Installing and Configuring Ws 2012
Installing and Configuring Ws 2012
20410C
Installing and Configuring Windows Server2012
1
1
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any forro or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of MicrosoftCorporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other forro of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein. 2014 Microsoft Corporation. All rights reserved. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty /Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners.
1-1
Module 1
Deploying and Managing Windows Server2012
Contents:
Module Overview Lesson 1: Windows Server 2012 R2 Overview Lesson 2: Installing Windows Server 2012 R2 Lesson 3: Post-Installation Configuration of Windows Server 2012 R2 Lesson 4: Overview of Windows Server 2012 R2 Management Lesson 5: Introduction to Windows PowerShell Lab: Deploying and Managing Windows Server 2012 R2 Module Review and Takeaways 1-1 1-2 1-13 1-20 1-31 1-38 1-46 1-54
Module Overview
Understanding the capabilities of a new Windows Server 2012 R2 operating system enables you to leverage that operating system effectively. If you do not understand the capabilities of your new Windows Server 2012 R2 operating system, you might end up using it the same way that you used the previous operating system, which would forego the advantages of the new system. By understanding how to utilize your new Windows Server 2012 R2 operating system fully, and by understanding the tools that are available to manage that functionality, you can provide your organization with more value. This module introduces the new Windows Server 2012 R2 administrative interface. In this module, you will learn about the different roles and features that are available with the Windows Server 2012 R2 operating system. You will also learn about the different installation options that you can use when you install Windows Server 2012 R2. This module discusses the configuration steps that you can perform both during installation and after deployment to ensure that the servers can begin functioning in its assigned role. You will also learn how to use Windows PowerShell to perform common administrative tasks in Windows Server 2012 R2.
Objectives
After completing this module, you will be able to: Describe Windows Server 2012 R2. Install Windows Server 2012 R2. Perform post-installation configuration of Windows Server 2012 R2. Describe the management tools available in Windows Server 2012 R2. Perform basic administrative tasks using Windows PowerShell.
Lesson 1
WindowsServer2012 R2 Overview
Before deploying Windows Server 2012 R2, you need to understand how each of the Windows Server 2012 R2 editions might benefit your organization's servers. You also need to know whether a particular hardware configuration is appropriate for Windows Server 2012 R2, whether a virtual deployment might be more suitable than a physical deployment, and which installation source allows you to deploy Windows Server 2012 R2 in an efficient manner. If you do not have an understanding of these issues, you could end up costing your organization time and money by making a choice that you must later correct. This lesson provides an overview of the various Windows Server 2012 R2 editions, installation options, roles, and features. Using this information, you will be able to determine which Windows Server 2012 R2 edition and installation options are right for your organization.
Lesson Objectives.
After completing this lesson, you will be able to: Describe the different Windows Server 2012 R2 editions. Describe the purpose and function of a Windows Server 2012 R2 Server Core installation. Explain the function of Windows Server 2012 R2 roles. Explain the purpose of various Windows Server 2012 R2 featu res.
1 1
(continued from previous page) Edition The Windows Server 2012 R2 Foundation operating system The Windows Server 2012 R2 Essentials operating system Description Designed for small business owners, it allows only 15 users, cannot be joined to a domain, and includes limited server roles. Supports one processor core and up to 32 gigabytes (GB) of RAM. Next edition of Small Business Server. It is now available in two forms: - As an installable server role in an existing domain. - As a core Windows Server edition on a virtual machine (using a wizard).
1 1 1 1 1 1
It cannot function as a Hyper-V, Failover Clustering, Server Core, or Remote Desktop Services server. It has limits for 25 users and 50 devices. Supports two processor cores and 64 GB of RAM. There are many new features and improvements for Windows Server 2012 R2 Essentials R2, including client deployment, user management, storage and data protection, and Office 365 integration. Microsoft Hyper-V Server 2012 Standalone Hyper-V platform for virtual machines with no UI. No licensing cost (free) for host operating system, but virtual machines are licensed normally. Supports 64 sockets and 4 TB of RAM. Supports domain join. Does not support other Windows Server 2012 R2 roles, other than limited file services featu res. Entry-level unified storage appliance. Limited to 50 users, one processor core, 32 GB of RAM. Supports domain join.
The Windows Storage Server2012Workgroup operating system i 1-The Windows Storage 1 Server 2012 Standard operating system
Supports 64 sockets, but is licensed on a two-socket, incrementing basic. Supports 4 TB of RAM. Includes two virtual machine licenses. Supports domain join. Supports some roles, including DNS and DHCP Server roles, but does not support others, including Active Directory Domain Services (AD DS), Active Directory Certificate Services (AD CS), and Active Directory Federation Services (AD FS). Supports multiple users accessing the same host computer directly using separate mouse, keyboard, and monitors. Limited to one socket, 32 GB of RAM, and a maximum of 12 sessions. Supports some roles, including DNS and DHCP Server roles, but does not support others, including AD DS, AD CS, and AD FS. Does not support domain join. Supports multiple users accessing the same host computer directly using separate mouse, keyboard, and monitors. Limited to two sockets, 4 TB of RAM, and a maximum of 22 sessions. Supports some roles, including DNS and DHCP Server roles, but does not support others, including AD DS, AD CS, and AD FS. Supports domain join.
Reference Links: For detailed information on the new features in Windows Server 2012 R2 Essentials, see "What's New in Windows Server 2012 R2 Essentials" at http://go.nnicrosoft.com/fwlink/?LinkID=331071.
Additional Reading: For more information about the differences between Windows Server 2012 R2 editions, download the Windows Server 2012 R2 Products and Editions Comparison chartathttp://go.microsoft.com/fwlink/?LinkID=331070.
Reference Links: Many featu res have been removed or deprecated in Windows Server 2012 R2. For more information, go to: Features Removed or Deprecated in Windows Server 2012 R2 Preview at http://go.microsoft.com/fwlink/?LinkID=331069.
What IsServerCore?
Server Core is an installation option for Windows Server 2012 R2 that can contain variations of the Graphical User Interface (GUI) depending on the requirements of the server roles to be installed. You can manage Server Core locally by using Windows PowerShell or a command-line interface, rather than by using GUI-based tools, or remotely by using one of the remote management options. Remote management is covered later in this module. A Windows Server 2012 R2 Server Core installation offers fewer components and administrative management options than the full installation of Windows Server 2012 R2. Server Core installation is the default installation option when installing Windows Server 2012 R2. Server Core has the following advantages over a traditional Windows Server 2012 R2 deployment: Reduced update requirements. Because Server Core installs fewer components, its deployment requires you to install fewer software updates. This reduces the number of monthly reboots required and the amount of time required for an administrator to service Server Core. Reduced hardware footprint. Server Core computers require less RAM and less hard disk space. When virtualized, this means that you can deploy more servers on the same host. Increasing numbers of Microsoft server programs are designed to run on computers with Server Core installed operating systems. For example, you can install SQL Server 2012 on computers that are running the Server Coreinstalled version of Windows Server 2012 R2. You can switch from Server Core to the graphical version of Windows Server 2012 R2 by running the following Windows PowerShell cmdlet, where c:\mount is the root directory of a mounted image that hosts the full version of the Windows Server 2012 R2 installation filen: Install -WindowsFeature -IncludeA77SubFeature User-Interfaces-Infra -Source c:\mount You can also use Windows Update or the installation DVD as the installation file source. Installing the graphical components gives you the option of performing administrative tasks using the graphical tools. Once you have performed the necessary administrative tasks, you can return the computer to its original Server Core configuration. You can switch a computer that has the graphical version of Windows Server 2012 R2 to Server Core by removing the following components of the User Interfaces and Infrastructure featu re: Graphical Management Tools and Infrastructure. This contains a minimal server interface to provide some server management user interface tools such as Server Manager and Administrative Tools. Server Graphical Shell. This contains the full GUI including Internet Explorer and File Explorer and other user interface components. This has a larger footprint than the Graphical Management Tools and Infrastructure option. 5- Note that if you enable remote management, you rarely will need to sign in locally Server Core. is a more secure, less resource-ntensive installation option Can be converted to full graphical shell version of Windows Server 2012 ls the default installation option for Windows Server 2012 is managed locally using sconfig.cmd
Note: Be careful when removing graphical features, because servers might have other components installed that are dependent upon those features.
When connected locally, you can use the tools that are listed in the following table to manage Server Core deployments of Windows Server 2012 R2. I Tool Cmd.exe Function Allows you to run traditional command-line tools such as ping.exe, ipconfig.exe, and netsh.exe. Launches a Windows PowerShell session on the Server Core deployment. You can then perform Windows PowerShell tasks normally. Windows Server 2012 R2 comes with Windows PowerShell version 4.0 installed. A command-line menu-driven administrative tool that allows you to perform most common server administrative tasks. Allows you to use the Notepad.exe text editor within the Server Core environment. Provides registry access within the Server Core environment. Allows you to view system information about the Server Core deployment. Launches the Task Manager. Used to enable Remote Desktop on the Server Core deployment.
PowerShell.exe
Sconfig.cmd
Notepad.exe
Note: If you accidentally close the command window on a computer that is running Server Core, you can recover the command window by performing the following steps: 1. 2. Press the Ctrl+Alt+ Del keys, and then click Task Manager. From the File menu, click New Task (Run...), and then type cmd.exe.
Server Core supports most Windows Server 2012 R2 roles and features. However, you cannot install the following roles on a computer running Server Core: AD FS Application Server Network Policy and Access Services (NPAS) Windows Deployment Services
Even if a role is available to a computer that is running the Server Core installation option, a specific role service that is associated with that role might not be available.
: --1 1"- Note: You can check which roles on Server Core are available and which are not by running the query Get-WindowsFeature 1 where-object ($_.InstallState -eq "Removed").
You can use the following tools to remotely manage a computer that is running the Server Core installation option: Server Manager. You can add a server that is running Server Core to Server Manager that is on a server which is running a full installation of Windows. You can then use Server Manager to manage the server roles running on the Server Core computer. You can configure Remote Desktop by using Sconfig.cmd. Remote Windows PowerShell. You can use Remote Windows PowerShell to run Windows PowerShell commands or scripts against correctly-configured remote servers if the script is hosted on the local server. With Remote Windows PowerShell, you also can locally load Windows PowerShell modules, such as Server Manager, and execute the cmdlets available in that module against appropriatelyconfig u red remote servers. Remote Desktop. You can connect to a computer that is running the Server Core installation option by using Remote Desktop. Configure Remote Desktop by using Sconfig.cmd. Remote Management Consoles. For most server roles, you can add a computer tht is running the Server Core installation option to a management console that is running on another computer.
WindowsServer2012R2Roles
To correctly plan how you are going to use Windows Server 2012 R2 to support your organization's requirements, you need to be fully aware of what roles are available as part of the operating system. Each version of Windows Server comes with a different set of roles. As new versions of Windows Server are released, some roles are enhanced and others are deprecated. For the most part, the roles that are available in Windows Server 2012 R2 are familiar to IT professionals that have managed Windows Server 2008 and Windows Server 2003. Windows Server 2012 R2 supports the server roles that are listed in the following table. Role AD CS Allows you to deploy certification authorities and related role services. A centralized store of information about network objects, including user and computer accounts. Used for authentication and authorization. Windows Server 2003 domain and functional levels of AD DS and the File Replication Service have been deprecated in Windows Server 2012 R2
Functions Web Server Domain Controller Certificate Server Roles Roles are made up of role services components that provide additional functionahty associated with the role In Server Manager 2012, console servers with a similar role are grouped together Role deployment also includes the configuration of dependencies
AD DS
AD FS
Provides web single sign-on (SSO) and secured identify federation support. Supports storage of application-specific data for directory-aware applications that do not require the full infrastructure of AD DS.
1
1
20410C: Installing and Configuring Windows Server,2012 1-7
1
1 1
(continued from previous page) Role Active Directory " Rights Management Services (AD RMS) 1 Application Server Function Allows you to apply rights management policies to prevent unauthorized access to sensitive documents. Supports centralized management and hosting of high-performance distributed business applications, such as those built with Microsoft .NET Framework 4.5. Provisions client computers on the network with temporary IP addresses. ProIrides name resolution for TCP/IP networks. Supports sending and receiving of faxes. Also a llows you to manage fax resource on the network. Supports the management of shared folders storage, distributed file system (DFS), and network storage. Enables you to host virtual machines on computers that are running Windows Server 2012. A mechanism to create and enforce policies that describe software and security u pdate requirements before the requesting computer is allowed to access the LAN. A computer that is not in compliance can be provided with ways to remediate its configuration to bring it into compliance. Supports centralized management of document tasks, including network scanners and networked printers. Supports Seamless Connectivity, Always On, and Always Managed features based on the Windows 7 DirectAccess feature. Also su pports remote access through virtual private network (VPN) and dial-u p connections. Supports access to virtual desktops, session-based desktops, and RemoteApp programs. Deprecated in Windows Server 2012 R2 Deprecated in Windows Server 2012 R2 Changes in Windows Server 2012R2
1
1
1----
DHCP Server
DNS Server
1
1 1 1
Fax Server
Hyper-V
1
Remote Desktop Services (RDS)
(continued from previous page) I. Role I Volume Activation 1 Services Function. Allows you to automate and simplify the management of volume license keys and volume key activation. Allows you to manage a Key Management Service (KMS) host or configure AD DSbased activation for computers that are members of the domain. The Windows Server 2012 web server component. Internet Information Service (IIS) 6.0 Manager has been deprecated in Windows Server 2012 R2 Windows PowerShell cmdlets have been added and cmdlet scripting is supported in Windows Server 2012 R2 Chariges in Windows Server 2012 KZ
Allows you to deploy server operating systems to clients over the network.
When you deploy a role, Windows Server 2012 R2 automatically configures aspects of the server's configuration (such as firewall settings), to support the role. Windows Server 2012 R2 also automatically and simultaneously deploys role dependencies. For example, when you install the WSUS role, the Web Server (IIS) role components that are required to support the WSUS role are also installed automatically. You add and remove roles using the Add Roles and Features Wizard, which is available from the Windows Server 2012 R2 Server Manager console. If you are using Server Core, then you can also add and remove roles using the Install -WindowsFeature and Remove-WindowsFeature Windows PowerShell cmdlets. Question: Which roles are often co-located on the same server?
Windows Server 2012 R2 includes the features that are listed in the following table.
Feature
Description
.NET Framework 3.5 Features I 1 .NET Framework 4.5 Features Background Intelligent i Transfer Service (BITS)
Installs .NET Framework 4.5 technologies. This feature is installed by default. Allows asynchronous transfer of files to ensure that other network applications are not adversely impacted. Supports full-disk and full-volume encryption, and startup environment protection. Provides a network-based key protector that can unlock locked BitLockerprotected domain-joined operating systems. Allows the server to function as either a hosted cache server or a BranchCache content server for BranchCache clients. Provides access to files stored on network file system (NFS) servers. Allows you to enforce bandwidth allocation on Converged Network Adapters. Provides support for additional functionality available in Enhanced Storage Access (IEEE 1667 protocol) device, including data access restrictions. A high availability feature that allows Windows Server 2012 R2 to participate in failover clustering. An administrative management tool for administering Group Policy across an enterprise. Allows use of Ink Support and Handwriting Recognition. Supports use of Internet Printing Protocol. Centralized management of IP address and namespace infrastructure. Provides iSCSI target and disk management services to Windows Server 2012 R2. Supports discovery services of iSCSI storage area networks (SANs).
1 1 1
Windows BranchCache
Enhanced Storage
1 1
Failover Clustering
e
1 1 1 1 1
Ink and Handwriting Services I Internet Printing Client IP Address Management (IPAM) Server Internet SCSI (iSCSI) Target Storage Provider Internet Storage name Service (iSNS) Server service
1
1-10 Deploying and Managing Windows Sentar 2012
(continued from previous poge) Feature DescriptiOn . Line Printer Remote (LPR) Port Monitor Allows computer to send print jobs to printers that are shared using the Line Printer Daemon (LPD) service. : Allows you to expose Windows PowerShell ' cmdlets through an ODatabased web service running on the Internet Information Services (IIS) platform. Supports media file infrastructu re. Supports message delivery between applications. Supports multiple data paths to storage devices. Allows traffic to be distributed in a loadbalanced manner across multiple servers that host the same stateless applications. Name resolution protocol that allows applications to resolve names on the computer. Supports audio and video streaming applications on IP home networks. Allows you to create connection manager profiles that simplify remote access configuration deployment to client computers. Allows remote su pport through invitations. ' Transfers the differences between files over a network, minimizing bandwidth utilization. Collection of consoles and tools for remotely i managing roles and features on other servers. Relays RPC traffic over HTTP as an alternative to VPN connections. Supports basic TCP/IP services, including Quote of the Day. Supports transfer of email messages. 1 Deprecated in I 1 Windows i Server 2012 R2 Deprecated in Windows Server 2012 R2 Changes in VVindows Server 2012 R2
1
i 1 ;
1 1 1
Quality Windows Audio Video Experience Remote Access Server (RAS) Connection Manager Administration Kit
Remote Assistance Remote Differential Compression (RDC) Remote Server Administration Tools Remote Procedure Call (RPC) over HTTP Proxy i i Simple TCP/IP Services
1
1 1 1 1
Includes SNMP agents that are used with the : network management services.
1 e
(continued from previous page)
1 1
Description Supports Portable Operating System Interface for UNIX (POSIX)compliant UNIX-based applications. Allows outbound con nections to Telnet servers and other Transmission Control Protocol (TCP)based services. Allows clients to connect to the server using the Telnet protocol.
1
1
Telnet Client
I Telnet Server
I Trivial File Transfer Protocol (TFTP) Client r-User Interfaces and Infrastructu re
Contains the componente necessary to support the graphical interface installation option on Windows Server 2012 R2. On graphical installations, this feature is installed by default. Allows use of fingerprint devices for authentication. Supports sending of feedback to Microsoft when joining a Customer Experience Improvement Program (CEIP). Set of .NET Framework classes that support implementing claims based identity on .NET applications. Relational data store that can only be used by Windows roles and features such as WSUS. Task-based command-line shell and scripting language used to administer computers running Windows operating systems. This feature is installed by default. Allows remote management of computers by running Windows PowerShell sessions in a web browser. Allows applications hosting Windows Communication Foundation (WCF) services that to not use HTTP protocols to use features of IIS. 1 Allows fast searches of files hosted on a server I I for clients compatible with the Windows Search service. I Version 4.0 is installed in Windows Server 2012 R2 Deprecated in Windows Server 2012 R2
1
1
a 1
1
Windows PowerShell
1
1 1
(continued from previous page) Feature Description Changes in Windows , Server 2012 R2
Backup and recovery software for Windows Server 2012 R2. Collection of Windows PowerShell cmdlets that assist in the migration of server roles, operating system settings, files, and shares from computers running previous versions of Windows Server operating systems to Windows Server 2012 R2. Set of Application Programming Interfaces (APIs) that allow the discovery, management, and monitoring of storage devices that use standards such as Storage Management Initiative Specification (SMI-S). : Allows you to control the allocation of CPU ; and memory resources. Removed in Windows Server 2012 R2
1 e 1 1
' Supports Optical Character Recognition on Tagged Image File Format (TIFF) 6.0-compliantfiles. 4_ Windows Remote Management for IIS. Supports name resolution for NetBIOS narres.
WinRM IIS Extension Windows Internet Naming Service (WINS) Server Wireless local area network (LAN) Service Windows on Windows (WoW) 64 Support
Allows the server to use a wireless network interface. Supports running 32-bit apps on Server Core installations. This feature is installed by default. l Supports the viewing and singing of documents in XPS formats.
1
1 1
XPS Viewer
Features on Demand
Features on Demand enables you to add and remove role and feature files, also known as feature payload, from the Windows Server 2012 R2 operating system to conserve space. You can install roles and features when the feature payload is not present by using a remote source, such as a mounted image of the full operating system. If an installation source is not present but an Internet connection is, source files will be downloaded from Windows Update. The advantage of a Features on Demand installation is that it requires less hard disk space than a traditional installation. The disadvantage is that if you want to add a role or feature, you must have access to a mounted installation source. This is something that is not necessary if you perform an installation of Windows Server 2012 R2 with the graphical features enabled. Question: Which feature do you need to install to support NetBIOS name resolution for client computers running a Microsoft Windows NT 4.0 operating system workstation?
1 1
1
20410C: Installing and ConfigulinglAlndows Seniert 2012 1-13
Lesson 2
1
1
Lesson Objectives
After completing this lesson, you will be a ble to: Describe the different methods that you can use to install Windows Server 2012 R2. Identify the different installation types that you can choose when installing the Windows Server 2012 R2.
Determine whether to upgrade or migrate to Windows Server 2012 R2. Determine whether a computer or virtual machine meets the minimum hardware requirements necessary to install Windows Server 2012 R2.
Describe the decisions that you need to make when performing a Windows Server 2012 R2 installation. Describe how to migrate server roles and features.
I nstallation Methods
1 Microsoft distributes Windows Server 2012 R2 on optical media and in an .iso (ISO) image format. ISO format is becoming more common as organizations acquire software over the Internet rather than obtaining physical removable media. Once you have obtained the Windows Server 2012 R2 operating system from Microsoft, you can then use your own method to deploy the operating system. You can install Windows Server 2012 R2 by using a variety of methods, including the following: Optical Media o Advantages include:
Windows Deployment Services Optical disk
USO flash chive
E1
1 o
Disadvantagesinclude: Requires that the computer have access to a DVD-ROM drive. Is typically slower than USB media.
11 You cannot update the installation image without replacing the media.
I1
You can only perform one installation per DVD-ROM ata time.
1 1
USB Media o Advantages include: K K K AH computers with USB drives allow boot from USB media. The image can be updated as new software updates and drivers become available. The answer file can be stored on a USB drive, minimizing the amount of interaction that the administrator must perform.
Disadvantagesinclude: Requires the administrator perform special steps to prepare USB media from an ISO file.
Mounted ISO image o Advantages include: K With virtualization software, you can mount the ISO image directly and install Windows Server 2012 R2 on the virtual machine.
Network Share o Advantages include: It is possible to boot a server off a boot device (DVD or USB drive) and install from installation files that are hosted on a network share.
Disadvantagesinclude: K This method is much slower than using Windows Deployment Services. If you already have access to a DVD or USB media, it is simpler to use those tools for operating system deployment.
Windows Deployment Services Advantagesinclude: You can deploy Windows Server 2012 R2 from .wim image files or specially prepa red VHD files. K You can use the Windows Automated Installation Kit (AIK) to configure lite-touch deployment.
ril Clients perform a Preboot eXecution Environment (PXE) boot to contact the Windows Deployment Services server, and the operating system image is transmitted to the server over the network. K Windows Deployment Services allows multiple concurrent installations of Windows Server 2012 R2 using multicast network transmissions.
System Center Configuration Manager o Advantages include: K Configuration Manager allows you to fully automate the deployment of Windows Server 2012 R2 to new servers that do not have an operating system installed. This process is called Zero Touch deployment.
Virtual Machine Manager Templates o Advantages include: K Windows Server 2012 R2 is typically deployed in private cloud scenarios from preconfigured virtual machine templates. You can configure multiple components of the System Center suite to allow self-service deployment of Windows Server 2012 R2 virtual machines.
Question: What is another method that you can use to deploy Windows Server 2012 R2?
Installation Types
How you deploy Windows Server 2012 R2 on a specific server depends on the circumstances of that installation. Installing on a server that is running Windows Server 2008 R2 requires different actions than installing on a server running an x86 edition of Windows Server 2003. When you are performing an installation of the Windows Server 2012 R2 operating system, you can choose one of the options in the following table.
Descrption I Allows you to perform a fresh install on a new disk or volume. Fresh installations are the most frequently used, and take the shortest amount of time. You can also use this option to configure Windows Server 2012 R2 to perform a dual boot if you want to keep the existing operating system. An upgrade preserves the files, settings, and applications that are installed already on the original server. You perform an upgrade when you want to keep all of these items, and want to continue to use the same server hardware. You can only upgrade to an equivalent or newer edition of Windows Server 2012 from x64 versions of Windows Server 2008 and Windows Server 2008 R2. You can also upgrade from Windows Server 2012 to Windows Server 2012 R2. You launch an upgrade by running setup.exe from within the original Windows Server operating system. Use migration when migrating to Windows Server 2012 R2 from x86 and x64 versions of Windows Server 2003, Windows Server 2003 R2, or Windows Server 2008. You can use the Windows Server Migration Tools feature in Windows Server 2012 R2 to transfer files and settings.
Upgrade
Migration
When you perform a fresh installation, you can deploy Windows Server 2012 R2 to an unpartitioned disk, or to an existing volume. You can also install Windows Server 2012 R2 to a specially-prepared VHD file in a "boot from VHD" or "VHD native boot" scenario. You might come across the use of both terms, or variations of them, to refer to this scenario. Boot from VHD requires special preparation, and is notan option that you can choose when performing a typical installation using the Windows Setup Wizard.
appears during Setup. This report might include guidance on what steps need to be taken to correct these issues. The following table lists some advantages and disadvantages of an in-place upgrade. Advantages The process is generally straightforward and takes less time and planning than a migration strategy. Al! server roles, features, data and application settings are maintained. Disadvantages More difficult to troubleshoot installation failures that are caused by existing applications or server roles. Existing problems and configuration issues might be brought into the new operating system.
The following table lists some advantages and disadvantages of a migration strategy. Advantages Easier to troubleshoot installation failures. Any existing configuration or application issues are not carried forward to the new operating system. Provides the opportunity to easily move to updated versions of applications. Disadvantages Requires all applications to be re-installed and configu red. Requires planning of migration of server roles. Requires migration of data. Requires the purchase of new hardware.
