CBLM - Set Up Computer Server
CBLM - Set Up Computer Server
List of Competencies
Welcome!
The unit of competency, “Set-up computer servers", is one of the
competencies of Computer System Servicing NCII, a course which comprises
the knowledge, skills and attitudes required for a TVET trainer to possess. The
module, Setting up computer servers, contains training materials and
activities related to identifying learner’s requirements, preparing session plan,
preparing basic instructional materials and organizing learning and teaching
activities for you to complete. In this module, you are required to go through a
series of learning activities in order to complete each learning outcome. In each
learning outcome are Information Sheets, Self-Checks, Task Sheets and Job
Sheets. Follow and perform the activities on your own. If you have questions,
do not hesitate to ask for assistance from your facilitator.
Remember to:
Perform the Task Sheets and Job Sheets until you are confident that
your outputs conform to the Performance Criteria Checklist that follows
the sheets.
Submit outputs of the Task Sheets and Job Sheets to your facilitator for
evaluation and recording in the Accomplishment Chart. Outputs shall
serve as your portfolio during the Institutional Competency Evaluation.
When you feel confident that you have had sufficient practice, ask your
trainer to evaluate you. The results of your assessment will be recorded
in your Progress Chart and Accomplishment Chart. You must pass the
Institutional Competency Evaluation for this competency before moving
to another competency. A Certificate of Achievement will be awarded
to you after passing the evaluation. You need to complete this module
before you can perform the module on Maintain and repair computer
systems and networks.
LEARNING OUTCOMES:
ASSESSMENT CRITERIA:
CONDITIONS:
Reference Book
Handout
Computer set with accessories and peripherals
ASSESSMENT METHODS:
Interview
Written
Actual Exam
Practical exam/oral questioning & observation
Rate your own performance using 80% of the criteria must be obtained
performance criteria checklist 3.1-1 by the trainee
Rate your own performance using 80% of the criteria must be obtained
performance criteria checklist 3.1-3 by the trainee
Read Information Sheet 3.1-3 in User Familiarize server roles in User &
& User template User template
Answer Self-Check 3.1-3 in User & Try to answer without looking at the
User template key answer
Rate your own performance using 80% of the criteria must be obtained
performance criteria checklist 3.1-3 by the trainee
Rate your own performance using 80% of the criteria must be obtained
performance criteria checklist 3.2-1 by the trainee
Rate your own performance using 80% of the criteria must be obtained
performance criteria checklist 3.2-2 by the trainee
Rate your own performance using 80% of the criteria must be obtained
performance criteria checklist 3.3-3 by the trainee
This information sheet will cover the details on Active Directory Domain
Services. It also cover the procedure and steps on how to install and configure
Domain controller.
This article provides prerequisites and steps for installing Active Directory
Domain Services (AD DS) on Microsoft Windows Server 2008 R2 Enterprise 64-
bit (W2K8).
This article does not provide instructions for adding a Domain Controller (DC)
to an already existing Active Directory Forest Infrastructure.
Select your domain name and know the domain administrator password that
you want to use.
Note: Your domain name should be reliably unique. Do not use the same domain
as your website, for example, and avoid extensions like “.local” unless you have
registered that domain name in DNS. We suggest a domain name that is not
used for anything else, like "internal.example.com"..
Windows Server 2008 can properly install and configure DNS during the AD
DS installation if it knows that the DNS is local. You can accomplish this by
having the private network adapter’s preferred DNS server address point to the
already assigned IP address of the same private network adapter, as follows:
1. From the Windows Start menu, open Administrative Tools > Server
Manager.
5. Copy the IP address that is displayed in the IP address box and paste it
into the Preferred DNS server box. Then, click OK.
Adding the Active Directory Domain Services role installs the framework for
Windows Server 2008 to become a DC and run AD DS. It does not promote the
server to a DC or install AD DS.
1. In the Server Manager window, open the Roles directory and in the
Roles Summary section, click Add Roles.
3. On the Select Server Roles page, select the Active Directory Domain
Services check box, and then click Next on this page and on the
Confirmation page.
Now that you have prepared the server, you can install AD DS.
8. After the installation verifies the NetBIOS name, on the Set Forest
Functional Level page, select Windows Server 2008 R2 in the Forest
function level list. Then, click Next.
11. On the Location for Database, Log Files, and SYSVOL page, accept
the default values and then click Next.
14. If you want the server to restart automatically after the installation
is completed, select the Reboot on completion check box.
16. After a few minutes, reconnect to your server by using the Console
in your Control Panel or RDP.
17. To log in, perform the following steps:
b. For the user, enter the full domain name that you chose, followed by a
back slash and Administrator (for example,
Example.com\Administrator).
Domain - A domain is a logical group of computers that share the same Active
Directory database. A domain allows you to manage a group of computers
rather than one by one. This is done through the central use of usernames and
passwords and the configuration of computers using group policy.
LDAP Syntax - LDAP uses a syntax that refers to the most significant part first
followed by less significant or precise parts afterwards. This is the opposite of
other systems, like filenames or paths. The main syntax of any LDAP command
is like this example: CN=Joe, OU=Users, DC=ITFreeTraining, DC=Com. When
an object can be defined uniquely, like in this example, it is called the
distinguished name.
Canonical Name (CN) - This is the name of the object in Active Directory that
you want to access. For example, if you wanted to access a user called Joe, you
would use CN=Joe.
