Professional Documents
Culture Documents
COMPUTER SYSTEMS
Qualification : SERVICING NCII
Unit of
Competency : SET-UP COMPUTER SERVERS
SETTING- UP COMPUTER
Module Title : SERVERS
Inside this module you will find the activities for you to
complete followed by relevant information sheets for each learning
outcome. Each learning outcome may have more than one learning
activity.
List of Competencies
MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes
needed to set-up computer servers for LANs and SOHO systems. It consists
of competencies to set-up user access and configures network services as
well as to perform testing, documentation and pre-deployment procedures.
LEARNING OUTCOMES:
At the end of this module you MUST be able to:
ASSESSMENT CRITERIA:
CONTENTS:
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
● Providing access to remote printers, managing which users are using which
printers when, managing how print jobs are queued, and recognizing when
devices aren't available to the network
● Enabling and managing access to files on remote systems, and determining
who can access what—and who can't
● Granting access to remote applications and resources, such as the Internet,
and making those resources seem like local resources to the user (the network
is ideally transparent to the user)
● Providing routing services, including support for major networking protocols,
so that the operating system knows what data to send where
● Monitoring the system and security, so as to provide proper security against
viruses, hackers, and data corruption.
● Providing basic network administration utilities (such as SNMP, or Simple
Network Management Protocol), enabling an administrator to perform tasks
involving managing network resources and users.
Peer to peer computer networks are good choice for small business organizations.
For example: a small pharmacy outlet, an automobile service center, a small
clinic etc.
• Each computer has its own user database. There is no centralized user & user
privilege management. Users need to remember their user ids and passwords in
every computer. Managing network users is extremely difficult.
As the organization's network grows, they must gradually upgrade their peer to
peer network to client server based network.
Well known server Operating System Products are Microsoft Windows Server
2019,Unix(OracleSolaris, IBMAIX, HP
UX, FreeBSD, NetBSD, OpenBSD, Xinuos Open Server/SCO Unix, GNU/Linux
(RedHat Enterprise Linux, Debian Linux, SUSE Linux Enterprise
Server, Ubuntu Server, CentOS Server, Fedora Server etc.
Building a client server based network is costlier than building a peer to peer
network. Client server based networks require dedicated servers. Server
hardware is costlier than normal desktop client computer hardware. Network
Operating Systems (Server Operating System) are also costlier than client
Operating Systems (Desktop Operating Systems).
Different types of servers used in client server based networks are listed
below.
File Server: File servers are used to store the user documents and files centrally.
An ideal file server should have a large amount of memory and storage space,
fast hard-disks, multiple processors, fast network adapters, redundant power
supplies etc.
A File server runs FTP (File Transfer Protocol) in Windows, Linux or Unix
Networks, or SMBP (Server Message Block Protocol) in Windows Networks. Well
known FTP software products are Micrsoft IIS, FileZilla Server, vsftpd, Apache
FTP Server etc.
The main advantage of keeping network user files and electronic documents
centrally in a file server is that the network user files and documents can be
managed (backup'd) easily. Think about managing network user files and
electronic documents kept distributed inside user workstations in a network
consists of thousands of computers! Nearly impossible.
Print Server: Print Server, which redirects print jobs from client computers to
specific printers.
Mail Server: Mail Servers are used to transmit emails using email protocols.
Most widely used email transmission protocol is SMTP (Simple Mail Transfer
Protocol). Mail Servers exchange emails between different domains.
Most widely used Mail Server software products are Microsoft Exchange
Server, SENDMAIL (now proofpoint), Postfix, Apache James etc.
Some examples for Application Server Software are SAP ERP, Microsoft
Dynamics, Oracle ERP Cloud, Ramco ERP, infor ERP etc.
1. CONFIGURE IP ADDRESS
Step 1
Click the Start menu. Next, click on the Control Panel option.
Step 2
Step 4
Right-click on the Local Area Connection icon, then select Properties.
Step 5
In the window that opens, click on the Internet Protocol Version 4
(TCP/IPv4) (you may need to scroll down to find it). Next, click on
the Properties button.
Step 6
In the window that opens, click the Use the following IP address: radio button.
In the IP address:, Subnet mask:, and Default gateway: number fields, insert
the numbers that were assigned to you by OIT.
192.168.____._____
255.255.255.0
Ip address of the Router
Step 7
Next, click the Use the following DNS server addresses: radio button. Next, in
the Preferred DNS server:, and Alternate DNS server: number fields, input
the numbers that were assigned by OIT. Then click the OK button.
192.168.____._____
255.255.255.0
Ip address of Router
DONE..
SELF-CHECK 1.1-1
___________________4. Its is a file servers are used to store the user documents
and files centrally. An ideal file server should have a large amount of memory
and storage space, fast hard-disks, multiple processors, fast network adapters,
redundant power supplies etc.
___________________5.Its is a print server, which redirects print jobs from client
computers to specific printers.
Steps / Procedure:
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
Click the Start menu. Next, click on the Control Panel option
The User Access Level of editors affects their abilities to perform specific
actions on Wikipedia. The user access level depends on which rights (also
called permissions, user groups, bits, or flags) are assigned to accounts. There
are two types of access leveling: automatic, and requested. User access levels
are determined by whether the Wikipedian is logged in, the account's age and
edits, and what manually assigned rights the account has.
