ICTNWK422 Learner Guide
ICTNWK422 Learner Guide
s
Table of Contents..................................................................................................2
Introduction..........................................................................................................3
CHAPTER 1: PREPARE TO INSTALL A SERVER........................................................4
1.1 Identify required server applications and features according to organisational
requirements................................................................................................6
1.2 Determine required operating system features and network service outputs
according to task requirements.......................................................................9
1.3 Access and back up local data according to organisational policies and procedures.
................................................................................................................16
1.4 Arrange access to site and advise users of deployment and down time expectations.
................................................................................................................18
CHAPTER 2: INSTALL SERVER.............................................................................22
2.1 Create disk partitioning scheme, file systems and virtual memory according to
business needs...........................................................................................24
2.2 Install and configure network operating system, server applications and network
services according to task requirements.........................................................29
2.3 Reconnect and reconfigure connectivity devices...............................................37
2.4 Patch operating system and applications, restore security and reliability
requirements..............................................................................................40
2.5 Restore local data to new server according to organisational requirements..........43
CHAPTER 3: CONFIGURE AND ADMINISTER THE SERVER....................................46
3.1 Configure network directory service according to organisational requirements,
policies and procedures................................................................................48
3.2 Create and manage security and network access to users according to
organisational requirements..........................................................................51
3.3 Configure user environment using operating system policies and scripts..............55
3.4 Create directory structure and quotas according to organisational requirements.. .61
CHAPTER 4: TEST SERVER...................................................................................65
4.1 Test server against task requirements............................................................67
4.2 Seek and respond to feedback on server performance from required personnel....69
4.3 Test and validate any changes or additions against organisational requirements...70
CHAPTER 5: FINALISE DOCUMENTATION AND CLEAN-UP WORKSITE.................77
5.1 Document configuration and operational changes made to server according to
organisational policies and procedures............................................................79
5.2 Document server status according to organisational procedures.........................82
5.3 Dispose of excess equipment according to organisational and e-waste policies.....83
References..........................................................................................................85
ICTNWK422 - Install and manage servers| Learner guide
Introduction
This unit describes the skills and knowledge required to install and manage a server. It
includes the ability to conduct initial configuration and testing, administration, software
distribution and updates, profiling and troubleshooting.
Page | 1
ICTNWK422 - Install and manage servers| Learner guide
Page | 2
ICTNWK422 - Install and manage servers| Learner guide
Page | 3
ICTNWK422 - Install and manage servers| Learner guide
You can operate multiple server operating systems (OS) using the same physical hardware
with technologies such as virtualization. It might seem a daunting job, but the most simple
servers can be set up in an hour's time.
It helps to ensure that the server you purchase is up to date so that it can benefit from
technology such as virtualisation. The new Intel and AMD processors feature and
extensions that support fast and easy virtualization and allow you to pull out every last
performance drop from the device.
Though Linux is an increasingly common option, this learner guide will be based on the
latest version of Windows Server 2012.
Server applications
• An application or application logic for the middle tier, usually on a local area network or
an intranet server
The back end or third level are older, legacy server databases and transaction processing
software. The server is the intermediary between the browser-based front ends and the
backend databases and legacy systems.
For several uses, the applications of servers combine or operate with a web server
(Hypertext Transfer Protocol). The Web browser supports a user-friendly HTML-based
front-end. The web server has many ways of transmitting a request to an app server and
returning an updated or new webpage to the user. The Popular Gateway Interface (CGI),
FastCGI, the Microsoft Active Server Page and the Java Server Page are these approaches.
In certain instances, servers support "brokering" interfaces such as the CORBA Internet
Inter-ORB Protocol (IIOP).
• Oracle WebLogic and IBM WebSphere are Java-based (supporting the database and the
Web client)
Page | 4
ICTNWK422 - Install and manage servers| Learner guide
Data Deduplication
Hyper-V 3.0
How will you obtain the features and objectives from appropriate person?
You may use the following methods to collect server functions and goals:
Page | 5
ICTNWK422 - Install and manage servers| Learner guide
Page | 6
ICTNWK422 - Install and manage servers| Learner guide
The server has changed the way small businesses operate and with falling costs and
increased productivity, there's never been a better time to start using a server in your
company.
With a range of server varieties to choose from, the choices can be a challenging job and
then the right choice. Should you have a server on site? Can a cloud-based server provide
your company with the best service? And how can virtualization make your choice of
server even more flexible?
All of Dell, HP, Microsoft, IBM and Oracle's major brands provide server platforms for small
business users. It is necessary to fit your company's needs with the right type of server.
Find out the answers of the following questions:
A re y o u b u y in g a se rv e r fo r file sh a rin g ?
D o e s y o u r w o rk fo rc e n e e d to co n n e ct to th e s e rv e r re m o te ly ?
Is y o u r se rv e r g o in g to b e u se d fo r d a ta b a ck u p ?
H o w m u c h s p a ce d o y o u h a v e a v a ila b le to a cco m m o d a te a se rv e r?
Answering these questions gives you a good picture of the type of server your company
needs. A server may also be used to administer many workloads, for example file sharing
and backup. However it is a good idea to build a list that prioritises your server needs. This
offers you a straightforward way to do things, so that your organisation selects the best
server for its fundamental necessities.
Page | 7
ICTNWK422 - Install and manage servers| Learner guide
1. Dedicated Servers
A dedicated server is a single company's physical server. Dedicated servers are similar to
personal computers but use more stable and typically more powerful server-grade
hardware than most desktop computers.
The most efficient small business server alternative are dedicated servers. They range
from moderately powerful machines to massively powerful machines with thousands of
processors and hundreds of gigabytes of memory. The most powerful servers are capable
of serving high-traffic websites and eCommerce shops, applications with thousands of
concurrent users and large databases.
One or more moderately powerful servers may meet a small business' application, web
and database hosting needs.
2. Cloud Server
Cloud servers may be considered as a physical server slice. Every cloud server is a full
server environment that looks similar to a dedicated server from the user's viewpoint, but
in reality is a virtual machine that is run in business-level server hardware software. Many
cloud servers can be supported on any physical server.
Without delay you can install as many cloud servers as you like.
It is important to understand that each of the server options discussed provides a full
server environment that supports any server application. Both our servers can be used
with either Linux or Microsoft Windows Server operating systems. What is right for your
small business depends on its unique needs.
3. Hybrid servers
Sit between dedicated servers and cloud servers, hybrid servers.They are less costly and
less powerful than dedicated servers, although the most potent hybrid servers compete
against dedicated servers on a lower-tier .
One of the advantages of the new Server Manager interface is the ability to build server
groups, which include server collections already on the network and can be managed
through the new user experience. Creating new server groups allows you to run tasks
across and server that have similar attributes, for example a server group containing all
Page | 8
ICTNWK422 - Install and manage servers| Learner guide
machines running IIS, all database servers, and so on. This is a great boon for companies
without dedicated monitoring software.
Congrats to Microsoft to clean it up a muddy value concept. The core operating system is
the same now, except the version you purchase – Standard or Datacenter – depends on if
you want to run two virtual machines as guest or whether you want unlimited guest
virtualization. No Enterprise version is made available .
The Windows Server focus has shifted from the Interface philosophy to the GUI
alternative. In reality, you will be asked to choose between a core and a complete
installation when you first instal the OS. Core is the alternative favoured and encouraged.
Once a Windows Server 2012 core version is installed, you can easily switch to a GUI by
installing a GUI role, and opt out without complete reinstallation.
This is an outstanding feature when deploying a server first. You can use the GUI to
perform all the worldly setup activities, so when your computer is ready to deliver, the GUI
can be turned off and deployed. This provides many advantages, including a reduction in
attack surface, resource load and energy demand.
4. Hyper-V Replication
The Hyper-V replication function allows you to duplicate a virtual machine at Hyper-V and
a network connection from one location to another – without the need for shared storage.
This is a great deal for disaster recovery, high availability and more in the Microsoft world.
This is often provided by VMware, but the seller charges additional bandwidth to new
licensees.
This makes standing facilities around the world a one- or two-click affair (assuming
network connectivity exists). In Hyper-V Manager the latest Hyper-V Replica interfaces
provide a much easier interface for replication sequence formation and better process
monitoring and overall health of replication systems and partners.
The new edition of Windows Server has hundreds more cmdlets. This makes your life
simpler, as PowerShell is the most common way to handle all workloads on the operating
system.
Any of these pools can have hot standby discs and each area in the pool can have policies
on availability, for example spiegling and redundancy in the RAID-style. It is possible to
also make thin provision, which sets out a volume that is greater than the one you actually
have space for.
Page | 9
ICTNWK422 - Install and manage servers| Learner guide
DirectAccess enables VPN-like protected tunnelling back to corporate networks from any
endpoint without the overhead and performance effect of a genuine VPN. There is also no
customer management agent. When the technology is properly set up, this works only—
users have seamless access, as they were on corporate campus, for file transfers, on-site
equipment and other services. Moreover, community policy artefacts are being
implemented and managers can control computers wherever they are not just when they
come to headquarters or log in to the VPN. This technology was historically difficult to set
up, but it works very much on Windows Server 2012.
Dynamic Access Control (DAC) is an array of facilities that improve the way access to
information is managed. It is no longer a matter of taking files or directories and making
choices about "Yes, these people can" and No, these people can't."
Instead it means abstracting individual data and creating broader tasks about the kinds of
data that reside on your device and the kinds of users that should have access to it and
should not do so. This is a modern way of thinking that complements very much the file
system's strong capabilities to protect data. There are very few schemes added to the
Active Directory, and only a Windows Server 2012 file server and a domain controller
enables you to start by using the lion share of the DAC feature set.
The Resilient File system (ReFS) was designed to evolve the NTFS with a focus on
availability and integrity. ReFS writes at atomically at different locations, which increases
data resilience in case of power failure in a type, and includes the new "integrity streams"
feature which uses checksums and realtime allocations to protect device and user data
sequencing and access.