Domain Component (DC) - This is the domain in which the object is located.
For example DC=ITFreeTraining, DC=com.
Forest - A forest is a collection of one or more domains which may have one or
more trees. What makes a forest unique is that it shares the same schema. The
schema defines what and how Active Directory objects are stored. The schema
defines the database for the whole forest but it should be remembered that
each domain in the forest has its own copy of the database based on the
schema.
Trusts - Parent and child domains are automatically linked by a trust. Users in
different domains can use these trusts to access resources in another domain
assuming that they have access. Trees in the forest are linked together via a
trust automatically. This ensures that any users in any domain in the forest
can access any resource in the forest to which they have access.
Global Catalog - In order for users to find resources in any domain in the
forest (remember that each domain has a separate database), Domain
Controllers can be made into Global Catalog Servers. A Global Catalog Server
contains partial information about every object in the forest. Using this
information, the user can conduct searches.
Self-Check 3.1-1
Multiple Choice: Write your answer on a separate sheet of paper.
1. A network setup in which each computer on the network keeps its own store of
user names and passwords.
Steps/Procedure:
Assessment Method:
Observation
Interview
CRITERIA
YES NO
Did you….
1. Install and Configured ADDS properly?
Learning Objectives:
This information sheet will cover the details and information about DHCP Role
and Scope. It also covers the procedure on how to add roles to server.
This topic explains the basic steps that you must follow to configure a DHCP
server. When you have finished setting up a basic DHCP server, you can
complete additional configuration tasks, depending on how you want to use the
DHCP server.
To start first need to log in to the server with administrator privileges. Then
start the “server Manager” by clicking on “Server Manager” icon on task bar.
Then go to “Roles”
Then it will load the Roles Wizard and select the “DHCP Server” From the list
and click next to continue.
In next window it will give opportunity to add DNS settings that should apply
for DHCP clients.
In next window we can add the scope, the Starting IP, End IP of the DHCP
range, subnet mask, default gateway, leased time etc.
Once installation finishes DHCP server interface can open from Start >
Administrative Tools > DHCP
DHCP terminology
Scope - is the full consecutive range of possible IP addresses for a network.
Scopes typically define a single physical subnet on your network to which
DHCP services are offered. Scopes also provide the primary way for the server
to manage distribution and assignment of IP addresses and any related
configuration parameters to clients on the network.
Address Pool - After you define a DHCP scope and apply exclusion ranges, the
remaining addresses form the available address pool within the scope. Pooled
addresses are eligible for dynamic assignment by the server to DHCP clients on
your network.
lease - is a length of time that a DHCP server specifies, during which a client
computer can use an assigned IP address. When a lease is made to a client, the
lease is active. Before the lease expires, the client typically needs to renew its
address lease assignment with the server. A lease becomes inactive when it
expires or is deleted at the server. The duration for a lease determines when it
will expire and how often the client needs to renew it with the server.
Option types - are other client configuration parameters a DHCP server can
assign when serving leases to DHCP clients. For example, some commonly
used options include IP addresses for default gateways (routers), WINS servers,
and DNS servers. Typically, these option types are enabled and configured for
each scope. The DHCP console also permits you to configure default option
types that are used by all scopes added and configured at the server. Most
options are predefined through RFC 2132, but you can use the DHCP console
to define and add custom option types if needed.
options class - is a way for the server to further manage option types
provided to clients. When an options class is added to the server, clients of that
class can be provided class-specific option types for their configuration. For
Microsoft® Windows® 2000 and Windows XP, client computers can also specify
a class ID when communicating with the server. For earlier DHCP clients that
do not support the class ID process, the server can be configured with default
classes to use instead when placing clients in a class. Options classes can be of
two types: vendor classes and user classes.
Steps/Procedure:
Assessment Method:
Observation
Interview
CRITERIA
YES NO
Did you….
1. Install and Configured Configure DHCP Role and
Scope properly?
4. List the needed data in blank sheet of paper?
Learning Objectives:
This information sheet will cover the details on creating user and user template
on server. It also cover the procedure on how to create and configure user and
user templates.
You probably already know that a User Account in Active Directory is an Active
Directory Object, or simply said, a record in an AD database. Most of the time
we create user accounts for people, however user accounts can also be created
for applications or processes.
User accounts allow a person to access resources on a network. But we can
just as easily deny access to certain resources on the network through the user
account. That’s why, User Account Objects are quite important and very
useful.
User Groups and Organizational Units. Now, let’s get started with creating a
user account.
4. In this window you need to type in the user’s first name, middle initial and
last name. Next you will need to create a user’s logon name.
In our example we are going to create a user account for Billy Miles and his
logon name will be bmiles. When done, click on the Next button.
In our example we are going to have the user change his password at his next
logon. You can also prevent a user from changing his password, set the
password so that it will never expire or completely disable the account.
When you are done making your selections, click the Next button.
A user template in Active Directory will make your life a little easier, especially
if you are creating users for a specific department, with exactly the same
properties, and membership to the same user groups. A user template is
nothing more than a disabled user account that has all these settings already
in place. The only thing you are doing is copying this account, adding a new
name and a password.
You may have multiple user templates for multiple purposes with different
settings and properties. There is no limit on the number of user templates, but
keep in mind that they are there to help you, not to confuse you, so keep in
mind less is better.
