0% found this document useful (0 votes)
215 views

Script For MCSA 70-642

The document discusses IP addressing and name resolution in networking. It covers IP addressing types like APIPA, global unicast addresses, link-local addresses, and unique local addresses. It also discusses name resolution methods like DNS, NetBIOS, and LLMNR. Additionally, it covers configuring DNS servers and zones, including primary, secondary, and stub zones. DNS components like resource records, caching, and dynamic updates are also summarized.

Uploaded by

noman19
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
215 views

Script For MCSA 70-642

The document discusses IP addressing and name resolution in networking. It covers IP addressing types like APIPA, global unicast addresses, link-local addresses, and unique local addresses. It also discusses name resolution methods like DNS, NetBIOS, and LLMNR. Additionally, it covers configuring DNS servers and zones, including primary, secondary, and stub zones. DNS components like resource records, caching, and dynamic updates are also summarized.

Uploaded by

noman19
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Chapter 1 – Understanding And Configuring IP

APIPA – 169.254.0.0 /16


Unicast - always /64 (64bit network, 64bit host)
Global address – 2000::/3 (corresponds to public address in Ipv4)
Link – local address – fe80 (corresponds to APIPA) “%3“ zone ID – distinguishes multiple network
adapters connected to different network segment
Unique local address – fd00::/8 or fc00::/8 (corresponds to private Ipv4 addresses – routable locally)
Loopback address - ::1
ISATAP tunneling protocol – ISATAP router as an address translator from Ipv4 to Ipv6 and vice versa
6to4 – host--> 6to4 router--> 6to4 relay --> Ipv6 host (Ipv4 embedded in Ipv6)
Toredo – for clients behind an Ipv4 NAT (used as a last resort) client, server, relay, host specific relay

