Module 1 Introduction To System Administration and Maintenance
Module 1 Introduction To System Administration and Maintenance
SYSTEM
Identify the role &
responsibilities of a
system administrator
Identify the challenges
of system administrator
ADMINISTRATION
Identify various server AND
MAINTENANCE
operating systems.
Identify the different
System Administration
tools
Setup and configure a
virtualized laboratory
environment using
Oracle VirtualBox. Introduction to System Administration and
Perform Windows Maintenance
Server configuration.
Lesson 1 P4
?
Lesson 2 P13
Lesson 3 P21
Principles of
System
Administration
Understanding
the Principles
of System
Administration
System administration practices, worldwide, vary from the haphazard to the state of the art. There is a
variety of reasons for this. Most recently, the Internet has grown considerably, operating systems have
grown more and more complex, but the number of technically adept system administrators has not grown
in proportion. In the past, system administration has been a job which has not been carried out by
dedicated professionals, but by interested computer users, as a necessary chore in getting their work done.
The focus on making computers easy to use has distracted many vendors from the belief that their
computers should also be easy to manage. It is only over the gradual course of time that this has changed,
though even today, system administrators are a barely visible race, until something goes wrong.
Sysadmins are responsible for ensuring the uptime of their companies' computers, servers and internet --
basically "keeping the lights on" to limit work disruptions. This includes system maintenance and
configuration, such as installing and troubleshooting hardware and software and assessing new
technologies for their companies.
Nevertheless, system administrator job responsibilities vary greatly among employers. In larger
organizations, the title may be used to describe any administrator who is responsible for a specialized IT
system, such as the one that supports servers.
Depending upon an organization's specialty, information system administrator job titles may include a
data center administrator, computer network administrator, virtualization administrator, server
administrator or database administrator.
4
Role of the System Administrator
The duties of a system administrator are wide-ranging and vary widely from one organization to
another. Sysadmins are usually charged with installing, supporting, and maintaining servers or other
computer systems, and planning for and responding to service outages and other problems. Other duties
may include scripting or light programming, project management for systems-related projects.
The root account has full (unrestricted) access, so he/she can do anything with system. For example, root
can remove critical system files. In addition, there is no way you can recover file except using tape
backup or disk based backup systems.
5
System Administrator Skills
Due to the wide range of job responsibilities for system administration in various organizations, job skill
competencies are often broad, as are salary ranges. Typically, job descriptions in this field call for a
minimum of a bachelor's degree in computer science, computer engineering or a related field.
In general, sysadmins must be comfortable working with application and file servers, desktops, routers,
wide area networks, databases, information security systems cybersecurity protocols and storage.
Sysadmins also should be skilled at problem-solving in multiple operating systems, such as Linux,
Microsoft and others. Additionally, they should be familiar with tasks related to scripting, automation
and programming. Increasingly, virtualization and cloud computing skills have also become essential to
the job.
The sysadmin's tasks generally include provisioning, configuring and managing system performance, as
well as the software that runs on the web servers and the computer hardware that supports it. For this
reason, a sysadmin should feel comfortable installing and troubleshooting IT resources, establishing and
managing user accounts, upgrading and patching software, and performing backup and recovery tasks.
However, the ability to troubleshoot, manage firewalls and provide technical support aren't the only skills
required for sysadmins. Soft skills (people skills) are just as necessary as hard skills for sysadmins
because they interact with people in so many areas of IT and business. When IT services are slow or
down entirely, a system administrator must be able to work under pressure, read a situation as it unfolds
and quickly decide on a response that yields the best result for all involved.
6
The Challenges of System Administration
System administration is not just about installing operating systems. It is about planning and designing an
efficient community of computers so that real users will be able to get their jobs done. That means:
Some system administrators are responsible for both the hardware of the network and the computers
which it connects, i.e. the cables as well as the computers. Some are only responsible for the computers.
Either way, an understanding of how data flow from machine to machine is essential, as is an
understanding of how each machine affects every other.
7
Understanding
the Windows
Administration
Tools
Windows administration is more than just creating user accounts or running defrag once in a while. It’s
more than clearing out caches and making sure there aren’t any viruses. To become a pro at administering
Windows, you need to know about all of the tools available to you, how they work, and how to use them.
There’s so much going on under the hood that you just can’t see by pulling out Task Manager.