To create a user template, we are going to create a regular user account just
like we did above. A little note here, you may want to add an * as the first
character of the name so it floats at the top in AD and is much easier to find.
2. Type in the user’s name (with asterisks if so desired) and click Next.
4. Once the account is created, you can go ahead and add all the properties
you need for that template. To do so, double-click on that account and navigate
to a specific tab. Once done click OK.
1. Now in order to use that user template, we are going to select it, copy it and
add the unique information such as user name, password, etc.
We can do that for as many users as needed. Let’s start by right-clicking on the
template and selecting Copy.
2. Next we are going to enter the user’s name, login and password information
while making sure the checkbox next to Account is disabled is unchecked.
1. What are the steps on how to create user template on active directory?
Steps/Procedure:
Assessment Method:
Observation
Interview
CRITERIA
YES NO
Did you….
1. Install and Configured User and User Template
properly?
2. List the needed data in blank sheet of paper?
Learning Objectives:
This information sheet will cover the details on Group Policy. It also covers the
procedures on how to configure Group Policy on server.
Group Policy is simply the easiest way to reach out and configure computer
and user settings on networks based on Active Directory Domain Services (AD
DS). If your business is not using Group Policy, you are missing a huge
opportunity to reduce costs, control configurations, keep users productive and
happy, and harden security. Think of Group Policy as “touch once, configure
many.”
The requirements for using Group Policy and following the instructions that
this white paper provides are straightforward:
The network must be based on AD DS (that is, at least one server must have
the AD DS role installed). To learn more about AD DS, see Active Directory
Domain Services Overview on TechNet.
Computers that you want to manage must be joined to the domain, and users
that you want to manage must use domain credentials to log on to their
computers.
Windows 7 enforces the policy settings that you define by using Group Policy.
In most cases, it disables the user interface for those settings. Additionally,
because Windows 7 stores Group Policy settings in secure locations in the
registry, standard user accounts cannot change those settings. So, by touching
a setting one time, you can configure and enforce that setting on many
computers. When a setting no longer applies to a computer or user, Group
Policy removes the policy setting, restoring the original setting and enabling its
user interface. The functionality is all quite amazing and extremely powerful.
You can manage all aspects of Group Policy by using the Group Policy
Management Console (GPMC). Figure 1 shows the GPMC, and this white paper
will refer to this figure many times as you learn about important Group Policy
concepts.
GPOs contain policy settings. You can think of GPOs as policy documents that
apply their settings to the computers and users within their control. If GPOs
are policy documents, then the GPMC is like Windows Explorer. You use the
GPMC to create, move, and delete GPOs just as you use Windows Explorer to
create, move, and delete files.
In the GPMC, you see all the domain’s GPOs in the Group Policy objects folder.
In Figure 1, the callout number 1 shows three GPOs for the domain
corp.contoso.com domain. These GPOs are:
Accounting Security. This is a custom GPO created specifically for Contoso, Ltd.
Default Domain Controller Policy. Installing the AD DS server role creates this
policy by default. It contains policy settings that apply specifically to domain
controllers.
Default Domain Policy. Installing the AD DS server role creates this policy by
default. It contains policy settings that apply to all computers and users in the
domain.
At the top level of AD DS are sites and domains. Simple implementations will
have a single site and a single domain. Within a domain, you can create
organizational units (OUs). OUs are like folders in Windows Explorer. Instead
of containing files and subfolders, however, they can contain computers, users,
and other objects.
What does this have to do with Group Policy links? Well, GPOs in the Group
Policy objects folder have no impact unless you link them to a site, domain, or
OU. When you link a GPO to a container, Group Policy applies the GPO’s
settings to the computers and users in that container. In Figure 1, the callout
number 1 points to two GPOs linked to OUs:
The first GPO is named Default Domain Policy, and this GPO is linked to the
domain corp.contoso.com. This GPO applies to every computer and user in the
domain.
The second GPO is named Accounting Security, and this GPO is linked to the
OU named Accounting. This GPO applies to every computer and user in the
Accounting OU.
In the GPMC, you can create GPOs in the Group Policy objects folder and then
link them—two steps. You can also create and link a GPO in one step. Most of
the time, you will simply create and link a GPO in a single step, which the
section “Creating a GPO,” later in this white paper, describes.
As the previous section hinted, when you link a GPO to the domain, the GPO
applies to the computers and users in every OU and child OU in the domain.
Likewise, when you link a GPO to an OU, the GPO applies to the computers
and users in every child OU. This concept is called inheritance.
For example, if you create a GPO named Windows Firewall Settings and link it
to the corp.contoso.com domain in Figure 1, the settings in that GPO apply to
all of the OUs you see in the figure: Departments, Accounting, Engineering,
Management, Marketing, and Domain Controllers. If instead you link the GPO
to the Departments OU, the settings in the GPO apply only to the Departments,
Accounting, Engineering, Management, and Marketing OUs. It does not apply
to the entire domain or the Domain Controllers OU. Moving down one level, if
you link the same GPO to the Accounting OU in Figure 1, the settings in the
GPO apply only to the Accounting OU, as it has no child OUs. In the GPMC,
you can see what GPOs a container is inheriting by clicking the Group Policy
Inheritance tab (callout number 1 in Figure 2).
