Module 12
Module 12
Contents:
Lesson logs
Module
1 of 98 3/12/2019, 1:31 PM
about:blank
Objectives
After completing this module, you will be able to:
2 of 98 3/12/2019, 1:31 PM
about:blank
Lesson objectives
After completing this lesson, you will be able to:
• Describe
What
3 of 98 3/12/2019, 1:31 PM
about:blank
WSUS is a server role included in Windows Server 2016 that downloads and
distributes clients and servers. updates that
are applicable system and common such as
Microsoft and Microsoft SQL
4 of 98 3/12/2019, 1:31 PM
about:blank
WSUS can generate reports to help monitor update installation. These reports can
identify which computers have not recently applied the approved updates. Based on
these reports, you can investigate why updates are not being applied.
Before installing and configuring WSUS servers, you must consider how to deploy
WSUS in your environment. WSUS implementations vary in size and configuration
depending on your network environment and how you want to manage updates. You
can have a single WSUS server for your entire organization, multiple WSUS servers
acting independently, or multiple WSUS servers connected to each other in a
hierarchy.
Single
5 of 98 3/12/2019, 1:31 PM
about:blank
Internet. Then the WSUS server uses port 8530 for HTTP communication, and port
8531 for HTTPS. You must ensure that your firewall has the rules needed to allow the
server to connect to Microsoft Update. This basic scenario is common in small
networks with a single physical location.
Disconnected
6 of 98 3/12/2019, 1:31 PM
about:blank
server.
WSUS
• Download updates once, to a single server, and then replicate the updates over
your network to other servers.
7 of 98 3/12/2019, 1:31 PM
about:blank
You can have multiple layers in your WSUS hierarchy and configure some of your
downstream autonomous mode, mode to
configure instance, you can have server,
connected downloading updates organization.
Then downstream servers in autonomous manages
updates running software in English, for all computers
running software in Spanish. Finally, you can have another set of downstream
servers receiving their updates from the middle-tier WSUS servers, configured in
8 of 98 3/12/2019, 1:31 PM
about:blank
replica mode. These are the actual servers that clients receive updates from, but all
the management occurs the middle tier.
WSUS
• Windows Internal Database (WID). This is the default setting for a WSUS
database. WSUS by using a SUSDB.mdf is
created WSUS uses in the folder. We
recommend for:
• SQL Server database. If SQL Server is available in your environment, you can use
it to store the data that WSUS uses. You can use SQL Server tools to access the
WSUS database management purposes. SQL
Server the following scenarios:
9 of 98 3/12/2019, 1:31 PM
about:blank
• Assess
• Identify
• Deploy
The
The goal of the assess phase is to set up a production environment that supports
10 of 98 3/12/2019, 1:31 PM
about:blank
update management for routine and emergency scenarios. The assess phase is an
ongoing process that you use to determine the most efficient topology for scaling the
WSUS components. As your organization changes, you might need to add more
WSUS servers in different locations.
After relevant updates have been identified, you need to evaluate whether they work
properly Updates might cause
combinations your environment.
11 of 98 3/12/2019, 1:31 PM
about:blank
After you have thoroughly tested an update and determined any dependencies, you
can approve the update for deployment in the production network. Ideally, you should
approve the update for a pilot group of computers before approving the update for the
entire organization. You can also configure WSUS to use automatic updates. The
next lesson discusses automatic updates.
You can use Server Manager to install and configure the WSUS server role.
However, to be able to implement WSUS, your server must meet minimum hardware
and software requirements.
12 of 98 3/12/2019, 1:31 PM
about:blank
installed.
• SQL Server 2012 with service pack 1 (SP1), SQL Server 2012, SQL Server 2008
R2 SP2, SQL Server 2008 R2 SP1, or WID.
13 of 98 3/12/2019, 1:31 PM
about:blank
You can configure computers to use a WSUS server instead of defaulting to Microsoft
Update. use a Group Policy manually
change individual computer. GPO
because configure clients. configures
computers server, follow these steps:
1. Open Server Manager on a domain controller, and then from the Tools menu,
click Group Policy Manager.
2. In the Group Policy Manager window, in the navigation pane, expand your
forest, right-click your domain, and then click Create a GPO in this domain,
14 of 98 3/12/2019, 1:31 PM
about:blank
3. In the New GPO dialog box, in the Name text box, type a name for your GPO,
and then click OK.
4. Right-click the GPO you just created, and then click Edit.
6. double-click Configure
10. In the details pane, double-click Specify intranet Microsoft update service
location.
15 of 98 3/12/2019, 1:31 PM
about:blank
13. In the Set the Intranet statistics server text box, type the URL of the WSUS
server as specified in the step above, and then click OK.
