You are on page 1of 65

Date Developed: Document No.

SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 1 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Table of Contents

INTRODUCTION ................................................................................... 3
HOW TO USE THIS COMPETENCY BASED LEARNING MATERIAL ..................... 4
LIST OF COMPETENCIES ..................................................................................... 6
MODULE CONTENT ........................................................................................ 7
LEARNING OUTCOME 1 SET UP USER ACCESS .................................................. 9
LEARNING EXPERIENCE 1................................................................................... 11
INFORMATION SHEET 3.1-1 ACTIVE DIRECTORY OF USERS & COMPUTERS .... 12
TASK SHEET 3.1-1 ............................................................................................... 32
LEARNING OUTCOME 2 CONFIGURE NETWORK SERVICES .......................... 34
LEARNING EXPERIENCE 2................................................................................... 36
TASK SHEET 3.2-1 CREATE LOCAL AREA CONNECTION .................................... 37
LEARNING OUTCOME 3 PERFORM TESTING, DOCUMENTATION & PRE-
DEPLOYMENT PRACTICES ........................................................................... 52
LEARNING EXPERIENCE 3................................................................................... 54
INFORMATION SHEET 2.3-1 IP ADDRESSING ..................................................... 55
SELF CHECK 3.3-1............................................................................................... 63
BIBLIOGRAPHY ............................................................................................ 65

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 2 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Introduction
This module is designed to develop & enhance
the knowledge, skills, & attitudes of a Computer
Systems Service Technician, in accordance with
industry standards. It covers the basic and common
competencies in addition to the core competencies
such as to install and configure computers systems,
set-up computer networks and servers and to
maintain and repair computer systems and
networks.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 3 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
HOW TO USE THIS COMPETENCY BASED LEARNING
MATERIAL

Welcome to the module in Computer Systems Servicing NC II. This


module contains training materials and activities for you to complete.

The units of competency are as follows: “Install and Configure


Computer Systems” contains knowledge, skills and attitudes required for
Computer Systems Servicing level (NCII).

You are required to go through a series of learning activities in order to


complete each learning outcome of the module. In each learning outcome are
Information Sheets and Resources Sheets (Reference Materials for further
reading to help you better understand the required activities). Follow these
activities on your own and answer the self-check at the end of each learning
outcome. You may remove a blank answer sheet at the end of each module
(or get one from your facilitator/trainer) to write your answers for each self-
check. If you have questions, don’t hesitate to ask your facilitator for
assistance.

Recognition of Prior Learning (RPL)

You may already have some or most of the knowledge and skills covered in
this learner's guide because you have:
been working for some time
already completed training in this area.

If you can demonstrate to your trainer that you are competent in a


particular skill or skills, talk to him/her about having them formally
recognized so you don't have to do the same training again. If you have a
qualification or Certificate of Competency from previous trainings, show it to
your trainer. If the skills you acquired are still current and relevant to the
unit/s of competency they may become part of the evidence you can present
for RPL. If you are not sure about the currency of your skills, discuss this with
your trainer.

At the end of this module is a Learner’s Diary. Use this diary to record
important dates, jobs undertaken and other workplace events that will assist
you in providing further details to your trainer or assessor. A Record of
Achievement is also provided for your trainer to complete once you complete
the module.

This module was prepared to help you achieve the required competency,
in Constructing Aquaculture Facilities. This will be the source of information
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 4 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
for you to acquire knowledge and skills in this particular trade independently
and at your own pace, with minimum supervision or help from your
instructor.

 Talk to your trainer and agree on how you will both organize the
Training of this unit. Read through the module carefully. It is divided
into sections, which cover all the skills, and knowledge you need to
successfully complete this module.

 Work through all the information and complete the activities in each
section. Read information sheets and complete the self-check.
Suggested references are included to supplement the materials
provided in this module.

 Most probably your trainer will also be your supervisor or manager.


He/she is there to support you and show you the correct way to do
things.

 Your trainer will tell you about the important things you need to
consider when you are completing activities and it is important that you
listen and take notes.

 You will be given plenty of opportunity to ask questions and practice on


the job. Make sure you practice your new skills during regular work
shifts. This way you will improve both your speed and memory and also
your confidence.

 Talk to more experience workmates and ask for their guidance.

 Use the self-check questions at the end of each section to test your own
progress.

 When you are ready, ask your trainer to watch you perform the
activities outlined in this module.

 As you work through the activities, ask for written feedback on your
progress. Your trainer keeps feedback/ pre-assessment reports for this
reason. When you have successfully completed each element, ask your
trainer to mark on the reports that you are ready for assessment.

 When you have completed this module (or several modules), and feel
confident that you have had sufficient practice, your trainer will arrange
an appointment with registered assessor to assess you. The results of
your assessment will be recorded in your competency Achievement
Record.
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 5 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
COMPUTER HARDWARE SERVICING NC II
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Install and Configure Installing and Configuring ELC724331


1.
Computer Systems Computer Systems

Setting – up Computer ELC724332


2. Set-up Computer Networks
Networks

Setting – up Computer ELC724333


3. Set-up Computer Servers
Servers

Maintain and Repair Maintaining and Repairing


4. Computer Systems and computer systems and ELC724334
Networks networks

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 6 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
MODULE CONTENT

QUALIFICATION TITLE: Computer Systems Servicing NC II

UNIT OF COMPETENCY: Set-up Computer Servers

MODULE TITLE: Setting up Computer Servers

MODULE DESCRIPTOR:

This unit covers the knowledge, skills and attitudes needed to set-
up computer servers for LANs and SOHO systems. It consists of competencies
to set-up user access and configures network services as well as to perform
testing, documentation and pre-deployment procedures.