So, what happens if multiple GPOs contain the same setting? This is where
order of precedence comes into play. In general, the order in which Group
Policy applies GPOs determines precedence. The order is site, domain, OU, and
child OUs. As a result, GPOs in child OUs have a higher precedence than GPOs
linked to parent OUs, which have a higher precedence than GPOs linked to the
domain, which have a higher precedence than GPOs linked to the site. An easy
way to think of this is that Group Policy applies GPOs from the top down,
overwriting settings along the way. In more advanced scenarios, however, you
can override the order of precedence.
You can also have—within a single OU—multiple GPOs that contain the same
setting. Like before, the order in which Group Policy applies GPOs determines
Date Developed: Document No. 3 Revision # 01
CBLM in CSS NC II Issued by:
Set-Up Computer Developed by: Page 60 of 139
Servers
the order of precedence. In Figure 2, you see two GPOs linked to the domain
corp.contoso.com: Windows Firewall Settings and Default Domain Policy.
Group Policy applies GPOs with a lower link order after applying GPOs with a
higher link order. In this case, it will apply Windows Firewall Settings after
Default Domain Policy. Just remember that a link order of 1 is first priority,
and a link order of 2 is second priority. You can change the link order for a
container by clicking the up and down arrows as shown by callout number 2 in
Figure 2.
To this point, you have learned about GPOs. You have learned that GPMC is to
GPOs and OUs as Windows Explorer is to files and folders. GPOs are the policy
documents. At some point, you are going to have to edit one of those
documents, though, and the editor you use is the Group Policy Management
Editor (GPME), which Figure 3 shows. You open a GPO in the GPME by right-
clicking it in the GPMC and clicking Edit. Once you are finished, you simply
close the window. The GPME saves your changes automatically, so you do not
have to save.
Within the Computer Configuration and User Configuration folders, you see
two subfolders (callout numbers 3 and 4 in Figure 3):
When you are first learning Group Policy, most of the settings that you will
configure will be in the Administrative Templates folders. These are registry-
based policy settings that Group Policy enforces. They are different from other
policy settings for two reasons. First, Group Policy stores these settings in
specific registry locations, called the Policies branches, which standard user
accounts cannot change. Group Policy–aware Windows features and
applications look for these settings in the registry. If they find these policy
settings, they use the policy settings instead of the regular settings. They often
disable the user interface for those settings as well.
Second, administrative template files, which have the .admx extension, define
templates for these settings. These templates not only define where policy
settings go in the registry but also describe how to prompt for them in the
Date Developed: Document No. 3 Revision # 01
CBLM in CSS NC II Issued by:
Set-Up Computer Developed by: Page 62 of 139
Servers
GPME. In the Group Policy setting that Figure 4 shows, for example, an
administrative template file defines help text, available options, supported
operating systems, and so on.
When you edit a policy setting, you are usually confronted with the choices
that callout numbers 1 to 3 indicate in Figure 4. In general, clicking:
Enabled writes the policy setting to the registry with a value that enables it.
Disabled writes the policy setting to the registry with a value that disables it.
Not Configured leaves the policy setting undefined. Group Policy does not write
the policy setting to the registry, and so it has no impact on computers or
users.
Generalizing what enabled and disabled means for every policy setting is not
possible. You can usually read the help text, shown in callout number 5, to
Date Developed: Document No. 3 Revision # 01
CBLM in CSS NC II Issued by:
Set-Up Computer Developed by: Page 63 of 139
Servers
determine exactly what these choices mean. You must also be careful to read
the name of the policy setting. For example, some policy settings say, “Turn on
feature X,” whereas other policy settings say, “Turn off feature Y.” Enabled and
disabled have different meanings in each case. Until you are comfortable, make
sure you read the help text for policy settings you configure.
Some policy settings have additional options that you can configure. Callout
number 4 in Figure 4 shows the options that are available for the Group Policy
refresh interval policy setting. In most cases, the default values match the
default values for Windows. As well, the help text usually gives detailed
information about the options you can configure.
As you learned in the previous section, GPOs contain both computer and user
settings. Group Policy applies: Computer settings when Windows starts. User
settings after the user logs on to the computer.
Group Policy also refreshes GPOs on a regular basis, ensuring that Group
Policy applies new and changed GPOs without waiting for the computer to
restart or the user to log off. The period of time between these refreshes is
called the Group Policy refresh interval, and the default is 90 minutes with a
bit of randomness built in to prevent all computers from refreshing at the same
time. If you change a GPO in the middle of the day, Group Policy will apply
your changes within about 90 minutes. You don’t have to wait until the end of
the day, when users have logged off of or restarted their computers. In
advanced scenarios, you can change the default refresh interval.
You have now learned the essential Group Policy concepts. You know that a
GPO is like a document that contains policy settings. You manage GPOs by
using the GPMC and you edit them by using the GPME.
You also know that you link GPOs to AD DS sites, domains, and OUs to apply
the GPOs’ settings to those containers. Domains, OUs, and child OUs inherit
settings from their parents, but duplicate settings in GPOs linked to child OUs
have precedence over the same settings in GPOs linked to parent OUs, which
have precedence over GPOs linked to the domain, and so on.
Now that you know the essential concepts, you are ready to learn the essential
tasks. This section describes how to create, edit, and delete GPOs. It describes
many other tasks, as well. For each task, you’ll find an explanation of its
purpose and step-by-step instructions with screenshots at each step.
Creating a GPO
You create a GPO by using the GPMC. There are two ways to create a GPO:
Create a GPO in the Group Policy objects folder, and then link it to the domain
or OU.