Hardware RequirementsforWindowsServer2012R2
Hardware requirements define the minimum hardware that is required to run the Windows Server 2012 R2 server. Your actual hardware requirements might be greater, depending on the services that the server is hosting, the load on the server, and the responsiveness of your server. Each role service and feature places a unique load on network, disk I/O, processor, and memory resources. For example, the File Server role places different stresses on server hardware than the DHCP role. When considering hardware requirements, remember that Windows Server 2012 R2 can be deployed virtually. Windows Server 2012 R2 is supported on Hyper-V and some other non-Microsoft virtualization platforms. Windows Server 2012 R2 virtualized deployments need to match the same hardware specifications as physical deployments. For example, when creating a virtual machine to host Windows Server 2012 R2, you need to ensure that you configure the virtual machine with enough memory and hard disk space. Windows Server 2012 R2 has the following minimum hardware requirements: Processor architecture: x64 Processor speed: 1.4 gigahertz (GHz) Memory (RAM): 512 megabytes (MB) Hard disk drive space: 32 GB, more if the server has more than 16 GB of RAM
Windows Server 2012 has the fotlowing minimum hardware requirements: Processor architecture Processor speed Memory (RAM) Hard disk drive space x64 1.4 GHz 512 MB 32 GB
'm More hard disk drive space is needed if the server has more than 16 GB of RAM
The Datacenter edition of Windows Server 2012 R2 supports the following hardware maximums: 640 logical processors 4 TB of RAM 63 failover cluster nodes
(b1 Additional Reading: For more information about the Windows Server Virtualization Validation Program, see http://go.microsoft.com/fwlink/?LinkID=266736.
Question: Why does a server need more hard disk drive space if it has more than 16 GB of RAM?
2. On the first page of the Windows Setup wizard, select the following: o o o 3. Language to install Time and currency format Keyboard or input method
On the second page of the Windows Setup wizard, click Instali now. You can also use this page to select Repair Your Computer. You use this option in the event that an installation has become corrupted, and you are no longer able to boot into Windows Server 2012 R2.
4.
In the Windows Setup wizard, on the Select The Operating System You Want To Install page, choose from the available operating system installation options. The default option is Server Core Installation. On the License Terms page, review the terms of the operating system license. You must choose to accept the license terms before you can proceed with the installation process. On the Which Type Of Installation Do You Want page, you have the following options: o Upg rade. Select this option if you have an existing installation of Windows Server that you want to upgrade to Windows Server 2012 R2. You should launch upgrades from within the previous version of Windows Server rather than booting from the installation source. Custom. Select this option if you want to perform a new installation.
5.
6.
o 7.
On the Where do you want to install Windows page, choose an available disk on which to install Windows Server 2012 R2. You can also choose to repartition and reformat disks from this page. When you click Next, the installation process will copy files and reboot the computer severa! times. On the Settings page, provide a password for the local Administrator account.
8.
~~
Migration Guides
Microsoft Technet provides the following migration guides to provide instructions for migrating specific roles and features to Server 2012: Migrate Active Directory Federation Services Role Services to Windows Server 2012 Migrate Health Registration Authority to Windows Server 2012 Migrate Hyper-V to Windows Server 2012 Migrate IP Configuration to Windows Server 2012 Migrating Network Policy Server to Windows Server 2012 Migrate Print and Document Services to Windows Server 2012 Migrate Remote Access to Windows Server 2012 Migrate Windows Server Update Services to Windows Server 2012
Reference Links: To view the Windows Server 2012 migration guides, please see http://go.microsoft.com/fwlink/?LinkID=331068.
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe how to use Server Manager to perform post-installation configuration tasks. Describe how to configure server network settings. Describe how to join an Active Directory domain. Explain how to perform an offline domain join. Explain how to activate Windows Server 2012 R2. Describe how to configure a Server Core installation.
OverviewofPost-I nstallationConfiguration
The Windows Server 2012 R2 installation process minimizes the number of questions that you need to answer during the installation. The only information that you provide during the installation process is the password for the default local Administrator account.The post-installation process involves configuring all of the other settings that the server requires before it can be deployed to a production environment. You use the Local Server node in the Server Manager console to perform the following tasks: Configure the IP address Set the computer name Join an Active Directory domain Configure the time zone Enable automatic updates Add roles and features Enable remote desktop Configure Windows Firewall settings
Note: If you are using only an IPv6 network, then an IPv4 address in this range is not problematic, and IPv6 address information is still configured automatically.
2.
4.
You can use the same context of the netsh.exe command to configure DNS configuration. For example, to configure the adapter named Local Area Connection to use the DNS server at IP address 10.10.103 as the primary DNS server, type the following command:
Netsh interface
,y4.
Se=fiAl.5bintServerAddregl:-InteraCeInde,-1 In the Windows PowerShell commands, the Interfacelndex value identifies which adapter you are configuring. To get a complete list of adapters with corresponding Interfacelndex values, run the GetNetlPlnterface cmdlet. Network Interface Card Teaming With Network Interface Card (NIC) teaming, you can increase the availability of a network resource. When you configure the NIC teaming feature, a computer uses one network address for multiple cards. In the event that one of the cards fails, the computer is able to maintain communication with other hosts on the network that are using that shared address. NIC teaming does not require that the network cards be the same model or use the same driver. To team network cards, perform the following steps: 1. 2. 3. 4. Ensure that the server has more than one network adapter. In Server Manager, click the Local Server node. Next to Network Adapter Teaming, click Disabled. This will launch the NIC Teaming dialog box. In the NIC Teaming dialog box, hold down the Ctrl key, and then click each network adapter that you want to add to the team. Right-click these selected network adapters, and then click Add to New Team. In the New Team dialog box, provide a name for the team, and then click OK.
1 1 1 1
5. 6.
HowtoJoin a Domain
When you install Windows Server 2012 R2, the computer is assigned a random name. Prior to joining a domain, you should configure the server with the name that you want it to have in the domain. As a best practice, you should use a consistent naming scheme when devising a computer name. Computers should be given names that reflect their function and location, not names with personal ties, such as pet names, or fictional or historical characters. For instante, it is simpler for everyone to determine that a server named MEL-DNS1 is a DNS server in Melbourne, than it is to determine that a server named Copernicus holds the DNS role in the Melbourne office. You change this name using the Server Manager console by performing the following steps: 1. 2. In Server Manager, click the Local Server node. In the Properties window, click the active text next to Computer Name. This launches the System Properties dialog box. In the System Properties dialog box, in the Computer Name tab, click Change.
1 1 1
Information necessary for a domain joie Domain name Account with permission to join computer to domain
3.
1 1 1
4.
In the Computer Name/Domain Changes dialog box, enter the new name that you want to assign to the computer. Restart the computer to implement the name change.
5.
Prior to joining the domain, be cure to complete the following steps to verify that the new server is ready to be domain-joined: 1. Ensure that you are able to resolve the IP address of the domain controller and that you can contact that domain controller. Use the PING protocol to ping the domain controller by hostname to accomplish both of these goals. 2. Complete one of the following tasks: Create a computer account in the domain that matches the name of the computer that you want to join to the domain. This is often done when large numbers of computers need to be joined to the domain automatically. Join the computer to the domain using a security account that has the right to perform domain-join operations. 3. Verify that the security account that is used for the domain operation already exists within the domain. Now that you have renamed your Windows Server 2012 R2 server and have verified that it is ready to be domain-joined, you can join the server to the domain. To join the domain using Server Manager, perform the following steps: 1. In Server Manager, click the Local Server node. 2. 3. 4. In the Properties window, next to Workgroup, click WORKGROUP. In the System Properties dialog box, on the Computer Name tab, click Change. In the Computer Name/Domain Changes dialog box, in the Member Of area, click the Domain option. Enter the new domain name, and then click OK. 5. In the Windows Security dialog box, enter domain credentials that allow you to join the computer to the domain. Restart the computer.
6.
$
sal
Wind Swver seis
2. Open an elevated command prompt and use the djoin.exe command with the /provision option. You also need to specify the domain to which you want to join the computer, the narre of the computer you will be joining to the domain, and the name of the savefile that you will transfer to the target of the offline domain join. For example, to join the computer Canberra to the domain adatum.com using the savefile Canberrajoin.txt, type the following command: djoin.exe /provision /domain adatum.com /machine canberra /savefale join.txt 3.
c: \canberra-
Transfer the generated savefile to the new computer, and then run the djoin.exe command with the /requestODJ option. For example, to perform the offline domain join, after transferring the savefile Canberra-join.txt to computer Canberra, you would run the following command from an elevated command prompt on Canberra: djoin.exe /rnuestW /loadfile canberra
join;
4.
Question: In what situation would you perform an offline domain join rather than a traditional domain join?
Manual Activation
With manual activation, you enter the product key, and the server contacts Microsoft. Alternatively, an administrator performs the activation over the phone or through a special clearinghouse website. You can perform manual activation from the Server Manager console by performing the following steps: 1. 2. 3. Click the Local Server node. In the Properties window, next to Product ID, click Not Activated. In the Windows Activation dialog box, enter the product key, and then click Activate.
4. If a direct connection cannot be established to the Microsoft activation servers, details will display about performing activation using a website from a device that has an Internet connection, or by using a local telephone number. Because computers running the Server Core installation option do not have the Server Manager console, you can also perform manual activation using the slmgr.vbs command. Use the slmgr.vbs /ipk command to enter the product key, and slmgr.vbs /ato to perform activation once the product key is installed. You can perform manual activation using either the retail product key, or the multiple activation key. You can use a retail product key to activate only a single computer. However, a multiple activation key has a set number of activations that you can use. Using a multiple activation key, you can activate multiple computers up to a set activation limit. OEM keys are a special type of activation key that are provided to a manufacturer and allow automatic activation when a computer is first powered on. This type of activation key is typically used with computers that are running client operating systems such as Windows 7 and Windows 8. OEM keys are rarely used with computers that are running server operating systems. Performing activation manually in large-scale server deployments can be cumbersome. Microsoft provides a method of activating large numbers of computers automatically without having to enter product keys on each system manually.
Automatic Activation
In previous versions of the Windows Server operating system, you could use KMS to perform centralized activation of multiple clients. The Volume Activation Services server role in Windows Server 2012 R2 allows you to manage a KMS server through a new interface. This simplifies the process of installing a KMS key on the KMS server. When you install Volume Activation Services, you can also configure Active Directorybased activation. Active Directorybased activation allows automatic activation of domain-joined computers. When you use Volume Activation Services, each computer activated must periodically contact the KMS server to renew its activation status. You use the Volume Activation Management Tool (VAMT) 3.0 in conjunction with Volume Activation Services to perform activation of multiple computers on networks that are not connected directly to the Internet. You can use VAMT to generate license reports and manage client and server activation on enterprise networks.
You can track licenses can be tracked from the virtualization host without requiring access rights on the virtual machines. There are no product keys to manage. Virtual machines remain activated when migrated across virtualization hosts.
The following guest virtual machine operating systems are supported: Windows Server 2012 R2 Datacenter edition Windows Server 2012 R2 Standard edition Windows Server 2012 R2 Essentials edition
.,computername% inewname:Me7bourne
You can change a server's name using sconfig.cmd by performing the following steps: 1. 2. 3. From a command-line command, run sconfig.cmd. Choose option 2 to configure the new computer name. Type the new computer name, and then press Enter.
You must restart the server for the configuration change to take effect.
Ei
Note: Prior to joining the domain, verify that you are able to ping the DNS server by hostname.
To join a Server Core computer to the domain using sconfig.cmd, perform the following steps: 1. 2. 3. 4. 5. 6. From a command-line command, run sconfig.cmd. Choose option 1 to configure Domain/Workgroup. To choose the Domain option, type D, and then press Enter. Type the name of the domain to which you want to join the computer. Provide the details in domain1usernome format, of an account that is authorized to join the domain. Type the password associated with that account.
You can add a role or feature that is not directly available for installation by using the -Source parameter of the Install-WindowsFeature cmdlet. You must specify a source location that hosts a mounted installation image that includes the full version of Windows Server 2012 R2. You can mount an installation image using the DISM.exe command-line tool. If you do not specify a source path when installing a component that is not available and the server has Internet connectivity, Install- WindowsFeature will attempt to retrieve source files from Windows Update.
Note: You can add or remove the graphical component of the Windows Server 2012 R2 operating system by using the Install-WindowsFeature cmdlet.
You can also use the dism.exe command-line tool to add and remove Windows roles and features from a Server Core deployment, even though this tool is used primarily for managing image files.
To service a VHD file you need to attach the virtual disk using the DiskPart.exe command line tool. For example, to attach a VHD file at C:\Server.VHD to the drive letter V, you can perform the following steps. At an elevated command prompt, run the following commands: DskPart Select vdisk file C:\Server.vhd Attach vdisk Assign letter=V Exit After you have finished servicing the VHD file using DISM, you can detach the VHD file using the following commands: DiskPart Select vdisk file C:\Server.vhd Detach vdsk
Reference Links: For more information about using DISM, see the article Enable or Disable Windows Featu res at http://go.microsoft.com/fwlink/?LinkID=331067.
Additional Reading: For more information about using DISM to service VHD files, see the article Walkthrough: Service a Virtual Hard Disk Image Offline at http://go.microsoft.com/fwlink/?LinkID=331066.
Demonstration Steps View a list of all Windows features and their current state
1. Use Server-Manager to launch the Windows Server Backup MMC. Notice that Windows Server Backup is not installed on the computer. 2. Close the wbadmin-[Windows Server Backup(Local)] window.
2.
Use Server Manager to Iaunch the Windows Server Backup MMC. Notice that Windows Server Backup is now available.
1 1 1 1
3.
1
1
1 1 1 1 1
Lesson 4
Lesson O bjectives
After completing this lesson, you will be able to: Describe Server Manager. Describe how to use administrative tools and Remote Server Administration Tools. Describe how to use Server Manager to perform administrative tasks. Describe how to configure services. Describe how to configure Windows Remote Management.
You can use Best Practicas Analyzer te: Determine whether roles on your network are functioning
efficiently Query event logs for warning and error events Diagnose health Issues with specific roles
Server Manager can be used to manage the following down-level systems: Windows Server 2008 R2 SP1 (both full server or Server Core) Windows Server 2008 SP2 (full server only) To manage these systems, you must install Windows Management Framework 3.0 (WMF 3.0) on the managed systems.
Group Policy Management Console IIS Manager Performance Monitor Resource Monitor Task Scheduler Can be used to manage non-domain join tems
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Resource Monitor. You can use this console to view real-time information on CPU, memory, and disk and network utilization. Task Scheduler. You can use this console to manage the execution of scheduled tasks.
You can access each of there tools in Server Manager by accessing the Tools menu.
Note: You can also pin frequently used tools to the Windows Server 2012 R2 taskbar, or to the Start screen.
Managing non-domain joined Windows Server 2012 R2 with RSAT and Server Manager
Under normal circumstances, you cannot manage non-domain joined computers with RSAT from Windows 8 or Windows Server 2012 R2 systems. In Windows Server 2012 R2, however, there are Windows PowerShell commands that allow this configuration. First, ensure you can resolve the name of the computer you will manage by its host name, because you cannot use its IP address. To do this, either manually add the server to your DNS or add an entry in the local Hosts file on the Windows 8 computer. Next, on the Windows 8 computer running the RSAT, start Windows PowerShell as an Administrator and run the following command:
-Force
In RSAT Server Manager, click Manage on the menu bar, click the DNS tab, enter the server name, and then add the server to the Selected column. The server should appear in the Servers pane, and displaying a Kerberos error. Right-click the entry and select Manage As, and then enter the local Administrator credentials of the server.
Demonstration Steps Add a feature by using the Add Roles and Features Wizard
1. In Server Manager, start the Add Roles and Features Wizard. 2. Select the Role-based or featured-based installation check box. 3. Click Select a server from the server pool, verify that LON-DC1.Adatum.com is selected, and then click Next. On the Select server roles page, select Fax Server. In the Add Roles and Features Wizard dialog box, click Add Features. On the Select features page, click BranchCache. On the Print and Document Services page, click Next twice. On the Fax Server page, click Next. On the Confirmation page, select the Restart the destination server automatically if required check box, click Yes, click Install, and then click Close.
4. 5. 6. 7. 8. 9.
10. Click the flag Icon next to Server Manager Dashboard, and review the messages.
51,
Note: You can close this console without terminating the task.
2. In the Roles and Server Groups pane, under DNS, click Events. 3. On the DNS - Events Detail View, change the time period to 12 hours and the Event Sources to All.
1
Configuring Services Services are programs that run in the background and provide services to clients and to the host
1 1 1 1 1
server. You can manag e services through the Services console, which is available in Server Manager from the Tools menu. When securing a computer, you should disable all services except those that are required by the roles, features, and applications that are installed on the server.
I Note: If a server is behaving problematically, open the Services console, sort by startup type, and then locate those services that are configured to start automatically and which are not in a running state.
Service Recovery
Recovery options determine what a service does in the event that it fails. You access the Recovery tab
1 1
from the DNS Server Properties window. On the Recovery tab, you have the following recovery options: Take no action. The service remains in a failed state until attended to by an administrator. Restart the Service. The service restarts automatically. Run a Program. Allows you to run a program or a script. Restart the Computer. The computer restarts after a preconfigured number of minutes.
You can configure different recovery options for the first failure, the second failure, and subsequent failures. You can also configure a period of time after which the service failure clock resets.
to a schedule. These password changes are automatic, and do not require administrator intervention, which minimizes the chance that the service account password will be compromised. This happens typically because administrators traditionally assign simple passwords to service accounts with the same service across a large number of servers, and never bother to update those passwords. Virtual accounts are service-specific accounts that are local rather than domain-based. Windows Server 2012 R2 rotates and manages the password for virtual accounts. Question: What is the advantage of a managed service account compared to a traditional domainbased service account?
You also can enable WinRM from a command line by running the command WinRM qc. You disable WinRM by using the same method that you use to enable it. You can disable WinRM on a computer running the Server Core installation option using the sconfig.cmd tool.
Remote Desktop
Remote Desktop is the traditional method by which systems administrators connect remotely to the servers that they manage. You can configure Remote Desktop on a computer that is running the full version of Windows Server 2012 R2 by performing the following steps: 1. In the Server Manager console, click the Local Server node. 2. 3. Next to Remote Desktop, click Disabled. In the System Properties dialog box, on the Remote tab, select one of the following options: o o Don't allow connections to this computer. The default state of remote desktop is disabled. Allow connections from computers running any version of Remote Desktop. Allows connections from Remote Desktop clients that do not support Network Level Authentication o Allow Connections only from Computers running Remote Desktop with Network Level Authentication. Allows secure connections from computers running Remote Desktop clients that support network-level authentication.
You can enable and disable Remote Desktop on computers that are running the Server Core installation option by using the sconfig.cmd command-line tool.
Lesson 5
Lesson O bjectives
After completing this lesson, you will be able to: Describe the purpose of Windows PowerShell. Describe Windows PowerShell cmdlet syntax, and explain how to determine commands associated with a particular cmdlet. Describe common Windows PowerShell cmdlets used to manage services, processes, roles and features. Describe the functionality of Windows PowerShell OSE. Explain how to use Windows PowerShell. Explain how to use Windows PowerShell ISE.
You can extend Windows PowerShell functionality by adding modules. For example, the Active Directory module includes Windows PowerShell cmdlets that are specifically useful for performing Active Directoryrelated management tasks. The DNS Server module includes Windows PowerShell cmdlets that are specifically useful for performing DNS server-related management tasks. Windows PowerShell includes features such as tab completion, which allows administrators to complete commands by pressing the tab key rather than having to type the complete command. You can learn about the functionality of any Windows PowerShell cmdlet by using the Get- Help cmdlet.
Note: Windows PowerShell Version 4.0 ships with Windows Server 2012 R2 and is backward
WindowsPowerShellCmdletSyntax
Windows PowerShell cmdlets use a verb-noun syntax. Each noun has a collection of associated verbs. The available verbs differ with each cmdlet's noun. Common Windows PowerShell cmdlet verbs include: Get New Set Restad Resume Stop Suspend Clear Limit Remove Add Show Write
Windows PowerShell Cmdlet Syntax: Get-Help -Noun
NounName
Get-Heip -Verb
VerbName
Help CmdltName Get-Command
You can view the available verbs for a particular Windows PowerShell noun by executing the following command:
You can view the available Windows PowerShell nouns for a specific verb by executing the following command:
Windows PowerShell parameters start with a dash. Each Windows PowerShell cmdlet has its own associated set of parameters. You can learn what the parameters are for a particular Windows PowerShell cmdlet by executing the following command: Get-tie7fi CtncltetName
You can determine which Windows PowerShell cmdlets are available by executing the Get-Command cmdlet. The Windows PowerShell cmdlets that are available depend on which modules are loaded. You can load a module using the Import-Module cmdlet.
Service Cmdlets
You can use the following Windows PowerShell cmdlets to manage services on a computer that is running Windows Server 2012 R2:
Get-Service. View the properties of a service. New-Service. Creates a new service. Restart-Service. Restarts an existing service. Resume-Service. Resumes a suspended service. Set-Service. Configures the properties of a service. Start-Service. Starts a stopped service. Stop-Service. Stops a running service. Suspend-Service. Suspends a service.
Service Cmdlets Event log Cmdlets Process Cmdlets ServerManager module Windows PowerShell Remote Management
Use the Service noun Use the Eventlog noun Use the Process noun Allows the WindowsFeature noun Allows cmdlets or scrpts to bel run on remete cornputers
Process Cmdlets
You can use the following Windows PowerShell cmdlets to manage processes on a computer that is running Windows Server 2012 R2:
Get-Process. Provides information on a process. Sta rt-Process. Starts a process. Stop-Process. Stops a process.
1
20410C: Installing and Configuring Windows Sentel ,2012 1-41
1 1 1 1 1 1 1 1 1 1 1 1
Wait -Process. Waits for the process to stop before accepting input. Debug - Process. Attaches a debugger to one or more running processes.
ServerManager Module
The ServerManager module allows you to add one of three cmdlets that are useful for managing features and roles. These cmdlets are: Get-WindowsFeature. View a list of available roles and features. Also displays whether the feature is installed, and whether the feature is available. You can only install an unavailable feature if you have access to an installation source. Install-WindowsFeature. Installs a particular Windows Server role or feature. The Add - WindowsFeature cmdlet is aliased to this command and is available in previous versions of Windows operating systems. Remove - WindowsFeature. Removes a particular Windows Server role or feature.
Demonstration Steps Use Windows PowerShell to display the running services and processes on a server
1. On LON-DC1, open a Windows PowerShell session. 2. Execute the following commands, and then press Enter: et,-Servid 1 where-object (.1_. status -eq "Running"J Service rocess et-HeYP PrOCeSS Start- Process 3. Close the Windows PowerShell window.
4. On the taskbar, right-click the Windows PowerShell icon, and then click Run as Administrator.
Use Windows PowerShell to connect to a remote computer and display all services and their current status
1. 2. On LON-SVR1, open a Windows PowerShell session. Execute the following command: Enable-P5Renro 3. 4. 5. Accept all the default prompts. On LON-DC1, open a Windows PowerShell session. Execute the following commands:
Use Windows PowerShell to invoke commands to multiple computers and display running processes
1. On LON-DC1, execute the following command: Invke-Conlinn 2.
et-ProcessJ
Examine the output, and then close the Windows PowerShell window.
Demonstration Steps Use Windows PowerShell ISE to import the ServerManager module
1. 2. 3. Ensure that you are signed in to LON-DC1 as Administrator. In Server Manager, click Tools, and then click Windows PowerShell ISE. At the command prompt, type Import - Module ServerManager.
Run a Windows PowerShell script from the scripting pane to create a universal group named Helpdesk and add members
1. 2. 3. In Server Manager, click Tools, and then open Active Directory Users and Computers. Open the IT organizational unit (OU). Note that there is no group named Helpdesk. Use File Explorer to navigate to E.:\Labfiles\Mod01 and edit the CreateAndPopulateHelpdesk.ps1 script. 4. 5. View the script and then click the green arrow on the toolbar to run the script. Switch back to Active Directory Users and Computers and refresh the view. You should now see there is a group named Helpdesk. 6. Open the properties of the Helpdesk group and see that the group is populated by the members of the IT department. 7. Cose all open windows.
These three main phases are described in the following table. Phase Authoring phase Description The DSC is created by using Windows PowerShell or by using third-party tools. Windows PowerShell commands are used to create one or more Management Object Format (MOF) files that describe the configuration settings. In a Pull model, DSC data and any custom providers are kept on the Pull server, which is an IIS server. The target system contacts the Pull server by passing a Uniform Resource Identifier (URI) along with a unique identifier to pull its DSC configuration and verify if any required providers are available. If they are not, those providers are downloaded to the target computer. In the case of a Push model, you need to ensure that any required providers are already in place on the target computer because only the configuration settings are pushed. Implementation phase The final phase is the application of the configuration. Once DSC data is I either pushed or pulled to the target server's Local Configuration Store, the configuration is then parsed and the appropriate WMI provider implements the settings.
Staging phase
DSC can be used to perform many different functions, including the following: Install or remove server roles and features Manage registry settings Manage files and directories Start, stop, and manage processes and services Manage local groups and user accounts Install and manage packages such as .msi and .exe Manage environment variables Run Windows PowerShell scripts Fix a configuration that has drifted away from the desired state Discover the actual configuration state on a given node
1 1
Objectives
After completing this lab, you should be able to: Deploy Windows Server 2012 R2. Configure Windows Server 2012 R2 Server Core. Manage servers by using Server Manager. Manage servers with Windows PowerShell.