Scheduling updates
16 of 98 3/12/2019, 1:31 PM
about:blank
Beginning with Windows 10 and Windows Server 2016, you can choose to delay
updates for up to one month. Use the Computer Configuration\Policies
\Administrative Templates\Windows Components\Windows Update\Defer
Upgrades and Updates setting to configure update deferment.
Check
Discovery
What are some benefits of using WSUS to manage Windows updates?
Lesson objectives
After you will be able to:
• Explain WSUS.
17 of 98 3/12/2019, 1:31 PM
about:blank
• Troubleshoot WSUS.
WSUS
• Identify updates.
• Approve deployment.
18 of 98 3/12/2019, 1:31 PM
about:blank
• Generate reports.
Wuauclt. /detectnow
In Windows Server 2016, WSUS includes Windows PowerShell cmdlets that you can
use to server. The following
Cmdlet Description
19 of 98 3/12/2019, 1:31 PM
about:blank
Cmdlet Description
Get-WsusClassification Gets the list of all WSUS classifications currently available in the
system.
Get-WsusUpdate Gets the WSUS update object with details about the update.
20 of 98 3/12/2019, 1:31 PM
about:blank
Computer groups provide a way to organize the computers to which a WSUS server
deploys computer groups that exist Computers
and New computers that server are
assigned groups.
You can create custom computer groups for controlling how updates are applied.
Typically, custom computer groups contain computers with similar characteristics. For
example, custom computer group in your
organization. create a custom computer where you
first deploy You would also typically separately
from
21 of 98 3/12/2019, 1:31 PM
about:blank
GPO for the computer that specifies the custom computer group to be joined, during
initial registration with the WSUS server.
Approving updates
22 of 98 3/12/2019, 1:31 PM
about:blank
this process by approving updates for specific groups of computers before approving
the update for the All Computers group.
Some updates are not considered critical and do not have any security implications.
You might decide not to implement some of these updates. For any updates that you
decide not to implement, you can decline the update. After an update is declined, it is
removed updates on the WSUS server,
You can determine if an update has been superseded by another update by looking
at the update's details. Superseded updates are typically no longer necessary,
because a newer update also includes the changes in this update. Superseded
updates default because, in some required.
For example, might be required running the
latest
23 of 98 3/12/2019, 1:31 PM
about:blank
When you enable the Automatic Updates feature on a server, the default
configuration downloads updates from installs
them. implemented WSUS, you should clients to obtain
updates WSUS server instead.
24 of 98 3/12/2019, 1:31 PM
about:blank
• Update frequency. This setting determines how often the updates are detected.
• Automatic restart behavior. This setting determines whether the computer will
restart required to do so by an
• Approve
• Deploy
Demonstration steps
2. Approve the Cumulative Update for Windows 10 Version 1607 for x64-
based Systems (KB3201845) update.
WSUS
25 of 98 3/12/2019, 1:31 PM
about:blank
WSUS provides a series of reports that you can use to manage your WSUS
environment. divided into three categories:
o Update Detailed Status. Shows details of each update status. Each page
shows a single update, with a list of computers for that update.
26 of 98 3/12/2019, 1:31 PM
about:blank
o Computer Detailed Status. Shows details of each computer status. Each page
shows the updates for a single computer.
Although you will be able to see these reports in the Update Services console right
after installing WSUS, the reports will not be available until you configure your server
to support configure your server the
following
3. In the Add Roles and Features Wizard window, in the Before you begin
page, click Next.
27 of 98 3/12/2019, 1:31 PM
about:blank
9. On the Specify Alternate Source Path page, in the Path text box, type the
path to the location containing the SxS files, and then click OK.
11. After the installation is complete, in the Confirmation page, click Close.
15. In the Feature Unavailable dialog box, click Microsoft Report Viewer 2008
Redistributable.
WSUS troubleshooting
28 of 98 3/12/2019, 1:31 PM
about:blank
After configuring your WSUS environment, you might find problems that you need to
address. be simple to handle, require you to
use special Here is a list of common might
encounter WSUS environment:
• The WSUS server stops with full database. When this happens, you will notice a
SQL Server dump file (SQLDumpnnnn.txt) in the Logs folder for SQL Server.
This usually occurs because of index corruption in the database. You might need
help DBA to recreate indexes, reinstall
WSUS
• Other problems. Consider using the server diagnostics tool and the client
29 of 98 3/12/2019, 1:31 PM
about:blank
Note: You can use the Get- Windows PowerShell cmdlets to retrieve server
settings and product settings, and to update settings during troubleshooting.
Check
Discovery
Why Group Policy to configure Windows WSUS?
Scenario
A. Datum has been applying updates manually to servers in a remote location. This
30 of 98 3/12/2019, 1:31 PM
about:blank
has made it difficult to identify which servers have the updates applied and which do
not. This is a potential security issue. Your task is to automate the update process by
extending A. Datum’s WSUS deployment to include the branch office.