Chapter 2 – Configuring Name Resolution


Types – DNS (requires network-wide configuration for both servers and clients) , NetBIOS (used in
workgroups), Link Local Multicas Name Resolution (LLMNR – used in workgroups)
LLMNR – Network Discovery must be enabled(only for Vista and Win Server 2008),uses multicast Ipv6
for the local subnet,it's preferable to NetBIOS,doesn't work for Ipv4 by default,small service no config
NetBIOS – for older Windows,by default for Ipv4,low security,for smaller netoworks, three methods:
NetBIOS broadcasts – local network query for the owner to respond with it's Ipv4 address
WINS –directory of computer names and their associated IP addresses,works beyond the local subnet
Lmhosts file – static local database stored in %SystemRoot%\System32\Drivers\Etc, must be
manually created, used as a last resort, contains a NetBIOS name and a corresponding IP address
NetBIOS node types – broadcast (b-node),point-to-point (p-node), mixed (m-node), hybrid (h-node)
Broadcast – uses broadcast, only locally significant because routers don't forward broadcasts
Point-to-point - direct communication with WINS server to resolve names, doesn't use broadcast
Mixed – uses broadcast first and then WINS queries if broadcast is not successful
Hybrid – uses WINS queries frist and then broadcast if the WINS server doesn't respond
Current node status can be viewed from the command prompt using the ipconfig /all command.
DNS – enables location of computers and other resources by name, for large networks
DNS namespace– unique root which can have any number of subdomains with their own subdomains
DNS names – a node is identified by the FQDN, organization ICANN assigns globally unique identifiers
Types of domains – organizational (.org, .com, .edu, .net), geographical (.it – Italy), reverse – special
Private Domain Namespace – DNS namespace based on a private set of root servers independent of
the Internet's DNS namespace, you can create your own root server or servers and any subdomain,
they can not be resolved on the internet
DNS Components – server, zones, resolvers, resource records
DNS Server - a computer that runs a server program, it resolves name resolution queries by clients
DNS Zones – a zone is a contiguous portion of a namespace for which a server is authoritative, a
server can be authoritative for one or more zones. Zone data is stored in text files or in Active
Directory.
DNS Resolvers – a service that uses the DNS protocol to query information from DNS servers
Resource Records – DNS database entries that are used to answer DNS client queries. Types of
records are: Ipv4 host address (A), Ipv6 host address (AAAA), alias (CNAME), pointer (PTR), mail
exchanger (MX), service location (SRV)
CNAME – allows you to use more than one name to point to a single host
MX – to locate a mail server within a zone – multiple MX records for fault tolerance
SRV – used to locate specific services in a domain (created automatically, but for fault tolerance –
manually)
DNS recursion – the process of a DNS server querying other DNS servers on behalf of the original
qunerying client
Iteration – a proces where a DNS client makes repeated queries to different DNS servers
Root Hints – used for DNS recursion, they contain information where to begin searching for names in
the DNS domain namespace, a list of preliminary resource records, they are by default preconfigured
in Windows Server 2008 and stored in WINDOWS\System32\Dns folder (Cache.dns)
DNS Caching – a way to improve performance of DNS by reducing DNS query traffic on the network
DNS Client Cache – whenever a DNS client service starts a Hosts file is created with name-to-IP
mappings located in WINDOWS\System32\Drivers\Etc
DNS Server Cache – temporary resource records cache, info from the process of answering queries
for DNS clients, this cache is cleared whenever the DNS service server stops but you can also do it
manually with Dnscmd /clearcache at command prompt
Cache has Time To Live Values (TTL) which applies to all cached resource records (client or server)
which is by default 1 hour and can be manipulated.
Deploying a DNS Server – on a domain controller, on a stand alone or member server, on server core
Deploying a DNS Server on a Domain Controller – Active Directory Doain Services (AD DS) is tightly
integrated with DNS, DNS is required for locating resources like domain controllers
When deploying a DNS server within an AD domain it's tipically on a domain controller which
requires very little or no configuration. To promote the server to a domain controller for a new or
existing domain run a program Dcpromo.exe.
Deploying a DNS Server on a Stand-alone or Member Server – Your name resolution infrastrukture
might require such DNS installation. This is done without the use od Dcpromo.
To install a DNS server use the Add Roles Wizzard in Server Manager. You are required to configure
the server manually, mainly the forward lookup zones.
Deploying a DNS Server on a Server Core Installation of Windows Server 2008 – you can do it by using
Dcpromo with AD DS. Type dcpromo /unattend:<unattendfile> where unattendfile is the name of a
Dcpromo.exe answer file. You can create that file on any other computer running Windows Server
2008.
To install on a stand-alone or member server type start /w ocsetup DNS-Server-Core-Role, to
remove the role type start /w ocsetup DNS-Server-Core /uninstall
To manage the core server you have to connect to the DNS manager on another computer running a
full server installation.
Configuring a Caching-only DNS Server – obtained over time, check cache first for already stored
answer, faster response time,server cache remains alive until TTL is exceeded or DNS server restarted
Caching-only servers do not host any zones and are not authoritative.
Configuring Server Properties – configure settings that apply to the DNS server and it's hosted zones
Interfaces Tab – allows you to specify which of the local computer's IP addresses the DNS server
should listen to for DNS requests, if your server has multiple network adapters
Riit Hints Tab – contains a copy of information found in WINDOWS\System32\Dns\Cache.dns file, for
internet names this file can stay the same but for a private network Cache.dns should be deleted
Forwarders Tab – allows you to configure the local DNS server to forward DNS queries it recieves to
upstream DNS servers, called forwarders. With this tab you can specify the IP address of upstream
DNS servers to which queries should be directed to if the local DNS fails.
DNS server configured for forwarding uses forwards only after it has determined that it cannot
resolve a query using its authoritative data or cached data.
When To Use Forwarders – when you don't want DNS servers communicating directly with external
servers, or to allow DNS clients and servers inside a firewall to resolver external names securely
When to Use Conditional Forwarding – queries for specific domains are forwarded to specific DNS
servers, use it when two separate networks merge
Conditional forwarding reduces zone transfer traffic, provides zone data that is always up to date and
allows for simple configuration and maintainance. To configure it, you use conditional forwarders
container in tge DNS Manager.
Configuring DNS Client Settings
006 DNS Server option for DNS Server list
015 DNS Domain option for connection-specific DNS suffix (useful if you have 2 network adapters)
Host record – returns the address of a computer when you query using it's name
Pointer record – found in the reverse lookup zones, does opposite of the host records, it returns the
name of the computer when you query using its IP address
Ipconfig /registerdns – to force a DNS client to attempt dynamic registration of its resource records
Ipconfig /renew – to force an update
Viewing and Clearing the DNS Client Cache – ipconfig /displaydns to view, ipconfig /flushdns to clear