Anyone can use the basic functionalities of Wikipedia even if they are not
logged in. Unless they are blocked, they may freely edit most pages. Being
logged in gives users many advantages, such as having their public IP
address hidden and the ability to track one's own contributions. Additionally,
once user accounts are more than a certain number of days old and have made
more than a certain number of edits, they automatically become autoconfirmed
or extended confirmed, allowing the direct creation of articles, the ability to
move pages, to edit semi-protected and extended-protected pages, and upload
files. Further access levels need to be assigned manually by a user with the
appropriate authority. An editor with more experience and good standing can
attempt to become an administrator, which provides a large number of
advanced permissions.
Many other flags for
specialized tasks are also
available.
Access level — is a set of operations that a user can perform. The access
levels and the underlying operations are assigned by the system administrator.
The access levels are inheritable, which means that if no explicit access
permission exists for a section or page, the access parameters of a parent
section take effect.
Each of the employees in Kate's office has a key to the building. One weekend
Kate had some important work to do, but when she reached her office she
realized she had forgotten her key. She called the security officer, who
authenticated her as an employee before letting her in.
A domain controller is in some ways similar to the security officer of an office
building. In an office there are many computers, each one requiring the user to
login with his or her own user name and password. Suppose there are a
hundred office computers. From the perspective of an Information Technology
(IT) professional, it is difficult to manage the authentication of each individual
machine. A simpler solution is to configure one computer to manage the
authentication of all the others. All the office computers will then be connected
to this main computer to form a network. The main computer is known as the
domain controller, while the other computers it authenticates are known as
clients. In such set up, the client computers are said to be on the Windows
domain. Now the IT person finds that the login credentials will not have to be
managed on each individual computer. instead, the user names and login
credentials of all authenticated users in the office can be managed much more
easily through one machine, the domain controller.
Active Directory
Active Directory is the central database on a domain controller where the login
credentials of all client computers, printers, and other shared resources in the
network are stored. When someone tries to login, their login credentials must
match those saved in Active Directory. If the login credentials do not match,
the user will be denied access. All client computers on the domain share this
common Active Directory. Only an administrator or IT professional has
authority to add computers or shared resources to the domain, further
strengthening security.
The domain controller saves plenty of headaches in the office. Take Sue, for
instance. She works as an administrative assistant on the second floor. She
has a meeting on the fifth floor with more than 20 attendees. Since Sue's
computer is on the domain, Sue can print from a printer on the fifth floor
without even leaving her own desk. Now the documents will be waiting for her
when she heads to the meeting.
Another advantage is that any one in the office can login to any other computer
on the domain using their own login credentials and still have access to all
their personal files. In the above example, Sue can login to Mark's computer on
the fifth floor with her own user name and password, and she would still have
access to all her personal documents. File security is also ensured because,
even when Sue logs into Marks computer as herself, she does not see any of
Mark's files. Sue only sees the files and printers that she has access to.
SELF-CHECK 1.1-3
When it comes to the appliances or clocks around the house, it does not really
matter if the time is completely accurate. It is normal for them to be a few
minutes off. However, with cellular phones and computers today, we have the
expectation that the time (and especially the date) will be 100% accurate,
without fail (or at least I have that expectation). It's not that this is just "nice",
correct time and date are actually required for many enterprise infrastructure
features to work. For example, servers and PC clients participating in Windows
Active Directory must have the right date & time or else authentication will fail.
I have a server whose onboard battery is bad. If it loses power and comes back
up, the date and time are wrong. The server boots up and appears to work,
however, I cannot connect to it via RDP because of the significant date
difference. This happens because, for the security certificates to validate, the
date between the server and client must be, at least, "close". Also, with it being
a domain controller, this time issue could cause the whole AD domain to be
unable to authenticate.
I do not think that one week notice is very helpful. Surely, you will forget that it
is going to change the time one week later. Microsoft must have felt the same
way because in Windows 7, they changed this to just Notify me when the
clock changes. Thus, you would just be alerted that it has changed. That is
fine with me. I do not think that most of us need a one week notification.
Of course, the time and date that daylight savings time occurs in the United
States changed in 2009 and the application of DST around the world is very
different. Fortunately, Microsoft keeps track of that for us and makes these
changes based on our Windows time zone settings.
Open Server Manager and click on roles, this will bring up the Roles
Summary on the right hand side where you can click on the Add Roles link.
This will bring up the Add Roles Wizard where you can click on next to see a
list of available Roles. Select Active Directory Domain Services from the list,
you will be told that you need to add some features, click on the Add Required
Features button and click next to move on.
Open up Server Manager, expand Roles and click on Active Directory Domain
Services. On the right hand side click on the Run the Active Directory
Domain Services Installation Wizard (dcpromo.exe) link.
This will kick off another wizard, this time to configure the settings for you
domain, click next to continue.
SELF-CHECK 1.1-3
Steps / Procedure:
click on roles
click on the Add Required Features button and click next to move on.
just click next to skip past here and click install to start installing
7.click on the Run the Active Directory Domain Services Installation Wizard
(dcpromo.exe) link.
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
Click on roles
Click on the Add Required Features button and click next to move on.
Just click next to skip past here and click install to start installing the
binaries for Active Directory
The installation is finished you will be shown a success message, just
click close.
Click on the Run the Active Directory Domain Services Installation Wizard
(dcpromo.exe) link.
LEARNING OBJECTIVES:
● Since we
going to install
New domain Controller in new forest please select the option "Create a new
domain in new forest" option and click on "Next"
● Now we have to provide the name for our domain controller. It must be FQDN.