Objectives
• Implement role.
• Configure
Lab setup
User Adatum\Administrator
Password: Pa55w.rd
For this lab, you need to use the available virtual machine environment. Before you
begin complete the following steps:
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
31 of 98 3/12/2019, 1:31 PM
about:blank
• Password: Pa55w.rd
Exercise WSUS
Scenario
Your organization has a WSUS server called LON-SVR2, which is located in the
head office. You need to install the WSUS server role on LON-SVR4 at a branch
location. LON-SVR4 will use LON-SVR2 as the source for Windows Update
downloads. LON-SRV4 will use Database
for the
Detailed Steps
Detailed Steps
32 of 98 3/12/2019, 1:31 PM
about:blank
Scenario
You need to configure the Group Policy settings to deploy automatic WSUS settings
to client computers. With the WSUS role configured on LON-SVR4 you must ensure
that the has its own computer LON-SVR4.
You computers in the Research unit (OU) to
use LON-SVR4 for updates.
4.
Detailed Steps
Detailed Steps ▼
Detailed Steps ▼
Detailed Steps
33 of 98 3/12/2019, 1:31 PM
about:blank
Scenario
After you have configured the Windows Update settings, you can view, approve, and
then deploy required updates. You want to use LON-CL1 as a test case for the
Research Department. You will approve, deploy, and verify an update on LON-CL1 to
confirm the proper configuration of the WSUS environment.
2. LON-CL1
Detailed Steps
Detailed Steps
Detailed Steps
Detailed Steps ▼
Result: After completing this exercise, you should have approved and deployed an
update by using WSUS.
34 of 98 3/12/2019, 1:31 PM
about:blank
Lesson objectives
After completing this lesson, you will be able to:
35 of 98 3/12/2019, 1:31 PM
about:blank
Scripts will not rerun themselves and must be rerun Configurations reapply as necessary, at whatever
through an administrative action to re-apply interval you choose.
settings, if needed.
Scripts require custom logic to detect and correct Configurations use the logic built into DSC
configuration resources configuration drift.
36 of 98 3/12/2019, 1:31 PM
about:blank
37 of 98 3/12/2019, 1:31 PM
about:blank
c. ConfigurationMode. This mode indicates the action that the LCM agent
takes when applying configurations. By default, the LCM agent is
configured to ApplyAndMonitor, meaning that the LCM agent applies the
but only logs (and correct)
ConfigurationMode ApplyAndAutoCorrect
agent applies the corrects
automatically.
38 of 98 3/12/2019, 1:31 PM
about:blank
3. Install desired modules. The modules developed for DSC are available in the
Windows PowerShell Gallery located at https://www.powershellgallery.com.
To install modules from the Windows PowerShell Gallery, you need the
PowerShellGet module, which Windows PowerShell 5.0 includes. Optionally,
you can install the PowerShellGet module for Windows PowerShell 4.0 by
downloading an MSI installer. The PowerShellGet module includes the Find-
Install-Module cmdlets needed the
Gallery. To install the
module, you can run
4. Create and compile a basic DSC configuration. After you have met all
prerequisites and installed the desired module(s) on the target servers that you
want to configure, begin authoring configuration scripts by using DSC
scripts do not actually
only a template that MOF file
pushes to or pulls from author
any Windows PowerShell The
called, much like a function, configuration data
into MOF files for each defined node.
39 of 98 3/12/2019, 1:31 PM
about:blank
5. Deploy the configurations to the desired servers. After you have compiled the
configuration into a .mof file, you push the configuration to the LCM on the
target node by using the Start-DscConfiguration cmdlet. Running this
command invokes the LCM agent to process the configuration, and if
necessary, make changes on the target node. To deploy a configuration named
LON-SRV1.mof you run the following command:
You can run this command with the –Wait and –Verbose parameters to see the
detailed steps that the LCM agent on the target node is processing. Using these
parameters is essential when you troubleshoot configuration deployment. Any
time after you have deployed a configuration, you can run the Test-
DscConfiguration to verify if the target state.
will return True if the state,
not.
40 of 98 3/12/2019, 1:31 PM
about:blank
DSC configurations are Windows PowerShell scripts that define a function. To create
a configuration, Windows PowerShell in a .ps1
file:
Configuration 20740DscConfiguration {
Node "LON-SVR1" {
WindowsFeature MyFeatureInstance {
Ensure = "Present"
Name = "RSAT"
}
WindowsFeature My2ndFeatureInstance {
Ensure = "Present"
Name = "Bitlocker"
}
}
}
41 of 98 3/12/2019, 1:31 PM
about:blank
Configuration syntax
• The Configuration block. This is the outermost script block. You define it by using
the and providing a name. name of
the 2740DscConfiguration.