8
Computer Management
Computer Management is an MMC snap-in used as a central location to manage local or remote
computers. It includes Task Scheduler, Event Viewer, Local Users and Groups, Device Manager, Disk
Management, and more, all in a single location. This makes it really easy to manage all the important
aspects of a computer.
Task Scheduler
Task Scheduler is an MMC snap-in used to schedule a task or program to run automatically on a
specific date and time. Some non-Windows programs may use Task Scheduler to set up things
like a disk cleanup or defrag tool to run automatically.
Event Viewer
Event Viewer is an MMC snap-in used to view information about certain actions in Windows,
called events. It can sometimes be used to identify a problem that has occurred in Windows,
especially when an issue has occurred, but no clear error message was received. Events are stored
in event logs. A number of Windows event logs exist, including Application, Security, System,
Setup, and Forwarded Events. Application specific and custom event logs exist in Event Viewer as
well, logging events that occur with and are specific to certain programs.
Device Manager
The Device Manager in Windows provides a central and organized view of all the Microsoft
Windows recognized hardware installed on a computer.
Disk Management
When you need to create or delete partitions, initialize a new disk, or even stripe a partition
across multiple disks, this is the utility that you’ll need to use. It’s also very useful for figuring out
why a USB drive isn’t showing up on your computer – you’ll open up Disk Management and
check to see whether the drive or partition is showing up at all.
Services
Services is an MMC snap-in used to manage the various Windows services existing that help
your computer start, and then keep running, as you expect. The Services tool is most often used
to change the startup type for a particular service, which changes when or how the service is
executed. Choices include Automatic (Delayed Start), Automatic, Manual, and Disabled.
9
iSCSI Initiator
The iSCSI Initiator link in Administrative Tools starts the iSCSI Initiator
Configuration Tool. This program is used to manage the communication between
networked iSCSI storage devices. Since iSCSI devices are typically found in an
enterprise or large business environments, you typically only see the iSCSI
Initiator tool used with Server versions of Windows.
Local Security Policy is an MMC snap-in used to manage Group Policy security
settings. One example of using Local Security Policy would be requiring a
minimum password length for user passwords, enforcing a maximum password
age, or making sure any new password meets a certain level of complexity. Pretty
much any detailed restriction you can imagine can be set with Local Security
Policy.
Print Management
Basic printer management is still best performed from Devices and Printers
(Windows 10, 8, 7, and Vista) or Printers and Faxes (Windows XP).
System Configuration
The System Configuration link starts System Configuration, a tool used to help
troubleshoot some kinds of Windows startup problems.
10
System Information
The System Information link opens the System Information program, a tool that
displays incredibly detailed data about the hardware, drivers, and most parts of
your computer. It's included within Administrative Tools in Windows 10 and
Windows 8. The System Information tool is included with Windows 7, Windows
Vista, and Windows XP as well but just not within Administrative Tools; execute
msinfo32 to start it in those earlier versions of Windows.
Windows Firewall with Advanced Security is an MMC snap-in used for advanced
configuration of the software firewall included with Windows.
Basic firewall management is best performed via the Windows Firewall applet in
Control Panel. Some versions of windows call this Windows Defender Firewall
with Advanced Security.
Other Tools
Sysinternals Suite
The Sysinternals Suite is used for troubleshooting problems and investigating security breaches on
computers running Microsoft operating systems. There are more than 40 tools in six categories:
11
#3
Server
Operating
Systems
Understanding
Server OS
Market Share
A server operating system, also called a Server OS, is an operating system specifically designed to run on
servers. A server operating system is an advanced operating system designed to run on servers. It has the
necessary features and subsystems to operate in a client-server architecture and serve clients' requests.
The Server OS, is a software layer on top of which other software programs, or applications, can run on the
server hardware. This is like how a desktop OS, mobile device OS, or embedded device OS enables software
programs and applications to run on those respective devices.
A server OS is designed from the ground up to provide features suitable for multi-user, business-critical
applications. It provides the central interface for managing users, implementing security, and other
administrative processes. The focus of a server operating system is usually security, stability, and
cooperation.
13
UNIX Operating System
UNIX is a multi-user and multi-tasking operating system. It's widely used in the client-server
environment. UNIX server operating system is implemented with a high-level C programming
language that supports multiple platforms, making it suitable for many hardware architectures.
UNIX is designed for multi-user environments and has built-in TCP/IP, demonstrating superior
stability and security. But it is very costly, and there are many different versions of UNIX operating
systems from different vendors, so there is no standard UNIX server operating system.