In our case I used rebeladmin.com as the domain. Please click "Next" after it.
css.com Type css.com example
● In this window it will ask to select forest function level. If you going to add
server 2003 domain controller to your forest later don't select the function level
as server 2008. If you going to use full features of 2008 Ad you must select
forest function level as Server R2 2008. In my case I used server R2 2008.
Click on "Next" after the select.
● In next window since it's the first DC we should make it as DNS server too.
Leave the default selection and click on "Next"
● If the wizard cannot create a delegation for the DNS server, it displays a
message to indicate that you can create the delegation manually. To continue,
click "Yes"
● In next window it will show up the database location. It its going to be bigger
AD its good if you can keep NTDS database in different partition. Click on
"Next" after changes.
● In next window its asking to define a restore mode password. Its more important
if you had to do a restore from backup in a server crash. Click on "Next" after
filling it.
p@ssw0rd example
p@ssw0rd example
installation of the AD. It will take some time to complete. After complete of the
installation perform a server reboot.
● After the reboot now you can login to the domain. Please use the login as
following example
Password : XXXXXXXX
● Now its done and you can view the active directory options on administrative
tools menu
SELF-CHECK 1.1-3
Steps / Procedure:
3.Since we going to install New domain Controller in new forest please select
the option "Create a new domain in new forest" option and click on "Next"
4.Now we have to provide the name for our domain controller. It must be
FQDN. In our case I used css.com as the domain. Please click "Next" after it.
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
Now we have to provide the name for our domain controller. It must be FQDN.
In our case I used css.com as the domain. Please click "Next" after it
Select forest function level as Server R2 2008. In my case I used server
R2 2008. Click on "Next" after the select
In next window since it's the first DC we should make it as DNS server
too. Leave the default selection and click on "Next"
If the wizard cannot create a delegation for the DNS server, it displays a
message to indicate that you can create the delegation manually. To
continue, click "Yes"
CONTENTS:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-1
DNS stands for Domain Name System. The main function of DNS is to
translate domain names into IP Addresses, which computers can understand.
It also provides a list of mail servers which accept Emails for each domain
name. Each domain name
in DNS will nominate a set
of name servers to be
authoritative for its DNS
records.
This is where all other
name servers will be
pointed when looking for
information about the
domain name. Name
servers are a program or
computer server that
implements a name-
service protocol. This is
where the zone file is
stored and your DNS
records are stored within.
A zone file is a small set of
instructions that points domain names to IP addresses.
A zone file is made up of ‘records’ such as A Records and MX Records. This
record is used to point your domain name to an IP address. If you need to set
up a A record, your provider would provide you with an IP address that will
look something like 194.154.164.196. If you need to set up a CNAME record,
your provider would provide you with a URL address that will look something
like web.me.com. This is used to specify which mail servers are responsible for
a particular domain name.
One special MX Record feature is priority numbers, which provide information
to the querying mail server about which mail server should be used first. The
next entry is tried only when the mail server with the highest priority is not
available.
You can change the nameservers of your domain name from the 123 Reg
control panel. Check out our useful guide for step-by-step instructions.
Installation:
Step 1: Install a DNS server from the Control Panel, follow these steps:
● Go to Start —> Control Panel —> Administrative Tools —> Server Manager.
● Expand and click Roles
● Click on Add Roles
Step 2 : The new window will open with the list of roles available to install.
Select DNS server and Click Next.
Step 3: Click Next on the introduction windows. In the last window click
on install. It will start installation, the following window shows the progress of
installation.
Configuring DNS:
After installing DNS, you have to go Start —> All Programs —
> Administrative Tools —> DNS for managing DNS server.
SELF-CHECK 2.1-1
CONFIGURE DNS ROLE ON THE SERVER
Steps / Procedure:
● Go to Start —> Control Panel —> Administrative Tools —> Server Manager.
● Expand and click Roles
● Click on Add Roles
Step 2 : The new window will open with the list of roles available to install.
Select DNS server and Click Next.
Step 3: Click Next on the introduction windows. In the last window click
on install. It will start installation, the following window shows the progress of
installation
4.Configuring DNS:
After installing DNS, you have to go Start —> All Programs —
> Administrative Tools —> DNS for managing DNS server.
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
Install a DNS server from the Control Panel, follow these steps:
The new window will open with the list of roles available to install.
Select DNS server and Click Next.
Configuring DNS:
After installing DNS, you have to go Start —> All Programs —
> Administrative Tools —> DNS for managing DNS server.
This guide assumes that you have Server 2008 up and running on a machine–
if you don’t, you should check out our guide on how to install it. You should
also have set a static IP address on the server before continuing.
To get started, fire up the Server Manager, right click on roles, and then select
add roles.
You will be prompted with the normal “Before You Begin” screen, and after
clicking Next you’ll be able to choose DHCP Server.
Next you’ll want to select the network connection to bind the DHCP protocol to.
Put in the IP address of your DNS Server, which in this case is the same
machine–but be careful not to put the loopback address (127.0.0.1) as this will
be the address your clients will go to for name resolution.
Click next again to skip the WINS setup, this will bring you to creating a DHCP
Scope, where you can click the Add button.
Now you need to:
192.168.1.2
192.168.1.10
192.168.1.1
Once you have clicked on OK, you can click next 4 times to get to the
confirmation screen where you can finally click install.
Once the installation is complete your DHCP will be functioning, and you can
start managing your DHCP server right away.