• One or more Resource blocks. This is where the configuration sets the properties
for the resources that it is configuring. In the example above, there are two
resource blocks, each of which call the WindowsFeature resource.
Configuration 20740DscConfiguration {
param(
[string[]]$NodeName="localhost"
)
Node $NodeName {
WindowsFeature MyFeatureInstance {
Ensure = "Present"
Name = "RSAT"
}
WindowsFeature My2ndFeatureInstance {
Ensure = "Present"
42 of 98 3/12/2019, 1:31 PM
about:blank
Name = "Bitlocker"
}
}
}
Compiling
Before you can use a configuration, you must compile it into a MOF file. You do this
by calling the configuration the same way that you would call a Windows PowerShell
function.
Note: To call a configuration, the function must be in the global scope (as with
any other Windows PowerShell function). You can make this happen either by
using “.\” when calling the configuration file, or by running the configuration file
by pressing F5 or clicking the Run Script button in Windows PowerShell
Integrated Scripting Environment (ISE). For example, to compile the first
example above, run the following command:
.\20740DscConfiguration.ps1.
43 of 98 3/12/2019, 1:31 PM
about:blank
If the configuration takes a parameter, you must provide the parameter at compile
time. For the second example above, the command would be:
There are two steps for troubleshooting Windows PowerShell DSC. First, you should
review the available logs. Then, you should recycle the DSC cache to clear any
scripts
44 of 98 3/12/2019, 1:31 PM
about:blank
configuration scripts can be complex and it can be difficult to track errors. Therefore,
use the DSC Log resource to track the progress of your configuration in the DSC
Analytic event log.
In Event Viewer, you can find DSC events in Applications and Services
Logs\Microsoft\Windows\Desired State Configuration You can also use the
Windows Get-WinEvent to view the
operational following command:
As the example above shows, the Windows PowerShell DSC’s primary log name is
Microsoft-Windows-DSC. The primary name is appended to the channel name to
create the complete log name. The DSC engine writes mainly into three logs:
Operational, Debug. The analytic and off by
default, not show them, by Event
Viewer, click Windows Administrative then click
Event can start the Event Show-EventLog
in a Windows PowerShell window. On the View menu Viewer, click Show
Analytic and Debug Logs. The log name for the analytic channel is Microsoft-
Windows-Dsc/Analytic, and the debug channel is Microsoft-Windows-Dsc/Debug.
You could also use the wevtutil tool to enable the logs, as the following example
shows:
wevtutil. “Microsoft-Windows-Dsc/Analytic”
/e:
Windows PowerShell DSC logs are split over the three log channels based on the
importance of the message. The operational log contains all error messages, and can
help to identify a problem. The analytic log has a higher volume of events, and can
45 of 98 3/12/2019, 1:31 PM
about:blank
identify where error(s) occurred. This channel also contains any verbose messages.
The debug log contains logs that can help you understand how the errors occurred.
Every Windows PowerShell DSC event message begins with a job ID that uniquely
represents a Windows PowerShell DSC operation.
How
46 of 98 3/12/2019, 1:31 PM
about:blank
and testing a resource simultaneously, because Windows PowerShell DSC will load
the cached version until the process restarts. The only way to make Windows
PowerShell DSC load the newer version is to explicitly end the process hosting the
Windows PowerShell DSC engine.
To successfully recycle the configuration and clear the cache without restarting, you
must stop and then restart the host process. You can do this on a per-instance basis,
whereby you identify the process, stop it, and restart it.
You can use the following commands to identify the process ID of the WmiPrvSE and
stop the host WmiPrvSE process:
###
### find the process that is hosting the DSC engine
###
$dscProcessID = Get-WmiObject msft_providers |
Where-Object {$_.provider -like 'dsccore'} |
Select-Object -ExpandProperty HostProcessIdentifier
###
47 of 98 3/12/2019, 1:31 PM
about:blank
Discovery
How DSC help you manage
Show solution
Lesson objectives
After completing this lesson, you will be able to:
48 of 98 3/12/2019, 1:31 PM
about:blank
• Describe how to monitor other servers with the Server Manager tool.
49 of 98 3/12/2019, 1:31 PM
about:blank
• App history. The App history tab displays how much CPU time, network activity,
metered network activity, and network usage for tile updates and notifications have
been used by each running app in the current profile.
• Startup. Shows the applications that automatically start with the computer. This
also provides the ability to manage the startup applications.
You might consider using Task Manager when a performance-related problem arises.
For example, you might examine the running processes to determine if a particular
program CPU resources. Always Manager
shows resource consumption, need to
examine determine a true picture performance and
response
50 of 98 3/12/2019, 1:31 PM
about:blank
• An
• The
• A
• A minimum value.
51 of 98 3/12/2019, 1:31 PM
about:blank
Performance Monitor provides a collection of objects and counters that record data
about computer resource usage. There are many counters that you can research and
consider monitoring to meet your specific requirements.
