You are on page 1of 208

Competency-Based Learning Materials

COMPUTER SYSTEMS SERVICING NCII

Sector : ELECTRONIC SECTOR

COMPUTER SYSTEMS
Qualification : SERVICING NCII

Unit of
Competency : SET-UP COMPUTER SERVERS
SETTING- UP COMPUTER
Module Title : SERVERS

HOW TO USE THIS MODULE

Welcome to the Module “Setting up Computer Servers”.


This module contains training materials and activities for you to complete.

The unit of competency “Setting up Computer Servers”


contains knowledge, skills and attitudes required for a Computer
System Servicing NC II course.

You are required to go through a series of learning activities in


order to complete each of the learning outcomes of the module. In
each learning outcome there are Information Sheets, Job Sheets,
Operation Sheets, and Activity Sheets. Follow these activities on
your own and answer the Self-Check at the end of each learning
activity.

If you have questions, don’t hesitate to ask you

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills


covered in this module because you have:
o been working for some time
o already have completed training in this area.

If you can demonstrate to your teacher that you are competent in a


particular
Skill or skills, talk to him/her about having t have to do the same training again. If
you have a qualification or Certificate of
Competency from previous trainings shows it to your teacher. If the
skills you acquired are still current and relevant to this module, they
may become part of the evidence you can present for RPL. If you are
not sure about the currency of your skills, discuss it with your
teacher.

After completing this module ask your teacher to assess your


competency. Result of your assessment will be recorded in your
competency profile. All the learning activities are designed for you to
complete at your own pace.

Inside this module you will find the activities for you to
complete followed by relevant information sheets for each learning
outcome. Each learning outcome may have more than one learning
activity.

COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Install and configure Installing and configuring ELC724331


1.
computer systems computer systems

Set-up Computer Setting up Computer ELC724332


2.
Networks Networks

Set-up Computer Setting up Computer ELC724333


3.
Servers Servers

Maintain and Repair Maintaining and


4. Computer Systems and Repairing Computer ELC724334
Networks Systems and Networks
MODULE CONTENT

UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes
needed to set-up computer servers for LANs and SOHO systems. It consists
of competencies to set-up user access and configures network services as
well as to perform testing, documentation and pre-deployment procedures.

NOMINAL DURATION: 40 HOURS

LEARNING OUTCOMES:
At the end of this module you MUST be able to:

1. Set-up user access

2. Configure network services

3. Perform testing, documentation and pre-deployment procedures

ASSESSMENT CRITERIA:

1. User folder is created in accordance with network operating system (NOS)


features
2. User access level is configured based on NOS features and established
network access policies/end-user requirements.
3. Security check is performed in accordance with established network access
policies/end-user requirements.
4. Normal functions of server are checked in accordance with manufacturer’s
instructions
5.Required modules /add-ons are installed/updated based on NOS installation
procedures
6.Network services to be configured are confirmed based on user/system
requirements
7.Operation of network services are checked based on user/system
requirements
8.Unplanned events or conditions are responded to in accordance with
established procedures
9.Pre-deployment procedures is undertaken based on enterprise policies and
procedures
10.Operation and security check are undertaken based on end-user
requirements
11.Reports are prepared/completed according to enterprise policies and
procedures.

UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and


attitudes needed to set-up computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network
services as well as to perform testing, documentation and pre-deployment
procedures.

⮚ LEARNING OUTCOME NO.1

⮚ SET-UP USER ACCESS

CONTENTS:

1. NETWORK OPEARTING SYSTEMS (NOS) FEATURES


2. CONFIGUE USER ACCESS LEVELS
3.Promote the Server to a Domain Controller

ASSESSMENT CRITERIA:

1. User folder is created in accordance with network operating system


(NOS) features
2.User access level is configured based on NOS features and established
network access policies/end-user requirements.
3. Security check is performed in accordance with established network
access policies/end-user requirements.

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning

INFORMATION SHEET 1.1-1

NETWORK OPEARTING SYSTEMS (NOS) FEATURES

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify features of networking operating systems

2. Define netwoking operating systems (NOS)

Definition - What does Network Operating System (NOS) mean?


A network operating system is an operating system designed for the sole
purpose of supporting workstations, database sharing, application
sharing and file and printer access sharing among multiple computers in
a network. Certain standalone operating systems, such as Microsoft
Windows NT and Digital’s OpenVMS, come with multipurpose
capabilities and can also act as network operating systems. Some of the
most well-known network operating systems include Microsoft Windows
Server 2003, Microsoft Windows Server 2008, Linux and Mac OS X.

Features of Network Operating Systems

A network operating system is a software application that provides a platform


for both the functionality of an individual computer and for multiple computers
within an interconnected network. Basically, a network operating system
controls other software and computer hardware to run applications, share
resources, protect data and establish communication. Individual computers
run client operating systems, while network systems create the software
infrastructure for wireless, local and wide area networks to function.
Basic Operating Features
Network operating systems support the basic underlying operating features of
networks. These include support for processors and the various protocols that
allow computers to share data. Many network operating systems can detect
hardware within the system to allow for asset discovery within the network.
Also, network operating systems support the processing of other software
applications that run on both individual computers and within the network.

A network operating system (NOS) provides services to clients over a network.


Both the client/server and peer-to-peer networking models use network
operating systems, and as such, NOSes must be able to handle typical network
duties such as the following:

● Providing access to remote printers, managing which users are using which
printers when, managing how print jobs are queued, and recognizing when
devices aren't available to the network
● Enabling and managing access to files on remote systems, and determining
who can access what—and who can't
● Granting access to remote applications and resources, such as the Internet,
and making those resources seem like local resources to the user (the network
is ideally transparent to the user)
● Providing routing services, including support for major networking protocols,
so that the operating system knows what data to send where
● Monitoring the system and security, so as to provide proper security against
viruses, hackers, and data corruption.
● Providing basic network administration utilities (such as SNMP, or Simple
Network Management Protocol), enabling an administrator to perform tasks
involving managing network resources and users.

Peer to peer networks

A peer to peer network has no dedicated servers. In a peer to peer network, a


number of workstations (or clients) are connected together for sharing devices,
information or data. All the workstations (clients) are considered equal. Any one
computer can act as client or server at any instance. This network is ideal for
small networks where there is no need for dedicated servers, like home networks,
small business networks, or retail shops. The Microsoft term for peer to peer
network is “Workgroup”.

There is no limitation for the number of computers in a peer to peer network.


But peer to peer implementations are meant for small networks. Typically, a
Workgroup contain less than 10 workstations.
Commonly used Workstation Operating Systems are Microsoft Windows 10
Desktop, Red Hat Enterprise Linux Workstation, SUSE Linux Enterprise
Desktop, Ubuntu Desktop, LinuxMint, Fedora Workstation, elementary OS etc.

Client server networks

Peer to peer computer networks are good choice for small business organizations.
For example: a small pharmacy outlet, an automobile service center, a small
clinic etc.

The main disadvantages of peer to peer networks are listed below.

• Everything is kept distributed in different computers.

• User generated files are stored in individual computers. Data backup is


extremely difficult.

• Each computer has its own user database. There is no centralized user & user
privilege management. Users need to remember their user ids and passwords in
every computer. Managing network users is extremely difficult.

As the organization's network grows, they must gradually upgrade their peer to
peer network to client server based network.

A client server computer network model is made-up of client computers and


server computers.

Now we need to understand the terms "client computer" and "server


computer".

What is a client computer? A computer which is seeking any resource from


another computer is a client computer. You can think a client as a computer in
your network, where a network user is performing some network activity. For
Example: Downloading a file from a File Server, Browsing Intranet/Internet etc.
The network user normally uses a client computer to perform his day to day
work.

What is a server computer? If a computer has a resource which is served to


another computer, it is a server computer. The client establishes a connection to
a server and accesses the services installed on the server. A server is not meant
for a network user to browse in internet or to do spreadsheet data entry work. A
server computer is installed with appropriate Operating System and related
software to serve the network clients with one or more services.
In a client server network, high-end servers, installed with the Network
Operating System (Server Operating System) and the related software, serve the
clients continuously on a network, by providing them with specific services upon
request. A server computer is built and installed to run continuously 24/7
without a break. An unexpected shutdown of a server computer can cause
catastrophic damage to a business.

Well known server Operating System Products are Microsoft Windows Server
2019,Unix(OracleSolaris, IBMAIX, HP
UX, FreeBSD, NetBSD, OpenBSD, Xinuos Open Server/SCO Unix, GNU/Linux
(RedHat Enterprise Linux, Debian Linux, SUSE Linux Enterprise
Server, Ubuntu Server, CentOS Server, Fedora Server etc.

Building a client server based network is costlier than building a peer to peer
network. Client server based networks require dedicated servers. Server
hardware is costlier than normal desktop client computer hardware. Network
Operating Systems (Server Operating System) are also costlier than client
Operating Systems (Desktop Operating Systems).
Different types of servers used in client server based networks are listed
below.

File Server: File servers are used to store the user documents and files centrally.
An ideal file server should have a large amount of memory and storage space,
fast hard-disks, multiple processors, fast network adapters, redundant power
supplies etc.

A File server runs FTP (File Transfer Protocol) in Windows, Linux or Unix
Networks, or SMBP (Server Message Block Protocol) in Windows Networks. Well
known FTP software products are Micrsoft IIS, FileZilla Server, vsftpd, Apache
FTP Server etc.

The main advantage of keeping network user files and electronic documents
centrally in a file server is that the network user files and documents can be
managed (backup'd) easily. Think about managing network user files and
electronic documents kept distributed inside user workstations in a network
consists of thousands of computers! Nearly impossible.

Print Server: Print Server, which redirects print jobs from client computers to
specific printers.

Mail Server: Mail Servers are used to transmit emails using email protocols.
Most widely used email transmission protocol is SMTP (Simple Mail Transfer
Protocol). Mail Servers exchange emails between different domains.

Most widely used Mail Server software products are Microsoft Exchange
Server, SENDMAIL (now proofpoint), Postfix, Apache James etc.

Application Server: Common computer applications or programs which are


required by different network users can be run in a central server, which enables
multiple network users to access common network applications from the
network. Typically, Application Servers run business logic. Means that, every
business is different and the Application Server is the Server Software which
controls the business process.

Some examples for Application Server Software are SAP ERP, Microsoft
Dynamics, Oracle ERP Cloud, Ramco ERP, infor ERP etc.

Database Server: Database Server allows authorized network clients to create,


view, modify and/or delete an organization's data, stored in a common database.

Examples of Database Management Systems are Oracle Database


Products, Microsoft SQL Server 2019, PostgreSQL, IBM DB2 Database
Server, MySQL Database Server, Informix, MongoDB, MariaDB Server etc.
Directory Servers: Directory Servers allows the central administration and management of
network users and network resources. Directory Servers provide the basic functions of
network security, Authentication, Authorization and Accounting.

Create user folder in accordance with Networking Operating


systems

How to set up peer to peer using Window 2008 R2 and Window 7?

1. CONFIGURE IP ADDRESS

Static IP Configuration - Windows 7

Step 1
Click the Start menu. Next, click on the Control Panel option.

Step 2

Click on the Network and Sharing Center option.


Step 3

Click on Change adapter settings from the left side menu.

Step 4
Right-click on the Local Area Connection icon, then select Properties.

Step 5
In the window that opens, click on the Internet Protocol Version 4
(TCP/IPv4) (you may need to scroll down to find it). Next, click on
the Properties button.

Step 6
In the window that opens, click the Use the following IP address: radio button.
In the IP address:, Subnet mask:, and Default gateway: number fields, insert
the numbers that were assigned to you by OIT.

192.168.____._____
255.255.255.0
Ip address of the Router

Ip address of DNS SERVER

Step 7
Next, click the Use the following DNS server addresses: radio button. Next, in
the Preferred DNS server:, and Alternate DNS server: number fields, input
the numbers that were assigned by OIT. Then click the OK button.

Static IP In Windows Server 2008


1. Go to 'Control Panel'
Click 'Start -> Control Panel'

2. Go to 'Network And Internet'


Click 'View Network status and tasks'
3. Go to 'Setting Adapter'

Click 'Change Adapter settings'

4. Go to Adapter Properties settings


Right click on 'Local Area Connection' and click on 'Properties'
5. Go to TCP/IP settings
Click on 'Internet Protocol Verion 4 (TCP/IPv4)' to highlight and select this
item and then click on 'Properties'.
6. Enter correct IP informations
Enter correct Ip informations and click 'OK'

192.168.____._____
255.255.255.0
Ip address of Router

Ip address of the DNS

DONE..
SELF-CHECK 1.1-1

NETWORK OPEARTING SYSTEMS (NOS) FEATURES

Fill in the blank:

___________________1. its is a all the workstations (clients) are considered equal.


Any one computer can act as client or server at any instance. This network is
ideal for small networks where there is no need for dedicated servers, like home
networks, small business networks, or retail shops. The Microsoft term for peer
to peer network is “Workgroup”.