The instructions in this section describe how to create and link a GPO in one
step.
You can start with a blank GPO, which the instructions describe, or you can
use a starter GPO. Starter GPOs are an advanced topic that you can learn
about in Working with Starter GPOs.
In the Name box on
the New GPO dialog box,
type a descriptive name
for the GPO, and then
click OK.
Editing a GPO
In the GPMC, you can open GPOs in the GPME to edit them within any
container. To see all of your GPOs, regardless of where you link them, use the
Group Policy objects folder to edit them.
To edit a GPO in the domain, an OU, or the Group Policy objects folder
If you create and link GPOs in one step, you do not have to manually link
GPOs to the domain or OUs. However, if you create a GPO in the Group Policy
objects folder or unlink a GPO and want to restore it, you will need to manually
link the GPO. The easy way to link a GPO is to simply drag the GPO from the
Group Policy objects folder and drop it onto the domain or OU to which you
want to link it.
While editing, testing, or troubleshooting GPOs, you do not need to wait for the
Group Policy refresh interval (90 minutes, by default). You can manually
update Group Policy on any client computer by running Gpupdate.exe.
Gpupdate.exe supports many command-line options, which you can learn
about by typing gpupdate.exe /? in a Command Prompt windows In most
cases, however, you can follow the instructions in this section to update Group
Policy.
Steps/Procedure:
Assessment Method:
Observation
Interview
CRITERIA
YES NO
Did you….
1. Configured Group Policy?
Learning Objectives:
This information sheet will cover the details on remote desktop services. It also
covers the procedures on how to set up remote desktop services.
Launch Server Manager, and select "roles." Once the roles manager
screen is up, check the box for Remote Desktop Services (see Figure 1).
Figure 2
Remote Desktop Services (RDS) includes several components (see Figure 3).
These components can be on one machine or many. Let's take a look at each of
them.
Remote Desktop Session Host: This is the new name of Terminal Server.
Remote Desktop Virtualization Host: This component integrates with Hyper-
V. This allows for the pooling of virtual machines on Hyper-V to be used for
virtual desktops.
Remote Desktop Connection Broker: This component is used to bridge the
user with a virtual desktop, remote application or Terminal Server session.
Remote Desktop Licensing: This is the new name of Terminal Server
licensing server that also includes licensing for Microsoft's Virtual Desktop
Infrastructure (VDI).
Remote Desktop Gateway: This provides a single connection point for clients
to connect to a specific virtual desktop, remote app or Terminal Server
session.
Remote Desktop Web Access: This provides clients an interface to access
their virtual desktop, remote app or Terminal Server sessions.
Figure 3
As with past Terminal Server licensing, there are two license options: per device
and per user (see Figure 4).
Figure 4
Select which users to give access to the local terminal services. This component
is not required for RDS to work. If you choose to install "Remote Desktop
Session Host" as I have, you will get this prompt (see Figure 5).
The next screen is "Configure Client Experience" (see Figure 6). This is where
you set the defaults for the experience the end user will have with the VDI
system.
Figure 6
Date Developed: Document No. 3 Revision # 01
CBLM in CSS NC II Issued by:
Set-Up Computer Developed by: Page 78 of 139
Servers
Step 6: Configure license scope (see Figure 7)
Just as with Terminal Server of the past, you can configure the scope of the
license server. You have the following two options:
1. Domain: This limits the licensing to only servers in the domain.
2. Forest: This allows any Terminal Server in the forest to attain a license.
Figure 7
Step 7: Assigning the SSL certificate for Remote Desktop Gateway (see
Figure 8)
The Remote Desktop Gateway uses Secure Sockets Layer (SSL) to tunnel and
encrypt traffic from the client. This functionality requires a certificate. There
are two options for certificates:
1. Specify a certificate from the certificate store.
2. Produce a self-signed certificate.
In either case, the client must trust the certificate.
These next few screens go beyond the scope of RDS but are related, so I will
just cover the basics.
I skipped this part because it is beyond this article's scope. This is where you
would configure a policy that states who is allowed to use the Remote Desktop
Gateway.
Install and configure network access and protection policies (see Figure
10 and Figure 11)
This is used to configure and enforce network access polices such as IPsec and
network access protection from the client. This feature can also be used to
define different policies based on users' connectivity (dial-up or virtual private
network).
Figure 11
Remote Desktop Web Access requires Internet Information Services (IIS), so the
next two screens are for installing and configuring IIS. Figure 12 is an overview
screen, while Figure 13 is the configuration screen.
Figure 12
Step 10: The final steps
At this point, you're done. The last two screens just let you know what you're
installing (see Figure 14), and a final screen (see Figure 15) lets you know
whether any additional steps like rebooting are required.
Figure 15
Now that you have installed and configured RDS, you can start using Terminal
Services and Remote Desktop Gateway Manager.
Steps/Procedure:
Assessment Method:
Observation
Interview
CRITERIA
YES NO
Did you….
1. Set up Remote Desktop Services?
Learning Objectives:
This information sheet will cover the details on File Server and procedures on
how to install and configure file server.
File server
In the client/server model, a file server is a computer responsible for the
central storage and management of data files so that other computers on the
same network can access the files. A file server allows users to share
information over a network without having to physically transfer files by floppy
diskette or some other external storage device. Any computer can be configured
to be a host and act as a file server. In its simplest form, a file server may be an
ordinary PC that handles requests for files and sends them over the network.
