Windows Server 2019 Administration Lab Book
Windows Server 2019 Administration Lab Book
Lab Book
Author:
Syed Tasmir Faridi (Instructor Taz)
Partner with
Cloud Technology & Training Center
Table of Contents
Table of Contents
Pre-requisite – Lab Setup
LS.1 Confirm if your CPU is VT enabled
LS.2 Enabling Hyper-V
LS.3 Create Template VM & Install Server 2019
LS.4 Creating a VM
LS.5 Install Windows Server 2019
LS.6 Creating an Image
LS.7 Deploying VM from Image
LS.8 Finalizing New VM setup
LS.9 Setup Active Directory Domain Services (ADDS)
LS.10 Joining the Domain
LS.10a How to add a new virtual hard disk to VM
LS.11 Internet accessible Hyper-V virtual machines
LS.11a Configure DNS Forwarder to resolve Internet names
LS.11b Second virtual switch for VM connectivity only
LS.11c Add a Network Adapter to virtual machine
Module 1 - Server Install and Administration
1.1 Download and Install Microsoft Assessment and Planning (MAP)
Toolkit
1.2 Install Windows Server 2019 Core and utilize sconfig utility.
1.3 Download and Install Windows Admin Center.
1.4 Enable Remote Server Administration Tools.
Module 2 - Identity Services
2.1 Add an additional DC to the Domain.
2.2 Add a child Domain in Existing Forest
2.3 Add DomainTree in Existing Forest
2.4 Create Organizational Unit hierarchy.
2.5 Creating AD Users & Groups.
2.6 Delegating control on Organizational Unit.
2.7 Work with Flexible Single Master Operation (FSMO) roles.
2.8 Create Offline Standalone CA and add Enterprise Subordinate CA.
2.8a Setting up Standalone Root CA
2.8b Adding enterprise Subordinate CA
Module 3 - Network Infrastructure Labs
3.1 Add DHCP role and create a DHCP Scope.
3.2 Setting up DHCP Reservation.
3.3 Configuring DHCP Failover.
3.4 Configuring DHCP Relay Agent.
3.5 Add DNS Role and create secondary DNS zone.
3.6 Create AD Integrated Reverse Lookup Zone.
3.7 DNS Forwarding
3.7a Configure DNS Forwarders
3.7b Configuring DNS Conditional Forwarders.
3.8 Install and manage Remote Access Server role
Module 4 - Storage Services Labs
4.1 Manage volumes, share folders, and set access permissions.
4.1a Creating Volumes
4.1b Share folder and set access permissions
4.2 Configure Storage Spaces.
4.3 iSCSI Storage services.
4.3a Setting up iSCSI Target Server
4.3b Setting up iSCSI Initiator Server
Module 5 - Virtualization Labs
5.1 Virtual Networking in Hyper-V.
5.2 Creating Virtual Machines.
5.2a Creating Generation 1 VM
5.2b Creating Generation 2 VM
5.3 Export and import Virtual Machine utilizing Nested virtualization
Module 6 - High Availability Lab
6.1 Create a Failover Cluster.
Modules 7 - Performance Monitoring Labs
7.1 Capture performance data with Performance Monitor.
7.2 System and User Data Collector Sets.
7.3 Working with Windows Admin Center
Modules 8 - Disaster Recovery Labs
8.1 Implement Windows Scheduled Backup.
8.2 Implement Windows on-demand Bare Metal backup.
8.3 Bare metal Backup Restore
8.4 Implement Hyper-V Replica
Module 9 – Web Services and Remote Desktop Labs
9.1 Install Web Server and create a Web site.
9.2 Configure Web Server to host secure Web site.
9.3 Remote Desktop for Server Administration.
9.4 Deploying RemoteApp using Remote Desktop Services.
6. Click Troubleshoot.
7. Click Advanced options.
8. Click UEFI Firmware Settings.
9. Click Restart to reboot into the BIOS.
10. Find VT setting in BIOS/UEFI and enable it, save, and reboot back
to Windows. Following is an example of a BIOS utility and Intel
Virtual Technology options.
11. Login to Windows, click Start Menu, and type “windows
features”. Select Windows Features and Enable Hyper-V feature.
12. Select restart on reboot prompt. Post reboot click Start Menu and
type hyper-v and launch Hyper-V Manager. System is now ready
to create the virtual environment.
LS.3 Create Template VM & Install Server 2019
In this section, we will create a virtual machine, install Windows Server
2019, and then make the installation into an Image. This Image then we can
use to create new virtual machines.
To obtain installation media, please download (google server 2019 eval copy)
evaluation copy of server 2019 as an .iso file from Microsoft’s evaluation
site. This file will be used to install Server 2019 operating system (OS) on
our VMs. Once the OS is installed, we will prepare our virtual machine as a
template for deploying more VMs to run Server 2019 OS.
LS.4 Creating a VM
LS.4.1 Open Hyper-V Manager and click to create a new virtual machine.
LS.4.4 Assign 2GB of RAM (2048MB) to the VM & click Next. Select
“Default Switch” virtual switch for VM and click Next.
LS.4.5 On connect virtual hard disk page take defaults and click Next. In
installation Options, click browse and select the downloaded evaluation .iso
file that contains Windows Server 2019 installation files and click Next.
LS.4.6 In Hyper-V Manager, right-click on the virtual machine, select
Settings.
LS.5.2 Check box for accept license terms, click Next. Click Custom: Install
Windows Only (advanced) option. Click Next on the next page to create one
partition on the entire Disk0 and start Windows Server installation. Windows
installation process will now start to copy files to the hard drive.
LS.5.3 After the installation process reboots the VM, set password as
P@ssw.rd for the local Administrator user and click Finish.
LS.5.4 When VM reaches the desktop, click Action from VM console menu
bar and select Ctrl+Alt+Delete to get the login screen. Login with local
Administrator and its password. At this point you have successfully installed
Windows 2019 OS and are logged in as the local Administrator.
LS.6 Creating an Image
Now that the Server OS have been successfully installed, we will create a
server image from this installation. This image will expedite other VM
deployment with OS already installed. Using an image will save us time
when we create more VMs in our virtual environment.
LS.6.1 After you have logged in to your Template VM, open File Explorer
and execute sysprep.exe. Select OOBE, Generalize, and Shutdown options.
Sysprep removes all computer specific information and prepare the OS
installation for imaging. This means that once sysprep is executed on an
installation, it can then be used to deploy other VMs.
!**Important**! Do not start the VM when sysprep process completes and
the VM shuts down. It must remain turned off. Starting this VM will undo
what we accomplished by running sysprep. Delete the template virtual
machine from Hyper-V Manager, by doing so, it only deletes the VM and
not the virtual hard disk. This way we do not risk of starting this VM
accidentally and undo what sysprep did.
LS.7 Deploying VM from Image
We will use the Image we created to deploy a new VM. After executing
sysprep on our Template VM, we turned it off, by doing so we now can copy
the virtual hard disk of this VM and associate with new VMs that we will
create. We will save time as OS is already installed on this virtual hard disk
and all computer specific information have been removed.
LS.7.1 Open File Explorer and go to the default location where virtual hard
drives are saved (C:\Users\Public\Documents\Hyper-V\Virtual hard disks).
Copy the Template VHDX file in the same folder and rename it “DC”.
!**Important**! Now whenever we will have to create a new virtual
machine, the template file to be copied and renamed according to the new
hostname you need for that VM.
LS.7.2 Go to Hyper-V Manager, click New in Actions, select Virtual
Machine. Use “DC” as VM name and click Next.
!**Important**! Your virtual machine name, virtual hard drive file name,
and Hostname/Computer name should be same, this way when we have
numerous VMs running and issues arrise, it will be easier to map associations
between these three attributes.
LS.8.2 Now to set this system’s IP configuration, click Start and type
ncpa.cpl and launch Network Connections. Right-click on Ethernet in
Network Connections and select Properties.