Linux is free and open-source and supports multi-user, multi-process, multi-threaded operations.
However, to adopt a Linux server operating system, enterprises need to make sure they have
comprehensive technical expertise, including installation, maintenance, and troubleshooting.
Windows server OS is an operating system applicable to the cloud, which supports virtual memory
management and has an intuitive GUI. Moreover, it is more user-friendly than most Linux-based
operating systems and is easy to install and use. But Windows server operating system is paid. And it
faces more security threats, which requires timely download of the latest security patches to protect
the system from these security threats and to ensure ongoing security.
14
Server operating systems facilitate the implementation of various server platforms, such as:
▪ Web servers. A web server hosts programs and data and responds to client requests for web pages or
other web-based services. Common web servers are Apache, Microsoft Internet Information Services
(IIS), and Nginx.
▪ Mail servers. A mail server allows users to forward and receive emails for and from their business and
controls individual email accounts based on a specific domain.
▪ File servers. File sharing involves a joint storage point for a business to store documents or data - a
network drive.
▪ Database servers. Some server operating systems include database integration, which facilitates
dynamic web page building based on the database contents.
▪ Application servers. Server operating systems must be able to run business-critical applications,
whether that's a self-hosted CRM or a SaaS. A server OS usually functions as a shared environment for
various collaborative applications.
▪ Print servers. Another feature that server operating systems facilitate is print sharing, allowing
multiple machines to use a single printer.
15
The Server Operating System Market is relatively consolidated as seen with the major vendors having
significant Server Operating System Market Share. Major shifts in the industry take years or decades.
The growth in the datacenter market is one of the biggest drivers for the growth of the Server Operating
System market. Both consumers and businesses are increasing their use of streaming services, cloud
computing and other data-intensive functions. This demand has collectively spurred greater investment
in server and cloud infrastructure ecosystems that can handle next-generation data workloads. The
growth also means that Server Operating System Market Share can be disrupted more easily than before.
16
Best Server OS for Businesses
Small
The best OS choice for a small business server depends on the budget, server type, and the
maintenance team's expertise.
If you have a budget that can handle a server OS purchase, a good OS choice is the Windows Server
Essentials (formerly Windows Small Business Server). It is a good solution for companies under 25
users and a small maintenance team.
The OS features a familiar interface and broad third-party app support at a reasonable price. It
facilitates connectivity and includes email clients, remote access, support for mobile devices, file and
printer sharing, backup and restore, and other features.
If you prefer a free and stable production OS, choose a free Linux distribution, such as Ubuntu
Server or Debian.
Medium
For a medium-sized business, it's essential to choose an OS that allows your business to grow.
However, you don't want heavy investments you may not need.
Because of their scalability, Linux distributions are possibly the best choice for a medium-sized
business. An example is Ubuntu Server, a free, stable, easy-to-install OS with a trusted name. Since it
is open-source, it features extensive customizability, allowing you to tailor the OS to your business
needs.
Saving money on an OS means a bigger budget for scaling and implementing security features.
Other solutions that come with a price tag, but are cost-effective, are RHEL and Windows Server
Standard Edition.
Large
Choosing an OS for a large business depends on the server type and its function. For example, a
Windows Server in an Active Directory domain is a good choice for a file server, authentication
server, or email server. On the other hand, both Windows and Linux are good choices for a web
server.
For example, the Windows Server Datacenter Edition is a good choice for a highly virtualized
datacenter or a cloud environment. The OS allows for an unlimited number of Windows server
instances on a server, both in physical and virtual environments.
On the other hand, SUSE Linux Enterprise Server (SLES) is an open-source operating system. It is
designed for extensive workloads in large data centers, but also for single-server environments. SLES
is subscription-based and provides access to patches, fixes, and security updates through the SLES
customer portal.
17
Understanding
Windows
Server
Editions
Microsoft Windows Server OS (operating system) is a series of enterprise-class server operating systems
designed to share services with multiple users and provide extensive administrative control of data
storage, applications and corporate networks.
Development for Windows Server started in the early 1980s when Microsoft produced two operating
system lines: MS-DOS and Windows NT. Microsoft engineer David Cutler developed the kernel of
Windows NT with the intent to provide speed, security and reliability that large organizations require in a
server operating system.
