0% found this document useful (0 votes)
21 views21 pages

RahulUpreti3

Uploaded by

durlavregmi123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views21 pages

RahulUpreti3

Uploaded by

durlavregmi123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Module Code & Module Title Level

5 – Operating Systems

Assessment Type
Logbook 3
Semester 3rd
2024 Autumn

Student Name: RAHUL UPRETI


London Met ID: 23048517
College ID: NP01NT4A230050
Assignment Due Date: Thursday, November 21, 2024
Assignment Submission Date: Tuesday, November 21, 2024
Submitted To: Umesh Nepal
Word Count (Where Required):972

I confirm that I understand my coursework needs to be submitted online via MST Classroom under the relevant
module page before the deadline in order for my assignment to be accepted and marked. I am fully aware that
late submissions will be treated as non-submission and a mark of zero will be awarded.
Table of Contents
1. Introduction.................................................................................................................................................. 4
2. Aim : ............................................................................................................................................................. 4
3. Objectives : ................................................................................................................................................... 4
4. Tasks done : .................................................................................................................................................. 4
5. Conslusion .................................................................................................................................................... 9

7. Adding a new user in Windows using the PowerShell : ....................................................... 23


8. Deleting a user : ......................................................................................................................... 24
9. Using variables and secure strings for password storage : ................................................. 25
Table of Figures :
Figure 1:Click on Computer name .............................................................................. 5
Figure 2:Click on change ............................................................................................ 6
Figure 3:Click on OK .................................................................................................. 7
Figure 4:Sever or Computer name is now changed to Shubham10 ........................... 7
Figure 5:Click on Remote Desktop button .................................................................. 8
Figure 6:Click on Second option and press OK .......................................................... 9
Figure 7: Remote Desktop is now enabled ............................................................... 10
Figure 8:Click on Ethernet Icon ................................................................................ 11
Figure 9: Click on Properties .................................................................................... 12
Figure 10:Click on Fourth option .............................................................................. 12
Figure 11:Fill up and press ok .................................................................................. 13
Figure 12:Click on time zone .................................................................................... 14
Figure 13:Click on change time zone ....................................................................... 15
Figure 14:Set TIme zone .......................................................................................... 15
Figure 15:Press OK .................................................................................................. 16
Figure 16:Click on IE Enhanced Security Configuration ........................................... 17
Figure 17:CLick on OFF option in both credentials .................................................. 18
Figure 18:The IE Enhanced Security Configuration has turned off .......................... 18
Figure 19:Go to Tools and click on computer management ..................................... 19
Figure 20:Click on Local Users and Groups ............................................................. 20
Figure 21:Right click on Users and go to New User ................................................. 20
Figure 22:Click on create ......................................................................................... 21
Figure 23: New user is created ................................................................................ 22
Figure 24:Creating New user using Windows powershell ........................................ 23
Figure 25:Removing a user ...................................................................................... 24
Figure 26:Setting the password ................................................................................ 25
1. Introduction

This logbook explores fundamental administrative operations in a Windows Server


environment. The tasks covered range from server renaming and IP address configuration
to user account management and secure password handling. These procedures are integral
for maintaining server efficiency, ensuring secure access, and optimizing system
functionality. The step-by-step methodology ensures systematic execution, fostering an
understanding of essential server management techniques.

2. Aim :
To learn and perform critical server management tasks on Windows Server, including
system configuration, enabling remote functionalities, managing users, and implementing
security measures for efficient and secure system operation.

3. Objectives :
1. Modify the server name to reflect specific system requirements.
2. Enable remote desktop for simplified remote administration.
3. Configure a static IP address for consistent network identification.
4. Adjust the system time zone to match regional settings.
5. Disable Internet Explorer's enhanced security settings and update the
system.
6. Create user accounts via GUI
7. Create user accounts via command-line interfaces.
8. Remove unnecessary user accounts from the system.
9. Implement secure password storage using variables and encryption
techniques

4. Tasks done :
1. Modify the server name to reflect specific system requirements.
1. On the dashboard of the Server Manager, click on Local Server.