DONE>>
SELF-CHECK 2.1-2
CONFIGURE DHCP ROLE ON THE SERVER
Steps / Procedure:
6. Once you have clicked on OK, you can click next 4 times to get to the
confirmation screen where you can finally click install.
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
To get started, fire up the Server Manager, right click on roles, and
then select add roles
Clicking Next you’ll be able to choose DHCP Server
Next you’ll want to select the network connection to bind the DHCP
protocol
IP address of your DNS Server
Click next again to skip the WINS setup, this will bring you to creating
a DHCP Scope, where you can click the Add button
With file servers connected to the internet and configured accordingly, users
cannot only access the files via the local network but also benefit from remote
access. This enables files to be accessed and saved on the file server even when
users are on the go. All modern operating systems such as Windows, Linux, or
macOS can be used on a file server, although the devices available in the
network need to be compatible with the operating system. But file servers are
not only used for file storage and management. They are also often used as a
repository for programs that have to be accessible to multiple network
participants, and as a backup server.
Schematic representation of the network structure with a file server
The file server is located between clients and a local mass storage device.
The right hardware is the foundation for a reliable file server. Most importantly,
of course, this includes the hard drive which needs to offer sufficient space for
the files and necessary programs, as well as the respective operating system,
and the software for using the clients. The server also needs enough working
memory and processing power to process file and program accesses for various
users as quickly and faultlessly as possible. Whether the hardware
requirements can be fulfilled by a standard PC or whether a special server
setup is required primarily depends on the number of users.
File and Storage Services includes technologies that help you set up and
manage one or more file servers, which are servers that provide central
locations on your network where you can store files and share them with users.
If your users need access to the same files and applications, or if centralized
backup and file management are important to your organization, you should
set up one or more servers as a file server by installing the File and Storage
Services role and the appropriate role services.
The File and Storage Services role and the Storage Services role service are
installed by default, but without any additional role services. This basic
functionality enables you to use Server Manager or Windows PowerShell to
manage the storage functionality of your servers. However, to set up or manage
a file server, you should use the Add Roles and Features Wizard in Server
Manager or the Install-WindowsFeature Windows PowerShell cmdlet to install
additional File and Storage Services role services, such as the role services
discussed in this topic.
Practical applications
Administrators can use the File and Storage Services role to set up and manage
multiple file servers and their storage capabilities by using Server Manager or
Windows PowerShell. Some of the specific applications include the following:
● Storage Spaces - Use to deploy high availability storage that is resilient
and scalable by using cost-effective industry-standard disks.
● Folder Redirection, Offline Files, and Roaming User Profiles - Use to
redirect the path of local folders (such as the Documents folder) or an
entire user profile to a network location, while caching the contents locally
for increased speed and availability.
● Work Folders - Use to enable users to store and access work files on
personal PCs and devices, in addition to corporate PCs. Users gain a
convenient location to store work files and access them from anywhere.
Organizations maintain control over corporate data by storing the files on
centrally managed file servers and optionally specifying user device
policies (such as encryption and lock screen passwords). Work Folders is a
new role service in Windows Server 2012 R2.
● Data Deduplication - Use to reduce the disk space requirements of your
files, saving money on storage.
● iSCSI Target Server - Use to create centralized, software-based, and
hardware-independent iSCSI disk subsystems in storage area networks
(SANs).
● Server Manager - Use to remotely manage multiple file servers from a
single window.
● Windows PowerShell Use to automate the management of the majority of
administration tasks for file servers.
Here,
Check the Distribution File System box. As you can see it also enables
the DFS Namespace and Replication boxes. If you have some 2003 servers on
your network and want to replicate/synchronize those with 2008/2008 R2
servers you need to check the Windows Server 2003 Files Services box. This
is because legacy systems are using FRS (File Replication Services), which is
not compatible with DFS, not natively anyway. It is not the case now, so just
click Next to continue.
Since we are dealing only with the installation here, choose not to create a
Namespace now. I will handle this in a future article.
SELF-CHECK 2.1-3
Steps / Procedure:
3. Check the Distribution File System box. As you can see it also enables
the DFS Namespace and Replication boxes
4. Since we are dealing only with the installation here, choose not to create a
Namespace now. I will handle this in a future article.
5. On the Confirmation screen, click Install to begin the DFS role installation.
6. Once the installation is done, you can see the File Services role in Server
Manager. You can also use the stand-alone management console from
the Administrative Tools > DFS Management
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-3
CRITERIA YES NO
Did you……
Wear your ppe
On the Select Servers Roles page check the File Services box then
click Next
Check the Distribution File System box. As you can see it also enables
the DFS Namespace and Replication boxe
Since we are dealing only with the installation here, choose not to
create a Namespace now. I will handle this in a future article.
On the Confirmation screen, click Install to begin the DFS role
installation
Once the installation is done, you can see the File Services role in Server
Manager. You can also use the stand-alone management console from
the Administrative Tools > DFS Management
INFORMATION SHEET 2.1-4
LEARNING OBJECTIVES:
In Windows Server 2008, the Print Services role in Server Manager enables you
to share printers on a network, as well as to centralize print server and
network printer management tasks. It also enables you to migrate print servers
and deploy printer connections using Group Policy.
In Windows Server 2008 R2, this role has been updated with a new feature
called Distributed Scan Server. The new role, Print and Document Services,
enables you to share printers and scanners on a network, set up print servers
and scan servers, and centralize network print and scan management tasks.
You can do these tasks using the Print Management and Scan Management
Microsoft Management Console (MMC) snap-ins.