NOMINAL DURATION: 40 Hours

LEARNING OUTCOMES:
At the end of this module you MUST be able to:

LO. 1 Set-up user access


LO. 2 Configure network services
LO. 3 Perform testing, documentation and pre-deployment practices

ASSESSMENT CRITERIA:
1. User folder is created in accordance with network operating system (NOS)
features
2. User access level is configured based on NOS features and established
network access policies/end-user requirements.
3. Security check is performed in accordance with established network access
policies/end-user requirements.
4. Normal functions of server are checked in accordance with manufacturer’s
instructions
5. Required modules /add-ons are installed/updated based on NOS
installation procedures
6. Network services to be configured are confirmed based on user/system
requirements
7. Operation of network services are checked based on user/system
requirements

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 7 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
8. Unplanned events or conditions are responded to in accordance with
established procedures
9. Pre-deployment procedures is undertaken based on enterprise policies and
procedures
10. Operation and security check are undertaken based on end-user
requirements
11. Reports are prepared/completed according to enterprise policies and
procedures.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 8 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 1 SET UP USER ACCESS

CONTENTS:

 Network Diagram
 User Access Hierarchy
 NOS Features
 Network usage policy
 File Sharing / Centralized Files storage

ASSESSMENT CRITERIA:

1. User folder is created in accordance with network operating system (NOS)


features
2. User access level is configured based on NOS features and established
network access policies/end-user requirements.
3. Security check is performed in accordance with established network
access policies/end-user requirements.

CONDITIONS:

The students/trainees must be provided with the following:

CONDITIONS:

The students/trainees must be provided with the following:

 Desktop Computer / Laptop Computer


 Server Computer
 Network switch
 Wireless router / Wireless access point
 Materials
- RJ45
- UTP Cable
 Tools:
- Screw drivers (assorted)
- Pliers (assorted)
- Soldering iron
- Wrenches
- Utility software
- Computer system
- Crimping tool
- LAN Tester

 Policies and procedures:


Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 9 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
- Procedures and guidelines
- Safety precautions
METHODOLOGIES:

 Lecture
 Discussion
 Demonstration
Viewing multimedia
ASSESSMENT METHODS:

 Written examination
Practical examination

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 10 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 1

SET UP USER ACCESS

Learning Activities Special Instructions

Read the Information Sheet 3.1- Read, understand the information


1(Active Directory of Users and sheet and evaluate yourself using
Computers) . Task Sheet 3.1-1

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 11 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
INFORMATION SHEET 3.1-1
ACTIVE DIRECTORY OF USERS AND COMPUTERS

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST able to:

1. Install Active Directory of users and computers.


2. Configure the newly installed Active Directory of Users and Computers.
3. Perform folder sharing and user access.

Introduction

Active Directory is essential to any Microsoft network built on the client-server


network model–it allows you to have a central sever called a Domain Controller (DC)
that does authentication for your entire network. Instead of people logging on to the
local machines they authenticate against your DC. Lets take a look at how to install
Microsoft’s Active Directory.

Installation
Open Server Manager and click on roles, this will bring up the Roles Summary on
the right hand side where you can click on the Add Roles link.

This will bring up the Add Roles Wizard where you can click on next to see a list of
available Roles. Select Active Directory Domain Services from the list, you will be

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 12 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
told that you need to add some features, click on the Add Required Features button
and click next to move on.

A brief introduction to Active Directory will be displayed as well as a few links to


additional resources, you can just click next to skip past here and click install to
start installing the binaries for Active Directory.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 13 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
When the installation is finished you will be shown a success message, just click
close.

Configuration
Open up Server Manager, expand Roles and click on Active Directory Domain
Services. On the right hand side click on the Run the Active Directory Domain
Services Installation Wizard (dcpromo.exe) link.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 14 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
This will kick off another wizard, this time to configure the settings for you domain, click next to
continue.

The message that is shown now relates to older clients that do not support the new
cryptographic algorithms supported by Server 2008 R2, these are used by default in
Server 2008 R2, click next to move on.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 15 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Choose to create a new domain in a new forest.

Now you can name your domain, we will be using a .local domain the reason why will be explained in
an upcoming article.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 16 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Since this is the first DC in our domain we can change our forest functional level to
Server 2008 R2.

We want to include DNS in our installation as this will allow us to have an AD


Integrated DNS Zone, when you click next you will be prompted with a message just
click yes to continue.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 17 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
You will need to choose a place to store log files, it is a best practice to store the
database and SYSVOL folder on one drive and the log files on a separate drive, but
since this is in a lab environment I will just leave them all on the same drive.

Choose a STRONG Active Directory Restore Mode Password and click next twice to
kick off the configuration.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 18 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
You will be able to see what components are being installed by looking in the following box.

When its done you will be notified and required to reboot your PC.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 19 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
To create a user account

1. Click Start, click Administrative Tools, and then click Active Directory
Users and Computers. The Active Directory Users and Computers MMC
opens. If it is not already selected, click the node for your domain. For
example, if your domain is example.com, click example.com.
2. In the details pane, right-click the folder in which you want to add a user
account.

Where?

o Active Directory Users and Computers/domain node/folder

3. Point to New, and then click User.


4. In First name, type the user's first name.
5. In Initials, type the user's initials.
6. In Last name, type the user's last name.
7. Modify Full name to add initials or reverse the order of first and last names.
8. In User logon name, type the user logon name. Click Next.
9. In New Object - User, in Password and Confirm password, type the user's
password, and then select the appropriate password options.
10. Click Next, review the new user account settings, and then click Finish.

To create a group account in Active Directory on the Domain Controller

1. Click Start, point to Programs, point to Administrative Tools, and then


click Active Directory Users and Computers.
2. In Active Directory Users and Computers window, expand <domain
name>.com
3. In the console tree, right-click the folder in which you want to add a
new group.
4. Click New, and then click Group.
5. Type the name of the new group. Use a name that you can easily
associate with the role or service for which you are creating.
6. In the New Object - Group dialog box, do the following:
1. In Group scope, click Global scope.
2. In Group type, click Security.
7. Click Finish.
8. Repeat steps 3 through 7 for all remaining groups.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 20 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Connect your computer to a domain

A domain is a collection of computers on a network with common rules and procedures that
are administered as a unit. Each domain has a unique name. Typically, domains are used for
workplace networks. To connect your computer to a domain, you'll need to know the name of
the domain and have a valid user account on the domain.