Chapter 3 – Configuring a DNS Zone Infrastructure


A DNS zone is created automatically when you install a DNS server with a domain controller.
Howeveryou have to configure zones manually if you're doing a different kind of installation.
Zone types – Primary (option to store in AD), Secundary, Stub (option to store in AD)
Primary zones – master copy of a zone is stored in a local file (standard zone) or in AD Domain
Services. If stored in a local file it's named zone_name.dns and located in the %Systemroot
%\System32\Dns folder.
Secondary zones - read only copy of a primary zone or another secundary zone, to offload DNS query
traffic, when the primary DNS server is unavailable, it cannot be stored in AD DS
Stub zones – similar to secondary zones but it contains only those resource records necessary to
identify the authoritative DNS servers for the master zone – to improve namre resolution and
simplify DNS administration
Creating a Forward or Reverse Lookup Zone
In forward lookup zones, DNS servers map FQDNs to IP addresses while in reverse lookup zones, DNS
servers map IP addresses to FQDNs.
Configuring Dynamic Update Settings
Secure updates – only from AD domain member computers and from the same computer that
originally performed the registration
Nonsecure updates – allow updates from any computer
Start of Authority (SOA) records refresh interval is by default 15min. Increasing the refresh interval
decreases zone transfer traffic.
Retry interval – normally less than the refresh interval, default is 10min
Expires After – the interval in which the secondary server will continue to respod to queries without
contact to it's master server, default values is one day
Minimum TTL – the time to live for all resource records in the zone, default values is one hour
TTL for this record – overrides the default value and let's you configure the TTL of the present SOA
resource record
Enabling DNS to use WINS resolution – a special WINS service record pointing to that WINS server is
added to the zone. You can also specify WINS in a reverse lookup zone which created a WINS-R
resource record in the zone.
Aging and Scavenging – process of using timestamps to track the age of dynamically registered
resource records.
Scavenging – deleting outdated resource records. It can occure only when aging is enabled. To enable
aging for a particular zone, you have to enable it on both the server lever and zone level.
Timestamping – manually created resource record recieve a time stamp of „0“ and they will not be
aged. AD integrated zones by default enable timestamping for dynamically registered records.
For Scavenging the no refresh interval is 7 days and the refresh interval is also 7 days which means
the records can be scavenged after 14 days by default.
Storing DNS Data in the Domain Partition – replication to all domain controllers in general in the local
domain which creates unnecessary replication trafic but must be used if DNS data is to be replicated
to computers running Windows server 2000
Choosing Zone Replication Scope – the partition in which a zone is stored determines the replication
scope
Using Dcpromo, the zone is automatically stored in DomainDnsZones partition but using the new
zone wizzard you have 4 options:
To All DNS Servers in This Forest – stores the new zone in the ForestDnsZones partition
To All DNS Servers in This Domain – stores the new zone in the DomainDnsZones partition
To All Domain Controllers in This Domain – stores the zone in the domain partition
To All Domain Controllers Specified in The Scope of This Directory Partition – stores the zone in the
user-created application directory partition specified in the drop-down list box, you must manually
enlist that domain controller in the partition
Creating Custom Application Directory Partitions
Dnscmd servername /createdirectorypartition FQDN – to create the partition
Dnscmd servername /enlistdirectorypartition FQDN – to enlist other DNS servers in the partition
For a local server name use a dot „.“.
Zone Transfer initiation – three events
1. When the refresh interval of the primary zone's SOA resorce record expires
2. When a server hosting a secondary zone boots up
3. When a change occurs in the cofiguration of the primary zone and it's set to notify a
secondary zone of zone updates
Enabling Zone Transfers – to any server (least secure), only to servers listed on the name servers tab
(restricts zone transfers to secondary DNS servers that have an NS record and are authoritative) ,
only to the following servers (a list of secondary servers)
Manually Updating a Secondary Zone – reload (reloads the secondary zone from local storage),
transfer from master (check the serial number), reload from master (regardles of the serial number)
Implementing Stub Zones – Stub zone is a copy of a zone that contains only the most basic records in
the master zone. It's purpose is to enable the local DND server to forward queries to the
authoritative name server. Zone delegaton.
You can use stub zones to keep delegated zone information current (keep an updated list of name
servers current) and to improve name resolution across domains.