LS.8.3 In Ethernet Properties select Internet Protocol Version 4 (TCP/IPv4)
and click Properties button. Configure IP settings and click OK. In this
example we are setting up our first server named DC with IP address
192.168.1.225. It will also be the DNS server. Click OK and Close.
!**Important**! For every VM you create, make sure you have a unique IP
address as defined in the Lab and VM list in the Lab Setup section begining,
point to the correct DNS Server, and Disable Windows Firewall.
LS.8.4 Disable Firewall Now reboot the virtual machine and it is ready to
participate in Labs.
LS.9 Setup Active Directory Domain Services
(ADDS)
In this lab we will make our DC server an Active Directory Domain
controller hosting contoso.com domain.
1. Click Add Roles and Feature in Server Manager and click Next in Before
you begin.
2. Select Role-based or feature-based installation, click Next.
3. Confirm that DC is highlighted in Select destination server and click Next.
4. Check Active Directory Domain Services, select Add Features, and then
click Next.
10. Select “Add a new forest”, type contoso.com as the “Root domain name:”
and click Next. This adds a new Active Directory installation and sets up
contoso.com domain as the first domain name in our domain forest.
11. Leave default values in Domain Controller options section, type
P@ssw.rd as DSRM password.
19. Confirm that we can see DC server’s computer object under Domain
Controller organizational unit in Active Directory tool and DC server’s
hostname and IP is registered with DNS in DNS Manager.
LS.10a.3 Click New button to create a new virtual hard disk > Next in Before
you Begin > Dynamically expanding in choose disk type, Next > Type HD2
in Name, click Next.
LS.10a.4 Choose the default or intended virtual size disk, Next > Finish >
click Apply in DC settings window to save virtual hard disk. You will now
see your HD2 listed under SCSI Controller in DC VM settings page.
LS.10a.5 Now create 5 more virtual disks using same process starting from
4.1.2 but create unique names for these virtual hard disks as HD3, HD4 and
onwards. Disk sizes to be 127, 200, 127, 150, 175. Once all virtual hard disks
are created, you will see following use SCSI Controller in DC settings.
LS.10a.6 Click OK in DC settings page > Start DC VM > login as
contoso\administrator > right-click Start and select Disk Management.
LS.10a.7 All new disks we added are Offline and Not Initialized. If systems
ask them to be Initialized, select that option. If not, then right-click on each
and select online > right-click on disk and select Initialize Disk > Initialize
Disk window will appear, check boxes for all Disks > GPT option > OK. All
new disks will come online. Close Disk Management.
LS.11a.3 Now any device on our virtual environment from servers to client
that point to DC server for DNS can now access internet. Make sure that NIC
on DC VM is connected to the External vSwitch virtual switch for external
access.
LS.11b Second virtual switch for VM connectivity
only
LS.11b.1 Go to Hyper-V Manager > click virtual switch manager from
Actions > select Internal > click Create Virtual Switch button.
LS.11b.2 Type Internal vSwitch as the virtual switch name, and confirm
Internal network is selected > OK.
LS.11b.3 In Hyper-V Manager > click virtual switch manager from Actions.
Now you can see the three virtual switches that are available to be assigned to
VM network interface cards.
1.1.4 In Discovery methods we can select how the MAP toolkit can collect
inventory data. Choose Active Directory Domain Services (ADDS), click
Next.
1.1.5 Provide Domain credentials to collect inventory data, click Next.
1.1.5 Choose your domain name in Active Directory options, click Next.
1.1.6 In All Computer Credentials, click Create, provide login credentials that
the toolkit will use to complete all requested inventory information. Click
Save button and then Next.
1.1.21 This will download a Microsoft Excel .xlsx file with requested
inventory information.
!**Important**! You might see different results than what is shows above,
your information will depend on which virtual machines in your environment
exists, if correct credentials were provided to toolkit to access the devices,
and which ones are turned on at that time.
1.2.5 Click check box “I accept the license terms” and click Next.
1.2.6 Select “Custom: Install Windows only (advance)” option. Click next on
Where do you want to install Windows to start the install process of the OS
on the virtual hard disk. At this point, setup process will not copy files from
the installation media over to the virtual hard disk, it will also reboot the
virtual machine. This process to take few minutes.
1.2.7 Setup process will request to change local Administrator user password.
Press Enter to select Ok.
1.2.8 Enter P@ssw.rd twice to confirm as the new password. Press Enter to
accept Ok.
Now you will notice that there are no desktop icons, task bar, or Start Menu
in the Core Server install. All you get is a command prompt window. Server
with Desktop Experience installs the standard graphical user interface,
usually referred to as GUI, and the full package of tools for Windows Server
2019. Server Core is the minimal installation option that comes without a
GUI. Server Core is meant to only be managed remotely, or it can be locally
managed via command line and or PowerShell.
1.2.9 Type sconfig in the command prompt to invoke Server Config menu.
1.2.10 We will use sconfig to rename our system’s hostname. Type “2” to
invoke Computer Name option. Type CTTC-Core1 as the new hostname and
press Enter.
1.2.11 Click Yes to restart the system so changes can take effect.
1.2.12 Post reboot of the system, login as Administrator with P@ssw.rd
password. Type hostname command to confirm system’s hostname have
changed to CTTC-Core1.
1.2.13 Now lets shutdown this Core system, type “shutdown -s -f -t 0” at the
prompt to shutdown the virtual machine.
1.3.2 Execute the downloaded file to start the setup process, take defaults,
choose to create a desktop icon, and click Install.
1.3.5 Type server2.contoso.com in Server name section and click Add. This
could take few moments before the Add button becomes available. Next use
the same process to add dc.contoso.com. When completed, all systems added
will be listed in the tool.
Now any system can be selected by clicking it to remotely manage. Browser
running Windows Admin Center can now be closed to exit Admin Center.
1.4.1a Google “download RSAT Windows 10”. If your client OS is x64, then
download the 64bit version that matches your Windows client OS version.
1.4.2 Execute the downloaded file, choose “I accept” in license section and
click Close when installation completes.
1.4.3 Go back to Control Panel > System and Security > Administrative
Tools. Now you will see new tools that were not there before e.g., to manage
Active Directory. These tools can now be used to remotely manage these
services.
2.1.13 Keep defaults in Domain Controller options > Add P@ssw.rd as the
DSRM password > click Next.
2.1.14 Click Next in DNS options
2.1.15 Keep defaults in Additional Options, click Next.
2.1.16 Keep defaults settings in Paths section, click Next.
2.2.12 Take defaults in Domain controller options section > add P@ssw.rd as
DSRM password > Next.
2.2.13 Keep default setting in DNS Options, click Next.
2.3.10 Click Notifications flag in Server Manager and select “Promote this
computer to a domain controller”.
2.3.11 In deployment configuration section, select “Add a new domain to an
existing forest” > select Tree Domain in domain type > contoso.com in
Parent domain name > Type adatum.com in New domain name > confirm or
change credentials to contoso\administrator user > click Next.
2.3.12 In domain controller options, take defaults, and type P@ssw.rd as the
DSRM password.
2.3.19 Server Manager > Tools > DNS > expand Forward lookup zone >
expand contoso.com and select TechGear. It shows 192.168.1.228 (DC4) as
the system containing delegated DNS zone for techgear.contoso.com domain.
2.4.3 In new object windows type LA as the OU name and click OK. This
created the top level OU in the hierarchy.
2.4.4 Now right-click on the LA top level OU and select to create an OU >
Type Computers for this OU name > click OK.
2.4.5 Now repeat step in 2.4.4 and create following child OUs below LA OU.
Groups
Service Accounts
Users
2.4.6 Right-click on contoso.com and create NY as the top level OU.
2.4.7 Now right-click on the NY top level OU and create the following child
OUs.
Computers
Users
Service Accounts
Groups
2.5.3 Enter P@ssw.rd as the password > uncheck User must change password
at next logon > click Next > Click Finish.