In a more sophisticated network, a file server might be a dedicated network-
attached storage (NAS) device that also serves as a remote hard disk drive for
other computers, allowing anyone on the network to store files on it as if to
their own hard drive.
Open "Server Manager" and click "Add Role". Select "File Services" from the
Server role list.
Permissions:
Traverse folder / execute file
List folder / read data
Read attributes
Read extended attributes
Read permissions
________ 4. You can hide the share using the dollar sign ($) at the end of the
share name
Steps/Procedure:
Assessment Method:
Observation
Interview
CRITERIA
YES NO
Did you….
1. Configure and Install File Server?
Learning Objectives:
This information sheet will cover the details on Managing remote print server.
It also covers details on how to manage remote print server.
In the previous chapter it was stated that the Print Management tool provides a
central location from which the print services for an entire network may be
managed. So far we have only looked and managing the print server running
on the local computer. In this section we will look at adding remote servers to
the local Print Management configuration.
For the purposes of this example a theoretical configuration consisting of two
Windows Server 2008 systems named winserver-1 and winserver-2 is assumed.
Both systems have the print services role installed and Print Management
on winserver-1will be configured to also manage print services on winserver-2.
This is achieved by first launching Print Management on the local winserver-
1 system (Start -> Administration Tools -> Print Management), right clicking on
the Print Servers node of the tree hierarchy in the left hand pane and selecting
the Add/Remove Servers option.
From the resulting menu, select the Add/Remove Servers option. The resulting
dialog box displays the currently configured print servers under the
management of local Print Management. If no remote print servers have been
added previously the only server listed will be the local system. To add
additional print servers either enter a comma separated list of server names, or
use the Browse button to locate servers on the network. When one or more
servers have been selected, click on the Add to list button to add the servers to
Once all the required remote print servers have been added to the list, click
on Apply then close the dialog to return to the main Print Management
window. The new print servers will now appear alongside the local server
under Print Servers in the left hand pane of the Print Management screen as
illustrated below:
Windows Server 2008 also provides the ability to migrate both printers and
print queues from one print server to another. This makes it easy, for example,
to take a print server off-line for maintenance or to permanently re-assign a
printer from one print server to another. The steps outlined below assume that
print Management has been configured to manage both the source and target
print servers as outlined in the preceding section of this chapter. If this is not
the case, the printer export file will need to be copied onto the destination
server or made available via file sharing and imported using Print Management
on that server.
This form of migration is performed using the Printer Migration Wizard which,
along with most other tasks, is accessed from the Print Management interface.
Once Print Management is up and running, right click on the server in the left
pane from which the printer is to be migrated (the source server) and
select Export Printers To a File from the menu. Print Management will
subsequently display a dialog listing the printer drivers, port and queues
currently configured on the selected print server as illustrated below:
Once the required settings are configured, click Next to initiate the printer
import process. The printer configurations, drivers and queues will be
subsequently be imported onto the target print server. If errors are reported
click on the Open Event Viewer button to obtain additional information. In
particular, be mindful of printers that were physically connected to the source
print server. Since they are not physically connected to the target server an
error will likely occur during the migration. Even if the printer was physically
moved to the target system prior to migration it is also possible that it is
connected to a different physical port to that used on the source server. Such
problems can be resolved by right clicking on the imported printer in Print
Management, selecting Properties and making the necessary configuration
changes.
Permission Description
Allows user and groups to manage print jobs but does not
provide the ability to print. Permissions consist of pausing,
Manage
restarting, resuming and reordering and canceling print jobs.
Documents
Includes the Read, Change and Take Ownership special
permissions
Permission Description
Read Permissions User or Group may view the permissions on the printer.
Change
User or Group may change the permissions of a printer.
Permissions
The current permissions for a printer may be viewed and changed by right
clicking on that printer in the Print Management tool (Start -> Administrative
Tools -> Print Management), selecting Properties and clicking on
the Security tab:
To modify the permissions for a user or group select that object from the list
and click Edit... to display the Permission Entry for dialog. In this dialog both
the standard and special permissions for the selected user or group are
displayed and may be changed as required. As noted previously, certain special
permissions are implicit in standard permission settings. For example, setting
the Manage Printers standard permission also enables
the Read, Change and Take Ownership special permissions. Once the desired
permission changes have been made click on OK to dismiss the Permission
Entry for dialog, followed by Apply, then OK in the Advanced Security
Settings dialog. Finally, click on OK to dismiss the properties dialog and return
to Print Management.
After a printer has been installed the owner, by default, is SYSTEM. Ownership
may be taken either by an administrator or by a user or group which has been
assigned Take ownership permission for the printer.
To assign ownership to another user or group, open the properties dialog for
the printer, select the Security tab and then click on Advanced. In the
advanced settings screen, select the Owner tab. This screen will list the current
owner, together with a list of users and group to which ownership may be
changed. If the intended new owner is not listed in the Change owner to: list,
click on the Other users or groups... button to access the Select User or
Group dialog box. Enter the name of a user or group and click on the Check
Names button. With the correct name selected, click on OK to return to the list
of owners. Select the desired owner from the list and click on Apply to commit
the change of ownership.
Printer Pooling refers to the process of allocating multiple physical print devices
to a single logical printer. In such a configuration print jobs to the logical
printer are assigned by the print server to the first available physical printer in
the pool. A key requirement is that the physical printers that make up a pool
must all use the same print driver and have the same amount of memory.