1. Open System by clicking the Start button , right-clicking Computer, and then
clicking Properties.
2. Under Computer name, domain, and workgroup settings, click Change settings. If
you're prompted for an administrator password or confirmation, type the password or
provide confirmation.
3. Click the Computer Name tab, and then click Change. Alternatively, click Network
ID to use the Join a Domain or Workgroup wizard to automate the process of
connecting to a domain and creating a domain user account on your computer.
4. Under Member of, click Domain.

 The Computer Name/Domain Changes dialog box


 Type the name of the domain that you want to join, and then click OK.
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 21 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
 You will be asked to type your user name and password for the domain.
 Once you are successfully joined to the domain, you will be prompted to
restart your computer. You must restart your computer before the changes
take effect.

Sharing files with public folders

To share items in your Public folder and its subfolders with other users of your
computer, you don’t need to do a thing. By default, all users with an account on your
computer can log on and create, view, modify, and delete files in the Public folders.
The person who creates a file in a Public folder (or copies an item to a Public folder)
is the file’s Owner and has Full Control access. All others who log on locally have
Modify access. For more information on access levels, see What are permissions?

To share items in your Public folder with network users, click the Start button ,
click Network, and then click Network and Sharing Center. Turn on Public Folder
Sharing (for information on how to do this, see Sharing files with the Public folder).
You can’t select which network users get access, nor can you specify different access
levels for different users. Sharing via the Public folder is quick and easy—but it’s
rigidly inflexible.

Sharing files and folders from any folder

Whether you plan to share files and folders with other people who share your
computer or with those who connect to your computer over the network (or both),
the process for setting up shared resources is the same as long as the Sharing Wizard
is enabled. We recommend that you use the Sharing Wizard even if you normally
disdain wizards. It’s quick, easy, and almost certain to make all of the correct settings
for network shares and NTFS permissions—a sometimes daunting task if undertaken
manually. Once you’ve configured shares with the wizard, you can always dive in
and make changes manually if you want.

To make sure the Sharing Wizard is enabled, click the Start button , type “folder”
in the Search box, and then click Folder Options. Click the View tab. In the Advanced
settings box, scroll down the list and make sure the Use Sharing Wizard
(Recommended) check box is selected.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 22 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
The process for setting up shared resources is the same as long as the Sharing
Wizard is enabled

With the Sharing Wizard at the ready, follow these steps to share files or folders:

1. In Windows Explorer, select the folders or files you want to share. (You can
select multiple objects.)
2. In the Command bar, click Share. (Alternatively, right-click, and then click
Share.)

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 23 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
people

share files or folders, and then click Add. You can type a name in the box or
click the arrow to display a list of available names. Repeat for each person
you want to add.

The list includes all of the users who have an account on your computer, plus
Everyone. If you want to grant access to someone who doesn’t appear in the
list, you need to create a user account for that person (for information on how
to do this, see Create a user account).

Note

 If you select Everyone, and you have password-protected sharing


enabled, the user must still have a valid account on your computer.
However, if you have turned off password-protected sharing, network
users can gain access only if you grant permission to Everyone or to
Guest.

n level. Your choices are:

 Reader. Users with this permission level can view shared files and run
shared programs, but cannot change or delete files. Selecting Reader in
the Sharing Wizard is equivalent to setting NTFS permissions to Read
& Execute.
 Contributor. This permission level, which is available only for shared
folders (not shared files), allows the user to view all files, add files, and
change or delete files that the user adds. Selecting Contributor sets
NTFS permissions to Modify.
 Co-owner. Users who are assigned the Co-owner permission have the
same privileges that you do as the Owner: They can view, change, add,
and delete files in a shared folder. Selecting Co-owner sets NTFS
permissions to Full Control for this user.

Note

 You might see other permission levels if you return to the Sharing
Wizard after you set up sharing. The Custom permission level identifies
NTFS permissions other than Read & Execute, Modify, and Full Control.
The Mixed permission level appears if you select multiple items, and

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 24 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
those items have different sharing settings. Owner, of course, identifies
the owner of the item.

Share. After a few moments, the wizard displays a page similar to the
page shown in the following illustration.

Using advanced sharing to create shorter network paths

Confusingly, when you share one of your profile folders (or any other subfolder of
%SystemDrive%\Users), Windows Vista creates a network share for the Users
folder—not for the folder you shared. This isn’t a security problem; NTFS permissions
prevent network users from seeing any folders or files except the ones you explicitly
share. But it does lead to some long UNC paths to network shares.

For example, if you share the My Received Files subfolder of Documents (as shown
after step 5 in the previous section), the network path is \\CARL-
PC\Users\Carl\Documents\My Received Files. If this same folder had been
anywhere on your computer outside of the Users folder, no matter how deeply nested,
the network path would instead be \\CARL-PC\My Received Files. Other people to
whom you’ve granted access wouldn’t need to click through a series of folders to find
the files in the intended target folder.

Network users, of course, can map a network drive or save a shortcut to your target
folder to avoid this problem. But you can work around it from the sharing side, too:
Use advanced sharing to share the folder directly. (Do this after you’ve used the
Sharing Wizard to set up permissions.)

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 25 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Note

 Make sure the share name you create doesn’t have spaces. Eliminating spaces
makes it easier to type a share path that works as a link.

Stopping or changing sharing of a file or folder

If you want to stop sharing a particular shared file or folder, select it in Windows
Explorer, and then click Share. The Sharing Wizard appears, as shown in the
following illustration.

Use the Sharing Wizard to change sharing permissions or to stop sharing a file or
folder

If you click Change sharing permissions, the wizard continues as when you created
the share, except that all existing permissions are shown. You can add or remove
names and change permissions.

The Stop sharing option removes access control entries that are not inherited. In
addition, the network share is removed; the folder will no longer be visible in another
user’s Network folder.