2.5.4 Right-click again on Users OU under LA > New > select User.
2.5.2 In New Object – User window > Type Dominic in First Name > Toretto
in Last name > dtoretto in User logon name > click Next > Enter P@ssw.rd
as the password > uncheck User must change password at next logon > click
Next > Click Finish.
2.5.3 Now create two users under NY/Users OU. Right-click on Users OU
under NY top level OU > New > select User > Create following two users
with same configuration as in step 2.5.2
Clark Kent
Peter Parker
Creating AD Groups
2.5.4 Right-click on Groups OU under LA OU > New > Group.
2.5.5 Type Cool Admins in Group name > keep defaults in group scope and
type > OK.
2.5.6 Right-click on Groups OU under NY OU > New > Group.
2.5.7 Type SuperHero Admins in Group name > keep defaults in group scope
and type > OK.
Group membership
2.5.8 Right-click on SuperHero Admins group > choose Properties > click
members tab > click Add button > Type clark and click Check Names > this
will auto-refill Clark Kent username > Type peter and click Check Name
again > click OK when both usernames are populated > OK on SuperHero
Admin property page to complete membership process.
This process adds users Clark and Peter as members to SuperHero Admin
AD domain group. Now this group can be used to provide collective access
to both users on resources like files, folders etc.
2.5.9 Now using the process in 2.5.8, add users Dominic and Sarah to Cool
Admins group.
2.6 Delegating control on Organizational Unit.
In this lab, we will use delegation process to grant access on Organizational
Units.
Delegation is the ability for the domain administrator to grant a non-domain
administrator the ability to control a portion of the Active Directory
environment. This control could be as large as creating user accounts in a
specified organizational unit (OU) to as small as modifying the phone
number for a single user. AD delegation is critical part of security and
compliance. By delegating control over active directory, you can grant users
or groups the permissions they need without adding users to privileged
groups like Domain Admins and Account Operators.
2.6.1 Login as contoso\administrator on DC > open ADUC > right-click on
NY OU and select Delegate Control… > In Delegation of Control Wizard,
click Next.
2.6.2 In Users or Groups > click Add > in Select Users, omputers, or Groups
window type super and click Check Name button > SuperHero Admins group
will be auto filled > click OK > click Next.
2.6.3 In Tasks to Delegate > check all the boxes as shown below and click
Next > click Finish.
2.6.4 In ADUC > click View in menu bar > click Advance Features.
2.6.5 Right-click on NY OU and select properties > click Security tab >
Advanced button > this shows our delegated permissions for SuperHero
Admins group and confirms our delegation process we completed. Now any
member of the SuperHero Admins group can manage User and Group objects
in the NY and child OUs.
2.7 Work with Flexible Single Master Operation
(FSMO) roles.
In this lab, we will change FSMO role from one domain controller to another.
We will move PDC Emulator FSMO role from DC2 to DC.
Active Directory is the central repository in which all objects in an enterprise
and their respective attributes are stored. It's a hierarchical, multi-master
enabled database that can store millions of objects. Changes to the database
can be processed at any given domain controller (DC) in the enterprise,
regardless of whether the DC is connected or disconnected from the network.
Active Directory has five Flexible Single Master Operations FSMO roles,
two of which are enterprise-level (i.e., one per forest) and three of which are
domain-level (i.e., one per domain). The enterprise-level FSMO roles are
called the Schema Master and the Domain Naming Master. The domain-level
FSMO roles are called the Primary Domain Controller Emulator, the Relative
Identifier Master, and the Infrastructure Master.
!**Prerequisite**! Make sure that both DC and DC2 are online.
2.7.1 Login as contoso\administrator on DC server > open ADUC > Confirm
that ADUC tool is connected to DC.contoso.com domain controller > right-
click on [DC.contoso.com] > click change domain controller.
2.7.2 In Change to section > select DC2 > OK. You will now see ADCU
connected to DC2 server.
2.7.3 Right-click on [DC2.contoso.com] > Operations Masters.
2.7.4 In Operations Masters > Click PDC tab. Top section shows the current
server designated as the PDC role and the bottom to which role can be
changed to. Click Change button > Yes > OK to confirm.
2.8.a2 In Select Server Roles check Active Directory Certificate Services >
click Add Features > Next.
2.8.a3 Take default settings in select features window and click Next.
2.8.a4 Click Next on Active Directory Certificate Services > In Select role
services keep Certification Authority checked and click Next.
2.8.a5 In Confirm installation selections windows > check Restart the
destination server automatically and click Install > Click Close when
installation succeeded.
2.8.a6 Now we will configure this server as the CA. In Server Manager >
Notification Flag click Configure ADCS.
2.8.a9 Make sure Create a new Private key is selected > Next. Set
Cryptography as shown below > Next.
2.8.a14 Click Extensions tab > Make sure you have CRL Distribution Point
(CDP) is selected in Select extension drop down > remove all entries form
the list except local C drive path.
2.8.a15 Now click the Add button and add the following in the location one
at a time > OK
http://cttc-intca01.contoso.com/CertEnroll/<CAName><CRLNameSuffix>
<DeltaCRLAllowed>.crl
ldap:///CN=<CATruncatedName><CRLNameSuffix>,CN=
<ServerShortName>,CN=CDP,CN=Public Key
Services,CN=Services,CN=Configuration,DC=contoso,DC=com<CDPObjectClass>
2.8.a16 Switch Select extension drop down to Authority Information Access
AIA > remove all entries form the list except local C drive path.
2.8.a17 Now click the Add button and add the following in the location one
at a time > OK > check box for Include in the AIA extension of issued
certificates > Apply > Yes if requested to restart services > OK.
Ldap:///CN=<CATruncatedName>,CN=AIA,CN=Public Key
Services,CN=Services,CN=Configuration,DC=contoso,DC=com<CAObjectClass>
http://cttc-intca01.contoso.com/CertEnroll/<ServerDNSName>_<CaName>
<CertificateName>.crt
2.8.a23 We will now copy this exported certificate file over to our
Intermediate or subordinate CA server CTTC-INTCA01. Right-click the Start
button on Taskbar and select Run. Type \\192.168.1.251\c$ to connect to
CTTC-INTCA01 server. On the remote C drive, create folder CertFiles.
!**Important**! If you are unable to connect, make sure Windows Firewall
is turned off on CTTC-INTCA01 server, disable it if not.
2.8.a24 Now copy all files from CertEnroll folder to this new folder on
CTTC-INTCA01 server. Using these files, we will create our Intermediate or
Subordinate CA.
2.8.b2 Next in Select features window > Next in Active Directory Certificate
Services > Select Certification Authority & Certification Authority Web
Enrollment in Select Role services > click Add Features button in pop-up >
click Next > Next in Web Server Role (IIS) window.
2.8.b3 Take defaults in Select role services click Next > check Restart the
destination server automatically if required > Yes in pop-up > click Install
button > when installation succeeds click Close.
2.8.b4 Now we will configure this server as the Subordinate CA. In Server
Manager > Notification Flag click Configure ADCS.
2.8.b9 We will not start the process of requesting a certificate for this SubCA
from the Root CA. In certificate request take defaults > Next. A .req request
file will be created at the root of the C drive of CTTC-INTCA01 server.
2.8.b17 Select Issued Certificate folder and see the SubCA certificate we
Issued.
2.8.b18 Double click on the issued certificate to view it > select Certification
path to see the CA hierarchy.
2.8.b19 We will now Export this certificate and then import it on our
SubCA. Click Detalis tab > click button Copy file to > Next in Export
Wizard > select Cryptographic Message option > check box to include all
certificate in the certification path > Next.
2.8.23 Log back into CTTC-INTCA01 server > Server Manager > Tools >
Certificate Authority > right-click on the SubCA server icon > All Tasks >
Install CA Certificate.