To configure printer pooling, install a printer such that it uses a particular port
(such as a local port or IP address). Attach the other printers that are to make
up the pool, but do not install them via Print Management. Once the first
printer is installed, open the properties dialog for that printer by right clicking
on it in Print Management and select the Ports tab. In the Ports page select
the Enable printer pooling option. If the ports to which the additional printers
are connected are listed make sure they are all selected. Note that a pool can
be made up of printers connected in any combination of ways (network, serial,
parallel, USB etc). In the case of network printers, click on Add Port... and
enter the IP address of the additional printer, click New Port... and allow the
wizard to create the new port. Once all the new ports are added and selected,
click Apply to create the printer pool. The following figure illustrates a printer
pool comprising three HP Deskjet network printers:
Rather than working with the actual physical printers, users are in fact
working with logical printers which map onto a physical print device. Windows
allows a single physical print device to be assigned to multiple logical printers.
This approach brings considerable flexibility in terms of controlling the
availability of a printer to different groups of users and the priority of their
print jobs.
This concept is best described by example. Suppose that a printer is to be
made available to members of an engineering group only during the office
hours. That same printer, however, is to always be available to the
management group. Similarly, any print jobs belonging to the management
group must be given a higher priority than those of the engineering group. To
achieve this objective, two logical printers assigned to the same physical print
device will be created, one for engineering and one for management. The
availability of the engineering logical printer will be restricted to office hours
and given a low priority. The management logical printer will always be
available and will be given a high priority. Permissions on the logical printers
will then be configured such that the engineering team is denied access to the
management printer.
Date Developed: Document No. 3 Revision # 01
CBLM in CSS NC II Issued by:
Set-Up Computer Developed by: Page 115 of 139
Servers
Availability and priority is configured from the printer property panel. To
access these settings, launch Print Management and navigate to the required
printer in the left pane. Right click on the printer, select Properties and then
choose the Advanced tab. Once selected, the property panel will appear as
follows:
________ 1. Windows Server 2008 does not provides the ability to migrate both
printers and print queues from one print server to another.
________ 4. User or Group may not take ownership of printer and/or print jobs.
1. F
2. T
3. T
4. F
5. T
Learning Objectives:
This information sheet will cover the details on how to install and deploy print
server to client.
The first step in setting up a Windows Server 2008 print server is to install the
Print Server role. This is achieved by launching the Server Manager,
selecting Roles item from the tree in the left pane and clicking on Add Roles. In
the Add Roles Wizard click next on the Welcome screen if one appears and then
select the Print Services option. Click Next and read the information displayed
before clicking Next once again to proceed to the Select Role Services screen.
On this screen a number of different service options are available for selection
and installation as outlined in the following table:
Option Description
Print Installs the print server and Print Management console. This is a
Server prerequisite for configuring print services on Windows Server 2008.
LDP Installs the TCP/IP Line Printer Daemon Service (LPDSV) allowing
Service UNIX, Linux and other Line Printer Remote (LPR0) based
computers to print via the print server. This setting also opens port
in the Windows Firewall.
Internet Creates an Internet Information Service (IIS) hosted web site where
Printing users can manage printers and connect and print to shared
printers hosted in the server using the Internet Printing Protocol
(IPP). The default URL for the web site is
http://servername/Printers, where servername is the name of the
server running the print services.
Date Developed: Document No. 3 Revision # 01
CBLM in CSS NC II Issued by:
Set-Up Computer Developed by: Page 119 of 139
Servers
With the required options selected, click Next. Note that if Internet Printing was
selected and the IIS role is not currently installed in the server, the wizard will
prompt to add additional roles. If prompted, click on the Add Required Role
Services button to proceed. Click Next on any information pages that may be
displayed until the Confirmation screen appears. After reviewing the summary
information provided, click Install to initiate the installation process.
Once print services are installed a number of print management tools are now
available on the system. First and foremost is the Print Management snap-in
which may be accessed via Start -> All Programs -> Administrative Tools -> Print
Management. A useful command-line tool is also available in the form of the
Print Backup Recovery Migration tool. The executable is named Printbrm.exe
and is located in %SystemRoot%\System32\Spool\Tools.
The scripts are executed using the cscript.exe command and when run without
any command-line options will display a list of supported options. For example:
cscript prnjobs.vbs
Arguments:
-j - job id
Examples:
prnjobs -z -p printer -j jobid
prnjobs -l -p printer
prnjobs -l
Obviously, a print server without any printers isn't going to be of much use.
Not surprisingly, therefore, the next step after installing Print Services is to add
printers. Printers may either be network based, or locally connected to the
server. In the case of network printers, these may be added either manually or
using auto-detection. Under auto-detection, Print Management scans the
subnet on which the server resides and searches for any devices it can identify
as being printers. As printers are detected on the network they are displayed in
a list here they may be selected and added to the print server.
To add network printers using auto-detection, open the Print Management tool
via Start -> All Programs -> Administrative Tools -> Print Management, unfold
the Print Servers from the list in the left pane, right click the local or remote
print server to which the new printer is to be added and select Add Printer....
