click Group Policy Management.
2. In the GPMC, expand Forests: Adatum.com, expand Domains, expand Adatum.com, right-click
Group Policy Objects, and then click New.
3. In New GPO window, in the Name text box, type Software Control GPO, and then click OK.
4. In the right pane, right-click Software Control GPO, and then click Edit.
5. In the Group Policy Management Editor window, under Computer Configuration, expand Policies,
expand Windows Settings, expand Security Settings, expand Application Control Policies, and
then expand AppLocker.
6. Under AppLocker, right-click Executable Rules, and then click Create Default Rules.
7. Repeat the previous step for Windows Installer Rules, Script Rules, and Packaged app Rules.
8. In the navigation pane, click AppLocker, and then in the right pane, click Configure rule
enforcement.
9. In the AppLocker Properties dialog box, under Executable rules, select the Configured check box,
and then from the drop-down menu, select Audit only.
10. Repeat the previous step for Windows Installer Rules, Script Rules, and Packaged app Rules, and
then click OK.
11. In the Group Policy Management Editor, expand Computer Configuration, expand Policies, expand
Windows Settings, expand Security Settings, click System Services, and then double-click
Application Identity.
12. In the Application Identity Properties dialog box, click Define this policy setting, under Select
service startup mode, click Automatic, and then click OK.
14. In the GPMC, right-click Client Computers OU, and then click Link an Existing GPO.
15. In the Select GPO window, in Group Policy Objects list, click Software Control GPO, and then
click OK.
2. Point to the lower-right corner of the screen, and then click the Search charm.
4. In Command Prompt window, type following command, and then press Enter:
gpupdate /force
6. Point to the lower right corner of the screen, click the Settings charm, click Power, and then click
Restart.
2. Point to the lower-right corner of the screen, and then click the Search charm.
3. In the Search box, type cmd, and then press Enter.
4. At the command prompt, type following command, and then press Enter:
gpresult /R
Review the result of the command and ensure that Software Control GPO is displayed under
Computer Settings, Applied Group Policy Objects. If Software Control GPO is not displayed, restart
LON-CL1 and repeat steps from 1 to 4.
5. Point to the lower-right corner of the screen, and then click the Search charm.
C:\CustomApp\app1.bat
3. Click MSI and Scripts and review event log 8005 that contains the following text:
%OSDRIVE%\CUSTOMAPP\APP1.BAT was allowed to run.
Note: If no events display, ensure that the Application Identity service has started, and try
again.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L12-69
Task 7: Create a rule that allows software to run from a specific location
1. On LON-DC1, in Server Manager, click Tools, and then click Group Policy Management.
2. In the Group Policy Management window, expand the Group Policy Objects node, right-click
Software Control GPO, and click Edit.
3. Browse to the following setting location: Computer Configuration/Policies/Windows Settings
/Security Settings/Application Control Policies/AppLocker.
7. On the Conditions page, select the Path radio button, and then click Next.
8. On Path page, in the Path field, type the path %OSDRIVE%\CustomApp\app1.bat, and then click
Next.
10. On the Name and Description page, in the Name field, type Custom App Rule, and then click
Create.
3. Repeat the previous step for Windows Installer Rules, Script Rules, and Packaged app Rules, and
then click OK.
4. In the Command Prompt window, type the following command, and then press Enter:
gpupdate /force
6. Point to the lower-right corner of the screen, click the Settings charm, click Power, and then click
Restart.
7. Sign in to LON-CL1 as Adatum\Tony with a password of Pa$$w0rd.
8. Point to the lower-right corner of the screen, and then click the Search charm.
10. In the Command Prompt window, type following command, and then press Enter:
C:\customapp\app1.bat
MCT USE ONLY. STUDENT USE PROHIBITED
L12-70 Securing Windows Servers Using Group Policy Objects
3. In the Computer window, double-click Local Disk (C:), double-click the CustomApp folder, right-
click app1.bat, and then click Copy.
4. In the CustomApp window, on the navigation pane, right-click the Documents folder, and then click
Paste.