Problem(s) found in volumes covered with such features by Windows Server 2012 can be
fixed automatically without taking the disc or the volume of these features offline — and
also without any administrative interference. ReFS is also designed to scale beyond NTFS,
an important point in the Big Data and Private Cloud age.
You can find a full IPAM suite in the Windows Server 2012 package. Many medium-sized
enterprises just do not have access to this. With the IPAM suite, you could indeed
organise, group, issue, lease and renew IPs and also integrate the DHCP and DNS
servers to find and manage devices already on your network. If you haven't played with
Nortel IPAM services and others, this is a very interesting and interesting addition of the
product — and as it is free of charge with the OS licence, making the price worth every
cent.
Page | 10
ICTNWK422 - Install and manage servers| Learner guide
Some of the main features of the Linux operating system are below.
Portability means that software can function in the same way on various types of
hardware. Linux kernel and application programmes can be built on any hardware
platform.
Open Source - The source code for Linux is free and a community-based software
project. Multiple teams work together to improve the operating system's potential and
it is continually changing.
The hierarchical file system – Linux offers a regular file structure that arranges system
files and user files.
Security – Linux offers user security through authentication functions such as password
protection/controlled access to sensitive files/data encryption.
Network Services
Networks are all around you and even sometimes appear unseen. It can be divided into
two broad categories: the LANs (Local area networks) and the WANs (Wide area
networks). LANs are the most popular connections inside the boundaries of your home or
office, and the WANs (Wide area networks) is the most significant way of connecting a
wider area than does a LAN. Wired and wireless networks are both required to connect to
each other. Your mobile phones and several "land lines" fly through cellular networks
linked to each other by wired networks and satellites.
No matter how unseen, the networks have to be properly designed and maintained to
provide the most stable and effective performance, with the use of devices and
instrucments such as switches, routers, and firewalls.
Clients are seen to be able to access various functions on the server, most network
services including the HTTP (A protocol (utilising transmission control protocol) to transfer
hypertext requests) and the SSH (secure shell login). The application is considered to be
the clients linked to these facilities managed by an individual in this case. The programmes
that use the service will be a web browser or a secure-shell client.
Some of them are linked to non-interactive clients, such as CIFS (windows fileshare) and
NTP (network time synchronisation). You wouldn't usually start an application to use these
services. The operating system will instead access a CIFS or NTP service to open remote
files or sync time from another system.
Page | 11
ICTNWK422 - Install and manage servers| Learner guide
Other programmes, such as SMTP and various listening databases (MySQL, Microsoft SQL,
Postgres) are often linked to. In order to relay messages from one mail system to another,
SMTP is used by mail clients to send new mail messages, but also by other mail servers.
Web-based (running on the webserver) middleware applications can connect to database
services but users can monitor or manually query the database.
Rare cases arise when an application presents a service to connect users or other
applications. One is uTorrent, a BitTorrent programme that runs on windows systems as a
standalone app but allows you to connect to it remotely via a web browser so you can
remotely access it. Some media players, home automation and applications for music
composition and video creation provide this form of remote control. When audio/video
processing is performed, other users who work with the same piece may monitor certain
parameters or add their own feedback to a track that is played, filmed, or edited on
another device. All this can be achieved through the network with application-specific
services.
The subsequent sections cover the Windows Server 2012 system specific specifications. If
your device does not meet the minimum specifications, this product cannot be properly
installed. You should remember that while the following details may list minimum or
proposed demands, the actual specifications may vary depending on your device
configuration, installed applications, roles and features. Microsoft recommends the
following Winsows Server 2012 specifications:
Processor
The number of processor cores, processor cache and clock frequency of CPU(s) influence
the processor's actual needs. It is not recommended that your server be designed with
minimal specifications from a genuine implementation of Windows Server 2012. The
suggested requirement should start and note programmes, positions, features and other
resources on the server. You can have to add more cores and/or increase the clock cycles.
Processor performance depends not only on the clock frequency of the processor, but also
on the number of processor cores and the size of the processor cache. The following are
the processor requirements for this product:
RAM
The following are the estimated RAM requirements for this product:
Minimum: 512 MB
The following are the estimated minimum disk space requirements for the system
partition.
Minimum: 32 GB
Other requirements
Page | 12
ICTNWK422 - Install and manage servers| Learner guide
DVD drive (if you intend to install the operating system from DVD media)
The following items are not strictly required, but are necessary for certain features:
Internet access
Page | 13
ICTNWK422 - Install and manage servers| Learner guide
Server Core
This is the default and preferred configuration for deploying Windows Server 2012. Server
Core was introduced in Windows Server 2008 as a minimal installation option and a low-
maintenance environment with limit functionality, while reducing:
Servicing requirements
Management requirements
Attack surface
It is installed without graphical user interface and with only the binaries required by
configured server roles.
Notice that the preference for deploying Server Core of Windows Server 2012 in an
enterprise signifies a new OS standard with improved user experience and supportability
while still offering the above mentioned key attributes for private cloud computing. And
the growing number of Server Core instances in production also suggests even higher
market demands for process automation, remote management, etc. in enterprise IT space.
This installation option is the familiar one by most IT people. It installs the user interface
and all server tools. In Windows Server 2012, the interface although with Metro-style
looks and feels, it however does not support Metro-style applications without adding
Desktop Experience feature.
Figure 1. Default GUI Settings of Windows Server 2012 full Installation Shown in Server
Manager
Figure 2. Default GUI Settings of Windows Server 2012 full Installation Shown in
PowerShell
Page | 14
ICTNWK422 - Install and manage servers| Learner guide
One important deployment feature in Windows Server 2012 is that the ability to convert
from a Server with GUI deployment to a Server Core installation, and vice versa, with
PowerShell. This is different from that in Windows Server 2008 release where one cannot
change the installation option of a server, once installed. To convert an installation from
Server with GUI to Server Core, run the following PowerShell command:
And the installation will take minute to reconfigure followed by rebooting into Server Core
with all settings removed from User Interfaces and Infrastructure as shown in Figure 3
below:
Figure 3. Settings in Server Core of Windows Server 2012 from Removing Server-Gui-
Mgmt-Infra
Notice the above converting from a Server with GUI to Server Core installation does not
completely remove all the files associated from the local disk. Such that to re-install the
GUI components from this state, simply run:
This will convert this Server Core installation back to Server with GUI with settings shown
in Figures 1 and 2. To completely remove all associated files and dependent components
of a role or feature, use the –Remove flag. This brings the feature to a state called
“disabled with payload removed.” And to reinstall a role or feature disabled with payload
removed, one will need to have an installation source and use the –Source for specifying
the path. And the component sources must be from the exact same version of Windows for
the reinstallation to work. Without the –Source option, PowerShell will use Windows
Update by default. This ability to remove and reinstall a component of Windows Server
2012 is presented as “Features on Demand.”
Page | 15
ICTNWK422 - Install and manage servers| Learner guide
Each system administrator should temporarily take an essential service offline, for
scheduled repairs or upgrades. This section will include advice about what to include in a
downtime announcement and how the users should be notified regarding the next
maintenance periods.
Give your users at least a few days' notice for scheduled downtime if necessary. This gives
them plenty of time to plan and minimise their work environment. The greater the effect
on consumers, the longer the lead time. Maintenance of servers on critical systems must
be communicated at least a week in advance; minor systems should be recorded every
day or two.
You will need to send a few reminders 1 week before, 2 days before sending one email will
not be enough. You must also contact them when the machine is online.
Pick the time that is least inconvenient for most of your users for planned downtimes. If
your users are worldwide, some of them will always be affected. However, if there are
time zones with much fewer users than others, schedule the maintenance for those users.
This generally means of course, that the IT administrators would have a very
uncomfortable time. But a few managers are better for the organisation as a whole than
for large sections of the company.
Please inform users about the next downtime on the login page or the main page a few
days in advance for applications, so that users can schedule their work around downtime.
Do not just alert a web app that the application is currently unavailable – give users ample
notice to minimise the impact on their work environment.
You can add in-app alerts or push notifications if the application you are using is a mobile
app.
As we all learned in school, you should make sure all "W" questions are answered: Who?
What? When? Where? Why? And how?
How significant is the downtime? Is this a vital device note or just informative?
Page | 16
ICTNWK422 - Install and manage servers| Learner guide
Let users know what the update will bring new functionality or enhancements. Knowing
that they profit from the downtime in the long run improves user acceptance.
Hey Jasmine
We would like to notify you that Friday (21/07) at 04:00 p.m. AST a system
maintenance is scheduled for around 2 hours. We will use this opportunity to
improve our infrastructure capacity and to accelerate our overall service.
In order to ensure the platform's uptime and reliability, we are updating our
infrastructure over the course of this long weekend to help ease the transition.
Our website will be unavailable and e-mail distribution will be suspended during
this maintenance window. All platform operations including event triggering,
scheduled email distribution and upload processing will resume directly
following the maintenance window.
We value your patience and understanding. Like always, please feel free
to send them to [email protected], if you have any questions or
concerns.
Thank you,
Planning access to a site in advance provides management reliability and durability and
security of facilities.
This is where your external communication and your internal equipment cross. Where
cables linking computers, servers, printers, telephones, conferences, wireless, security and
safety devices are all mixed. You could call it a telecom room, data room, network room,
server room, equipment room or telecommunications space - if you obey the required
organisational compliance and communication instructions. It needs tremendous
preparation and care, whatever you call it.
Page | 17
ICTNWK422 - Install and manage servers| Learner guide
A well-planned site access to ICT space should provide the following benefits:
The amount and location of telecoms/server rooms that a company needs depend on the
size of the building, the number of floors and the type and quantity of equipment installed
and supported. The area's size depends on the purpose and floor space. When you start
from scratch, it is always best to include the RCDD in the initial building design process
with your architects and engineers.