2. Press Computer name and a window will appear allowing you to change the
Server name.

3. Then proceed to click the “Change Button” located on the left side of the new
window.

4. Set the server name according to the requirements and click “OK” to confirm
the change.

5. A prompt will appear requesting to restart the system to switch the name
when you click “OK.”

Figure 1: Click on Computer name


Figure 2:Click on change

Figure 3: Click on OK
Figure 4: Sever or Computer name is now changed to Shubham10

2. Enabling Remote Desktop:

1. To commence, click on the Remote Desktop Button and a window will come
up.

2. Press the allow button which prompts a security warning regarding the
firewall. Remote desktop service will be operational after “OK” is pressed.

Figure 5:Click on Remote Desktop button


Figure 6:Click on Second option and press OK

Figure 7: Remote Desktop is now enabled


3. Static Ip-address Setup :

1. Press the Ethernet button to specify an IP address. This will display a list of
servers’ network adapters.

2. Select the adopter to enlarge the properties by right-clicking on it.

3. Select IPv4 from the list by double-clicking. A window will appear which asks
the user to type the address.

4. Write the IP address of the device, the subnet mask, the gateway, and the
primary and secondary DNS server addresses.

Figure 8:Click on Ethernet Icon


Figure 9: Click on Properties

Figure 10:Click on Fourth option


Figure 11:Fill up and press ok

4. Changing the time zone :

1. In the Server Manager, change the time zone by selecting it from the drop -
down on the time zone.

2. A new window appears that announces the time zone and the corresponding
time zone change.

3. In the pop-up select a country from the drop-down list and hit the OK button.
Figure 12:Click on time zone

Figure 13:Click on change time zone

Figure 14:Set TIme zone


Figure 15:Press OK

5. Turning off IE enhanced security and checking for updates :

1. Click on the IE Enhanced Security button to switch off the IE enhanced


security features.

2. Also, the security configuration is the default one, from the Intranet Zone as
well as the browser security settings themselves, Custom.

3. For both Admin and users the IE security is deselected and press OK
‘Apply’

4. Click on the Update button and check for changes in the windows update. If
there are new updated available those will be downloaded and installed on
the machine without any manual configurations.
Figure 16:Click on IE Enhanced Security Configuration

Figure 17:CLick on OFF option in both credentials


Figure 18:The IE Enhanced Security Configuration has turned off

6. Adding user using GUI :

1. At the Server Manager window, click the bar on the right top of the screen,
click Tools and in the Tools list click Computer Management.

2. Then find and click on the Local Uses and Groups at the bottom left part of
the window.

3. Users should be located on the right side and in that tab right click and select
new user option.

4. Create an account and fill in the necessary details on newly created users.

5. •It is noted that the new user will be added.


Figure 19:Go to Tools and click on computer management

Figure 20:Click on Local Users and Groups


Figure 21:Right click on Users and go to New User

Figure 22:Click on create


Figure 23: New user is created
7

7. Adding a new user in Windows using the PowerShell :


1. Windows Powershell needs to be opened.

2. For all the users, give the command “get-localuser”.

3. By deploying the command, new user creation is done: "new-localuser


name ‘username’ -description ‘description’ -password’password’ “ .

4. A new user has been added successfully.

Figure 24:Creating New user using Windows powershell

8. Deleting a user :

1. One other option is removing a user. In order to remove a user “New


user 2” the following command is executed “remove-localuser –name
New user
2”.
8

2. The user now does not appear on the system.

Figure 25:Removing a user

9. Using variables and secure strings for password storage :

1. New variables are created though string storage using the command $variable
– red-host –assecurestring.

2. Alphanumeric and symbolic passwords are powerful with regard to security.

Figure 26:Setting the password


9

5. Conslusion

This logbook highlights essential server management tasks, providing a hands-on


approach to configuring system settings, managing users, and enhancing security.
Successfully completing these tasks ensures a well-maintained, secure, and
efficiently functioning Windows Server environment, crucial for any IT infrastructure.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy