M02 - Configuring and Administering Server
M02 - Configuring and Administering Server
Level-III
Based on November 2023, Curriculum
Version-II
Nov, 2023
Addis Ababa, Ethiopia
Contents
Page i of 74 Author/Copyright: Version - 1
Ministry of Labor and Skills Configure and Administer Server Level- III November, 2023
Acknowledgment....................................................................................................................................................................iii
Acronym................................................................................................................................................................................. iv
Introduction to the Module......................................................................................................................................................v
Unit one: Confirm server specification...................................................................................................................................1
1.1. Overview of Server Operating System....................................................................................................................2
1.2. Confirming network operating system.....................................................................................................................3
1.3. Identifying product, vendor architecture and equipment.........................................................................................4
1.4. Identifying technology and resource........................................................................................................................5
Self-check test-1.......................................................................................................................................................................7
Unit Two: Verify server compatibility and inter-operability..................................................................................................8
2.1. Reviewing Hardware and software to ensure compatibility.........................................................................................9
2.3. Installing required operating system and software.....................................................................................................12
2.4. Installing additional tools or third-party software.......................................................................................................13
2.5. Patching operating system and applications...............................................................................................................14
Self-check 2............................................................................................................................................................................15
Operation sheet 2.1. Install Server Operating system........................................................................................................16
3.1. Configuring server......................................................................................................................................................33
3.2. Defining scope and applicability of testing.................................................................................................................40
3.3. Developing test plan....................................................................................................................................................41
3.4. Running system test....................................................................................................................................................41
3.5. Analyzing error report and making changes...............................................................................................................41
3.6. Validating changes......................................................................................................................................................42
Self-Test 3.............................................................................................................................................................................. 43
Operation sheet 3: Install DNS Server..................................................................................................................................44
Operation sheet 3.1 Install Active Directory.........................................................................................................................46
Operation sheet 3.3. Configure DHCP server........................................................................................................................56
Operation sheet 3.4: Create users using server 2012............................................................................................................60
Operation sheet 3.5: Create a GPO in domain server 2012...................................................................................................63
LAB Test 3.1 Install Operating System.................................................................................................................................67
Reference............................................................................................................................................................................... 68
Participants of this Module preparation.................................................................................................................................69
Ministry of Labor and Skills wish to extend thanks and appreciation to the many representatives of TVET
instructors and respective industry experts who donated their time and expertise to the development of this
Teaching, Training and Learning Materials (TTLM).
AA Active Directory
DS Directory Service
DNS Domain Name System
TVET Technical and Vocational Education and Training
TTLM Teaching and Training Learning Material
DHCP: Dynamic Host Configuration Protocol
OS: Operating System
LAN : Local Area Network
WAN Wide Area Network
VPN Virtual Private Network
PSTN Public Switched Telephone Network
UTP Unshielded Twisted Pair
STP Shielded Twisted Pair
VLAN Virtual Local Area Network
CLI Command Line Interface
GUI Graphical User Interface
HDD Hard Disk Drive
SSD Solid State Drive
CHKDSK Check Disk
PDA Personal Digital Assistant
IIS Internet Information Services (Microsoft's web server)
CRM Customer Relationship Management
NOS Network Operating System
UNIX A multiuser and multitasking operating system
TCP/IP Transmission Control Protocol/Internet Protocol
GB Gigabyte
RAM Random Access Memory
DVD Digital Versatile Disc
ROM Read-Only Memory
VGA Video Graphics Array
IEEE Institute of Electrical and Electronics Engineers
ISO International Organization for Standardization
VM Virtual Machine
PKI Public Key Infrastructure
CA Certificate Authority
HTTP Hypertext Transfer Protocol
• Do the LAP test in page (if you are ready) and show your output to your teacher.
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
• Overview of Server Operating System
Software
Network connections.
There are different types of server designs that need to be considered when
identifying equipment.
here are multiple server architectures to choose from, including
Mainframe architecture
File sharing architecture
Client/server architecture
Web based architecture
Thin client architecture
Blade architecture.
Product architecture
It plays a significant role in how to design, make, sell, use, and repair a new product offering .