Key features in later versions of Windows Server include Active Directory, which automates the
management of user data, security and distributed resources, and enables interoperation with other
directories; and Server Manager, which is a utility to administer server roles and make configuration
changes to local or remote machines.
18
License and Windows Server Activation
There are certain licensing characteristics based on the Windows Server edition you decide to deploy.
These are discussed in the following table.
Hardware Requirements
The hardware requirements for Windows Server depend on the services that the server is hosting, the load
on the server, and how responsive you want the server to be. The services and features of each role put a
unique load on network, disk I/O, processor, and memory resources. The following table displays the
absolute minimum required for a Server Core installation on a physical machine.
Virtualized deployments of Windows Server require the same hardware specifications for physical
deployments. However, during installation, you'll need to allocate extra memory to the VM, which you can
then deallocate after installation, or you'll need to create an installation partition during the boot process.
In addition to the previously listed requirements, there are various other hardware requirements to
consider, depending on your specific organizational needs and installation scenarios:
▪ Greater disk space is needed for network installations or for computers with more than 16 GB of
RAM.
▪ Storage and network adapters must be PCI Express compliant.
▪ A Trusted Platform Module (TPM) is needed to implement several security features.
19
#3
Virtual
Laboratory
Environment
Preparation, Setup and Configuration
Understanding
Oracle
VirtualBox
To start setting up your virtual laboratory environment, various tools should be downloaded, installed, and
configured. Alternatively, you can download resources from your MS Teams > General Channel > Class
Materials > Files > Tools folder.
Install VirtualBox on Windows 7,8,8.1 & Windows 10. Click on downloaded VirtualBox.exe file, and a file
will execute.
21
Creating Your First Virtual Machine
Click New in the VirtualBox Manager window. A wizard is shown, to guide you through setting up a new
virtual machine (VM).
On the following pages, the wizard will ask you for the bare
minimum of information that is needed to create a VM, in
particular:
For Operating System Type, select the OS that you want to install. The supported OSes are grouped. If you
want to install something very unusual that is not listed, select Other. Depending on your selection, Oracle
VM VirtualBox will enable or disable certain VM settings that your guest OS may require. This is
particularly important for 64-bit guests. It is therefore recommended to always set it to the correct value.
On the next page, select the Memory (RAM) that Oracle VM VirtualBox should allocate every time the
virtual machine is started. The amount of memory given here will be taken away from your host machine
and presented to the guest OS, which will report this size as the virtual computer's installed RAM.
Next, you must specify a Virtual Hard Disk for your VM. The wizard displays the following window:
22
How to Import OVA Files in VirtualBox
An OVA file (Open Virtual Appliances) is a package that contains files used to describe a virtual machine. It
includes a descriptor file (.OVF), optional manifest (.MF), certificate files, and other related files. All this
data is saved in the Open Virtualization Format, which is a standard format used to package and distribute
software run in virtual machines.
When you have VirtualBox running, locate “File” in the top menu and click on it, then select “Import
Appliance.” VirtualBox refers to virtual machines as appliances.
A new window will pop open with a field to select your .ova file. Browse to the file you’d like to import.
VirtualBox will take a few seconds to read the information on the file.
The window will shift to a table that lets you choose the settings for your soon-to-be-imported appliance.
From here, you can set key features of the virtual machine, like the amount of available memory. When
you’re ready, click on the “Import” button and let VirtualBox run the import process. It can take a few
minutes for VirtualBox to complete the import process depending on the file size. After the process
completes, your VM will be ready to use.
23
Configure VirtualBox Networking
In Oracle VirtualBox there are six networking modes supported, namely:
▪ Not attached. In this mode, Oracle VM VirtualBox reports to the guest that a network card is
present, but that there is no connection. This is as if no Ethernet cable was plugged into the
card. Using this mode, it is possible to pull the virtual Ethernet cable and disrupt the connection,
which can be useful to inform a guest operating system that no network connection is available
and enforce a reconfiguration.
▪ Network Address Translation (NAT). If all you want is to browse the Web, download files, and
view email inside the guest, then this default mode should be sufficient for you, and you can skip
the rest of this section. Please note that there are certain limitations when using Windows file
sharing.
▪ NAT Network. A NAT network is a type of internal network that allows outbound connections.
▪ Bridged networking. This is for more advanced networking needs, such as network simulations
and running servers in a guest. When enabled, Oracle VM VirtualBox connects to one of your
installed network cards and exchanges network packets directly, circumventing your host
operating system's network stack.
