Understanding Windows Server Administration …... Understanding Windows Server Administration Level...

Preview:

Citation preview

www.binarytitans.com

Understanding Windows Server AdministrationLevel 100

Ashwin Venugopal

BinaryTitans IT Solutions Pvt. Ltd.

www.binarytitans.com

www.binarytitans.com

What we are going to Learn here?

www.binarytitans.com

Content

Server Overview

Initial Configuration Tasks

Managing Storage

Essential Services

File and Print Services

Popular Windows Network Services and Applications

Monitoring and Troubleshooting Servers

www.binarytitans.com

Server Overview

www.binarytitans.com

Server Overview

Server - A computer that is a meant to be a dedicated service provider

Client - A computer that requests services.

System Administrators be working on a network that is made up of dedicated servers and clients.

www.binarytitans.com

Server Roles

When you are figuring out the hardware and software needs we need to look at the role the server needs to do and what kind of load does that need to take.

So a server role means the primary duty that the server performs.

A server could have multiple roles.

www.binarytitans.com

Primary Subsystems of a Server

Primary subsystems that make up a server are: Processor

Memory

Network

Storage

If any of these fails or under performs, it can compromise the service.

www.binarytitans.com

Processor

This is also called the brain of the computer.

Intel and AMD produce most of today’s server processors.

Qualcom and MediaTek produce most of the mobile processors.

Processors can be are 32 bit as well 64 bit

Server processors are mostly 64-bit, because it works faster thanthe older 32-bit processors.

www.binarytitans.com

RAM

RAM - random access memory - temporary memory.

It stores instructions and data and the processor accesses themdirectly.

If you have more RAM, you can load more instructions and data,making it faster and more efficient.

Windows Server 2012 R2 or the latest 2016 supports maximum of 4TB of RAM

www.binarytitans.com

Storage

Hard drives are generally half electronic/half mechanical devicesthat store magnetic fields on rotating platters.

Solid-state drives are electronic devices with no mechanicalcomponents.

Storage can be local storage

internal hard drives

external storage

network-attached storage (NAS)

storage area network (SAN).

www.binarytitans.com

Network

A good network connection is necessary for the server tocommunicate with other servers or the clients.

Most servers include more than one network interface cards orNICs.

We can combine multiple network cards together for performanceand redundancy reasons using NIC Teaming.

www.binarytitans.com

Motherboard

Motherboard brings these four subsystems together.

www.binarytitans.com

BIOS

Communication with disks, RAM, monitor etc are kept in theSystem ROM chips known as the BIOS (basic input/outputsystem).

BIOS helps the system to know how to communicate with somebasic components such as a keyboard.

The process of upgrading or updating your system ROM BIOS iscalled flashing the BIOS.

www.binarytitans.com

Power Supply and Cases

A case provides an enclosure that helps protect the systemcomponents that are inside.

A case with the power supplies and additional fans are usuallydesigned to provide a fair amount of airflow through the systemto keep the system cool.

www.binarytitans.com

Ports

Ports are plug sockets that enable you to connect an externaldevice, such as a printer, keyboard, mouse, or external drive, toyour computer.

www.binarytitans.com

Virtualization

Virtualization enables multiple operating systems to runconcurrently on a single physical machine.

This allows for a separation of services so that changes on onevirtual server do not affect the other virtual servers.

In addition, it offers a way to better utilize hardware since mosthardware is sitting idle most of the time.

www.binarytitans.com

Server Room (Data Center)

The server room contains the servers and most of thecommunication devices including switches and routers.

The room should be secure, with only a selected people allowed tohave access to it.

www.binarytitans.com

Windows Server

Windows NT (first released in 1993) is a family of operatingsystems produced by Microsoft.