There are two fundamental types of product architecture: Modular and Integral.
Modular
Organize a product into a number of modules to develop and complete a specific function.
The interaction of these modules carries out the product’s overall purpose.
The advantages of modular include task allocation and outsourcing. As well as, economies of
scale, reuse/standardization for developing new products, maintenance, and mass
customization.
Integral
This Unit is developed to provide you the necessary information regarding the following
content coverage and topics
This guide will also assist you to attain the learning outcome stated in the cover page.
Verify that Random Access Memory (RAM) modules are supported by both the
motherboard and CPU, taking into account factors like RAM type, capacity, and
Additionally, check the compatibility of storage drives, RAID controllers, and networking
Ensure that the power supply unit (PSU) matches the server chassis and motherboard,
providing sufficient power output and appropriate connectors. For graphics processing units
(GPUs), if applicable, confirm compatibility with the motherboard's PCIe slots and check
Matching the server chassis and motherboard form factors is crucial, as well as ensuring
cooling solutions are compatible with both the CPU and chassis.
Lastly, confirm that the chosen operating system is supported, considering driver
availability and compatibility with the server's hardware. Regularly consult manufacturer
Read all the documentation about the products involved. Your hardware or software might
have a recurring problem or might conflict with another product. Frequently, the
manufacturer will document these conflicts and provide a fix. If you do not find the solution
in the supplied documentation, you might contact the manufacturer of the product and ask
for undocumented conflicts.
When you install a new computer or network operating system, your computer will usually
attempt to detect the hardware in the system during the installation process and load the
appropriate drivers for it.
Check the list of detected hardware and ensure that it matches what is already in the
machine.
If you are installing Novell's Intranet Ware, for example, the install utility will automatically
scan your computer for hardware such as hard disks, CD-ROM drives, and NICs. If the
devices are recognized, the appropriate drivers will then be loaded for the recognized devices
As a first step before you install, make sure that you exceed the minimum requirements for
the resources in the computer.
These resources include processor speed, memory, and disk space.
Table lists some minimum hardware requirements for server 2008
Table 1. Minimum Hardware Requirements for window server 2008 operating system
The first step in obtaining a networking device is to put suppliers of that device. Then,
there are factors you need to consider about the supplier and the devices on offer, such as
support provided and purchase price.
This will help you to compare and choose the most appropriate supplier and the exact
model of the device according to client requirements.
Finally, you are ready to place an order for your organization or client to purchase the
device.
2.3. Installing required operating system and software
A server operating system is an advanced operating system designed to run on servers. It has
the necessary features and subsystems to operate in a client-server architecture and serve
clients’ requests. A server OS is designed from the ground up to provide features suitable for
multi-user, business-critical applications. It provides the central interface for managing users,
implementing security, and other administrative processes.
Server operating systems are designed for platforms that act as web servers, application
servers, database servers, email servers, or other platforms running on a dedicated server.
Server operating systems offer various benefits compared to standard operating systems,
including unlimited user connections, more memory, and advanced network optimizations
For example, if you are in Ireland using an Irish-based keyboard, then these defaults won’t
suit you at all! The time zone won’t work correctly, currency symbols will be wrong, and the
keyboard layout will be totally wrong. For example, you will struggle to find the backslash
(\), which is kind of important in the Windows world.
3. When prompted for an installation language and other regional options, make your selection and press Next.
5. Product activation is now also identical with that found in Windows Vista. Enter your Product ID in the next
window, and if you want to automatically activate Windows the moment the installation finishes, click Next.
Because you did not provide the correct ID, the installation process cannot determine what kind of
Windows Server 2008 license you own, and therefore you will be prompted to select your correct
version in the next screen, assuming you are telling the truth and will provide the correct ID to prove your
selection later on.
8. Read and accept the license terms by clicking to select the checkbox and pressing Next.
10. In the "Where do you want to install Windows?", if you're installing the server on a regular IDE hard disk, click to
select the first disk, usually Disk 0, and click Next.
11. The installation now begins, and you can go and have lunch. Copying the setup files from the DVD to the hard
drive only takes about one minute.