Chapter 4 – Creating a DHCP infrastrukture


The DHCP address assignment process – broadcast DHCP discover, respond with DHCP offer, respond
with DHCP request, confirm with DHCP ack
By default, lease time is 6 or 8 days. After half the remaining lease period the client attempts to
renew it's IP address and after 87.5% of lease time if the DHCP is still not awailable, DHCP client
attempts to locate a new DHCP server.
Ipconfig /release – assigned IP address becomes awailable again
DHCP server should directly be connected to each subnet it provides addresses for, unless a DHCP
Relay Agent is being used.
DHCP Options - 003 Router – list of Ipv4 addresses for router on the same subnet as DHCP clients
006 DNS Servers – IP address for DNS name servers that DHCP clients can contact and resolve a query
015 DNS Domain Name – domain name that DHCP clients use when resolving unqualified names –
allows clients to perform dynamic DNS updates
044 WINS/NBNS Servers – Ipv4 address of primary and secondary WINS server for DHCP clients
046 WINS/NBT Node Type – preferred NetBIOS name resolution method for DHCP clients (b&h node)
051 Lease – assigns a special lease duration only to remote access clients
Before a DHCP server can lease addresses you first need to authorize it and activate the DHCP scope.
Reservation binds an IP address to the MAC address of a host.
Additional DHCP optons – server level, scope level, reservation leve (inheritance in that order)
Ipconfig /setclassid “local area connection“ SampleID – configure a connection with the class ID
Installing and Configuring DHCP on a Server Core Installation
Start /w ocsetup DHCPServerCore – install the DHCP server role
Net start dhcpdiscover – start the DHCP Server service
Sc confic dhcpserver start= auto – start the DHCP service automatically
Netsh interface ipv4 set address “local area connection“ dhcp – DHCP client for Ipv4
Netsh interface ipv4 set dnsserver “local area connection“ dhcp – obtain a DNS server address

Chapter 5 – Configuring IP Routing


Examining Network Routes – TraceRT (quicker response), PathPing (detailed and reliable analysis)
Route print – view the routing table output
224.0.0.0 – multicast address
Route –p add 10.2.2.0 MASK 255.255.255.0 192.168.1.2 – add a permanent route
If route is not persistent, it will be deleted next time the computer is restarted.
Route add – to configure a static route

Chapter 6 – Protecting Network Traffic with IPSec


You can manage IPSec through Local Security Policy, Group Policy, or command-line tools.
IPSec provides data authentication (origin authentication, data integrity, anti-replay protection) and
encryption.Every IPSec policy is composed of one or more IPSec Policy rules that determine when
and how IP traffic should be protected. Every policy rule is associated with one IP filter list and one
filter action.
Possible filter actions are: block, permit, or negotiate security.
You configure connection security rules in Windows Firewall with Advanced Security (WFAS) or in
WFAS node in Server Manager. For multiple clients on the network you can use Group Policy.
Security Associations
Security for SA is provided by the two IPSec protocols: Authentication Header (AH) and Encapsulating
Security Payload (ESP). You can use either one or both. If you need encryption use ESP, if not...
AH – provides data origin authentication, data integrity,anti-replay protection for the entire IP packet
ESP – provides data encryption, data origin authentication, data integrity, anti-replay protection for
the ESP payload
How IPSec Connections Are Established – via the Internet Key Protocol (IKE) – two-phase negotiation
Phase 1 – main mode, Phase 2 – quick mode
Using IPSec in Tunnel Mode – by default IPSec operates in transport mode but you can also use
tunnel mode
With tunnel mode, the entire IP packet is protected and then encapsulated with an additional,
unprotected IP header.
Authentication methods for IPSec – Kerberos (Active Directory), Certificates, Preshared Key
Kerberos (AD) – the default authentication method in AD, IPSec within a single AD forest
Certificates – used in a production environment where Kerberos is unavailable, each host must
obtain and install a computer certificate
Preshared Key – password shared by peers used to encrypt and decrypt data, they are stored in plain
text on each computer or in AD which reduces security, it's recommended for usage only in
nonproduction environments such as test networks
Assigning a Predefined IPSec Policy – Client(respond only – it will never iniciate an IPSec
communication but it will respod to it), Server(request security – encryption is preffered but not
required), Secure Server (require security – for secure communications)