Since then, Microsoft has released Windows 2000 Server, WindowsServer 2003, Windows Server 2003 R2, Windows Server 2008,Windows Server 2008 R2, Windows Server 2012, Windows Server2012 R2, Windows Server 2016.

www.binarytitans.com

Windows Server 2016

Similar to previous Windows Servers, Windows Server 2008 R2 willbe released with six editions. These are the most commoneditions:

Windows Server 2016 Standard edition

Windows Server 2016 Datacenter edition

Windows Server 2016 Foundation edition

Microsoft Hyper-V Server 2016

Windows Storage Server 2016 Workgroup edition

Windows Storage Server 2016 Standard edition

Windows Server 2016 is only available in 64-bit version.

.

www.binarytitans.com

Windows Server Roles

A server is designed to provide services.

Windows Server has organized the most common services intoserver roles.

Windows Server features are software programs that are notdirectly part of a role, but they can provide additionalfunctionality.

www.binarytitans.com

Full VersionServer CoreNano Server

You can install Windows Server 2016 in one of three modes: Full Version

Server Core

Nano Server

The full version is the normal version that you would expect fromWindows with a fully functional GUI interface.

Server Core installation provides a minimal environment with noWindows Explorer shell for running specific server roles and noStart button.

Nano Server is a remotely administered server operating systemand is optimized for private clouds and datacenters. This issignificantly smaller than Core Server and has no local logoncapability.

This Nano Server installation option is available for Standard andDatacenter editions of Windows Server 2016.

www.binarytitans.com

Windows Server 2016 System Requirements

Processor Minimum

1.4 GHz 64-bit processor

RAM Minimum

512 MB

ECC (Error Correcting Code) type or similar technology (Recommended)

Disk space requirements Minimum

32 GB

Network adapter requirements An Ethernet adapter capable of at least gigabit throughput

www.binarytitans.com

Different Installation Options

Clean Installation

A clean installation is installing the software from scratch on a newdrive or on newly reformatted drive.

The disadvantage is that the system and all of its software needsto be reinstalled, patched, and configured and data copied over,something that may take hours or even days.

www.binarytitans.com

Different Installation Options

Performing an Upgrade

Upgrade from an older version of Windows to Windows Server2016.

You cannot perform an in-place upgrade from 32-bit to 64-bitarchitecture.

You also cannot upgrade from one language to another.

www.binarytitans.com

Different Installation Options

Cloning

One way to install Windows Server 2008 R2 is to clone an already installed system in to an image file.

Create new servers using this cloned image.

www.binarytitans.com

Different Installation Options

Unattended Installation

An unattended installation is an installation that requires littleinteraction to install.

All the inputs required during the Installation are written on ananswer file.

An answer file is an XML file that stores the answers for a series ofgraphical user interface (GUI) dialog boxes.

You can use any text editor such as notepad to create and modifythe answer file.

www.binarytitans.com

Different Installation Options

Windows Deployment Services (WDS)

Windows Deployment Services (WDS) is a technology fromMicrosoft for network-based installation of Windows operatingsystem including Windows XP, Windows Vista, Windows Server2003, Windows Server 2008, Windows Server 2008 R2, WindowsServer 2012, Windows Server 2012 R2, Windows Server 2016.

The deployment of Windows can be fully automated andcustomized through the use of unattended installation scriptingfiles.

www.binarytitans.com

Windows Licensing

A software license is given to you from a software company likeMicrosoft that gives you permission to use a specific softwarepackage.

Most licenses from corporations such as Microsoft work more likea lease rather than a purchase of the actual software.

www.binarytitans.com

Windows Activation

Microsoft product activation, including Windows activation, is ananti-piracy technology designed to verify that software products arelegitimately licensed. If the server is not activated, it could restartevery hour.

www.binarytitans.com

Windows Updates

After installing Windows, we need to check whether Microsoft hasany Windows updates. This will include fixes, patches, service packs,and device drivers..

By adding fixes and patches, you will keep Windows stable andsecure.