___________________2. Its is a client establishes a connection to a server and


accesses the services installed on the server. A server is not meant for a
network user to browse in internet or to do spreadsheet data entry work. A
server computer is installed with appropriate Operating System and related
software to serve the network clients with one or more services. Hi. Its is a
computer which is seeking any resource from another computer is a client
computer. You can think a client as a computer in your network, where a
network user is performing some network activity.

___________________4. Its is a file servers are used to store the user documents
and files centrally. An ideal file server should have a large amount of memory
and storage space, fast hard-disks, multiple processors, fast network adapters,
redundant power supplies etc.
___________________5.Its is a print server, which redirects print jobs from client
computers to specific printers.

Essay : 1.What does Network Operating System (NOS) mean?

2.Gives the procedure the CONFIGURE IP ADDRESS


Window 7 & Window 2008 R2

TASK SHEET 1.1-1

NETWORK OPEARTING SYSTEMS (NOS) FEATURES

Performance Objective: given necessary tools,equipment and materials,


you should be able to network operating systems feautes ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


1. Click the Start menu. Next, click on the Control Panel option
2. Click on the Network and Sharing Center option
3. Click on Change adapter settings from the left side menu
4. Right-click on the Local Area Connection icon, then select Properties
5. In the window that opens, click on the Internet Protocol Version 4
(TCP/IPv4) (you may need to scroll down to find it). Next, click on
the Properties button
6. In the window that opens, click the Use the following IP address: radio
button. In the IP address:, Subnet mask:, and Default
gateway: number fields, insert the numbers that were assigned to you by
OIT
7. Next, click the Use the following DNS server addresses: radio button.
Next, in the Preferred DNS server:, and Alternate DNS server: number
fields, input the numbers that were assigned by OIT. Then click
the OK button

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 1.1-1

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Click the Start menu. Next, click on the Control Panel option

Click on the Network and Sharing Center option

Click on Change adapter settings from the left side menu

Right-click on the Local Area Connection icon, then select Properties

In the window that opens, click on the Internet Protocol Version 4


(TCP/IPv4) (you may need to scroll down to find it). Next, click on
the Properties button
In the window that opens, click the Use the following IP address: radio button.
In the IP address:, Subnet mask:, and Default gateway: number fields, insert the
numbers that were assigned to you by OIT
Next, click the Use the following DNS server addresses: radio button. Next, in
the Preferred DNS server:, and Alternate DNS server: number fields, input the
numbers that were assigned by OIT. Then click the OK button

INFORMATION SHEET 1.1-2

CONFIGUE USER ACCESS LEVELS


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the configure user access levels

2. Define of the configure user access levels

USER ACCESS LEVEL

The User Access Level of editors affects their abilities to perform specific
actions on Wikipedia. The user access level depends on which rights (also
called permissions, user groups, bits, or flags) are assigned to accounts. There
are two types of access leveling: automatic, and requested. User access levels
are determined by whether the Wikipedian is logged in, the account's age and
edits, and what manually assigned rights the account has.
Anyone can use the basic functionalities of Wikipedia even if they are not
logged in. Unless they are blocked, they may freely edit most pages. Being
logged in gives users many advantages, such as having their public IP
address hidden and the ability to track one's own contributions. Additionally,
once user accounts are more than a certain number of days old and have made
more than a certain number of edits, they automatically become autoconfirmed
or extended confirmed, allowing the direct creation of articles, the ability to
move pages, to edit semi-protected and extended-protected pages, and upload
files. Further access levels need to be assigned manually by a user with the
appropriate authority. An editor with more experience and good standing can
attempt to become an administrator, which provides a large number of
advanced permissions.
Many other flags for
specialized tasks are also
available.

What is the system


access level?

Part of an access control


procedure for computer
systems, which allows a
system administrator to
set up a hierarchy of
users. Thus, the low level
users can access only a limited set of information, whereas the highest level
users can access the most sensitive data on the system. Also called access
rights.

Access level — is a set of operations that a user can perform. The access
levels and the underlying operations are assigned by the system administrator.
The access levels are inheritable, which means that if no explicit access
permission exists for a section or page, the access parameters of a parent
section take effect.

INFORMATION SHEET 1.1-3

Promote the Server to a Domain Controller


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Server Domain Controller


2. Set-up time and date client and server

3. Configure Active Directory

4. Configure dcpromo Active directory

A domain controller is a server that responds to authentication requests and


verifies users on computer networks. Domains are a hierarchical way of
organizing users and computers that work together on the same network. ...
The domain controller (DC) is the box that holds the keys to the kingdom-
Active Directory (AD).

Each of the employees in Kate's office has a key to the building. One weekend
Kate had some important work to do, but when she reached her office she
realized she had forgotten her key. She called the security officer, who
authenticated her as an employee before letting her in.
A domain controller is in some ways similar to the security officer of an office
building. In an office there are many computers, each one requiring the user to
login with his or her own user name and password. Suppose there are a
hundred office computers. From the perspective of an Information Technology
(IT) professional, it is difficult to manage the authentication of each individual
machine. A simpler solution is to configure one computer to manage the
authentication of all the others. All the office computers will then be connected
to this main computer to form a network. The main computer is known as the
domain controller, while the other computers it authenticates are known as
clients. In such set up, the client computers are said to be on the Windows
domain. Now the IT person finds that the login credentials will not have to be
managed on each individual computer. instead, the user names and login
credentials of all authenticated users in the office can be managed much more
easily through one machine, the domain controller.

Active Directory
Active Directory is the central database on a domain controller where the login
credentials of all client computers, printers, and other shared resources in the
network are stored. When someone tries to login, their login credentials must
match those saved in Active Directory. If the login credentials do not match,
the user will be denied access. All client computers on the domain share this
common Active Directory. Only an administrator or IT professional has
authority to add computers or shared resources to the domain, further
strengthening security.

Functions of a Domain Controller

The domain controller saves plenty of headaches in the office. Take Sue, for
instance. She works as an administrative assistant on the second floor. She
has a meeting on the fifth floor with more than 20 attendees. Since Sue's
computer is on the domain, Sue can print from a printer on the fifth floor
without even leaving her own desk. Now the documents will be waiting for her
when she heads to the meeting.
Another advantage is that any one in the office can login to any other computer
on the domain using their own login credentials and still have access to all
their personal files. In the above example, Sue can login to Mark's computer on
the fifth floor with her own user name and password, and she would still have
access to all her personal documents. File security is also ensured because,
even when Sue logs into Marks computer as herself, she does not see any of
Mark's files. Sue only sees the files and printers that she has access to.

SELF-CHECK 1.1-3

Promote the Server to a Domain Controller

Essay: Write in your answer in whole sheet of pad paper

1. What is Domain Controller


2. What the function of a Domain Controller ?
Introduction: Setting time and Date window 7 and window 2008

When it comes to the appliances or clocks around the house, it does not really
matter if the time is completely accurate. It is normal for them to be a few
minutes off. However, with cellular phones and computers today, we have the
expectation that the time (and especially the date) will be 100% accurate,
without fail (or at least I have that expectation). It's not that this is just "nice",
correct time and date are actually required for many enterprise infrastructure
features to work. For example, servers and PC clients participating in Windows
Active Directory must have the right date & time or else authentication will fail.
I have a server whose onboard battery is bad. If it loses power and comes back
up, the date and time are wrong. The server boots up and appears to work,
however, I cannot connect to it via RDP because of the significant date
difference. This happens because, for the security certificates to validate, the
date between the server and client must be, at least, "close". Also, with it being
a domain controller, this time issue could cause the whole AD domain to be
unable to authenticate.

What's different in Windows 7 related to time and date?


Honestly, the Windows Vista and Windows 7 time and date configuration is
very similar. By double-clicking on the taskbar clock you will bring up the Date
and Time configuration where you will configure the date, time, timezone,
additional clocks, and Internet time.
The only difference that I could find is the reminder for daylight savings time.
In Windows Vista, the default is to Remind me one week before this change
occurs. With that setting, of course, you would get one week advance notice
before the clock "springs forward" or "falls back".

Figure 1: Windows 7 Date and Time Configuration

I do not think that one week notice is very helpful. Surely, you will forget that it
is going to change the time one week later. Microsoft must have felt the same
way because in Windows 7, they changed this to just Notify me when the
clock changes. Thus, you would just be alerted that it has changed. That is
fine with me. I do not think that most of us need a one week notification.
Of course, the time and date that daylight savings time occurs in the United
States changed in 2009 and the application of DST around the world is very
different. Fortunately, Microsoft keeps track of that for us and makes these
changes based on our Windows time zone settings.

Windows 2008 - before and after DCPROMO


With a Windows Server, time and date can be very different if you are using it
as an Active Directory Domain Controller (ADDC).
A typical Windows 2008 server will, by default, look very much like the
Windows 7 machine in Figure 1. All the same tabs, including Internet Time,
are present. You can see this in Figure 2, below.
Figure 2: Windows 2008 Server before DCPROMO
However, what happens if you make that same Windows Server a DC?
After running a DCPROMO, if you go back into the same Date and Time tool,
you will find that the Internet Time tab is missing. Take a look at this
in Figure 3, below.

Figure 3: Windows 2008 Server After DCPROMO


Why is this? Well, when a Windows Server becomes a domain controller the
default of obtaining the date & time via NTP from time.windows.com, over the
Internet, goes away. The server becomes the root time server for all computers
in the domain using Windows SNTP (simple network time protocol).
The w32tm service (and CLI command) is what provides this and controls this.
Installation step by step Active Directory

Open Server Manager and click on roles, this will bring up the Roles
Summary on the right hand side where you can click on the Add Roles link.

This will bring up the Add Roles Wizard where you can click on next to see a
list of available Roles. Select Active Directory Domain Services from the list,
you will be told that you need to add some features, click on the Add Required
Features button and click next to move on.

A brief introduction to Active Directory will be displayed as well as a few links


to additional resources, you can just click next to skip past here and click
install to start installing the binaries for Active Directory.
When the installation is finished you will be shown a success message, just
click close.
Configuration

Open up Server Manager, expand Roles and click on Active Directory Domain
Services. On the right hand side click on the Run the Active Directory
Domain Services Installation Wizard (dcpromo.exe) link.
This will kick off another wizard, this time to configure the settings for you
domain, click next to continue.

SELF-CHECK 1.1-3

Promote the Server to a Domain Controller

Essay: Write in your answer in whole sheet of pad paper

1. Why active Directory and Why should I care?


2. Types active Diretory that provides?
3. Draw the Diagram of a Active Directory?

TASK SHEET 1.1-3

CONFIGURE ACTIVE DIRECTORY

Performance Objective: given necessary tools,equipment and materials,


you should be able to configure active directory ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

click on roles

click on the Add Roles link.

. Select Active Directory Domain Services

click on the Add Required Features button and click next to move on.

just click next to skip past here and click install to start installing
7.click on the Run the Active Directory Domain Services Installation Wizard
(dcpromo.exe) link.

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 1.1-3

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Click on roles

Click on the Add Roles link.

Select Active Directory Domain Services

Click on the Add Required Features button and click next to move on.

Just click next to skip past here and click install to start installing the
binaries for Active Directory
The installation is finished you will be shown a success message, just
click close.
Click on the Run the Active Directory Domain Services Installation Wizard
(dcpromo.exe) link.

INFORMATION SHEET 1.1-4

CONFIGURE DCPROMO ACTIVE DIRECTORY

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. IDENTIFY DCPROMO ACTIVE DIRECTORY


2. DETERMINE DCPROMO ACTIVE DIRECTORY

DCPromo (Domain Controller Promoter)

DCPromo (Domain Controller Promoter) is a tool in Active


Directory that installs and removes Active Directory
Domain Services and promotes domain controllers.

DCPromo, which builds forests and domains in Active Directory, is


found in every version of Windows Server since Windows 2000.
Stored on a local program, it runs from Windows Server in Windows
2000 and Windows Server 2003. Since Windows Server 2008, it
runs from Server Manager.
1. So please click on that link and it will start the DCPROMO wizard.
2. Click start in your computer and then type in RUN..dcpromo.exe

3. So next step to go through the DC promo wizard.


4. To start the installation click on "Next"
Click on "Next"

● Since we
going to install
New domain Controller in new forest please select the option "Create a new
domain in new forest" option and click on "Next"
● Now we have to provide the name for our domain controller. It must be FQDN.
In our case I used rebeladmin.com as the domain. Please click "Next" after it.
css.com Type css.com example

● In this window it will ask to select forest function level. If you going to add
server 2003 domain controller to your forest later don't select the function level
as server 2008. If you going to use full features of 2008 Ad you must select
forest function level as Server R2 2008. In my case I used server R2 2008.
Click on "Next" after the select.