Setting advanced sharing properties

If you disable the Sharing Wizard, Windows Vista reverts to a process similar to that
employed by earlier versions of Windows (except the aberration in Windows XP called
Simple File Sharing—nothing before or after is similar to that). Without the Sharing
Wizard, you configure network shares independently of NTFS permissions. (For more

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 26 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
information about this distinction, see How share permissions and NTFS permissions
work together at the end of this section.)

With the Sharing Wizard disabled, when you select a folder, and then click Share,
rather than the wizard appearing, Windows opens the folder’s properties dialog box
and displays the Sharing tab, as shown in the next illustration. Even with the
Sharing Wizard enabled, you can get to the same place; right-click the folder, and
then choose Properties.

Note

 The Sharing tab is part of the properties dialog box for a folder, but not for
files. Also, when the Sharing Wizard is disabled, the Share button appears on
the Command bar only when you select a single folder. Only the Sharing
Wizard is capable of making share settings for files and for multiple objects
simultaneously.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 27 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
The Share button summons the Sharing Wizard, but it’s available only when the
Sharing Wizard is enabled

To create or modify a network share using advanced settings, follow these steps:

1. On the Sharing tab, click Advanced Sharing.


2. Select the Share this Folder check box.

Note

 If the folder is already shared, and you want to add another share name
(perhaps with different permissions), click Add, and then type the name for
the new share. The share name is the name that other users will see in their
own Network folders. Windows initially proposes to use the folder’s name as
its share name. That’s usually a good choice, but you’re not obligated to accept
it. If you already have a shared folder with that name, you’ll need to pick a
different name.

Comments box. Other users will


see this description when they inspect the folder’s properties dialog box in their
Network folder (or when they use the Details view).
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 28 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
specify a number in the Limit the number of simultaneous users to box.
Windows Vista permits up to 10 concurrent users. (If you need to share a folder with
more than 10 users at once, you must use a server version of Windows.)

Permissions.

Everyone

Caution

 When you share a folder, you also make that folder’s subfolders available on
the network. If the access permissions you set for the folder aren’t
appropriate for any of its subfolders, either reconsider your choice of access
permissions or restructure your folders to avoid the problem.

Group or user names box, select the name of the user or group you want
to manage. The share permissions for the selected user or group appear in the
permissions box.
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 29 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Allow, Deny, or neither for each access control entry:

 Full Control. Allows users to create, read, write, rename, and delete files in
the folder and its subfolders. In addition, users can change permissions and
take ownership of files on NTFS volumes.
 Change. Allows users to read, write, rename, and delete files in the folder
and its subfolders, but not create new files.
 Read. Allows users to read files but not write to them or delete them. If you
select neither Allow nor Deny, it is still possible that the user or group can
inherit the permission through membership in another group that has the
permission. If the user or group doesn’t belong to another such group, the
user or group is implicitly denied permission.

Note

o To remove a name from the Group or user names box, select the
name, and then click Remove. To add a name to the list, click Add.
Enter the names of the users and groups you want to add.

OK in each dialog box.

How share permissions and NTFS permissions work together

The implementation of share permissions and NTFS permissions is confusingly


similar, but it’s important to recognize that these are two separate levels of access
control. Only connections that successfully pass through both gates are granted
access.

Share permissions control network access to a particular resource. Share


permissions do not affect users who log on locally. You set share permissions in the
Advanced Sharing dialog box, which you access from the Sharing tab of a folder’s
properties dialog box.

NTFS permissions apply to folders and files on an NTFS-formatted drive. They provide
extremely granular control over an object. For each user to whom you want to grant
access, you can specify exactly what they’re allowed to do: run programs, view folder
contents, create new files, change existing files, and so on. You set NTFS permissions
on the Security tab of the properties dialog box for a folder or file.

It’s important to recognize that the two types of permissions are combined in the
most restrictive way. If, for example, a user is granted Read permission on the
network share, it doesn’t matter whether or not the account has Full Control NTFS
permissions on the same folder; the user gets only Read access when connecting over
the network.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 30 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
In effect, the two sets of permissions act in tandem as gatekeepers that winnow out
incoming network connections. An account that attempts to connect over the
network is examined first by the share permissions gatekeeper. The account is either
bounced out on its caboodle or allowed to enter with certain permissions. It’s then
confronted by the NTFS permissions gatekeeper, which might strip away (but not
add to) some or all of the permissions granted at the first doorway.

In determining the effective permission for a particular account, you must also
consider the effect of group membership. Permissions are cumulative; an account
that is a member of one or more groups is granted all of the permissions that are
granted explicitly to the account as well as all of the permissions that are granted to
each group of which it’s a member. The only exception to this rule is Deny
permissions, which take precedence over any conflicting Allow permissions.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 31 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
TASK SHEET 3.1-1
Title: ACTIVE DIRECTORY INSTALLATION & CONFIGURATION

Performance Objective: Given the proper procedure in Active Directory


Installation and Configuration, you should be able to
install and configure Active Directory in Windows
Server 2008 r2.

Supplies/Materials :

 Ethernet Cables
 Mother Board manual
 Network Drivers
 Operating System Installer (Windows Server 2008 r2)

Equipment : 1 Laptop Computer


1 Desktop Computer
1 Server Computer
1 Switch
1 Wireless Router (with router, access point
and repeater capability

Steps/Procedure:

1. Prepare the necessary equipment and materials for this task.


2. Prepare the server computer, make sure it is running in Windows Server
2008 r2 operating system.
3. Install Active Directory of Users and Computers from Add roles wizard. (Refer
to Information Sheet 3.1.1 for detailed guide in the installation.)
4. After successful installation create a new domain / forest name it
spusurigao.edu.ph
5. Create user group and name it spusemp.
6. Create 2 user accounts name them user1, and user2.
7. Join the new users to the spusemp group.
8. Join the two computers to the domain and use the newly created accounts
as credentials.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 32 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
9. Test network connectivity and file / folder sharing.
10. After completing the task make sure to terminate all electrical connections
turn off all used equipment and observe 7s in respective area.