The three components of Performance Monitor that you can use to view performance
data are:
• Data collector sets. Data collector sets represent a custom set of performance
counters for monitoring specific technologies, such as AD DS diagnostics, and
system diagnostics and performance.
• Reports. Each data collector set automatically creates performance reports. The
reports data that was collected collector
set
Processor
CPU counters are a feature of a computer’s CPU that stores the count of hardware-
related events. The most commonly used processor counters include:
52 of 98 3/12/2019, 1:31 PM
about:blank
• Processor > Interrupts/sec. This counter displays the rate, in incidents per
second, at which the processor received and serviced hardware interrupts.
Memory counters
The Memory > Pages/sec counter measures the rate at which pages are read from
or written to disk for resolving hard page faults. If excessive paging results in a value
that is greater than 1,000, there might be a memory leak. In other words, the
Memory > Pages/sec counter displays the number of hard faults second. A
hard the requested memory in RAM
because the paging file. An increase indicates that
more in turn suggests
Disk
The Physical Disk performance object consists of counters that monitor hard or fixed
53 of 98 3/12/2019, 1:31 PM
about:blank
disk drives. Disks store file, program, and paging data. Disks are read to retrieve
these items, and items are written to disks to record changes to them. The total
values of physical disk counters are the total of all the values of the logical disks, or
partitions, into which they are divided. The most commonly used disk counters
include:
• Physical Disk > Avg. Disk Queue Length. This counter indicates how many disk
requests are waiting for the I/O manager to service them at any given moment. If
the value is larger than two times the number of spindles, it means that the disk
itself might be the bottleneck. The longer the queue, the less satisfactory the disk
throughput.
Workloads might require access to several different networks that must remain
secure. Examples include connections for:
54 of 98 3/12/2019, 1:31 PM
about:blank
By monitoring the network performance counters, you can evaluate your network’s
performance. The primary network counters include:
• Network Interface > Current Bandwidth. This counter indicates the current
bandwidth being consumed on the network interface, in bits second (bps).
Most have maximum potential megabits
per example, Ethernet can 10 Mbps,
100 second (Gbps), and higher. counter,
divide 048,576 for Mbps. the
network’s potential bandwidth, you should implementing a
switched network or upgrading to a network that supports higher bandwidths.
• Network Interface > Output Queue Length. This counter indicates the current
length of the output packet queue on the selected network interface. A growing
value, or one that is consistently higher than two, could indicate a network
bottleneck, investigate.
55 of 98 3/12/2019, 1:31 PM
about:blank
56 of 98 3/12/2019, 1:31 PM
about:blank
The Windows Server 2016 operating system installs the Reliability Monitor tool by
default. hardware and software the
selected on the number and number
called indicates the server’s index
ranges represents the least 10
represents stable state. By using the stability administrators can
evaluate the server’s reliability quickly. Any issue that affects the server can change
the value of the stability index.
There are two ways to open the Reliability Monitor window: by searching in the
Control View reliability history Performance
Monitor, Monitoring Tools and selecting reliability.
The window includes:
57 of 98 3/12/2019, 1:31 PM
about:blank
• A reliability details table that contains the source of the issue, summary
information, date, and action taken.
• A group of actions that you can decide to perform, represented as links in the
console, which include:
o Saving the reliability history to an XML file. You can use this option if you want
reliability history information.
o Checking for a solution for all reported problems. You can use this option if you
want Reliability Monitor to connect to the Internet to locate online information
about resolving the reported problems.
Overview Viewer
58 of 98 3/12/2019, 1:31 PM
about:blank
Event Viewer provides access to the Windows Server 2016 event logs. Event logs
provide information about system events that occur within the Windows operating
system. These events include information, warning, and error messages about
Windows components and installed applications.
Event Viewer provides categorized lists of essential Windows log events, including
application, system events. Event log
groupings installed applications and component
categories. provide detailed information event that
occurred. occurs, Event Viewer provides source of
the event, technical information to assist troubleshooting the
event.
Additionally, Event Viewer allows you to consolidate logs from multiple computers
onto a centralized server by using subscriptions. Finally, you can configure Event
Viewer when a specified type might
include message, launching an script, or
other actions.
• The ability to view multiple logs. You can filter for specific events across multiple
logs. This makes it easier to investigate issues and troubleshoot the problems that
might appear in several logs.
• The ability to create and manage event log subscriptions. You can collect events
from remote computers, and then store them locally.
59 of 98 3/12/2019, 1:31 PM
about:blank
Note: To collect events from remote computers, you must create an inbound
rule in Windows Firewall to permit Windows Event Log management.
Event Viewer tracks information in several different logs. These logs provide detailed
information such as:
• A
• An
The following table lists several of the Event Viewer built-in logs.