Chapter 7 – Connecting to Networks


Internet Connection Sharing – for home and small offices
Routing And Remote Access Services – for organizations with a routed intranet
Troubleshooting NAT – by default RRAS NAT component logs NAT errors to the System event log,
viewable in Server Manager at Diagnostics\Event Viewer\Windows Logs\System
Wireless Network Standards
802.11b – 11Mbps (3-4Mbps realistic), can connect to almost any network (backward compatable)
802.11g – 54Mbps (10-15Mbps realistic), works in two modes (mixed or 802.11g only)
802.11n – 250Mbps (much smaller realistic bw), backward-compatable to all, including 802.11a
802.11a – 5.4GHz range instead of 2.4GHz
Wireless Security Standards – no security, WEP (64 or 128bit, easily hackable), WPA (significantly
stronger than WEP), WPA-PSK (pre-shared static key, known as WPA-personal, for home usage),
WPA-EAP (known as WPA -enterprise, passes authentication to a RADIUS server), WPA2 (updated
version of WPA, offers WPA2-PSK and WPA2-EAP)
Order by strength(best to worst): WPA2-EAP, WPA-EAP, WPA2-PSK, WPA-PSK, WEP 128bit,WEP 64bit
Wireless Network Modes – Infrastructure (wireless access point acts as a central hub to wireless
clients), Ad hoc mode (established between 2 or more wireless clients without a wireless access point
– short lived connections)
Authenticating Wireless Networks Using Win Server 2008 – computer only,user only, computer&user
Configuring the RADIUS Server - in Server Manager add roles  network policy and access services
On the Configure An Authentication Method page, select one of the following methods:
Microsoft: Protected EAP (PEAP) – requires you to install a computer certificate on the RADIUS and a
computer or user certificate on all wireless clients,use an enterprise PKI as the AD Certificate Services
Microsoft: Smart Card Or Other Certificate – essentially the same as PEAP, certificates are provided
using a smart card
Microsoft: Secured Password (EAP-MSCHAP v2) – requires computer certificates to be installed on all
RADIUS servers, clients use domain credentials to authenticate
Configuring RADIUS Proxy
All RADIUS servers are connected to one RADIUS Proxy which determines to which domain to
forward the request to. You can also use it to load-balance requests accross multiple RADIUS servers.
Monitoring RADIUS Server Logons – using event viewer, analyzing the RADIUS log file (located in
%SystemRoot%\system32\LogFiles with the filename IN<date>.log), enabling trace logging on the
server (very detailed,to enable: netsh ras set tr * en, log file at %SystemRoot%\Tracing\IASNAP.log)
Connecting to Remote Networks – Dial-up connections, Virtual Private Networks (VPN) connections
Dial-up Connections – traditional, largely outdated, requires a separate physical circuite to the server
Pros: no internet connection required, minimal privacy risks, predictable performance
Cons: high cost for scalability (as many phone lines as many users you have), poor bandwidth
Virtual Private Networks – uses public internet, requires a single connection
Pros: higher bandwidth potential, minimal cost
Cons: internet connection required, poor latency, poor efficiency with dial-up connections
Configuring VPN connections – PPTP, L2TP, SSTP
Point-to-Point Tunneling Protocol (PPTP) – uses PPP for user lever authentication and Microsoft
Point-to-Point encryption, it doesn't require a client certificate while using PEAP-MS-CHAP v2, EAP-
MS-CHAP v2, MS-CHAP v2 for authentication
Layer Two Tunneling Protocol (L2TP) – open standard (MS and non-MS OS), uses PPP authentication
for user level and IPSec for computer level peer authentication, data authentication, data integrity
and data encryption. It requires certificates, can be used over Ipv6, implemented with AD CS.
Secure Socket Tunneling Protocol (SSTP) – uses PPP authentication for user level and HTTP
encapsulation over a Secure Socket Layer (SSL) for data authentication, data integrity and data
encryption.Supported only by Windows Server 2008 and Vista SP1, requires certificates. AD CS impl.
Troubleshooting VPN Connetion Problems – events added to the System event log, ipconfig to test