2.8.24 Browse to c:\CertFiles and select SubCAIssuedCert.p7b file > Open >
OK in root certificate is untrusted. Right-click on SubCA in Certification
Authority > All Tasks > click Start Service. Service will start and server icon
will have a green check mark.
3.1.4 Server Manager > Tools > select DHCP. DHCP server must be
authorized in AD before it can lease out any IP addresses. To confirm that
our DHCP server is Activated > right-click on server name in DHCP tool,
you should see Unauthorize option. This confirms that your DHCP server is
Authorized. If it is not, then select Authorize option to complete that process.
3.1.5 Right-click on IPv4 icon under DHCP server > New Scope > Next on
Welcome screen > Type 10.1.1.x-Scope in Name > click Next.
3.1.6 In IP address Range window, complete as following > Next.
3.1.7 In Add Exclusions and Delay window add the following two range of
IP addresses using the Add button > Next.
3.1.8 In Lease Duration, change to only 2 minutes. This will force devices to
release IP address every minute > Next.
3.1.9 In DHCP Options window > No I will configure these options later >
Next > Finish to complete process.
3.1.10 In DHCP tool > expand your new scope > click Address pool. This
shows total range of IP addresses that will be leased for this scope and what
are the Exclusion ranges.
3.1.11 Right-click on Scope Options container > Configure Options > check
003 Router box > type 10.1.1.1 in IP Address and click Add. Check 015 DNS
Domain Name > type contoso.com > click Ok.
Right-click Server Options > Configure Options > check 006 DNS Servers
box > type 192.186.1.225 address > Add > OK.
3.1.12 Now you can click on Scope and Server options in DHCP tool to view
your configuration. Server options settings will apply to all Scopes that are
created in the DHCP server.
3.1.13 Now we will Activate our Scope > right-click on your DHCP Scope >
select Activate. The black arrow pointing downward on the Scope icon will
disappear and Scope is ready to lease out addresses.
!**Important**! Make sure that CTTC-dhcpPC VM’s NIC is connected the
Internal vSwitch virtual switch. This will put the system in the same virtual
network as the DHCP server.
3.1.14 Login to CTTC-dhcpPC using cttc-dhcpPC\administrator (local)
account > Open command prompt > type ipconfig > This will show us an IP
address in 169.254.x.x subnet. PC is set to obtain an IP automatically but is
still waiting for DHCP server to provide one. Now type ipconfig /renew to
obtain IP configuration for the Scope we created.
3.1.15 Now you that you the leased IP address > from command prompt >
type ping 10.1.1.1 > you should get a reply from the server’s address. This
confirms connectivity to the DHCP server.
3.1.16 Move over the CTTC-DHCP1 server > DHCP tool > select Address
Leases under Scope > refresh and see lease entry for CTTC-dhcpPC. Unique
ID identifies client’s MAC address.
3.2.3 Go back to DHCP tool > Reservations > this will show our reserved
address. Click Address Leases > we will now see the reserved entry as well.
3.2.4 Go to CTTC-dhcpPC > command prompt > type ipconfig /release. This
will release the current IP address from PC. Type ipconfig /renew > now you
will see the reserved IP address allocated to the PC.
3.2.4 Go back to Address Leases > refresh and see reservation (inactive) is
now (active).
3.4.3 In Select features click Next > In Remote Access click Next > In Select
Role Services click Routing & DirectAccess options > click Add Features.
3.4.4 Click Next in Select Role Services > check restart the destination server
automatically if required > Yes > Install. Click Close button when installation
process succeeds.
3.4.5 Server Manager > Tools > select Routing and Remote access > right-
click on server name and select Configure and enable Routing and remote
access.
3.4.6 Wizard pages opens up click Next > In Configuration windows select
the bottom option of Custom configuration and click Next > In Custom
Configuration select LAN Routing and click Next > click Finish > click Start
Service.
3.4.7 In Routing and Remote Access tool > expand IPv4 > right-click
General icon > select to install New Routing Protocol. In New Routing
Protocol window select DHCP Relay Agent and click OK >
3.4.8 Now notice the relay agent protocol added underneath IPv4 container >
right-click on DHCP Relay Agent and select Properties > add all DHCP
server IP addresses one at a time by clicking Add button > OK
3.4.9 We will now add all network interfaces that will participate relaying
DHCP Discover messages to DHCP servers. Right-click on DHCP Relay
Agent and click New Interface.
3.5.2 When installation succeeds click Close > Open Server Manager > Tools
> DNS.
3.5.3 Login to DC server with contoso\administrator user > Server Manager >
Tools > DNS > expand DC > expand Forward Lookup zones > click and then
right-click on constoso.com zone and select Properties.
3.5.4 In contoso.com property page > select zone transfers tab > check Allow
zone transfers box > OK.
3.5.5 Go back to CTTC-DHCP1 server > in DNS > right-click Forward
Lookup zones > New Zone > In new zone wizard click Next > select
Secondary zone in Zone type > Next.
3.5.7 Expand contoso.com secondary zone > right-click select Transfer from
Master > click refresh button or hit F5 to refresh > You will see zone
information now is copied over to this secondary zone.
3.6 Create AD Integrated Reverse Lookup Zone.
In this lab, we will create two Reverse lookup zones and register two IP to
Hostname mappings.
A reverse lookup zone is an authoritative DNS zone that is used primarily to
resolve IP addresses to network resource names. This zone type can be
primary, secondary, or Active Directory—integrated.
3.6.1 Login to DC server with contoso\administrator credentials > Server
Manager > Tools > DNS > expand Reverse Lookup zone container > right-
click Reverse Lookup zone and select New Zone. Next in New Zone Wizard
window > select Primary zone and check store the zone in Active Directory
box, Next > select To all DNS servers running on domain controllers in the
forest: contoso.com and click Next > select IPv4 Reverse Lookup Zone and
click Next.
3.6.2 In Reverse Lookup Zone name type 192.168 in Network ID section and
click Next > In dynamic updates windows select Allow both nonsecure and
secure dynamic updates and click Next > click Finish.
3.6.3 Now please add another reverse lookup zone with same configuration
using 10.1 as Network ID.
3.6.4 Open command prompt or power shell and type ipconfig /registerdns.
This will force DC server to register its host and PTR records with DNS
forward and reverse lookup zones. Login to CTTC-DHCP1, open command
prompt or power shell and type ipconfig /registerdns.
3.6.5 Go to DNS on DC server > click Refresh button > expand Reverse
Lookup zone > select each reverse lookup zone to view registered PTR
records. If you do not see the registered PTR records, execute ipconfig
/registerdns command again and refresh zone.
3.8.2 In Web Server role (IIS) click Next > Next in Select Role services >
check restart destination server automatically if required > click Yes to
prompt > click Install > click Close when installation succeeds.
3.8.3 In Server Manager > Tools > Routing and Remote Access > right-click
VPN server and select Configure and Enable Routing and Remote Access.
3.8.4 Setup wizard will start click Next > In Configuration windows select
VPN and NAT option, click Next > In VPN connection windows select NIC
with 10.1.1.200 IP address (remember 10.1.1.x network in this lab simulates
Internet connection) and click Next > In IP address assignment select From a
specified range of address and click Next > In Address Range Assignment
window click New button and add IP range 172.16.0.1 – 172.16.0.200 (range
of 200 IP addresses to be leased out to VPN clients) click OK and Next >
Choose default option of No in Managing multiple remote access servers >
click Finish > OK on prompts.
3.8.6 We will now add a VPN connection to our CTTC-dhcpPC. Click Start
and type settings and click Settings icon > click Network and Internet > click
VPN > click Add a VPN connection.
3.8.10 Open command prompt or powershell > type ipconfig > here we can
see both adapters, Ethernet and the virtual PPP. PPP virtual adapter is the
point-to-point connection to VPN server and have received IP from the VPN
server in 172.16.x.x subnet.
3.8.11 Now we go back to CTTC-VPN server and confirm this VPN
connection coming for our CTTC-dhcpPC computer. Go back to CTTC-VPN
server > open Routing and Remote access tool > refresh and select Remote
Access clients > we will see our Administrator user logged in. Select Port and
see active VPN connection using PPTP.