60 of 98 3/12/2019, 1:31 PM
about:blank
System log Windows components and services log general events, and classify them
as error, warning, or information. The Windows operating system
predetermines the events that system components log.
The Applications and Services logs store events from a single application or
component rather than events that might have system-wide impact. This category of
logs includes four subtypes:
• Admin
• Operational
• Analytic
• Debug
Admin logs are of interest to end users, administrators, and support personnel who
use Event Viewer to troubleshoot problems. These logs provide guidance about how
to respond events found in the Admin problem and
define administrator can use.
61 of 98 3/12/2019, 1:31 PM
about:blank
The Analytic and Debug logs are not very user friendly. Analytic logs store events that
trace an issue, and they often log a high volume of events. Developers use Debug
logs when they are debugging applications. By default, both Analytic and Debug logs
are hidden and disabled.
Windows log files are 1,028 kilobytes (KB) in size by default, and the operating
system log files as necessary. log
manually, server as a local
• The
• The file.
• Automatic options.
62 of 98 3/12/2019, 1:31 PM
about:blank
Organizations typically have multiple servers, both physical and virtual, that they
must servers in an organization
organization’s complexity of its IT infrastructure. efficient way
to monitor deploy management software that
provides dashboard where administrators components
of the
Windows Server 2016 installs the Server Manager software by default. In addition,
63 of 98 3/12/2019, 1:31 PM
about:blank
you can install the Windows Server 2016 Remote Server Administration Tools, which
include Server Manager, on a Windows 10 client computer. It provides monitoring of
both local and remote servers, and collects monitoring data from specific servers and
presents it in a centralized dashboard. By using Server Manager, administrators can
monitor up to 100 servers. For monitoring more than 100 servers, you should
consider an enterprise monitoring solution such as System Center or Microsoft
Operations
64 of 98 3/12/2019, 1:31 PM
about:blank
• Determining server status and identifying critical events. Server Manager displays
servers with critical issues on the centralized dashboard in the color red. This
alerts administrators to start troubleshooting the issue immediately.
Discovery
Which of the tools discussed in this lesson would you use to check which resources an
application
Show solution
You can use Performance Monitor to collect, analyze, and interpret performance-
related data about your organization’s servers. This enables you to make informed
65 of 98 3/12/2019, 1:31 PM
about:blank
Lesson objectives
After you will be able to:
• Explain
• Describe
66 of 98 3/12/2019, 1:31 PM
about:blank
By calculating performance baselines for your server environment, you can interpret
real-time more accurately. server’s
performance your performance-monitoring during
normal a baseline by monitoring statistics over a
specific or symptom occurs compare
your your real-time statistics, anomalies.
Trends analysis
You should consider the value of performance data carefully to ensure that it reflects
your Additionally, you should that you
can use technological growth, plans. You
might number of servers that you
measure assess the required environment.
By analyzing performance trends, you can predict when existing capacity is likely to
be exhausted. Review historical analysis along with your business requirements, and
use this data to determine when you require additional capacity. Some peaks are due
67 of 98 3/12/2019, 1:31 PM
about:blank
to one-time activities, such as extremely large orders. Other peaks occur on a regular
basis, such as monthly payroll processing. These peaks could make a capacity
increase necessary to meet the demands of an increased number of employees.
Capacity planning
Capacity planning focuses on assessing server workload, the number of users that a
server can support, and ways to scale systems to support additional workload and
users applications and services performance of
your services could receive although
they area network (LAN) When
planning you should consider and the
way services, and applications infrastructure. Do
not overlook as power, cooling, and should consider
how your servers can scale up and out to support an increased workload.
Tasks such as upgrading to Windows Server 2016 might affect the performance of
your servers and network. An update could cause problems with an application that is
incompatible Server 2016. Careful before and
after identify these problems them.
68 of 98 3/12/2019, 1:31 PM
about:blank
• More servers.
• Additional hardware.
Understanding bottlenecks
69 of 98 3/12/2019, 1:31 PM
about:blank
There are four key hardware components: processor, disk, memory, and network. By
understanding how your operating system uses these components, and how they
interact with one another, you will have a better understanding of how to optimize
server performance.
Processor
Disk
Server hard disks store programs and data. Consequently, the throughput of hard
disks affects the speed of the workstation or server, especially when the workstation
or server is performing disk-intensive tasks. Most hard disks have moving parts, and
it takes time to position the read/write heads over the appropriate disk sector to
retrieve information. Furthermore, performance and
configuration overall disk performance. disks and
using Redundant Array of RAID) to
optimize reduce the potential bottleneck.
You also should remember that information on the disk moves into memory before it
is used. If there is a surplus of memory, the Windows Server operating system
70 of 98 3/12/2019, 1:31 PM
about:blank
creates a file cache for items recently written to or read from the disks. Installing
additional memory in a server can often improve the disk subsystem performance,
because accessing the cache is faster than moving the information into memory.