Chapter 8 – Configuring Windows Firewall and Network Access Protection


Firewall Profiles – Domain (when a computer is in AD), Private (must be specifically specified,
otherwise it isn't used), Public (the default profile when a domain controller is unavailable)
By default Windows firewall allows all outbound traffic but in server 2008 you can filter it. By default,
outbound rules are enabled for: DHCP, DNS, GPO, Ipv6, and Internet Group Management (IGMP).
Configuring Firewall Settings with Group Policy
Managing Windows Firewall Settings using GPO for computers running Vista or server 2008 by using
two nodes:
Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall With
Advanced Security\Windows Firewall With Advanced Security – applies settings only to computers
running Vista and Server 2008, more detailed configuration of firewall rules
Computer Configuration\Policies\Administrative Templates\Network\Network
Connections\Windows Firewall – applies settings to computer running XP, Server 2003, Vista, and
Server 2008 (less flexible than the WFAS but settings appy to all versions of Windows Firewall)
For best result create separate GPOs for Vista/server 2008 and XP/server 2003 and use WMI queries
to target the GPOs to computers running the appropriate version of Windows.
Logging for Windows Firewall – by default when logs are enabled, they are written to %SystemRoot%
\System32\LogFiles\Firewall\Pfirewall.log and stores only the last 4KB of data
Netstat -a -b – to examine which ports are listening for active connections
Configuring Network Access Protection (NAP) – computers must meet specific health requirements
Enforcement Types – Ipsec connection security, 802.1X access points, VPN servers, DHCP servers
Ipsec Connection Security – requires clients to perform a NAP health chack before they can recieve a
health certificate, for eg. you can allow noncompliant computers to connect to the web but not to a
file server, or to allow healthy computers to comunicate only to other healthy servers. At least two
Cas are required for redundancy. Other PKIs will not work. Ipsec is high level of security.
802.1X Access Points – uses ethernet switches or wireless access points that support 802.1X
authentication. Compliant computers are granted full access and noncompliant computers are
redirected to a remediation portion of a network or completely prevented to connect. It uses two
methods to control which level of access computers recieve:
An access control list (ACL) – a set of Ipv4 or Ipv6 packet filters configured on the 802.1X AP
A virtual LAN – a group of ports on a switch grouped together to form a separate network
VPN Servers – enforces NAP for remote access connections using a VPN server running Windows
Server 2008 and Routing And Remote Access, it can apply a set of packet filters to limit access for
noncompliant computers separately for Ipv4 and Ipv6
DHCP Server – uses a computer running Server 2008 and the DHCP server service that provides IP
addresses to intranet clients, only compliant clients recieve an IP address that grants full network
access, noncompliant computers are granted an IP address with a subnet mask of 255.255.255.255
and no default gateway
If the health status of NAP clients changes, the NAP client performs a new health evaluation using a
DHCP renewal.
System Health Agents and System Health Validators – SHA, SHV
System Health Agents (SHAs) – components that contain a description of the health of the client
computer, custom SHAs can be created to provide more complex reporting
System Health Validators (SHVs) - components that analyze the SoH generated by the SHA and
creathe the SoH Response, NAP uses the SoHR to determine the level of access and whether remedy
is necessary
Planning a NAP Deployment – testing (test the NAP), monitoring (notifies the administrator if the
computer fails to meet health requirements but does not prevent it from connecting), limited access
(NAP enforcement)
Installing HRA Role Service (HRA) – used with Ipsec enforcement , at least 2 HRAs should be used for
fault tolerance, the following must be configured:
A certificate authority (if one does not already exist) – HRA requires a certification authority rinning
Server 2008 certificate services
A web application – Add Role Services Wizzard creates a Web application named DomainHRA under
the default Web site in IIS (Internet Information Services)
To configure HRA, in Server Manager right-click Roles\Network Policy And Access services\Health
Registration Authority\Certification Authority and choose Add Certification Authority.
Configuring NAP Clients – after configuring the NPS server you must configure clients for NAP, the
easiest way is through GPO settings in the Computer Configuration\Policies\Windows
Settings\Security Settings\Network Access Protection\NAP Client Configuration node
Client NAP settings has three nodes: Enforcement Clients, User Interface Settings, Health Registration
Settings
Additionally, you must start the Network Access Protection Agent service on all client computers.
Netsh nap client show state – view client's configuration
Netsh nap client set enforcement 79617 enable –to enable the DHCP Quarantine enforcement client
NAP logging – allows you to identify noncompliant computers which is particularly important during
the initial stages of a NAP deployment
It also enables you to identify computers that would be unable to connect to the network if NAP
enforcement were enabled.
To configure NAP logging right-click Roles\Network Policy And Access Services\NPS and choose
Properties. To view NPS events you can use Windows Logs\Security event log available inServer
Manager at Diagnostics\Event Viewer\Windows Logs\Security.
Netsh nap client set tracing enable level=verbose – to enable tracing for extremely detailed info
Trace logs are stored in %SystemRoot\Tracing folder.