12.Then the server reboots you'll be prompted with the new Windows Server 2008 type of login screen.
Press CTRL+ALT+DEL to log in.
Page 19 of 74 Author/Copyright: Version - 1
Ministry of Labor and Skills Configure and Administer Server Level- III November, 2023
13. Click on Other User.
15. You will be prompted to change the user's password. You have no choice but to press Ok.
Step 1: We can download the evaluation ISO of Windows Server 2012 R2 from the following link:
Step 2: After downloading the ISO of Microsoft, create a boot USB driver which can be created with the
Microsoft tool called Windows USB/DVD Download Tool and can be downloaded from the following link:
Step 4: After the files are loaded, you will see the screen of language settings of installation, keyboard, time
and currency format. Generally, all the default ones are also good enough to start with. Click Next.
Step 6: Once you have clicked on Install Now, the setup will start and it will load all the files and the screen
will look as shown in the following screenshot.
Step 8: Click “I accept the license terms” and then click on the Next button as shown in the following
screenshot.
Step 11: Once the reboot is done the following screen will appear. Set the password for the server and then
click on “Finish”.
Step
12: It
will
take
some
This unit is developed to provide you the necessary information regarding the following content
coverage and topics
• Configuring server
Specifically, upon completion of this Learning Guide, you will be able to:
• Configure server
Recursive and Iterative Queries: DNS queries can be recursive or iterative. In a recursive
query, the DNS server provides the complete answer to the client. In an iterative query, the
server provides a referral to another DNS server, and the client continues the query process.
Authoritative and Non-Authoritative Servers: An authoritative DNS server is responsible
for storing and providing information about a specific domain. Non-authoritative servers may
cache information obtained from authoritative servers.
DNS Records: DNS servers store information in records such as A (address) records for
mapping domain names to IPv4 addresses, AAAA records for IPv6 addresses, MX (Mail
Exchange) records for email routing, CNAME (Canonical Name) records for aliasing one
domain to another, and more.
Forwarders: DNS servers can be configured with forwarders, which are other DNS servers
that handle queries on behalf of the local server. This helps in reducing the time taken to
resolve queries by leveraging the caching capabilities of the forwarder.
Root DNS Servers: The DNS system begins with root DNS servers that maintain
information about top-level domains (TLDs). They direct queries to the authoritative servers
for specific TLDs.
DNS Caching: DNS servers cache query results to reduce the time taken to resolve
subsequent queries for the same domain name. This helps in improving the performance of
the DNS system.
DHCP server
DHCP is a protocol that automates the assignment of IP addresses and other
configuration parameters to devices on a network.
A DHCP server is responsible for managing and distributing IP addresses and related
information to devices on the network.
IP addresses assigned by DHCP servers are leased for a specific duration and must be
renewed before expiration.
This means that a DHCP scope is a set of possible IP addresses that a server can assign
to devices on a network. For example, a DHCP scope might be 192.168.1.1 to
192.168.1.100, meaning that the server can give any of these addresses to a device that
requests one.
A DHCP scope also includes some other settings that affect how the devices communicate on
the network, such as the subnet mask, the default gateway, and the DNS servers.
Each scope is associated with a specific subnet and includes settings such as lease duration
and default gateway.
This means that a DHCP scope is linked to a subset of a larger network, called a subnet.
A subnet is a group of devices that share a common prefix in their IP addresses. For
example, all the devices in the scope 192.168.1.1 to 192.168.1.100 belong to the subnet
192.168.1.0/24, where /24 indicates the length of the prefix. A DHCP scope also includes
settings that determine how long a device can keep an IP address (lease duration) and
how to reach other networks (default gateway).
Reservations are optionally used to ensure that a DHCP client always receives the same IP
address.
This means that a DHCP scope can have some exceptions, called reservations, that assign
a specific IP address to a specific device. For example, a reservation might be
192.168.1.10 for a printer, meaning that the server will always give this address to the
printer and not to any other device. Reservations are useful for devices that need a fixed
IP address for identification or access purposes.
Hyper-V
Supported Guest Operating Systems: Hyper-V supports a wide range of guest operating systems,
including various versions of Windows, Linux, and other compatible operating systems. Users
can choose the operating system that suits their needs and preferences for each VM.
Integration Services: Hyper-V provides Integration Services, which are drivers and services that
enhance the interaction between the host and guest operating systems.
They include features such as improved performance, mouse integration, time synchronization,
and more.
Dynamic Memory: Hyper-V includes Dynamic Memory, which allows the memory allocation to
VMs to be adjusted dynamically based on workload demands. This optimizes the memory usage
on the host and prevents wastage or shortage of memory resources.
Live Migration: Hyper-V supports Live Migration, which enables the movement of running VMs
from one host to another with minimal downtime. This feature is useful for load balancing and
maintaining high availability of VMs.
Snapshot and Checkpoints: Hyper-V allows users to take snapshots or checkpoints of VMs at
specific points in time. This feature allows users to save the state of a VM and restore it later if
needed. It can be helpful for testing, troubleshooting, or backup purposes.
Active directory certificate services
AD CS: A Windows Server role that provides a PKI solution for securing communication within
an organization. It issues and manages digital certificates for various security scenarios.
PKI: A system that uses asymmetric cryptography to bind public keys to identities of entities
(such as users, computers, or devices). It enables secure communication, authentication, and data
integrity.
File Servers: These are servers that host shared files and provide access to clients over a network,
with configuration options for permissions, access control, and file storage.
File Permissions and Access Control: These are mechanisms for setting and enforcing rules on
who can read, write, or execute specific files and directories on the network.
Distributed File Systems: These are systems that organize and manage files across multiple
servers or storage devices, providing a unified namespace and a centralized view of the files.
File Replication: This is the process of duplicating files across multiple servers for redundancy
and fault tolerance, enhancing data availability and resilience.
File Caching: This is the technique of storing frequently accessed files locally, reducing the need
to retrieve them from the server every time they are requested, and improving file access speed.
File Locking: This is the technique of preventing multiple users from simultaneously modifying
the same file, avoiding data inconsistency and corruption.
Pint services
Print server, which is a device or software that manages and coordinates print jobs on a network.
The text explains the main function of a print server, which is to provide a centralized point for
controlling and directing print requests from client devices to one or more printers.
A print server simplifies the administration and configuration of printers and print jobs within a
network.
Users do not need to install or update printer drivers on their devices, as they can send print jobs
to the print server, which then handles the distribution of print tasks to the appropriate printers.
Print Logging and Auditing: Features that track print activities, such as monitoring printer
usage, troubleshooting problems, or generating reports.
Windows server Update Server
WSUS: A Microsoft tool for managing updates for Microsoft products in a corporate network. It
acts as a local update repository and allows administrators to approve, distribute, and monitor
updates.
Update Management: WSUS categorizes updates into different types, such as security, critical,
or service packs. Administrators can configure WSUS to automatically approve and deploy
specific categories of updates to client computers.
The scope and applicability of testing are critical aspects of the software testing process that define
what will be tested, the objectives of testing, and the boundaries of the testing effort. Here is an
overview of the scope and applicability of testing:
Scope of Testing: The scope of testing outlines the boundaries and extent of the testing effort. It
defines what aspects of the software will be tested and what will not be tested.
The scope typically includes:
Functional Features: Identify the specific functionalities, features, and use cases that will be
tested. This includes both primary and secondary functions of the software.
Non-functional Features: Identify the quality attributes, such as performance, usability,
security, and reliability, that will be tested. This includes both quantitative and qualitative
measures of the software.
Test Levels: Identify the different levels of testing, such as unit, integration, system, and
acceptance, that will be performed. This includes the scope and objectives of each level, as well
as the dependencies and interactions between them.
Test Types: Identify the different types of testing, such as functional, non-functional, regression,
and exploratory, that will be conducted. This includes the scope and objectives of each type, as well
as the techniques and tools used for them.
Test Environment: Identify the hardware, software, network, and data requirements for the testing
activities.
3.3. Developing test plan
A test plan is a document that outlines the scope, objectives, and strategy of testing a software product.
Entry Criteria: The conditions that must be met before testing can start, such as the completion
of development and the availability of test environments.
Test Schedule: The timeline for testing activities, including the start and end dates for each
testing phase, the milestones and the dependencies.
Resource Planning: The allocation of resources for testing, such as the roles and responsibilities
of the test team, the tools and equipment needed, and the budget and risks involved.
3.4. Running system test
System testing involves several steps, such as setting up the test environment, creating and executing
test cases, reporting and logging defects, performing regression testing, and retesting. System testing
also includes various types of testing, such as performance testing, load testing, security testing,
usability testing, etc.
3.5. Analyzing error report and making changes
Brief description of a general process for analyzing error reports and implementing changes in
software development. It consists of three main steps:
This step involves analyzing the error reports to find out why the error occurred, what factors
contributed to it, and how it can be prevented or fixed.
Root cause analysis can help identify the underlying problems in the code, design, logic, or
environment of the software. Examples of root cause analysis methods are defect reports and
error classification.
Changes should be tested and verified before deployment to ensure they work as expected
and do not introduce new errors.
3.6. Validating changes
Process and purpose of validating changes in a system, product, or process. Here are some
elaborations and additional facts
Validation vs Verification
Validation is different from verification, which is the process of checking whether the system,
product, or process meets the design specifications.
Verification answers the question “Are we building the product right?” while validation answers the
question "Are we building the right product?"
Validation Methods
There are different methods of validation depending on the type and scope of the changes.
Some common methods include testing, inspection, analysis, simulation, demonstration, and review.
Each method has its own advantages and limitations, and the choice of method depends on factors
such as cost, time, risk, and complexity.
• Select DNS Server from the list and then click Next button.
• A little introduction to DNS Server and a few useful links for further details as shown in
below image. Click Next to move on.
server too you should use the same ip as the preferred DNS server. Next step is to install the Active directory
roles. Unlikely the older version of windows servers Microsoft highly recommend to use server manager option
to install roles before you run dcpromo.
From the roles list select the "Active Directory Domain Services" role and Click "Next "
It will take few minutes to complete and when its done you will get this confirmation. And then click on
"Close"
Since we going to install New Domain Controller in new forest please select the option "Create a new
domain in new forest" option and click on "Next"
In this window it will ask to select forest function level. If you going to add server 2003 domain controller to your
forest later don't select the function level as server 2008. If you going to use full features of 2008 Ad you must
select forest function level as server 2008. In my case I used server 2008. Click on "Next" after the select.
If the wizard cannot create a delegation for the DNS server, it displays a message to indicate that you can create the
delegation manually. To continue, click "Yes"
In next window its asking to define a restore mode password. Its more important if you had to do a
restore from backup in a server crash. Click on "Next" after filling it.
Then it will start the installation of the AD. It will take some time to complete. After complete of the installation
perform a server reboot.
4 Click Next
8 Do not add any scopes for now. You can obviously add or import scopes later, when the clustered
DHCP server service has been created.
11 Click Install, and then click Close. Repeat the same procedure on the second node of the cluster.
Open Server Manager and click Tools > Active Directory Users and Computers.
Review the details you specified and click Finish to create the user in Active Directory.
As the GPMC opens up, you will see the tree hierarchy of the domain. Now expand the domain, firewall. Local in our case, and you will
see the FW Users OU which is where our users reside. From here, right-click this OU and select the first option Create a GPO in this
domain and Link it here:
First we need to activate the policy by selecting the Enabled. When ready click Apply and then Ok
As we can see below, our user's desktop now has the background image configured in the group policy we created
1. Pakuwal, Bivek. “Graphical User Interface.” LinkedIn SlideShare, 17 Apr. 2015, Available
2. “Command-Line Interface.” Wikipedia, Wikimedia Foundation, 16 July 2018, Available here.
3. Windows Server 2019 Administration Inside Out:
4. Learn Windows PowerShell in a Month of Lunches
5. Linux Bible:
6. Ubuntu Unleashed 2023 Edition.
7. CompTIA Server+ Study Guide: Exam SK0-004
8. Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7: A