Memory
Network
71 of 98 3/12/2019, 1:31 PM
about:blank
Data collector sets are custom sets of performance counters, event traces, and
system
You also can configure a data collector set to run at a scheduled time, for a specific
length of time, or until it reaches a predefined size. For example, you can run the
data collector set for 10 minutes every hour during your working hours, to create a
72 of 98 3/12/2019, 1:31 PM
about:blank
performance baseline. You also can configure the data collector to restart when it
reaches set limits, so that it creates a separate file for each interval. You can
configure a schedule for performance monitoring when configuring a data collector
set. You can find scheduling options in the Schedule tab of the data collector set
properties window. The schedule-monitoring options that you can select include
beginning date, expiration date, and start time. You can also choose which day of the
week monitoring to run.
Data collector sets can contain the following types of data collectors:
You can create a data collector set from a template, from an existing set of data
collectors in a Performance Monitor view, or by selecting individual data collectors,
and then setting each individual option in the data collector set properties.
73 of 98 3/12/2019, 1:31 PM
about:blank
Demonstration steps
Create
Queue Length
Bytes Total/sec
3. Create a new copy of the large file on the local hard disk by copying it from
LON-DC1.
74 of 98 3/12/2019, 1:31 PM
about:blank
1. Switch to Performance Monitor, and then stop the data collector set.
4. Report.
Demonstration steps
Create a data collector set with an alert counter
75 of 98 3/12/2019, 1:31 PM
about:blank
2. Use the Performance Counter Alert option, and then add only the Processor
> % Processor Time counter.
3. Set the threshold to be above 10 percent and to generate an entry in the event
log when this condition is met.
4. set.
1. Open the Windows PowerShell ISE prompt, and then run the following script to
generate a load on the server:
\Labfiles\Mod12\StressTest.ps1
• Open Event Viewer, and then examine the Diagnosis-PLA log for performance
alerts.
Demonstration steps
76 of 98 3/12/2019, 1:31 PM
about:blank
2. Expand the folder under LON-SVR1 Performance. The data collector set’s
previous collection process generated this report. You can change from the
chart view to any other supported view.
4.
77 of 98 3/12/2019, 1:31 PM
about:blank
Monitoring
DNS provides name-resolution services on your network. You can monitor the
Windows Server 2016 DNS Server role to determine the following aspects of your
DNS infrastructure:
• Memory usage counter for measuring the system’s memory usage and memory
allocation created by operating a DNS
server.
78 of 98 3/12/2019, 1:31 PM
about:blank
• Zone transfer counters, including specific counters for measuring full zone transfer
(AXFR), incremental zone transfer (IXFR), and DNS zone-update notification
activity.
Monitoring DHCP
• Average Queue Length, which indicates the current length of the DHCP server’s
internal message queue. This number represents the number of unprocessed
messages that the server receives. A large number might indicate heavy server
traffic.
79 of 98 3/12/2019, 1:31 PM
about:blank
Server virtualization has only been a part of the Windows Server operating system
since Server 2008 and the Hyper-V role.
Many migrated some or all their virtual
machines virtualization servers. perspective, it is
important servers running as guest consume
resources way as physical host server
Hyper-V server virtualization enables you to create separate virtual machines and run
them concurrently by using the resources of the operating system running on a single
physical server. The operating systems running within each virtual machine are
guests, is running Hyper-V
When you create a virtual machine, you configure characteristics that define the
80 of 98 3/12/2019, 1:31 PM
about:blank
available resources for that guest. These resources include memory, processors,
disk-configuration and storage technology, and network adapter configuration. These
virtual machines operate within the boundaries of the resources that you allocate to
them, and can suffer from the same performance bottlenecks as host servers. As a
result, it is important that you monitor virtual machines in the same way that you
monitor your host servers.
Microsoft provides a tool, Hyper-V Resource Metering, which enables you to monitor
resource consumption on your virtual machines. Resource metering allows you to
track the resource utilization of virtual machines hosted on Windows Server 2016
computers that have the Hyper-V role installed.
• Maximum allocation.
81 of 98 3/12/2019, 1:31 PM
about:blank
bill departments or customers based on their hosted virtual machine use, rather than
charging a flat fee per virtual machine. An organization with only internal customers
also can use these measurements to examine use patterns and plan future
expansions.
Discovery
Why the baseline performance
Show solution
Event Viewer provides a convenient and accessible location for you to view events
82 of 98 3/12/2019, 1:31 PM
about:blank
that occur and that Windows Server records into one of several log files based on the
type of event that occurs. To support your users, you should know how to access
event information quickly and interpret the data in the event log.
Lesson objectives
After you will be able to:
• Explain is.