Lab Setup
Estimated Time: 60 minutes
Virtual machines
Adatum\Administrator Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. On the host computer, click Start, point to Administra'tive Tools, and then click Hyper-V Manager. 2. In Hyper-V Manager, click 20410C-LON-DC1, and in the Actions pane, click Start. 3. In the Actions pane, click Connect. Wait until the virtual machine starts. 4. Sign in using the following credentials: a. b. User name:Adatum\Administrator Password: Pa$$wOrd
5. Repeat steps 1 through 3 for 20410C-LON-CORE. Do not sign in until directed to do so.
Click to install the Windows Server Windows Server 2012 R2 Datacenter Evaluation (Server with a GUI) operating system.
5. 6. r;1,1 12.1
Accept the license terms, and then click Custom: Install Windows only (advanced). Install Windows Server 2012 R2 on Drive 0. Note: Depending on the speed of the equipment, the installation takes approximately 20
minutes. The virtual machine will restad severa! times during this process. 7. Enter the password Pa$$w0rd in both the Password and Reenter password boxes, and then click Finish to complete the installation.
3. 4.
5. 6.
5.
1. 2. 3. 4. 5.
Password: Pa$$w0rd
In the Computer Name/Domain Changes dialog box, click OK. Restart the computer to apply changes. In the System Properties dialog box, click Close. After LON-SVR3 restarts, sign in as Adatum\Administrator with the password Pa$$wOrd.
Rsults: Aiterfcompttiri
011-21'
ohlt
K Task2:Changethecomputer'sdateandtime
1. 2. 3. 4. 5. Ensure you are signed in to server LON-CORE as Administrator with the password Pa$$wOrd. At the command prompt, type sconfig.cmd. To select Date and Time, type 9. Click Change time zone, and then set the time zone to the same time zone that your classroom uses. In the Date and Time dialog box, click Change Date and Time, and verify that the date and time match those in your location. Exit sconfig.cmd.
6.
2. 3. 4. 5. 6.
7. 8. 9.
At the Enter subnet mask prompt, type 255.255.0.0. At the Enter default gateway prompt, type 172.16.0.1. Type 2 to configure the DNS server address.
10. Set the preferred DNS server to 172.16.0.10. 11. Do not configure an alternate DNS server address. 12. Exit sconfig.cmd. 13. Verify network connectivity to Ion-dcLadatum.com using the PING tool.
10. Sign in to server LON-CORE with the Adatum\Administrator account using the password Pa$$w0rd.
Results: After completing"this exercise, you should have configu red a Windows Server 20 ZR2Se'rv
2.
In the Add Roles and Features Wizard, click Next, click Role-based or feature-based installation, and then click Next. Verify that LON-CORE.Adatum.com is selected, and then click Next. Select the Web Server (IIS) Server role. Select the Windows Server Backup feature. Add the Windows Authentication role service, and then click Next. Select the Restart the destination server automatically if required check box, and then click
Install.
3. 4. 5. 6. 7.
8. 9.
Click Close. Right-click LON-SVR3, click Add Roles and Features, and then click Next.
10. In the Add Roles and Features Wizard, click Role-based or feature-based installation, and then click Next. 11. Verify that LON-SVR3.Adatum.com is selected, and then click Next twice. 12. Click Windows Server Backup, and then click Next. 13. Select the Restart the destination server automatically if required check box, click Install, and then click Close. 14. In Server Manager, click the OS node, and verify that LON-CORE is listed.
7. 8.
Verify that the service is configured to use the Local System account. Configure the following service recovery settings: o o o o o First failure: Restan the Service Second failure: Restan the Service Su bsequent failu res: Restan the Computer. Reset fail count after: 1days Reset service atter: 1minute
9.
Configure the Restad Computer option to 2 minutes, and then close the World Wide Web Publishing Services Properties dialog box.
Hl Task 1: Use Windows PowerShell to connect remotely to servers and view information
1. 2. 3. 4. 5. 6. Sign in to LON-DC1 with the Adatum\Administrator account and the password Pa$$wOrd. On LON-DC1, in Server Manager, click the LAB - 1server group. Right-click LON -CORE, and then click Windows PowerShell. Type Import- Module ServerManager. Type Get-WindowsFeature, and review roles and features. Use the following command to review the running services on LON-CORE: Get-servi ce where-ppyect 7. 8. 'state q "kUpiring"
Type get-process to view a list of processes on LON-CORE. Review the IP addresses assigned to the server by typing the following command: Get-NetIPAddres.s Format- tabl e
9.
Review the most recent 10 items in the security log by typing the following command: Get-EventLog Security Newest'10.
Results: After completing this exercise, you should have used Windows PowerShell to perform a remote installation of features on multiple servers.
Cannot install the GUI features on Server Core deployments. Unable to restad a computer running Server Core. Unable to join the domain.
Tools
Tool Windows PowerShell Use Performing multiple administrative and configuration tasks Image servicing and management Performing offline domain joins of computers Managing servers remotely from a Windows 8.1 system Assisting with migrating to different versions of Windows Server Managing physical disks i Where to fi nd it
l taskbar
DISM.exe
Djoin.exe
RSAT
Download from the Microsoft i download center and insta II Download from the Microsoft . download center and install From the command prompt using the DiskPart command
2-1
Module 2
Introduction to Active Directory Domain Services
Contents:
Module Overview Lesson 1: Overview of AD DS Lesson 2: Overview of Domain Controllers Lesson 3: Installing a Domain Controller Lab: Installing Domain Controllers Module Review and Takeaways 2-1 2-2 2-12 2-18 2-26 2-30
Module Overview
Active Directory Domain Services (AD DS) and its related services form the foundation for enterprise networks that run Windows operating systems. The AD DS database is the central store of all the domain objects, such as user accounts, computer accounts, and groups. AD DS provides a searchable hierarchical directory, and provides a method for applying configuration and security settings for objects in the enterprise. This module covers the structure of AD DS and its various components, such as forest, domain, and organizational units (OUs). The process of installing AD DS on a server has been refined and improved with Windows Server 2012 compared to the process of installing AD DS with earlier Windows server operating systems. This module examines some of the choices that are available with Windows Server 2012 for installing AD DS on a server.
Objectives
After completing this module, you will be able to: Describe the structure of AD DS. Describe the purpose of domain controllers. Install a domain controller.
Lesson 1
Overview of AD DS
The AD DS database stores information on user identity, computers, groups, services and resources. AD DS domain controllers also host the service that authenticates user and computer accounts when they sign in to the domain. Because AD DS stores information about all of the objects in the domain, and all users and computers must connect to AD DS domain controllers when they are signing into the network, AD DS is the primary means by which you can configure and manage user and computer accounts on your network. This lesson covers the core logical components and physical components that make upan AD DS deployment.
Lesson Objectives
After completing this lesson you will be able to: Describe the components of AD DS. Describe AD DS domains. Describe OUs and their purpose. Describe AD DS forests and trees, and explain how you can deploy them in a network. Explain how an AD DS schema provides a set of rules that manage the objects and attributes that are stored in the AD DS domain database. Describe what is new for Active Directory in Windows Server 2012 R2.
Overview of AD DS
AD DS is composed of both logical and physical components. You need to understand the way the components of AD DS work together so that you can manage your infrastructure efficiently. In addition, you can use many other AD DS options to perform actions such as installing, configuring, and updating apps, managing the security infrastructure, enabling Remote Access and CrirectAccess, and issuing and managing digital certificates. One of the most used AD DS features is Group Policy, which enables you to configure centralized policies that you can use to manage most objects in AD DS. Understanding the various AD DS components is important to successfully using Group Policy. Active Directory Domain Services (AD DS) is composed of both logical and physical components
logical components Partitions Schema Domains Domain Orees != Forests Sites Organizational units (00s) Containers Physical components Domain controllers 1 Data stores Global catalog servers = Read-only domain controllers (RODC)
1 1
Logical Components
Logical component Description
AD DS logical components are structures that you use to implement an Active Directory design that is appropriate for an organization. The following table describes the types of logical structures that an Active Directory database contains.
1 1 1
Partition
A section of the AD DS database. Although the database is one file named Ndts.dit, it is viewed, managed, and replicated as if it consisted of distinct sections or instances. These are called partitions, which are also referred to as naming contexts. The set of definitions of the object types and attributes that are used to create objects in AD DS. A logical, administrative container for users and computers. A collection of domains that share a common root domain and a contiguous Domain Name System (DNS) namespace. A collection of domains that share a common AD DS. A collection of users, groups, and computers as defined by their physical location. Sites are useful in planning administrative tasks such as replication of changes to the AD DS database. An organizational unit is a container object that provides a framework for delegating administrative rights and for linking Group Policy Objects (GPOs). A container is an object that provides an organizational framework for use in AD DS. Containers cannot have GPOs linked to them.
Schema
Forest Site
1 1 1 1
1
Physica I Components
The following table lists some of the physical components of AD DS and gives a brief description of each. Physicalcomponent Domain controller Description Contains a copy of the AD DS database. For most operations, each domain controller can process changes and replicate the changes to all the other domain controllers in the domain. The files on each domain controller that holds the AD DS database. The Ntds.dit file, and associated log files, is a Microsoft JET database, which is stored in the C:\Windows\NTDS folder by default. A domain controller that hosts the global catalog, which is a partial, read-only copy of all the objects in the forest. A global catalog speeds up searches for objects that might be stored on domain controllers in a different domain in the forest. A special read-only installation of AD DS. These are often used in branch offices where security and IT support are less advanced than in the main corporate centers.
Data store
Additional Reading: For more information about domains and forests, see Active Directory Domain Services Overview at http://go.microsoft.com/fwlink/?LinIdD=331086.
Ms Attrins
,a1 Clent~ters E 21 a) 10 en Cuwex,hen, Fore~" 9 . 1,0Pais ;15 Coc.P5 E In Access E al Carluter Ir2U Rde ictab as 4:1 New Curcutern El al User Ato no 33 Ordra4b)rs a3 Enviones Wers
%te.
OUs are represented by a folder with a book on it Containers are represented by a blank folder
There are severa! containers that can only be seen when the Advanced Features is selected from the View menu. The following list includes the objects that are hidden by default: LostAndFound. This container holds objects that have been orphaned. Program Data. This container holds Active Directory data for Microsoft applications, such as Active Directory Federation Services (AD FS). System. This container holds the built-in system settings. NTDS Quotas. This container holds directory service quota data. TPM Devices. This container is new with Windows Server 2012. It stores the recovery information for Trusted Platform Module (TPM) devices. Note: Containers in an AD DS domain cannot have GPOs linked to them. To link GPOs to apply configurations and restrictions, create a hierarchy of OUs, and then link GPOs to them.
Hierarchy Design
The design of an OU hierarchy is dictated by the administrative needs of the organization. The design cou Id be based on geographic, functional, resource, or user classifications. Whatever the order, the hierarchy should make it possible to administer AD DS resources as effectively and with as much flexibility as possible. For example, if all computers that IT administrators use must be configured in a certain way, you can group all the computers in an OU, and then assign a GPO to manage those computers. You also can create OUs within other OUs. For example, your organization might have multiple offices, and each office might have a set of IT administrators who are responsible for managing user and computer accounts in their office. In addition, each office might have different departments with different computer configuration requirements. In this situation, you could create an OU for each office, and then within each of those OUs, create an OU for the IT administrators and OUs for each of the other departments. Although there is no technical limit to the number of levels in your OU structure, for the purpose of manageability, limit your OU structure to a depth of no more than 10 levels. Most organizations use five levels or fewer to simplify administration. Note that Active Directoryenabled applications can impose restrictions on the OU depth within the hierarchy for the parts of the hierarchy they use.
What Is an AD DS Forest?
A domain tree is a collection of one or more domains that share a contiguous name space. A forest is a collection of one or more domain trees that share a common directory schema and global catalog. The first domain that is created in the forest is called the forest root domain. The forest root domain contains a few objects that do not exist in other domains in the forest. Since these objects are always created on the very first domain controller created, a forest can consist of as little as one domain with a single domain controller, or Tree Root Domain fabnicam.com
it can consist of hundreds of domains across multiple trees. These objects that only exist in the forest root domain are as follows: The schema master role. This is a special forest-wide domain controller role. There is only one schema master in any forest. The schema can be changed only on the domain controller which holds the schema master. The domain naming master role. This is also special forest-wide domain controller role. There is only one domain naming master in any forest. New domain names can be added to the directory only by the domain naming master. The Enterprise Admins group. By default, the Enterprise Admins group has the Administrator account for the forest root domain as a member. The Enterprise Admins group is a member of the local administrators group in every domain in the forest. This allows members of the Enterprise Admins group to have full control administrative rights to every domain throughout the forest. The Schema Admins group. By default, the Schema Admins group has no members. Only members of the Enterprise Admins group can dd members to the Schema Admins group. Members of the Schema Ad mins group are the only administrators that can make changes to the Schema.
Security Boundary
An AD DS forest is a security boundary. By default, no users from outside the forest can access any resources incide the forest. Typically an organization will create only one forest, although you can create multiple forests to isolate administrative permissions between different parts of the organization. By default, all the domains in a forest automatically trust the other domains in the forest. This makes t easy to enable access to resources such as file shares and websites for all users in a forest, regardless of the domain in which the user account is located.
Replication Boundary
An AD DS forest is the replication boundary for the configuration and schema partitions in the AD DS database. This means that all domain controllers in the forest must share the same schema. Because of this organizations that want to deploy applications with incompatible schemas will need to deploy additionalforests. The AD DS forest is also the replication boundary for the global catalog. The global catalog provides the ability to find objects from any domain in the forest. The global catalog is used whenever universal principal name (UPN) sign-in credentials are used or when looking up users in Microsoft Exchange Server address books.
the AD DS directory. By standardizing how data is stored, AD DS can retrieve, update, and replicate data, while ensuring that the integrity of the data is maintained.
Objects
AD DS uses objects as units of storage. AH object types are defined in the schema. Each time that the directory handles data, the directory queries the schema for an appropriate object definition. Based on the object definition in the schema, the directory creates the object and stores the data. Object definitions specify both the types of data that the objects can store, and the syntax of the data. You can only create objects in AD DS that are defined by the schema. Because the data is stored in a rigidly defined format, AD DS can store, retrieve, and validate the data that it manages, regardless of which application the data carne from.
AD DS schema objects consist of attributes, which are grouped together into classes. Each class has rules that define which attributes are required and which are optional. For example, the user class consists of over 400 possible attributes, including cn (the common name attribute), givenName, displayName, objectSlD and manager. Of these attributes the cn and objectSlD attributes are mandatory, and the cn attribute is defined as a single value Unicode String from 1 to 64 characters long and is replicated to the global catalog.
Workplace Join
Windows Server 2012 R2 allows users to join their personal devices to the domain. Both Windows-based devices and i0Se-based devices can join a Windows Server 2012 R2-based domain. Using a feature from Active Directory Federation Services (AD FS) called Device Registration Service (DRS) a user's personal device can be registered in AD DS. The DRS service will create an AD DS object for the device and issue a certificate to the device that is used to authenticate the device. If both DRS and the Web Application Proxy are used, any device with a working internet connection can be workplacejoined. When a personal device is workplacejoined administrators can: Use the information about the device that is stored in AD DS and configure conditional access. Provide a seamless experience to users who are accessing company resources from workplace joined devices. Provide a single sign on (SSO) experience for accessing resources.
based on one or more factors. An app that uses claims-based authentication is also known as relying party application. There are over 50 factors that AD FS can use to authenticate a claim request, some of those factors are: Claimtype Email Address Name Role Primary group security identifier (SID) Issuer Description The user's email address. The user's name, which must be unique. A role that the user has been assigned. The primary group SID of the user.
The name of the certificate authority that issued the X.509 certificate.
The relying party application defines what the user will be able to do based on the information in the claim. There are several benefits of using multi-factor access control in AD FS, including: You can permit or deny access based on the user, device, location, authentication state or other factors by using the flexible and granular per-application authorization policies. You can create different rules for each application by using the individual issuance authorization rules for relying party applications. You can deliver a rich UI experience for the common multi-factor scenarios to users by using AD FS's web-based authentication with customizable forms for some common scenarios. For more complex scenarios you can use Windows PowerShell to develop your rules by using the rich claims language and Windows PowerShell support. You can tell the users why their request was denied and not just display a generic access denied message by using individual, customized access denied messages for relying party applications.
Additional Reading: For more information about how to manage risk with multi-factor access control, see the article " Overview: Manage Risk with Multi-Factor Access Control" at http://go.microsoft.com/fwlink/?LinkID=331088.
Multi-Factor Authentication
AD FS has multiple authentication methods which you can use to create flexible authentication scenarios; these flexible authentication scenarios allow your uses to access company resources in more ways. You can create a global authentication policy that applies to all access attempts or you can create custom authentication rules for individual, AD FS-secured resources. Custom, per-relying party application authentication rules do not override global authentication rules. You can configure the authentication rules to require only a primary authentication method, or to use multi-factor authentication. When creating both global and per-relying party application authentication rules, if either the global rule or application specific rule requires the use of multi-factor authentication, then the user will be required to use multi-factor authentication.
When you create a global authentication policy you can configure the following settings: Primary authentication method. By default, external connections use Forms Authentication and interna! connections use Windows Authentication. Settings and methods for multi-factor authentication. You can configure the conditions under which multi-factor authentication is used, and what additional authentication method is used. You can use Certificate Authentication, such as with a smart card, or other third-party authentication methods. Whether device authentication is enabled. This option is used with Workplace Join and allows you to configure the device as a secondary authentication factor. When configuring per-relying party application authentication rules you can configure the following settings: Whether the users need to provide credentials each time they sign in Multi-factor authentication settings for the relying party application
The parameters on which multi-factor authentication rules can be based include the following: Users or groups in the AD DS directory The workplace joined status of devices The connection being from the intranet or the Internet
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe the purpose of domain controllers. Describe the purpose of the global catalog. Describe the AD DS sign-in process, and the importance of DNS and SRV records in the sign-in process. Describe the functionality of SRV records. Explain the functions of operations masters.
When you deploy a domain controller in a branch office where physical security is less than optima!, there are some additional measures that you can use to reduce the impact of a breach of security. One option is to deploy an RODC. The RODC contains a read-only copy of the AD DS database, and by default, it does not cache any user passwords. You can configure the RODC to cache the passwords for users in the branch office. If an RODC is compromised, the potential loss of information is much lower than with a full read/write domain controller. Another option is to use Windows BitLocker Drive Encryption to encrypt the domain controller hard drive. If the hard drive is stolen, BitLocker encryption ensures that there is a very low chance of a malicious user getting any useful information from it. r 1 - .71
Note: BitLocker is a drive encryption system that is available for Windows Server
operating systems, and for certain Windows client operating system versions. BitLocker securely encrypts the entire operating system so that the computer cannot start without being supplied a private key and (optionally) passing an integrity check. A disk remains encrypted even if you transfer it to another computer.
In a single domain, all domain controllers should be configured to hold a copy of the global catalog; however, in a multiple domain environment, the infrastructure master should not be a global catalog server unless alI the domain controllers in the domain are also global catalog servers. Which domain controllers are configured to hold a copy of the global catalog depends on replication traffic and network bandwidth. Many organizations are opting to make every domain controller a global catalog server. Question: Should a domain controller be a global catalog?
Domain Controller
on
Server
Note: A SID is a unique string in the form of S-R-X-Y1-Y2-Yn-1-Yn. For example, a user SID could be:S-1-5-21-322346712-1256085132-1900709958-500. The parts of this SID are explained in this table: omponent S Definition Indicates that the string is a SID Revision level Identifier authority value Y1-Y2-Yn-1 Yn Domain identifier RID 5 (NT Authority) 21-322346712-1256085132-1900709958 500 In The Example
Every user and computer account and every group that you create has a unique SID. They only differ from each other by virtue of the unique RID. The SID in the example is a well-known SID for the domain administrator account. Well-known SIDs are used by the default accounts and groups, the Domain Administrator account's SID always ends with 500.
Sites
Sites are used by a client system when it needs to contact a domain controller. It starts by looking up SRV records in DNS. The response to the DNS query will include: A list of the domain controllers in the same site as the client system If there are no domain controllers available in the site the list will include the domain controllers from the next closest site that does not include an RODC, if enabled in the Try Next Closest Site Group Policy setting If no domain controller is found in the next closest site, a random list of available domain controllers in the domain Administrators can define sites in AD DS. Sites usually align with the parts of the network that have good connectivity and bandwidth. For example, if a branch office is connected to the main data center by an unreliable wide area network (WAN) link, it would be better to define the data center and the branch office as separate sites in AD DS. SRV records are registered in DNS by the Net Logon service that is running on each domain controller. If the SRV records are not entered in DNS correctly, you can trigger the domain controller to reregister those records by restarting the Net Logon service on that domain controller. This process only reregisters the SRV records; if you want to reregister the host (A) record information in DNS, you must run ipconfig /registerdns from a command prompt, just as you would for any other computer. Although the sign-in process appears to the user as a single event, it is actually made up of two parts: The user provides credentials, usually a user account name and password, which are then checked against the AD DS database. If the user account name and the password match the information that is stored in the AD DS database, the user becomes an authenticated user and is issued a TGT by the domain controller. At this point, the user does not have access to any resources on the network. A secondary process in the background submits the TGT to the domain controller and requests access to the local machine. The domain controller issues a service ticket to the user, who is then able to interact with the local computer. At this point in the process, the user is authenticated to AD DS and signed in to the local machine.
When a user subsequently attempts to connect to another computer on the network, the secondary process is run again, and the TGT is submitted to the nearest domain controller. When the domain controller returns a service ticket, the user can access the computer on the network, which generates a logon event at that computer.
Note: A domain-joined computer also logs on to AD DS when it startsa fact that is often overlooked. You do not see the transaction when the computer uses its computer account name and a password to log on to AD DS. Once authenticated, the computer becomes a member of the Authenticated Users group. Although the computer log on event does not have any visual confirmation in a GUI, it is recorded in the event log. Also, if auditing is enabled, additional events are recorded in the Security Log of the Event Viewer.
If the RID master is unavailable, you can experience difficulties adding new objects to the domain. As domain controllers use their existing RID's they will eventually run out of RID's and be unable to create new objects. Infrastructure master. This role maintains inter-domain object references, such as when a group in one domain contains a member from another domain. In this situation, the infrastructure master is responsible for maintaining the integrity of this reference. For example, when you look at the security tab of an object, the system looks up the SIDs that are listed and translates them finto names. In a multi-domain forest, the infrastructure master looks up SIDs from other domains. If the infrastructure master is unavailable, domain controllers that are not global catalogs will be unable to check universal group memberships and will be unable to authenticate users. The infrastructure role should not reside on a global catalog server, unless you have a single domain forest. The exception is when you follow best practices and make every domain controller a global catalog. In that case, the infrastructure role is not required because every domain controller knows about every object in the forest. Primary domain controller (PDC) emulator master. The domain controller that holds the PDC emulator is the time source for the domain. The PDC emulators in each domain in a forest synchronize their time with the PDC emulator in the forest root domain. You set the PDC emulator in the forest root domain to synchronize with an external atomic time source. The PDC emulator is also the domain controller that receives urgent password changes. If a user's password is changed, the information is sent immediately to the domain controller holding the PDC emulator. This means that if the user subsequently tried to sign in and they were authenticated by a domain controller in a different location that had not yet received an update about the new password, the domain controller in the location to which the user tried to sign in would contact the domain controller holding the PDC emulator and check for recent changes. If the PDC emulator is unavailable, users may have trouble signing on until their password change has replicated to all the domain controllers. The PDC emulator is also used when editing GPOs. When a GPO other than a local GPO is opened for editing, the copy that is edited is the one stored on the PDC emulator. This is done to prevent conflicts if two administrators attempted to edit the same GPO at the same time on different domain controllers. However, you can choose to use a specific domain controller for editing GPOs. This is especially useful when editing GPOs in a remote office with a slow connection to the PDC emulator.
Note: The global catalog is not one of the operations master roles.
Note: The five FSMO roles are also known as: Schema operations master Domain naming operations master infrastructu re operations master RID operations master PDC emulator operations master
Lesson 3
The installation method that you use vares with the circumstances. This lesson examines several ways to install additional domain controllers such as installing AD DS on a local machine and on a remote server by using Server Manager, installing AD DS on a Server Core installation, and installing AD DS by using a snapshot of the AD DS database that is stored on removable media. This lesson also examines how to upgrade a domain controller from n earlier Windows operating system to Windows Server 2012. Finally Windows Azure Active Directory (Windows Azure AD) and how to install a domain controller in Windows Azure is discussed.
Lesson Objectives
After completing this lesson, you will be able to: Explain how to install a domain controller by using the GUI. Explain how to install a domain controller on a Server Core installation of Windows Server 2012. Explain how to upgrade a domain controller by using Install from Media. Explain how to install a domain controller by using Install from Media. Describe Windows Azure AD. Understand how to deploy domain controllers in Windows Azure.
Deployment Configuration page of the Active Directory Domain Services Configuration Wizard
ployrnent Configuration
5.11G.E.1~1,01001 ;
Note: The Active Directory Domain Services Installation Wizard (which can be opened from the command line by typing dcpromo.exe) is deprecated beginning in Windows Server 2012.
Before installing a new domain controller you need to have the answers to the following questions. Question Comments Answering this question will determine what additional information you might need, such as the parent domain name.
Are you installing a new forest, a new tree or an additional domain controller for an existing domain? What is the DNS name for the AD DS domain?
When you are creating the first domain controller for a domain you must specify the fully qualified domain name (FQDN). When you are adding a domain controller to an existing domain or forest the existing domain information will be provided in the wizard. The forest functional level determines the forest features that will be available and the supported domain controller operating system. This also sets the minimum domain functional level for the domains in the forest. The domain functional level determines the domain features that will be available and the supported domain controller operating system. , l Your DNS must be functioning well to support AD DS.
Will the domain controller be a DNS server? Will the domain controller host the global catalog? Will the domain controller be a RODC? What will the Directory Services Restore Mode (DSRM) password be? What is the NetBIOS name for I the AD DS domain? Where will the database, log files, and SYSVOL folders be created?