Assessment Method:

Performance Criteria Checklist 3.1-1

Performance Criteria Checklist 3.1-1

CRITERIA
YES NO
Did you….
1. Successfully installed the active directory of users and
computers?

2. Successfully created a new domain?

3. Successfully created user accounts?

4. Successfully joined the client computers to the domain?

5. Successfully performed File and folder sharing?

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 33 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 2 CONFIGURE NETWORK SERVICES

CONTENTS:

1. Network Diagram / Network Design


2. Network services installation and configuration
3. Network Operation
4. Contingency plans for unplanned events or conditions

ASSESSMENT CRITERIA:

1. Normal functions of server are checked in accordance with manufacturer’s


instructions
2. Required modules /add-ons are installed/updated based on NOS installation
procedures
3. Network services to be configured are confirmed based on user/system
requirements
4. Operation of network services are checked based on user/system requirements
5. Unplanned events or conditions are responded to in accordance with established
procedures

The students/trainees must be provided with the following:

CONDITIONS:

The students/trainees must be provided with the following:

1. Desktop Computer / Laptop Computer


2. Server Computer
3. Network switch
4. Wireless router / Wireless access point
5. Materials
- RJ45
- UTP Cable
6. Tools:
- Screw drivers (assorted)
- Pliers (assorted)
- Soldering iron
- Wrenches
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 34 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
- Utility software
- Computer system
- Crimping tool
- LAN Tester
7. Policies and procedures:
- Procedures and guidelines
- Safety precautions
METHODOLOGIES:

 Lecture
 Discussion
 Demonstration
Viewing multimedia
ASSESSMENT METHODS:

 Written examination
 Practical examination

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 35 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 2

CONFIGURE NETWORK SERVICES

Learning Activities Special Instructions

Read the Information Sheet 3.2-1( Read, understand the information


Installation and Configuration of sheet and evaluate yourself using
Server Network Services ) Task sheet 3.2-1.

Perform the instructions stated in the


Task Sheet 3.2-1, before proceeding
to the next activity.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 36 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
INFORMATION SHEET 3.2-1
Installation and Configuration of Server Network Services

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST able to:

1. Install and Configure DHCP Server.


2. Install and Configure File Services.
3. Perform File and Folder Redirection.

Introduction

Dynamic Host Configuration Protocol (DHCP) is a core infrastructure service


on any network that provides IP addressing and DNS server information to PC
clients and any other device. DHCP is used so that you do not have to
statically assign IP addresses to every device on your network and manage
the issues that static IP addressing can create. More and more, DHCP is being
expanded to fit into new network services like the Windows Health Service
and Network Access Protection (NAP). However, before you can use it for more
advanced services, you need to first install it and configure the basics. Let’s
learn how to do that.

Installing Windows Server 2008 DHCP Server


Installing Windows Server 2008 DCHP Server is easy. DHCP Server is now a “role” of
Windows Server 2008 – not a windows component as it was in the past.

To do this, you will need a Windows Server 2008 system already installed and
configured with a static IP address. You will need to know your network’s IP address
range, the range of IP addresses you will want to hand out to your PC clients, your
DNS server IP addresses, and your default gateway. Additionally, you will want to
have a plan for all subnets involved, what scopes you will want to define, and what
exclusions you will want to create.

To start the DHCP installation process, you can click Add Roles from the Initial
Configuration Tasks window or from Server Manager à Roles à Add Roles.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 37 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Figure 1: Adding a new Role in Windows Server 2008

When the Add Roles Wizard comes up, you can click Next on that screen.

Next, select that you want to add the DHCP Server Role, and click Next.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 38 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Figure 3: Network connection binding

What the wizard is asking is, “what interface do you want to provide DHCP services
on?” I took the default and clicked Next.

Next, I entered my Parent Domain, Primary DNS Server, and Alternate DNS
Server (as you see below) and clicked Next.

Figure 4: Entering domain and DNS information


Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 39 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
I opted NOT to use WINS on my network and I clicked Next.

Then, I was promoted to configure a DHCP scope for the new DHCP Server. I have
opted to configure an IP address range of 192.168.1.50-100 to cover the 25+ PC
Clients on my local network. To do this, I clicked Add to add a new scope. As you
see below, I named the Scope WBC-Local, configured the starting and ending IP
addresses of 192.168.1.50-192.168.1.100, subnet mask of 255.255.255.0, default
gateway of 192.168.1.1, type of subnet (wired), and activated the scope.

Figure 5: Adding a new DHCP Scope

Back in the Add Scope screen, I clicked Next to add the new scope (once the DHCP
Server is installed).

I chose to Disable DHCPv6 stateless mode for this server and clicked Next.

Then, I confirmed my DHCP Installation Selections (on the screen below) and
clicked Install.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 40 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Figure 7: Windows Server 2008 DHCP Server Installation succeeded

I clicked Close to close the installer window, then moved on to how to manage my
new DHCP Server.

How to Manage your new Windows Server 2008 DHCP Server


Like the installation, managing Windows Server 2008 DHCP Server is also easy.
Back in my Windows Server 2008 Server Manager, under Roles, I clicked on the
new DHCP Server entry.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 41 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Figure 8: DHCP Server management in Server Manager

While I cannot manage the DHCP Server scopes and clients from here, what I can
do is to manage what events, services, and resources are related to the DHCP
Server installation. Thus, this is a good place to go to check the status of the DHCP
Server and what events have happened around it.

However, to really configure the DHCP Server and see what clients have obtained IP
addresses, I need to go to the DHCP Server MMC. To do this, I went to Start à
Administrative Tools à DHCP Server, like this:

Figure 9: Starting the DHCP Server MMC

When expanded out, the MMC offers a lot of features. Here is what it looks like:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 42 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Figure 10: The Windows Server 2008 DHCP Server MMC

The DHCP Server MMC offers IPv4 & IPv6 DHCP Server info including all scopes,
pools, leases, reservations, scope options, and server options.