Product Evaluation
● Print Services Role
Learn about the Print Services role that enables you to share printers on a
network and centralize print server and network printer management
tasks.
● What's New in Print Management
Learn about the new functionality and enhancements to Windows printing
and scanning services introduced with Windows Server 2008 R2.
This is the first of two articles explaining how to share and manage network
printers with MS Windows 2008 Server. Part 1 explains how to add the Print
Services role to your server, and then how to use the Print Management
console to install and make printers available to users on your network. The
second article will examine more advanced features such as automating printer
deployment with Group Policy and logon scripts.
This guide assumes that you have a Windows based network, with a Windows
2008 (R2) Domain Controller – either a standard server or a Small Business
Server 2008/2011 server. Ideally all your printers should have a built-in
networking capability, or shared on the network from the PC they are attached
to, and you need to make sure you have downloaded all the drivers for the
different versions of Windows client on your network. When you have both 64
and 32 bit versions of a print driver it is essential to make sure that the version
numbers of the driver package are identical, otherwise it will not work.
There are two main benefits to centralizing all your shared printers onto a print
server, firstly you can install all the different Windows client drivers on the
server so they are automatically deployed, and secondly it greatly simplifies the
management of the printers.
First of all you need to ensure that your Windows 2008 Server has the Print
Services role installed, so logon to it and open the “Server
Management” console, then click “Roles” in the left-hand pane:
The “Roles Summary” will list all the roles currently installed on your server,
and if like above you don’t see Print Services then you will need to add it by
clicking the “Add Roles” link. This will start the “Add Roles Wizard”, click
Next past the introductory page and on the next one click to check the “Print
& Document Services” role:
Click “Next” and the next page explains some of the basic principles of the
Print Services role, once you’ve read it click “Next” and on the following page
you are asked to select specifically which services you require. Here we only
need “Print Server”, which should already be ticked, unless you know you
have a need for any of the other role services then leave them
unticked. Click “Next” to take you to the confirmation page and then
click “Install” to add the Print and Document Server role. The installation
process should only take a minute or two and then you can click “Finish” to
close the wizard. A restart of the server should not be required.
Now you have the Print Services role installed on your server you can use the
Print Management console to perform all your printer administration tasks, so
open it by going to Start – Administrative Tools – Print Management.
Expand the Print Servers tree, then your server and click “Printers” to view
the printers already installed:
Adding a Printer
If you need to install another printer then right-click on “Printers” in the left
hand pane and select “Add Printer” to start the “Network Printer
Installation Wizard”. The procedure is very similar to the standard Windows
Add Printer wizard – either add your printer by browsing the network or enter
its IP address directly, and if you are fortunate then it will detect the printer
type automatically and install the driver. By default the wizard will offer to
share the printer on the network. It’s unlikely you would want to uncheck this
option but in the same window you can also provide additional information
such as the printer location. Filling in these fields will make it easier for your
users to identify the printer they wish to use, especially if you have several
identical model printers on your network, so it is worth doing now. Repeat the
process until you have added all the printers you wish to make available to
your users and they should be listed in the central pane.
The secret of successful network printer sharing is getting the correct drivers
on the server, then the process of deploying them to the client PCs will be
completely automatic. Ideally you will have a brand new network with all 64bit
Windows 7 desktops, in which case the standard Windows 2008 drivers are all
you need, however this rarely occurs and it is far more likely that you will need
to support a mixture of 32bit XP and Vista clients too. The most important
thing to remember at this point is that all the version numbers for the printer’s
drivers must be the same, otherwise Windows will not accept them as being
valid. Some manufacturers make this easier than others, for example HP are
usually very good at clearly displaying the driver versions on their download
page:
HP LaserJet 2015n –
Windows Vista 64bit driversHP LaserJet 2015n – Windows Vista 32bit drivers
In the example above you will be fine if you download the PostScript driver
package dated 4th June 2008 for both 64bit and 32bit versions, as the version
numbers are identical. You need to be especially careful where your server
already has a 64bit driver package installed, the best option is to download the
latest version of both the 64bit and 32bit drivers, then you can ensure you
have up to date and matching driver versions. Selecting the “Drivers” option in
the Print Management console allows you to easily see what versions you have
installed on your server, here you can see that we have the latest version of the
PCL5 driver installed for our LaserJet 2015 both 32bit (x86) and 64bit
(x64) Windows clients:
Should you need to add or remove printer drivers then the easiest way to do it
is to right-click on “Drivers” in the left pane of the Print Management console
and select “Manage Drivers” from the dropdown menu. This will open a new
window listing all the drivers installed on your server, removing any one of
them is simply a case of clicking to select it and then clicking
the “Remove” button. Alternatively, to install a new driver click on
the “Add” button to start the wizard:
Click “Next” on the introductory page and the next page will ask you to select
what type of driver package you are installing – its unlikely you will have an
Itanium system so the choice is likely to be between “x64” – 64bit drivers, or
“x86” – 32bit drivers. Most driver packages will be specifically 32 or 64 bit, not
both in one, so you should only have one box checked before you
click “Next” to continue the wizard.
This window may well look familiar to you, its been a standard part of Windows
printer installation since at least Windows XP, and chances are that your
model of printer will not be listed, so you will have to click “Have Disk”. At this
point you will be prompted to browse to the location where you downloaded
your driver files to. If the correct “.inf” file is there, Windows will recognise it
and list the models of printer the driver supports – you just have to click the
correct model to select it and click “Next” to install the driver, then “Finish” to
complete the wizard.