This will display the Network Printer Installation Wizard as illustrated below:
If no printers are detected, ensure that the printers are connected to the
network and powered on and are on the same subnet as the print server. Once
the scan is complete, select the required printer from the list and click Next to
proceed to the Printer Driver screen. If a driver for the printer is already
installed, select it from the drop down list. Alternatively select the Install a new
driver option and click Next to proceed to the Printer Installation screen where a
Date Developed: Document No. 3 Revision # 01
CBLM in CSS NC II Issued by:
Set-Up Computer Developed by: Page 122 of 139
Servers
list of printer manufacturers and models is presented. Select the make and
model of the printer from the list:
If the make and model of printer are not listed, check to see if the printer was
supplied with a driver disk, or whether a driver can be obtained from the
manufacturer's web site. Assuming this to be the case, use the Have
Disk button to browse for and select the appropriate manufacturer driver. With
either a printer selected from the list, or a suitable driver specified, click
on Next to configure the Printer Name and Share Settings. On this screen, enter
the name by which the new printer will be shared to clients over the network. If
the printer is not to be shared, ensure that the Share this printer is not
selected. Also, enter a location description (for example, "Printer in Accounts")
and comment if desired. Click Next to display the printer summary screen as
illustrated below where the selected settings are presented for review:
The preceding section discussed the use of auto-detection to locate and install
and network attached printer. This section will cover the manual installation of
a network printer. As with auto-detection, begin by invoking the Print
Management tool (Start -> All Programs -> Administrative Tools -> Print
Management), unfold the Print Servers category from the list in the left pane,
right click the local or remote print server to which the new printer is to be
added and select Add Printer.... This will launch the Network Printer Installation
Wizard. On the initial page of the wizard select the option labeledAdd a TCP/IP
or Web Services Printer by IP address or hostname and click Next to proceed to
the Printer Address screen. If the type of printer is known (TCP/IP
device or Web Services Printer) make the appropriate selection. Alternatively,
leave the setting as Auto Detect to have the wizard identify the printer type.
Enter the IP address or hostname of the printer to be added to the print server.
The wizard will automatically generate a unique port name to accompany the
IP address or hostname. The option is also provided to have the wizard attempt
to identify the appropriate driver for the new printer. The following figure
illustrates the screen as described:
Since servers are generally sequestered in climate controlled server room and
printers are located in proximity to the users it always seems a little odd to talk
about installing printers with are locally connected to servers. That said, it is a
topic which needs to covered, and cover it we will.
Local printers will be connected to the server using a serial (COM) port, a
parallel (LPT) port or a Universal Serial Bus (USB) port. Often, Windows will
automatically detect a new printer as soon as it is connected and powered up.
In this situation an icon will appear in the task bar indicating that the new
device has been detected. Clicking on this icon presents the option to view
details about the installation process, resulting in the appearance of a dialog
Date Developed: Document No. 3 Revision # 01
CBLM in CSS NC II Issued by:
Set-Up Computer Developed by: Page 125 of 139
Servers
similar to the one illustrated below, where a Brother MFC-420CN printer has
been detected and is being installed:
Once the printer has been installed, it will likely need to be configured for
network sharing. To achieve this, launch the Print Management tool, select the
print server to which the printer is physically connected and click on Printers.
The center pane of the tool will display a list of printers installed on the current
print server. Identify the required printer in the list, double click on it to
display the properties dialog and select the Sharing tab:
HERE ARE THE STEPS FOR THE RESETTING THE PRINTER SERVER.
For TL-WPS510U, when the Wireless LED light flashes regularly, the TL-
WPS510U has finished the resetting and you can see the WLAN-PS Ad-Hoc
network in your wireless network list.
The following steps illustrate how to install a network printer using TCP/IP in
Windows 7. In order to complete the steps you will need to know details such
as the printer model and IP address. Click the Start button, type print in the
Search programs and files box and click Add a printer
3. Click Next
4. In the Hostname or IP Address field enter the IP Address for the printer
you are adding
Instuctions for looking up your IP Address (authentication required)
7. Click Next
8. Click the bullet beside Use the driver that is currently installed
(recommended)
Self-Check 3.3-2
1. What are the steps for the resetting the printer server.
Learning Objectives:
This information sheet will cover the details on how to perform test printing on
server and client computers.
Those who have multiple computers in their home or workplace may want to
share a printer for convenience or cost efficiency. This document contains
different ways you may make a printer available to multiple computers using
various methods. Before you share a printer on a network, you should decide
what configuration you'd like to go with. Below are the different setups and
their advantages and disadvantages.
Wireless printer
Printer connected to a computer or server
Dedicated print server
Wireless printer
The most common solution for distributing a printer (because of the ease and
price) is to connect it to a host computer. Essentially, the host computer
"shares" the printer by allowing other computers on the network to print
through it over a Local Area Network or Internet connection. The primary
disadvantage of this method is that the host computer must always be on in
order for other machines to use the printer. In order to print through another
machine on your network, you must already have a network setup at your
home as well as a printer installed on the host computer.
Another option is a hardware device called a print server. Print servers enable
you to connect a small appliance to your network that delegates and queues
print jobs for multiple machines. They have the advantage of being able to be
used when the main computer connected to your printer is turned off (network
printer setup), but the disadvantage of added cost in addition to setup time.
Self-Check 3.3-2
Date Developed: Document No. 3 Revision # 01
CBLM in CSS NC II Issued by:
Set-Up Computer Developed by: Page 137 of 139
Servers
Enumeration: Answer the following question. Write your answer on a separate
sheet of paper.