If I go into the address pool and the scope options, I can see that the configuration
we made when we installed the DHCP Server did, indeed, work. The scope IP
address range is there, and so are the DNS Server & default gateway.

Figure 11: DHCP Server Address Pool

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 43 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Figure 12: DHCP Server Scope Options

So how do we know that this really works if we do not test it? The answer is that we
do not. Now, let’s test to make sure it works.

How do we test our Windows Server 2008 DHCP Server?


To test this, I have a Windows Vista PC Client on the same network segment as the
Windows Server 2008 DHCP server. To be safe, I have no other devices on this
network segment.

I did an IPCONFIG /RELEASE then an IPCONFIG /RENEW and verified that I


received an IP address from the new DHCP server, as you can see below:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 44 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Figure 13: Vista client received IP address from new DHCP Server

Also, I went to my Windows 2008 Server and verified that the new Vista client was
listed as a client on the DHCP server. This did indeed check out, as you can see
below:

Figure 14: Win 2008 DHCP Server has the Vista client listed under Address Leases

Install the File Services server role

To perform this procedure, you must be a member of the Administrators group on


the local computer.

1. On Content-01, click Start, point to Administrative Tools, and then click


Server Manager.
2. In Roles Summary, click Add Roles.
3. In the Add Roles Wizard, on the Before You Begin page, click Next.
4. On the Select Server Roles page, select File Services, and then click Next.

To perform this procedure, you must be a member of the Administrators group on


the local computer.

1. On Content-01, click Start, point to Administrative Tools, and then click


Server Manager.
2. In Roles Summary, click Add Roles.
3. In the Add Roles Wizard, on the Before You Begin page, click Next.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 45 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
4. On the Select Server Roles page, select File Services, and then click Next.

5. On the File Services page, click Next.


6. On the Select Role Services page, in Role Services, ensure that File Server
is selected. Also select BranchCache for network files, and then click Next.

7. On the Confirm Installation Selections page, confirm your selections, and


then click Install.
8. On the Installation Results page, confirm that your installation of the File
Services role and required role services completed successfully, and then
click Close.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 46 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
FOLDER REDIRECTION

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 47 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 48 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 49 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
TASK SHEET 3.2-2
Title: NETWORK SERVICES CONFIGURATION

Performance Objective: Given the proper procedure in network service


configuration, you should be able install file server
services and dhcp server.

Supplies/Materials :

 Ethernet Cables
 Mother Board manual
 Network Drivers

Equipment : 1 set DESKTOP COMPUTER


1 Laptop Computer
1 server computer
1 network switch
1 Wireless Router
Steps/Procedure:

1. Prepare the necessary materials before starting the task.


2. Install DHCP Server using add roles wizard.
3. Configure the new DHCP server.
4. Connect Clients to the DHCP Server. (Make sure server and desktop
computer are connected to the switch and the laptop computer is
connected to the wireless router).
5. Test Network Connectivity.
6. Install File services in the add services role.
7. Perform folder redirection.
8. Test the folder redirection function in the server.
9. After completing the task, terminate all electrical and network
connections, turn off equipment and observe 7s in work area.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 50 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Assessment Method:

Performance Criteria Checklist 3.2.1

Performance Criteria Checklist 3.2-1

CRITERIA
YES NO
Did you….
1. Install the DHPC Server?

2. Connect the clients and server computer to the newly


created DHCP Server?

3. Install the File Server feature?

4. Perform the Folder Redirection?

5. Establish network connectivity across the client


computers?

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 51 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 3 PERFORM TESTING, DOCUMENTATION &
PREDEPLOYMENT PRACTICES

CONTENTS:

1. Occupational health and safety


2. Inspection of systems and networks with manuals
3. Pre- deployment procedures
4. Making documents and reports

ASSESSMENT CRITERIA:

1. Pre-deployment procedures is undertaken based on enterprise policies


and procedures
2. Operation and security check are undertaken based on end-user
requirements
3. Reports are prepared/completed according to enterprise policies and
procedures

CONDITIONS:

The students/trainees must be provided with the following:

Desktop Computer / Laptop Computer


Server Computer
Network switch
Wireless router / Wireless access point
Materials
- RJ45
- UTP Cable
 Tools:
- Screw drivers (assorted)
- Pliers (assorted)
- Soldering iron
- Wrenches
- Utility software
- Computer system
- Crimping tool
- LAN Tester
 Policies and procedures:
- Procedures and guidelines
- Safety precautions
METHODOLOGIES:

 Lecture
 Discussion

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 52 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
 Demonstration
Viewing multimedia
ASSESSMENT METHODS:

 Written examination
 Practical examination

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 53 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 3
PERFORM TESTING, DOCUMENTATION & PREDEPLOYMENT PRACTICES

Learning Activities Special Instructions

Read the Information Sheet 3.3- Read, understand the


1(SPUS NETWORK AND SERVER information sheet and evaluate
PRE-DEPLOYMENT PROCEDURE) yourself using Self – check 3.3-1.

Evaluate yourself by answering the Self


Check 3.3-1 before proceeding to the
next activity

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 54 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
INFORMATION SHEET 3.3-1
SPUS NETWORK AND SERVER PRE-DEPLOYMENT
PROCEDURE

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST able to:

1. Familiarize network pre-deployment procedure.


2. Familiarize server pre-deployment procedure.
3. Conduct testing and documentation based on the established pre-
deployment procedure.

SPUS SERVER AND NETWORK DEPLOYMENT PROCEDURE


Definitions:

For the purpose of this document, the terms “System Administrator”,


Network Administrator, Server and Server Administrator are defined below.

System Administrator

KEY ROLE:

This job is responsible for planning, designing, testing and documenting software
systems for business applications. He/she is also responsible for designing
interfaces, coding and testing of application programs according to user
requirements.

SPECIFIC DUTIES:

1. Plans and develops a computer based system applying knowledge of


programming techniques and computer systems in coordination with the ICT
Director.