Window 2008R2 server

● In next window since it's the first DC we should make it as DNS server too.
Leave the default selection and click on "Next"
● If the wizard cannot create a delegation for the DNS server, it displays a
message to indicate that you can create the delegation manually. To continue,
click "Yes"
● In next window it will show up the database location. It its going to be bigger
AD its good if you can keep NTDS database in different partition. Click on
"Next" after changes.
● In next window its asking to define a restore mode password. Its more important
if you had to do a restore from backup in a server crash. Click on "Next" after
filling it.
p@ssw0rd example
p@ssw0rd example

● Next window is giving you a brief of the installation. Click on "Next"


● Then
it will start
the

installation of the AD. It will take some time to complete. After complete of the
installation perform a server reboot.
● After the reboot now you can login to the domain. Please use the login as
following example

User name : your domain\administrator

Password : XXXXXXXX

● Now its done and you can view the active directory options on administrative
tools menu
SELF-CHECK 1.1-3

CONFIGURE DCPROMO ACTIVE DIRECTORY

ESSAY: Write your answer in whole sheet of pad paper


1.What is Dc promo?

2.Gives step by step congifure dcpromo active directory?

TASK SHEET 1.1-4

CONFIGURE DCPROMO ACTIVE DIRECTORY

Performance Objective: given necessary tools,equipment and materials,


you should be able to configure dcpromo active directory ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

1.Click start in your computer and then type in RUN..dcpromo.exe


2.To start the installation click on "Next

3.Since we going to install New domain Controller in new forest please select
the option "Create a new domain in new forest" option and click on "Next"

4.Now we have to provide the name for our domain controller. It must be
FQDN. In our case I used css.com as the domain. Please click "Next" after it.

5. Select forest function level as Server R2 2008. In my case I used server


R2 2008. Click on "Next" after the select.
6. In next window since it's the first DC we should make it as DNS server
too. Leave the default selection and click on "Next"
7. If the wizard cannot create a delegation for the DNS server, it displays a
message to indicate that you can create the delegation manually. To
continue, click "Yes"
8. In next window it will show up the database location. It its going to be
bigger AD its good if you can keep NTDS database in different partition.
Click on "Next" after changes.
9. In next window its asking to define a restore mode password. Its more
important if you had to do a restore from backup in a server crash. Click
on "Next" after filling it.
10. Next window is giving you a brief of the installation. Click on "Next
11. Then it will start the installation of the AD. It will take some time
to complete. After complete of the installation perform a server reboot.

Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 1.1-3

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Click start in your computer and then type in RUN..dcpromo.exe

To start the installation click on "Next

Since we going to install New domain Controller in new forest please


select the option "Create a new domain in new forest" option and click
on "Next"

Now we have to provide the name for our domain controller. It must be FQDN.
In our case I used css.com as the domain. Please click "Next" after it
Select forest function level as Server R2 2008. In my case I used server
R2 2008. Click on "Next" after the select
In next window since it's the first DC we should make it as DNS server
too. Leave the default selection and click on "Next"

If the wizard cannot create a delegation for the DNS server, it displays a
message to indicate that you can create the delegation manually. To
continue, click "Yes"

In next window it will show up the database location. It its going to be


bigger AD its good if you can keep NTDS database in different partition.
Click on "Next" after changes
In next window its asking to define a restore mode password. Its more
important if you had to do a restore from backup in a server crash.
Click on "Next" after filling it.

Next window is giving you a brief of the installation. Click on "Next


Then it will start the installation of the AD. It will take some time to
complete. After complete of the installation perform a server reboot.

UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and


attitudes needed to set-up computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network
services as well as to perform testing, documentation and pre-deployment
procedures.

⮚ LEARNING OUTCOME NO.2

⮚ CONFIGURE NETWORK SERVICES

CONTENTS:

1. CONFIGURE DNS ROLE ON THE SERVER


2. CONFIGURE DHCP ROLE ON THE SERVER
3. CONFIGURE FILE SERVICES ON THE SERVER
4. CONFIGURE PRINTER AND DOCUMENT ON THE SERVER
5.CONFIGURE REMOTE DESKTOP ON ALL THE MACHINES
ASSESSMENT CRITERIA:

1.Normal functions of server are checked in accordance with


manufacturer’s instructions
2.Required modules /add-ons are installed/updated based on NOS
installation procedures
3.Network services to be configured are confirmed based on user/system
requirements
4.Operation of network services are checked based on user/system
requirements
5.Unplanned events or conditions are responded to in accordance with
established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-1

CONFIGURE DNS ROLE ON THE SERVER


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the DNS role on the server

2. Determine the DNS role on the server

What is a Domain Name Server (DNS)?

DNS stands for Domain Name System. The main function of DNS is to
translate domain names into IP Addresses, which computers can understand.
It also provides a list of mail servers which accept Emails for each domain
name. Each domain name
in DNS will nominate a set
of name servers to be
authoritative for its DNS
records.
This is where all other
name servers will be
pointed when looking for
information about the
domain name. Name
servers are a program or
computer server that
implements a name-
service protocol. This is
where the zone file is
stored and your DNS
records are stored within.
A zone file is a small set of
instructions that points domain names to IP addresses.
A zone file is made up of ‘records’ such as A Records and MX Records. This
record is used to point your domain name to an IP address. If you need to set
up a A record, your provider would provide you with an IP address that will
look something like 194.154.164.196. If you need to set up a CNAME record,
your provider would provide you with a URL address that will look something
like web.me.com. This is used to specify which mail servers are responsible for
a particular domain name.
One special MX Record feature is priority numbers, which provide information
to the querying mail server about which mail server should be used first. The
next entry is tried only when the mail server with the highest priority is not
available.

The Domain Name System (DNS) is a hierarchical distributed naming system


for computers, services, or any resource connected to the Internet or a private
network. It associates various information with domain names assigned to each
of the participating entities.

Most importantly, it translates domain names meaningful to humans into the


numerical identifiers associated with networking equipment for the purpose of
locating and addressing these devices worldwide.

However, most Windows administrators still rely on the Windows Internet


Name Service (WINS) for name resolution on local area networks and some
have little or no experience with DNS. We’ll explain how to install, configure,
and troubleshoot a Windows Server 2008 DNS server.
What are cached DNS records?
To speed up DNS most name servers on the internet will cache (remember)
DNS records themselves so that they do not have to look up records each time
they require them.
When you visit a website, it is probable that your ISP’s name servers will
remember the IP Address, so that the next time you (or someone else) requests
that website, the IP address can be retrieved more quickly. In this instance,
your ISP’s name server is using a cached DNS record. It will use this cached
record for a period of time, after which it will retrieve the record again. It will
again cache the record and the cycle will repeat.
This is why when you make changes to your DNS some people will not see the
change immediately as they may well be seeing a cached record.

What are subdomains?


A subdomain is a subdivision of a domain name, allowing you to put content in
your URL before your namespace. For example, blog.companyname.com or
shop.companyname.com would be a subdomain of the domain name
companyname.com.
For example: If a customer buys a domain with 123 Reg, e.g.
yourdomain.co.uk, they can set up subdomains, e.g. site1.yourdomain.co.uk or
secure.yourdomain.co.uk. This is an excellent way of breaking up the website if
you have different regions, products or even languages.

What are nameservers?


A nameserver maintains a directory of domain names that match certain IP
addresses. In other words, it’s where the DNS server records for your domain
are stored, allowing you to decide which hosting providers controls your
webspace and email. All domain registrars should provide you with the ability
to change at least two nameserver entries on your domain name, and hosting
companies should offer you at least two nameservers to point to.
One of the advantages of registering your domain name with 123 Reg is that
you are free to change the nameservers to other hosts whenever you like.
However, if you choose not to point to our nameservers, you won’t be able to
use our web and email systems to configure your domain name, nor will you be
able to use our hosting solutions.
Read our other article if you would like to find out more about 123 Reg
nameservers.
Please note: If you change the DNS to another registrar, you will no longer
be able to configure your DNS changes for that domain within your 123
Reg control panel.

How to check nameservers


The simplest way to check the nameservers your domain is on is to go to
http://who.is/, type in your domain name into the box and click on the lookup
button. This will show you a section that lists your nameservers.

How to change nameservers

You can change the nameservers of your domain name from the 123 Reg
control panel. Check out our useful guide for step-by-step instructions.

What is domain propagation?

DNS propagation (or Domain Name Propagation) is a term to describe the


updating of information across the Internet. It takes two forms: changes to
your DNS Zone and changes to your WHOIS information. A change to your
DNS Zone information typically affects only a handful of servers and completes
much more quickly.
However, the WHOIS is the master record which tells every DNS server in the
world the server for your domain. A change to your WHOIS information (such
as updating the ADMIN-C in your control panel) can take up to 72 hours to
propagate fully. Customers often call the 123 Reg support centre to say that
they can’t see their domain names straight after ordering them, or just after a
transfer between providers.
After either of these two events, your domain name/website may not be visible
for up to 48 hours, mainly because millions of DNS servers need to be updated
with the new information.

Installation:
Step 1: Install a DNS server from the Control Panel, follow these steps:

● Go to Start —> Control Panel —> Administrative Tools —> Server Manager.
● Expand and click Roles
● Click on Add Roles
Step 2 : The new window will open with the list of roles available to install.
Select DNS server and Click Next.
Step 3: Click Next on the introduction windows. In the last window click
on install. It will start installation, the following window shows the progress of
installation.

Configuring DNS:
After installing DNS, you have to go Start —> All Programs —
> Administrative Tools —> DNS for managing DNS server.
SELF-CHECK 2.1-1
CONFIGURE DNS ROLE ON THE SERVER

ESSAY: Write the answer in your whole sheet of pad paper

1.What is DNS role server

2. What are cached DNS records?


3. What are name servers?

4. What is domain propagation?

TASK SHEET 2.1-1

CONFIGURE DNS ROLE ON THE SERVER

Performance Objective: given necessary tools,equipment and materials,


you should be able to configure DNS role on the server ff.
Standard operating procedures within 1/2 hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


Installation:
Step 1: Install a DNS server from the Control Panel, follow these steps:

● Go to Start —> Control Panel —> Administrative Tools —> Server Manager.
● Expand and click Roles
● Click on Add Roles

Step 2 : The new window will open with the list of roles available to install.
Select DNS server and Click Next.

Step 3: Click Next on the introduction windows. In the last window click
on install. It will start installation, the following window shows the progress of
installation

4.Configuring DNS:
After installing DNS, you have to go Start —> All Programs —
> Administrative Tools —> DNS for managing DNS server.

Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-1

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Install a DNS server from the Control Panel, follow these steps:

● Go to Start —> Control Panel —> Administrative Tools —> Server


Manager.
● Expand and click Roles
● Click on Add Roles

The new window will open with the list of roles available to install.
Select DNS server and Click Next.

Next on the introduction windows. In the last window click on install.


It will start installation, the following window shows the progress of
installation

Configuring DNS:
After installing DNS, you have to go Start —> All Programs —
> Administrative Tools —> DNS for managing DNS server.

INFORMATION SHEET 2.1-2

CONFIGURE DHCP ROLE ON THE SERVER


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the DNS role on the server

2. Determine the DNS role on the server

A DHCP Server is a network server that automatically provides and assigns


IP addresses, default gateways and other network parameters to client devices.
It relies on the standard protocol
known as Dynamic Host
Configuration Protocol or
DHCP to respond to broadcast
queries by clients.
A DHCP server automatically
sends the required network
parameters for clients to properly
communicate on the network.
Without it, the network
administrator has to manually
set up every client that joins the
network, which can be
cumbersome, especially in large
networks. DHCP servers usually
assign each client with a unique
dynamic IP address, which
changes when the client’s lease
for that IP address has expired.

When to use a router/switch as your DHCP Server


There are many enterprise companies who are still using DHCP for IPv4 on
their routers/switches. This is typically done by the network administrator
who needs to get a DHCP capability up and running quickly but does not have
access to a DHCP server. Most routers/switches have the ability to provide the
following DHCP server support:
● a DHCP client and obtain an interface IPv4 address from an upstream
DHCP service
● a DHCP relay and forward UDP DHCP messages from clients on a LAN to
and from a DHCP server
● a DHCP server whereby the router/switch services DHCP requests directly.
However, there are limitations to using a router/switch as a DHCP server
● Running a DHCP server on a router/switch consumes resources on the
network device. These DHCP packets are handled in software (not
hardware accelerated forwarding). The resources required make this
practice not suitable for a network with a large number (> 150) of DHCP
clients.
● Does not support dynamic DNS. The router/switch DHCP server cannot
create an entry into DNS on behalf of the client based on the IPv4 address
that was leased to the client.
● No ability to e asily manage the scope and see the current DHCP bindings
and leases across multiple routers. Administrator must log into the
switch/router individually to get information about DHCP bindings.
● No high availability or redundancy of the DHCP bindings. This could cause
problems if the current DHCP server and default gateway fails.
● It is more difficult to configure DHCP options on router/switch platform.
● The DHCP service running on a router/switch is not integrated with IP
address management (IPAM) for address tracking and scope utilization or
security forensics.