Chapter 9 – Managing Software Updates


Windows Server Update Services (WSUS) – allows you to download, approve, and distribute the
updates through your organization
Typically the best way to distribute updates is through GPO, windows update settings are located at
Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Update
Typically, redundancy is not required for WSUS servers, however you should backup the database.
Planning the WSUS Installation – you will need to make several key decisions:
Update source – either directly from Microsoft or from another WSUS server
Approval and configuration replication – for multiple WSUS servers
Update storage –either store updates locally(minimul 6GB of free space) or direct download from MS
Database – list of updates (at least 3GB (~1GB in reality) of space for WSUS internal db installation),
the database is located at C:\WSUS\UpdateServicesDbFiles\SUSDB.mdf
Web site selection – WSUS requires IIS to retrive updates using HTTP or you can create your own site
Languages – to minimize disk space, use only the languages you need
Products – updates can be for the OS but also for MS applications, choose which ones you need
WSUS is a free download available at http://www.microsoft.com/wsus
How To Configure Computer Groups – testing (to veryfy the update distribution), pilot (deploy
updates to a computer-savvy group), production (if the pilot deployment goes well)
You can configure computer groups in two ways: Server-side targeting (for small organizations) and
Client-side targeting (for larger organizations) – using the update services console
How to Troubleshoot WSUS – the application event log, C:\Program Files\Update Services\Log
Files\Change.txt (non detailed entries), C:\Program Files\Update Services\Log Files
\SoftwareDistribution.txt (extremely detailed log for debugging by MS support)
Net stop wauserv – stop Windows update service Net start wauserv – start Win update service
Wauclt /a – to make Windows Update begin querying the WSUS server

Chapter 10 – Monitoring Computers


Configuring the Forwarding Comnputer
winrm quickconfig – to configure the Windows Remote Management service
net localgroup “Event log Readers“ <computer_name>$@domain_name> /add – add the computer
account of the collector group to the Event log Readers group on each forwarding computer
net localgroup “Event log Readers“ [email protected] /add – to add the computer SERVER1 in
the contoso.com domain
wecutil qc – to configure the Windows Event Collector service
winrm quickconfig –transport:https – to configure Event forwarding to use HTTPS
Monitoring Performance and Reliability
To use performance monitor, select Diagnostics\Reliability And Performance\Monitoring Tools
\Performance Monitor.
Graph can be viewed in 3 forms: Line (defualt), histogram bar, report (text report).
Data Collector Sets – gather system information and store it in a data file
Default location to store data is %SystemDrive%\perflogs\Admin\.
Using Network Monitor – to troubleshoot complex problems
Capturing Network Data Using a Command Prompt – go to C:\Program Files\Microsoft Network
Monitor 3 (by default) and run NMCap /network * /capture /file filename.cap (this captures all
traffic on all network interfaces)
NMCap /network * /capture “DNS“ /file filename.cap – example how to catch DNS data
NMCap /network * /DisableLocalOnly /capture /file filename.cap – capture in P-Mode (all traffic
visible to the computer, not just broadcast traffic or network traffic)