Page | 18
ICTNWK422 - Install and manage servers| Learner guide
Self-check assessment
QUESTION 1
What are the Health and Safety policies for compliance while working in an
ICT setup?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
QUESTION 2
QUESTION 3
What is the Difference between backup and cloud computing? Also highlight
different types of backups according to organizational needs.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Page | 19
ICTNWK422 - Install and manage servers| Learner guide
Page | 20
ICTNWK422 - Install and manage servers| Learner guide
Page | 21
ICTNWK422 - Install and manage servers| Learner guide
You can split your hard drive into many partitions. Different system, recovery, windows, or
data partitions can be developed.
To improve Windows partition security or data partition, software applications can be used
to encrypt the partition.
The partition types must fit the computer's firmware. Windows 10 and Windows Server
2012 can be installed on hard drives based on any of the following firmware types:
• Basic Input/Output System (BIOS). Uses the Master Boot Record (MBR) partition
structure.
• Extensible Firmware Interface (EFI) (Class 1): Uses the GUID Partition Table (GPT)
partition structure.
• Unified Extensible Firmware Interface (UEFI) Class 2: Uses the GPT partition structure.
It also includes a CSM module that allows to use BIOS functions, including the MBR
partition structure. This module can be switched on or off in the firmware.
• Unified Extensible Firmware Interface (UEFI) Class 3: Uses the GPT partition structure.
System partitions
• Tools for security. A separate device partition is required for some security tools, such as
BitLocker.
• Tools for recovery. A separate device partition is required in some recovery tools such as
the Windows Recovery Environment (Windows RE).
The MSR supports programme components that used formerly in secret sectors on
UEFI/GPT systems.
Recovery Partitions
Page | 22
ICTNWK422 - Install and manage servers| Learner guide
A recovery partition may include a recovery solution, including Windows RE tools, a picture
recovery and/or a third-party recovery tool. A recovery solution will help you reduce your
maintenance costs by allowing users to restore the factory settings of a device easily.
We suggest adding Windows RE Tools, system, and utility partitions to your Windows
partition because this partition order helps avoid overwriting the system and utility
partitions if a complete system recovery is needed. For BIOS/MBR systems, the inclusion
of Windows RE tools in the system partition should be recommended to minimise the total
number of partitions.
We suggest adding a partition after a Windows partition with a separate recovery image,
because this partition order enables end-users who want to retrieve this space for their
primary partition to opt out of that partition and then expand Windows by filling the
retrieved space.
Data Partitions
A partition that stores user data is a partition. A separate partition of data can allow for
simpler maintenance in cases in which either the primary OS is likely to be replaced or
multiple OSes, like Windows 8 and Windows 7, exist on the same machine. If a device has
several hard drives, it can save a data partition on another disc.
Page | 23
ICTNWK422 - Install and manage servers| Learner guide
Go to 'Disk Management’.
Click 'Next’
Page | 24
ICTNWK422 - Install and manage servers| Learner guide
Virtual memory
Virtual memory is a standard feature of most desktop computer operating systems. It has
become so popular because it is very cost-effective for users.
Today most machines have around 32 or 64 megabytes of RAM to use for the CPU.
Unfortunately, the amount of RAM is not adequate to run all the programmes most users
intend to run at once.
For example, when you simultaneously load an operating system, an e-mail programme, a
Web browser and word processor into RAM, 32 megabytes is not sufficient to carry
anything. If there is no virtual memory you will have to say, once you have filled the
usable RAM, "Sorry, you can not load any more applications. Please close another
application to load a new one." What a computer will do with virtual memory, is to look at
RAM for areas that were not recently used and copy them to the hard disc. This releases
RAM space for the new application to be loaded.
Because copying happens automatically, you don't even realise that it is going on and it
makes you feel like your machine has infinite RAM space even with an installation of just
32 megabytes. As hard disc space is so much cheaper than RAM chips, it has a great
economic advantage too. ¬
The hard drive's read-to-write speed is much less than RAM, and a hard drive technology
is not built to access small data pieces at a time. If your device depends on virtual
memory too much you will find a major drop in performance. The trick is to have enough
RAM to operate concurrently on anything you tend — the only time you "feel" the slowness
of virtual memory is when there is a small break in the process of changing tasks. If so the
virtual memory is fine.
If this is not the case, the operating system must always switch details between the RAM
and the hard drive. This is called thrashing, because your machine can feel painfully
sluggish.
A page file is called the region of the hard disc that stores the RAM image. It keeps RAM
pages on the hard disc, and the OS transfers data between the page file and the RAM back
and forth. Page files have a . SWP extension on a Windows machine.
It also provides data security, optimises the structure alignment of the dynamic disc and
the various disc and prevents large degradation of physical disc output.
As is known, server computers are generally considered a large database. Too much room
is also normal. The value of the virtual disc is therefore the same as the actual disc. It will
now add how to build virtual hard disc on Windows Server 2012 in the revised server
system (R2) .
Page | 25
ICTNWK422 - Install and manage servers| Learner guide
How do I create a new partition in Windows Server 2012 and 2008 R2?
Select 'Start' then find 'Administrative Tools' and click on 'Computer Management’.
Identify if there's free disk space available to create a new partition using Action > Rescan
Disks option.
Right-click on the 'Unallocated' space and simply select the option of 'New Simple Volume’.
Select what size the partition should be and click on the 'next’ option.
Now you can select to format the new partition with either ex-FAT or NTFS. We suggest
you to select NTFS as this is a better filesystem.
Select the 'Perform a quick format’ box and click 'next' option.
Review the configuration and select 'finish' to complete the wizard and partition will occur.
Page | 26
ICTNWK422 - Install and manage servers| Learner guide
A network operating system (NOS) is a computer operating system that mostly supports a
workstation, personal computer and in some cases, older terminals connected to the local
network area (LAN). Examples of network operating systems include ArtiSoft LANtastic,
Banyan VINES, Novell's NetWare and Microsoft's LAN Manager. Several other multi-
purpose operating systems, such as Windows NT and OpenVMS Digital, have features to
identify them as a network operating system.
A network operating system offers the ability to share a printer, share common file and
database system, share application and manage a network name directory.
The network operating systems list includes LANtastic from Artisoft, Banyan VINES,
NetWare from Novell and a LAN Manager from Microsoft. A network operating system has
a range of core functions including printer sharing, standard file systems, database
sharing, application sharing, network name directory management and network
housekeeping.
Artisoft’s LANtastic
Banyan VINES
Novell’s NetWare
This network operating system is a protocol suite based on the architecture of the XNS
protocol. It supports most of the market's desktop operating systems such as DOS,
Windows, Macintosh, OS/2 and UNIX. Novell also supports local networks and wide
asynchronous communications.
LAN Manager is a Microsoft network operating system that acts as a server programme. It
runs on Microsoft OS/2, and has been developed with 3Com. The file server can also be
used for other tasks such as database services. This implies that the machine has a strong
multi-task feature. It supports most desktop operating systems such as DOS, Windows
and OS/2 customers. Microsoft Windows NT Server is currently overriding the LAN
Page | 27
ICTNWK422 - Install and manage servers| Learner guide
Manager feature, and most parts of the LAN Manager are used on Windows NT and
Windows 2000.
1) Insert the Windows Server 2012 DVD and press Enter to boot once you receive the
message to install
2) Wait a while until all required files are loaded in the setup (Depending on your
machine, it will take couple of minutes)
3) The installation starts once the setup files are loaded. These can be changed to suit
your needs (the default values should be fine for now).
4) You can start installation once you click Next, click "Install now"
6) You can see four choices in the setup screen. Choose Windows Server 2012
Assessment of DataCenter Evaluation (Server With GUI).
7) After you have clicked on the next tab, read the terms of the licence, tick the "I
accept the licence terms" and click Next.
8) You'll now be asked for the drive (or partition) on which you want Windows on to
instal. NOTE: This will delete the partition content. You can either build a partition to
instal windows on or test on a testing machine.
9) Now, once we have picked up our partition, the setup begins by clicking next. This
phase could take some time.
10) Once setup is complete, your Windows Server 2012 will restart and start for the
first time. You will then be asked to set up an administrator account password.
11) The configuration will end your settings, may take a few minutes.
12) You can log in to your Windows Server for the first time once setup is over, press
the Ctrl+Alt+Delete button, and use the password set during the setup process.
13) Windows Server 2012 can view the Server Manager once you log in.
Page | 28
ICTNWK422 - Install and manage servers| Learner guide
1) Install your choice of Linux distribution. If you are new to Linux, consider trying a
distribution that is lightweight and easy to use such as Ubuntu or Linux Mint. Linux
distributions ("distros") are usually available for download in ISO format free of charge.
The ISO for the distribution of your choosing can be found on the website of the
distribution. Before you can instal Linux, this format must be burned to a CD or USB stick.
The Live CD or Live USB is made.
A Live CD or Live USB is a disc to boot onto, which also includes an operating system
sample edition that is directly operable from your CD or USB flash drive.
Use your system's built-in image burning software to instal the image burning software, or
use your system's built-in burning tool while using Windows 7, 8, or Mac OS X.
3) Before downloading, try the Linux distribution. Most Live CDs and USBs will start a 'live
world,' which allows you to test it before the switch is made. You cannot build files, but
you can search the interface and determine if it's right for you.
7) Linux boot. Your machine will restart once the installation is complete. When your
machine boots up, you can see a new screen named "GNU GRUB." This is a boot loader for
Linux installations. Choose from the list your latest Linux distro. This screen will not
appear if your machine has only one operating system. If this screen is not automatically
shown to you, you can get it by hitting the shift immediately after the manufacturer
screen.
8) Launch Linux.
Server application
A 'server application' is an application that waits for and answers requests from other
applications to provide a 'operation' on your request. A web server is an application of the
server.
Network services
A function that makes network activity simpler. This is usually done by a server (which can
run one or more services), using network protocols in the Open Systems Interconnection
(OSI) model on the application layer. Examples include domain name system (DNS),
dynamic host setup protocol (DHCP), internet protocol voice (VoIP), etc.