▪ Internal networking. This can be used to create a different kind of software-based network
which is visible to selected virtual machines, but not to applications running on the host or to the
outside world.
▪ Host-only networking. This can be used to create a network containing the host and a set of
virtual machines, without the need for the host's physical network interface. Instead, a virtual
network interface, similar to a loopback interface, is created on the host, providing connectivity
among virtual machines and the host.
▪ Generic networking. Rarely used modes which share the same generic network interface, by
allowing the user to select a driver which can be included with Oracle VM VirtualBox or be
distributed in an extension pack.
24
Step 1. We need to create a Host-only network adapter. For this, go to the “File” option in the VirtualBox
menu bar and select the “Host Network Manager”.
Step 2. In the new pop-up window, select the green icon corresponding to “Create Host-Only
Network”. A new adapter, “VirtualBox Host-Only Ethernet Adapter #”, will be created. If DHCP Server
option is “Enabled”, configure the newly added “VirtualBox Host-Only Ethernet Adapter” under the
“Properties > DHCP Server” and uncheck the “Enable Server” option. Finally, click on the “Apply”
button.
After creating the virtual adapter (Host-only Ethernet Adapter), you can use it with the virtual
machine’s network adapter configuration.
25
Install VirtualBox Guest Additions
The Guest Additions are designed to be installed inside a virtual machine after the guest operating
system has been installed. They consist of device drivers and system applications that optimize the guest
operating system for better performance and usability.
▪ Mouse pointer integration. This feature provides you with seamless mouse support. You will only
have one mouse pointer and pressing the Host key is no longer required to free the mouse from being
captured by the guest OS. To make this work, a special mouse driver is installed in the guest that
communicates with the physical mouse driver on your host and moves the guest mouse pointer
accordingly.
▪ Shared folders. These provide an easy way to exchange files between the host and the guest. Much
like ordinary Windows network shares, you can tell Oracle VM VirtualBox to treat a certain host
directory as a shared folder, and Oracle VM VirtualBox will make it available to the guest operating
system as a network share, irrespective of whether the guest actually has a network.
▪ Better video support. While the virtual graphics card which Oracle VM VirtualBox emulates for any
guest operating system provides all the basic features, the custom video drivers that are installed with
the Guest Additions provide you with extra high and non-standard video modes, as well as
accelerated video performance.
▪ Seamless windows. With this feature, the individual windows that are displayed on the desktop of the
virtual machine can be mapped on the host's desktop, as if the underlying application was actually
running on the host.
▪ Generic host/guest communication channels. The Guest Additions enable you to control and monitor
guest execution. The guest properties provide a generic string-based mechanism to exchange data
bits between a guest and a host, some of which have special meanings for controlling and monitoring
the guest.
▪ Time synchronization. With the Guest Additions installed, Oracle VM VirtualBox can ensure that the
guest's system time is better synchronized with that of the host.
▪ Shared clipboard. With the Guest Additions installed, the clipboard of the guest operating system can
optionally be shared with your host operating system.
▪ Automated logins. Also called credentials passing.
26
Setting Up
Virtual
Laboratory
Environment
To start setting up your virtual laboratory environment, various tools should be downloaded, installed, and
configured. Alternatively, you can download resources from your MS Teams > General Channel > Class
Materials > Files > Tools > Virtual Machines folder. Resources that needs to be downloaded is of type ISO
File or an OVA File.
Oracle VirtualBox
Manager
OPNSense Firewall
(em0)
Network Adapter 1
(Bridge Adapter or NAT)
OPNSense Firewall
(em1)
192.168.5.1/24
Network Adapter 2
(Host-Only Ethernet Adapter #2)
Windows Server
192.168.5.5/24
Network Adapter 1
27
(Host-Only Ethernet Adapter #2)
Setting Up OPNSense Firewall
OPNsense is an open source, easy-to-use and
easy-to-build FreeBSD based firewall and routing
platform. OPNsense includes most of the features
available in expensive commercial firewalls, and
more in many cases. It brings the rich feature set
of commercial offerings with the benefits of open
and verifiable sources.
After downloading the OVA files, you need to import the file in Oracle VirtualBox Manager (Refer to the
previous section “How to Import OVA Files in VirtualBox”.