If there are many fixes or patches, Microsoft releases them togetheras a service pack or a cumulative package.

www.binarytitans.com

Windows Updates

www.binarytitans.com

Initial Configuration Tasks

www.binarytitans.com

Initial Configuration Tasks

Configure the IP address

Set the computer name

Join an Active Directory domain

Configure the time zone

Enable automatic updates

Add roles and features

Enable Remote Desktop

Configure Windows Firewall settings

www.binarytitans.com

IP address classes and Ranges

www.binarytitans.com

Managing Storage

www.binarytitans.com

The first HDD (1956)

IBM 305 RAMAC

Random Access Method ofAccounting and control.

4 MB

50x24” disks

1200 rpm

www.binarytitans.com

The first HDD (1956)

Play

www.binarytitans.com

The internal look of HDD (Current HDD)

www.binarytitans.com

Data access of HDD

Access Time = Seek Time + Rotational Delay + Transfer Time

www.binarytitans.com

RAID introduction

A RAID is a Redundant Array of Inexpensive Disks. “I” can also be called as“Independent”

Disks are small and cheap, so it’s easy to put lots of disks (10s to100s) in one box for increased storage, performance, and availability.

www.binarytitans.com

RAID 0

Level 0 is non-redundant disk array

Files are Striped across disks, no redundant info

High read throughput

Best write throughput (no redundant info to write)

Any disk failure results in data loss

Stripe 0

Stripe 4

Stripe 3Stripe 1 Stripe 2

Stripe 8 Stripe 10 Stripe 11

Stripe 7Stripe 6Stripe 5

Stripe 9

data disks

www.binarytitans.com

RAID 10RAID 1

Level 0 is non-redundant disk array

Mirrored Disks, data is written to two places

On failure, just use surviving disk

On read, choose fastest to read

Write performance is same as single drive, read performance is 2x better

Expensive

data disks mirror copies

Stripe 0

Stripe 4

Stripe 3Stripe 1 Stripe 2

Stripe 8 Stripe 10 Stripe 11

Stripe 7Stripe 6Stripe 5

Stripe 9

Stripe 0

Stripe 4

Stripe 3Stripe 1 Stripe 2

Stripe 8 Stripe 10 Stripe 11

Stripe 7Stripe 6Stripe 5

Stripe 9

www.binarytitans.com

RAID 4

Block-level parity with Stripes

A read accesses all the data disks

A write accesses all data disks plus the parity disk

Heavy load on the parity disk

data disks

Parity disk

Stripe 0 Stripe 3Stripe 1 Stripe 2 P0-3

Stripe 4

Stripe 8 Stripe 10 Stripe 11

Stripe 7Stripe 6Stripe 5

Stripe 9

P4-7

P8-11

www.binarytitans.com

RAID 5

Block Interleaved Distributed Parity

Like parity scheme, but distribute the parity info over all disks (aswell as data over all disks)

Better read performance, large write performance

data and parity disks

Stripe 0 Stripe 3Stripe 1 Stripe 2 P0-3

Stripe 4

Stripe 8 P8-11 Stripe 10

P4-7Stripe 6Stripe 5

Stripe 9

Stripe 7

Stripe 11

www.binarytitans.com

RAID 6

Level 5 with an extra parity

Can tolerate two failures

data and parity disks

Stripe 0 Stripe 3Stripe 1 Stripe 2 P0-3

Stripe 4

Stripe 8 P8-11 Q8-11

P4-7Stripe 6Stripe 5

Stripe 9

Q4-7

Stripe 10

Q0-3

Stripe 7

Stripe 11

www.binarytitans.com

NAS(Network Attached Storage)

Network attached storage (NAS) is a file-level data storage devicethat is connected to a network and provide shared drives or folders.