This is the most common network service available. It offers file storage and print
management for users. Nearly every operating network system offers these services. File
Services helps us to build, save, open and change network file system files. We can
configure vast quantities of storage space on the server that can be redundant. In this way
users can save information to a centralised location. Instead of users saving data on local
Page | 29
ICTNWK422 - Install and manage servers| Learner guide
hard drives, they save data on our hard drives. This has many benefits. For example,
users can access files from various locations or from different network devices as they are
stored in a central location. Another advantage is that the administrator can save all data
on the server quickly. Data on the system can also be easily shared with other network
users. Network security is also provided for files and directories.
Sometimes we need to allow our users to access resources while they are away on our
internet. (offsite). We can set-up a remote access server for this purpose (RAS). Via RAS
we can communicate via various methods with our internal network. One approach is to
set up RAS modems. This allows users to call our network on our RAS modem via the
telephone line. The RAS is designed to allow you to access our internal network. The
Virtual Private Network is another way (VPN). This approach links the Remote Access
Server to the Internet and users connect to Remote Access Server over the Internet via a
VPN or Virtual Private Network connection. The RAS is configured again to allow them to
access the internal network.
DNS Services
As we now use IP and MAC addresses in our network devices to connect on the network.
For users, it is difficult to remember numbers and letters, particularly for end-users, in
those addresses. Instead of using emails, we can use names that are easier to remember
for our computers. Now it doesn't mean that IP addresses are no longer used when we use
names. Names are easily translated into and around IP addresses. This needs a DNS
server.
Step 1
Log in first as an administrator of your Windows server in 2012. If your login is completed,
you need to open it manually if the server manager does not open it.
Now click on the "Manage" button for the "Add Roles and Features" button in the server
manager to add the new functionality.
Step 2
Now a new window will be opened in which a few instructions are given; click on "Next"
Step 3
Now it will ask for the "Installation Type" from which you must select the first option and
then click on "Next".
Step 4
Now you must select the server from the Server Pool. Since I have only one server in the
Server Pool my server is selected by default.
Step 5
Page | 30
ICTNWK422 - Install and manage servers| Learner guide
Now a List of Rolls will appear in front of you, from this list you must select the "Print and
Document Services".
Step 6
As you select the Print and Document Services a new window will be opened that will ask
permission to "Add Features". Click on "Add Features" to grant it the permission.
After selecting the Add Features option, you must click on the "Next" button.
Step 7
Now a list of features will be available for selection, you can select any feature you want to
install and then click on "Next" or simply click on "Next" without selecting any feature.
Now some information will be shown to you about this service, here also you must click on
the "Next" button.
Step 8
Now select the "Roll Services" page which will open. you must select the first option i.e.
"Print Server" and then click on "Next".
Now a confirmation page will be opened, where you can give permission to the server to
restart if required or you can click on "Install" without giving permission to restart.
Step 9
If you had provided permission to restart then your server will first restart and then in the
Server Manager you will see that your installation is successfully completed. You can get
this confirmation by clicking on the Flag given on the upper right-hand corner.
Page | 31
ICTNWK422 - Install and manage servers| Learner guide
For DNS server to be configured, you must meet the following fundamental requirements:
Step 1: From task bar, you must open server manager dashboard
Step 2: Read the notes and ensure you meet the prerequisites. Click Next when you are
done
Step 4: Choose the destination server from server pool on which you want to configure
DNS and click Next
Step 5: Select DNS Server from server roles. When prompted to install additional
necessary features along with DNS server, click Add Features
Step 9: Click Install. Wait for a moment before DNS role is installed
Page | 32
ICTNWK422 - Install and manage servers| Learner guide
This section explains how the Network Manager and network server can be configured as
Windows network services.
• Run the Manager and Server Application versions to configure the applications properly
and control the rendering network.
• Use the network production so that you are confident that it works efficiently. Do not
continue without fulfilling these conditions.
To instal the network manager and render servers as Windows services allows background
rendering and is easy, but this also means that you have limited knowledge about
problems on the rendering server screen. Therefore before taking this measure, your
network must run smoothly.
The following steps include the installation and registration of the Manager and Server
services under Windows. This installation substitutes for the device mode (running the
Manager and Server manually each time you want to use them). Any time you boot the
machine, the services are started automatically but can also be set up for manual startup.
The \Network subdirectory and the configuration and LOG files from application mode
remain in place but instead of in a separate phase, the services run on Windows.
The Manager and Server can be run as resources from a command prompt window or the
Execute dialogue with the -i switch (install as a service). Then go to Services and start or
reboot the Manager and/or Server.
In order to uninstall the manager or server after it has been installed, 3ds Max should be
executed using the -r switch from the Command Prompt window or Run dialogue (remove
service).
Procedures
2. Open the Command Prompt window and change the directory to the root directory of
Backburner: \Program Files\Autodesk\Backburner\, for example.
3. Managersvc sort -i
You can also set users, passwords and other parameters by selecting Properties from the
right-click menu.
Page | 33
ICTNWK422 - Install and manage servers| Learner guide
2. Open the Prompt command window and change the Backburner root directory directory.
3. Serversvc -i type
You can also set users, passwords and other parameters by selecting Properties from the
right-click menu.
5. On each system on which you wish to set server as a service, repeat these steps.
2. When the User Account Control dialogue box shows, confirm that you want the action it
shows, then press Yes.
5. The Pick Server Roles page will be shown. Pick the check box for the Application Server
and then press Next.
6. Knowledge appears on the function of the Application Server. Get to know the details
and then press Next.
7. Choose the roles you need to run your applications on the Select Job Services tab and
click Next. The default task service of Application Server Foundation is always configured
as part of the Application Server role.
8. If a supporting functionality or role service is needed for installation from another role,
the following pages provide essential information on the feature or collection of functions
or function services. Press Next to reach the Confirm Configuration Options tab.
9. Click Install to start the Application Server role with the options on the tab. Depending
on the position services you choose the installation process can be long. After the
installation process begins, it is not appropriate to join the operator. If the installation is
completed, the installation status is displayed on the Installation Results page.
Page | 34
ICTNWK422 - Install and manage servers| Learner guide
The Network Interface Card (NIC) uses the device to connect to the external network.
Typically there is a PCI (Edge) connector for connecting to one of the pc expansion slots
and an RJ-45 connector for connecting to external Ethernet. Please note that the interface
connectors can vary depending on the expansion bus being used (PCI, ISA, EISA, USB,
etc) (for example, 10Base2, 10Base5, 10BaseT, etc.). Each has its own interface
specifications. Nearly all of the NICs have network access LED indicators.
Hub:
A hub links all network nodes with Twisted Pair cables (UTP or STP). The signals received
on one port are sent to all other ports at a hub, and vice versa. All of the nodes
(workstations) connected to each other through a hub will listen to each other. The
benefits of using a centre are low cost and easy to implement. The drawback is lower
bandwidth and data protection. Bandwidth decreases when all workstations are in the
same collision domain. If two or more workstations attempt to transmit at the same time,
signals clash and the signals are lost. This limits the bandwidth available in the Ethernet
network.
Switch:
A switch does not transmit signals on the other hand without testing whether it really has
to propagate to a certain port or ports. It decides on the basis of its internal settings. We
may assume a switch is an intelligent hub.
Bridge:
A bridge operates very like a switch. It segments a certain network to the specifications.
Segmentation using a bridge prevents unwanted traffic from accessing multiple network
segments. Both Bridge and Switch are layer 2 devices for OSI. Bridges filters traffic based
on the frame destination address. If the destination of a frame is a node in the same
section it originated, it is not forwarded. If it is intended for a node in another LAN, the
corresponding bridge port will be attached and redirected to that port.
Transceivers:
Transceivers are typically used in co-axial media with networking standards 10Base2 or
10Base5. It allows a Network Interface Card to link to a coax, which provides the required
signal translation.
A wireless access point allows mobile users to link without the use of wires to a central
network node. For mobile workstations wireless networking is useful, since there is no
wiring involved. There is a large division between the WLAN access standards into
802.11a, 802.11b and 802.11g. 802.11g is the most common among these because of its
high bandwidth and hardware availability.
Page | 35
ICTNWK422 - Install and manage servers| Learner guide
Router:
A router links several networks and uses packet forwarding routing. It is an OSI Layer-3
interface that operates with a host or node's logical address. Compare this with a switch
that operates on a host or node physical address (e.g. MAC address).
Gateways:
Gateways are the most complex functionality devices. They normally operate in the
uppermost OSI layers. A gateway links two separate settings, for example a framework
relay network and an X.25 network.
AN device:
Other network communication devices not directly involved in transferring network data
are:
• Modems
• CSU/DSU
Modems:
Broadband Modem
Analog modems are also used to link via standard telephone lines to the Internet. The
same frequencies used for voice transmission are used in these modems. Therefore, when
using this modem to connect to the Internet, you cannot make call or receive a call (voice
call).
Broadband modems are wired to the central office using a different technology. The voice
frequencies are not used to communicate through the telephone. As a consequence, by
using the broadband modem, you will make or receive a voice call. Speed is another
advantage with broadband modems. Multiple megabit speeds per second are common for
broadband modems, which are limited to 56 kbps while using analogue modems.
Page | 36
ICTNWK422 - Install and manage servers| Learner guide
ISDN is short for the Integrated Service Digital Network (ISDN). It offers digital services
via traditional telephone wires. You can connect your phone through a terminal adapter to
an ISDN line (TA). An ISDN modem has higher speeds than analogue modems but much
less speed than broadband modems.
CSU/DSU:
CSU/DSU stands for the Channel Service Unit. These are typically used for Telcos leased
cables. The CSU ends the line on the client's side. The DSU transmits the signal through
the CSU.