Results: After completing this exercise, you should have configured AppLocker policies for all users
whose computer accounts are located in the Client Computers OU organizational unit. The policies you
configured should allow these users to run applications that are located in the folders C:\Windows and
C:\Program Files, and run the custom-developed application app1.bat in the C:\CustomApp folder.
3. In the Active Directory Users and Computers console, in the navigation pane, right-click the Member
Servers OU, click New, and then click Group.
4. In the New Object – Group window, in the Group Name field, type Application Servers, and then
click OK.
3. In Select Users, Computers, Service Accounts or Groups, click Object Types, click Computers, and
then click OK.
4. In the Enter the object names to select box, type LON-SVR1, and then click OK.
3. In the New GPO window, in the Name field, type Application Servers GPO, and then click OK.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L12-71
4. In the GPMC, right-click Application Servers GPO, and then click Edit.
5. In the Group Policy Management Editor, under Computer Configuration, expand Policies, expand
Windows Settings, expand Security Settings, expand Windows Firewall with Advanced Security,
and then click Windows Firewall with Advanced Security - LDAP://CN={GUID}.
6. In the Group Policy Management Editor, click Inbound Rules.
8. In the New Inbound Rule Wizard, on the Rule Type page, click Custom, and then click Next.
9. On the Program page, click Next.
10. On the Protocol and Ports page, in the Protocol type list, click TCP.
11. In the Local port list, click Specific Ports, in the text box, type 8080, and then click Next.
13. On the Action page, click Allow the connection, and then click Next.
14. On the Profile page, clear both the Private and Public check boxes, and then click Next.
15. On the Name page, in the Name box, type Application Server Department Firewall Rule, and then
click Finish.
2. In the Select GPO window, in Group Policy objects list, click Application Servers GPO, and then
click OK.
Task 5: Use security filtering to limit the Application Server GPO to members of
Application Server group
1. On LON-DC1, in the GPMC, click Member Servers OU.
2. Expand the Member Servers OU, and then click the Application Servers GPO link.
3. In the Group Policy Management Console message box, click OK.
4. In the right-hand pane, under Security Filtering, click Authenticated Users, and then click Remove.
7. In the Select User, Computer, or Group dialog box, type Application Servers, and then click OK.
2. Point to the lower-right corner of the screen, and then click the Search charm.
3. In the Search box, type cmd, and then press Enter.
4. In the Command Prompt window, type following command, and then press Enter:
gpupdate /force
MCT USE ONLY. STUDENT USE PROHIBITED
L12-72 Securing Windows Servers Using Group Policy Objects
6. Restart LON-SVR1, and then log back on as Adatum\Administrator with the password of
Pa$$w0rd.
2. In Server Manager, click Tools, and then click Windows Firewall with Advanced Security.
3. In the Windows Firewall with Advanced Security window, click Inbound rules.
4. In the right pane, verify that the Application Server Department Firewall Rule that you created
earlier using Group Policy is configured.
5. Verify that you cannot edit the Application Server Department Firewall Rule, because it is
configured through Group Policy.
Results: After completing this exercise, you should have used Group Policy to configure Windows Firewall
with Advanced Security to create rules for application servers.
2. In the Virtual Machines list, right-click 20410B-LON-DC1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.
2. In the Properties pane, click the IPv4 address assigned by DHCP, IPv6 enabled link.
3. In the Network Connections dialog box, right-click the network object, and then click Properties.
4. In the Properties dialog box, click Internet Protocol Version 4 (TCP/IPv4), and then click
Properties.
5. In the Properties dialog box, on the General tab, click Use the following IP address, and then
configure the following:
o IP Address: 172.16.0.31
11. In the Add Roles and Features Wizard, on the Before you begin page, click Next.
12. On the Select installation type page, click Role-based or feature-based installation, and then
click Next.
13. On the Select destination server page, ensure that LON-HOST1 is selected, and then click Next.
19. On the Virtual Switches page, verify that no selections have been made, and then click Next.
20. On the Virtual Machine Migration page, click Next.
21. On the Default Stores page, review the location of the Default Stores, and then click Next.
22. On the Confirm installation selections page, click Restart the destination server automatically if
required.