The Benefits of a dedicated DHCP Server

A better approach than trying to use DHCP on your router/switch is to use a


centralized DHCP server. This is particularly true for network environments
that require support of both DHCP for IPv4 and DHCP for IPv6 at the same
time. Virtually all DHCP server vendors support both protocols so you can use
the same management interface for IPv4 and IPv6. There are several benefits
that make it advantageous for an enterprise to use DHCPv6.
● Having a DHCPv6 server that is integrated into your IP Address
Management (IPAM) system for IPv6 gives visibility to the IPv6-enabled
client nodes.
● You also would want this same functionality for IPv4. As IPv4 address
space becomes increasingly constrained, you will want to keep track of
your DHCP scopes and determine if your lease time is adequate with the
plethora of BYOD systems joining your networked environment.
● DHCP servers provide logging and management interfaces that aid
administrators manage their IP address scopes. Your organization will
want an accounting of what is on your network regardless of IP version
being used.
● DHCP servers can provide redundancy and high availability. If one DHCP
server were to fail, the clients will preserve their current IP addresses and
not cause an interruption for the end-nodes.
● Organizations will prefer a DHCPv6 server that has been tried and
tested. For example, The Infoblox DHCPv6 server has been certified as
“IPv6 Ready” by the USGv6 certification laboratory.
Organizations that are beginning to implement IPv6 should migrate DHCP for
IPv4 scope off the routers/switches and put them on a robust DHCP server
infrastructure. This change will also mean that your organization would want
to have DHCP operate the same for both protocols. Enterprise organizations
will want to take advantage of the centralized dual-protocol DHCP server to
provide IPv4 and IPv6 addresses to client devices.

INSTALLING DYNAMIC HOST CONFIGURATION PROTOCOL


Continuing our series on learning IT basics, today we’re going to show you how
to setup DHCP on Windows Server 2008 instead of using it on a router.

Note: this is part of our ongoing series teaching IT administration basics,


and might not apply to everybody.

This guide assumes that you have Server 2008 up and running on a machine–
if you don’t, you should check out our guide on how to install it. You should
also have set a static IP address on the server before continuing.

To get started, fire up the Server Manager, right click on roles, and then select
add roles.
You will be prompted with the normal “Before You Begin” screen, and after
clicking Next you’ll be able to choose DHCP Server.
Next you’ll want to select the network connection to bind the DHCP protocol to.
Put in the IP address of your DNS Server, which in this case is the same
machine–but be careful not to put the loopback address (127.0.0.1) as this will
be the address your clients will go to for name resolution.
Click next again to skip the WINS setup, this will bring you to creating a DHCP
Scope, where you can click the Add button.
Now you need to:

● Give your scope a name


● Enter the first address that you want available to clients to use
● Enter the last address that you want available to clients to use
● Enter the subnet mask (usually 255.255.255.0)
● Enter the IP address of your default gateway (usually your router IP at .1)
CSS

192.168.1.2

192.168.1.10

192.168.1.1

Once you have clicked on OK, you can click next 4 times to get to the
confirmation screen where you can finally click install.
Once the installation is complete your DHCP will be functioning, and you can
start managing your DHCP server right away.

DONE>>
SELF-CHECK 2.1-2
CONFIGURE DHCP ROLE ON THE SERVER

ESSAY: Write the answer in your whole sheet of pad paper

1.What is DHCP role server?

2. What to use a router/switch as your DHCP Server?

3. What is the benefits of a dedicated DHCP Server?


TASK SHEET 2.1-2

CONFIGURE DHCP ROLE ON THE SERVER

Performance Objective: given necessary tools,equipment and materials,


you should be able to configure DHCP role on the server ff.
Standard operating procedures within 1/2 hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


1.To get started, fire up the Server Manager, right click on roles, and then
select add roles
2. clicking Next you’ll be able to choose DHCP Server
3. Next you’ll want to select the network connection to bind the DHCP protocol
to
4. IP address of your DNS Server
5. Click next again to skip the WINS setup, this will bring you to creating a
DHCP Scope, where you can click the Add button

● Give your scope a name


● Enter the first address that you want available to clients to use
● Enter the last address that you want available to clients to use
● Enter the subnet mask (usually 255.255.255.0)
● Enter the IP address of your default gateway (usually your router IP at .1)

6. Once you have clicked on OK, you can click next 4 times to get to the
confirmation screen where you can finally click install.
Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-2

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

To get started, fire up the Server Manager, right click on roles, and
then select add roles
Clicking Next you’ll be able to choose DHCP Server

Next you’ll want to select the network connection to bind the DHCP
protocol
IP address of your DNS Server

Click next again to skip the WINS setup, this will bring you to creating
a DHCP Scope, where you can click the Add button

● Give your scope a name


● Enter the first address that you want available to clients to use
● Enter the last address that you want available to clients to use
● Enter the subnet mask (usually 255.255.255.0)
● Enter the IP address of your default gateway (usually your router IP
at .1)
Once you have clicked on OK, you can click next 4 times to get to the
confirmation screen where you can finally click install.

INFORMATION SHEET 2.1-3

CONFIGURE FILE SERVICES ON THE SERVER


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the files services on the server

2. Determine the files services on the server

What is the File Services?

The File Services role in Windows Server 2008 R2 is a core function,


accounting for a large number of server deployments. You probably see the
trend, from small business to global enterprises, to consolidate multiple file
servers into a small number of larger capacity servers, able to deal with the
growth in unstructured data. In this presentation, we cover technology
enhancements in Windows Server 2008 R2, focusing on performance,
scalability and availability. This includes details on the improvements in the
SMB2 file protocol, with comparative performance data gathered using FSCT
(the File Server Capacity Tool) that showcases how much Windows Server has
improved over the past few releases. We also review a few scenarios in File
Services consolidation, including Name Consolidation, Advanced Networking
and High Availability. Throughout the presentation, recommended
configurations are outlined, so they can spark ideas for your next upgrade or
consolidation project.

A file server is a central server in a computer network that provides file


systems or at least parts of a file system to connected clients. File servers
therefore offer users a
central storage place
for files on internal
data media, which is
accessible to all
authorized clients.
Here, the server
administrator defines
strict rules regarding
which users have
which access rights:
For instance, the
configuration or file
authorizations of the
respective file system enable the admin to set which files can be seen and
opened by a certain user or user group, and whether data can only be viewed
or also added, edited, or deleted.

With file servers connected to the internet and configured accordingly, users
cannot only access the files via the local network but also benefit from remote
access. This enables files to be accessed and saved on the file server even when
users are on the go. All modern operating systems such as Windows, Linux, or
macOS can be used on a file server, although the devices available in the
network need to be compatible with the operating system. But file servers are
not only used for file storage and management. They are also often used as a
repository for programs that have to be accessible to multiple network
participants, and as a backup server.
Schematic representation of the network structure with a file server

The file server is located between clients and a local mass storage device.

How do file servers work?

The right hardware is the foundation for a reliable file server. Most importantly,
of course, this includes the hard drive which needs to offer sufficient space for
the files and necessary programs, as well as the respective operating system,
and the software for using the clients. The server also needs enough working
memory and processing power to process file and program accesses for various
users as quickly and faultlessly as possible. Whether the hardware
requirements can be fulfilled by a standard PC or whether a special server
setup is required primarily depends on the number of users.

File and Storage Services includes technologies that help you set up and
manage one or more file servers, which are servers that provide central
locations on your network where you can store files and share them with users.
If your users need access to the same files and applications, or if centralized
backup and file management are important to your organization, you should
set up one or more servers as a file server by installing the File and Storage
Services role and the appropriate role services.
The File and Storage Services role and the Storage Services role service are
installed by default, but without any additional role services. This basic
functionality enables you to use Server Manager or Windows PowerShell to
manage the storage functionality of your servers. However, to set up or manage
a file server, you should use the Add Roles and Features Wizard in Server
Manager or the Install-WindowsFeature Windows PowerShell cmdlet to install
additional File and Storage Services role services, such as the role services
discussed in this topic.

Practical applications

Administrators can use the File and Storage Services role to set up and manage
multiple file servers and their storage capabilities by using Server Manager or
Windows PowerShell. Some of the specific applications include the following:
● Storage Spaces - Use to deploy high availability storage that is resilient
and scalable by using cost-effective industry-standard disks.
● Folder Redirection, Offline Files, and Roaming User Profiles - Use to
redirect the path of local folders (such as the Documents folder) or an
entire user profile to a network location, while caching the contents locally
for increased speed and availability.
● Work Folders - Use to enable users to store and access work files on
personal PCs and devices, in addition to corporate PCs. Users gain a
convenient location to store work files and access them from anywhere.
Organizations maintain control over corporate data by storing the files on
centrally managed file servers and optionally specifying user device
policies (such as encryption and lock screen passwords). Work Folders is a
new role service in Windows Server 2012 R2.
● Data Deduplication - Use to reduce the disk space requirements of your
files, saving money on storage.
● iSCSI Target Server - Use to create centralized, software-based, and
hardware-independent iSCSI disk subsystems in storage area networks
(SANs).
● Server Manager - Use to remotely manage multiple file servers from a
single window.
● Windows PowerShell Use to automate the management of the majority of
administration tasks for file servers.

INSATALLING FILES SERVICES


For those of you that are new to DFS, let me just write a few words about it.
DFS or Distributed File System is a Microsoft technology that offers replication
between sites and highly available access to files that are spread between
offices. To give you an idea imagine two offices on different cities. You create a
so-called DFS Namespace and put some shares in it for the users. Without
DFS, users in the branch office open files from the main office, but every time a
file is opened it consumes bandwidth and time. Implementing DFS will
replicate (if DFS Replication is enabled) those shares to the branch office(s) and
users open the files locally. You will get a better understanding when you get to
the point of configuring and testing the topology. To find out the new and
improved features in DFS 2008 R2 hit this Micosoft Technet page .
The installation is very simple, just open Server Manager, right-
click Roles and choose Add Roles.
On the Select Servers Roles page check the File Services box then
click Next.

Here,

hit Next again to skip the Introduction to File Services page.

Check the Distribution File System box. As you can see it also enables
the DFS Namespace and Replication boxes. If you have some 2003 servers on
your network and want to replicate/synchronize those with 2008/2008 R2
servers you need to check the Windows Server 2003 Files Services box. This
is because legacy systems are using FRS (File Replication Services), which is
not compatible with DFS, not natively anyway. It is not the case now, so just
click Next to continue.
Since we are dealing only with the installation here, choose not to create a
Namespace now. I will handle this in a future article.

On the Confirmation screen, click Install to begin the DFS role


installation.
Once the installation is done, you can see the File Services role in Server
Manager. You can also use the stand-alone management console from
the Administrative Tools > DFS Management.
DONE….

SELF-CHECK 2.1-3

CONFIGURE FILE SERVICES ON THE SERVER

ESSAY: Write the answer in your whole sheet of pad paper

1.What is the File Services?

2. How do file servers work?

3. What is the Practical applications?


TASK SHEET 2.1-3

NETWORK OPEARTING SYSTEMS (NOS) FEATURES

Performance Objective: given necessary tools,equipment and materials,


you should be able to network operating systems feautes ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


1. The installation is very simple, just open Server Manager, right-
click Roles and choose Add Roles.
2. On the Select Servers Roles page check the File Services box then
click Next.

3. Check the Distribution File System box. As you can see it also enables
the DFS Namespace and Replication boxes

4. Since we are dealing only with the installation here, choose not to create a
Namespace now. I will handle this in a future article.
5. On the Confirmation screen, click Install to begin the DFS role installation.

6. Once the installation is done, you can see the File Services role in Server
Manager. You can also use the stand-alone management console from
the Administrative Tools > DFS Management

Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-3

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

The installation is very simple, just open Server Manager, right-


click Roles and choose Add Roles

On the Select Servers Roles page check the File Services box then
click Next

Check the Distribution File System box. As you can see it also enables
the DFS Namespace and Replication boxe

Since we are dealing only with the installation here, choose not to
create a Namespace now. I will handle this in a future article.
On the Confirmation screen, click Install to begin the DFS role
installation
Once the installation is done, you can see the File Services role in Server
Manager. You can also use the stand-alone management console from
the Administrative Tools > DFS Management
INFORMATION SHEET 2.1-4

CONFIGURE PRINTER AND DOCUMENT ON THE SERVER

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Printer & Document on the server

2. Determine the Printer & Document on the server

Print and Document Services

In Windows Server 2008, the Print Services role in Server Manager enables you
to share printers on a network, as well as to centralize print server and
network printer management tasks. It also enables you to migrate print servers
and deploy printer connections using Group Policy.

In Windows Server 2008 R2, this role has been updated with a new feature
called Distributed Scan Server. The new role, Print and Document Services,
enables you to share printers and scanners on a network, set up print servers
and scan servers, and centralize network print and scan management tasks.
You can do these tasks using the Print Management and Scan Management
Microsoft Management Console (MMC) snap-ins.

Product Evaluation
● Print Services Role
Learn about the Print Services role that enables you to share printers on a
network and centralize print server and network printer management
tasks.
● What's New in Print Management
Learn about the new functionality and enhancements to Windows printing
and scanning services introduced with Windows Server 2008 R2.

Planning and Architecture

● Infrastructure Planning and Design Guide for Print Services (Windows


Server 2008 and Windows Server 2008 R2)
Use this Solution Accelerator to help you plan the best architecture for
your business and to deliver the most cost-effective Windows Server 2008
Print Services technology.