3.8.12 Double click the Active port to view further information including
leased IP given to our PC. Using the Disconnect button, this Active VPN
connection can be disconnected from server.
Module 4 - Storage Services Labs
Module 4 labs will revolve around how Windows Server manages storage.
This will include implementing volumes, shares, permissions, Storage
Spaces, and iSCSI storage services.
!**Prerequisite**! Following virtual environment is required to complete
labs in this module.
Add two virtual switches
iSCSI.Net-12.12.12.0 (Internal virtual switch)
Heartbeat.Net-11.11.11.0 (Internal virtual switch) (See LS.11b on how to
add a new virtual switch)
Add three virtual machines (See LS.7, LS.8, & LS.10 on how to set these
up)
Storage-SRVR 12.12.12.200/24 192.168.1.243/24
VM need two virtual NICs. (use lab LS.11c on how to add additional
vNICs)
192.168.1.243 255.255.255.0 192.168.1.1(gateway) 192.168.1.225(DNS)
connects to External vSwitch
12.12.12.200/24 connects to Internal iSCSI vSwitch
Add two virtual hard disks and create simple volumes with following
size and drive letters.
P: 2.5TB & Q: 1.9TB
CTTC-Node1
VM need three virtual NICs. (use lab LS.11c on how to add additional
vNICs)
192.168.1.241 255.255.255.0 192.168.1.1(gateway) 192.168.1.225(DNS)
connects to External vSwitch
12.12.12.1 255.255.255.0 connects to Internal iSCSI vSwitch
11.11.11.1/24 connected to Internal Heartbeat vSwitch
CTTC-Node2
VM need three virtual NICs. (use lab LS.11c on how to add additional
vNICs)
192.168.1.242 255.255.255.0 192.168.1.1(gateway) 192.168.1.225(DNS)
connects to External vSwitch
12.12.12.2/24 connects to Internal iSCSI vSwitch
11.11.11.2/24 connected to Internal Heartbeat vSwitch
All VMs must join the domain.
Firewall must be turned off.
4.1a.2 Next in Wizard page > type 10240 in Simple volume size in MB: to
create a 10GB volume, Next > Assign S as the drive letter, Next > keep
defaults in Format Partitions window, Next > Finish. Confirm that you can
see S: volume named Simple volume 10GB in size and remaining space is
still unallocated.
4.1a.2 Now we will create a Spanned volume of 20GB total space spanned
over 10GB on Disk 1 and 10GB on Disk 2. Right-click Disk 2 Unallocated
area > New Spanned Volume > Next > type 10240 in Select the amount of
space in MB:. Select Disk 2 > click Add button > click Disk 2 under
Selected: > type 10240 in Select the amount of space in MB:, Next.
4.1a.3 Select H as assigned drive letter, Next > type Spanned Volume in
Volume label > check perform a quick format > leave NTFS as File System,
Next > Finish. In Disk Management prompt to convert to Dynamic disk, click
Yes. You will now see color coded Simple and Spanned volume.
4.1a.4 In this step we will create a Mirrored set (RAID 1). Right-click
unallocated space on Disk 2 > New Mirrored volume > Next in Wizard
window > all unallocated space of Disk 2 is in Selected section > click Disk 3
in Available section, click Add button, Next > Assign J as drive letter, Next >
type Mirrored Volume in Volume label > check box for Perform a quick
format, Next > Finish. Yes to convert to Dynamic disk.
4.1a.5 In this step we will create Stripping with Parity (RAID 5) set. Right-
click on unallocated space on Disk 3 > New RAID-5 Volume > Next in
Wizard window > select Disk 4 in Available section, click Add > select Disk
5 in Available section, click Add. You will see Disk 3, 4, & 5 listed in
Selected section. Next > Choose P for drive letter, Next > type RAID-5 in
Volume label > check Perform a quick format box, Next > Finish > Yes to
convert to Dynamic disk.
4.1a.6 Disk Management is now listing all different volumes we created with
their size and disk types.
4.1b.5 Open AdminData folder > right-click and select to create a Text
document > you will receive an access deny window, user administrator only
have Read access, hence unable to create a file > click Cancel.
4.1b.6 Move to C:\UserData > try to delete folder AdminData > you will
receive access deny prompt, click Cancel.
4.1b.7 Go back to DC server > right-click C:\UserData select Properties >
click Sharing tab > click Advance Sharing button > click Permissions button
> check Change permission Allow box, OK > OK > Close.
4.2.2 In Storage Pool Wizard, Next on Before you begin > type CTTC-
StoragePool1 in Name, Next.
4.2.3 In Physical Disks section, select all five disks in the list, click Next >
click Create in Confirmation section > click Close in Results.
4.2.4 Right-click on newly listed CTTC-StoragePool1 in Storage Pools,
select New Virtual Disk > select CTTC-StoragePool1 in Pool Name, OK >
Next in Virtual Disk Wizard Before you begin section > type CTTC-
SP1.VirtualDisk1 (depicting first virtual disk from our Storage Pool 1), Next.
4.2.5 Click Next in Enclosure Awareness > check out description of the
three storage layouts providing data redundancy, select Mirror and click Next
> select Three-way mirror in Resiliency settings, Next > select Thin in
provisioning type, Next > type 200 in Specify size, Next > click Create in
Confirmation window > click Close in Results.
4.2.6 Click Disks in Server Manager to see Storage Pool add as disk #6.
4.2.7 Click Next in Volume Wizard Before you begin > Next in Select the
server and disk > type 150 for size of volume, Next > Choose E as Drive
letter, Next > Keep NTFS as File system, Next > Create in Confirmation >
Close in Results.
4.2.8 We will now confirm redundancy built into our volume due to Storage
Space by simulating a disk failure. Open File explorer and open our new
volume E, or E drive > create a folder at the root of E drive called InfoData >
create a text file in InfoData called UserDataFile > open the file, type This is
a text file in CTTC-StoragePool1 and CTTC-SP1.VirtualDisk1 > click File
and save.
4.2.9 In DC VM > open File menu and select Settings to open VM settings >
select HD3 under SCSI Controller section, click Remove button to simulate
HD3 failure, click Apply. You will see the Disk has disappeared from list >
OK.
4.2.10 Go back to the folder and file you created in E drive to see even with a
failed drive, data is still there due to our Storage Space redundancy.
4.3 iSCSI Storage services.
In this lab we will setup an iSCSI Target server which will make its disk
space available to other systems via iSCSI protocol. We will then setup an
iSCSI Initiator to connect to that storage on target server.
iSCSI is a protocol for storage networking and runs the quite common SCSI
storage protocol across a network connection which is usually Ethernet.
iSCSI traffic can be run over a shared network or a dedicated storage
network. Microsoft iSCSI Initiator is a tool that connects external iSCSI-
based storage to host computers with an Ethernet network adapter. The client
machine within a storage network is an iSCSI Initiator. The server machine
within a storage network is an iSCSI target. An iSCSI target is any machine
that receives iSCSI commands from an initiator.
4.3a Setting up iSCSI Target Server
!**Important**! Storage-SRVR VM will be used in this lab.
4.3a.1 Login to storage-srvr as contoso\administrator > Server Manager >
Add roles and Features > Next in Before you begin > Next in select
installation type > Next in select destination server > select Data
Deduplication and iSCSI Target Server, click Add Features button in prompt,
Next.
4.3a.2 Next in select features > check Restart the destination server if
required, Yes in prompt, click Install > Close button when installation
succeeds.
4.3a.3 Server Manager > File and Storage Services > iSCSI > click to create
an iSCSI virtual disk.