At this point you may encounter a problem because Windows does not
recognise the driver file you have downloaded, or you cannot locate the
necessary “.inf” file. With most “business” model printers this should not be an
issue. For instance, the HP LaserJet drivers in the example above come as a
self-extracting “.exe” file. Running it after download will prompt you to specify a
folder to extract the files to, and this is the location you should browse to after
clicking “Have Disk”. However, some manufacturers supply their drivers as
“user friendly” automatic installation programs, which start an application
installation style routine when run and will try to do the full printer setup for
you. This is not ideal as it will usually just install the printer as a local device,
and will not work at all if it is a 32bit driver which you are trying to add to a
64bit server.
You only have to make the driver files available to Windows for the “Add driver
” process, it will then copy the files it needs to another location and retain them
for future use. When you are subsequently installing the shared printer on
any user desktops, the Windows OS should then be able to download the
correct driver files from the server automatically.
Microsoft Windows Server 2008 is far more modular than prior versions of the
Server OS, and though the print spooler is installed and running out of the
box, management of the printers is not: this has caused no end of surprises
while trying to configure printers on a new application server.
This Tech Tip shows how to enable the Print Services role on a Server 2008
system, and then manage those printers using it. The work was prompted by
the needs of an Evolution Payroll Service Bureau middle tier installation, but it
should apply to any application server.
The first step is to insure that the Print Services role is installed, which enables
a number of required administrative steps. This is not the same as the Printers
applet in the Control Panel: the latter doesn't run in an administrative context,
and will not allow many of the required operations to installation and
management of printers.
Launch the Server
1 Manager, and
approve the User
Account Control
prompt when
offered. We
are strong support
ers of UAC and
never disabled it.
3 Launch Server
Manager< from
the Start Menu,
expand the local
server's name, and
then expand
the Roles item.
If Print
Services are
already found, then
stop.
Otherwise right-
click on Roles and
select Add
Roles from the
context menu.
4 Enable the
checkbox on Print
Services, then
click Next.
This is a good time
to add other
services if you
think you need
them, though many
application servers
won't.
After clicking Next,
an "Introduction to
Print Services"
dialog is displayed.
Review, then
click Next on this
as well.
Administrating Printers
With Print Services fully installed, there are several places that can perform
printer administration.
Server Manager » Roles » Print Services » Print Management
This is the main Print Management application for administration of
printing resources. This is an MMC snap-in, so it fits right in with all the
other administrative
Start » Run » printmanagement.msc
This launches the same Print Management MMC application directly,
without going through the Server Manager. This can be made into a
shortcut onto the desktop if print management will be done often.
Control Panel » Printers
Unlike the previous two items, which run with Administrative privileges
because of the UAC elevation, the Control Panel runs in the user's
Windows Explorer context without administrative rights.
Only the machine's local Administrator — not merely a member of the
local Administrators group — has these rights automatically, so it
forbids changes to most settings. This stumped a number of experienced
admins for days.
It turns out that right-clicking a printer and selecting Run as
administrator, then Open will allow full administration after the UAC
confirmation.
SELF-CHECK 2.1-4
Steps / Procedure:
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
Launch the Server Manager, and approve the User Account Control
prompt when offered. We are strong supporters of UAC and never
disabled it
If a "Before You Begin" box is displayed, read and click through it.
Likewise, review the Introduction to Print Services page and
click Next to get started.
Launch Server Manager< from the Start Menu, expand the local server's
name, and then expand the Roles item. If Print Services are already
found, then stop.
Otherwise right-click on Roles and select Add Roles from the
Enable the checkbox on Print Services, then click Next.
This is a good time to add other services if you think you need them,
though many application servers won't.
After clicking Next, an "Introduction to Print Services" dialog is
displayed. Review, then click Next on this as well
This final dialog confirms what's about to be performed, and though it
warns that a system reboot may be necessary. It didn't require one
when we added print services to our server.
But removing the Print Services role did require a restart before any
additional role-related changes
RDS-V uses the Remote Desktop Connection Broker to determine where the
user is redirected. If a user is assigned and requests a personal virtual
desktop, RD Connection Broker redirects the user to this virtual machine. If
the VM is not turned on, RD Virtualization turns on the VM and then connects
the user. If the user is connecting to a shared virtual pool, then the RD
Connection Broker checks to see if the user already has a connected session in
the pool. If the user has a disconnected session then they are reconnected to
that VM. If the user does not have a disconnected session, a VM in the pool is
dynamically assigned to the user – if one is available. A quick note here, the
Hyper-V server role has to be installed on the same system that has the RD
Virtualization role service installed. Let’s take a quick look at the fairly simple
high-level RDS-V topology:
Web Portal – web page that shows the user all the applications / desktops they
can access
VM Host – Machine on which the VM images are hosted. The VM Host Agent
service runs on this machine. The service is controlled by the Connection
Broker and can perform certain actions such as spinning up a VM image
The diagram above breaks out the different components and their
functions. Let’s take a closer look at the Connection Broker’s functions:
There are some basic steps that the Connection Broker performs. If the
endpoint for the request is a farm, then the Connection Broker has to check
the cache of user sessions to see if there is an existing disconnected session
within that particular farm. The key here is that the disconnected sessions are
farm-specific. If the user does not have a session, the Connection Broker
chooses the best machine or VM image within the farm. There is also some
machine logic that takes place. Connection Broker calls into the type-specific
VM Plug-in to carry out what is called Placement. This action involves the
plug-in move the necessary VM image to the best VM Host and then return the
name of that host. For VM calls specifically (as opposed to RemoteApp
requests), the Connection Broker calls into the VM Host Agent to spin up the
VM image. This is called Orchestration. The return value of this step is a list
of IP addresses for the final machine / image to which the RDS Client should
be redirected. These steps are executed each time a user connects. In
addition, the Connection Broker also has a “Pool Creator”. This component
coordinates the creation of VM farms by directing VM Host Agents to create
farm-joined VM instances out of template VM images.