Chapter 11 – Managing Files


To control access, use NTFS file permissions and Encrypting File System (EFS). To provide redundancy,
create a Distributed File System (DFS) namespace and use replication to copy files between multiple
servers.
Managing File Security
NTFS File Permissions – User files (full control for users and admins), System files (allows admins but
noone else to install apps and updates),Program files(similar to system files, admins have full control)
Encrypting File System (EFS) – encrypt files and folders on the disk
You can use EFS with GPO. To encrypt offline files use: Computer Configuration\Policies
\Administrative Templates\Network\Offline Files\Encrypt the Offline Files Cache
You can also disable indexing of encrypted files using: Computer
Configuration\Policies\Administrative Templates\Windows Components\Search\Allow Indexing Of
Encrypted Files
To recover encrypted files, EFS supports Data Recovery Agent (DRA). You can create multiple DRAs.
Sharing Folders – uses Distributed File System (DFS) to create a namespace of shared folders on
multiple servers
On the Select Role Services, several roles are available:
File Server – not required to share files but allows you to use the Share And Storage Management
Distribute File System – enables sharing folders and replicates files between DFS servers
File Server Resources Manager – tools for generating storage reports, configuring quotas, and
defining the screening policy (enables storage monitoring on local disks)
Services for Network File System – provides connectivity for UNIX clients that use Network File
System(NFS) for file sharing(most new UNIX systems don't need this and can connect directly to Win)
Windows Searching Services – indexes files for faster searching (enable indexing on local disks)
Windows Server 2003 File Services – provides services compatibility with Server 2003 computers
Using Quotas – to manage available disk space to each user (prevent users from filling the disk)
Creating Quota Templates – 100MB limit, 200MB limit reports to user, 200MB limit with 50MB
extension, 250MB extended limit, Monitor 200GB volume usage, Monitor 500MB share
You can also create your own quota template by editing one of the standard templates.
Dirquota quota add /Path:C:\Shared /Source Template:“200 MB Limit Reports To User“ -standard
Dirquota quota add/Path:C:\Shared /Limit:100MB /Type:Hard – hard limit of 100MB
Sharing Folders from Windows Explorer – right click on a file and choose Share, you have several
options: Reader (read access only), Contributor (read and write), Co-owner (change file permissions,
full read and write access), Owner ( assigned to the user who creates the share, full control)
Sharing Folders from a Command Prompt – using the command net share
Net share – to view the existing shared folders
Net share ShareName=Path [/GRANT:user,[READ|CHANGE|FULL] ][/CACHE:Manual|Documents|
Programs|None] – to create a share
Net share Files=C:\Shared – shares C:\Shared folder
Net share Files /DELETE – to remove a share
Net share /? – for complete usage information
Connecting to Shared Folders – if you share folder Docs on the server MyServer: \\MyServer\Docs
Net use Z: \\MyServer\Docs - map the Z drive to the shared folder
Creating a DFS Namespace – single or multiple
After creating it int he Server Manager, you can adjust settings in the Properties dialog box. 3 tabs:
General – description for the namespace
Refferals – gives you control over how multiple targets in a refferal list are ordered. Options are
Random Order, Lowest Cost, Exclude Targets Outside Of The Client's Site (if you would rather have
clients fail rather than accessing a target in a different Active Directory site)
Advanced – two pooling configurations: Optimize For Consistency (query the primary domain
controller) or Optimize For Scalability (query the closest domain controller)
Configuring DFS from a cmd or a script
dfsutil domain <domain_name> - to view the DFS roots in a domain
dfsutil server <server_name> - to view the roots in a specific server
dfsutil target \\<domain_name>\<namespace_root> - to view targets in a namespace
dsfutil link \\<domain_name>\<namespace_root>\<folder> - to view the targets for a folder
dfsutil client siteinfo <client_name> - to view which Active Directory site a client participates in
Backing up and Restoring Files – it can back up and recover files and entire volumes
Shadow Copies – allow backup software to access files that are in use
Vssadmin create shadow /For=C: - creates a shadow copy of a C:\ volume
Vssadmin list shadowstorage – to view the storage curently allocated to shadow copies
Vssadmin list shadows – to view available shadows and the time they were created
Vsadmin revert shadow /Shadow={56036723-cdcc-49ef-98a4-445b1645770e} – to revert to a
previous shadow copy you have to specify the shadow copy ID
Wbadmin start backup –backupTarget:L: -include:C: -quiet – initiate a backup from a cmd

Chapter 12 – Managing Printers


Print Services server role adds the Print Management Snap-in which simplifies printer configuration.
You can choose between setting up a Print Server, LPD Service (unix), and Internet Printing (print
using IPP with a Web browser, it requires IIS).
Administrators can manage any user's documents in the print queue but not other user's documents.
You can configure the following permissions: Print (users can print), Manage Printers (users can
change printer congifuration), Manage Documents (users can remove documents in the queue).
Migrating Printers – quickly migrate a print server to another computer
You can also migrate printers from a command prompt using the PrintBRM tool which is located in
the %SystemRoot%\System32\spool\tools folder.
Printbrm –b –f printers.printerexport – export printers to a file
Printbrm –r –f printers.printerexport – to import printers at a cmd or from a script
Monitoring Printers – monitor printer usage in real time using the Performance Monitor snap-in
Most useful counters: Job errors and out of paper errors, jobs and jobs spooling, total pages printed
and total jobs printed.

You might also like