4.3a.4 In in iSCSI virtual disk location, click drive P (for the sake of this lab,
this is being done on a simple volume with no redundancy, in actual
production systems, we must select a drive created on a RAID system with
full redundancy like what we created in the 4.2 lab) in select by volume, click
Next. This process creates a virtual disk in the drive we selected. In Specify
Iscsi virtual disk name type CTTC-vDisk1, see where this virtual disk will be
created with the P drive selected, Next.
4.3a.5 Type 1.5TB for size and Dynamically expanding for disk type, Next >
select New iSCSI target in Assign target, Next > type CTTC-iTarget1 in
target name, Next > in Select a method to identify the initiator, using the drop
down select IP Address and type 12.12.12.1 (IP of the iSCSI Initiator device),
OK.
4.3a.6 Click Add button to add another iSCSI initiator in specifying access
servers > select IP Address in drop-down list under Enter a value for the
selected type and type 12.12.12.2 as the second iSCSI initiator, You will see
both iSCSI initiator numbers listed, click OK, Next.
4.3a.9 Now follow the same steps as in 4.3a.4 to add two more virtual disks.
One on P and the other on Q drive with the following configuration:
4.3a.10 Following show final result when all disks are in place and the iSCSI
Target system is ready.
4.3b.3 In Connect to Target, click Advance > select Microsoft iSCSI Initiator
in Local adapter > 12.12.12.1 in Initiator IP > 12.12.12.200 / 3260 in Target
portal IP > OK > OK.
4.3b.4 cttc-itarget1 now will show as connected. Complete tasks 4.3b.2 &
4.3b.3 for the remaining two Inactive discovered targets.
4.3b.5 Right-click on Start button > Disk Management > You will now see
iSCSI targets listed as Disks.
4.3b.6 Complete lab steps 4.3b.1 to 4.3b.4 for server CTTC-Node2. All
values are the same except Initiator IP for CTTC-Node2 is 12.12.12.2 (local
adapter address).
4.3b.7 Open Disk Manager > bring both iSCSI target disks Online and
Initialize them.
5.1.4 Select Virtual Switch Manager again, you will now see this Private-Net
Private type virtual switch listed in the list > OK.
5.1.5 Open settings of DC virtual machine > select Network Adapter in
virtual hardware list > click on drop-down list under Virtual switch to see this
new Private-Net virtual switch we created. We will not select it, rather just
wanted to see how a virtual switch can be assigned to a network adapter of a
VM.
5.2 Creating Virtual Machines.
In this lab we will create Gen 1 and 2 Virtual machines and look at different
virtual hardware types created by Hyper-V.
Virtual machine acts like a complete computer, running an operating system
and programs. When you need computing resources, virtual machines give
you more flexibility, help save time and money, and are a more efficient way
to use hardware than just running one operating system on physical hardware.
Hyper-V runs each virtual machine in its own isolated space, which means
you can run more than one virtual machine on the same hardware (host
system) at the same time.
5.2a.3 Click on each virtual hardware e.g. memory, SCSI controller, serial
ports & Network Adapter. Also select virtual machine specific configuration
under Integration services, Checkpoints, & start / stop actions. Click OK to
close settings page.
5.2a.4 To bring up console or desktop of the VM, right-click Windows 10
Client VM, click Connect. In a VM where OS is installed and it is online, you
will see the desktop. Our VM is new, there is no OS installed, and is turned
off.
5.2a.5 Click Start to turn on the VM, since iso file is connected, VM will start
the Windows 10 installation process.
At this point, we created a Gen 1 VM, configured its virtual hardware, and
started OS install. OS installation is optional, you can complete the install if
you would like.
5.2b Creating Generation 2 VM
Gen 2 VMs are recommended to use in most cases, especially for modern 64-
bit operating systems. They provide higher CPU performance and memory
limits. There is no 2TB disk limit due to UEFI support with GPT. Gen 1 VMs
are recommended when 32-bit operating systems is being used, old OS that
does not support UEFI, COM ports and or Floppy disks are needed.
5.2b.1 Open Hyper-V Manager > Click New in Action pane, select Virtual
machine > Next in Before you begin > type Server 2019, Next > click
Generation 2 selected, Next > type 2048 in Startup memory, Next > click the
drop-down in configure networking window, select Internal vSwich, Next >
take defaults in connect virtual hard disk, Next > In installation options,
select install an OS from bootable DVD > click Image file and browse to
your downloaded Windows Server OS iso file, Next > Finish.
5.2b.2 Hyper-V Manager will now list this new VM in virtual machines
section. Right-click the new VM Server 2019 and click Settings > now let us
browse different virtualized hardware by the Hypervisor in the VM settings
for generation 2 > first difference you see is Firmware instead of BIOS, no
COM ports and Floppy disk.
5.2b.3 Click on each virtual hardware e.g., memory, SCSI controller, &
Network Adapter. Also select virtual machine specific configuration under
Integration services, Checkpoints, & start / stop actions. Click OK to close
settings page.
5.2b.4 Bring up VM desktop by right-clicking Server 2019 VM, click
Connect. Click Start to turn on the virtual machine.
5.2b.5 Since VM boot process points to DVD first, it will start the installation
process (press any key if requested to start the Server OS installation
process). Windows Server 2019 installation process will start.
At this point, we have created a Generation 2 VM, configured its virtual
hardware, and started OS install. Completing the OS installation is optional in
this lab as well.
5.3 Export and import Virtual Machine utilizing
Nested virtualization
The ability to move virtual machines from one host system to another without
downtime is one of the main benefits of virtualization. Microsoft Hyper-V
provides this functionality, and it is known as Export and Import of virtual
machines.
An export gathers all required files into one unit--virtual hard disk files,
virtual machine configuration files, and any checkpoint files. You can do this
on a virtual machine that is in either a started or stopped state.
!**Prerequisite**! This lab requires a VM to host nested VMs. File-Srvr
VM will be used for that purpose. Create VM File-Srvr if you have not
already. Nested virtualization is a feature that allows you to run Hyper-V
inside of a virtual machine (VM). Your host system either Windows Server
2019 or Windows 10 Pro that is running File-Srvr must be configured to host
such VMs by running the following command.
Set-VMProcessor -VMName <VMName> -ExposeVirtualizationExtensions $true
Set-VMProcessor -VMName File-Srvr -ExposeVirtualizationExtensions
$true
Once this command is executed on your host successfully, File-Srvr VM how
can host nested virtual machines. Add Hyper-V role to File-Srvr.
5.3.1 Open Hyper-V Manager on your Host system > right-click on DC4,
select Export.
5.3.2 Click Browse, create folder on Host system c:\ExportedVMs > Select
folder > click Export.
5.3.6 Confirm that DC4 is highlighted in Select Virtual machine, Next >
select copy the virtual machine, click Next > in Choose Folders for Virtual
Machine Files, change paths to the following, Next.
5.3.7 In Choose Folders to Store Virtual Hard Disks use path
C:\Users\Public\Documents\Hyper-V, Next > in connect Network, pick
Virtual switch from drop-down menu, Next > Finish.
5.3.8 File Copy process starts, when completes you will see DC4 listed under
Virtual Machines.
5.3.9 Right-click on DC4 > select Settings > this opens up settings page for
the nested DC4 VM > here we can see the path to our virtual hard disk file.
6.1.10 Click Next in Select Servers or a Cluster window > select Run all tests
in Testing options, Next > Next in Confirmation window >
6.1.11 System will start to validate and run all tests > click Finish in
Summary window.
6.1.12 Right-click on Failover Cluster Manager again > select Create Cluster
> Next in Before you begin > click Browse in Create Cluster Wizard > type
cttc- in Enter the object names and click Check Names > select both Node1
and Node2, click OK > click OK in Select Computers > see both nodes listed
under Select Servers, Next.
6.1.13 Type CTTC-Cluster in Cluster Name and click in Address section and
type 192.168.1.100, hit Next.
6.1.14 Next in Confirmation window > click Finish in Summary window.
6.1.18 In Configure Cluster Quorum Wizard Before you begin window click
Next > In select quorum configuration option, click select the quorum
witness, Next button. In select Quorum Witness, click Configure a disk
witness, click Next.