Getting Started and Deployment

● Print, Scan, and Fax Server Installation Guide (New!)


Learn how to install and configure Print Server, Distributed Scan Server,
and Fax Server on a single computer running Windows Server 2008 R2.
● Print Management Step-by-Step Guide
Learn how to use Print Management to install, view, and manage all of the
printers and Windows print servers in your organization
● Print Services Migration Guide
Learn how to migrate a print server running Windows Server® 2003 or
Windows Server 2008 operating systems to a server running the Windows
Server 2008 R2 operating system with the Print and Document Services
role installed.
● Assigning Delegated Print Administrator and Printer Permission Settings
in Windows Server 2008 R2
Learn how to delegate print management tasks directly to users who are
not system administrators and define default printer security settings that
are inherited when you add new printers to your print server.
● Print Services Help (Windows Server 2008)
See the topics that are installed with server roles, services, and
technologies associated with Print Server in Windows Server 2008.
● Print and Document Services Help (Windows Server 2008 R2)
See the topics that are installed with server roles, services, and
technologies associated with Print Server and Distributed Scan Server in
Windows Server 2008 R2.

This is the first of two articles explaining how to share and manage network
printers with MS Windows 2008 Server. Part 1 explains how to add the Print
Services role to your server, and then how to use the Print Management
console to install and make printers available to users on your network. The
second article will examine more advanced features such as automating printer
deployment with Group Policy and logon scripts.

Requirements Before You Start

This guide assumes that you have a Windows based network, with a Windows
2008 (R2) Domain Controller – either a standard server or a Small Business
Server 2008/2011 server. Ideally all your printers should have a built-in
networking capability, or shared on the network from the PC they are attached
to, and you need to make sure you have downloaded all the drivers for the
different versions of Windows client on your network. When you have both 64
and 32 bit versions of a print driver it is essential to make sure that the version
numbers of the driver package are identical, otherwise it will not work.

Setup a Print Server

There are two main benefits to centralizing all your shared printers onto a print
server, firstly you can install all the different Windows client drivers on the
server so they are automatically deployed, and secondly it greatly simplifies the
management of the printers.

First of all you need to ensure that your Windows 2008 Server has the Print
Services role installed, so logon to it and open the “Server
Management” console, then click “Roles” in the left-hand pane:
The “Roles Summary” will list all the roles currently installed on your server,
and if like above you don’t see Print Services then you will need to add it by
clicking the “Add Roles” link. This will start the “Add Roles Wizard”, click
Next past the introductory page and on the next one click to check the “Print
& Document Services” role:
Click “Next” and the next page explains some of the basic principles of the
Print Services role, once you’ve read it click “Next” and on the following page
you are asked to select specifically which services you require. Here we only
need “Print Server”, which should already be ticked, unless you know you
have a need for any of the other role services then leave them
unticked. Click “Next” to take you to the confirmation page and then
click “Install” to add the Print and Document Server role. The installation
process should only take a minute or two and then you can click “Finish” to
close the wizard. A restart of the server should not be required.

The Print Management Console

Now you have the Print Services role installed on your server you can use the
Print Management console to perform all your printer administration tasks, so
open it by going to Start – Administrative Tools – Print Management.
Expand the Print Servers tree, then your server and click “Printers” to view
the printers already installed:
Adding a Printer

If you need to install another printer then right-click on “Printers” in the left
hand pane and select “Add Printer” to start the “Network Printer
Installation Wizard”. The procedure is very similar to the standard Windows
Add Printer wizard – either add your printer by browsing the network or enter
its IP address directly, and if you are fortunate then it will detect the printer
type automatically and install the driver. By default the wizard will offer to
share the printer on the network. It’s unlikely you would want to uncheck this
option but in the same window you can also provide additional information
such as the printer location. Filling in these fields will make it easier for your
users to identify the printer they wish to use, especially if you have several
identical model printers on your network, so it is worth doing now. Repeat the
process until you have added all the printers you wish to make available to
your users and they should be listed in the central pane.

Installing Additional Drivers

The secret of successful network printer sharing is getting the correct drivers
on the server, then the process of deploying them to the client PCs will be
completely automatic. Ideally you will have a brand new network with all 64bit
Windows 7 desktops, in which case the standard Windows 2008 drivers are all
you need, however this rarely occurs and it is far more likely that you will need
to support a mixture of 32bit XP and Vista clients too. The most important
thing to remember at this point is that all the version numbers for the printer’s
drivers must be the same, otherwise Windows will not accept them as being
valid. Some manufacturers make this easier than others, for example HP are
usually very good at clearly displaying the driver versions on their download
page:
HP LaserJet 2015n –

Windows Vista 64bit driversHP LaserJet 2015n – Windows Vista 32bit drivers
In the example above you will be fine if you download the PostScript driver
package dated 4th June 2008 for both 64bit and 32bit versions, as the version
numbers are identical. You need to be especially careful where your server
already has a 64bit driver package installed, the best option is to download the
latest version of both the 64bit and 32bit drivers, then you can ensure you
have up to date and matching driver versions. Selecting the “Drivers” option in
the Print Management console allows you to easily see what versions you have
installed on your server, here you can see that we have the latest version of the
PCL5 driver installed for our LaserJet 2015 both 32bit (x86) and 64bit
(x64) Windows clients:

Should you need to add or remove printer drivers then the easiest way to do it
is to right-click on “Drivers” in the left pane of the Print Management console
and select “Manage Drivers” from the dropdown menu. This will open a new
window listing all the drivers installed on your server, removing any one of
them is simply a case of clicking to select it and then clicking
the “Remove” button. Alternatively, to install a new driver click on
the “Add” button to start the wizard:

Click “Next” on the introductory page and the next page will ask you to select
what type of driver package you are installing – its unlikely you will have an
Itanium system so the choice is likely to be between “x64” – 64bit drivers, or
“x86” – 32bit drivers. Most driver packages will be specifically 32 or 64 bit, not
both in one, so you should only have one box checked before you
click “Next” to continue the wizard.

This window may well look familiar to you, its been a standard part of Windows
printer installation since at least Windows XP, and chances are that your
model of printer will not be listed, so you will have to click “Have Disk”. At this
point you will be prompted to browse to the location where you downloaded
your driver files to. If the correct “.inf” file is there, Windows will recognise it
and list the models of printer the driver supports – you just have to click the
correct model to select it and click “Next” to install the driver, then “Finish” to
complete the wizard.

Extracting Printer Driver Files

At this point you may encounter a problem because Windows does not
recognise the driver file you have downloaded, or you cannot locate the
necessary “.inf” file. With most “business” model printers this should not be an
issue. For instance, the HP LaserJet drivers in the example above come as a
self-extracting “.exe” file. Running it after download will prompt you to specify a
folder to extract the files to, and this is the location you should browse to after
clicking “Have Disk”. However, some manufacturers supply their drivers as
“user friendly” automatic installation programs, which start an application
installation style routine when run and will try to do the full printer setup for
you. This is not ideal as it will usually just install the printer as a local device,
and will not work at all if it is a 32bit driver which you are trying to add to a
64bit server.

Depending on the type of installation package supplied, there are several


options available to you to get around this problem. The best solution being to
revisit the manufacturer’s website and try to locate standalone driver files.
Some “consumer” type printers come with large installation packages which
install additional applications as well as the driver, to be honest you are
probably better off not trying to share one of these from your server as it isn’t
suitable for the task. With other packages, you may find that instead of
running the “Setup” program you can browse to its folder and locate the
necessary driver files hidden within it. These will include one or more “.inf” files
that tell Windows the models of printer it supports.

You only have to make the driver files available to Windows for the “Add driver
” process, it will then copy the files it needs to another location and retain them
for future use. When you are subsequently installing the shared printer on
any user desktops, the Windows OS should then be able to download the
correct driver files from the server automatically.

INSTALLING PRINTER AND DOCUMENT

Microsoft Windows Server 2008 is far more modular than prior versions of the
Server OS, and though the print spooler is installed and running out of the
box, management of the printers is not: this has caused no end of surprises
while trying to configure printers on a new application server.
This Tech Tip shows how to enable the Print Services role on a Server 2008
system, and then manage those printers using it. The work was prompted by
the needs of an Evolution Payroll Service Bureau middle tier installation, but it
should apply to any application server.

Install the "Print Services' role

The first step is to insure that the Print Services role is installed, which enables
a number of required administrative steps. This is not the same as the Printers
applet in the Control Panel: the latter doesn't run in an administrative context,
and will not allow many of the required operations to installation and
management of printers.
Launch the Server
1 Manager, and
approve the User
Account Control
prompt when
offered. We
are strong support
ers of UAC and
never disabled it.

2 If a "Before You (not illustrated)


Begin" box is
displayed, read and
click through it.
Likewise, review the
Introduction to
Print Services page
and click Next to
get started.

3 Launch Server
Manager< from
the Start Menu,
expand the local
server's name, and
then expand
the Roles item.
If Print
Services are
already found, then
stop.
Otherwise right-
click on Roles and
select Add
Roles from the
context menu.
4 Enable the
checkbox on Print
Services, then
click Next.
This is a good time
to add other
services if you
think you need
them, though many
application servers
won't.
After clicking Next,
an "Introduction to
Print Services"
dialog is displayed.
Review, then
click Next on this
as well.

5 Most users require


only Print Server —
this provides
normal ordinary
Windows printing
support.
LPD is an older
UNIX-style printing
that's not
commonly used in
Windows
environments. If
not sure, leave
unchecked.
The Internet
Printing Protocol is
likewise not
commonly used. It
not sure, leave
unchecked.
6 This final dialog
confirms what's
about to be
performed, and
though it warns
that a system
reboot may be
necessary. It didn't
require one when
we added print
services to our
server.
But removing the
Print Services role
did require a
restart before any
additional role-
related changes
could be made.
At this point, the machine is configured with full Print Services.

Administrating Printers

With Print Services fully installed, there are several places that can perform
printer administration.
Server Manager » Roles » Print Services » Print Management
This is the main Print Management application for administration of
printing resources. This is an MMC snap-in, so it fits right in with all the
other administrative
Start » Run » printmanagement.msc
This launches the same Print Management MMC application directly,
without going through the Server Manager. This can be made into a
shortcut onto the desktop if print management will be done often.
Control Panel » Printers
Unlike the previous two items, which run with Administrative privileges
because of the UAC elevation, the Control Panel runs in the user's
Windows Explorer context without administrative rights.
Only the machine's local Administrator — not merely a member of the
local Administrators group — has these rights automatically, so it
forbids changes to most settings. This stumped a number of experienced
admins for days.
It turns out that right-clicking a printer and selecting Run as
administrator, then Open will allow full administration after the UAC
confirmation.

SELF-CHECK 2.1-4

CONFIGURE PRINTER AND DOCUMENT ON THE SERVER

ESSAY: Write the answer in your whole sheet of pad paper

1.What is the printer and document on the server?

2. What is the getting started and deployment?


TASK SHEET 2.1-4

CONFIGURE PRINTER AND DOCUMENT ON THE SERVER

Performance Objective: given necessary tools,equipment and materials,


you should be able to configure printer and document on the server ff.
Standard operating procedures within 1/2 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


1.Launch the Server Manager, and approve the User Account Control prompt
when offered. We are strong supporters of UAC and never disabled it
2. If a "Before You Begin" box is displayed, read and click through it.
Likewise, review the Introduction to Print Services page and click Next to get
started.
3. Launch Server Manager< from the Start Menu, expand the local server's
name, and then expand the Roles item. If Print Services are already found,
then stop.
Otherwise right-click on Roles and select Add Roles from the
4. Enable the checkbox on Print Services, then click Next.
This is a good time to add other services if you think you need them, though
many application servers won't.
After clicking Next, an "Introduction to Print Services" dialog is displayed.
Review, then click Next on this as well.
5. This final dialog confirms what's about to be performed, and though it warns
that a system reboot may be necessary. It didn't require one when we added
print services to our server.
But removing the Print Services role did require a restart before any additional
role-related changes
6. This final dialog confirms what's about to be performed, and though it warns
that a system reboot may be necessary. It didn't require one when we added
print services to our server.
But removing the Print Services role did require a restart before any additional
role-related changes could be made.