1.1 Confers with personnel units involved to analyze current operational


procedures, identify problems, and learn specific input and output
requirements, such as forms of data input, how data is to be
summarized, and formats for reports.
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 55 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
1.2 Writes detailed description of user needs, program functions, and steps
required to develop or modify the System Software.

1.3 Reviews computer system capabilities, workflow and scheduling


limitations to determine if requested program can operate within existing
system.

1.4 Prepares workflow charts and diagrams to specify in detail operations to


be performed by equipment and computer programs and operations to be
performed by personnel in system.

1.5 Conducts user training on the new system.

2. Converts data from project specifications and statements of problems and


procedures to create or modify computer programs.

2.1 Converts detailed logical flow chart to computer language.

2.2 Enters program codes into computer system. Designs program interfaces.

2.3 Inputs test data into computer to determine program errors.

2.4 Corrects program errors by modifying programs or altering sequence of


program steps.

2.5 Generates system reports.

3. Helps maintain existing systems by implementing changes required by the


user and debugging the modified system. Collects data and redesigns
system, as necessary.

4. Helps the web admin in gathering resources for SPU Surigao Website.

5. Participates in regular hardware/software inventory.

6. Troubleshoots hardware and software problems as needed.

7. Checks database structures and modifies as needed.

8. Develops systems software.

8.1 Designs the system and database.

8.2 Prepares screen and report layout.

8.3 Conducts system testing.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 56 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
NETWORK ADMINISTRATOR

KEY ROLE:

This job is responsible for monitoring and maintaining the stability of the
computer network system of the university at all times. A network administrator
is responsible for keeping the network functioning at optimal levels. This includes
the internal network (LAN), a company-wide network that encompasses multiple
locations (WAN) as well as the connection with the outside world. This job include
server maintenance and backup, email administration, assigning and
maintaining user logon and access privileges, the actual hard-wiring of jacks and
workstations and protecting internal users from outside threats, including
hackers, viruses, spyware and malware.

SPECIFIC DUTIES:

1. The network administrator is the person responsible for making sure a


company’s computers can communicate with its other computers, printers
and servers on the network, as well as the Internet and any other services
outside the university, including FTP servers, virtual private networks and
gateways.

2. The network administrator provides the law and order of the network by
spelling out the rules and regulations of the university.

3. Sets-up and manages the configuration of computer network servers.

4. Establishes the highest possible security against hackers, explorations and


experimentations of thrill-seekers on and off campus computer users and
viruses, Trojans, worms, etc., that may put the network’s health to malady.

5. Diagnoses network failures and recommends solution that will mend or


improve the total network performance.

6. Provides all necessary security passwords in the SPU Surigao computer


Network System and safe-keeps these passwords making known only to
authorized SPU Surigao personnel.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 57 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
7. Limits authenticated users and user’s rights from the LAN and Internet and
finds means to prevent users from surfing prohibited websites.

8. Updates documentation of network mapping regularly and the list of


internal/external IP (Internet Protocol) assignments for reference.

9. Updates himself through:

9.1 Seminars, conferences, lectures, review of professional literature on


computer network, server technologies and systems field.
9.2 Communication with companies involved in our computer network such
as the Internet Service Providers and Telephone Companies.

10. Coordinates project development and implementation activities with system,


consultants.

11. Develops complex and extensive mini and microcomputer networks.

11.1 Directs and assists in the testing and debugging of systems.


11.2 Ensures that documentation is complete prior to releasing for
operation.
11.3 Works with complex systems integration issues and activities
associated with database, client server, applications development,
networking.

12. Assists the offices involved during the enrolment period when necessary to
ensure the smooth flow of the automated enrollment system.

Server

A "server" is defined as either a physical or virtual computer system that is


connected to the UL campus network and provides services to multiple individuals
at the same time.

The software on the server comprises:


 The default installation of the specified operating system.
 The SNMP service installed and configured.
 An antivirus application, if required.
 A backup client application, if required.
 The VMWare Tools application, if the server is a VMWare Virtual Machine.

This document only addresses the procedure adopted for those servers managed by
the Information Technology Division.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 58 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Server Manager
A “Server Manager” is defined as the person responsible for the following activities
at different stages of a server lifecycle:
 Deployment Responsibilities:
o On receipt of the “request for server” RMS call, build the server to
specification as requested by the System Administrator and close the
call.
o On receipt of a Post-Deployment Checklist “server checklist” RMS call
from the System Administrator, complete the items in the check list,
and close the call.
 Management Responsibilities:
o Upon receipt of a “server issue” RMS call from the System
Administrator, check the server.
o Reboot the server, as necessary, in consultation with customers.
o Troubleshoot and fix server failures, as required.
o If investigation indicates a networking or firewall issue, log an RMS
call to the Communications & Networking group.
o Support the implementation of the System Administrator’s Disaster
Recovery Plan.
 Decommissioning Responsibilities:
o Upon receipt of the “server removal” call in RMS, unplug the server
from the network, remove the server from the Computer Room,
update the IT Master Server List, and close the call notifying the
System Administrator that the server has been removed.
o Upon receipt of the Post-Decommissioning Checklist server section
from the System Administrator, complete the check list and close the
call.

PURPOSE
This procedure is designed to ensure that all ITD servers are deployed in an orderly
way.

PROCEDURE

REQUEST / APPROVAL

The System Administrator who intends to deploy the server to host a new or
existing service must log a Change Control call in RMS (at code 5) to initiate the
change request.

Upon receipt of the Change Control request, the Change Control Officer (CCO) will
change the status code to 24. This will automatically email a ‘Pre-Deployment Check
List” to the System Administrator. This check list must be completed and returned
to the CCO.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 59 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
PRE-DEPLOYMENT CHECKLIST

Server Name
1. What is the name of the server?

Environmental Design
2. Is this a Physical or Virtual server? (Note: If either physical server or
virtual host is required, see ITD Purchasing Procedure for tender process)
3. Is this a physical to virtual conversion of an existing server [Y/N]?