Please refer the following links related to installing, configuring and connecting router
to other devices:
https://www.cisco.com/c/en/us/td/docs/routers/access/800/hardware/installation/
guide/800HIG/installing.html
https://www.cisco.com/c/en/us/td/docs/routers/access/1800/1801/software/
configuration/guide/scg/routconf.html
Page | 37
ICTNWK422 - Install and manage servers| Learner guide
You must ensure that the functional level of the domain is Windows Server 2008 or later
before you can create sophisticated password policies for a domain. You can do this either
with ADAC or with Windows PowerShell. Please note that Domain Admin credentials or
more are needed to increase the usable domain level for a domain.
Pick the Active Directory Administrative Center (ADAC) from the Tools menu to configure a
sophisticated password policy for Windows Server 2012 Server Manager.
You can use a user-friendly one-screen interface to specify the familiar password policy
settings in the Build Password Settings windows.
Finally, press Add and pick the group or groups to which the policy is intended. To build a
new policy, click OK.
Note:
You can also use Windows PowerShell for building, updating or removing your domain's
fine-grained password policies. The New-ADFineGrainedPasswordPolicy cmdlet helps you
for example to build a new fine-grained password policy. You can also change an existing,
fine-grained password policy using Set-ADFineGrainedPasswordPolicy cmdlet. And you can
take the Remove-ADFineGrainedPasswordPolicy cmdlet to remove a detailed, redundant
password policy in your setting. Use the Get-Help cmdlet to show each of these cmdlets
with a syntax and examples.
The patch programme aims to resolve vulnerabilities that result in security vulnerability,
corruption of sensitive system data or failure of the system. For network administrators,
such vulnerabilities can be a nightmare. It is also difficult for IT administrators to build a
solution without knowing how fragile their systems are. They search for a patch
deployment software that scans for network vulnerabilities, detects missing security fixes,
applies them immediately and mitigates risk. It also scans the patch deployment software.
Desktop Central's agent-based solution manages all forms of patch management for
Windows, Mac and Linux applications. This includes device discovery, identification of
required Windows updates, Mac Updates and Third Party Applications information,
deployment of patches, hotfixes, security updates and patch reports to simplify working
for network management. Network Administrators are free to opt for this fully integrated
Page | 38
ICTNWK422 - Install and manage servers| Learner guide
programme for patch management and never have to think about patching Windows
systems. For both Windows Active Directory and Workgroupe-based networks, the
Desktop Central Patch Management solution works. You can use a single patch
management software now to handle Microsoft and Non-Microsoft updates.
See Securing Windows Desktops for how Desktop Central can boost desktop security. The
Enterprise Desktop Central Server (Customer site) searches the networks of the company
network, tests for missing and usable Windows patches against a complete database
vulnerability, instals and deploys missing Microsoft patches and service packages, and
produces reports that efficiently control the company's patch management process.
Desktop Central checks all systems of operating systems and software for missing patches
of the Windows. After the scan, it reports the degree of vulnerability. These missing
Windows patches are contained in the local vulnerability database, frequently syncing with
the external online vulnerability database of Manage Engine.
Patches approval
Patches are typically implemented in a test environment until the entire network is
deployed. This free and stable the deployment bug. You should ensure that the patches
reviewed by the team are automatically accepted for deployment if you have a team of
system administrators. This would give more time for other important tasks.
Deployment of patch
Desktop Central deploys updates based on incomplete device or Microsoft patches. The
agent applies security fixes and Windows patches when deployed. The patch deployment
status in Desktop Central is then changed. You can programme the installation process
from the patch settings option.
Reports on Repair
For device vulnerability level, missing Windows patches, relevant Windows patches and
task status, patches are available. Reports are available in PDF or CSV formats.
Desktop Central helps managers to build and customise levels of severity for the missing
patches so that they do not have to assess system health and vulnerability on the basis of
a generic list of missing patches. This helps to deploy extreme patches and guarantees
accurate detection of missing patches.
Automate the patch management process with the automated patch deployment
functionality of Desktop Central. Now you can instal missing updates on your network
computers automatically. You can automate tasks with the automated patch deployment
function including:
• Detection and download of missing patches from the pages of the vendors
For a particular collection of client systems, the automation of all the patch deployment
levels listed above can be specified. For various sets of client systems, you can opt to
provide different levels of automation. The process of automatically installing patches
depends on the degree of automation you pick.
Anti virus definition updates are very relevant for businesses running Microsoft Forefront
Client Protection applications in order to protect their networks against Trojan attacks and
viruses. In the event of increasing malicious code, network administrators must track such
regular description changes to prevent potential malfunctions. However you can simplify
the process using the Patch Management options of Desktop Central. Use automated patch
deployment to also search the virus definition systems for updates; define the action to be
carried out when the scanning is successful.
Page | 40
ICTNWK422 - Install and manage servers| Learner guide
If you cannot access files or directory services, you must restore them. Only when you
have used backup or another application to backup files will restore operations. You can
restore the complete backup medium, one or more backup sets, or individual files using
Backup. After the restoration process begins, the system state data can be restored.
Only information about the first backup collection is shown if you insert a backup medium
to restore data. First load the catalogue by right-clicking the media and choosing the
catalogue to restore the medium as a whole. Otherwise if you pick a medium, only the
shown sets are chosen.
All system state data applicable to your device will be restored when you restore the
system state data. Owing to dependencies of system state components, however,
individual components of system state data cannot be backed up or restored.
Backup startup.
Click on the Restore tab, then select the check box to restore a drive, folder or file.
To restore System State details and all other data selected for the current restore
process, select a checkbox System State.
Caution If you restore the system state data and do not specify an alternate
location for the restored data, the system state information on the server is
replaced with the system state data that you restore.
If the tape is in Microsoft Tape Format, you can use Backup to restor data from a tape
backup by using a programme other than Backup (MTF). While the tape does not have the
full data in the on-the-table catalogue generated by Backup, the information must be
equivalent. Furthermore, some older tape backup systems can not allow the development
of complete on-tape catalogues with Backup. If you believe that your tape backup does
not help the production of a complete on-staple catalogue, please contact the vendor.
Backup maintains permissions, ownership and audit flags on NTFS files, but not on FAT
files that are restored to volumes. This type of knowledge cannot be secured on FAT
volumes. You may not need to restore security details if you restore files to a new device
or hard disc. The files inherit the NTFS directory permissions under which they are stored.
If no permissions exist in the directory, the file retains its previous permissions, including
ownership.
If you've done regular backups of your Windows Server 2012 machine and decide that you
need to roll back an entire server to a certain date, you will ideally need an application-
consistent, timely and full disc image to restore from. You have the option to see which
items can be retrieved in that backup by selecting the Recover Action pane inside the
Windows Server backup programme and then setting the date and time of the desired
backup to restore from.
Page | 42
ICTNWK422 - Install and manage servers| Learner guide
Self-check assessment
QUESTION 1
What are the different types of partition? Also define the importance of virtual
memory.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
QUESTION 2
What are the security patches? How does security patches help to increase
system reliability?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
QUESTION 3
When is the restoration of the data possible? How files security affect
restoration of the data?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Page | 43
ICTNWK422 - Install and manage servers| Learner guide
Page | 44
ICTNWK422 - Install and manage servers| Learner guide
Page | 45
ICTNWK422 - Install and manage servers| Learner guide
Directory services are software programmes that directly connect to key databases to
control network user identities and protection. For several medium-sized and large
enterprises, they are critical.
Modern directory services can store rich information on users and other organisational
items and can provide this information safely for users and applications. This allows
knowledge to be centrally stored and then made accessible to other applications, when
required.
Microsoft Active Directory and Novell's eDirectory are the most commonly used directory
utilities (formerly NDS or Novell Directory Services).
Specialist directory services are also available, one of which is OpenLDap - a directory
server built by the open source community for Lightweight Directory Access Protocol
(LDap).
Directory services strive to adopt LDap, an internet protocol that is used to access
information from servers via e-mail and other programmes. At least every high-end
directory should be LDap-certified and the LDap v3 specification should be endorsed.
In previous Windows NT versions, Microsoft claimed to provide a directory service, but was
very short of other industry standards. A system should meet the following requirements
to be considered a legitimate corporate directory service:
• The information store can be spread between several different physical locations if
appropriate. However it appears as a single database for search and administration
purposes.
• The information store can handle new types of artefacts to meet evolving network needs
as appropriate.
• Users and administrators can quickly search across the network for details from different
locations.
• The information store can be accessed from many different operating systems. This is
usually possible due to the non-owned contact principles used in the framework.
Active Directory Services relies on a "blueprint" which defines object types stored in the
information store. The official term in Active Directory for this "blueprint" is the schema.
The great news for you as an administrator is that this scheme is extendable — a simple
Page | 46
ICTNWK422 - Install and manage servers| Learner guide
way to suggest that you can add objects and their attributes to the scheme to describe
additional components on your network. Indeed you can accommodate almost any
information you want to store in Active Directory. For example, you may want your Active
Directory information store to provide employee ID information for each user account.
Although the schema already has hundreds of user attributes, there is no attribute, but it
should be added! Just note the transaction information is not kept here — leave it to a
complete database system.
Active Directory provides comprehensive network users search functionality. You can
search for any object stored in the directory using any of the search criteria attributes of
the object. Following the example above, you might look for all network users who have
greater employee ID numbers than a certain value. Thanks to a special Advertising service
called the global catalogue, this is all so easy and versatile. This particular subset of the
information store is found on selected domain controllers known as global catalogue
servers. These servers store the entire information store section that is most often used
for searching. They are very effective in meeting network users' demands (including
administrators). Global catalogue servers easily and reliably locate resources regardless of
their actual network location.
Active Directory is not the only city directory service. As Novell would like to name it these
days, Novell has either the Directory Services (NDS) or Edirectory. Banyan have
StreetTalk, and Sun Microsystems, Netscape, and others are bound to see us.