6.1.19 In Configure Storage Witness > check Cluster Disk 1 (10GB), click
Next. Next in confirmation window > click Finish in Summary.
6.1.20 Click Network container in Failover Cluster Manager > click each
Network and identify public production network (192.168.1.0/24), iSCSI, and
Heartbeat Networks.
6.1.21 Click Cluster Network 1 > click Properties in Actions > rename it to
Public / Domain Net. Rename Networks for iSCSI and Heartbeat as well.
Select Do not allow cluster network communication on this network for
iSCSI Net.
6.1.22 Go to Disk under Storage > select Cluster Disk 2 > click Add to
Cluster Shared Volumes in Actions menu > see Disk 2’s Assigned to change
from Available Storage to Cluster Shared Volume.
6.1.23 Click Roles under CTTC-Cluster > here we can make added roles to
the server a cluster aware role e.g., File Server or DHCP server. At this point,
our Cluster is configured with centralized storage and appropriate Roles can
be added to benefit from Windows Clustering.
Module 7 - Performance Monitoring Labs
!**Prerequisite**! CTTC-Node1 and Windows 10 Clint PC virtual
machines will be used to complete labs in this module.
Windows Server performance monitoring refers to the range of processes
involved in tracking the server’s key metrics, to ensure excellent
performance. Windows Server includes some basic built-in tools for analysis
and troubleshooting that let you monitor four key aspects of performance,
including the server’s CPU, memory, hard disks, and the network interface
card (NIC). You can examine various metrics related to these components to
see whether the server is behaving as expected.
7.1.3 Add Counter window will open > available counters show list of
counters we can select from e.g., CPU, memory, NIC etc. > select computer
section is for monitoring performance for the local or a remote system >
Instance is for number of instances for that component, our example shows
three NICs in the server or a system having two or more CPUs > show
description provides description of the selected counter > expand Network
Interface, select Bytes Total/Sec counter > select All instances and click Add
button.
7.1.4 Expand Logical Disk and select Ave. Disk Queue Length, select C in
instance > click Add. Do the same for Ave. Disk Byte/Write counter. Find
memory in the list and select Available MBytes, click Add > in Processor
select % Processor Time, select 0 in instance to select the only CPU system
have, click Add > look for System and select Processor Queue Length, click
Add.
7.1.5 Click OK in Add Counters window when completed with adding
counters above.
7.1.6 Make sure line graph view is selected, you will see all counters we
added and that system is capturing their real-time performance data.
7.1.7 Right-click on Performance Monitor, select Properties > change
Duration from 100 seconds to 600 (10 minuts), click Apply. This changes the
default time duration it shows performance activity in the line chart.
7.1.8 Click Data tab > here we can change Line chart color, scale, style, and
width > click OK. We will now see all counters we selected with line graph
performance information.
7.1.9 Select Avg. Disk Bytes/Write Counter and click on Highlight. This will
highlight the line graph of that counter. Create activity in the virtual machine
by opening multiple Internet Explorer, open file explore and browse C drive
and view line graph of the real-time monitoring.
7.1.10 Now click graph type button and select Histogram and then Report to
view different views.
7.2.2 Once started, System Performance will run for 60 seconds. Create
activity in the system by opening multiple Internet Explorer windows and
visiting different web sites, open command prompt and type dir c:\ /s and hit
enter to run a directory on the entire C drive.
7.2.3 When Data Collector activity completes, click System performance
under System Data Collector set to see path of where the performance file is
generated. Expand Reports container and browse to your generated report.
Generated report shows comprehensive component by component utilization
information. Check out different sections (Diagnostic results, CPU, Network,
Disk, Report statistics etc.) of the report and see measurement taken.
7.2.4 Expand Disk section of the report and check out files causing most IO.
7.2.6 We will now work with User Defined Collector set. Right-click User
Defined under Data Collector Sets > New, Data Collector Set > type Custom
Data Set in name, click Create manually, Next > check Performance counter
box, Next > click Add and add Processor\Processor Time and Physical Disk
Avg. Disk sec/Transfer for C drive instance only, change sample interval to
30 seconds, Next > take default path in root directory, Next > click Change to
use administrator credentials, select to open property page of collector set,
Finish.
7.2.7 Property page for the set will open > confirm configuration in General
and Directory tabs.
7.2.8 We can also schedule this set to execute at a specific date and time >
click Schedule tab, click Add > set desired date and start time, OK > click
Stop Condition, set 4 hours of collection time, OK > provide Administrator
credentials if requested. Keep in mind that we only added one schedule, we
can add multiple schedules if needed.
7.2.9 Verify that our User Defined collector set exist and will execute on the
schedule we configured.
7.3.6 Click Roles & features in Tools and see installed and available to install
server roles. Click Services to restart, stop, pause, or configure services
running on DC. Click Storage to see Disks and Volumes. Click Updates to
view and configure Windows updates.
8.1.4 In Specify Backup time select 9:00pm, click Next > In Specify
Destination select Backup to a hard disk option, click Next > click Show All
available Disks button > check box for the Disk, click OK, click Next, Yes to
prompt.
8.1.5 Click Finish on the Confirmation page and Close on Summary.
8.1.6 Open Task Scheduler, click Backup under Windows > Our scheduled
backup is listed > click Actions tab to see what command is executed when
backup runs.
8.2 Implement Windows on-demand Bare Metal
backup.
In this lab we will do an on-demand Bare metal backup on K drive.
Bare metal backup and recovery is a solution type that allows backing up
and restoring the entire system data from one system to another, including
everything from files to programs and drivers.
8.2.1 In Windows Server backup (wbadmin) console, Actions pane, click
Backup once.
8.2.2 In Backup options, click Different option, Next > In Select Backup
Configuration, select Custom, click Next > In Select Items for Backup, click
Add Items button, check Bare metal recovery, click OK, click Next > In
Specify destination type, select Local drives, click Next.
8.3.2 Right-click on File-Srvr again, select Settings > select K drive in Drive
list, click Remove button, click Apply, click OK.
8.3.5 Click the Browse button, go to the path of File-Srvr-E virtual disk
(containing our Bare metal backup), select File-Srvr-E.vhdx file and click
Open > click Apply button, click OK.
8.3.11 This completes our 8.3 lab. This new recovered VM can now be
turned off and removed. Original File-Srvr VM can now be brought back
online.
8.4.3 Open Control Panel > in search box, type firewall > select Windows
Defender Firewall > click Advanced settings > select Inbound Rules
container > enable both Hyper-V replica rules > now minimize the Firewall
window.
8.4.4 Login to File-Srvr as contoso\administrator user > Server Manager >
Tools > Hyper-V Manager > select DC4 (our imported VM from lab 5.3) > in
Actions pane at the bottom, click Enable Replication.
8.4.5 Now we start the replication configuration of DC4 VM over to our
Hyperv-replica server > click Next in Before you begin > type hyperv-
replica.contoso.com in Specify Replica Server, click Next > in Specify
Connection Parameters check Use Kerberos authentication (HTTP), change
Replica server port to 80, and confirm box is checked for compress the data
that is transmitted over the network > click Next.
8.4.6 In Choose Replication VHDs, make sure DC4.vhdx box is checked > in
Configure replication frequency, select 30 seconds, click Next.
8.4.7 Keep Maintain only the latest recovery point in Configure Additional
Recovery Points, click Next > defaults in Choose Initial Replication Method,
click Next > click Finish.
9.1.3 In Actions pane, click Basic Settings > window shows physical path of
where default webpage exists, click OK > open File explorer and look at the
default webpage file.
9.1.5 Go back to Web-Srvr VM > IIS Manager > right-click sites and choose
Add Website > In Add Website window > type www in site name > click
browse button next to Physical path, and create a folder named www in
C:\inetpub\wwwroot directory > type www.contoso.com in hostname, click
OK.