Steps / Procedure:
on Next.
9. Click on Install.
10. You must restart the server to finish the installation process. Once the
server is up, connect to it and proceed with the next step "Define RD
Licensing Server".
Assessment Method:
DEMONSTRATION
PERFORMANCE CRITERIA CHECKLIST 2.1-5
CRITERIA YES NO
Did you……
Wear your ppe
Do not configure any Discovery Scope for the RD Licensing and click
Click on Install
You must restart the server to finish the installation process. Once the
server is up, connect to it and proceed with the next step "Define RD
Licensing Server".
CONTENTS:
1. CREATE A FOLDER IN THE SERVER
2. CREATE A ORGANIZATION UNIT & 2 USER ACCOUNTS
3. CREATE A GROUP POLICY MANAGEMENT
4. PRINTER DEPLOYMENT
5.JOIN THE CLIENT & SERVER TO DOMAIN
6. REMOTE DESKTOP SETTING
7.PRINTER SHARING DEPLOYMENT
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 3.1-1
To create a file share and share the folder with specific users:
1. Create a local folder on your server computer. For example, create a
folder called TESDA CSS on the C:\ drive.
DONE….
Second set-up :
Configure Permission
Note: Make a note of the network path shown in the confirmation screen as
you use this later during setup of your shared persistence storage folders. The
network path will be in the following format: \\server\css.com
Ensure that permissions on the folder, subfolders, and files are set to full
control for the user account you selected.
To do this:
SELF-CHECK 3.1-1
Steps / Procedure:
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
Click allow box 3 check in the box and then click OK’’
To start the Active Directory Users and Computers snap-in, click Start,
point to Administrative Tools, and then click Active Directory Users and
Computers:
To create Organization Unit right click on Tekbloq.local example this and
Click New and then Click Organization Unit:
Type name of New Object and click OK:
As you see New OU(Organization Unit) has been created, Same way you
can create child OU under ITUsers OU:
To create user right click on ITUsers OU and Click New and then click User :
Type all required information below and click next:
user1
user1
user1
user1
Type password for the User and click Next (In this screen you can also set
up 4 important setting with checking up checkbox):
number
p@ssw0rd
p@ssw0rd
character
Create User by clicking Finish:
Take Note :
Forest owners are responsible for creating organizational unit (OU) designs for
their domains. Creating an OU design involves designing the OU structure,
assigning the OU owner role, and creating account and resource OUs.
Initially, design your OU structure to enable delegation of administration.
When the OU design is complete, you can create additional OU structures for
the application of Group Policy to the users and computers and to limit the
visibility of objects. For more information, see Designing a Group Policy
Infrastructure.
OU owner role
Assemble a team to design the OU structure that you use to delegate control
over resources within the forest. The forest owner might be involved in the
design process and must approve the OU design. You might also involve at
least one service administrator to ensure that the design is valid. Other design
team participants might include the data administrators who will work on the
OUs and the OU owners who will be responsible for managing them.
It is important to document your OU design. List the names of the OUs that
you plan to create. And, for each OU, document the type of OU, the OU owner,
the parent OU (if applicable), and the origin of that OU.
For a worksheet to assist you in documenting your OU design, download
Job_Aids_Designing_and_Deploying_Directory_and_Security_Services.zip
from Job Aids for Windows Server 2003 Deployment Kit and open "Identifying
OUs for Each Domain" (DSSLOGI_9.doc).
SELF-CHECK 3.1-2
Steps / Procedure:
4. As you see New OU(Organization Unit) has been created, Same way you can
create child OU under ITUsers OU
5. To create user right click on ITUsers OU and Click New and then click User
7. Type password for the User and click Next (In this screen you can also set
up 4 important setting with checking up checkbox):
Take Note :
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 3.1-2
CRITERIA YES NO
Did you……
Wear your ppe
To start the Active Directory Users and Computers snap-in, click Start,
point to Administrative Tools, and then click Active Directory Users
and Computers:
As you see New OU(Organization Unit) has been created, Same way you
can create child OU under ITUsers OU
To create user right click on ITUsers OU and Click New and then click
User
Type password for the User and click Next (In this screen you can also
set up 4 important setting with checking up checkbox):
3. Right
click student folder , click create GPO in this domain
4.Name : example any name basta walang kapareho
\\server\css example
SELF-CHECK 3.1-3
Steps / Procedure:
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
PRINTER DEPLOYMENT
LEARNING OBJECTIVES:
Print Deploy is a print queue deployment tool that gets the right printer
drivers and print queues to the right person in the right location, effectively.
When this tool is run on the reference computer (that's been set up with all your print queues),
it clones the print queues and adds them into Print Deploy. Now they're ready to connect to
zones.
Configure
Print Deploy is set up so users will get the correct print queue(s)
Introducing zones! Zones are used to deploy print queues to groups of users and/or to
computers within an IP range.
In the simplest deployment scenario, Print Deploy automatically puts all users into a single
zone called Everyone.