NAS devices usually contain multiple drives in a form of RAID.

www.binarytitans.com

SAN(Storage Area Network)

A storage-area network (SAN) is a dedicated high-speed network (orsubnetwork) that interconnects and presents shared pools ofstorage devices to multiple servers.

www.binarytitans.com

Host Bus Adapter(HBA)

A host bus adapter (HBA) connects a computer to a network orstorage device.

www.binarytitans.com

LUN(Logical unit numbers)

LUN (Logical unit numbers) allow a SAN to break its storage downinto manageable pieces, each LUN can be assigned to one or moreservers in the SAN.

www.binarytitans.com

Fibre Channel

Optic fibre cabling gives you a higher bandwidth and also can beused over longer distances compared to copper cabling.

Fibre Channel or FC is a gigabit-speed technology heavily used forstorage networking.

It uses a Fibre Channel Protocol (FCP) as its transport protocol.

www.binarytitans.com

iSCSI

Internet Small Computing System Interface or iSCSI is an InternetProtocol (IP)-based storage networking standard for linking datastorage facilities.

iSCSI allows clients to send SCSI commands over a TCP/IP networkusing TCP port 3260.

www.binarytitans.com

File System A file system is a method of storing and organizing data.

Windows Server supports FAT16, FAT32, and NTFS file systems onhard drives.

www.binarytitans.com

FAT16 and FAT32

FAT16 or File Allocation Table (FAT) 16, is a simple file system thatuses minimum memory and was used with DOS.

FAT 16 can only support volumes up to 2 GB.

FAT32 was released with the second major release of Windows 95. FAT 32 can only support volumes up to 32 GB.

www.binarytitans.com

NTFS File System

New Technology File System (NTFS) is the preferred file system,largely because it supports a much larger hard disk (up to 16exabytes) and longer file names.

NTFS offers better security through permissions and encryption.

www.binarytitans.com

Essential Services

www.binarytitans.com

Naming Resolution

In today’s networks, you assign logical addresses, such as with IPaddressing.

Unfortunately, these addresses tend to be hard to remember,especially in the case of newer, more complicated IPv6 addresses.

Therefore, you need to use some form of naming service that willallow you to translate logical names, which are easier to remember,into logical addresses.

The most common naming service is Domain Name System, orDNS.

www.binarytitans.com

DNS

DNS is short for Domain Name System.

DNS is a hierarchical client/server-based distributed databasemanagement system that translates domain/hosts names to IPaddresses.

The top of the tree is known as the root domain.

Below the root domain, you will find top-level domains, such as.com, .edu, .org, and .net, as well as two-letter country codes, suchas .uk, .ca, and .us.

www.binarytitans.com

DNS Zones Zone is a collection of records which share similar naming pattern.

www.binarytitans.com

DNS Zones Types

When you define DNS zones, you create the zone as either: Forward lookup zone

A forward lookup zone is the most common type of zone. DNS clients canuse this zone to obtain such information as IP addresses that correspondto DNS domain names or services that is stored in the zone.

Reverse lookup zone.

Provides mapping from IP addresses back to DNS domain names.

www.binarytitans.com

DNS Round Robin

DNS servers use a mechanism called round-robin to share anddistribute loads for a network resource.

Round-robin rotates the order of resource records with the samename that point to different IP addresses.

www.binarytitans.com

DNS Queries&DNS Transfers

DNS queries and DNS transfers occur over TCP/UDP port 53.

So, if you have any firewall between servers (including firewallsrunning on the servers), you will need to open port 53.

www.binarytitans.com

DHCP

Dynamic Host Configuration Protocol (DHCP) services automaticallyassign IP addresses and related parameters (including subnet maskand default gateway and length of the lease) to a host.

A DHCP server maintains a pool which will have the list of IPaddresses.

When a DHCP client starts and needs an IP address assigned to it, itbroadcasts to a DHCP server asking for a leased address.

The client sends messages to UDP port 67, and the server sendsmessages to UDP port 68.

www.binarytitans.com

DORA Process

www.binarytitans.com

Active Directory

Active Directory is Microsoft’s answer to directory services and itdoes a lot more than just locating resources.