Support for LDAP would be crucial to the success of these competing directory services
(Lightweight Directory Access Protocol). LDAP defines a standard, vendor-independent
directory service query syntax. ADS from Microsoft offers robust LDAP support.
Phase 2: Click on Promote this server to a domain controller in the notifications window
Phase 3: Select Add a new forest and enter the root domain name from your deployment
options. Next Click
Phase 4: Leave Windows Server 2012 R2 as the default collection on the forest and
domain functional level in the domain controller options window. Keep the Domain Name
System (DNS) server in place and include the DSRM password. Next Click
Phase 6: Search NetBIOS domain name in additional options window, and select Next
Phase 7: Remember the database, log files and folder paths for SYSVOL and select Next
Phase 8: Search the window for choices, e.g. domain name, NetBIOS name and global
catalogue. Next Click
When you complete the installation, you will be prompted to successfully configure your
computer as a domain controller and to reboot automatically.
Page | 47
ICTNWK422 - Install and manage servers| Learner guide
Please refer the following link to integrate active directory in Linux server.
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/
html/windows_integration_guide/introduction
Page | 48
ICTNWK422 - Install and manage servers| Learner guide
The following topics provide information about how to use the Windows Server Essentials
Dashboard to manage the user accounts on the server:
When you add a user account, the assigned user can log on to the network, and you can
give the user permission to access network resources such as shared folders and the
Remote Web Access site. Windows Server Essentials includes the Add a User Account
Wizard that helps you:
In the Users Tasks pane, click Add a user account. The Add a User Account
Wizard appears.
When you choose to remove a user account from the server, a wizard deletes the selected
account. Because of this, you can no longer use the account to log on to the network or to
access any of the network resources. As an option, you can also delete the files for the
user account at the same time that you remove the account. If you do not want to
permanently remove the user account, you can deactivate the user account instead to
suspend access to network resources.
Page | 49
ICTNWK422 - Install and manage servers| Learner guide
In the list of user accounts, select the user account that you want to remove.
In the <User Account> Tasks pane, click Remove the user account. The
Delete a User Account Wizard appears.
On the Do you want to keep the files? page of the wizard, you can choose to
delete the user’s files, including File History backups and the redirected folder for
the user account. To keep the user’s files, leave the check box empty. After making
your selection, click Next.
The Users section of the Windows Server Essentials Dashboard displays a list of network
user accounts. The list also provides additional information about each account.
In the list of user accounts, select the account for which you want to view or
change properties.
In the <User Account> Tasks pane, click View the account properties.
The Properties page for the user account appears.
To save any changes that you make to the user account properties, click Apply.
The display name is the name that appears in the Name column on the Users page of the
Dashboard. Changing the display name does not change the logon or sign-in name for a
user account.
In the list of user accounts, select the user account that you want to change.
Page | 50
ICTNWK422 - Install and manage servers| Learner guide
In the <User Account> Tasks pane, click View the account properties.
The Properties page for the user account appears.
On the General tab, type a new First name and Last name for the user account,
and then click OK.
When you activate a user account, the assigned user can log on to the network and access
network resources to which the account has permission, such as shared folders and the
Remote Web Access site.
In the list view, select the user account that you want to activate.
In the <User Account> Tasks pane, click Activate the user account.
When you deactivate a user account, account access to the server is temporarily
suspended. Because of this, the assigned user cannot use the account to access network
resources such as shared folders or the Remote Web Access site until you activate the
account.
If the user account has a Microsoft online account assigned, the online account is also
deactivated. The user cannot use resources in Office 365 and other online services that
you subscribe to, but the user’s data, including email, is retained in Microsoft Online
Services.
In the list view, select the user account that you want to deactivate.
In the <User Account> Tasks pane, click Deactivate the user account.
Page | 51
ICTNWK422 - Install and manage servers| Learner guide
and they have permissions to access a computer. Users access their user accounts with
their user name and password.
There are two main types of user accounts. Each type gives users a different level of
control over the computer:
Standard accounts are for everyday computing. The standard account helps protect your
network by preventing users from making changes that affect other users, such as
deleting files or changing network settings.
Administrator accounts provide the most control over a computer network. You should
assign the administrator account type only when necessary.
o Whether the user account has Anywhere Access permission. Anywhere Access
permission for a user account is either Allowed or Not allowed.
o Whether the File History for this user account is managed by the server running
Windows Server Essentials. The File History status for a user account is
either Managed or Not managed.
o The level of access that is assigned to the user account. You can assign
either Standard user access or Administrator access for a user account.
o A set of user account administrative tasks such as viewing and removing user
accounts, and changing passwords.
o Tasks that allow you to globally set or change settings for all user accounts in
the network.
Page | 52
ICTNWK422 - Install and manage servers| Learner guide
Page | 53
ICTNWK422 - Install and manage servers| Learner guide
The following topics provide information about how to use the Windows Server Essentials
Dashboard to manage user account passwords and user access to the shared folders on
the server:
In the list of user accounts, select the user account that you want to reset.
In the <User Account> Tasks pane, click Change the user account password.
The Change User Account Password Wizard appears.
Type a new password for the user account, and then type the password again to
confirm it.
Use the following procedure to set or change the password policy to any of four pre-
defined policy profiles.
Open the Windows Server Essentials Dashboard, and then click Users.
On the Change the Password Policy screen, set the level of password strength
by moving the slider.
As a best practice, you should assign the most restrictive permissions available that still
allow users to perform required tasks.
You have three access settings available for the shared folders on the server:
Page | 54
ICTNWK422 - Install and manage servers| Learner guide
Read/Write. Choose this setting if you want to allow the user account permission
to create, change, and delete any files in the shared folder.
Read only. Choose this setting if you want to allow the user account permission to
only read the files in the shared folder. User accounts with read-only access cannot
create, change, or delete any files in the shared folder.
No access. Choose this setting if you do not want the user account to access any
files in the shared folder.
The network administrator can remove a user account and choose to keep the user’s files
for future use. In this scenario, the removed user account can no longer be used to sign in
to the network; however, the files for this user will be saved in a shared folder, which can
be shared with another user.
In the list of user accounts, select the user account that you want to remove.
In the <User Account> Tasks pane, click Remove the user account. The
Delete a User Account Wizard appears.
On the Do you want to keep the files? page, make sure that the Delete the
files including File History backups and redirected folder for this user
account check box is clear, and then click Next.
A confirmation page appears warning you that are deleting the account but keeping
the files.
After the user account is removed, the administrator can give another user account access
to the shared folder.
On the navigation bar, click Storage, and then click the Server Folders tab.
In the Users Tasks pane, click Open the folder. Windows Explorer opens and
displays the contents of the Users folder.
Right-click the folder for the user account that you want to share, and then
click Properties.
In <User Account> Properties, click the Sharing tab, and then click Share.
Page | 55
ICTNWK422 - Install and manage servers| Learner guide
In the File Sharing window, type or select the user account name with whom you
want to share the folder, and then click Add.
Choose the Permission Level that you want the user account to have, and then
click Share.
In the default installation of Windows Server Essentials, network users do not have
permission to establish a remote connection to computers or other resources on the
network.
Before network users can establish a remote connection to network resources, you must
first set up Anywhere Access. After you set up Anywhere Access, users can access files,
applications, and computers in your office network from a device in any location with an
Internet connection.
The Set Up Anywhere Access Wizard allows you to enable two methods of remote access:
When you run the wizard, you can also choose to allow Anywhere Access for all current
and newly added user accounts.
To set up Anywhere Access, open the Dashboard Home page, click SETUP, and then
click Set up Anywhere Access.
For more information about Anywhere Access, see Manage Anywhere Access.
This section applies to a server running Windows Server 2012 Essentials or Windows
Server 2012 R2 Essentials, or to a server running Windows Server 2012 R2 Standard or
Windows Server 2012 R2 Data center with the Windows Server Essentials Experience role
installed.
If you want users to use remote access, and/or have individual user accounts, after you
finish connecting a computer to the server, you can create new network user accounts for
the users of the networked computer on the server by using the Dashboard. For more
information about creating a user account, see Add a user account. After creating the user
accounts, you must provide the network user name and password information to the users
of the client computer so that they can access resources on the server by using the
Launchpad.
For each user account that you create you can set access for the following through the
user account properties:
Page | 56
ICTNWK422 - Install and manage servers| Learner guide
user accounts to access shared folders on the Shared folders tab of the user
account properties.
In the list of user accounts, select the user account that you want to edit.
In the <User Account> Tasks pane, click View the account properties.
On the Shared folders tab, set the appropriate folder permissions for each shared
folder as needed.
To allow a user to connect to the server by using VPN, select the Allow Virtual
Private Network (VPN) check box.
To allow a user to connect to the server by using Remote Web Access, select
the Allow Remote Web Access and access to web services
applications check box.
On the Computer access tab, select the network computers that you would like
the user to have access to.
In the list of user accounts, select the user account that you want to edit.
o On the General tab, select User can view network health alerts if the
user account needs to access network health reports.
o On the Shared folders tab, set the appropriate folder permissions for each
shared folder as needed.
Page | 57
ICTNWK422 - Install and manage servers| Learner guide
o To allow a user to connect to the server by using VPN, select the Allow
Virtual Private Network (VPN) check box.
o To allow a user to connect to the server by using Remote Web Access, select
the Allow Remote Web Access and access to web services
applications check box.
o On the Computer access tab, select the network computers that you would
like the user to have access to.
You can use a virtual private network (VPN) to connect to Windows Server Essentials and
access all your resources that are stored on the server. This is especially useful if you have
a client computer that is set up with network accounts that can be used to connect to a
hosted Windows Server Essentials server through a VPN connection. All the newly created
user accounts on the hosted Windows Server Essentials server must use VPN to log on to
the client computer for the first time.
In the list of user accounts, select the user account to which you want to grant
permissions to access the desktop remotely.
On the Anywhere Access tab, to allow a user to connect to the server by using
VPN, select the Allow Virtual Private Network (VPN) check box.