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-4

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Launch the Server Manager, and approve the User Account Control
prompt when offered. We are strong supporters of UAC and never
disabled it
If a "Before You Begin" box is displayed, read and click through it.
Likewise, review the Introduction to Print Services page and
click Next to get started.
Launch Server Manager< from the Start Menu, expand the local server's
name, and then expand the Roles item. If Print Services are already
found, then stop.
Otherwise right-click on Roles and select Add Roles from the
Enable the checkbox on Print Services, then click Next.
This is a good time to add other services if you think you need them,
though many application servers won't.
After clicking Next, an "Introduction to Print Services" dialog is
displayed. Review, then click Next on this as well
This final dialog confirms what's about to be performed, and though it
warns that a system reboot may be necessary. It didn't require one
when we added print services to our server.
But removing the Print Services role did require a restart before any
additional role-related changes

This final dialog confirms what's about to be performed, and though it


warns that a system reboot may be necessary. It didn't require one
when we added print services to our server

INFORMATION SHEET 2.1-5

CONFIGURE REMOTE DESKTOP SERVICES ROLE


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the DNS role on the server

2. Determine the DNS role on the server

Remote Desktop Services (RDS), known as Terminal Services in Windows


Server 2008 and earlier,[1] is one of the components of Microsoft Windows that
allow a user to take control of a remote computer or virtual machine over
a network connection. RDS is Microsoft's implementation of thin
client architecture, where Windows software, and the entire desktop of the
computer running RDS, are made accessible to any remote client machine that
supports Remote Desktop Protocol (RDP). User interfaces are displayed from
the server onto the client system and input from the client system is
transmitted to the server - where software execution takes place.[2] This is in
contrast to application streaming systems, like Microsoft App-V, in which
computer programs are streamed to the client on-demand and executed on the
client machine.

RDS-V uses the Remote Desktop Connection Broker to determine where the
user is redirected. If a user is assigned and requests a personal virtual
desktop, RD Connection Broker redirects the user to this virtual machine. If
the VM is not turned on, RD Virtualization turns on the VM and then connects
the user. If the user is connecting to a shared virtual pool, then the RD
Connection Broker checks to see if the user already has a connected session in
the pool. If the user has a disconnected session then they are reconnected to
that VM. If the user does not have a disconnected session, a VM in the pool is
dynamically assigned to the user – if one is available. A quick note here, the
Hyper-V server role has to be installed on the same system that has the RD
Virtualization role service installed. Let’s take a quick look at the fairly simple
high-level RDS-V topology:

The different components of RDS-V are as follows:

Connection Broker – given an authenticated user and their associated request


for an application or desktop, the Broker determines which RDS Server or VM
image can best satisfy the request

Redirector – RD Session Host Server whose purpose is to query the Broker on


the RDS Client’s behalf. After querying the Connection Broker, the Redirector
sends an RDP redirection packet back to the RDS Client

RDS Assignment Database – representation of the AD Schema extensions that


provide end-user mappings to a particular VM Host image

Web Portal – web page that shows the user all the applications / desktops they
can access

VM Host – Machine on which the VM images are hosted. The VM Host Agent
service runs on this machine. The service is controlled by the Connection
Broker and can perform certain actions such as spinning up a VM image
The diagram above breaks out the different components and their
functions. Let’s take a closer look at the Connection Broker’s functions:
There are some basic steps that the Connection Broker performs. If the
endpoint for the request is a farm, then the Connection Broker has to check
the cache of user sessions to see if there is an existing disconnected session
within that particular farm. The key here is that the disconnected sessions are
farm-specific. If the user does not have a session, the Connection Broker
chooses the best machine or VM image within the farm. There is also some
machine logic that takes place. Connection Broker calls into the type-specific
VM Plug-in to carry out what is called Placement. This action involves the
plug-in move the necessary VM image to the best VM Host and then return the
name of that host. For VM calls specifically (as opposed to RemoteApp
requests), the Connection Broker calls into the VM Host Agent to spin up the
VM image. This is called Orchestration. The return value of this step is a list
of IP addresses for the final machine / image to which the RDS Client should
be redirected. These steps are executed each time a user connects. In
addition, the Connection Broker also has a “Pool Creator”. This component
coordinates the creation of VM farms by directing VM Host Agents to create
farm-joined VM instances out of template VM images.

Install Rеmote Desktop Services Role

1. In Server Manager, click Roles Summary > Add Roles.


2. Select Remote Desktop Services and click Next.
3. Select Remote Desktop Licensing and Remote Desktop Session Host.
Then click on Next.
4. Specify the Authentication Method by choosing "Do not require Network
Level Authentication".
5. Specify the Licensing Mode by choosing "Per User".
6. Leave the Administrators only to allow access to the RD Session Host
Server.
7. Do not configure any additional Client Experience features.
8. Do not configure any Discovery Scope for the RD Licensing and click
on Next.
9. Click on Install.
10. You must restart the server to finish the installation process. Once the
server is up, connect to it and proceed with the next step "Define RD
Licensing Server".
SELF-CHECK 2.1-5

CONFIGURE REMOTE DESKTOP SERVICES ROLE

ESSAY: Write the answer in your whole sheet of pad paper

1.What is the remote desktop services role?

2. What is the different components of RDS-V are follows?

3. Draw the Diagram Remote Desktop Services?

TASK SHEET 2.1-5


CONFIGURE REMOTE DESKTOP SERVICES ROLE

Performance Objective: given necessary tools,equipment and materials,


you should be able to configure remote desktop services role ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

1. In Server Manager, click Roles Summary > Add Roles


2. Select Remote Desktop Services and click Next.
3. Select Remote Desktop Licensing and Remote Desktop Session Host.
Then click on Next.
4.Specify the Authentication Method by choosing "Do not require Network
Level Authentication
5. Specify the Licensing Mode by choosing "Per User".
6. Leave the Administrators only to allow access to the RD Session Host
Server.
7. Do not configure any additional Client Experience features
8. Do not configure any Discovery Scope for the RD Licensing and click

on Next.
9. Click on Install.
10. You must restart the server to finish the installation process. Once the
server is up, connect to it and proceed with the next step "Define RD
Licensing Server".

Assessment Method:
DEMONSTRATION
PERFORMANCE CRITERIA CHECKLIST 2.1-5

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

In Server Manager, click Roles Summary > Add Roles

Select Remote Desktop Services and click Next.

Select Remote Desktop Licensing and Remote Desktop Session Host


Then click on Next
Specify the Authentication Method by choosing "Do not require Network
Level Authentication
Specify the Licensing Mode by choosing "Per User".

Leave the Administrators only to allow access to the RD Session Host


Server.
Do not configure any additional Client Experience features

Do not configure any Discovery Scope for the RD Licensing and click

Click on Install

You must restart the server to finish the installation process. Once the
server is up, connect to it and proceed with the next step "Define RD
Licensing Server".

UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS


MODULE DESCRIPTOR: This unit covers the knowledge, skills and
attitudes needed to set-up computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network
services as well as to perform testing, documentation and pre-deployment
procedures.

LEARNING OUTCOME NO.3

⮚ PERFORM TESTING, DOCUMENTATION AND PRE-DEPLOYMENT


PROCEDURES

CONTENTS:
1. CREATE A FOLDER IN THE SERVER
2. CREATE A ORGANIZATION UNIT & 2 USER ACCOUNTS
3. CREATE A GROUP POLICY MANAGEMENT
4. PRINTER DEPLOYMENT
5.JOIN THE CLIENT & SERVER TO DOMAIN
6. REMOTE DESKTOP SETTING
7.PRINTER SHARING DEPLOYMENT
ASSESSMENT CRITERIA:

1. Pre-deployment procedures is undertaken based on enterprise policies and


procedures
2. Operation and security check are undertaken based on end-user
requirements
3.Reports are prepared/completed according to enterprise policies and
procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 3.1-1

CREATE A FOLDER IN THE SERVER


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the create a folder in the server;share it


2. Define of the create a folder in the server

Creating a file share

Creating a file share or shared folder is a necessary prerequisite before you


install Qlik Sense. The file share is used to store all the Qlik application data
and must be accessible to all nodes in your Qlik Sense site. You can create a
file share either on the same server as the central node or on a separate server.
If you have a large multi-node site we recommend that you configure the file
share on a dedicated server for better resilience and performance.
If you create the file share on a separate server then you can follow the same
steps as for a central node but you must ensure that the same Windows
domain user that you use to run the Qlik services has read and write access to
the file share folder.

To create a file share and share the folder with specific users:
1. Create a local folder on your server computer. For example, create a
folder called TESDA CSS on the C:\ drive.

2. Right click the folder, and then click Properties.


3. Click the Sharing tab, and then click SHARE
4. choose the name of your Everyone, and click read/write
5.Select Read/Write, then click Add
then click Share

DONE….
Second set-up :
Configure Permission

1. Click Advance Sharing

2. Click check share


the folder
3. Click allow box 3
check in the box and
then click OK’’

Note: Make a note of the network path shown in the confirmation screen as
you use this later during setup of your shared persistence storage folders. The
network path will be in the following format: \\server\css.com
Ensure that permissions on the folder, subfolders, and files are set to full
control for the user account you selected.
To do this:

1. Click the Security tab.


2. Select the user account you want to use for the installation.
3. Click Advanced and check that your user has full control and that this
permission applies to the folder, subfolders, and files.
4. Click the Effective Access tab and then click Select a user and enter
your user account name.
5. Click View effective access and check in the Permission column that
your user has full control.
Top of Form
Bottom of Form

SELF-CHECK 3.1-1

CREATE A FOLDER IN THE SERVER

ESSAY: Write the answer in your whole sheet of pad paper

1.What is the creating a file share ?

TASK SHEET 3.1-1

CREATE A FOLDER IN THE SERVER


Performance Objective: given necessary tools,equipment and materials,
you should be able to create a folder in the server ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


1.Create a local folder on your server computer. For example, create a folder
called TESDA CSS on the C:\ drive
2. Right click the folder, and then click Properties.
3. Click the Sharing tab, and then click SHARE
4. Choose the name of your Everyone, and click read/write
5. Select Read/Write, then click Add
Second set-up : Configure Permission
1. Click Advance Sharing
2. Click check share the folder
3. Click allow box 3
check in the box and then click OK’’

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 3.1-1

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation


Gather the necessary materrials and equipment

Create a local folder on your server computer. For example, create a


folder called TESDA CSS on the C:\ drive
Right click the folder, and then click Properties.

Click the Sharing tab, and then click SHARE

Choose the name of your Everyone, and click read/write

Select Read/Write, then click Add

Click Advance Sharing

Click check share the folder

Click allow box 3 check in the box and then click OK’’

INFORMATION SHEET 3.1-2

CREATE A ORGANIZATION UNIT & 2 USER ACCOUNTS


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the create a OU & 2 user account


2. Define of the create a OU & 2 user account

When Windows server 2008 is promoted to domain controller, in Active


Directory Users and Computers snap-in, by default, only one organizational
unit with the name of Domain Controllers is created. Rest other containers are
not organizational units and therefore no group policies can be applied on
them. However, administrators can create their own organizational units and
place the object according to the geographical locations or departments in
them. After administrators have created organizational units and have placed
the objects in them they can then use Group Policy Management Console to
create and apply group policies on them. As a systems administrator in any
client/server Active Directory environment if you want to create a new
organizational unit you are required to follow the steps given as below

To start the Active Directory Users and Computers snap-in, click Start,
point to Administrative Tools, and then click Active Directory Users and
Computers:
To create Organization Unit right click on Tekbloq.local example this and
Click New and then Click Organization Unit:
Type name of New Object and click OK:

As you see New OU(Organization Unit) has been created, Same way you
can create child OU under ITUsers OU:
To create user right click on ITUsers OU and Click New and then click User :
Type all required information below and click next:

user1

user1

user1

user1

Type password for the User and click Next (In this screen you can also set
up 4 important setting with checking up checkbox):

number

p@ssw0rd
p@ssw0rd

character
Create User by clicking Finish:

So now created an account for Asim Alili in the ITUsers OU:

Take Note :

Desame pattern of USER ACCOUNT Kung gagawa ka ulit parehas lang

Forest owners are responsible for creating organizational unit (OU) designs for
their domains. Creating an OU design involves designing the OU structure,
assigning the OU owner role, and creating account and resource OUs.
Initially, design your OU structure to enable delegation of administration.
When the OU design is complete, you can create additional OU structures for
the application of Group Policy to the users and computers and to limit the
visibility of objects. For more information, see Designing a Group Policy
Infrastructure.
OU owner role

The forest owner designates an


OU owner for each OU that you
design for the domain. OU
owners are data managers who
control a subtree of objects in
Active Directory Domain
Services (AD DS). OU owners
can control how administration
is delegated and how policy is
applied to objects within their
OU. They can also create new
subtrees and delegate
administration of OUs within
those subtrees.
Because OU owners do not own
or control the operation of the
directory service, you can
separate ownership and
administration of the directory
service from ownership and
administration of objects,
reducing the number of service
administrators who have high
levels of access.

OUs provide administrative


autonomy and the means to
control visibility of objects in
the directory. OUs provide
isolation from other data
administrators, but they do not
provide isolation from service
administrators. Although OU
owners have control over a
subtree of objects, the forest
owner retains full control over
all subtrees. This enables the
forest owner to correct
mistakes, such as an error in
an access control list (ACL),
and to reclaim delegated subtrees when data administrators are terminated.

Account OUs and resource OUs


Account OUs contain user, group, and computer objects. Forest owners must
create an OU structure to manage these objects and then delegate control of
the structure to the OU owner. If you are deploying a new AD DS domain,
create an account OU for the domain so that you can delegate control of the
accounts in the domain.
Resource OUs contain resources and the accounts that are responsible for
managing those resources. The forest owner is also responsible for creating an
OU structure to manage these resources and for delegating control of that
structure to the OU owner. Create resource OUs as needed based on the
requirements of each group within your organization for autonomy in the management
of data and equipment.