Application & Operating System Selection / Design


4. What application(s) will run on the server?
5. What operating system does the application require
6. What processor(s) (GHz) does the application require?
7. What memory (RAM) does the application require?
8. What hard disk space (gigabytes) does the application require?

Data Infrastructure
9. Does the server require SAN connectivity [Y/N]?
10. If yes, please state if a LUN has been allocated [Y/N].
11. If yes, please state the disk space required (FC or SATA).
12. If yes, please state whether the server is to be mirrored.

Network & Security (VLAN) Design:


13. What VLAN is to be assigned?
14. Define the inter-VLAN access required. Complete the attached form
and return with this Pre-Deployment Check List email:
http://www2.ul.ie/pdf/449600964.doc (Form to be completed in
consultation with the Communications & Networking group) and IP
address assigned and recorded.

Backup of Data
15. Does the server need to be backed up?

Other
16. If this is a rebuild of an existing server, has the application data been
backed up to a location off the server?

Upon receipt of the above information, the CCO will change the status code to 25
(Change Control circulation) and will then bring the request to the next weekly
Change Control Board meeting for approval.

Once the request has been approved, the CCO will change the status code to 45
and the System Administrator will be notified by email.

The System Administrator must then log the following calls in RMS (quoting the
CC reference number):

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 60 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
1. Log an RMS call to the Technology Solutions group (Server Manager),
quoting the Change Control Call Number, and requesting that the server is
built as per specification outlined in the change control;
2. Log a call to the Communications & Networking group, quoting the Change
Control Call Number, and requesting that the firewall rules be set up as
outlined in the VLAN form.

DEPLOYMENT

It is the responsibility of the Server Manager to build the server according to the
required specifications. (See ‘Best Practice for Servers Working Guideline’). If the
server is for an external department, charges will be applied according to the
Server Cost Model.

Once the server is built and ready for deployment, the Server Manager will close
the ‘request for server’ call in RMS.

It is then the responsibility of the System Administrator to install, configure and


test the required application software (See ‘Best Practice for Servers Working
Guideline’).

POST-DEPLOYMENT

Once the server is deployed, the System Administrator will inform his/her Change
Control Board Section Representative who will notify the Change Control Board at
the next weekly meeting. The Change Control Officer will then change the status code
to 79. This will automatically email a ‘Post-Deployment Check List” to the System
Administrator. This checklist must be completed and returned to the Change
Control Officer.

Post-deployment Checklist

It is the responsibility of the System Administrator to:

1. Log a call to Technology Solutions (Server Manager) to ensure that:

 The server is backed up by Commvault (if required), having identified the


data for backup and specified the backup frequency and appropriate storage
policy.
 The server is added to the Master ITD Server List?
 The server been registered in WSUS?
 The server been registered in Forefront?
 The server been set up in Password Manager Pro?
 The operating system is licensed.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 61 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
 If a physical server, that the server is covered by warranty or under
maintenance.

2. Log a call to Communications & Networking (Network Manager) to ensure


that:
 The server has been set up in What’s Up Gold? Please state what is to be
monitored and to whom the alerts are to be sent, i.e. to the System
Administrator and Backup System Administrator / Section Head.
 If this is a web server, that the server has gone through vulnerability
scanning?

Once confirmation has been received, return the answers to the checklist questions
to the Change Control Officer, who will post the answers into the Notes field and
close the call in RMS at code 95.

RMS Codes for Server Deployment

5 Change Control Request


24 Server Pre-Deployment Checklist
25 Change Control Circulated
45 Change Control Approved
79 Server Post-Deployment Checklist
95 Change Control Complete

RECORDS

Records of all servers are stored on the ITD Master Server List.

Records of RMS change requests are held in RMS for a period of 3 years.

PROCESS VERIFICATION

Evaluation of process effectiveness is carried out using Internal / External Quality


Audits and the Corrective Action process where the procedure itself is found to be
the source of the problem under investigation.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 62 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
SELF CHECK 3.3-1

Instructions: Answer the following questions, write the answer in the space
provided.

1. Evaluation of process effectiveness is carried out using Internal / External


Quality Audits and the Corrective Action process where the procedure itself
is found to be the source of the problem under investigation.

2. Is defined as the person responsible for the following activities at different


stages of a server lifecycle.

3. Is defined as either a physical or virtual computer system that is connected


to the UL campus network and provides services to multiple individuals at
the same time.

4. This job is responsible for planning, designing, testing and documenting


software systems for business applications. He/she is also responsible for
designing interfaces, coding and testing of application programs according to
user requirements.

5. This job is responsible for monitoring and maintaining the stability of the
computer network system of the university at all times. A network
administrator is responsible for keeping the network functioning at optimal
levels. This includes the internal network (LAN), a company-wide network that
encompasses multiple locations (WAN) as well as the connection with the
outside world. This job include server maintenance and backup, email
administration, assigning and maintaining user logon and access privileges,
the actual hard-wiring of jacks and workstations and protecting internal users
from outside threats, including hackers, viruses, spyware and malware.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 63 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
ANSWER KEYS 3.3.1

1. PROCESS VERIFICATION
2. SERVER MANAGER
3. SERVER
4. SYSTEM ADMINISTRATOR
5. NETWORK ADMINISTRATOR

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 64 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Bibliography

Websites

http://windows.microsoft.com/en-ph/windows/connect-computer-
domain#1TC=windows-7

https://technet.microsoft.com/en-
us/library/dd894463%28v=ws.10%29.aspx

https://msdn.microsoft.com/en-us/library/aa545347%28v=cs.70%29.aspx

http://www.windowsnetworking.com/articles-tutorials/windows-server-
2008/How-to-Install-Configure-Windows-Server-2008-DHCP-Server.html

http://www.howtogeek.com/99323/installing-active-directory-on-server-
2008-r2/

http://windows.microsoft.com/en-ph/windows-vista/share-files-and-
folders-over-the-network-from-windows-vista-inside-out

Other Materials

Competency Based Learning Materials: “Computer Systems Servicing”

St. Paul University Surigao

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Servers March 2015 Page 65 of 65
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01

You might also like