! This option is selected by default for the first domain controller in i a forest and cannot be changed. : This option is not available for the first domain controller in a j forest. This is required to be able to recovery the active directory database from a backup.
I When creating the first domain controller for a domain you must I specify the NetBIOS name for the domain. By default, the database and log files folder is C:\Windows\NTDS. By default the SYSVOL folder is C:\Windows\SYSVOL.
When you run Server Manager on the local system you install the AD DS role. At the end of the initial installation process, the AD DS files are installed but AD DS is not yet set up on that server. To set up AD DS, you need to configure it by using the Active Directory Domain Services Configuration Wizard. You start the wizard by clicking the AD DS link in Server Manager. The wizard will allow you to do one of the following operations: Add a domain controller to an existing domain Add a new domain to an existing forest Add a new forest
The specific steps that you follow in the rest of the wizard depends on the operation you wish to complete.
Note: If you need to restore the AD DS database from a backup, restad the domain controller in DSRM. When the domain controller starts up it is not running the AD DS services, instead, it is running as a member server in the domain. To sign in to that server in the absence of AD DS, sign in using the Directory Services Recovery Mode password.
Note: Windows Server 2012 supports cloning AD DS servers. Before being cloned an AD DS rever must be a member of the Cloneable Domain Controllers group. Additionally the PDC emulator must be online and available to the cloned DC, and must be running Windows Server 2012.
Additional Reading: For complete details on using the Windows PowerShell command Install-ADDSDomainController see the article "Install Active Directory Domain Services (Level 100)"at http://go.microsoft.com/fwlink/?LinkID=331087. Refer to the following site for details: AD DS Deployment Cmdlets in Windows PowerShell, http://go.microsoft.com/fwlink/?LinkID=331089
Note: With this type of upgrade, there is no need to preserve users' settings and reinstall applications; everything is upgraded in-place. Remember to check for hardware and software compatibility before performing an upgrade.
To introduce a clean install of Windows Server 2012 as a domain controller, perform the following steps: 1. 2. Deploy and configure a new installation of Windows Server 2012 and join it to the domain. Promote the new server to be a domain controller in the domain by using Server Manager 2012 or one of the other methods described previously. Update client DNS settings that are referring to the old domain controller(s) to use the new domain controller.
3.
Note: You can upgrade directly from Windows Server 2008 and Windows Server 2008 R2 to Windows Server 2012.
Ifin
create SYSVOL ful7 C:\IFM 2. On the server that you are promoting to a domain controller, perforen the following steps: a. b. Use Server Manager to add the AD DS role. Wait while the AD DS files install.
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
c.
In Server Manager, click the Notification icon and under Post-Deployment Configuration, click Promote this server to a domain controller. The Active Directory Domain Services Configuration Wizard runs.
d.
On the appropriate page of the wizard, select the option to install from IFM, and then provide the local path to the snapshot directory.
3. 4.
AD DS then installs from the snapshot. When the domain controller restarts, it contacts other domain controllers in the domain and updates AD DS with any changes that were made since the snapshot was created.
Additional Reading: For more information about the steps necessary to install AD DS, see Install Active Directory Domain Services (Level 100) at http://go.microsoft.com/fwlink/?LinkID=266739.
Windows Azure AD only includes: Windows Azure AD which supports identity management in the cloud Windows Azure Access Control Service which supports federation with external identity management services, including your on-premises AD DS
Windows Azure AD does not support Active Directory Integrated Applications, for applications to integrate with Windows Azure AD they need to be written for Windows Azure AD.
Note: Windows Server 2012 AD which has been deployed in Windows Azure is not the same as Windows Azure AD. Windows Server 2012 AD which has been deployed in Windows Azure is your own roles and services (AD DS, AD LDS, AD FS, AD CS, and AD RMS) which you have deployed into Windows Azure. When you deploy AD DS in Windows Azure you are responsible for maintaining everything except the hardware. Windows Azure AD is a service that Microsoft has configured in the cloud. It does not have all of the functions that an on-premises AD DS has; it is primarily concerned with identity management and access control. With Windows Azure AD you are only responsible for managing your data.
Windows Server 2012 has been designed to make it easy for you to integrate it into cloud-based systems. One of the most important decisions an administrator must make is whether the organization should use public cloud IaaS, private cloud virtualization technology, or continue to use physical servers. When implementing AD DS in Windows Azure consider the following: Roliback. While Windows Azure does not provide rollback services to customers, Windows Azure servers may be rolled back as a regular part of maintenance. Domain controller replication depends on Update Sequence Numbers (USN), when an AD DS system is rolled back duplicate USNs could be created. To prevent this, Windows 2012 AD DS introduced a new identifier named VM-Generation ID. VM-Generation ID can detect a rollback, and prevents the virtualized domain controller from replicating changes outbound until the virtualized AD DS has converged with the other domain controllers in the domain. Virtual machine limitations. Windows Azure virtual machines are limited to 14 GB of RAM and one network adapter. Also, the snapshot feature is not supported. Deploying Windows Server 2012 AD on Windows Azure virtual machines is subject to the same guidelines as running AD DS on-premises in a virtual machine. These guidelines include the following: Time Synchronization. A Windows-based AD DS domain infrastructu re relies loosely on all communicating machines having the correct time. When domain controller clocks and domain member clocks have a time difference of more than five minutes, clients cannot sign in or access resources on the network. Therefore, Windows has the Windows Time Service (w32time). This service ensures that the time is synchronized across the domain in the following manner: o o Domain members obtain the time from their domain controller. Domain controllers use the PDC emulator from their own domain or from their parent domain.
o The PDC emulator of the root domain should be configured with an external time source, such as an internet time provider using the network time protocol (NTP). In virtualized environments time synchronization is not as easy as on physical computers. The virtualization engine regulates the use of the virtualization host's central processing units (CPUs) and distributes it among the virtual machines as needed. The clock of the operating system relies on stable CPU cycles, which do not exist in virtual environments. Virtualization engines perform time synchronization with the guest computers by default.. When virtualization hosts do not participate in time synchronization, it is likely the domain time and the virtualization host time will become out of synchronization. While the physical computers participate in the time synchronization, virtual machines are reset to the time on the virtualization host. You must configure the virtualization host to participate in time synchronization or disable the synchronization to the virtual domain controllers for the time synchronization to work properly. Single Point of Failure. Your AD DS domain controllers are the most important pieces of your infrastructure. If they fail, users are unable to sign in, access resources or applications, and certain services may not run as well as other applications or services. When virtualizing domain controllers, it is very important that there is not a single point of failure of your domain controller AD DS infrastructure. Setting up alI domain controllers as virtual servers on the same virtualization cluster is considered a single point of failure. Similarly, using replicated SANs between datacenters can become a single point of failure if corrupt data is replicated. If domain controllers are distributed as mentioned in the Domain Membership section, you will ensure that there is not a single point of failure. This will save you from having to recover your entire forest if anything happens to your virtualization infrastructure. Question: What is the reason to specify the DSRM password?
Objectives
After performing this lab, you will be able to: Install a domain controller. Install a domain controller by using IFM.
Lab Setup
Estimated time: 45 minutes
Virtual machines
Adatum\Administrator Pa$$wOrd
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410C-LON -DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: o o o User name: Administrator Password: Pa$$wOrd Domain: Adatum
The main tasks for this exercise are as follows: 1. 2. 3. K 1. 2. Add an Active Directory Domain Services (AD DS) role to a member server. Configure a server as a domain controller. Configure a server as a global catalog server. Task 1: Add an Active Directory Domain Services (AD DS) role to a member server On LON-DC1, in Server Manager, add LON-SVR1 to the server list. Add the Active Directory Domain Services server role to LON-SVR1. Add all required features as prompted. Installation will take severa! minutes. 3. K When the installation completes, click Close to close the Add Roles and Features Wizard. Task 2: Configure a server as a domain controller On LON-DC1, use Server Manager to promote LON-SVR1 to a domain controller, and choose the following options: o o o Add a domain controller to the existing Adatum.com domain Use the credentials Adatum \Administrator with the password Pa$$wOrd For Domain Controller Options, install the Domain Name System, but remove the selection to install the global catalog The DSRM password is Pa$$wOrd For all other options, use the default options
o o K 1. 2.
Task 3: Configure a server as a global catalog server Sign in to LON-SVR1 as Adatum \Administrator with the password Pa$$wOrd. Use Active Directory Sites and Services to make LON-SVR1 a global catalog server.
E Task2:AddtheAD DS roletothememberserver
1. 2. 3. Switch to LON - SVR2, and sign in as Adatum\Administrator with the password Pa$$wOrd. Open a command prompt and map the drive letter K: to \\LON- DC1\C$\IFM. Use Server Manager to install the AD DS server role on LON-SVR2.
La b Review Questions
Question: Why did you use Server Manager and not Dcpromo.exe when you promoted a server to be a domain controller? Question: What are the three operations masters found in each domain? Question: What are the two operations masters that are present in a forest? Question: What is the benefit of performing an IFM install of a domain controller?
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
3-1
Module 3
Managing Active Directory Domain Services Objects
Contents:
Module Overview Lesson 1: Managing User Accounts Lesson 2: Managing Groups Lesson 3: Managing Computer Accounts Lesson 4: Delegating Administration Lab: Managing Active Directory Domain Services Objects Module Review and Takeaways 3-1 3-2 3-11 3-20 3-27 3-31 3-38
Module Overview
AD DS can help you manage your network more effectively in many ways. For instance, it allows you to manage user and computer accounts as part of groups instead of managing one account at a time. It also provides ways to delegate administrative tasks to various people to help you distribute workloads efficiently. Managing computer identities is becoming more and more complex as more employees bring their own devices into the workplace. As bring your own device (BYOD) programs expand you will be managing computer accounts that run on many types of personal devices which in turn are running various operating systems. AD DS has many features that can make that easier. This module describes how to manage user accounts and computer accounts, including how to manage BYOD programs. It covers how to manage an enterprise network by managing groups, instead of managing individual identities, and how to delegate administrative tasks to designated users or groups to ensure that enterprise administration is efficient and effective.
Objectives
After completing this module, you will be able to: Manage user accounts with graphical tools. Manage group accounts with graphical tools. Manage computer accounts. Delegate permissions to perform AD DS administration.
3-2 ManagingAdiveDirectoryDomainServicesObjects
Lesson 1
ManagingUserAccounts
A user object in AD DS is far more than just properties related to the user's security identity, or account.It is the cornerstone of identity and access in AD DS. Therefore, consistent, efficient, and secure processes regarding the administration of user accounts are the cornerstone of enterprise security management. Although users and computers, and even services, change over time, business roles and rules tend to be more stable. Your business probably has a finance role, which requires certain capabilities in the enterprise. The user or users who perform that role might change over time, but the role will remain relatively the same. For that reason, it is not sensible to manage an enterprise network by assigning rights and permissions to individual users, computers, or service identities. Instead, you should associate management tasks with groups. Consequently, it is important that you know how to use groups to identify administrative and user roles, to filter Group Policy Objects (GPOs), to assign unique password policies, and to assign rights and permissions.
Lesson Objectives
After completing this lesson, you will be able to: View AD DS objects by using various AD DS administration tools. Explain how to create user accounts that you can use in an enterprise network. Describe how to configure important user account attributes. Describe how to create user profiles. Explain how to manage user accounts.
AD DS Administration Tools
Before you can begin creating and managing user, group, and computer accounts, it is important that you understand which tools you can use to perform these various management tasks. To manage AD OS objects, you can use the following graphical tools: Active Directory Administration snap- ris Active Directory Administrative Center
You can also use the following commandline tools: Active Directory module in Windows PowerSheil Directory Service commands
and organizational units (OUs). This is likely to be the most heavily used snap-in for an Active Directoryadministrator. Active Directory Sites and Services. This snap-in manages replication, network topology, and related services. Active Directory Domains and Trusts. This snap-in configures and maintains trust relationships and the forest functional leve!. Active Directory Schema. This snap-in examines and modifies the definition of Active Directory attributes and object classes. It is the blueprint for AD DS. It is rarely viewed, and even more rarely changed. Therefore, the Active Directory Schema snap-in is not registered, by default.
Note: To register the Active Directory Schema snap-in, run the following command in an elevated command prompt:
regsvr32 s changan- d7 7
Note: To administer AD DS from a computer that is not a domain controller, you must install Remote Server Administration Tools (RSAT). RSAT can be installed from the Features node of Server Manager on Windows Server 2012. You also can install RSAT on Windows clients, including Windows Vista Service Pack 1 (or newer), Windows 7, and Windows 8. After you download the RSAT installation files from the Microsoft website, run the Setup Wizard, which steps you through the installation. After installing RSAT, you must turn on the tool or tools that you want to use. To do this, in Control Panel, on the Programs And Features category page, use Turn Windows Features On or Off.
Reference Links: To download the RSAT installation files, see the Microsoft Download Centerat http://go.microsoft.com/fwlink/?LinkID=266735.
Windows PowerShell
You can use the Active Directory module for Windows PowerShell (Active Directory module) to create and manage objects in AD DS. Windows PowerShell is not only a scripting language; it also enables you to run commands that perform administrative tasks, such as creating new user accounts, configuring services, deleting mailboxes, and similar functions. Windows PowerShell is installed by default on Windows Server 2012, but the Active Directory module is only present when you do one of the following: Install the AD DS or Active Directory Lightweight Directory Services (AD LDS) server roles. Promote a computer to a domain controller Install RSAT.
3-4 ManagingActiveDirectoryDomainServicesObjects
1E
Note: It is possible to pipe the results of the dsquery command to other Directory Service commands. For example, typing the following at a command prompt returns the office telephone number of all users that have a name starting with John:
dsquery user -name John* / dsget user
Note: Although AD DS accounts are the focus of this course, you also can store user accounts in the local security accounts manager (SAM) database of each computer, enabling local sign-in and access to local resources. Local user accounts are, for the most part, beyond the scope of this course.
When you create a new user object, you are not required to define many attributes beyond those required to allow the user to log on by using the account. Since you can associate a user object with many attributes, it is important that you understand what these attributes are, and how you can use them in your organization.
Attribute Categories
The attributes of a user object fall into several broad categories. These categories appear in the navigation pane of the User Properties dialog box in the Active Directory Administrative Center, and include the following: Account. In addition to the user's name properties (First name, Middle initial, Last name, Full name) and the user's various logon names (User UPN logon, User SamAccountName logon), you can configure the following additional properties: o Log on hours. This property defines when the account can be used to access domain computers. You can use the weekly calendar style view to define Logon permitted hours and Logon denied hours. Log on to. Use this property to define which computers a user can use to log on to the domain. Specify the computer's narre and add it to a list of allowed computers. Account expires. This value is useful when you want to create temporary-use user accounts. For example, you might want to create user accounts for interns that are used for just one year. You can use this value to set an account expiration date in advance. The account cannot be used after the expiration date until manually reconfigured by an administrator. o User must change password at next log on. This property enables you to force a user to reset their own password the next time they log on. This is typically something you might enable after you have reset a user's password. Smart card is required for interactive log on. This value resets the user's password to a complex, random sequence of characters, and sets a property that requires that the user use a smart card to authenticate during logon. Password never expires. This is a property that you normally use with service accounts; that is, those accounts that are not used by regular users but by services. By setting this value, you must remember to update the password manually on a periodic basis; however, you are not forced to do so at a predetermined interval. Consequently, the account can never be locked out due to password expirationa feature that is particularly important for service accounts. o o User cannot change password. Again, this option is generally used for service accounts. Store password using reversible encryption. This policy provides support for programs that use protocols that require knowledge of the user's password for authentication purposes. Storing passwords using reversible encryption is essentially the same as storing plaintext versions of the passwords. For this reason, this policy should never be enabled unless program requirements outweigh the need to protect password information. This policy is required when using Challenge Handshake Authentication Protocol (CHAP) authentication through remote access or Internet Authentication Service (IAS). It is also required when using Digest Authentication in Internet Information Services (IIS). o Account is trusted for delegation. You can use this property to allow a service account to impersonate a standard user to access network resources on behalf of a user. Organization. This includes properties such as the user's Display name, Office, Email Address, various contact telephone numbers, managerial structure, department and company names, addresses and so forth. Member of. This section enables you to define the group memberships for the user.
Profile. This section enables you to configure a location for the user's personal data, and to define a location in which to save the user's desktop profile when he or she logs out.
Extensions. This section expones many additional user properties, most of which do not normally require manual configu ration.
roaming profile.
~~ Note: As a best practice, use a subfolder of the user's home folder for the user's profile path.
Logon script. This script is the name of a batch file that contains commands - that execute when the user logs on. Typically, you use these commands to create drive mappings. Rather than use a logon script batch file, administrators typically implement logon scripts by using GPOs or Group Policy preferences. If you use a login script, this value should be in the form of a filename (with extension) only. Scripts should be stored in the C:\Windows\SYSVOL\domain\scripts folder on alI domain controllers. Home folder. This value enables you to create a personal storage area in which users can save their personal documents. You can specify either a local path, or more usually, a UNC path to the user's folder. You also must specify a drive letter that is used to map a network drive to the specified UNC path. You can then configure a user's personal documents to this redirected home folder.
3-8 ManagingActiveDirectoryDomainServicesObjects
Note: When creating user accounts to use as templates, and using a common location for the profile path and home folder, it is recommended that you use the %username% variable in the path so that AD DS can automatically create these folders when the account is used as a template. For example, you could use the following paths where the fileserver is named LON-FS and shares have been created for the profiles and home folders, profile$ and home$ respectively: Profile Path: \\LON-FS\profile$\%username% Home folder Connect H: to \\LON-FS\honne$\%username%
You can use these sub-nodes to configure all aspects of a user's desktop profile and app settings. For a given sub-node, such as Documents, you can choose between Basic and Advanced redirection. In Basic redirection, all users affected by the GPO have their Documents folder redirected to an individual named subfolder off a common root folder defined by a UNC narre, for example, \\LON-SVR1\Users\. In Advanced redirection you can use security group membership to specify where a user's settings and documents will be stored.
Use Windows PowerShell to: o o o Find inactive user accounts. Find disabled user accounts. Delete disabled user accounts.
Find users that have not signed in during the Iast 30 days
1. 2. Open Windows PowerShell. Run the following commands: $logonDate (get-date).AddDays(-30) Get-ADUser -Fi lter{lastLogon -le SlogonDa
2.
Examine the output to verify the properties were copied from the template.
Lesson 2
Managing Groups
While it might be practical to assign permissions and abilities to individual user accounts in small networks, it becomes impractical and inefficient in large enterprise networks. For example, if many users need the same level of access to a folder, it is more efficient to create a group that contains the required user accounts, and then assign the group the required permissions. This has the added benefit of enabling you to change a user's file permissions by adding or removing them from groups rather than editing the file permissions directly. Before implementing groups in your organization, you must understand about the scope of various Windows Server group types, and how best to use these to manage access to resources or to assign management rights and abilities.
Lesson O bjectives
After completing this lesson, you will be able to: Describe group types. Describe group scopes. Explain how to implement group management. Describe default groups. Describe special identities. Manage groups in Windows Server.
Group Types
In a Windows Server 2012 enterprise network, there are two types of groups: security, and distribution. When you create a group, you choose the group type and scope. Distribution groups, which are not security-enabled, are used primarily by email apps. Distribution groups have security identifier (SIDs) however they have an Active Directory groupType attribute of 0x2 (ACCOUNT_GROUP), so they cannot be given permission to resources. Sending an email message to a distribution group sends the message to all group members. Security groups are security-enabled, and are used to assign permissions to various resources. Security groups have SIDs, with an Active Directory groupType attribute of 0x80000002 (ACCOUNT_GROUP 1 SECURITY_ENABLED). You can therefore use these groups in permission entries in access control lists (ACLs) to control security for resource access. Because they also include the account group type, you also can use security groups as a means of distribution for email apps. If you want to use a group to manage security, it must be a security group.
Both security groups and distribution groups can be converted to the other type of group.
Distribution groups
- Used only with email applications Not security-enabled (no SID); cannot be given permissions
Security groups
Security principal with an STD: can be gven permissions Can also be ernail-enabted
3-12 ManagingAdiveDirectoryDomainServicesObjects
Because you can use security groups for both resource access and email distribution, many organizations use only security groups. However, we recommend that if a group is used only for email distribution, you should create the group as a distribution group. Otherwise, the group is assigned a SID, and the SID is added to the user's security access token, which can make the token unnecessarily large. A security group can be converted to a distribution group at any time; when you do this the groupType attribute changes from 0x80000002 (ACCOUNT_GROUP 1 SECURITY_ENABLED) to 0x2 (ACCOUNT_GROUP). A security group which has been converted to a distribution group therefore loses all permissions assigned to it, even though the ACLs still contain the SID. When a distribution group is converted to a security group the reverse occurs, the groupType attribute changes from 0x2 (ACCOUNT_GROUP) to 0x80000002 (ACCOUNT_GROUP1SECURITY_ENABLED),If the distribution group was a previously converted security group you may inadvertently grant users access to rights and permissions that had been assigned to the group when it was previously a security group.
Note: Consider that when you add a user to a security group, the user's access token which authenticates user processesupdates only when the user signs in. Therefore, if the user is currently signed in, they must sign out and sign back in to update their access token with any changed group memberships.
cttt-t1
Note: The benefit of using distribution groups becomes more evident in large-scale Exchange Server deployments, especially where there is a need to nest these distribution groups across the enterprise.
Group Scopes
Windows Server 2012 supports group scoping. The scope of a group determines both the range of a group's abilities or permissions, and the group mennbership. There are four group scopes: Local. This group type is for standalone servers or workstations, on domain member servers that are not domain controllers, or on domain member workstations. Local groups are truly local, which means that they are available only on the computer where they exist. The important characteristics of a local group are: o o
tOM
Group Members from scope i . same doma , u, C, U, C 1 GG, Dia UG o, GG, and local usets . 1 U, C Dornain 1 U, C, Local 1 , GG, MG, UG GG, UG Local U, C Universal L- tau, UGG U, C, GO U C, GG, UG NiA On the local computer only . U, C GG i Itl/A Anywhere in the domain Anywhere in the forest Al-Ancheta in the domain or a tnisted dormir>
i
i NIA
U C
GG
LULG
LIG
You can assign abilities and permissions only on local resources, meaning on the local computer. Members can be from anywhere in the AD DS forest, and can include: K Any security principals from the domain: users, computers, global groups, or domain local groups. Users, computers, and global groups from any domain in the forest. Users, computers, and global groups from any trusted domain. Universal groups defined in any domain in the forest.
1 1
-
Domain local. This group type is used primarily to manage access to resources or to assign management responsibilities (rights). Domain local groups exist on domain controllers in an AD DS forest, and consequently, the group's scope is localized to the dornajo in which they reside. The important characteristics of domain local groups are: o You can assign abilities and permissions only on dornajo local resources, meaning on all computers in the local domain. Members can be from anywhere in the AD DS forest, and can include: Any security principals from the domain: users, computers, global groups, or dornajo local groups. K
11 11
1
1
1
1
Users, computers, and global groups from any domain in the forest. Users, computers, and global groups from any trusted domain. Universal groups defined in any domain in the forest.
1
-
Global. This group type is used primarily to consolidate users that have similar characteristics. For example, global groups often are used to consolidate users that are part of a department or geographic location. The important characteristics of global groups are: o o You can assign abilities and permissions anywhere in the forest. Members can be only from the local domain, and can include: LI Users, computers, and global groups from the local domain. Universal. This group type is most useful in multidomain networks because it combines the characteristics of both domain local groups and global groups. Specifically, the important characteristics of universal groups are: o o You can assign abilities and permissions anywhere in the foreSt, as with global groups. Members can be from anywhere in the AD DS forest, and can include: Users, computers, and global groups from any domain in the forest. 11 Universal groups defined in any domain in the forest. o Properties of universal groups are propagated to the global catalog, and made available across the enterprise network on all dornajo controllers that holt the global catalog role. This makes universal groups' membership lists more accessible, which is useful in multidomain scenarios. For example, if a universal group is used for email distribution purposes, the process for determining the membership list typically is quicker in distributed multidomain networks.
1 1
1 1 1 1
3-14 ManagingActiveDirectoryDomainServicesObjects
The following table summarizes and compares the basic properties of the four group scopes:
Group! Scope
Local
Domain Users, Domain Computers, global groups and universal groups from any domain in the forest Domain local groups from the same domain Local Users from the computer
Local computer
resources only
N/A
Domain local
Domain Users, Domain Computers, global groups and universal groups from any domain in the forest Domain local groups from the same domain
Universal groups (as long as no other domain local groups exist as members)
Global
Domain Users, Domain Computers and global groups from the same domain
Universal groups (as long as it is not a member of any other global groups) Domain local groups Global groups (as long as no other universal groups exist as members)
Universal
Domain Users, Domain Computers, global groups and universal groups from any domain in the forest
These parts of IGDLA are related in the following way: Identities (user and computer accounts) are members of global groups, which represent business roles. Global groups (which are also known as role groups) are members of domain local groups, which represent management rulesfor example, determining who has Read permission to a specific collection of folders.
Domain local groups (which are also known as rule groups) are granted access to resources. In the case of a shared folder, access is granted by adding the domain local group to the folder's ACL, with a permission that provides the appropriate level of access.
In a multidomain forest, the best practice for group nesting is known as IGUDLA. The additional letter U stands for universal groups, which fit in between global and domain local groups as follows: Identities Global groups Universal groups Domain local groups Access
In this case, global groups from multiple domains are members of a single universal group. That universal group is a member of domain local groups in multiple domains.