You can manage access to any shared folders on the server by using the tasks on
the Server Folders tab of the Dashboard. By default, the following server folders are
created when you install Windows Server Essentials:
File History Backups. By default, Windows Server Essentials stores file backups
created by using File History. This server folder is not shared.
Folder Redirection. Used to store and access folders that are set up for folder
redirection by network users. This server folder is not shared.
Page | 58
ICTNWK422 - Install and manage servers| Learner guide
Music. Used to store and access music files by network users. This folder is created
when you turn on media sharing.
Pictures. Used to store and access pictures by network users. This folder is
created when you turn on media sharing.
Recorded TV. Used to store and access recorded TV programs by network users.
This folder is created when you turn on media sharing.
Videos. Used to store and access videos by network users. This folder is created
when you turn on media sharing.
Users. Used to store and access files by network users. A user-specific folder is
automatically generated in the Users server folder for every network user account
that you create.
Navigate to and select the server folder for which you want to modify permissions.
Page | 59
ICTNWK422 - Install and manage servers| Learner guide
The Active Directory structure and storage architecture consists of four parts:
Active Directory domains and forests. Forests, domains, and organizational units (OUs)
make up the core elements of the Active Directory logical structure. A forest defines a
single directory and represents a security boundary. Forests contain domains.
Domain Name System (DNS) support for Active Directory. DNS provides a name
resolution service for domain controller location and a hierarchical design that
Active Directory can use to provide a naming convention that can reflect organisational
structure.
Schema. The schema provides object definitions that are used to create the objects
that are stored in the directory.
Data store. The data store is the portion of the directory that manages the storage and
retrieval of data on each domain controller.
The following figure illustrates the Active Directory data structure and storage
architecture.
Domains partition the directory into smaller sections within a single forest. This
partitioning results in more control over how data is replicated so that an efficient
replication topology can be established and network bandwidth is not wasted by replicating
data where it is not required. OUs make it possible to group resources in a domain for
management purposes, such as applying Group Policy or delegating control to
administrators.
The following figure illustrates the relationships of OUs, domains, and forests in the logical
structure architecture.
Active Directory uses DNS as its domain controller location mechanism. When any of the
principal Active Directory operations, such as authentication, updating, or searching, is
performed, domain joined computers use DNS to locate Active Directory domain
controllers, and these domain controllers use DNS to locate each other. For example, when
a network user with an Active Directory user account logs on to an Active Directory
domain, the user’s computer uses DNS to locate a domain controller for the
Active Directory domain to which the user wants to log on.
Page | 60
ICTNWK422 - Install and manage servers| Learner guide
Page | 61
ICTNWK422 - Install and manage servers| Learner guide
The Active Directory schema contains definitions for all the objects that are used to store
information in the directory. There is one schema per forest. However, a copy of the
schema exists on every domain controller in the forest. This way, every domain controller
has quick access to any object definition that it might need, and every domain controller
uses the same definition when it creates a given object. The data store relies on the
schema to provide object definitions, and the data store uses those definitions to enforce
data integrity. The result is that all objects are created uniformly, and it does not matter
which domain controller creates or modifies an object because all domain controllers use
the same object definition.
The following figure illustrates the relationship of the schema to the data store in the
schema architecture.
Schema Architecture
The Active Directory data store is made up of several components that together provide
directory services to directory clients. These components include the following:
Four interfaces:
The following figure illustrates the relationships of these components in the data store
architecture.
You can define some components for structure and storage in Active Directory, while
others are defined by the system and cannot be modified.
Forests, domains, and OUs are components that constitute the logical structure of
Active Directory. You define them during the installation of Active Directory.
DNS support for Active Directory includes components that are used to locate
domain controllers and that use DNS naming schemes. Each domain in a forest
must adhere to DNS naming schemes, and domains are organized in a root and
subordinate domain hierarchy.
Page | 62
ICTNWK422 - Install and manage servers| Learner guide
The schema is a single component that exists inside the directory. The schema
contains definitions of the objects that are used to store information in the
directory. These object definitions include two primary components: classSchema
objects and attributeSchema objects.
The data store consists of three layers of components. The first layer provides the
interfaces that clients need to access the directory. The second layer provides the
services that perform the operations that are associated with reading data from and
writing data to the directory database. The third layer is the database itself, which
exists as a single file on the hard disk of each domain controller.
Page | 63
ICTNWK422 - Install and manage servers| Learner guide
Self-check assessment
QUESTION 1
QUESTION 2
QUESTION 3
Page | 64
ICTNWK422 - Install and manage servers| Learner guide
Page | 65
ICTNWK422 - Install and manage servers| Learner guide
Page | 66
ICTNWK422 - Install and manage servers| Learner guide
Make sure your server benchmarks are precise, relevant and repeatable to boost
benchmarking. The benchmark is only useful if properly done.
IT professionals have often relied on metrics to assess data centre efficiency. Yet server
benchmarks are only as precise as the people who use them and the measurement
conditions. Too often, incorrect benchmarks are used, they do not represent actual
operating conditions or are deployed carelessly or for incorrect reasons. When working on
server benchmarks, follow these five main steps.
While you can assess various organisational criteria, this form of systematic process takes
time for IT personnel who are already burdened with heavy workloads and tight budgets.
Administrators have to consider the issue they want to address first. It can be so easy as
testing the performance claims from a supplier before buying a server of the next
generation, searching for underspended device resources to consolidate or even tackle a
suspected performance problem. With a simple purpose in mind, you know which
parameters to calculate – use of the CPU may be interesting, but it has little value for
solving a network I/O problem, for example.
There are several tools on the market for server benchmarks, and every one usually does
a very specific job. When you identify the benchmark criteria, concentrate on choosing a
methodology that best tests what you need to know.
The SPEC produces a number of benchmarks that are routinely used in IT environments.
For example, SPEC CPU2006 tests computational workload output and SPECjbb2013
benchmarks the performance of the Java programme. Using the new version of the
benchmark to ensure that existing hardware is correctly defined and calculated.
In general, avoid vendor-based tools for server benchmarking due to vendor distortion; it
is hard to be shocked if a "vendor X" benchmarking tool reports the server better.
Benchmarks provide reliable information only while the server is working under current
load conditions. A benchmark cannot always be installed on a functioning production
server. Benchmarks are instead mostly used in a research and development environment
or other simulated systems, which do not imitate properly CPU, workload, storage and
network traffic patterns.
A classic case is to benchmark a CPU that does not operate without the OS and
benchmarks. Naturally, it will then have plenty of spare capacity. A test configuration
involves transaction scripting or load generators to simulate actual work conditions is used
by a number of organisations with structured server benchmarking processes in place.
Performance may be influenced by factors such as load balance and even data placing on
Page | 67
ICTNWK422 - Install and manage servers| Learner guide
disc, so IT professionals must take into account any aspect of the server implementation
when obtaining benchmark data.
Many data centre servers do not keep the load steady. A workload on the web server will
see greater use of the network and disc during working hours when a payroll programme
can only be used for a few days per month. That means that the server's output is not
accurate with a single point-in-time snapshot. Continue running the benchmark or running
multiple tests as working load conditions change. This helps to recognise factors that
cause suddenly poor performance and improvement by updating or re-balancing of
workloads.
Server benchmarks permit data centre administrators to calculate key system performance
attributes, make informed performance decisions over time and compare various servers.
Although most benchmarks are deployed quickly and easily, meaningful outcomes will
depend on an objective or objectives, selects the right tools, tests under actual (or closest)
loads and over a duration, and retains copious documentation for future reference and
validation.
Page | 68
ICTNWK422 - Install and manage servers| Learner guide
The main components for an effective server surveillance strategy are to define key
metrics, baseline the metrics in order to correctly interpret the server output for warning,
and to extract added value from major metrics through reporting.
You must always seek and respond to feedback on server performance from required
personnel such as your supervisors and managers.
Page | 69
ICTNWK422 - Install and manage servers| Learner guide
Syntax
Detailed description
Delegation may be required when using this cmdlet with Windows PowerShell® remoting
and changing user configuration.
Parameters
ALLOWUNTRUSTEDROOT
Specifies whether the root certificate is required to be trusted in chain building. When this
parameter is used, the certificate chain is built but an untrusted root is allowed. Other
errors are still verified against in this case, such as expired. If this parameter is not
specified, then revocation status is checked by default.
Aliases none
Required? false
Position? named
Page | 70
ICTNWK422 - Install and manage servers| Learner guide
-Cert<Certificate>
Specifies the certificate to test. Either the certificate object or a path to the certificate in a
certificate store can be specified.
Aliases none
Required? true
Position? 1
-DNSName<String>
Aliases none
Required? false
Position? named
Page | 71
ICTNWK422 - Install and manage servers| Learner guide
-EKU<String>
Specifies a list of enhanced key usage (EKU) object identifiers to verify for the certificate
chain.
Aliases none
Required? false
Position? named
-Policy<TestCertificatePolicy>
Specifies the policies that will be applied to verify the certificate. The acceptable values for
this parameter are: AUTHENTICODE, BASE, NTAUTH, and SSL. If this parameter is not
specified, then the BASE policy is used.
Aliases none
Required? false
Position? named
Page | 72
ICTNWK422 - Install and manage servers| Learner guide
-User
Specifies whether the user or machine context is used to test the certificate. If this
parameter is not specified, then the machine context is used.
Aliases none
Required? false
Position? named
<CommonParameters>
Inputs
The input type is the type of the objects that you can pipe to the cmdlet.
Microsoft.CertificateServices.Commands.Certificate
Outputs
Page | 73
ICTNWK422 - Install and manage servers| Learner guide
The output type is the type of the objects that the cmdlet emits.
System.Boolean
If the verification succeeds, then the return value is True; otherwise the return value
is False.
Examples
EXAMPLE 1
This example verifies each certificate in the MY store of the local machine and verifies that
it is valid for SSL with the DNS name specified.