MCT USE ONLY. STUDENT USE PROHIBITED
L13-74 Implementing Server Virtualization with Hyper-V
23. In the Add Roles and Features Wizard, review the message regarding automatic restarts, and then
click Yes.
2. When the installation of the Hyper-V tools completes, click Close to close the Add Roles and
Features Wizard.
4. In the Server Manager console, click the Tools menu, and then click Hyper-V Manager.
6. In the Hyper-V Manager console, in the Actions pane, with LON-HOST1 selected, click Hyper-V
Settings.
7. In the Hyper-V Settings for LON-HOST1 dialog box, click the Keyboard item. Verify that the
Keyboard is set to the Use on the virtual machine option.
8. In the Hyper-V Settings for LON-HOST1 dialog box, click the Virtual Hard Disks item. Verify that
the location of the default folder to store Virtual Hard Disk files is C:\Users\Public\Documents
\Hyper-V\Virtual Hard Disks, and then click OK.
Results: After completing this exercise, you will have installed the Hyper-V role onto a physical server.
3. In the Virtual Switch Manager for LON-HOST1 dialog box, click New virtual network switch.
Ensure that External is selected, and then click Create Virtual Switch.
4. In the Virtual Switch Properties area, enter the following information, and then click OK:
o External Network: Mapped to the host computer's physical network adapter. (This varies
depending on the host computer.)
5. In the Apply Networking Changes dialog box, review the warning, and then click Yes.
4. Under Create virtual switch, click Private, and then click Create Virtual Switch.
5. In the Virtual Switch Manager dialog box, in the Virtual Switch Properties section, configure the
following settings, and then click OK:
o Name: Private Network
4. Under Create virtual switch, click Internal and then click Create Virtual Switch.
5. In the Virtual Switch Manager dialog box, in the Virtual Switch Properties section, configure the
following settings, and then click OK:
4. On MAC Address Range settings, configure the following values, and then click OK:
o Minimum: 00-15-5D-0F-AB-A0
o Maximum: 00-15-5D-0F-AB-EF
Results: After completing this exercise, you will have configured virtual switch options on a physically
deployed Windows Server 2012 server running the Hyper-V role.
Note: The drive letter may depend upon the number of drives on the physical host
machine.
3. In the Base folder, verify that the Base12A-WS12-TMP.vhd hard disk image file is present.
MCT USE ONLY. STUDENT USE PROHIBITED
L13-76 Implementing Server Virtualization with Hyper-V
4. Click the Home tab, and then click the New Folder icon twice to create two new folders. Right-click
each folder and rename the folders to the following names:
o LON-GUEST1
o LON-GUEST2
6. In the Server Manager console, click Tools, and then click Hyper-V Manager.
7. In the Hyper-V Manager console, in the Actions pane, click New, and then click Hard Disk.
8. In the New Virtual Hard Disk Wizard, on the Before You Begin page, click Next.
9. On the Choose Disk Format page, click VHD, and then click Next.
10. On the Choose Disk Type page, click Differencing, and then click Next.
11. On the Specify Name and Location page, specify the following details, and then click Next:
o Name: LON-GUEST1.vhd
12. On the Configure Disk page, type the location: E:\Program Files\Microsoft Learning\Base
\Base12A-WS12-TMP.vhd, and then click Finish.
13. On the desktop, on the taskbar, click the Windows PowerShell® icon.
14. At the Windows PowerShell prompt, type the following command to import the Hyper-V module,
and then press Enter:
Import-Module Hyper-V
15. At the Windows PowerShell prompt, type the following command to create a new differencing VHD
to be used with LON-GUEST2, and then press Enter:
18. In the Open dialog box, browse to E:\Program Files\Microsoft Learning\Base\LON-GUEST2\, click
LON-GUEST2.vhd, and then click Open.
19. In the Virtual Hard Disk Properties dialog box, verify that LON-GUEST2.vhd is configured as a
differencing VHD with E:\Program Files\Microsoft Learning\Base\Base12A-WS12TMP.vhd as a
parent, and then click Close.