Active Directory take care of this by using Kerberos Authenticationand Single Sign-On (SSO). SSO means ability of Kerberos to providea user with one set of credentials and grant them access across arange of resources and services with that same set of credentials.Kerberos authenticates the credentials and issues the user a ticketwith which the user gains access to the resources and services thatsupport Kerberos.

Active Directory also makes user management more easier as it actsas a single repository for all of this user and computer relatedinformation.

More Details available here

Part 1

Part 2

www.binarytitans.com

File and Print Services

www.binarytitans.com

NTFS Permissions

www.binarytitans.com

Using Groups with NTFS Permissions

By assigning NTFS permissions to a group, you are grantingpermissions to one or more people simultaneously, reducing thenumber of entries in each access list, as well as the amount of effortrequired to grant multiple people access to certain files or folders

www.binarytitans.com

Types of NTFS Permissions

There are two types of permissions used in NTFS: Explicit permissions: Permissions granted directly to a file or folder.

Inherited permissions: Permissions that are granted to a folder (parent object or container) that flow into a child objects (subfolders or files inside the parent folder).

Besides granting the Allow permissions, you can also grant the Deny permission.

www.binarytitans.com

Effective Permissions

www.binarytitans.com

Copying and Moving Files

When copying and moving files, the following threescenarios can result:

If a folder or file is copied, the new folder or file willautomatically acquire the permissions of the driveor folder to which it is being copied.

If a folder or file is moved within the same volume,the folder or file will retain the same permissionsthat were already assigned.

If a folder or file is moved from one volume toanother volume, the folder or file will automaticallyacquire the permissions of the drive to which it isbeing moved.

www.binarytitans.com

File and Folder Owners

The owner of an object controls how permissions areset on the object and to whom permissions aregranted.

All administrators automatically have the Takeownership permission of all NTFS objects.

www.binarytitans.com

Encryption

Encryption is the process of converting data into aformat that cannot be read by another user.

Decryption is the process of converting data from anencrypted format back to its original format.

www.binarytitans.com

Encrypting File System (EFS)

Encrypting File System (EFS) is used to store encryptedfiles on NTFS file system volumes.

Encrypted files cannot be used unless a user has accessto the keys required to decrypt the information.

After a file has been encrypted, you do not have tomanually decrypt that file before you can use it.

Rather, once you encrypt a file or folder, you canwork with that file or folder just as you would withany other file or folder.

www.binarytitans.com

Encrypting File System (EFS)

www.binarytitans.com

Sharing Folders

Most users are not going to log onto a server directly to access their data files.

Instead, a drive or folder will be shared (known as a shared folder), and they will access the data files over a network.

To help protect against unauthorized drive or folder access, you should use share permissions along with NTFS permissions.

When a user needs to access a network share, he or she will use the UNC, which is \\servername\sharename.

www.binarytitans.com

Sharing Folders

www.binarytitans.com

Share Permissions

The share permissions that are available are as follows: Full control

Change

Read

Because users can be members of several groups, it ispossible for them to have several sets of explicitpermissions for a particular folder or file.

When this occurs, the permissions are combined toform the effective permissions, which are the actualpermissions when logging in and accessing a file orfolder.

www.binarytitans.com

Network Discovery and Browsing

www.binarytitans.com

Administrative Shares

An administrative share is a shared folder typicallyused for administrative purposes and usually hidden.

To make any shared folder or drive hidden, the sharename must have a $ at the end of it.

Because the share folder or drive cannot be seenduring browsing, you have to use a UNC name to findthe folder or drive, which includes the share name(including the $).

By default, all hard drive volumes with drive lettersautomatically have administrative shares (C$, D$, E$,and so on).

Other hidden shares can be created as needed forindividual folders.

www.binarytitans.com

Network Printing

Using network printing multiple users can share thesame printer.

This is a cost-effective solution when you have multipleemployees in different locations.