IGDLA Exmple
This figure on the slide represents a group implementation that reflects the technical view of group management best practices (IGDLA), and the business view of role-based, rule-based management. Consider the following scenario: The sales force at Contoso, Ltd. has just completed its fiscal year. Sales files from the previous year are in a folder called Sales. The sales force needs Read access to the Sales folder. Additionally, a team of auditors from Woodgrove Bank, a potential investor, require Read access to the Sales folder to perform the audit. You would perform the following steps to implement the security required by this scenario: 1. Assign users with common job responsibilities or other business characteristics to role groups implemented as global security groups. Do this separately in each domain. Salespeople at Contoso are added to a Sales role group; Auditors at Woodgrove Bank are added to an Auditors role group. 2. Create a group to manage access to the Sales folders with Read permission. You implement this in the domain containing the resource that is being managed. In this case, the Sales folder resides in the Contoso domain. Therefore, you create the resource access management rule group as a domain local group named ACL_Sales Folders_Read. 3. Add the role groups to the resource access management rule group to represent the management rule. These groups can come from any domain in the forest or from a trusted domain, such as Woodgrove Bank. Global groups from trusted externa! domains, or from any domain in the same forest, can be members of a domain local group. 4. Assign the permission that implements the required level of access. In this case, grant the Allow Read permission to the domain local group. This strategy results in two single points of management, reducing the management burden. One point of management defines who is in Sales, the other point of management defines who is an Auditor. Because these roles are likely to have access to a variety of resources beyond the Sales folder, you have another single point of management to determine who has Read access to the Sales folder. Furthermore, the Sales folder might not be a single folder on a single server; it could be a collection of folders across multiple servers, each of which assigns the Allow Read permission to the single domain local group.
3-16 ManagingActiveDirecton/DomainServicesObjects
Default Groups
Windows Server 2012 creates a number of groups automatically. These are called default local groups, and they include well-known groups such as Administrators, Backup Operators, and Remote Desktop Users. There are additional groups that are created in a domain, both in the Builtin and Users containers, including Domain Admins, Enterprise Admins, and Schema Admins.
Carefully manage the default groups that provide administrative privileges, because these group Typically have broader privileges than are necessary for most delegated erwironments Often apply protection to their members
Enterprise Admins Schema Admins Administrators Doman'? Acirrans Server Operators Account Operators Backup Operators Print Operators Ceet Publishers 1 Usets container of the forest root domain Users container of the forest root domain Buitt- in container of each domain Users container of each domara Btait- in container of each domain Sun m container of each dornam Budt-in container of each domain Built-in container of each dornajo Users container ot each doman
have significant permissions and user rights related to the management of AD DS. Because of the rights that these groups have they are Protected groups. Enterprise Admins (in the Users container of the forest root domain). This group is a member of the Administrators group in every domain in the forest, which gives it complete access to the configuration of all domain controllers. It also owns the Configuration partition of the directory and has full control of the domain naming context in all forest domains. Schema Admins (Users container of the forest root domain). This group owns and has full control of the Active Directory schema. Administrators (Built-in container of each domain). Members of this group have complete control over all domain controllers and data in the domain naming context. They can change the membership of all other administrative groups in the domain, and the Administrators group in the forest root domain can change the membership of Enterprise Admins, Schema Admins, and Domain Admins. The Administrators group in the forest root domain is arguably the most powerful service administration group in the forest. Domain Admins (Users container of each domain). This group is added to the Administrators group of its domain. It therefore inherits all of the capabilities of the Administrators group. It is also, by default, added to the local Administrators group of each domain member computer, giving Domain Admins ownership of all domain computers. Server Operators (Built-in container of each domain). Members of this group can perforen maintenance tasks on domain controllers. They have the right to sign in locally, start and stop services, perform backup and restore operations, format disks, create or deleteshares, and shut down domain controllers. By default, this group has no members. Account Operators (Built-in container of each domain). Members of this group can create, modify, and delete accounts for users, groups, and computers located,in any OU in the domain (except the Domain Controllers OU), and in the Users and Computers containers. Account Operator group members cannot modify accounts that are members of the Administrators or Domain Admins groups, nor can they modify those groups. Account Operator group members also can sign in locally to domain controllers. By default, this group has no members. Backup Operators (Built-in container of each domain). Members of this group can perform backup and restore operations on domain controllers, and sign in locally and shut down domain controllers. By default, this group has no members.
Print Operators (Built-in container of each domain). Members of this group can maintain print queues on domain controllers. They also can sign in locally and shut down domain controllers.
Cert Publishers (Users container of each dornajo). Members of this group are permitted to publish certificates to the directory.
Protected Groups
Protected groups are defined by the operating system and cannot be unprotected. Members of a protected group become protected by association and no longer inherit permissions (ACLs) from their OU, but rather receive a copy of an ACL from the protected group. This protected group ACL offers quite a lot of protection to the members. For example, if you add Jeff Ford to the Account Operators group, his account becomes protected, and the help desk, which can reset all other user passwords in the Employees OU, cannot reset Jeff Ford's password.
Custom Groups
You should try to avoid adding users to the groups that do not have members by default (Account Operators, Backup Operators, Server Operators, and Print Operators). Instead, create custom groups to which you assign permissions and user rights that achieve your business and administrative requirements. For example, if Scott Mitchell should be able to perform backup operations on a dornajo controller, but should not be able to perform restore operations that could lead to database rollback or corruption, and should not be able to shut down a dornajo controller, do not put Scott in the Backup Operators group. Instead, create a group and assign it only the Backup Files And Directories user right, and then add Scott as a member.
Special Identities
Windows and AD DS also support special identities, which are groups for which membership is controlled by the operating system. You cannot view the groups in any list (in Active Directory Users and Computers, for example), you cannot view or modify the membership of these special identities, and you cannot add them to other groups. You can, however, use these groups to assign rights and permissions. Special identities
Are groups for which membership is controlled by the operating system Can be used by the Windows Server operating system to provide access to resources:
Based on the type of authentication or connection Not based on the user account
3-18 ManagingAdivearectoryDomahServicesObjects
The most important special identitiesoften referred to as groups (for convenience)are described in the following list: Anonymous Logon. This identity represents connections to a computer and its resources that are made without supplying a user name and password. Before Windows Server 2003, this group was a member of the Everyone group. Beginning with Windows Server 2003, this group is no longer a default member of the Everyone group. Authenticated Users. This represents identities that have been authenticated. This group does not include Guest, even if the Guest account has a password. Everyone. This identity includes Authenticated Users and the Guest account. (On computers that are running versions of the Windows Server operating system that precede Windows Server 2003, this group includes Anonymous Logon.) Interactive. This represents users accessing a resource while logged on locally to the computer that is hosting the resource, as opposed to accessing the resource over the network. When a user accesses any given resource on a computer to which the user is logged on locally, the user is added to the Interactive group automatically for that resource. Interactive also includes users who log on through a Remote Desktop connection. Network. This represents users accessing a resource over the network, as opposed to users who are logged on locally at the computer that is hosting the resource. When a user accesses any given resource over the network, the user is added automatically to the Network group for that resource. Creator Owner. This represents the security principal that created an object.
The importance of these special identities is that you can use them to provide access to resources based on the type of authentication or connection, rather than the user account. For example, you could create a folder on a system that allows users to view its contents when they are logged on locally to the system, but that does not allow the same users to view the contents from a mapped drive over the network. You could achieve this by assigning permissions to the Interactive special identity.
3-20 ManagingAdiveDirectoryDomainSeivicesObjects
Lesson 3
A computer account begins its life cycle when you create it and join it to your domain. Thereafter, day-today administrative tasks include the following: Configuring computer properties Moving the computer between OUs Managing the computer itself Renaming, resetting, disabling, enabling, and eventually deleting the computer object
It is important that you know how to perform these various computer-management tasks so you can configure and maintain the computer objects within your organization.
Lesson Objectives
After completing this lesson, you will be able to: Explain the purpose of the AD DS Computers container. Describe how to configure the location of computer accounts. Explain how to control who has permission to create computer accounts. Describe how to perform an offline domain join. Describe computer accounts and the secure channel. Explain how to reset the secure channel.
1 51 Note: You can use the Redircmp.exe command-line tool to reconfigure the default container for computers. For example, if you want to change the default container for computers to an OU called mycomputers, use the following syntax: redi runp ou=mycomputers, DC=contoso, dc-com
3-22 ManagingAdiveDirectoryDomainServicesObjects
Note: You do not have to create a computer object in the directory service, but it is recommended. Many administrators join computers to a domain without first creating a computer object. However, when you do this, Windows Server attempts to join the domain to an existing object. When Windows Server does not find the object, it fails and creates a computer object in the default Computers container.
The process of creating a computer account in advance is called pre-staging a computer. There are two major advantages of pre-staging a computer: The account is placed into the correct OU, and is therefore delegated according to the security policy defined by the ACL of the OU. The computer is within the scope of GPOs linked to the OU, before the computer joins the domain.
After you have been given permission to create computer objects, you can do so by right-clicking the OU and from the New menu clicking Computer. Next, enter the computer name, following the naming convention of your enterprise, and select the user or group that is allowed to join the computer to the domain with this account. The computer names that you type into the two fieldsComputer Name and Computer Name (pre-Windows 2000)should be the same. Very rarely is there a justification for configuring them separately.
Delegating Permissions
By default, the Enterprise Admins, Domain Admins, Administrators, and Account Operators groups have permission to create computer objects in any new OU. However, as discussed earlier, we recommend that you tightly restrict membership in the first three groups, and that you do not add Administrators to the Account Operators group. Instead, you should delegate the permission to create computer objects (called Create Computer Objects) to appropriate administrators or support personnel. This permission, which is assigned to the group to which you are delegating administration, allows group members to create computer objects in a specified OU. For example, you might allow your desktop support team to create computer objects in the clients OU, and allow your file server administrators to create computer objects in the file servers OU.
To delegate permissions to create computer accounts, you can use the Delegate Control Wizard to choose a custom task to delegate. When you delegate permissions to manage computer accounts, you might consider granting additional permissions beyond those required to create computer accounts. For example, you might decide to allow a delegated administrator to manage the properties of existing computer accounts, to delete the computer account, or to move the computer account.
J Note: If you want to allow a delegated administrator to move computer accounts, consider that they require the appropriate permissions both in the source AD DS container (where the computer currently exists), and in the target container (where the computer will be moved to). Specifically, they must have Delete Computer permissions in the source container and Create Computer permissions in the target container.
3-24 ManagingActiveDirectoryDomainServicesObjects
When performing a DirectAccess offline domain join, the computer account should be added to the DirectAccessClients group before initially running Djoin.exe and creating the domain join file. Additional Djoin.exe options are available if DirectAccess has been configured to use public key infrastructure (PKI).
Note: To apply the domain join file to a Windows image (.wim) file or virtual hard disk (.vhd or .vhdx) file, first use the Deployment Image Servicing and Management (DISM.exe) command-line tool to mount the image to a file system, and then use the djoin command to apply the domain join file. After the Djoin.exe process is complete, you can then use DISM.exe to unmount the image file and prepare the .wim file for deployment
The following topic discurses the steps to take when one of these scenarios happens.
When the secure channel fails, you must reset it. Many administrators do this by removing the computer from the dornajo, putting it in a workgroup, and then rejoining the domain. When you remove the computer from the domain, the computer account in AD DS is disabled. When you rejoin the computer to the dornajo, the same computer account is reused and activated. Do not rename the computer when you join it to the dornajo. You can also reset the secure channel between a domain member and the domain by using the following: Active Directory Users and Computers Active Directory Adnninistrative Center the Dsmod.exe command line tool the NetDom.exe command line tool the Nltest.exe command line tool
If you reset the account, the computer's SID remains the same, and it maintains its group memberships. To reset the secure channel by using Active Directory Users and Computers: 1. 2. 3. Right-click a computer, and then click Reset Account. Click Yes to confirm your choice. Rejoin the computer to the dornajo, and then restart the computer.
To reset the secure channel by using Active Directory Administrative Center: 1. 2. 3. Right-click a computer, and then click Reset Account. Click Yes to confirm your choice. Rejoin the computer to the domain, and then restart the computer.
To reset the secure channel by using Dsmod: 1. Ata command prompt, type the following command:
dsmod computer "ComputerDN"
- reset
2.
Rejoin the computer to the dornajo, and then restart the computer.
3-26 ManagingActiveDirectoryDomainServicesObjects
To reset the secure channel by using NetDom.exe, type the following command at a command prompt, where the credentials belong to the local Administrators group of the computer:
This command resets the secure channel by attempting to reset the password on both the computer and the domain, so it does not require rejoining or rebooting. To reset the secure channel by using NLTest.exe, on the computer that has lost its trust, type the following command at a command prompt: nitest /server:servername /sc reset:domain\domaincontro77er You also can use Active Directory module for Windows PowerShell to reset a computer account. The following example demonstrates how to reset the secure channel between the local computer and the domain to which it is joined. You must run this command on the local computer:
1 1 1 1 1
1
Note: You also can reset a remote computer's password with Windows PowerShell: invoke-command
-computername
1 1 1 1
1 1 1
Lesson 4
Delegating Administration
Although a single person can manage a small network with a few user and computer accounts, as the network grows, the volume of work that relates to network management grows too. At some point, teams with particular specializations evolve, each with responsibility for some specific aspect of network management. In AD DS environments, it is common practice to create OUs for different departments and geographical regions, and to delegate control of those OUs to different people. It is important that you know why and how to create OUs, and how to delegate administrative tasks to users on objects within those OUs.
Lesson O bjectives
After completing this lesson, you will be able to: Describe the use of OUs. Describe AD DS permissions. Determine a user's effective AD DS permissions on an AD DS object. Delegate administrative control of an AD DS object to a specified user or group of users.
1 1
1
OUs allow you to subdivide the Domani for management purposes OUs are used for: Delegation of control Application of GPOs The OU structure can be: Fiat one to two levels deep Deep, more than 5 leyels deep Warrow, anything in between
Builtin
p. 2 Computer%
Development Domain Controllers ForeignSecurityPrincipals rri Managed Service Accounts 711 Sales Sydney Clients
.
31 Toronto Client,
- Both delegation of control and application of GPOs When you design an OU hierarchy there are many different strategies that you can follow. You can create a fat, wide structure that has OUs that are only one or two levels deep; you can create a deep, narrow structure nesting five or more levels of OUs; or you can create anything in between. The key factor in designing your OU hierarchy is that it should help your manage your organization. How you design your OU hierarchy could be based on any of the following: Geographic location. There could be local IT staff for delegating management, local regulations that require specific policies, or a myriad of other factors. Departmental characteristics. Typically different departments are managed differently and have unique requirements. Resource type. Some organizations create separate OUs for different resources. File servers are typically managed differently than SQL servers and require different polices applied to them.
1 1
3-28 ManagingActiveDirectoryDomainServicesObjects
Management structu re. Some organizations want their OU hierarchy to mirror their management structure.
Any combination of the aboye. There is no one right way to design your OU hierarchy.
For example, you might have a diverse organization with offices in many geographic locations, and there are sufficient IT staff at most locations. You could create top level OUs based on these geographic locations and delegate control of these OUs to the local IT staff. Each of these could have child OUs based on the departments in those locations with GPOs applied to those OUs to enforce departmental settings. Another design for the same organization could have the top level OUs representing the departmental structure with child OUs representing locations.
AD DS Permissions
All AD DS objects, such as users, computers, and groups, can be secured by using a list of permissions. The permissions on an object are called access control entries (ACEs), and they are assigned to users, groups, or computers, which are also known as security principals. ACEs are saved in the object's discretionary access control list (DACL), which is part of the object's ACL. The ACL contains the system access control list (SACL) that includes auditing settings. Each object in AD DS has its own ACL. If you have sufficient permissions, you can modify the permissions to control the level of access on a specific AD DS object. If you have sufficient permissions, you can also delegate administrative controlthat is, just as you can give a group the ability to change files in a folder, you can give a group the ability to reset passwords on user objects, for example. You can also use the DACL of an object to assign permissions to an object's specific properties. For example, you can allow (or deny) permission to Read phone and email options or Write phone and email options. While you can do this with a single checkbox, this is actually a property set that includes multiple, specific properties. Using property sets, you can easily manage permissions to commonly used collections of properties. However, you can also assign more granular permissions and allow or deny permission to change just some of the information, such as the mobile telephone number or the street address. Assigning the help desk permission to reset passwords for each individual user object is tedious. Even so, in AD DS, it is not a good practice to assign permissions to individual objects. Instead, you should assign permissions at the level of OUs. The permissions that you assign to an OU are inherited by all objects in the OU. Therefore, if you give the help desk permission to reset passwords for user objects and attach that permission to the OU that contains the users, all user objects within that OU will inherit that permission. In just one step, you have delegated that administrative task. Child objects inherit the permissions of the parent container or OU. That container or OU in turn inherits its permissions from its parent container or OU. If it is a first-level container or OU, it inherits the permissions from the domain itself. The reason child objects inherit permissions from their parents is that, by default, each new object is created with the Include inheritable permissions from this object's parent option enabled.
DPAIMILIMIW.21:.
1,10
14naI
ron WZ"I
pe.sma
Effective AD DS Permissions
Effective permissions are the resulting permissions for a security principal (such as a user or group), based on the cumulative effect of each inherited and explicit ACE. Your ability to reset a user's password, for example, might be due to your membership in a group that is allowed the Reset Password permission on an OU several levels aboye the user object. The inherited permission assigned to a group to which you belong results in an effective permission of Allow: Reset Password. Your effective permissions can be complicated when you consider Allow and Deny permissions, explicit and inherited ACEs, and the fact that you might belong to multiple groups, each of which might be assigned different permissions.
Permissions assigned to users and groups accumulate Best practica is to assign permissions to groups, not to individual users In the event of conflicto; Deny permissions override Allow permissions Explica permissions override Inherted permissions Explica Allow overrides Inherited Deny To evaluate effective permissions, you can use: The Effective Access tab Manual analyss
Permissions, whether assigned to your user account or to a group to which you belong, are equivalent. This means that ultimately an ACE applies to you, the user. The best practice is to manage permissions by assigning them to groups, but it is also possible to assign ACEs to individual users or computers. A permission that has been assigned directly to you, the user, is neither more important nor lens important than a permission assigned to a group to which you belong. The Allow permissions, which allow access, are cumulative. When you belong to several groups, and when those groups have been granted permissions that allow a variety of tasks, you will be able to perform all of the tasks assigned to all of those groups, and tasks assigned directly to your user account. Deny permissions, which deny access, override equivalent Allow permissions.If you are in one group that has been allowed the permission to reset passwords, and you are also another group that has been denied permission to reset passwords, the Deny permission prevents you from resetting passwords.
Deny permissions rarely. In fact, it is unnecessary to assign Deny permissions, because if you do not assign an Allow permission, users cannot perform the task. Before assigning a Deny permission, check to see if you could achieve your goal instead by removing an Allow permission. For example, if you want to delegate an Allow permission to a group, but exempt only one member from that group, you can use a Deny permission on that specific user account while the group still has an Allow permission. Every permission is granular. Even if you have been denied the ability to reset passwords, you might still have the ability through other Allow permissions to change the user's logon name or email address. Because child objects inherit the inheritable permissions of parent objects by default, and because explicit permissions can override inheritable permissions, an explicit Allow permission will actually override an inherited Deny permission.
Unfortunately, the complex interaction of user, group, explicit, inherited, Allow, and Deny permissions can make evaluating effective permissions tedious. You can use the permissions reported by the dsacls command, or listed on the Effective Access tab of the Advanced Security Settings dialog box to begin evaluating effective permissions, but it is still a manual task.
3-30 ManagingActiveDirectoryDomainSetvicesObjects
Demonstration:DelegatingAdministrativePermissions
This demonstration shows you how to: Create an OU.
- Move Objects into an OU. Delegate a standard task. Delegate a custom task. View AD DS permissions resulting from these delegations.
Objectives
After completing this lab, you will be able to: Delegate administration for a branch office. Create and configure user accounts in AD DS. Manage computer objects in AD DS.
Lab Setup
Estimated time: 60 minutes
Virtual machines
20410C-LON-DC1 20410C-LON-CL1
User name
Adatum\Administrator
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. 2. 3. 4. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410C-LON -DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: o o o User name: Administrator Password: Pa$$wOrd Domain: Adatum
3-32 ManagingActiveDirectoryDomainServicesObjects
2.
Move Holly Dickson from the IT OU to the Branch Office 1 OU. Move the following users to the Branch Office 1 OU: o o o o o Development\Bart Duncan Managers \Ed Meadows Marketing \Connie Vrettos Research\Barbara Zighetti Sales \Ariene Huff
5. 6. 7.
Move the LON-CL1 computer to the Branch Office 1 OU, and then restart the LON-CL1 computer. Sign in to LON-CL1 as Adatum \Ad ministrator with the password Pa$$wOrd. On LON-DC1, in Active Directory Users and Computers, use the Delegate Control Wizard to delegate administration of the Branch Office 1 OU to the Branch 1 Administrators security group by delegating the following common and custom tasks: a. Delegate the following common tasks: n K Create, delete, and manage user accounts Reset user passwords and force password change at next logon Read all user information Create, delete and manage groups Modify the membership of a group Manage Group Policy links
Task 2: Delegate a user administrator for the Branch Office Help Desk
1. On LON-DC1, in Active Directory Users and Computers, use the Delegate Control Wizard to delegate administration of the Branch Office 1 OU to the Branch 1 Help Desk security group. 2. Delegate the following common tasks: o o o Li 1. 2. 3. 4. Reset user passwords and force password change at next logon Read all user information Modify the membership of a group
5.
In Server Manager, open Active Directory Users and Computers. Confirm Holly's current credentials in the User Account Control dialog box.
6.
Attempt to delete Sales NAaren Ekelund. You are unsuccessful, because Holly lacks the required permissions.
7.
Try to delete Branch Office 1\Ed Meadows. You are successful, because Holly has the required permissions.
Note: To modify the Server Operators membership list, you must have permissions beyond those available to the Branch 1 Administrators group.
5. 6. 7.
Add the Branch 1 Help Desk global group to the Server Operators domain local group. Sign out from LON-DC1. Sign in as Adatum\Bart with the password Pa$$wOrd. You can sign in locally at a domain controller because Bart belongs, indirectly, to the Server Operators domain local group.
3-34 ManagingActiveDirectoryDomainServicesObjects
8.
Open Server Manager, and then open Active Directory Users and Computers. Confirm your current credentials in the User Account Control dialog box. Try to delete Branch Office 1\Connie Vrettos. You are unsuccessful, because Bart lacks the required permissions.
9.
10. Reset Connie's password to Pa$$wOrd. 11. After confirming the password reset is successful, sign out from LON-DC1. 12. Sign in to LON-DC1 as Adatum\Administrator with the password Pa$$wOrd.
3.
Task 3: Create a new user for the branch office, based on the template
1. On LON-DC1, copy the _Branch_template user account, and configure the following properties: o o o o o First name: Ed Last name: Meadows Password:Pa$$wOrd User must change password at next logon is cleared Account is disabled is cleared
2. Verify that the following properties have been copied during account creation: o o o City: Slough Home folder path: Won-dcl\branchl-userdata \Ed Group: Branch 1 Users
Results: After completing this exercise, you will have successfutry created and tested a user account created from a template.
2. Open Active Directory Users and Computers. 3. 4. 5. Confirm your credentials in the User Account Control dialog box. Navigate to Branch Office 1. Reset the LON-CL1 computer account.
3-36 ManagingActiveDirectoryDomainServicesObjects
2.
K Task3:Rejointhedornaintoreconnectthecomputeraccount
1. 2. 3. 4. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$wOrd. Open Control Panel, switch to Large icons view, and then open System. View the Advanced system settings, and then click the Computer Name tab. In the System Properties dialog box, use the Network ID button to rejoin the computer to the domain. Complete the wizard using the following settings: o o o o 6. 7. User name: Administrator Password:Pa$$wOrd Domain:Adatum Do you want to enable a domain user account on this computer: No
1 1 1 1 1
o
1 1 1 1 1 1
5.
When prompted, restart the computer. Sign in as Adatum\Ed with the password of Pa$$wOrd. You are successful because the computer had been successfully rejoined.
kcompletinTt.,.11exertilt
K Prepare for the next module
When you have completed the lab, revert the virtual machines back to their initial state. To do this, complete the following steps: 1. 2. 3. 4. On the host computer, start Hyper-V Manager. In the Virtual Machines list, right-click 20410C-LON-CL1, and then click Revert. In the Revert Virtual Machine dialog box, click Revert. Repeat steps 2 and 3 for 20410C-LON-DC1.
domain?
Best Practices
Best Practices for User Account Management Do not let users share user accounts. Always create a user account for each individual, even if that person will not be with your organization for long. Educate users about the importance of password security. Ensure that you choose a naming strategy for user accounts that enables you to identify the user to whom the account relates. Also ensure that your naming strategy uses unique names within your domain.
Best Practices for Group Management When managing access to resources, try to use both domain local group and role groups. Use universal groups only when necessary because they add weight to replication traffic. Use Windows PowerShell with Active Directory Module for batch jobs on groups. Avoid adding users to built-in and default groups.
Best Practices Related to Computer Account Management Always provision a computer account before joining computers to a domain, and then place them in appropriate OU. Redirect the default Computers container to another location. Reset the computer account, instead of disjoining and rejoining. Integrate the offline domain join functionality with unattended installations.