83 of 98 3/12/2019, 1:31 PM
about:blank
Server Manager provides a centralized location in which you can store and access
event logs for multiple remote servers that you are monitoring. Server Manager
provides a monitoring and troubleshooting solution where administrators can view, in
one console, information regarding specific events from different servers and
applications. This is more efficient than viewing event logs by connecting to a specific
server from a remote location.
• Local Server. Displays event logs that are generated on the local server where
Server Manager is running. By default, Application, Security, and System event
logs are displayed.
• All Servers. Displays event logs from all servers that Server Manager is
monitoring.
• Roles and Server Groups tiles in Server Manager Dashboard. You also can
choose an Events link in a specific Server Group tile in the Server Manager
Dashboard, such as the AD DS tile, DNS tile, or Remote Access tile, to display
the server role.
84 of 98 3/12/2019, 1:31 PM
about:blank
• Configuring event data to display. You can choose what type of events to display,
such as Critical, Error, Warning, and Informational. Additionally, you can choose
the event log files from which the events will display, such as Application, Directory
Service, DNS Server, Security, System, and Setup.
What view?
Event logs contain vast amounts of data, and it could be a challenge to narrow the
set of events that interest you. to query
and want to analyze. You import, and
share
85 of 98 3/12/2019, 1:31 PM
about:blank
You can filter custom views based on multiple criteria, including the:
• Specific or exclude.
• User
• View views.
• Create
Demonstration steps
Create
o Critical
86 of 98 3/12/2019, 1:31 PM
about:blank
o Warning
o Error
o System
87 of 98 3/12/2019, 1:31 PM
about:blank
them together.
To use the event subscription, you must configure the forwarding and the collecting
computers. The event-collecting functionality depends on the WinRM service and
Wecsvc. Both of these services must be running computers that participating
in the process.
Enabling
88 of 98 3/12/2019, 1:31 PM
about:blank
winrm quickconfig
• Configure computer.
Demonstration
Configure computer
89 of 98 3/12/2019, 1:31 PM
about:blank
3. Open Active Directory Users and Computers, and then add the LON-SVR1
computer as a member of the domain local Administrators group.
Configure computer
2. command.
computer LON-DC1
• Last 30 days
Check
Discovery
In your often do you check the event servers?
90 of 98 3/12/2019, 1:31 PM
about:blank
Scenario
A. Datum engineering and manufacturing office in
London, office and datacenter support the
London locations. A. Datum recently Server
2016 infrastructure.
Objectives
After will be able to:
• Establish baseline.
Lab
Estimated
91 of 98 3/12/2019, 1:31 PM
about:blank
Password: Pa55w.rd
For this lab, you will use the available virtual machine environment. Before you begin
the lab, you must complete the following steps:
1. On the host computer, click Start, point to Administrative Tools and then click
2. 20740C-LON-DC1 pane,
Password: Pa55w.rd
5. for 20740C-LON-SVR1
Scenario
92 of 98 3/12/2019, 1:31 PM
about:blank
Detailed Steps ▼
Detailed Steps
Detailed Steps
Scenario
Detailed Steps
Detailed Steps ▼
93 of 98 3/12/2019, 1:31 PM
about:blank
Detailed Steps ▼
Result: After this exercise, you should have used performance tools to identify a
potential performance bottleneck.
Scenario
1. prerequisites
2.
3. counter alert
Detailed Steps
Detailed Steps
Detailed Steps
Detailed Steps ▼
94 of 98 3/12/2019, 1:31 PM
about:blank
Detailed Steps ▼
Detailed Steps ▼
Result: At the end of this exercise, you should have successfully centralized event
logs and examined these logs for performance-related events.
Review
Check
Discovery
During the lab, you collected data in a data collector set. What is the advantage of
collecting data this way?
Module takeaways
• When monitoring, estimate the baseline system utilizations for each server.
This will help you determine whether the system is performing well or is
exceeding capacity.
During monitoring, multiple sources are Please see Student Companion Content for this course.
95 of 98 3/12/2019, 1:31 PM
about:blank
Review Question(s)
Check
Discovery
Your updates to the Windows should be
applied upon release. Do you recommend process?
Discovery
Your several applications applications. A
colleague WSUS to deploy application system
updates. issues with using
Show solution
Discovery
Why in an Active Directory AD DS)
domain?
Show solution
Check Knowledge
Discovery
96 of 98 3/12/2019, 1:31 PM
about:blank
Discovery
Why server performance
Show solution
Check Knowledge
Discovery
Why should you use performance alerts?
Tools
The tools that this module
Windows PowerShell WSUS Administering WSUS from the command- Windows PowerShell
cmdlets line interface
97 of 98 3/12/2019, 1:31 PM
about:blank
98 of 98 3/12/2019, 1:31 PM