As an administrator, you can install two types ofprinters: local and network.

www.binarytitans.com

Printing in Windows

When you create or install the printer, you also load aprint driver that acts as a translator for Windows andthe programs running on Windows so that they do nothave to worry about the specifics of the printer’shardware and printer language.

www.binarytitans.com

Installing Printers

You can use the Add Printer Wizard to install theprinter.

After the printer is installed, it will appear in theDevices and Printers folder as well as in the DeviceManager.

www.binarytitans.com

Adding Printers

www.binarytitans.com

Adding Printers

When the Add Printer dialog box appears, specify theport to which the printer is connected.

If a printer is connected directly on the network, youwill have to create a Standard TCP/IP Port.

The TCP/IP printer port uses host port 9100 to communicate.

www.binarytitans.com

Adding Printer Drivers

www.binarytitans.com

Printer Pools

Network printers are usually used by more than oneuser.

If you have a high volume of print jobs, the printer canbecome congested and users will have to wait for thedocuments to print.

Either you can purchase a faster printer or you cancreate a group of printers called a printer pool that actsas a single virtual printer with a single print queue.

Users print to a single printer, and the print jobs aredistributed among the printers within the pool.

www.binarytitans.com

Printer Properties

With most printers, youhave a wide range ofoptions.

These options vary fromprinter to printer and theyare easily accessible byright-clicking the printer inthe Devices and Printersfolder and selecting PrinterProperties.

www.binarytitans.com

Printer Permissions

Printers are consideredobjects.

Therefore, you can assignpermissions to a printer sothat you can specify whocan use the printer, who canmanage the printer, andwho can manage the printjobs.

www.binarytitans.com

Managing Print Jobs

www.binarytitans.com

Print Spooler Folder

When the print device is available, the spooler retrieves the next printjob and sends it to the print device.

By default, the spool folder is located at C:\Windows\System32\Spool\Printers.

If you have a server that handles a large number of print jobs orseveral large print jobs, make sure the drive where the spool folder ishas sufficient disk space.

www.binarytitans.com

Popular Windows Network Services and Applications

www.binarytitans.com

World Wide Web and Web Pages

The World Wide Web is a system of web pages that can be viewedwith a web browser such as Internet Explorer, Chrome etc.

Web pages may contain text, images, videos, and othermultimedia that you can navigate between by using hyperlinks,and they are usually found by using a search engine such as Bingor Google.

When you fetching a web pages, you are connecting to the webserver using TCP port 80.

www.binarytitans.com

FTP

File Transfer Protocol (FTP) is a standard networkprotocol used to transfer a file from one host toanother over a TCP/IP-based network.

Different from HTTP, it uses two TCP ports to operate—ports 20 and 21.

FTP can be used with user-based passwordauthentication or with anonymous user access.

www.binarytitans.com

SMTP Email servers (or any server or client that sends email directly out)

use Simple Mail Transfer Protocol (SMTP) as an outgoing mailtransport.

SMTP uses TCP port 25.

www.binarytitans.com

IIS Manager

www.binarytitans.com

Creating a Website

When IIS is installed, the server will only have a default Web site.

IIS is designed to handle multiple Web sites.

www.binarytitans.com

Multiple Websites

The default Web site is made to respond to all IP addressesassigned to server port 80 and port 443.

To support multiple Web sites: You can assign additional IP addresses and assign a Web site

to each IP address.

You can also define a different port instead of port 80 or 443.When a user tries to access http://acme.com, they are reallyaccessing http://acme.com:80.

The :80 means port 80.

One method that allows you to share the same IP addressand port is to use host headers, which are used to specify aname that the Web site will respond to rather than all namesthat point to the address.

www.binarytitans.com

Web Server Folders

When you create a Web site, you specify a folder thatrepresents the root of the Web site.

Within that folder, you can create subfolders.

www.binarytitans.com

Application Pool

An application pool is a set of resources (a workerprocess or a set of worker processes) used by a Web siteor application that defines the memory boundaries forthe Web site.