You can create multiple zones if you have the Advanced Print Enablement Pack, for example,
separate zones for Branch Office 1 and Branch Office 2. Users are added to zones depending
on what printers they need to use. That way, users who move between both Branch Offices will
have automatic access to the right printers at either location.
The print queues are then connected to the zones, so users in different zones will get to use
the specific printers are connected to each zone.
That's how you control which users get to use which printers. Now the print queues need to be
made available to the users.
Deploy
With the click of a button, the print queues are deployed, ready for the users to use.
Deployment done!
The Print are Deployed
A client is installed on users' computers so they can access the
print
A Print Deploy client is installed on the users’ computers. This client automatically picks up
the deployed printer queue details and adds them to the list of printers that are either
automatically installed on the users’ computers, or selected by the users to install themselves.
NOTE
For Mobility Print queues, users might need to enter their credentials to be
authenticated.
NOTE
If Windows has been set up to manage the default printer for users, then the
Windows setting is honored. Otherwise the Print Deploy client will set the
default printer (assuming one has been assigned in a zone).
NOTE: IF IT'S OVER to Group Policy desktop and Document then continue
to deployment printer
1. Click Deployed Printer
2. Right Click deployed printer then click deploy printer
3.
Type root path : \\server\Brother DCP-116C just what any kind of printer
\\server\Brother DCP-116C
4. Click ADD
>>>
5. Click OK
Click DONE>>>>>
SELF-CHECK 3.1-4
PRINTER DEPLOYMENT
PRINTER DEPLOYMENT
Steps / Procedure:
3. Type root path : \\server\Brother DCP-116C just what any kind of printer
4. Click ADD >>>
Assessment Method:
DEMONSTRATION
PERFORMANCE CRITERIA CHECKLIST 3.1-4
CRITERIA YES NO
Did you……
Wear your ppe
LEARNING OBJECTIVES:
Client/Server Networking
n a client/server environment, each computer still holds (or can still hold) its
(or some) resources and files. Other computers can also access the resources
stored in a computer, as in a peer-to-peer scenario. One of the particularities of
a client/server network is that the files and resources are centralized. This
means that a computer, the server, can hold them and other computers can
access them. Since the server is always ON, the client machines can access the
files and resources without caring whether a certain computer is ON.
One of the consequences of a client/server network is that, if the server is
turned OFF, its resources and sometimes most of the resources on the network
are not available. In fact, one way to set up a client/server network is to have
more than one server. In this case, each server can play a different role.
Another big advantage of a client/server network is that security is created,
managed, and can highly get enforced. To access the network, a person, called
a user must provide some credentials, such as a username and a password. If
the credentials are not valid, the user is prevented from accessing the network.
The client/server type of network also provides many other advantages such as
centralized backup, Intranet capability, Internet monitoring, etc. In a small
network, all these services can be handled by one server:
SELF-CHECK 3.1-5
Steps / Procedure:
4. CLICK DOMAIN
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
CLICK DOMAIN
LEARNING OBJECTIVES:
The Remote properties dialog provides a number of options. The default setting
is to disallow remote connections to the computer system. The second option
allows remote desktop connections from any version of the Remote Desktop
client. The third, and most secure option, will only allow connections from
Remote Desktop clients with Network Level Authentication support. This
typically will only allow access to systems providing secure network
authentication such as Windows Vista and Windows Server 2008.
If the Windows Firewall is active, the act of enabling Remote Desktop
administration also results in the creation of a firewall exception allowing
Remote Desktop Protocol (RDP) traffic to pass through on TCP port 3389. This
default port can be changed by changing this setting in the Registry key
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\
WinStations\RDP-tcp\PortNumber. The easiest way to locate this registry key
value is to execute regedit from the Run window or a command prompt,
select Edit - > Find and enter RDP-tcp.
Controlling Remote Desktop Access
The default configuration for Remote Desktop is to allow all members of the
Administration group to connect remotely. Active Directory also contains
a Remote Desktop Users group to which users may be added to provide Remote
Desktop access privileges. To provide users with remote desktop access, open
the Control Panel -> System and Maintenance -> System -> Remote
settings and click on the Select Users button to invoke the Remote Desktop
Users dialog illustrated in the following figure: <google>WIN28BOX</google>
CLICK ADD
Note that users with administrative privileges do not need to be added to this
list; by default they already have Remote Desktop access. To add additional
users click on the Add... button to display the Select Users dialog. Enter the
name of the user in the text box entitled Enter object names to select and click
on Check names to list names that match the name entered. Select the
appropriate name from the list. The following example shows user Bill on
server winserver-2:
USER1 CLICK CHECK NAMES
Click on OK to apply the change. The new user will now appear in the list of
users with Remote Desktop access on the Remote Users screen. Click OK to
close this screen and click on Apply in the System Settings screen. The
specified user will now have remote desktop access to the system.
CLICK YES
DONE REMOTE SETTING VIEW
SELF-CHECK 3.1-6
Steps / Procedure:
CLICK YES
CRITERIA YES NO
Did you……
Wear your ppe
CLICK YES
\\server\Brother DCP-116C
Noted:
you should see that printer sharing
when you have not seen anything
shared repeat the installing printer
model again.
SELF-CHECK 3.1-7
Steps / Procedure:
8.Done installing printer model Brother DCP-116C..you see the check mark
green
10.Click the box: find in the box that printer model sharing..that all
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 3.1-7
CRITERIA YES NO
Did you……
Wear your ppe
Click the box: find in the box that printer model sharing..that all