Documenting the OU design for each domain

Assemble a team to design the OU structure that you use to delegate control
over resources within the forest. The forest owner might be involved in the
design process and must approve the OU design. You might also involve at
least one service administrator to ensure that the design is valid. Other design
team participants might include the data administrators who will work on the
OUs and the OU owners who will be responsible for managing them.
It is important to document your OU design. List the names of the OUs that
you plan to create. And, for each OU, document the type of OU, the OU owner,
the parent OU (if applicable), and the origin of that OU.
For a worksheet to assist you in documenting your OU design, download
Job_Aids_Designing_and_Deploying_Directory_and_Security_Services.zip
from Job Aids for Windows Server 2003 Deployment Kit and open "Identifying
OUs for Each Domain" (DSSLOGI_9.doc).

SELF-CHECK 3.1-2

CREATE A ORGANIZATION UNIT & 2 USER ACCOUNTS

ESSAY: Write the answer in your whole sheet of pad paper

1.What is the creating a file share ?

TASK SHEET 3.1-2


CREATE A ORGANIZATION UNIT & 2 USER ACCOUNTS
Performance Objective: given necessary tools,equipment and materials,
you should be able to create a ou & 2 user accounts ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


1. To start the Active Directory Users and Computers snap-in, click Start, point
to Administrative Tools, and then click Active Directory Users and Computers:

2. To create Organization Unit right click on Tekbloq.local example this and


Click New and then Click Organization Unit:
3. Type name of New Object and click OK

4. As you see New OU(Organization Unit) has been created, Same way you can
create child OU under ITUsers OU

5. To create user right click on ITUsers OU and Click New and then click User

6. Type all required information below and click next:

7. Type password for the User and click Next (In this screen you can also set
up 4 important setting with checking up checkbox):

8. Create User by clicking Finish:

Take Note :

Desame pattern of USER ACCOUNT Kung gagawa ka ulit parehas lang

Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 3.1-2

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

To start the Active Directory Users and Computers snap-in, click Start,
point to Administrative Tools, and then click Active Directory Users
and Computers:

To create Organization Unit right click on Tekbloq.local example


this and Click New and then Click Organization Unit:
Type name of New Object and click OK

As you see New OU(Organization Unit) has been created, Same way you
can create child OU under ITUsers OU

To create user right click on ITUsers OU and Click New and then click
User

Type all required information below and click next:

Type password for the User and click Next (In this screen you can also
set up 4 important setting with checking up checkbox):

Create User by clicking Finish


INFORMATION SHEET 3.1-3

CREATE A GROUP POLICY MANAGEMENT


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the create a group policy management


2. Define of the create a group policy management

What is Group Policy Management?


The primary use of
Group Policy
Management is
organizational
security. Group
policies, which are
commonly called
Group Policy Objects
(GPOs), make it
possible for decision-
makers and IT
professionals to
effectively apply
necessary
cybersecurity
controls across their
business from a
centralized location.
Doing so allows
network administrators to push best practices to end-user workstations based
on specific organizational needs—without having to apply them on a local
basis. This effectively saves hours of IT labor that can be better spent
monitoring activity for data breaches, repelling cyberattacks, or making
qualitative improvements throughout their network.
To go into greater detail, administrators can use Group Policy Management to
enforce and encode organizational cybersecurity practices beyond the default
security settings that come with Windows and other applications. For example,
Group Policy Management tools allow IT professionals to mandate password
requirements that meet complexity standards. By applying these rules through
GPOs, organizations can easily make their entire network more secure and do
so in a streamlined, unified way.
Depending on organizational needs, GPOs can be much more granular than
password specifications. As discussed earlier, administrators can set up GPOs
to enforce the principle of least privilege, controlling which users have access to
what resources. These policies can ensure that only users who need access to a
business’s most sensitive files are authorized to open them. This method of
organizational cybersecurity minimizes the potential damage that internal bad
actors can cause and also prevents cybercriminals from hacking a single end-
user’s account to access an entire network.
Additionally, administrators can set up folder redirections to secure valuable
proprietary information and mandate necessary updates. For example, IT staff
can use Group Policy Management tools to redirect user folders to the
organization’s NAS, helping to keep them as protected as possible in a
consolidated and monitored digital environment. They can also push security
patches and similar software updates through regularly without having to do
so on a case-by-case basis, making it easier to apply security best practices
across the board.

How Does Group Policy Management Work?


It’s likely multiple GPOs are enforced simultaneously in any given organization.
Figuring out how each GPO works in conjunction with others is worth
explaining, especially as rules exist to govern which GPOs take precedence over
others and which GPOs are mandated vs. up for customization.
The GPO hierarchy follows a set pecking order. Local GPOs are applied first—
these policies are the unique settings governing a specific computer. With
Windows Vista and later versions, these local policies can be broken down into
individual user accounts. Next, Active Directory group policies tied to a unique
site are applied. An Active Directory site is a logical collection of computers
based on their physical proximity within an organization. If there is more than
one site policy, they’ll be enacted based on an order determined by the
administrator.
Next, Windows group policies tied to a specific domain are executed—these are
domains in which the computer operates. Again, if a domain has more than
one policy linked to it, it will be enacted based on a preset order determined by
the appropriate administrator. Finally, the last GPOs to be applied will be those
set up for an Active Directory organizational unit in which the computer or
user operates. Organizational units refer to the logical groupings that make it
easier to set policies for and manage groups of network objects, ranging from
users to computers. Again, multiple policies in this tier will be carried out per
an administrator’s instructions.
How Do I Change Group Policy Management?
The way you change Group Policy Management will depend on what type of
GPO you’re trying to design and enforce. For example, IT professionals
attempting to set policies that are specifically related to the Windows operating
system will want to launch the Group Policy Management tool from their
administrator account and make specific changes through the Group Policy
Editor and/or GPMC. To create policies beyond GPO Windows rules and make
them extensible for other applications, tech staff can use administrative
templates. These contain an ADMX file with the policy settings and an ADML
file that encodes the policy settings in a language chosen by the administrator.
It’s also worth noting when GPO updates will be pushed out. Typically, these
policies will be updated randomly every 90 minutes to 120 minutes—or
whenever a computer is restarted. While this timing can be changed depending
on organizational needs (it’s possible to push them every 45 days at the most
infrequent), updating GPOs too often can slow down other network traffic.
Accordingly, IT professionals will need to prioritize mission-critical updates
over more routine changes.
Getting the most out of Group Policy Active Directory can take some time. For
your own business and for your MSP customers, however, it’s important that
you fully understand the critical role these policies can play in keeping an
organization secure from the full range of digital threats.

Configure Group Policy Management


1. Click start then administrator, go to Group Policy Management then
Click.
2. Click Domain then click network.local,choose student folder then
click.

3. Right
click student folder , click create GPO in this domain
4.Name : example any name basta walang kapareho

5. Right your Name folder work,then Click EDIT


6. Go to user configuration expand policies,expand window setting

Expand folder redirection.


7. Right Click Desktop Folder,then click properties

8. Setting not configured change to Basic-redirect everyone folder to the


same loaction.
9. type rooth name: example name is \\server\css

\\server\css example

10. Click Apply,Click Yes,Then OK


11. Same pattern as Document Folder/ he just repeats what he did
Do the
methods again>>

SELF-CHECK 3.1-3

CREATE A GROUP POLICY MANAGEMENT

ESSAY: Write the answer in your whole sheet of pad paper

1.What is the creating a group policy management ?

2. How Does Group Policy Management Work?

3. How Do I Change Group Policy Management?


TASK SHEET 3.1-3

CREATE A GROUP POLICY MANAGEMENT

Performance Objective: given necessary tools,equipment and materials,


you should be able to create a group policy management ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


1. Click start then administrator, go to Group Policy Management then
Click.
2. Click Domain then click network.local,choose student folder then click

3. Right click student folder , click create GPO in this domain

4.Name : example any as long as there is no one

5. Right your Name folder work,then Click EDIT

6. Go to user configuration expand policies,expand window setting

Expand folder redirection

7. Right Click Dessktop Folder,then click properties

8. Setting not configured change to Basic-redirect everyone folder to the


same loaction
9. type rooth name: example name is \\server\css
10. Click Apply,Click Yes,Then OK
11. Same pattern as Document Folder/ he just repeats what he did
12.Do the methods again>>

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 3.1-3

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Click start then administrator, go to Group Policy Management then


Click.
Click Domain then click network.local,choose student folder then click

Right click student folder , click create GPO in this domain

Name : example any as long as there is no one

Right your Name folder work,then Click EDIT

Go to user configuration expand policies,expand window setting

Expand folder redirection

Right Click Dessktop Folder,then click properties

Setting not configured change to Basic-redirect everyone folder to the


same loaction
type rooth name: example name is \\server\css

Click Apply,Click Yes,Then OK

Same pattern as Document Folder/ he just repeats what he did

Do the methods again>>

INFORMATION SHEET 3.1-4

PRINTER DEPLOYMENT
LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the printer deployment


2. Define of the printer deployment

What is Print Deploy?

Print Deploy is a print queue deployment tool that gets the right printer
drivers and print queues to the right person in the right location, effectively.

It enables users to move between locations, for example, branches, offices, or


campuses, and without them setting anything up. The location's printers are
dynamically downloaded onto their computers—it just works!

And just as importantly, Print Deploy simplifies the time consuming,


frustrating tasks of setting up print queues and deploying drivers in managed
environments.

Printer are Created on a Reference Computer


Deploying print queues all starts with creating and
configuring them, which is done on a reference computer.
You need a separate reference computer for each operating
system in your environment.

The print queues can be server, serverless, or Mobility


Print print queues.

The reference computer is where you set up default settings,


like grayscale and duplex, and capabilities, like stapling and
hole-punching.

After the print queues are set up they are ready


to be cloned into Print Deploy.
The print queues are cloned into Print Deploy
The first time you use Print Deploy you'll see the zones list, which contains the Everyone zone.
The zone doesn't contain any printers, so your first task is to download and run the cloner
tool.

When this tool is run on the reference computer (that's been set up with all your print queues),
it clones the print queues and adds them into Print Deploy. Now they're ready to connect to
zones.

Configure

Print Deploy is set up so users will get the correct print queue(s)
Introducing zones! Zones are used to deploy print queues to groups of users and/or to
computers within an IP range.

In the simplest deployment scenario, Print Deploy automatically puts all users into a single
zone called Everyone.

You can create multiple zones if you have the Advanced Print Enablement Pack, for example,
separate zones for Branch Office 1 and Branch Office 2. Users are added to zones depending
on what printers they need to use. That way, users who move between both Branch Offices will
have automatic access to the right printers at either location.

The print queues are then connected to the zones, so users in different zones will get to use
the specific printers are connected to each zone.

That's how you control which users get to use which printers. Now the print queues need to be
made available to the users.
Deploy

With the click of a button, the print queues are deployed, ready for the users to use.
Deployment done!
The Print are Deployed
A client is installed on users' computers so they can access the
print

A Print Deploy client is installed on the users’ computers. This client automatically picks up
the deployed printer queue details and adds them to the list of printers that are either
automatically installed on the users’ computers, or selected by the users to install themselves.

NOTE
For Mobility Print queues, users might need to enter their credentials to be
authenticated.
NOTE
If Windows has been set up to manage the default printer for users, then the
Windows setting is honored. Otherwise the Print Deploy client will set the
default printer (assuming one has been assigned in a zone).

INSTALLATION DEPLOYMENT PRINTER

NOTE: IF IT'S OVER to Group Policy desktop and Document then continue
to deployment printer
1. Click Deployed Printer
2. Right Click deployed printer then click deploy printer

3.
Type root path : \\server\Brother DCP-116C just what any kind of printer

\\server\Brother DCP-116C

4. Click ADD
>>>
5. Click OK

Click DONE>>>>>
SELF-CHECK 3.1-4
PRINTER DEPLOYMENT

ESSAY: Write the answer in your whole sheet of pad paper

1. What is Print Deploy?

2. Draw the Printer Deploy


TASK SHEET 3.1-4

PRINTER DEPLOYMENT

Performance Objective: given necessary tools,equipment and materials,


you should be able to printer deployment ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table, printer scanner

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

1. Click Deployed Printer

2. Right Click deployed printer then click deploy printer

3. Type root path : \\server\Brother DCP-116C just what any kind of printer
4. Click ADD >>>

5. Click OK Click DONE>>>>>

Assessment Method:

DEMONSTRATION
PERFORMANCE CRITERIA CHECKLIST 3.1-4

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Click Deployed Printer

Right Click deployed printer then click deploy printer

Type root path : \\server\Brother DCP-116C just what any kind of


printer
Click ADD >>>

Click OK Click DONE


INFORMATION SHEET 3.1-5

JOIN THE CLIENT & SERVER TO DOMAIN

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the join the client & server to domain


2. Define of the join the client & server to domain

A client/server network is a system where one or more computers called clients


connect to a central computer named a server to share or use resources. Each
client computer must use an operating system that allows it to be identified to
participate in the network.