Forcing each application to have its own applicationpool ensures that one Web site does not interfere withanother Web site on the same server, which ensuresapplication performance and improved applicationavailability.

Therefore, if one application has a memory leak orcrashes, it will not affect the other sites.

www.binarytitans.com

Default Files

By default, when you type in a Web site’s URL such ashttp://acme.com, it will go to the root folder designedfor acme.com and first look for one of the followingfiles:

1. Default.htm

2. Default.asp

3. Index.htm

4. Index.html

5. Isstart.htm

6. Default.aspx

www.binarytitans.com

IIS Security

Since Web sites are designed to provide information,some of which may be sensitive, there will be timeswhen you have to protect that data.

You can protect it by limiting who can access the Website, how users authenticate, and/or by encrypting thecontent when a request is made.

You can grant or deny specific computers, groups ofcomputers, or domains access to sites, applications,directories, or files on your server by usingAuthorization rules.

www.binarytitans.com

IIS Authentication

Authentication is used to confirm the identity of clientswho request access to your sites and applications.

www.binarytitans.com

SSL

When you use SSL to encrypt web traffic, you are usingasymmetric encryption, which involves a private key and a publickey.

The public key is provided to anyone who wants to access the webserver, and the private key is kept secret, usually by the web serverthat you are trying to protect.

The public key is used to encrypt data, which only the private keycan decrypt.

www.binarytitans.com

Remote Access Server

RAS enables users to connect remotely to a network.

By connecting to the RAS over the Internet, users canconnect to their organization’s network so that theycan access data files, read email, and access otherapplications just as if they were sitting at officenetwork.

www.binarytitans.com

VPN

Virtual private networks (VPNs) links two computersthrough a wide-area network such as the Internet.

To keep the connection secure, the data sent betweenthe two computers is encapsulated and encrypted.

This is an improvement to RAS.

www.binarytitans.com

Split Tunneling

By default, when you connect to a VPN using theprevious configuration, all web browsing and networktraffic goes through the default gateway on theRemote Network unless you are communicating withlocal home computers.

If you wish to route your Internet browsing throughyour home Internet connection rather than goingthrough the corporate network, you can do so. Suchconnection is called split tunnel.

www.binarytitans.com

Remote Desktop Services

Earlier days, users utilized dumb terminals (systemsconsisting of a monitor and keyboard without aprocessor) to connect to a mainframe.

Remote Desktop Services, earlier known as TerminalServices, is one of the components of MicrosoftWindows that allows a user to access applications anddata on a remote computer over a network.

www.binarytitans.com

RemoteApp

RemoteApp enables you to make programs that areaccessed remotely through Remote Desktop Servicesappear as if they are running on the end user's localcomputer.

www.binarytitans.com

Remote Desktop Gateway

As an alternate to VPN tunnel, you can use a RemoteDesktop Gateway (RD Gateway) role service to enableauthorized remote users to connect to resources on aninternal private network over the Internet using aRemote Desktop Connection (RDC) client.

RD Gateway uses the Remote Desktop Protocol (RDP)over HTTPS to establish a secure, encryptedconnection between remote users on the Internet andthe internal network resources on which theirproductivity applications run.

www.binarytitans.com

Virtualization

By using virtualization, you can run multiple operatingsystems concurrently on a single machine, whichallows separation of services while keeping cost to aminimum.

It can also be used to create Windows test systems in asafe, self-contained environment.

www.binarytitans.com

Microsoft Hyper-V

Microsoft Hyper-V is a hypervisor-based virtualizationsystem for x64 computers starting with WindowsServer 2008.

The hypervisor is installed between the hardware andthe operating system and is the main component thatmanages the virtual computers.

To run several virtual machines on a single computer,you need to have sufficient processing power andmemory to handle the load.

However, since most servers often sit idle,virtualization utilizes the server’s hardware moreefficiently.

www.binarytitans.com

Installing Hyper-V

To install Hyper-V, you need: An x64 version of Windows.