3-38 ManagingActiveDirectoryDomainSencesObjects
Tools
Tool Active Directory Users and Computers Active Directory module for Windows Power Shell Active Directory module for Windows PowerShell Djoin.exe Redircmp.exe Use Manage groups Where to find it AdministrativeTools
1 1
Manage groups Installed as Windows Feature
Computer account management Offline domain join Change default computer container View and modify AD DS permissions
1 1 1 1 1 1 1 1
Dsacls
Command line
1
4-1
Module 4
Implementing Local Storage
Contents:
Module Overview Lesson 1: Overview of Storage 4-1 4-2 4-12 4-23 4-29 4-34
1 1 1 1 1 1 1 1 1 1
Lesson 2: Managing Disks and Volumes Lesson 3: Implementing Storage Spaces Lab: Implementing Local Storage Module Review and Takeaways
Module Overview
Storage is one of the key components that you must consider when planning and deploying a Windows Server 2012 operating system. Most organizations require a great deal of storage because users work regularly with apps that create new files that require storage in a central location. When users keep their files for longer periods of time, storage demands increase. Every time a user logs on to a server, an audit trail is created in an event log; this also uses storage. Even as files are created, copied, and moved, storage is req u ired. This module introduces you to different storage technologies. It discusses how to implement the storage solutions in Windows Server 2012, and how to use Storage Spaces, a new feature that you can use to combine disks into pools that are then managed automatically.
O bjectives
After completing this module you will be able to: Describe various storage technologies. Explain how to manage disks and volumes. Explain how to implement Storage Spaces.
4-2 ImplementingLocalStorage
Lesson 1
Overview of Storage
When you plan a server deployment, one of the key components that you require is storage. There are various types of storage that you can utilize, such as locally-attached storage, storage that is remotely accessed via Ethernet, or storage connected with optical fiber. You should be aware of each solution's benefits and limitations. As you prepare to deploy storage for your environment, you need to make some important decisions. This lesson addresses questions to consider, such as: Does the storage need to be fast? Does the storage need to be highly available?
~~ How much storage does your deployment actually require? How much resilience do you need to add to the initial storage requirement to ensure that your investment remains secure in the future?
Lesson Objectives
After completing this lesson, you will be a ble to: Describe disk types and performance. Describe direct-attached storage. Describe network-attached storage. Describe a storage area network (SAN). Describe Redundant Array of Independent Disks (RAID). Describe RAID levels. Describe the new file and storage service features in Windows Server 2012 and Windows Server 2012 R2.
Serial Advanced Technology Attachment (SATA). Introduced in 2003, SATA is a computer bus interface, or channel, for connecting the motherboard or device adapters to mass storage devices such as hard disk drives and optical drives. SATA was designed to replace EIDE. It is a ble to use the same low-level commands as EIDE, but SATA holt adapters and devices communicate via a high-speed serial cable over two pais of conductors. It can operate at speeds of 1.5, 3.0, and 6.0 GB per second, depending on the SATA revision (1, 2 or 3 respectively). SATA disks are generally low-cost disks that provide mass storage. Because SATA drives are less expensive than other drive options, but also provide less performance, organizations might choose to deploy SATA drives when they require large amounts of storage but not high performance. SATA disks are also less reliable compared to serial attached SCSI (SAS) disks. A variation on the SATA interface is eSATA, which is designed to enable high-speed access to externally-attached SATA drives.
Small computer system interface (SCSI). SCSI is a set of standards for physically connecting and transferring data between computers and peripheral devices. SCSI was originally introduced in 1978 arid became a standard in 1986. Similar to EIDE, SCSI was designed to run over parallel cables; however, recently the usage has been expanded to run over other mediums. The 1986 parallel specification of SCSI had initial speed transfers of 5 MB per second. The more recent 2003 implementation, Ultra 640 SCSI, also known as Ultra 5, can transfer data at speeds of 640 MB per second. SCSI disks provide higher performance than SATA disks, but are also more expensive.
SAS. SAS is a further implementation of the SCSI standard. SAS depends on a point-to-point serial protocol that replaces the parallel SCSI bus technology, and uses the standard SCSI command set. SAS offers backward-compatibility with second generation SATA drives. SAS drives are reliable and made for 24 hours a day, seven days a week (24/7) operation in data centers. With up to 15,000 rotations per minute (RPM), these disks are also the fastest traditional hard disks. Solid State Drives (SSDs). SSDs are data storage devices that use solid-state memory to store data rather than using the spinning disks and movable read/write heads that are used in other disks. SSDs use microchips to store the data and do not contain any moving parts. SSDs provide fast disk access, use less power, and are less susceptible to failure from being dropped than traditional hard disks (such as SAS drives), but are also much more expensive per GB of storage. SSDs typically use a SATA interface, so you can usually replace hard disk drives with SSDs without any modifications.
Note: Fibre Channel, FireWire, or USB-attached disks are also available storage options. They define either the transport bus or the disk type. For example, USB-attached disks use mostly with SATA or SSD drives to store data.
Each NAS device has a dedicated operating system that solely controls the access to the data on the device, which reduces the overhead associated with sharing the storage device with other server services. An example-of NAS software is Windows Storage Server, a feature of Windows Server 2012. NAS devices typically provide file-level access to the storage. This means that the data on the storage is accessible only as files, and you must use protocols like Common Internet Files System (CIFS), Server Message Block (SMB), or Network File System (NFS) to access the files. To enable NAS storage, you need a storage device. Frequently, these devices do not have any server interfaces such as keyboards, mice, and monitors. To configure the device, you need to provide a network configuration and then access the device across the network. You can then create network shares on the device by using the name of the NAS and the share created. These shares are then accessible to users on the network.
Additional Reading: For more information about Windows Storage Server 2012 R2, see Windows Server 2012 R2 at http://go.microsoft.com/fwlink/?LinkID=199647.
What Is a SAN?
The third type of storage is a storage area network (SAN). A SAN is a high-speed network that connects computer systems or host servers to high-performance storage subsystems. A SAN usually includes various components such as host bus-adapters (HBAs), special switches to help route traffic, and storage disk arrays with logical unit numbers (LUNs) for storage. A SAN enables multiple servers to access a pool of storage in which any server can potentially access any storage unit. Because a SAN uses a network, you can use a SAN to connect many different devices and hosts and provide access to any connected device from anywhere. SANs provide block leve) access. This means that, rather than accessing the content on the disks as files by using a file access protocol, SANs write blocks of data directly to the disks using protocols such as Fibre Channel over Ethernet (FCOE) or Internet Small Computer System Interface (iSCSI).
SANs offers higher avaliability with the most ffexibility Advantages: Fastest access times Easity expandable - centralizad storage Fligh levet of redundancy Disadvantages: More expensive Requires specialized skills SANs can be implemented using Fibra ChannelSCSI
Today, most SAN solutions offer SAN and NAS together. The backend head units, disks, and technologies are identical; the access method is the only thing that changes. Enterprises often provision block storage from the SAN to the servers using FCOE or iSCSI, whereas NAS services are made available via CIFS and N FS.
Note: You can implement SANs using a variety of technologies. The most common options are Fibre Channel and iSCSI.
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
What Is RAID?
RAID is a technology that you can use to configure storage systems to provide high reliability and (potentially) high performance. RAID implementa storage systems by combining multiple disks into a single logical unit called a RAID array. Depending on the configuration, a RAID array can withstand the failure of one or more of the physical hard disks contained in the array, and/or provide higher performance than is available by using a single disk. RAID provides an important component redundancythat you can use when planning and deploying Windows Server 2012 servers. In most organizations, it is important that the servers are available all of the time. Most servers provide highly redundant components such as redundant power supplies and redundant network adapters. The goal of this redundancy is to ensure that the server remains available even when a single component on the server fails. By implementing RAID, you can provide the same level of redundancy for the storage system.
RAID:
Combines multiple disks into a single logical unit to provide fault tolerance and performance Provides fault tolerance by using: Disk mirroring Parity information Can provide performance benefits by spreading disk I/O across multiple disks Can be configured using several differe levels Should not replace server backups
Note: Although RAID can provide a greater level of tolerance for disk failure, you Should not use RAID to replace traditional backups. If a server has a power surge or catastrophic failure and all of the disks fail, then you would still need to rely on standard backups. Hardware RAID vs. Software RAID
Implement hardware RAID by installing a RAID controller in the server and then configure it by using the RAID controller configuration tool. With this implementation, the RAID configuration is hidden from the operating system, but the RAID arrays are exposed to the operating system as single disks. The only configuration you need to perform in the operating system is to create volumes on the disks.
Software RAID is implemented by exposing all of the disks that are available on the server to the operating system, and then configuring RAID from within the operating system. Windows Server 2012 supports the use of software RAID, and you can use Disk Management to configure several different levels of RAID. When choosing to implement hardware or software RAID, consider the following: Hardware RAID requires disk controllers that are RAIDcapa ble. Most disk controllers shipped with new servers have this functionality. To configure hardware RAID, you need to access the disk controller management program. Normally, you can access this during the server boot process or by using a web Page that runs management software. Implementing disk mirroring for the disk containing the system and boot volume with software RAID can require additional configuration when a disk fails. Because the RAID configuration is managed by the operating system, you must configure one of the disks in the mirror as the boot disk. If that disk fails, you may need to modify the boot configuration for the server to start the server. This is notan issue with hardware RAID, because the disk controller accesses the available disk and exposes it to the operating system. In older servers, you may get better performance with software RAID when using parity, because the server processor can calculate parity more quickly than the disk controller can. This is no longer an issue with newer servers, where you may get better performance on the server because you can offload the parity calculations to the disk controller.
RAID Levels
When implementing RAID, you need to decide what level of RAID to implement. The following table lists the features for each different RAID level.
1
Level RAID O Descriplion Striped set without parity or mirroring Data is written sequentially to each disk RAID 1 : Mirrored set without parity or striping Data is written to both disks simultaneously RAID 2 Data is written in bits to each disk with parity written to separate disk or disks Data is written in bytes to each disk with parity written to separate disk or disks Data is written in blocks to each disk with parity written to a dedicated disk Striped set with distributed parity Data is written in blocks to each disk with parity spread across all disks RAID 6 Striped set with dual distributed parity Data is written in blocks to I each disk with 1 double parity written across all disks Good read performance, poor write performance Uses the equivalent of two disks for parity Extremely high performance Good performance Performance H ig h read and write performance
I Redundancy
Comments
A single disk 1 Use only in failure results situationswhere in the loss of you require high performance i all data and can tolerate I data loss Can tolerate a single disk failure Frequently used for system and boot volumes with hardware RAID
Can only use the amount of space that is available on the smallest disk
1 1 1
RAID 3
Uses one disk for , Can tolerate parity ; a single disk failure
RAID 4
Uses one disk for 1 Can tolerate parity ' a single disk r failure
Rarely used
F RAID 5
Commonly used for data storage where . performance is not critical, but maximizing disk usage is important
1 1
Commonly used for data storage where performance is not critical but maximizing disk usage and i availability are important
(continued from previous page) Level RAID 0+1 I Description Striped sets in 1 a mirrored set A set of drives is striped, and then the strip set is mirrored Performance Very good read and write performance Space utifization Only half the disk space is available due to mirroring Redundancy Can tolerate the failure of two or more disks as long as all failed disks are in the same striped set Can tolerate the failure of two or more disks as long as both disks in a mirror do not fail Comments Not commonly used
Mirrored set in a stripe set Severa' drives are mirrored to a second set of drives, and then one drive from each mirror is striped Striped set with distributed parity in a stripe set Drives are striped with RAID 5, and then striped without parity
Frequently used in scenarios where performance and redundancy are critical, and the cost of the required additional disks is acceptable This level is recommended for applications that require high fault tolerance, capacity, and random positioning performance Requires at least six drives
jt Note: The most common RAID levels are RAID 1 (also known as mirroring), RAID 5 (also known as striped set with distributed parity), and RAID 1+0 (also known as mirrored set in a stripe set). Question: Should all disks be configured with the same amount of fault tolerance?
If you disable cross-file RDC, the network bandwidth used for replication increases; however, this decreases the processor load on file servers.
Note Storage Spaces and storage pools are covered later in this lesson. The other storage enhancements are covered in Course 20411C: Administering Windows Server 2012and Course
Lesson 2
This lesson addresses these and similar questions, including why it is important to manage disks and what tools you need to manage disks.
Lesson Objectives
After completing this lesson, you will be able to: Explain how to select a partition table format. Describe the difference between basic and dynamic disk types. Explain how to select a file system. Describe a resilient file system. Describe mount points and links. Explain how to create mount points and links. Describe the process of extending and shrinking volumes.
MBR
The MBR partition table format is the standard partitioning scheme that has been used on hard disks since the first personal computers carne out in the 1980s. The MBR partition table format has the following characteristics: Use GPT for disks largar than 2 TB
A partition supports a maximum of four primary partitions per drive. A partition can have maximum of 2 terabytes (TB) (2.19 x 10^12 bytes).
If you initialize a disk larger than 2 TB using MBR, the disks are only able to store volumes up to 2 TB and the rest of the storage is not used. You must convert the disk to GPT if you want to use all of its space.
Note: You can use the MBR partition table format for disk drives that never surpass 2 TB in size. This provides you with a bit more space, because GPT requires more disk space than MBR.
GPT
The GPT was introduced with Windows Server 2003 and Windows XP 64-bit Edition to overcome the limitations of MBR, and to address larger disks. GPT has the following characteristics: GPT is the successor of MBR partition table format. GPT supports a maximum of 128 partitions per drive. A partition can have up to 18 exabytes (EB).
~~ A hard disk can have up to 8 zettabytes (ZB), with 512 kilobytes (KB) logical block addressing (LBA). To boot from a GPT partition table, your BIOS must support GPT.
1Note: If your hard disk is larger than 2 TB, you must use the GPT partition table format.
Additional Reading: For frequently asked questions about the GUID partitioning table disk architecture, see http://go.microsoft.com/fwlink/?LinkID=266748.
Basic Disk
Basic storage uses normal partition tables that are used by all versions of the Windows operating system. A disk that is initialized for basic storage is called a basic disk. A basic disk contains basic partitions, such as primary partitions and extended partitions. You can subdivide extended partitions into logical drives.
By default, when you initialize a disk in the Windows operating system, the disk is configured as a basic disk. You can easily convert basic disks to dynamic disks without any loss of data; however, when converting a dynamic disk to basic disk, alI data on the disk is lost. There is no performance gain by converting basic disks to dynamic disks, and some applications cannot address data that is stored on dynamic disks. For these reasons, most administrators do not convert basic disks to dynamic disks unless they need to use some of the additional volume configuration options that are available with dynamic disks.
Dynamic Disk
Dynamic storage was introduced in the Microsoft Windows 2000 Server operating system. With dynamic storage, you can perform disk and volume management without the need to restad computers running Windows operating systems. A disk that is initialized for dynamic storage is called a dynamic disk. A dynamic disk contains dynamic volumes. When you configure dynamic disks, you create volumes rather than partitions. A volume is a storage unit that is made from free space on one or more disks. You can format the volume with a file system, and can assign it a drive letter or configure it with a mount point. The following is a list of the dynamic volumes that are available: Simple volumes. A simple volume uses free space from a single disk. It can be a single region on a disk, or consist of multiple, concatenated regions. A simple volume can be extended within the same disk or extended to additional disks. If a simple volume is extended across multiple disks, it becomes a spanned volume. Spanned volumes. A spanned volume is created from free disk space from multiple disks that is linked together. You can extend a spanned volume onto a maximum of 32 disks. A spanned volume cannot be mirrored, and is not fault-tolerant; therefore, if you lose one disk, you will lose the entire spanned volume. Striped volumes. A striped volume has data that is spread across two or more physical disks. The data on this type of volume is allocated alternately and evenly to each of the physical disks. A striped volume cannot be mirrored or extended, and is not fault-tolerant. This means that the loss of one disk causes the immediate loss of all the data. Striping is also known as RAID-O Mirrored volumes. A mirrored volume is a fault-tolerant volume that has all data duplicated onto two physical disks. All of the data on one volume is copied to another disk to provide data redundancy. If one of the disks fails, the data can still be accessed from the remaining disk. A mirrored volume cannot be extended. Mirroring is also known as RAID- 1 RAID-5volumes. A RAID-5 volume is a fault-tolerant volume that has data striped across a minimum of three or more disks. Parity is also striped across the disk array. If a physical disk fails, the portion of the RAID-5 volume that was on that failed disk can be re-created from the remaining data and the parity. A RAID-5 volume cannot be mirrored or extended.
Note: When you install the Windows 8 operating system or the Windows Server 2012 operating system in a clean installation, a separate system volume is created to enable encrypting the boot volume by using Windows BitLocker drive encryption.
Additional Reading: For more information about how basic disks and volumes work, see http://go.microsoft.com/fwlink/?LinkID=199648. For more information about dynamic disks and volumes, see http://go.microsoft.com/fwlink/?LinkID=199649.
FAT
The FAT file system is the most simplistic of the file systems that Windows operating systems support. The FAT file system is characterized by a table that resides at the very top of the volume. To protect the volume, two copies of the FAT file system are maintained in case one becomes damaged. In addition, the file allocation tables
and the root directory must be stored in a fixed location so that the system's boot files can be correctly located. A disk formatted with the FAT file system is allocated in clusters, whose sizes are determined by the size of the volume. When a file is created, an entry is created in the directory, and the first cluster number containing data is established. This entry in the table indicates either that this is the last cluster of the file, or points to the next cluster. There is no organization to the FAT directory structure, and files are given the first open location on the drive. Because of the size limitation with the file allocation table, the original release of FAT could only access partitions that were less than 2 GB in size. To enable larger disks, Microsoft developed FAT32. FAT32 supports partitions of up to 2 TB. FAT does not provide any security for files on the partition. You should never use FAT or FAT32 as the file system for disks attached to Windows Server 2012 servers. You might consider using FAT or FAT32 to format external media such as USB flash media. The file system designed especially for flash drives is Extended FAT (exFAT),It can be used where FAT32 is not suitable, such as when you need a disk format that works with a television, which requires a disk that is larger than 2 TB. A number of media devices support exFAT, such as modern fat panel TVs, media centers, and portable media players.
NTFS
NTFS is the standard file system for all Windows operating systems beginning with Windows NT Server 3.1. Unlike FAT, there are no special objects on the disk, and there is no dependence on the underlying hardware, such as 512-byte sectors. In addition, in NTFS there are no special locations on the disk, such as the tables. NTFS is an improvement over FAT in several ways, such as better support for metadata, and the use of advanced data structures to improve performance, reliability, and disk space utilization. NTFS also has additional extensions such as security access control lists (ACLs), which you can use for auditing, file system jou rnaling, and encryption.
NTFS is required for a number of Windows Server 2012 roles and features such as Active Directory Domain Services (AD DS), Volunne Shadow Services (VSS), Distributed File System (DFS) and File Replication Services (FRS). NTFS also provides a much higher leve) of security than FAT or FAT 32.
Additional Reading: For more information on how FAT works, see http://go.microsoft.com/fwlink/?LinkID=199652.
Additional Reading: For more information on how NTFS works, see http://go.microsoft.com/fwlink/?LinkID=199654.
Question: What file system do you currently use on your file server? Will you continue to use it?
What Is ReFS?
ReFS is a new feature in Windows Server 2012. ReFS is based on the NTFS file system, and provides the following advantages: Metadata integrity with checksums Expanded protection against data corruption Maximizes reliability, especially during a loss of power (while NTFS has been known to experience corruption in similar circumstances) Large volume, file, and directory sizes Storage pooling and virtualization, which makes creating and managing file systems easier Redundancy for fault tolerance
ReFS is a new file system that is built in to Windows Server 2012. Advantages include: Metadata integrity with checksums Integrity streams with user data integrity Allocaton on write transactional mode) Large volume, file, and directory sizes (2 478 bytes with 16-K8 cluster size) Storage pooling and virtualization Data striping for perforrnance and redundancy Disk scrubbing for protection against latent disk errors Resiliency to corruptions with recovery Shared storage poois across machnes
Disk scrubbing for protection against latent disk errors Resiliency to corruptions with recovery for maximum volume availability Shared storage pools across machines for additional failure tolerante and load balancing ReFS inherits some features from NTFS, including the following: BitLocker drive encryption ACLs for security Update sequence number (USN) journal Change notifications
Symbolic links, junction points, mount points and reparse points Volume snapshots File IDs
Because ReFS uses a subset of features from NTFS, it is designed to maintain backward compatibility with NTFS. Therefore, applications that run on Windows Server 2012 can access files on ReFS just as they would on NTFS. However, an ReFSformatted drive is not recognized when placed in computers that are running Windows Server operating systems previous to Windows Server 2012. ReFS driver can be used with Windows 8.1, but not with Windows 8. With NTFS, you can change the size of a cluster; however, with ReFS, each cluster has a fixed size of 64 KB, which you cannot change. Encrypted File System (EFS) for files is not supported in ReFS. As its name implies, the new file system offers greater resiliency, meaning better data verification, error correction, and scalability. Beyond its greater resiliency, ReFS also surpasses NTFS by offering larger maximum sizes for individual files, directories, disk volumes, and other items, as listed in the following table. Attribute Maximum size of a single file Limit Approximately 16 EB (18.446.744.073.709.551.616 bytes) 2^78 bytes with 16 KB cluster size (2^64 * 16 * 2^10) Windows stack addressing allows 2^64 bytes Maximum number of files in a directory Maximum number of directories in a volume Maximum file name length Maximum path length Maximum size of any storage pool Maximum number of storage pools in a system I Ma ximum number of spaces in a storage pool 2^64 21'64 32,000 Unicode characters 32,000 4 petabytes (PB) No limit No limit
Mount Points
Mount points are used in Windows operating systems to make a portion of a disk or the entire disk useable by the operating system. Most commonly, mount points are associated with drive-letter mappings so that the operating system can gain access to the disk through the drive letter.
Since the Windows 2000 Server was first introduced, you have been able to enable volume nnount points, which you can then use to mount a hard disk to an empty folder that is located on another drive. For example, if you add a new hard disk to a server, rather than mounting the drive using a drive letter, you can assign a folder name such as C:\datadrive to the drive. When you do this, any time you access the C:\datadrive folder, you are actually accessing the new hard disk. Volume mount points can be useful in the following scenarios: If you are running out of drive space on a server and you want to add disk space without modifying the folder structure. You can add the hard disk, and configure a folder to point to the hard disk. If you are running out of available letters to assign to partitions or volumes. If you have several hard disks that are attached to the server, you may run out of available letters in the alphabet to which you can assign drive letters. By using a volume mount point, you can add additional partitions or volumes without using more drive letters. If you need to separate disk input/output (I/O) within a folder structure. For example, if you are using an application that requires a specific file structure, but which uses the hard disks extensively, you can separate the disk I/O by creating a volume mount point within the folder structure.
Note: You can assign volume mount points only to empty folders on an NTFS partition. This mearas that if you want to use an existing folder name, you must first rename the folder, create and mount the hard disk using the required folder name, and then copy the data to the mounted folder.
Links
A link is a special type of file that contains a reference to another file or directory in the form of an absolute or relative path. Windows supports the following two types of links: A symbolic file link (also known as a soft link) A symbolic directory link (also known as a directoryjunction)
A link that is stored on a server share could refer back to a directory on a client that is not actually accessible from the server where the link is stored. Because the link processing is done from the client, the link would work correctly to access the client, even though the server cannot access the client. Links operate transparently. Applications that read or write to files that are named by a link behave as if they are operating directly on the target file. For example, you can use a symbolic link to link to a Hyper-V parent virtual hard disk file (.vhd) from another location. Hyper-V uses the link to work with
the parent virtual hard disk (VHD) as it would the original file. The benefit of using symbolic links is that you do not need to modify the properties of your differencing VHD.
Note: In Hyper-V, you can use a differencing VHD to save space by making changes only to the child VHD, when the child VHD is part of a parent/child VHD relationship.
Links are sometimes easier to manage than mount points. Mount points force you to place the files on the root of the volumes, whereas with links, you can be more flexible with where you save files. You can create links by using the mklink.exe command-line tool.
Wait until the volume is created, right-click MountPoint, and then click Change Drive Letter and Paths.
6.
Change the drive letter as follows: o o Mount in the following empty NTFS folder Create new Folder C:\MountPointFolder and use it as mount point.
7. On the taskbar, open a File Explorer window, and then click Local Disk (C:). You should now see the MountPoint folder with a size of 4,095,996 KB assigned to it. Notice the icon that is assigned to the mount point.
3. 4.
At the command prompt, type mklink /j AppLink CustomApp, and then press Enter. In a File Explorer window, browse to C:\AppLink. Notice that because it is a link, the directory path in the address bar is not updated to C:\CustomApp.
You can extend or shrink NTFS volumes ReFS volarnos can only be extended FAT/FAT32/exFAT cannot be reszed You can shrink a volurne ony up to usters on a disk prevent you
Note: As a best practice for shrinking volumes, you should defragment the files on the volume before you shrink it. This procedure returns the maximum amount of free disk space. Du ring the defragmenting process, you can identify any immoveable files.
To modify a volume, you can use Disk Management, the Diskpart.exe tool, or the Resize - Partition cmdlet in Windows PowerShell.
el Additional Reading: For more information about how to extend a basic volume, see http://go.microsoft.com/fwlink/?LinkID=266749.
Additional Reading: For more information about how to shrink a basic volume, see http://go.microsoft.com/fwlink/?LinkID=266750.
ManagingVirtualHardDisks
Starting with Windows 7 and Windows 2008 R2, you can manage virtual hard disks within the operating system in much the same way that you can manage physical disks. For example, you can create and attach a virtual hard disk and use it for storing data. The virtual hard disk appears as another drive letter in the disk or folder management tools. Virtual hard disks are files that represent a traditional hard disk drive. Typically, virtual hard disks are used with Hyper-V as the operating system disk and the storage disks for virtual machines. In Windows 7 and Windows Server 2008 R2, you can access the same virtual hard disks from within the operating system. The virtual hard disks have the following characteristics: In Windows 7 and Windows Server 2008 R2, you can only work with .vhd files. In Windows 8 or Windows Server 2012 or later, you can also create and manage .vhdx files, which enable much larger disk sizes as well as provide other benefits.