28
Manage OPNSense VM Network Interfaces
Now you can setup the network adapters of your OPNSense Firewall virtual machine. In VirtualBox
Manager, select the OPNSense Virtual Machine > Select Settings > Select Network to manage the
Network Settings of the virtual machine.
On Adapter 1, select “Enable Network Adapter” option. Next on the “Attach To” section, select ‘Bridge
Adapter’ from the drop-down list. Next on the “Name” section, choose an interface (Ethernet or
Wireless Ethernet) that has access to the internet. Under Advanced Settings, “Promiscuous Mode”
settings “Deny” option must be selected. Next on the “MAC Address” settings, click on the “Refresh”
icon to reset the default MAC Address.
On Adapter 2, select “Enable Network Adapter” option. Next on the “Attach To” section, select ‘Host-
only Adapter’ from the drop-down list. Next on the “Name” section, choose an interface (VirtualBox
Host-Only Ethernet Adapter) that has DHCP Server Disabled (refer to Configure VirtualBox
Networking). Under Advanced Settings, “Promiscuous Mode” settings “Deny” option must be selected.
Next on the “MAC Address” settings, click on the “Refresh” icon to reset the default MAC Address.
Once completed, click on the “OK” button to save the network settings. Now you are ready to
run/start and configure the OPNSense Firewall virtual machine.
29
Configure OPNSense Virtual Machine Interface
Start your OPNSense Virtual Machine. Once
initialization is completed, you will be
presented with the following information as
shown in the illustration.
3. Configure VLAN = N
4. Enter WAN Interface name = em0 (corresponds to VirtualBox Adapter 1 Bridge Adapter)
5. Enter LAN Interface Name = em1 (corresponds to VirtualBox Adapter 2 Host-Only Adapter)
6. (Skip Optional Interface) = press Enter Key
7. Complete Configuration = Y
Set Interface IP Address
1. Select Option = 2
2. Enter Interface to configure, select LAN (1)
3. Configure IPv4 address LAN Interface via DHCP? = N
4. Enter New LAN IPv4 Address = 192.168.5.1
5. Enter New LAN IPv4 Subnet masks = 24
6. (Skip IPv4 Upstream Gateway Address) = press Enter Key
7. Configure IPv6 address interface via WAN tracking? = Y
8. Enable the DHCP Server on LAN? = Y
9. Enter Start Address IPv4 Client address range = 192.168.5.100
10. Enter End Address IPv4 Client address range = 192.168.5.110
11. Change web GUI protocol from HTTPS to HTTP? = N
12. Generate new self-signed web GUI certificate? = N
13. Restore web GUI access defaults? = N
14. Wait until the process is completed and reload the service by selecting option 11.
Once completed, you can now setup other configurations of your OPNSense Firewall through its Web
Interface from other virtual machines (Ubuntu Virtual Machine). For now, you can skip the next
configuration until the next virtual machine (Ubuntu) is available.
30
OPNSense Web Configurations
In one of your available virtual machines (Ubuntu), open a web browser and navigate to OPNSense Web
Interface using the LAN IP address (192.168.5.1) that was assigned. At first, you will be prompt with a
potential warning. Click on the “Advanced” button to continue and then click on “Accept the Risk and
Continue” button to proceed. Once completed, you will be asked to login into OPNSense Web Interface, use
the following default credentials:
Note: If OPNSense Web is not accessible, you need to reload your OPNSense services by selecting OPTION
11 Reload All Services from your OPNSense virtual machine commandline.
Once logged in, you may now proceed with the necessary OPNSense web configurations.
31
32
33
Next, proceed with setting up OPNSense DHCP (LAN).
34
OPNSense Firewall basic settings is now properly configured. Verify network settings of your
workstation. 35
In Ubuntu workstation, check the network settings information as shown on the illustration
below.
In Windows workstation, check the network settings information as shown on the illustration
below.
36
Setting Up Windows Server Virtual Machine
37
Manage Windows Server VM Network Interfaces
Now you can setup the network adapters of your Windows Server virtual machine. In VirtualBox
Manager, select the Windows Server Virtual Machine > Select Settings > Select Network to manage
the Network Settings of the virtual machine.
On Adapter 1, select “Enable Network Adapter” option. Next on the “Attach To” section, select ‘Host-
only Adapter’ from the drop-down list. Next on the “Name” section, choose an interface “VirtualBox
Host-Only Ethernet Adapter” that has DHCP Server disabled. Under Advanced Settings, “Promiscuous
Mode” settings “Deny” option must be selected. Next on the “MAC Address” settings, click on the
“Refresh” icon to reset the default MAC Address.