64-bit processors and BIOS that support hardware-assisted virtualization (Intel VT or AMD-V)technology.

www.binarytitans.com

Hyper-V Manager

www.binarytitans.com

Integration Services

Some of the older Windows built-in drivers do not run efficientlyunder a virtual environment. Therefore, you need to installIntegration Services, which includes some basic drivers.

Hyper-V integration services, are a bundled set of software which,when installed in the virtual machine improves integrationbetween the host server and the virtual machine.

www.binarytitans.com

Consolidation

In many organizations, we may want to consolidateseveral physical servers to one machine runningmultiple virtual servers.

Microsoft System Center Virtual Machine Manager(VMM) allows you to convert existing physicalcomputers into virtual machines through a processknown as physical-to-virtual (P2V) conversion.

www.binarytitans.com

Managing Disks

When you create a virtual hard drive, you can create: Fixed size virtual hard disks

Take up the full amount of disk space whencreated, even if there is no data using parts ofthe hard disk.

Dynamically expanding hard disks

Expands as it needs space up to its full space.

www.binarytitans.com

Snapshots

One of the strengths of virtual servers is the ability totake snapshots.

A snapshot is a point in time image of a virtual machinethat you can return to.

So if you make a change to the system, such as loadinga component or installing an update, and later foundthat it is causing problems, you can use the snapshotto quickly revert back to the point before the changewas made.

www.binarytitans.com

Monitoring and Troubleshooting Servers

www.binarytitans.com

ITIL

Information Technology Infrastructure Library

ITIL (Information Technology Infrastructure Library) is aset of practices for IT service management (ITSM) thatfocuses on aligning IT services with the needs ofbusiness.

www.binarytitans.com

ITIL

Information Technology Infrastructure Library

www.binarytitans.com

Implementing a Project

www.binarytitans.com

Troubleshooting Methodology

1. Discover the problem

2. Evaluate system configuration

3. List or track possible solutions and try to isolate the problem by removing or disabling hardware or software components

4. Execute a plan

5. Check results

6. Take a proactive approach

www.binarytitans.com

Troubleshooting Tools

Device Manager

System Information

Event Viewer

Task Manager

Resource Monitor

Performance Monitor

System Configuration

Memory Diagnostics tool

Troubleshooting Wizard

Boot Menu including Safe mode

Windows Repair

www.binarytitans.com

System Information

www.binarytitans.com

Event Viewer

www.binarytitans.com

System Configuration

www.binarytitans.com

Virtual Memory and Paging File

www.binarytitans.com

Task Manager

www.binarytitans.com

Performance Monitor

www.binarytitans.com

Resource Monitor

www.binarytitans.com

Advanced Boot Options

www.binarytitans.com

High Availability

www.binarytitans.com

System State

The Windows system state is a collection of systemcomponents that are not contained in a simple file butcan be backed up easily. It includes:

Boot files

DLLScache folder

Registry

SYSVOL

Active Directory NTDS.DIT

Certificate Store

User profiles

COM+ and WMI information

IIS metabase

www.binarytitans.com

Windows Server Administrator Jobs

www.binarytitans.com

Windows Server Administrator Jobs

Lets take a look at the leading Job Portals.

Naukri.com

Monster.com

Shine.com

www.binarytitans.com

Now willing to learn more?

Want this document offline? Click here.

Add your review here.

Ready To Deploy Training from BinaryTitans. Here we cover the following:

a. Installing and Configuring Windows Server 2012

b. Administering Windows Server 2012

c. Configuring Advanced Windows Server 2012 Services

d. Designing and Deploying Microsoft Exchange Server 2016

e. Cisco Certified Network Associate

To enroll, reach out to BinaryTitans Administration Team

enroll@binarytitans.com

+91 80 50158271

www.binarytitans.com

Thank you for reading

Recommended