Virtual hard disks are files that can be rrranaged just like physical hard disks You can: Create and manage virtual hard disks using Disk Management and Diskpart Configure .vhd or .vhdx files Configure computers to start from the virtual hard disk Transfer virtual hard disks from Flyper-V servers and start computers from the virtual hard disk - Use virtual hard disks as a deployment technology
Note: For details on the differences between .vhd and .vhdx files, see Module 13, which covers the use of virtual hard disks in Hyper-V.
You can create and attach virtual hard disks using disk management tools such as Disk Management and Diskpart. After creating and attaching the virtual hard disk, you can create volumes on the drive and format the partition. You can configure Windows 7 or Windows Server 2008 R2 or later versions to start from a virtual hard disks using the native VHD boot feature. This feature enables you to configure multiple operating systems on a single computer and choose which operating system to use when you start the computer. You can attach virtual hard disks that have been created using Hyper-V or that have been created on another computer. For example, if you create a virtual hard disk in Hyper-V, you can copy that virtual hard disk to another computer, and then use the native VHD boot feature to start the computer using the virtual disk that you created in Hyper-V. You can use virtual hard disks as a deployment technology. For example, you can use Hyper-V to create a standard image for desktop or server computers, and then distribute the image to other computers.
3.
1 1 1 1 1 1 1 1 1 1 1
Lesson 3
Implementing StorageSpaces
Managing physical disks that are attached directly to a server has proven to be a tedious task for administrators. To overcome this problem, many organizations use SANs that essentially group physical disks together. SANs require specialized configuration and sometimes specialized hardware, which makes them expensive. To overcome these issues, you can use Storage Spaces, which is a Windows Server 2012 feature that pools disks together and presents them to the operating system as a single disk. This lesson explains how to configure and implement the Storage Spaces feature.
Lesson Objectives
After completing this lesson, you will be able to: Describe the Storage Spaces feature. Describe various options for configuring virtual disks. Describe advanced management options for Storage Spaces. Describe how to configure Storage Spaces. Compare Storage Spaces with other storage methods.
1 1
o o o o
1 1
Storage pool. A storage pool is a collection of one or more physical disks that you can use to create virtual disks. You can add to a storage pool any available physical disk that is not formatted or attached to another storage pool. Virtual disk (or storage space). This is similar to a physical disk from the perspective of users and applications. However, virtual disks are more flexible because they include thin provisioning or justin-time (JIT) allocations, and they include resiliency to physical disk failures with built-in functionality such as mirroring. Disk drive. This is a volume that you can access from your Windows operating system, for example, by using a drive letter.
Storage Layout
Configure this feature to define the number of disks from the storage pool that are allocated. Valid options include:
Simple. A simple space has data striping but no redundancy. In data striping, logically sequential data is segmented across all disks in a way that access to these sequential segments can be made to different physical storage drives. Striping makes it possible to access multiple segments of data concurrently. Do not host important data on a simple volume, because it provides no failover capabilities when the disk that is storing the data fails. Two-way and three-way mirrors. Mirror spaces maintain two or three copies of the data that they host (two data copies for two-way mirrors and three data copies for three-way mirrors). Data
duplication happens with every write to ensure that all data copies are always current. Mirror spaces also stripe the data across multiple physical drives. Mirror spaces provide the benefit of greater data throughput and lower access latency. They also do not introduce a risk of corrupting at-rest data, and do not require the extra journaling stage when writing data. Parity. A parity space is similar to RAID 5. Data, along with parity information, is striped across multiple physical drives. Parity enables Storage Spaces to continue to service read and write requests even when a drive has failed. Parity is always rotated across available disks to enable I/O optimization. Storage spaces require a minimum of three physical drives for parity spaces. Parity spaces have increased resiliency through journaling.
Drive Allocation
This defines how the drive is allocated to the pool. Options are: Automatic. This is the default allocation when any drive is added to a pool. Storage Spaces can automatically select available capacity on data-store drives for both storage space creation and JIT allocation. Manual. Administrators can choose to specify Manual as the usage type for drives that are added to a pool. A manual drive is not used automatically as part of a storage space unless it is specifically selected at the creation of that storage space. This usage property makes it possible for administrators to specify particular types of drives for use by only certain Storage Spaces. Hot Spare. Drives added as Hot Spares to a pool are reserve drives that are not used in the creation of a storage space. If a failure occurs on a drive that is hosting columns of a storage space, a reserve drive is called upon to replace the failed drive.
Provisioning Schemes
You can provision a virtual disk by using two different schemes: ~~ Thin provisioning space. Thin provisioning is a mechanism that allows storage to be easily allocated on a just-enough and JIT basis. Storage capacity in the pool is organized into provisioning slabs that are not allocated until the point in time when datasets grow to require the storage. As opposed to the traditional fixed storage allocation methodwhere large pools of storage capacity are allocated but may remain unusedthin provisioning optimizes utilization of available storage. Organizations are also able to save on operating costs such as electricity and floor space that are associated with keeping unused drives operating. The downside of using thin provisioning is lower disk performance. Fixed provisioning space. With Storage Spaces, fixed provisioned spaces also employ the flexible provisioning slabs. The difference between thin provisioning and a fixed provisioning space is that the storage capacity in the fixed provisioning space is allocated at the same time that the space is created.
Note: You can use Storage Spaces to create both thin and fixed provisioning virtual disks within the same storage pool. Having both provisioned types in the same storage pool is convenient, particularly when they are related to the same workload. For example, you can choose to have a thin provisioning space to host a database and a fixed provisioning space to host its log.
Question: What is the narre for a virtual disk that is larger than the amount of disk space available on the physical disks portion of the storage pool?
Advanced ManagementOptionsforStorageSpaces
Server Manager provides you with basic management of virtual disks and storage pools. In Server Manager, you can create storage pools, add and remove physical disks from pools, and create, manage, and delete virtual disks. For example, in Server Manager you can view the physical disks that are attached to a virtual disk. If any of these disks are unhealthy, you will see an unhealthy disk icon next to the disk narre. To correct a failed disk in a virtual disk or storage pool, you must remove the disk that is causing the problem. Tools such as defragmenting, scan disk, or chkdsk cannot repair a storage pool. To replace a failed disk, you add a new disk to the pool. The new disk resynchronizes automatically when disk maintenance occurs during daily maintenance. Alternatively, you can trigger disk maintenance manually. Windows PowerShell provides advanced management options for virtual disks and storage pools. Some examples of management cmdlets are listed in the following table. Windows PowerShell cmdlet Get-StoragePool Get-VirtualDisk Repair-VirtualDisk Get-PhysicalDisk 1 Where($_.HealthStatus ne "Healthy") Reset-PhysicalDisk Description Lists storage pools Lists virtual disks Repairs a virtual disk Lists unhealthy physical disks Removes a physical disk from a storage pool Lists physical disks that are used for a virtual disk - Basc Management for Storage Spaces is available in Server Manager For disk failure: Do not use chkdsk or scan disk Remove the drive and add a new one Advanced management requires Windows PowerShell
Get-VirtualDisk Get-PhysicalDisk
Additional Reading: To learn more about storage cmdlets in Windows PowerShell, see http://go.microsoft.corn/fwlink/?LinkID=266751.
On the View results page, wait until the task completes, and then ensure that the Create a volume when this wizard closes check box is selected.
3.
In the New Volume Wizard, create a volume with these settings: o o o Virtual disk: Simple vDisk File system: ReFS Volume label: Simple Volume
10 minutes
What are the advantages of using Storage Spaces compared to using SANs or NAS?
What are the disadvantages of using Storage Spaces compared to using SANs or NAS? In what scenarios would you recommend each option?
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Objectives
After completing this lab, you will be able to: Install and configure a new disk. Resize volumes. Configure a redundant storage space.
Lab Setup
Estimated Time: 30 minutes
Virtual machines
20410C-LON-DC1 20410C-LON-SVR1
Adatum\Administrator Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before beginning the lab, you must complete the following steps: On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. 1. In Hyper-V Manager, click 20410C-LON -DC1, and in the Actions pane, click Start. 2. 3. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: o o o User name: Administrator Password: Pa$$wOrd Domain: Adatum
1. In the Computer Management console, on Disk 2, create a Simple Volume with the following
2. In the Computer Management console, on Disk 2, create a Simple Volume with the'following attributes: o o o o Volume size: 5000 MB Drive Letter: G File system: ReFS Volume label: Volume2
Results: After you complete this lab, you should have initialized a new disk, created two simple volumes, and then formatted them You should also have verified that the drive letters you assigned are available in File Explorer.
K Task 1: Create a storage pool from five disks that are attached to the server
1. 2. 3. On LON-SVR1, open Server Manager. In the left pane, click File and Storage Services, and then in the Servers pane, click Storage Pools. Create a storage pool with the following settings: o o Name: StoragePooll
4-32 ImplementhgLocalStorage
2. In the New Volume Wizard, create a volume with the following settings: o o o o Virtual disk: Mirrored Disk Drive letter: H File system: ReFS Volume label: Mirrored Volume
K Task 3: Copy a file to the volume, and verify that it is visible in File Explorer
1. 2. Open a Command Prompt window. Type the following command: Copy C:\windovsksystem32\wrte.exe H: \ 3. Open File Explorer from the taskbar, and access Mirrored Volume (H:). You should now see write.exe in the file list.
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
3. In the STORAGE POOLS pave, right-click StoragePooll, click Add Physical Disk, and then click PhysicalDisk8 (LON -SVR1). 4. Open Windows PowerShell and run the following commands to remove the disconnected disk. a. Get - PhysicalDisk Note the FriendlyName for the disk that shows an OperationalStatus of Lost Communication. b. $Disk = Get - PhysicalDisk FriendlyName diskname Replace diskname with the name of the disk you noted in previously. Remove- PhysicalDisk PhysicalDisks $disk_StoragePoolFriendlyName StoragePooll
c.
5. In Server Manager, refresh the storage pools view to see the warnings disappear.
Results: After completing this lab, you should have created a storage pool and added five disks to it. Then you should have created a three-way mirrored, thinly provisioned virtual disk from the storage pool. You should have also copied a file to the new volume and verified that it is accessible. Next after removing a physical drive, you should have verified that the virtual disk was still available and could be accessed. you should have added another physical disk to the storage pool.
After you finish the lab, reved the virtual machines back to their initial state. To do this, complete the following steps. 1. 2. 3. 4. On the host computer, start Hyper-V Manager. In the Virtual Machines list, right-click 20410C- LON - DC1, and then click Revert. In the Revert Virtual Machine dialog box, click Revert. Repeat steps 2 and 3 for 20410C- LON -SVR1.
Best Practices
The following are recommended best practices: If you want to shrink a volume, defragment the volume first so you can reclaim more space from the volume. Use the GPT partition table format for disks larger than 2 TB. For very large volumes, use ReFS. Do not use FAT or FAT32 on Windows Server operating system disks. Use the Storage Spaces feature to have the Windows operating system manage your disks.
Tools
Tool Disk Management Use - Initialize disks - Create and modify volumes Diskpart.exe Initialize disks Create and modify volumes from a command prompt - Create a symbolic link to a file or folder Chkdsk.exe - Check a disk for a NTFSformatted volume Cannot be used for ReFS or virtual disks Defrag.exe Disk defragmentation tool for NTFS formatted volumes. Cannot be used for ReFS or virtual disks Command prompt Command prompt Command prompt Where to find it In Server Manager on the Tools menu (part of Computer Management) Command prompt
5-1
Module 5
Implementing File and PrintServices
Contents:
Module Overview Lesson 1: Securing Files and Folders Lesson 2: Protecting Shared Files and Folders by Using Shadow Copies Lesson 3: Configuring Work Folders Lesson 4: Configuring Network Printing Lab:Implementing File and Print Services Module Review and Takeaways 5-1 5-2 5-15 5-18 5-25 5-31 5-38
Module Overview
Accessing files and printers on the network is one of the most common activities in the Windows Server environment. Reliable, secure access to files and folders and print resources is often the first requirement of a Windows Server 2012-based network. To provide access to file and print resources on your network, you must understand how to configure these resources within Windows Server 2012 server, and how to configure appropriate access to the resources for users in your environment. This module discusses how to provide these important file and print resources with Windows Server 2012. It describes how to secure files and folders, how to protect previous versions of files and folders by using shadow copies, and how to give workers remote access to corporate files by implementing the new Work Folders role service. It also describes new network printing features that help manage the network printing environment.
Objectives
After completing this module, you will be able to: Secure shared files and folders. Protect shared files and folders by using shadow copies. Configure the Work Folders role service. Configure network printing.
Lesson 1.
Lesson Objectives
After completing this lesson, you will be able to: Describe NTFS file system permissions. Describe a shared folder. Describe permissions inheritance. Explain how effective access and permissions work when you access shared folders. Describe access-based enumeration. Describe Offline files. Explain how to create and configure a shared folder.
Standard Permissions
Standard permissions provide the most commonly used permission settings for files and folders. You assign standard permissions in the Permissions for folder name dialog box.
The following table details the standard permissions options for NTFS files and folders. File perrnissions Description Grants the user complete control of the file or folder, including control of permissions. Grants the user permission to read, write, or delete a file or folder, including creatng a file or folder. It also grants permission to execute files. Grants the user permission to read a file and start apps. Grants the user permission to view file or folder content. Grants the user permission to write to a file. Grants the user permission to view a list of the folder's contents.
1 1 1
Full Control
Modify
Read and Execute Read Write List folder contents (folders only)
II
Note: Granting users Full Control permissions on a file or a folder gives them the ability to perform any file system operation on the object, and the ability to change permissions on the
1 1 1 1 1 1
object. They can also remove permissions on the resource for any or all users, including you.
Advanced Permissions
Advanced permissions can provide a much greater level of control over NTFS files and folders. Advanced permissions are accessible by clicking the Advanced button from the Security tab of a file or folder's Properties dialog box. The following table details the Advanced permissions for NTFS files and folders. File permissions Traverse Folder/Execute File Description The Traverse Folder permission applies only to folders. This permission grants or denies users the right to browse through folders to reach other files or folders, even if the user has no permissions for the traversed folders. The Traverse Folder permission takes effect only when the group or user is not granted the Bypass Traverse Checking user right. By default, the Everyone group is given the Bypass Traverse Checking user right. The Execute File permission grants or denies access to run program files. If you set the Traverse Folder permission on a folder, the Execute File permission is not automatically set on all files in that folder. List Folder/Read Data The List Folder permission grants the user permission to view file names and subfolder names. This permission applies only to folders and affects only the contents of that folderit does not affect whether the folder itself is listed. In addition, this setting has no effect on viewing the file structure from a command-line interface. The Read Data permission grants or denies the user permission to view data in files. The Read Data permission applies only to files. Read Attributes The Read Attributes permission grants the user permission to view the basic attributes of a file or a folder such as Read-only and Hidden attributes. Attributes are defined by NTFS.
1 1
(continued from previous page) File permissions Read Extended Attributes Description The Read Extended Attributes permission grants the user permission to view the extended attributes of a file or folder. Extended attributes are defined by apps, and can vary by app. The Create Files permission applies only to folders, and grants the user permission to create files in the folder. The Write Data permission grants the user permission to make changes to the file and overwrite existing content by NTFS. The Write Data permission applies only to files. Create Folders /Append Data The Create Folders permission grants the user permission to create folders within the folder. The Create Folders permission applies only to folders. The Append Data permission grants the user permission to make changes to the end of the file, but not to delete or overwrite existing data. The Append Data permission applies only to files. Write Attributes The Write Attributes permission grants the user permission to change the basic attributes of a file or folder, such as Read-only or Hidden. Attributes are defined by NTFS. The Write Attributes permission does not imply that you can create or delete files or folders; it includes only the permission to make changes to the attributes of a file or folder. To grant Create or Delete permissions, see the Create Files/Write Data, Create Folders/Append Data, Delete Subfolders and Files, and Delete entries in this table. Write Extended Attributes The Write Extended Attributes permission grants the user permission to change the extended attributes of a file or folder. Extended attributes are defined by programs and apps, and can vary by each one. The Write Extended Attributes permission does not imply that the user can create or delete files or folders; it includes only the permission to make changes to the attributes of a file or folder. To grant Create or Delete permissions, see the Create Files/Write Data, Create Folders/Append Data, Delete Subfolders and Files, and Delete entries in this table. Delete Subfolders and Files Delete The Delete Subfolders and Files permission grants the user permission to delete subfolders and files, even if the Delete permission is not granted on the subfolder or file. The Delete Subfolders and Files permission applies only to folders. The Delete permission grants the user permission to delete the file or folder. If you have not been assigned Delete permission on a file or folder, you can still delete the file or folder if you are granted Delete Subfolders and Files permissions on the parent folder. Read Permissions grants the user permission to read permissions a bout the file or folder, such as Full Control, Read, and Write. Change Permissions grants the user permission to change permissions on the file or folder, such as Full Control, Read, and Write.
(continued from previous page) File permissions Take Ownership Description The Take Ownership permission grants the user permission to take ownership of the file or folder. The owner of a file or folder can change permissions on it, regardless of any existing permissions that protect the file or folder. The Synchronize permission assigns different threads to wait on the handle for the file or folder, and then synchronize with another thread that may signa) it. This permission applies only to multiple-threaded, multiple-process programs and apps.
Synchronize
N ote: Standard permissions are combinations of several individual Advanced permissions that are grouped into commonly used file and folder scenarios.
Therefore, taking these rules into account, NTFS permissions are applied in the following orden 1. 2. 3. 4. Explicit Deny Explicit Allow Inherited Deny Inherited Allow
It is important to remember that NTFS permissions are cumulative, and these rules apply only when two NTFS permission settings conflict with each other.
3. 4.
In the Security tab, select the user or group that you want to view or edit the specific permissions of. To modify existing permissions or add new users or groups, click the Edit button. This opens the Permissions dialog box.
Note: The sharing process applies only to the folder levet. You cannot share an individual file or a group of files.
Note: When you are setting up a shared folder, you will be asked to give it a name. This name does not have to be the same name as the actual folder, it can be a descriptive name that better describes the folder contents to network users.
Administrative Shares
If you have shared folders that need to be available from the network, but should be hidden from users browsing the network, you can create administrative (or hidden) shared folders. You can access an administrative shared folder by typing in its UNC path, but the folder will not be visible if you browse the server by using File Explorer. Administrative shared folders also typically have a more restrictive set of permissions to reflect the administrative nature of the folder's contents. To hide a shared folder, append the dollar symbol ($) to the folder's name. For example, a shared folder on LON-SVR1 named Sales can be made into a hidden shared folder by naming it Sales$. The shared folder is accessible over the network by using the UNC path \\LON-SVR1\Sales$.
Note: Sha red folder permissions apply only to users who access the folder over the network. They do not affect users who access the folder locally on the computer where the folder is stored.
Change
Full Control
Note: When you assign Full Control permissions on a shared folder to a user, that user can modify permissions on the shared folder, which includes removing all users (including administrators), from the shared folder's permissions list. In most cases, you should grant Change Permission instead of Full Control permission.
Permissions Inheritance
By default, NTFS and shared folders use inheritance to propagate permissions throughout a folder structure. When you create a file or a folder, it is automatically assigned the permissions that are set on any folders that exist aboye it (parent folders) in the hierarchy of the folder structure. Inheritance isused to manage access to resources without assigning explicit permissions to each object By default, permissions are inherited in a parent/child relationship Blocking inheritance: You can block permission inheritance You can apply blocking at the file or folder levet You can set blocking on a folder to propagate the new permissions to child objects
Assigned Permissions Read Marketing None set Write New York Editors None set
In this example, Adam is a member of two groups that are assigned permissions for files or folders within the folder structure. They are as follows: The top-level folder, Marketing, has an assigned permission for the Marketing Group giving them Read access. In the next levet, the Marketing Pictures folder has no explicit permissions set, but because of permissions inheritance Adam has Read access to this folder and its contents from the permissions that are set on the Marketing folder. In the third levet, the New York folder has Write permissions assigned to one of Adam's groupsNew York Editors. In addition to this explicitly assigned Write permission, the New York folder also inherits the Read permission from the Marketing folder. These permissions pass down to file and folder objects, cumulating with any explicit Read and Write permissions set on those files.
~~ The fourth and last level is the Fall_Connpositejpg file. Even though no explicit permissions have been set for this file, Adam has both Read and Write access to the file dueto the inherited permissions from both the Marketing folder anci- the New York folder.
Permission Conflicts
Sometimes, explicitly set permissions on a file or folder conflict with permissions inherited from a parent folder. In these cases, the explicitly assigned permissions always override the inherited permissions. In the given example, if Adam Carter was denied Write access to the parent Marketing folder, but then explicitly granted Write access to the New York folder, the granted Write access permissions take precedence over the inherited deny Write access permission.
Blocking Inheritance
You can also disable the inheritance behavior for a file or a folder (and its contents) on an NTFS drive. You do this when you want to explicitly define permissions for a set of objects without including any of the
inherited permissions from any parent folders. Windows Server 2012 provides an option for blocking inheritance on a file or a folder. To block inheritance on a file or folder, complete the following steps: 1. 2. 3. 4. 5. Right-click the file or folder where you want to block inheritance, and then click Properties. In the Properties dialog box, click the Security tab, and then click Advanced. In the Advanced Security Settings dialog box, click Change Permissions. In the next Advanced Security Settings dialog box, click Disable inheritance. At this point, you are prompted to either convert the inherited permissions into explicit permissions or remove all inherited permissions from the object to start with a blank permissions slate.
EffectivePermissions
Access to a file or folder in Windows Server 2012 is granted based on a combination of permissions. When a user attempts to access a file or folder, the permission that applies is dependent on various factors, including: Explicitly defined and inherited permissions that apply to the user Explicitly defined and inherited permissions that apply to the groups to which the user belongs How the user is accessing the file or folders: locally, or over the network Effective NTFS permissions are the cumulative permissions that are assigned to a user for a file of folder based on the factors listed aboye. The following principies determine effective NTFS permissions: Cunnulative permissions are the combination of the highest NTFS permissions granted to the user and to all the groups of which the user is a member. For example, if a user is a member of a group that has Read permission and is a member of a group that has Modify permission, the user is assigned cumulative Modify permissions. Deny permissions override equivalent Allow permissions. However, an explicit Allow permission can override an inherited Deny permission. For example, if a user is denied Write access to a folder via an inherited Deny permission, but is explicitly granted Write access to a subfolder or a particular file, the explicit Allow overrides the inherited Deny for the particular subfolder or file. You can apply permissions to a user or to a group. Assigning permissions to groups is preferred because they are more efficient than managing permissions that are set for many individuals.
When combining shared folder and NTFS permissions, the most restrctve permission is applied Example: If a user or group is given the shared folder permission of Read and the NTFS permission of Write, the usar or group will only be able to read the file because it is the more restrictve permission Both the share and the NTFS file and folder permissions must have the correct permissions, otherwise the user or group will be denied access to the resource
NTFS file permissions take priority over folder permissions. For example, if a user has Read permission to a folder, but has been granted Modify permission to certain files in that folder, the effective permission for those files will be set to Modify. Every object in an NTFS drive or in Active Directory Domain Services (AD DS) is owned. The owner controls how permissions are set on the object and to whom permissions are granted. For example, a user who creates a file in a folder where they have Modify permissions can change the permissions on the file to Full Control.
The user must have appropriate permissions on both the NTFS file or folder and the shared folder. If no permissions exist for the user (either as an individual or as the member of a group) on either resource, access is denied.
o To exclude one specific permission when you have granted Full Control permissions to a user or a group Never deny the Everyone group access to an object. If you deny the Everyone group access to an object, you deny Administrators accessincluding yourself. Instead, remove the Everyone group from the permissions list, as long as you grant permissions for the object to other users, groups, or computers. Grant permissions to an object that is as high in the folder structure as possible, so that the security settings are propagated throughout the tree. For example, instead of bringing groups representing all departments of the company together into a Read folder, assign Domain Users (which is a default group for all user accounts on the domain) to the share. In this manner, you elimnate the need to update department groups before new users receive the shared folder. Use NTFS permissions instead of shared permissions for fine-grained access. Configuring both NTFS and shared folder permissions can be difficult. Consider assigning the most restrictive permissions for a group that contains many users at the shared folder level, and then use NTFS permissions to assign permissions that are more specific.
Access-based enumeration allows an administrator to control the visibility of shared folders according to the permissions set on the shared folder
Access
Buit nto Windows Server 2012 Available for shared folders Configurable on a per shared folder basic
When Enable access-based enumeration is selected, access-based enumeration is enabled on the shared folder. This setting is unique to each shared folder on the server.
El Note: The File and Storage Services console is the only place in the Windows Server 2012
interface where you can configure access-based enumeration for a shared folder. Access-based enumeration is not available in any of the properties dialog boxes that are accessible by right-clicking the shared folder in File Explorer.
Offline file settings allow a client computer to cache network files locally for offline use when they are disconnected from the network Offline settin.. s window
*abates loe*at* arda* gane the ~ad foider ee wegtie offlin Al Mes and polyanw cpen Irtal whereclkber aln~aly ollb, Cktrtm pwiarerse
.
PWSII :se hitrda &Mb bebe &mig *lo Obn ctetll ate
Note: Offline files is not available in home versions of Windows operating systems.
Offline Settings
With Windows Server 2012, you view the Offline Settings dialog box for a shared folder by clicking the Caching button in the Advanced Sharing dialog box. The following options are available within the Offline Settings dialog box: Only the files and programs that users specify are available offline. This is the default option when you set up a shared folder. When you use this option, no files or programs are available offline by default, and users control which files and programs they want to access when they are not connected to the network. Alternatively, you can choose the Enable BranchCache option. This option enables computers that are accessing the files to cache files downloaded from the folder using Windows BranchCache. You must install and configure BranchCache on the Windows Server 2012 server to select this option. No files or programs from the shared folder are available offline. This option blocks client computers from making copies of the files and programs on the shared folder. All files and programs that users open from the shared folder are automatically available offline. Whenever a user accesses the shared folder or drive and opens a file or program in it, that file or program is made automatically available offline to that user. Files and programs that are made automatically available offline remain in the offline files cache and synchronize with the version on the server until the cache is full or the user deletes the files. Files and programs that are not opened are not available offline.