2. In the Hyper-V Manager console, in the Actions pane, click New, and then click Virtual Machine.
3. In the New Virtual Machine Wizard, on the Before You Begin page, click Next.
4. On the Specify Name and Location page, click Store the virtual machine in a different location,
enter the following values, and then click Next:
o Name: LON-GUEST1
5. On the Assign Memory page, enter a value of 1024 MB, select the Use Dynamic Memory for this
virtual machine option, and then click Next.
6. On the Configure Networking page, for the connection, click Private Network, and then click
Next.
7. On the Connect Virtual Hard Disk page, click Use an existing virtual hard disk. Click Browse,
browse to E:\Program Files\Microsoft Learning\Base\LON-GUEST1\lon-guest1.vhd, click Open,
and then click Finish.
9. At the Windows PowerShell prompt, type the following command and press Enter to import the
Hyper-V module:
Import-Module Hyper-V
10. At the Windows PowerShell prompt, type the following command to create a new virtual machine
named LON-GUEST2:
14. In the Settings for LON-GUEST2 on LON-HOST1 dialog box, click Automatic Start Action, and set
the Automatic Start Action to Nothing.
15. In the Settings for LON-GUEST2 on LON-HOST1 dialog box, click Automatic Stop Action, and set
the Automatic Stop Action to Shut down the guest operating system.
16. Click OK to close the Settings for LON-GUEST2 on LON-HOST1 dialog box.
2. At the Windows PowerShell prompt, enter the following command to import the Hyper-V module
and press Enter:
Import-Module Hyper-V
3. At the Windows PowerShell prompt, enter the following commands to enable resource metering on
the virtual machines, pressing Enter at the end of each line:
Enable-VMResourceMetering LON-GUEST1
Enable-VMResourceMetering LON-GUEST2
Results: After completing this exercise, you will have deployed two separate virtual machines using a
sysprepped VHD file as a parent disk for two differencing VHDs.
MCT USE ONLY. STUDENT USE PROHIBITED
L13-78 Implementing Server Virtualization with Hyper-V
4. In the LON-GUEST1 on LON-HOST1 - Virtual Machine Connection window, perform the following
steps:
o On the Settings page, select the I accept the license terms for using Windows check box, and
then click Accept.
o On the Settings page, click Next to accept the Region and Language settings.
o On the Settings page, type the password Pa$$w0rd twice, and then click Finish.
5. In the LON-GUEST1 on LON-HOST1 - Virtual Machine Connection window, from the Action menu,
click Ctrl+Alt+Delete.
6. Sign in to the virtual machine using the account Administrator and the password Pa$$w0rd.
7. On the virtual machine, in the Server Manager console, click Local Server, and then click the
randomly assigned name next to the computer name.
8. In the System Properties dialog box, on the Computer Name tab, click Change.
9. In the Computer Name field, type LON-GUEST1, and then click OK.
10. In the Computer Name/Domain Changes dialog box, click OK.
11. Click Close to close the System Properties dialog box.
2. In the Server Manager console, click the Local Server node, and verify that the name of the computer
is set to LON-GUEST1.
3. In the Virtual Machine Connection window, from the Action menu, click Snapshot.
4. In the Snapshot Name dialog box, type the name Before Change, and then click Yes.
2. In the System Properties dialog box, on the Computer Name tab, click Change.
3. In the Computer Name field, type LON-Computer1, and then click OK.
4. In the Computer Name/Domain Changes dialog box, click OK.
7. Sign back in to the LON-GUEST1 virtual machine using the Administrator account and the password
Pa$$w0rd.
8. In the Server Manager console, click Local Server, and verify that the server name is set to
LON-Computer1.
2. At the Windows PowerShell prompt, enter the following command and Press Enter to import the
Hyper-V module:
Import-Module Hyper-V
3. At the Windows PowerShell prompt, enter the following command and press Enter to retrieve
resource metering information:
Measure-VM LON-GUEST1
4. Note the average CPU, average random access memory (RAM), and total disk usage figures.
2. In the Windows PowerShell window, enter the following command, and then press enter:
Shutdown /r /t 5
3. From the Windows Boot Manager, click Windows Server 2008 R2.
Results: After completing this exercise, you will have used virtual machine snapshots to recover from a
virtual machine misconfiguration.
MCT USE ONLY. STUDENT USE PROHIBITED