Once completed, click on the “OK” button to save the network settings. Now you are ready to
run/start your Windows Server virtual machine. Use the default “User Login Credentials – LOCAL
DEFAULT” listed in the Virtual Machine’s Description.
38
Setting Up Windows 10/11 Virtual Machine
After downloading the OVA files, you need to import the file in
Oracle VirtualBox Manager (Refer to the previous section
“How to Import OVA Files in VirtualBox”.
39
Manage Windows Workstation VM Network Interfaces
Now you can setup the network adapters of your Windows virtual machine. In VirtualBox Manager,
select the Windows 10/11 Workstation Virtual Machine > Select Settings > Select Network to manage
the Network Settings of the virtual machine.
On Adapter 1, select “Enable Network Adapter” option. Next on the “Attach To” section, select ‘Host-
only Adapter’ from the drop-down list. Next on the “Name” section, choose an interface “VirtualBox
Host-Only Ethernet Adapter” that has DHCP Server disabled. Under Advanced Settings, “Promiscuous
Mode” settings “Deny” option must be selected. Next on the “MAC Address” settings, click on the
“Refresh” icon to reset the default MAC Address.
Once completed, click on the “OK” button to save the network settings. Now you are ready to
run/start your Windows 10/11 Workstation virtual machine. Use the default “User Login
Credentials” listed in the Virtual Machine’s Description.
40
Setting Up Ubuntu Virtual Machine
Ubuntu is a Linux distribution based on Debian
and composed mostly of free and open-source
software.
41
Manage Ubuntu VM Network Interfaces
Now you can setup the network adapters of your Ubuntu virtual machine. In VirtualBox Manager,
select the Ubuntu Virtual Machine > Select Settings > Select Network to manage the Network Settings
of the virtual machine.
On Adapter 1, select “Enable Network Adapter” option. Next on the “Attach To” section, select ‘Host-
only Adapter’ from the drop-down list. Next on the “Name” section, choose an interface “VirtualBox
Host-Only Ethernet Adapter” that has DHCP Server disabled. Under Advanced Settings, “Promiscuous
Mode” settings “Deny” option must be selected. Next on the “MAC Address” settings, click on the
“Refresh” icon to reset the default MAC Address.
Once completed, click on the “OK” button to save the network settings. Now you are ready to
run/start your Ubuntu virtual machine. Next, run your Ubuntu virtual machine to configure
OPNSense through its web interface (refer to OPNSense Web Configurations). Use the default “User
Login Credentials” listed in the Virtual Machine’s Description.
42
Setting
Windows
Server
Configurations
After we are done with the Windows Server installation, there are initial configurations that are useful in
every Server installations.
Username: NUAdmin
Fullname: NU Administrator
Description: Main Administrator
account for Windows Server.
Next, on the Select Groups dialog, Type into “Enter the object names…” field – Administrators | then click
on “Check Names”. Confirm with OK if everything is OK. Once completed click on the Apply button and OK
button to close User Properties dialog.
After completing the above steps, NUAdmin will now be your main Administrator account. You have the
option to disable the DEFAULT Administrator account (leave this enabled for the meantime).
44
Windows Server Network Settings
Servers should have fixed IP addresses. It is requirement for many services (Active Directory, High
Availability) and you should make that a practice in every LAB or production you do. Our IP address will
be based on the generated network address of OPNSense Firewall (Virtual Router).
IP Address : 192.168.5.5
Subnet Mask : 255.255.255.0
Default Gateway : 192.168.5.1
45
Windows Server Name Settings
Before you start your lab (or production environment) it would be nice to define server and computer
naming policy.
Under “Computer Name” tab click on “Change” button. New window will open and under “Computer
name:” enter name you like for your server. After you are done, click on OK. New window will appear
prompting you to reboot. Select OK, and after that – reboot you server and then we can continue.
Example: NUDC
46
Basic Security Settings
First of all, leave your
Windows Firewall always
ON, do not turn it off, learn
what ports your services
need to go through it, set it
up accordingly, but do not
turn firewall down.
47
SUMMARY
48
KEY TERMS
Online Resources
▪ Vivek Gite, 2021, “What is The Role Of the System
Administrator?”, https://www.cyberciti.biz/faq/what-is-
the-role-of-the-system-administrator/
Reference Books
50