Windows PowerShell
EXAMPLE 2
This example verifies that the provided EKU is valid for the specified certificate and its
chain. Revocation checking is not performed.
Windows PowerShell
Change Control is a general term describing the process of managing how changes are
introduced into a controlled System. Change control demonstrates to regulatory
authorities that validated systems remain under control during and after system changes.
Change Control systems are a favourite target of regulatory auditors because they vividly
demonstrate an organisation’s capacity to control its systems.
Organisations need to explicitly define their processes for evaluating changes to validated
systems. There should be a well-defined, multidisciplinary approach to considering the
effects from proposed changes. Some changes, such as adding a data field to a form or
report may be very minor; other changes, such as altering how a program stores and
organizes data can be quite extensive. Before changes are implemented, organizations
should document the expected outcomes of the changes and have an established plan to
implement and test the change and update any existing validation documentation. Part of
defining the process for evaluating change control should include the requirements for
implementing minor, major and critical changes. This allows the organization to focus
proportionate validation resources to the change effort.
One useful tool to determine the extent of revalidation is Risk Assessment. By reviewing
the original validation requirements, and evaluating the new risks introduced through the
changes to the system, the Risk Assessment process can help determine which sections of
the system will need re-testing. If the risk assessment determines that the change is
minor or does not affect the system requirements, only limited testing, focused on the
affected system object would be required to demonstrate that the system has maintained
Page | 74
ICTNWK422 - Install and manage servers| Learner guide
its validated state. Major changes will require additional re-validation and critical changes
could trigger and entire re-validation of a system.
Page | 75
ICTNWK422 - Install and manage servers| Learner guide
Request the Change – The System Owner formally requests a change to the system.
Assess the Impact of the Change – Before the change is made, the system owner and
other key stake holders, including Quality, determine how the change will affect the
system.
Implementation of the Change – The changed system is released to the site and users
are trained on changes to the system. For computer systems, this means pushing the
changes out to general users. For equipment, process or method validation, this means
introducing the system into the larger production process.
Page | 76
ICTNWK422 - Install and manage servers| Learner guide
Self-check assessment
QUESTION 1
QUESTION 2
What are the server benchmarking goals and how to identify right
benchmarking tools?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
QUESTION 3
Name any five (5) tools and utilities used for troubleshooting Windows
Server?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Page | 77
ICTNWK422 - Install and manage servers| Learner guide
Page | 78
ICTNWK422 - Install and manage servers| Learner guide
Page | 79
ICTNWK422 - Install and manage servers| Learner guide
A data centre should be prepared for the worst but at all costs aim to prevent it. Suitable
device documentation helps eliminate critical errors.
One of the most significant failings of any data centre is the lack of consistent and
informative documentation on servers.
IT professionals know how to mount and configure the most complicated machines, but
also lack a good communication ability. As a result, companies rely on administrators'
memory or informally shared information to create problems and prevent integration,
update and repair troubleshooting because administrators either forget what they did or
leave behind a vacuum of knowledge.
No single defined framework or server documentation standard exists. The focus is not on
the direction but on how each device is equipped, configured and incorporated into the
data centre so other IT professionals can comprehend, evaluate, update and overcome it
and the production environment with minimal time spent.
Organizations record their servers and applications differently, using a broad variety of
information and requirements. However there are ways to store dangerous documentation.
Lists. Lists. Start with an inventory of hardware that lists all major components. Follow
that with a software inventory detailing operating systems, hypervisors, virtual machines,
drivers, applications (workloads) and all the related licencing details.
Any device inventory tool can detail and upgrade hardware and software in a time frame,
but a printed list of components provides a complete description that can be easily
compared to system purchasing requirements. Organize inventory reports with the original
media and all original manufacturer records, such as manuals or configuration guides.
Directions. Directions. Next, record everything relevant to the setup and configuration of
each device, beginning with its firmware options (BIOS settings). Document start scripts,
too. Notoriously, command-line scripts lack comments, so add them in the future for
easier improvements or troubleshooting. Then implement a version control system that
allows administrators to monitor each version and understand whether a system might use
outdated or deceptive scripts.
Document system integration into the wide data centre, including the LAN address, media
access control or MAC, address for each network interface card port, and external notes
showing how the network switch links the system. Taken together this knowledge provides
a network map for IT professionals to track current architectures and to recommend
changes in infrastructure.
system updating process and related documentation when changes occur. Failure to log
can be worse than no documentation.
As with the quality of device and server documents, there is no easy way to manage it.
System documentation should preferably be similar to the physical system such that
essential information are accessible easily when uptime is available online. Keep
documents for something other than the framework. Documentation is intended to help fix
problems, but storing notes on the local hard drive of the system won't do any good if the
system fails and becomes unavailable.
You pick this path, set up a shelf in the data centre for manuals, configuration files and
other information. Redundant paper copies should be avoided – modifications to one copy
are often not migrated to subsequent copies, leading to errors and misunderstanding.
The medium of the paper itself makes no functional difference. Paper prints, optical disc
archives, Flash drive documents - even a library of electronic manuals and primary storage
area network documentation files: all of these mediums are suitable in terms of the size
and complexity of your environment. Systems management software will create very few
hard copy documents. Ensure continuity and restructuring in order to make every
information accessible.
In general, when the system is installed and implemented, the vendor documentation
accompanying a new server is of limited value but it is a good practise to maintain vendor
documentation for new documentation you make.
However when an outdated device is recast, the original document and the new
configuration add value (sold to another user or reassigned to another business unit).
Tools document processes and provide users with a step-by-step insight into key
procedures.
One tool, originally released with Windows 7 and Windows Server 2008R2, is Microsoft's
Issue Steps Recorder (PSR.exe), which help workers to see what is happening on remote
desktops. IT administrators recognised the opportunity to save this operation in a zip-in
MHTML report for more than remote user activities, by documenting and commenting on
each mouse click.
The Windows Server 2012 tool allows critical activities on both client and server side
systems to be tracked and reported. It provides a recording library to which workers may
Page | 81
ICTNWK422 - Install and manage servers| Learner guide
refer when discussing essential settings and configuration activities. Click Start, type psr in
the search line and click the PSR applet on the search results list to start PSR.exe.
There are no clear guidelines for recording any aspect of a data centre, meaning that the
quantity and quality of the documentation differ between organisations. Peer review
strengthens documentation, allows other IT employees to read content and provide input
on its consistency and completeness. And data centre managers can take the time to
undergo daily training so that IT workers can familiarise themselves with the
documentation before they need it.
Page | 82
ICTNWK422 - Install and manage servers| Learner guide
All server status should be properly documented according to organisational guidelines and
procedures.
Page | 83
ICTNWK422 - Install and manage servers| Learner guide
E-waste can pose a danger to human health and the environment if improperly handled. It
can be a fire threat. E-waste hazardous substances may also leak or release into air, soil
and water. Unfortunately most e-waste ends up in places where it can cause severe
environmental issues because harmful chemicals such as plum, mercury and arsenic are
stored, contaminating our soil and water and disrupting our habitats and our health.
Page | 84
ICTNWK422 - Install and manage servers| Learner guide
Self-check assessment
QUESTION 1
QUESTION 2
QUESTION 3
Page | 85
ICTNWK422 - Install and manage servers| Learner guide
References
1. and, I. (2018, July 27). Work Health and Safety (OHS) acts, regulations and codes
of practice. Retrieved from Business.gov.au website:
https://www.business.gov.au/risk-management/health-and-safety/whs-oh-and-s-
acts-regulations-and-codes-of-practice
2. Ayolt de Roos. (2017, August 3). Small Business Servers: How To Choose Best
Server In 2019. Retrieved from Servermania.com website:
https://blog.servermania.com/choosing-a-small-business-server/
3. Change password policy in Windows Server 2012 R2. (n.d.). Retrieved October 29,
2020, from 4sysops website: https://4sysops.com/forums/topic/change-password-
policy-in-win-server-2012-r2/
4. cicnavi. (2015, December 3). Description of Typical Network Services on Servers -
Utilize Windows. Retrieved from Utilize Windows website:
https://www.utilizewindows.com/description-of-typical-network-services-on-
servers/
5. CIO.com - Tech News, Analysis, Blogs, Video. (n.d.). Retrieved October 29, 2020,
from CIO website: https://www.cio.com/article/2393205/servers/10-key-windows-
server-2012-features-for-it-pros.html
6. How do I create a new partition in Windows Server … | TransIP. (n.d.). Retrieved
October 29, 2020, from www.transip.eu website:
https://www.transip.eu/knowledgebase/entry/144-create-partition-windows-
server-2012/
7. How to Backup Windows: Your Complete Guide to PC Backup. (n.d.). Retrieved
October 29, 2020, from www.backblaze.com website:
https://www.backblaze.com/pc-backup.html
8. How to Write a Client Report: 7 Tips. (2018, August 15). Retrieved October 29,
2020, from MBO Partners website:
https://www.mbopartners.com/resources/article/seven-tips-client-report-writing
9. Howell, D. (2015, August 17). How to choose the right server for your business.
Retrieved from TechRadar website:
https://www.techradar.com/how-to/computing/servers/how-to-choose-the-right-
server-for-your-business-1092468
10. Important features of Linux Operating System - Linux India. (2016, January 20).
Retrieved from Linux India website: http://www.linux-india.org/important-features-
of-linux-operating-system/
11. jaimeo. (2017, October 17). System Requirements. Retrieved from Microsoft.com
website: https://docs.microsoft.com/en-us/windows-server/get-started/system-
requirements
12. Top 10 Windows Server 2012 Features. (2012, September 21). Retrieved from Petri
website: https://www.petri.com/top-10-windows-server-2012-features
13. Trommler, K. P. (n.d.). How to properly announce scheduled network maintenance
to your users. Retrieved October 29, 2020, from blog.paessler.com website:
https://blog.paessler.com/how-to-properly-announce-scheduled-network-
maintenance-to-your-users
Page | 86