Client/Server Networking

A computer network is referred to as client/server if (at least) one of the


computers is used to "serve" other computers referred to as "clients". Besides
the computers, other types of devices can be part of the network:

n a client/server environment, each computer still holds (or can still hold) its
(or some) resources and files. Other computers can also access the resources
stored in a computer, as in a peer-to-peer scenario. One of the particularities of
a client/server network is that the files and resources are centralized. This
means that a computer, the server, can hold them and other computers can
access them. Since the server is always ON, the client machines can access the
files and resources without caring whether a certain computer is ON.
One of the consequences of a client/server network is that, if the server is
turned OFF, its resources and sometimes most of the resources on the network
are not available. In fact, one way to set up a client/server network is to have
more than one server. In this case, each server can play a different role.
Another big advantage of a client/server network is that security is created,
managed, and can highly get enforced. To access the network, a person, called
a user must provide some credentials, such as a username and a password. If
the credentials are not valid, the user is prevented from accessing the network.
The client/server type of network also provides many other advantages such as
centralized backup, Intranet capability, Internet monitoring, etc. In a small
network, all these services can be handled by one server:

JOINING THE CLIENT TO SERVER TO THE DOMAIN


CLICK START THEN RIGHT CLICK COMPUTER THEN CLICK PROPERTIES

CLICK CHANGE SETTING

THE CLICK CHANGE


CLICK DOMAIN

TYPE DOMAIN: EXAMPLE __networking.local..THEN CLICK OK


TYPE DOMAIN PASSWORD: user :administrator password:p@ssword kung anu yun
password nilagay mo
The CLICK OK’’

WELCOME TO THE NETWORKING.LOCAL DOMAIN


THEN WILL BE RESTART IN YOUR COMPUTER,,THEN OK
CLICK SWITCH USER
THEN CLICK THE OTHER USER
THEN ENTER YOUR USER PASSWORD : EXAMPLE __user1__p@ssword

Waiting for 5 mins to preparing your Desktop


You should see a Green Sharing circle icon >>>>

SELF-CHECK 3.1-5

JOIN THE CLIENT & SERVER TO DOMAIN

ESSAY: Write the answer in your whole sheet of pad paper

1. What is Client/Server Networking?

2. Draw the diagram of client/server networking


TASK SHEET 3.1-5

JOIN THE CLIENT & SERVER TO DOMAIN

Performance Objective: given necessary tools,equipment and materials,


you should be able to join the client & server to domain ff.
Standard operating procedures within 1 hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table,

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

1. CLICK START THEN RIGHT CLICK COMPUTER THEN CLICK PROPERTIES

2 .CLICK CHANGE SETTING

3. THE CLICK CHANGE

4. CLICK DOMAIN

5. TYPE DOMAIN: EXAMPLE __networking.local..THEN CLICK OK

6. TYPE DOMAIN PASSWORD: user :administrator password:p@ssword kung anu yun


password nilagay mo

7. The CLICK OK’’

8. WELCOME TO THE NETWORKING.LOCAL DOMAIN

9. THEN WILL BE RESTART IN YOUR COMPUTER,,THEN OK


11. THEN
10. CLICK
CLICK THE OTHER
SWITCH USER USER

12. THEN ENTER YOUR USER PASSWORD : EXAMPLE __user1__p@ssword

13. Waiting for 5 mins to preparing your Desktop

14. You should see a Green Sharing circle icon

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 3.1-5

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

CLICK START THEN RIGHT CLICK COMPUTER THEN CLICK


PROPERTIES
CLICK CHANGE SETTING

THE CLICK CHANGE

CLICK DOMAIN

TYPE DOMAIN: EXAMPLE __networking.local..THEN CLICK OK


TYPE DOMAIN PASSWORD: user :administrator password:p@ssword
kung anu yun password nilagay mo
The CLICK OK’’

WELCOME TO THE NETWORKING.LOCAL DOMAIN

THEN WILL BE RESTART IN YOUR COMPUTER,,THEN OK

CLICK SWITCH USER

THEN CLICK THE OTHER USER

THEN ENTER YOUR USER PASSWORD : EXAMPLE __user1__p@ssword

Waiting for 5 mins to preparing your Desktop

You should see a Green Sharing circle icon


INFORMATION SHEET 3.1-6

REMOTE DESKTOP SETTING

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the remote desktop setting


2. Define of the remote desktop setting

What is Remote Desktop?


Remote Desktop allows the graphical
interface of a remote Windows system to be
displayed over a network onto a local
system. In addition, keyboard and mouse
events on the local system are transmitted
to the remote system enabling the local
user to perform tasks on the remote system
as if they were physically sitting at the
remote system. Conversely, resources
(such as printers and disk drives) on the
local system can be made available to the
remote system for the duration of the
connection. This remote control can be
established in a number of ways, including
over wide area networks (WAN), local area
networks (LAN) or over the internet.
RIGHT CLICK PROPERTIES

In the case of Windows Server 2008, this service is provided by Terminal


Services running on the remote systems and the Remote Desktop
Connection (RDC) client on the local system.
Terminal Services run in two different modes, Administration and Virtual
Session. Remote Desktop for Administration provides full administration
functionality to the remote administrator (including access to the console
session and visibility of notification messages). Remote Desktop for
Administration is the equivalent to working directly at the remote system's

console. In virtual session


mode the user is subject to
some limitations such as the
ability to install applications
and view console notification CLICK REMOTE SETTING
messages.
Windows Server 2008
imposes some administrator
logon restrictions.
Specifically, a maximum of
two administrators may be
logged on at any one time,
either two logged on
remotely, or one local and
one remote administrator.
This assumes, however, that different accounts are being used to log on. In
other words, the same user may not log on locally and remotely
simultaneously.

Enabling Remote Desktop Administration on the Remote Server


As mentioned previously, remote desktop functionality on the server is
provided by Terminal Services. It is important to note, however, that Terminal
Services do not have to be explicitly enabled on the server in order to support
Remote Desktop Administration. In fact, all that needs to be done is to enable
Remote Desktop Administration. This is configured by opening the Control
Panel from the Start menu and selecting the System icon (if the Control Panel
is in Control Panel Home mode this is located under System and Maintenance).
In the Task section in the top left hand corner of the System page
select Remote settings to display the following properties window:
CLICK ALLOW

CLICK SELECT USER

The Remote properties dialog provides a number of options. The default setting
is to disallow remote connections to the computer system. The second option
allows remote desktop connections from any version of the Remote Desktop
client. The third, and most secure option, will only allow connections from
Remote Desktop clients with Network Level Authentication support. This
typically will only allow access to systems providing secure network
authentication such as Windows Vista and Windows Server 2008.
If the Windows Firewall is active, the act of enabling Remote Desktop
administration also results in the creation of a firewall exception allowing
Remote Desktop Protocol (RDP) traffic to pass through on TCP port 3389. This
default port can be changed by changing this setting in the Registry key
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\
WinStations\RDP-tcp\PortNumber. The easiest way to locate this registry key
value is to execute regedit from the Run window or a command prompt,
select Edit - > Find and enter RDP-tcp.
Controlling Remote Desktop Access
The default configuration for Remote Desktop is to allow all members of the
Administration group to connect remotely. Active Directory also contains
a Remote Desktop Users group to which users may be added to provide Remote
Desktop access privileges. To provide users with remote desktop access, open
the Control Panel -> System and Maintenance -> System -> Remote
settings and click on the Select Users button to invoke the Remote Desktop
Users dialog illustrated in the following figure: <google>WIN28BOX</google>

CLICK ADD

Note that users with administrative privileges do not need to be added to this
list; by default they already have Remote Desktop access. To add additional
users click on the Add... button to display the Select Users dialog. Enter the
name of the user in the text box entitled Enter object names to select and click
on Check names to list names that match the name entered. Select the
appropriate name from the list. The following example shows user Bill on
server winserver-2:
USER1 CLICK CHECK NAMES

Click on OK to apply the change. The new user will now appear in the list of
users with Remote Desktop access on the Remote Users screen. Click OK to
close this screen and click on Apply in the System Settings screen. The
specified user will now have remote desktop access to the system.

Remote Desktop Group Policy


A vast array of configuration options for Terminal Services is available through
the Group Policy settings. To access these values start the Group Policy Object
Editor (open the Start menu and enter gpedit.msc into the Search box). In the
Group Object Policy Editor navigate to Computer Configuration\Administrative
Templates\Windows Components\Terminal Services or User
Configuration\Administrative Templates\Windows Components\Terminal
Services to access the range of policy settings available.
Policy options include, amongst other options, items such as control over
resource redirection (printers, audio etc), setting session time limits and
security settings. A complete overview of all the settings is beyond the scope of
this book but almost without exception the various settings are largely self-
explanatory.
CLICK START TYPE THE BOX REMOTE DESKTOP CONNECTION

CLICK REMOTE DESKTOP CONNECTION


TYPE IP ADDRESS ON YOUR SERVER 192.168.__.___WHAT ITS YOUR IP
ADDRESS
SELECT USE ANOTHER ACCOUNT THE TYPE YOUR PASSWORD

EXAMPLE: user1 : p@ssw0rd

CLICK YES
DONE REMOTE SETTING VIEW

SELF-CHECK 3.1-6

REMOTE DESKTOP SETTING

ESSAY: Write the answer in your whole sheet of pad paper

1. What is remote desktop setting?

2. Draw the diagram remote desktop setting


TASK SHEET 3.1-6

REMOTE DESKTOP SETTING


Performance Objective: given necessary tools,equipment and materials,
you should be able to remote desktop setting ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table, printer scanner

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

CLICK START TYPE THE BOX REMOTE DESKTOP CONNECTION

CLICK REMOTE DESKTOP CONNECTION

TYPE IP ADDRESS ON YOUR SERVER 192.168.__.___WHAT ITS YOUR IP


ADDRESS

SELECT USE ANOTHER ACCOUNT THE TYPE YOUR PASSWORD

EXAMPLE: user1 : p@ssw0rd

CLICK YES

DONE REMOTE SETTING VIEW


Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 3.1-6

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

CLICK START TYPE THE BOX REMOTE DESKTOP CONNECTION

CLICK REMOTE DESKTOP CONNECTION

TYPE IP ADDRESS ON YOUR SERVER 192.168.__.___WHAT ITS YOUR IP


ADDRESS

SELECT USE ANOTHER ACCOUNT THE TYPE YOUR PASSWORD

EXAMPLE: user1 : p@ssw0rd

CLICK YES

DONE REMOTE SETTING VIEW


INFORMATION SHEET 3.1-7

PRINTER SHARING DEPLOYMENT


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the printer sharing deployment


2. Define of the printer sharing deployment

Assign network printers to users and computers based on location.


Setting up a new printer on the network, or replacing a faulty one, is
never a fun job, but it can be made into a painless operation
using Printer Tasks. ... Printer Tasks can also: Deploy single or
multiple printers as part of one task
INSTALLING PRINTER SHARING DEPLOYMENT
PART 1:
1. Click start then click control panel

2. Click hardware and sound


3. Click devices and printers

4. Click Add a printer


5. Click Add a local printer

6. Choose any model printer for example:Brother DCP-116C


7. Click next ,then installing wait 2 mins

8. click next .see the share this printer…if check


9.Done installing printer model Brother DCP-116C..you see the check mark
green

PART 2 : TESTING PRINTER SHARING:

Right click image edit,then choose print


Click the box: find in the box that printer model sharing..that all
congratulations to you because you did printer sharing

\\server\Brother DCP-116C
Noted:
you should see that printer sharing
when you have not seen anything
shared repeat the installing printer
model again.

SELF-CHECK 3.1-7

PRINTER SHARING DEPLOYMENT

ESSAY: Write the answer in your whole sheet of pad paper

1. What is printer sharing deployment?

2. Draw the diagram printer sharing deployment


TASK SHEET 3.1-7

PRINTER SHARING DEPLOYMENT


Performance Objective: given necessary tools,equipment and materials,
you should be able to printer sharing deployment ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Operating systems ,utp cable,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table, printer scanner

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

Click start then click control panel

1.Click hardware and sound


2. Click devices and printers
3. Click Add a printer
4.Click Add a local printer
5.Choose any model printer for example:Brother DCP-116C
6. Click next ,then installing wait 2 mins

7. click next .see the share this printer…if check

8.Done installing printer model Brother DCP-116C..you see the check mark
green

9.Right click image edit,then choose print

10.Click the box: find in the box that printer model sharing..that all

Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 3.1-7

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Click hardware and sound

Click devices and printers

Click Add a printer

Click Add a local printer

Choose any model printer for example:Brother DCP-116C

Click next ,then installing wait 2 mins

click next .see the share this printer…if check

Done installing printer model Brother DCP-116C..you see the check


mark green
Right click image edit,then choose print

Click the box: find in the box that printer model sharing..that all

You might also like