9.1.6 Create Default.htm text file in this new www folder > open this text file
and type This is the www.contoso.com site. > close file and select Save >
rename the text file by removing .txt from the file name.
9.1.7 Select our www site in IIS Manager > double click on Default
Document > confirm that Default.htm is at the top of the list. This page will
be loaded when the second site is visited.
9.1.8 Login to DC with contoso\administrator user > Server Manager > Tools
> DNS > expand DC, Forward Lookup Zones, and select contoso.com Zone.
9.1.9 Right-click on contoso.com > click Add A /Host record > in Name type
www > type 192.168.1.111 IP of Web-Srvr in IP address > click Add Host,
click Done. Confirm that the www host record has been created.
9.2.3 Select www site and click Binding in Edit Site section under Actions
pane > Site Bindings windows, click Add button > in Add Site Bindings,
select https in type, type www.contoso.com in Host name, and select our
self-signed certificate Web-Srvr, click OK, click Close.
9.2.4 Login to ClientPC VM > launch web browser > in address bar type
192.168.1.111, IP of the default website > connectivity occurs using HTTP >
address bar type www.contoso.com, it will connect using HTTPS (SSL)
secure connection with an error because our certificate is self-signed.
9.2.5 Click Details on the certificate error page > click go on to the web page
> click on Certificate error > confirm certificate is our self-signed one. Scroll
down in Certificate Information to confirm.
9.3 Remote Desktop for Server Administration.
In this lab we will manage server remotely using Remote Desktop.
Microsoft Remote Desktop is a client application that allows you to access
and control the resources and data of a remote Windows host. It is, in
essence, remote control software. Remote desktop capabilities allow you to
access a work computer for administrative access and or change its
configuration.
Remote Desktop Protocol RDP is a proprietary protocol developed by
Microsoft which provides a user with a graphical interface to connect to
another computer over a network connection. RDP typically communicates
over TCP port 3389. It provides network access for a remote user over an
encrypted channel.
RD allows you to take control of a remote computer or virtual machine over a
network connection. With the Cloud and the Internet, that remote computer
or virtual machine can be just about anywhere on the planet.
9.3.1 Login to DC VM as contoso\administrator > right-click on Start button,
select System > in settings page, click Remote Desktop and confirm it is
enabled. If it is not, enable it please.
9.3.3 Select Local Resource tab, this tab lets us configure our local resources
to appear on the remote system e.g we can select our C: drive from our local
system to show up in our RDP session in the remote system. Sound from the
remote system will be played at the local system when in RDP session.
Clipboard can be shared between local and remote system when using the
RDP connection, local installed Printers can be mapped in the RDP session >
click More button to view further resources that can be mapped between local
and remote system > click local drive C: to be mapped when in RDP session,
click OK.
9.3.4 Click General tab again > check Allow me to save credentials box >
click Save As button > save file on Desktop by naming it DC-RDP > click
Connect button to establish RDP session with DC.
9.3.5 Windows security window will pop-up requesting authentication > click
More choices > click Use a different account > type contoso\administrator
and password P@ssw.rd as credentials, click OK.
9.3.6 You will not get DC system’s desktop in your RDP session on
ClientPC.
9.3.7 RDP session basically provides us with the desktop of the target system
remotely. Once connected we can manage our system as if we are locally
logged into it. All Windows management tools are available for access.
Within our RDP session, open Active Directory from Server Manger > Tools
> select Active Directory Users & Computers, we can manage Active
Directory objects from here.
9.3.7a In Active Directory Users and Computers > Right-click Users
container and create User First Name: John, Last Name: Wick with user
Logon name: jwick. Use P@ssw.rd as password for user jwick. Make sure
you de-select user much change password at next logon. Add user jwick to
Domain Admins group.
9.3.7b Open DNS from Server Manager > Tools > DNS to manage name
resolution.
9.3.8 Now we will see our local C: drive from ClientPC mapped in the RDP
session. Open File explorer in RDP session with DC server > click This PC
and see C: drive of our local system (ClientPC) mapped in RDP session with
DC server.
9.3.9 Open C on ClinetPC > Create a folder by the name of RDPSession on
root of this drive. Open File explorer on ClientPC and confirm this new
folder now exists in our local system.
9.3.11 From ClientPC, launch RDP client and start a session with RD-Srvr to
confirm our changes made in earlier step 9.3.10.
9.3.12 From ClientPC launch RDP client and login to DC server using jwick
credentials. You will now have two RDP sessions with DC server, one as
administrator and second as jwick.
9.3.12 From first RDP session as administrator > right-click Start and select
PowerShell Admin > type whoami to confirm your session as administrator
user.
9.3.12 To view all logged on users on DC server, type quser > output will
show logged on user > to force a logoff type logoff and session ID (in our
example session ID is 5) > type quser again to confirm that user jwick have
been forced off the server and our RDP session as user jwick is no longer
active.
9.4.3 In RD Web Access & RD Session Host pages, select RD-Srvr, same as
step 9.4.2 > In the Confirmation page, check Restart the destination server
automatically box > click Deploy button. System will start the RDS
installation process and will reboot. Once system comes back online, login as
contoso\administrator and RDS installation process will complete > click
Close button.
9.4.4 In RD-Srvr > Server Manager > Remote Desktop Services >
Deployment Overview shows installed and pending roles. We will now add
Licensing role to our RD-Srvr as well. Click green icon of RD Licensing
9.4.5 Add RD-Srvr as Selected server for RD Licensing role > click Next >
click Close button after installation succeeds. Now RD-Srvr is also listed as
having RD License Installed Role services.
9.4.6 We will now create a self-signed certificate; this certificate will be used
for secure communication of RDS roles and from RDS clients to the session
host server. Right-click on Start button and select PowerShell (Admin) option
> type the following two commands to complete creating the certificate.
New-SelfSignedCertificate -certstorelocation cert:\localmachine\my -
dnsname "RDS"
$pwd = ConvertTo-SecureString -String "Passw.rd" -Force -
AsPlainText
9.4.8 We will now export this RDS self-signed certificate so it can be used
for RDS communication. Expand Certificate > expand Personal > select
Certificate > right-click on RDS self-signed certificate > All Tasks > select
Export.
9.4.9 Click Next in Wizard page > In Export Private Key, select Yes, export
the private key, click Next > in Select File format, select Personal
Information Exchange, click Next > in Security page check Password box
and type password we provided during self-signed certificate (Passw.rd),
click Next.
9.4.10 In File to export, click Browse button > browse to desktop > type RDS
Certificate in file name > confirm .pfx is the file extension > click Save >
click Next > click Finish > click OK to complete export.
9.4.11 Go back to Server Manager > Remote Desktop Services > Select RD
Licensing under Deployment Servers > click Tasks in Deployment Overview.
9.4.12 In deployment properties page > select RD Licensing > choose Per
User > click RD-Srvr.contoso.com > click Apply button.
9.4.15 Now complete the certificate selection for RD Web Access Role
service using same steps as 9.4.14. Confirm that all three Role services show
status as OK. Click OK.
9.4.16 We will create an A/Host record named RDS to be used by clients
when they connect to RD Web Access. Login to DC as contoso\administrator
> Server Manager > Tools > DNS > expand DC, Forward lookup zones, and
Contoso.com zone. Right-click contoso.com and select New Host (A or
AAAA) to create an A or Host record > type RDS name > type
192.168.1.239 in IP Address section > click Add Host button > click OK.
9.4.22 When you see your executed RemoteApps on ClientPC > open Task
Manager > see that none of our RemoteApps that are running on our PC
show up as Tasks > click More Details > click Users tab and expand
Administrator to see all applications running under this account, you will not
see any of the RemoteApps listed.
9.4.23 Go back to RD-Srvr > open Task Manager > click More Details >
click Users tab, here we will see Administrator user listed twice, one is
locally logged in and other is logged in via Remote Desktop Services >
under the RDS user administrator you will see tasks for the RemoteApps we
are running.