1 1
Optimized for performance. If you select this option, executable files (.exe, .d11) that are run from the shared folder by a client computer are cached on that client computer automatically. The next time the client computer runs the executable files, it will access its local cache instead of the shared folder on the server.
1 1
Note: The Offline Files feature must be enabled on the client computer for files and programs to be cached automatically. In addition, the Optimized For Performance option does not have any effect on client computers that use Windows Vista or older Windows operating systems, because these operating systems perform the program-level caching automatically, as specified by this option.
1 1
1 1 1
2. 3.
1. 2. 3.
Grant the Authenticated Users Change permissions for the Data folder.
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe shadow copies. Describe considerations for scheduling shadow copies. Identify methods for restoring data from shadow copies. Restore data from a shadow copy.
Lesson 3
Lesson Objectives
After completing the lesson, you will be able to: Describe the Work Folders role service. Discuss the benefits and limitations of Work Folders. Describe Work Folders components. Configure Work Folders.
---
httpsi/Weridold AD OS
es to entorce lencrypto , lock devices, and Iwipe corporate data off of ;devices
Conflict Resolution
If a file is edited and saved on different devices at the same time, both copies will be uploaded to the server. One of the file names will have the name of the device it was saved on appended to it. For example, a user opens, edits, and saves a file named Doc1 on his office PC; he then edits the offline version on his tablet. When the tablet version synchronizes, the file will be saved as Doc 1 name of tablet. There will now be two versions of the file in the sync share.
Benefits
Work Folders provides the following benefits: It is available for domain joined and nondomain joined systems. Users need to provide credentials to connect from non-domain joined devices.
It provides a single point of access to work files on a user's work and personal computers and devices. It provides access to work files while users are offline. It synchronizes files for the users when the computer or device next has Internet or network access. It can be deployed alongside existing technologies such as Folder Redirection and Offline Files. Data can be encrypted while in-transit as well as when it is sitting on the device itself. Administrators can configure security policies. These policies may include to instruct user computers and devices to encrypt work folders and to use a lock-screen password.
It can use existing file server management technologies such as file classification and folder quotas to manage user data.
Limitations
Work Folders has the following limitations: Work Folders are currently supported on Windows Server 2012 R2 and Windows 8.1 only. It does not provide collaboration functionality such as sharing synchronized files or folders with other users. There is no a bility to selectively synchronize files in work folders; all files are synchronized. Users synchronized to their own folder on the file serverthere is no support for synchronizing to otherfile shares.
nd server
Software Requirements
Work Folders has the following software requirements for file servers: A server running Windows Server 2012 R2 for hostingsync shares and user data An NTFS formatted volume to store user files A server certificate from a certification authority (CA) that is trusted by your users - a public CA is best
Server Components Work Folders role service IIS Management Comer rc4e service t Fire Server role service Web Server Role (IIS) role LES Hostable Web Core role service Client Components Manual deployment using built in Control Automatic deployment via Group Policy, Con Manager, or Intune
To enable users to synchronize across the Internet, there are additional requirements: The file server must be accessible from the Internet A publicly registered domain name and associated Dornain Name System (DNS) records
Work Folders has the following software requirements for client computers: Windows 8.1 Windows RT 8.1 An NTFS formatted volume to store user files
74 s Note: A
Server Components
Work Folders is a role service of the File and Storage Services role. The Work Folders role service can be installed on any edtion of Windows Server 2012 R2 and can be installed alongside any other roles or programs. For example, a domain controller or Exchange server can also host Work Folders. Installing the Work Folders role service also installs the following roles and role services: File Server role service Web Server Role (Internet Information Services (IIS)) role IIS Management Console role service IIS Hostable Web Core role service
Once the role service is installed, the sync share must be created. You can create multiple sync shares on a file server. Each one maps to different file system locations with different users and groups having access and different policies defined per share.
Client Components
The ability to connect to and manage Work Folders folders and files is built into Windows 8.1. Deployment can be manual or automatic.
Manual Deployment
A built-in item in Control Panel named Work Folders is used to supply the user's corporate email address. This email address is used to construct the URL for the Work Folders server and that URL is used to connect to the Work Folders folder.ff there is no corporate email address the URL can be entered manually.
Opt- in Deployment
Work Folders settings can be delivered via Group Policy, Microsoft System Center 2012 Configuration Manager or by Windows Intune-. After the settings are delivered, the user can then decide if they want to use Work Folders on that device.
Mandatory Deployment
Settings are delivered via Group Policy, System Center 2012 Configuration Manager or by Windows Intune-. No user action is required. Work Folders is configured on the device.
Client configuration
Manual configuration requres the user to manually enter their email address - Automatic configuration can be done by using Group Policy
The following Windows PowerShell command adds the Work Folders role service: Add-WindowsFeature FS-SyncShareServi ce 2. Use the New Sync Share Wizard or Windows PowerShell to create a sync share. You must provide the following information: o o The name of the server that will host the sync share. The path to the sync share. This is a path to a local folder or an existing shared folder on the local server. If you are using an existing shared folder then the work folders can also be accessed by the UNC path. The folder naming format. This is in the form of an email address ora user alias. The user alias is compatible with technologies such as home folders. You can also specify that only a subfolder of the sync share will be synchronized. The name of the sync share. This is the friendly name the sync share is known by. The names of the users or groups that will have access to the sync share. By default, inherited permissions on the user folders is disabled and the user is granted exclusive access to the folder, but you can change that. You can specify whether to encrypt the work folders and whether to automatically lock the screen and require a password.
o o
Windows PowerShell cmdlets New-SyncShare and Set-SyncShare are used to create and modify the sync share. The following example creates a sync share named SalesShare at the local path of C:\SalesShare, grants access to the Sales group, and sets the conflict resolution method to keep the latest file saved. NewSyncShare ,Sa esS are -path C:\SaIesShare -User Keeptatest )1ctli'eSet":ti o n'
The server must have an SSL certificate installed in the computer's Trusted Root Certification Authority. The common name (CN) in the certificate must match the name used as the Work Folders URL. For example, if the client is making a request to https://syncsvr.contoso.com, then the CN must also be https://syncsvr.contoso.conn. 1:21 Note: A single file server can host multiple sync shares, which will require a certificate with multiple hostnames (a Subject Alternative Name (SAN) certificate can be used).
Client Configuration
Clients can be configured either manually or automatically. In either case the Work Folders connection uses SSL, therefore clients must trust the server certificate. Although it is possible to use an internal CA, those certificates are not normally trusted by non-domain joined devices. As a best practice, purchase the server certificate from a public CA.
Eb Reference Links: For more information about certificates for Work Folders see the article "Work Folders Certificate Management" at http://go.microsoft.com/fwlink/?LinIdD=331094.
Manual Configuration
This requires the user to launch the Work Folders item in Control Panel and enter their corporate email address. This address is used to build the URL (by default HTTPS://FQDN) of the file server, which will connect the user to Work Folders. If the URL cannot be discovered by using the user's email address, the URL can be input manually.
Note: Automatic configuration using System Center 2012 Configuration Manager or Windows Intune is beyond the scope of this course.
Set up the Work Folders folder. Open File Explorer. Notice there is now a Work Folders folder under the This PC folder.
1 1
Lesson 4
1 1 1 1 1 1 1 1 1 1 1 1 1
By using the Print and Document Services role in Windows Server 2012, you can share printers on a network and centralize print server and network printer management. By using the Print Management console, you can monitor print queues, and receive important notifications regarding print server activity. Windows Server 2012 introduces new features and important changes to the Print and Document Services role that you can use to manage your network printing environment better. This lesson explains the important aspects of network printing, and introduces new network printing features that are available in Windows Server 2012.
Lesson Objectives
After completing the lesson, you will be able to: Identify the benefits of network printing. Describe Enhanced Point and Print. Identify security options for network printing. Create multiple configurations for a print device. Describe printer pooling. Describe Branch Office Direct Printing. Identify methods for deploying printers to clients.
Simplified troubleshooting
Listing in AD DS
1
5-26 Implementing File and Print Services
1 1
1 1 1
el Reference Links: For more information see the Tech Net article Print Management Step- byStep Guide at http://go.microsoft.com/fwlink/?Lin kID= 331093.
1
1 1 1
Microsoft Windows 2000 operating systems. With v3 drivers, printer manufacturers create customized print drivers for each specific device that they produce, to ensure that Windows apps can use all of their printer's features. With the v3 model, printer infrastructure management requires administrators to maintain drivers for each print device in the environment, and separate 32-bit and 64-bit drivers for a single print device, to support both platforms.
1
1 1 1 1 1
The v4 driver model provides the following benefits: Sharing a printer does not require provisioning drivers that match the client architecture. Driver files are isolated on a per-driver basis, preventing driver file naming conflicts. A single driver can support multiple devices. Driver packages are smaller and more streamlined than v3 drivers, resulting in faster driver installation times. The printer driver and the printer user interface can be deployed independently.
A printer pool is configured on a server by specifying multiple ports for a printer. Each port is the location
of one physical printer. In most cases, the ports are an IP address on the network, instead of a local LPT or USB connection. The requirements for a printer pool are as follows: Printers must use the same driver: Clients use a single printer driver for generating print jobs. All printers must accept print jobs in the same format. In many cases, this means that a single printer model is used. Printers should be in the same location: The printers in a printer pool should be located physically close together. When users retrieve their print jobs, they must check all printers in the printer pool to find their document. There is no way for users to know which printer has printed their document.
Managed Printer
To configure Branch Office Direct Printing using Windows PowerShell, type the following cmdlet at a Windows PowerShell prompt: Set-Printer'-nam "<Prtnter Name Here>" 7ComputerName, -d7rint erver Neme rlere> i---Render7nOode BranchOffwe-:,
Objectives
Atter performing this lab you will be able to: Create and configure a file share. Configure shadow copies. Enable and configure Work Folders. Create and configure a printer pool.
Lab Setup
Estimated time: 60 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before beginning the !ab, you must complete the following steps: 1. 2. 3. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410C-LON-DC1 and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. 4. Sign in using the following credentials: o o o 5. 6. User name: Administrator Password: Pa$$wOrd Domain: Adatum
Repeat steps 2 through 4 for 20410C-LON-SVR1. Repeat steps 2 and 3 for 20410C-LON-CL1. Do not sign in to LON-CL1 until directed to do so.
~~ On LON-SVR1, open File Explorer and create the following folders: o o o o o K 1. E:\Data E:\Data\Development E:\Data\Marketing E:\Data\Research E:\Data\Sales
Task 2: Configure NTFS permissions on the folder structure In File Explorer, block the NTFS permissions inheritance for E:\Data, and when prompted, convert inherited permissions into explicit permissions. In File Explorer, remove permissions for LON-SVR1\Users on subdirectories in E:\Data. In File Explorer, add the following NTFS permissions for the folder structure: Falder E:\Data E:\Data\Development E:\Data\Marketing E:\Data\Research E:\Data\Sales Pet-missions I No change Modify:Adatum\ Development Modify:AdatumWarketing Modify: Adatum\Research Modify:Adatunn\Sales
2. 3.
Task4:Test accesstothesharedfolder
1. Sign in to LON-CL1 as Adatum \Bernard with the password Pa$$wOrd.
53
2. 3. 4.
Open File Explorer. Navigate to \\LON-SVR1\Data. Attempt to open the Development, Marketing, Research, and Sales folders.
C= ;
Note: Bernard should have access to the Development folder. However, although Bernard can still see the other folders, he does not have access to their contents.
5.
1 1 Task5: Enableaccess-basedenumeration
1. 2. 3. 4. 5. Switch to LON-SVR1. Open Server Manager. Click File and Storage Management. Click Shares. Open the Properties dialog box for the Data share, and on the Settings page, enable Access-based enumeration.
Note: Bernard can now view only the Development folder, the folder for which he has been assigned permissions.
3. 4. II 1. 2.
3. 4.
Navigate to drive E. Open the Properties dialog box for the Data folder, and disable Offline file caching.
4.
5. 6.
Paste the file back into the Development folder. Close File Explorer and all open windows.
3. Close all open windows. K 1. 2. Task 4: Test synchronization Sign in to LON-CL1 as Adatum \Administrator with the password Pa$$wOrd. Use File Explorer to navigate to CALabfiles\Mod10 and double-click WorkFolders.bat This adds a registry entry to allow unsecured connections to the work folders.
3. 4. 5. 6.
Sign out of LON-CL1. Sign in to LON-CL1 as Adatum\Administrator. In File Explorer, open Work Folders and create a new text document named TestFile2. Switch to LON-SVR1 and use File Explorer to open C:\CorpData\Administrator. Ensure the new text file you created exists.
Results: After completing this exercise, you will have installed the Work Folders role service, created a sync Share, and created a Group Policy Object to deliver the settings to the users automatically. You will have also tested the settings.
Share the printer. List the printer in AD DS. Enable Branch Office Direct Printing.
Task 3: Configure printer pooling o o o Type: Standard TCP/IP port IP Address: 172.16.0.201 Connection: Generic Network Card
1. On LON-SVR1, in the Print Management console, create a new port with the following configuration:
2. 3. K
Open the Branch Office Printer Properties dialog box, and on the Ports tab, enable printer pooling. Select port 172.16.0.201 as the second port. Task 4: Instan a printer on a client computer On LON-CL1, add a printer, selecting the Branch Office Printer on LON -SVR1 printer.
Result.s: Atter completing this exercise, you will have installed the Print and DocuriteiSerVice server role and installed a printer with printer pooling
Cl Prepare for the next module After you finish the lab, reved the virtual machines to their initial state. To do this, complete the following steps. 1. 2. 3. 4. On the holt computer, start Hyper-V Manager. In the Virtual Machines list, right-click 20410C- LON -SVR1, and then click Revert. In the Revert Virtual Machine dialog box, click Revert. Repeat steps 2 and 3 for 20410C- LON -CL1 and 20410C- LON - DC1.
La b Review Questions Question: How does implementing access-based enumeration benefit the users of the Data shared folder in this lab? Question: Is there another way you could recover the file in the shadow copy exercise? What benefit do shadow copies provide in comparison? Question: In Exercise 3, how could you configure Branch Office Direct Printing if you were in a remote location and did not have access to the Windows Server 2012 GUI for the print server?
Tools
Use Effective Access Tool Assessing combined permissions for a file, folder, or shared folder. Wheretofind it Under Advanced, on the Security tab of the Properties dialog box of a file, folder or shared folder. Command Prompt window.
Configuring Windows Server 2012 networking components. Managing the print environment in Windows Server 2012.
6-1
Module 6
Implementing Group Policy
Contents:
Module Overview Lesson 1: Overview of Group Policy Lesson 2: Group Policy Processing Lesson 3: Implementing a Central Store for Administrative Templates Lab:Implementing Group Policy Module Review and Takeaways 6-1 6-2 6-10 6-16 6-20 6-24
Module Overview
Maintaining a consistent computing environment across an organization is challenging. Administrators need a mechanism to configure and enforce user and computer settings and restrictions. Group Policy can provide that consistency by enabling administrators to centrally manage and apply configuration settings. This module provides an overview of Group Policy and provides details about how to implement Group Policy.
Objectives
After completing this module, you Will be able to: Create and manage Group Policy Objects. Describe Group Policy processing. Implement a Central Store for administrative templates.
Lesson 1
Lesson Objectives
After completing this lesson, you will be able to: Describe the components of Group Policy. Describe multiple local GPOs. Describe storage options for domain GPOs. Describe GPO policies and preferences. Describe starter GPOs. Describe the process of delegating GPO management. Describe the process of creating and managing GPOs.
GPOs
A Group Policy Object (GPO) is an object that contains one or more policy settings that apply configuration setting for users, computers, or both. GPO templetes are stored in SYSVOL, and GPO container objects are stored in Active Directory Domain Services (AD DS). You can manage GPOs by using the Group Policy Management Console (GPMC). Within the GPMC, you can open and edit a GPO by using the Group Policy Management Editor window. GPOs are linked to Active Directorycontainers to apply settings to the objects in those containers.
Most policy settings have the following three states: Not Configured. The GPO does not modify the existing configuration of the particular setting for the user or computer. Enabled. The policy setting is applied. Disabled. The policy setting is specifically reversed.
Note: Some settings are multi-valued or have text string values. These are typically used to provide specific configuration details to apps or operating system components. For example, a setting might provide the URL of the home page used in Windows Internet Explorer or the path to blocked apps.
The effect of a configuration change depends on the policy setting. For example, if you enable the Prohibit Access to Control Panel policy setting, users cannot open Control Panel. If you disable the policy setting, you ensure that users can open Control Panel. Notice the double negative in this policy setting: You disable a policy that prevents an action, thereby allowing the action.
User and computer settings each have three areas of configuration, as described in the following table. Section Software settings Description Contain software settings that can be deployed to either the user or the computer. Software that is deployed to a user is specific to that user. Software that is deployed to the computer is available to all users of that computer.
Windows operating system ; Contain script settings and security settings for both user and computer, and Internet Explorer maintenance settings for the user configuration. settings Administrative templates Contain hundreds of settings that modify the registry to control various aspects of the user and computer environment. New administrative templates might be created by Microsoft or other vendors. You can add these new templates to the GPMC. For example, there are Microsoft Office templates that you can add to the GPME. You can download these templates from the Microsoft website.
Note: The exception to this feature is domain controllers. Dueto the nature of their role, domain controllers cannot have local GPOs.
With the exception of the Administrator or Non-Administrator categories, it is not possible to apply local GPOs to groups, but only to individual local user accounts. Domain users are subject to the local Group Policy, or to the Administrator or Non-Administrator settings, as appropriate.
-1 Note: Domain administrators can disable processing local GPOs on clients that are running Windows client operating systems and Windows Server operating systems by enabling the Turn Off Local Group Policy Objects Processing policy setting.
StorageofDomainGPOs
Group Policy settings are presented as GPOs in the GPMC, but a GPO is actually two componente: a Group Policy template, and a Group Policy container.
Group Policy Components GPO
Contains Group Policy settings Stores content in two iocations
Policy container. When you create a GPO, a new Group Policy template is created in the SYSVOL folder, and a new Group Policy container is created in AD DS.
When editing a Group Policy Object, the version you are editing is the version on the domain controller that has the primary domain controller (PDC) emulator Flexible Single Master Operations (FSMO) role. It does not matter what computer you are using to perform the editing, the GPMC is focused on the PDC emulator by default. You can, however, change the focus of the GPMC to edit a version on a different domain controller.
Characteristics of Preferences
Preferences have the following characteristics: Preferences exist for both computers and users. Unlike Group Policy settings, preferences are not enforced, and users can change the configurations that are established by preferences.
Are not enforced removed when the GPO no longer apprees De not disable the interface of the setting: users can change the setting Cannot be used in local group polices
Preferences can be managed through the Remote Server Administration Tool (RSAT). Preferences can be applied only once at startup or sign in, and can be refreshed at intervals. Unlike Group Policy settings, preferences are not removed when the GPO is no longer applied, but you can change this behavior. You can target preferences easily to certain users or computers by using a variety of ways, such as by the user's security group membership or by the operating system version. Preferences are not available for local GPOs. Unlike a Group Policy setting, the user interface of a Group Policy preferente setting is not disabled.
Available Settings
Starter GPOs contain settings from only the Administrative Templates node of either the User Configuration section or the Computer Configuration section. The Software Settings and Windows Settings nodes of Group Policy are not available, because these nodes involve interaction of services and are more complex and domain-dependent.
Delegating ManagementofGPOs
Administrators can delegate some of the Group Policy administrative tasks to other users. These users do not have to be domain administrators they can be users that are granted certain rights to GPOs. For example, a user who manages a particular Organizational Unit (OU) could be tasked with performing reporting and analysis duties, while the help desk group is allowed to edit GPOs for that OU. A third group made up of developers might be put in charge of creating Windows Management Instrumentation (WMI) filters.
Delegation of GPO-related tasks allows the administrative workload to be distributed across the enterprise The following Group Policy tasks can be independently delegated: Creating GPOs, including Starter GPOs Editing GPOs Managing Group Policy links for a ste, domain, or OU Performing Group Policy Modeling analysis n a domain or OU Reading Group Policy Resulte data in a domain or OU Creating WMI flters on a domain
The following Group Policy administrative tasks can be delegated independently: Creating GPOs, including creating Starter GPOs Editing GPOs Managing Group Policy links for a site, domain, or OU Performing Group Policy modeling analysis Reading Group Policy results data Creating WMI filters
Members of the Group Policy Creator Owners group can create new GPOs and edit or delete GPOs that they have created.
The Authenticated User group has Read and Apply Group Policy permissions only.
ew-GP0,7.-Name, ;,.,ZDs
Lesson 2
Lesson Objectives
After completing this lesson, you will be able to: Describe a GPO link. Explain how to apply GPOs to containers and objects. Describe the Group Policy processing order. Describe the default GPOs. Describe GPO security filtering.
GPO Links
Once you have created a GPO and defined all the settings that you want it to deliver, the next step is to link the policy to an Active Directory container. A GPO link is the logical connection of the policy to a container. You can link a single GPO to multiple containers by using the GPMC. You can link GPOs to the following types of containers: Sites
When linking GPOs, remember that To deliver settings to an object, a GPO must be linked to a container Disabling a link removes the settings from the container Deleting a link does not delete the GPO GPOs can be tinked to: Sites Domains OUs GPOs cannot Users Groups Computen System cantata
O:
Once a GPO is linked to a container, by default the policy is applied to all the objects in the container, and subsequently all the child containers under that parent object. This is because the default permissions of the GPO are such that Authenticated Users have Read and Apply Group Policy permission. You can modify this behavior by managing permissions on the GPO. You can disable links to containers, which removes the configuration settings. You can also delete links. Deleting links does not delete the actual GPO, only the logical connection to the container. GPOs cannot be linked directly to users, groups, or computers. In addition, GPOs cannot be linked to the system containers in AD DS, including Builtin, Computers, Users, or Managed Service Accounts. The AD DS system containers receive Group Policy settings from GPOs that are linked to the domain leve) only.
Applying GPOs
Computer configuration settings are applied at startup, and then are refreshed at regular intervals. Any startup scripts are run at computer startup. The default interval is every 90 minutes, but this is configurable. The exceptions to this default interval are domain controllers, which have their settings refreshed every five minutes. User settings are applied at logon and are refreshed at regular, configurable intervals. The default for this is also 90 minutes. Any logon scripts are run at sign in. When you apply GPOs, remembe that:
- Computer settings apply at startup User settings apply at sign in Polices refresh at regular, configurable intervals Security settings refresh at least every 16 hours Policies refresh manually by using: The Gpupdate command The Windows PowerShell cmdlet lnvoke-Gpupdate Since Windows Server 2012 and Windows 8, a new Remote Policy Refresh feature allows you to remotely refresh policies.
Note: A number of user settings require two sign ins before the user sees the effect of the GPO. This is because multiple users signing in to the same computer use cached credentials to speed up sign ins. This means that, although the policy settings are being delivered to the computer, the user is already signed in and thus the settings do not take effect until the next sign in. The Folder Redirection setting is an example of this.
You can change the refresh interval by configuring a Group Policy setting. For computer settings, the refresh interval setting is found in the Computer Configuration\Policies\Administrative Templates \System\Group Policy node. For user settings, the refresh interval is found at the corresponding settings under User Configuration. An exception to the refresh interval is the security settings. The security settings section of the Group Policy is refreshed at least every 16 hours, regardless of the interval that you set for the refresh interval. You can also refresh Group Policy manually. The command-line utility Gpupdate refreshes and delivers any new Group Policy configurations. The Gpupdate /force command refreshes all the Group Policy settings. There is also a new Windows PowerShell Invoke - Gpupdate cmdlet, which performs the same function. A new feature in Windows Server 2012 and in Windows 8 is Remote Policy Refresh. This feature allows administrators to use the GPMC to target an OU and force Group Policy refresh on all of its computers and their currently signed-in users. To force a Group Policy refresh, right-click any OU, and then click Group Policy Update. The update occurs within 10 minutes.
2. 3.
Site GPOs. Policies that are linked to sites are processed next. Domain GPOs. Policies that are linked to the domain are processed next. There are often multiple polices at the domain level. These policies are processed in order of preference.
4.
OU GPOs. Policies linked to OUs are processed next. These policies contain settings that are unique to the objects in that OU. For example, the Sales users might have special required settings. You can link a policy to the Sales OU to deliver those settings.
5.
Child OU policies. Any policies that are linked to child OUs are processed last.
Objects in the containers receive the cumulative effect of all polices in their processing order. In the case of a conflict between settings, the last policy applied takes effect. For example, a domain-level policy might restrict access to registry editing tools, but you could configure an U-levet policy and link it to the IT OU to reverse that policy. Because the OU-level policy is applied later in the process, access to registry tools would be available.
E='1
Note: Other methods such as Enforcement and Inheritance Blocking can change the effect of policies on containers.
If multiple policies are applied at the same level, the administrator can assign a preference value to control the order of processing. The default preference order is the order in which the policies were linked. The administrator can also disable the user or computer configuration of a particular GPO. If one section of a policy is known to be empty, it should be disabled to speed up policy processing. For example, if there is a policy that only delivers user desktop configuration, the administrator could disable the computer side of the policy.
deliver the settings, and then link those policies to the domain. r 21 Note: Currently, fine-grained password policies are the typical enterprise method, although they are beyond the scope of this module.
1 1 1 1 1
By adjusting the permissions in the ACL, you can control which security principies receive permission to have the GPO settings applied. There are two approaches you might take to do this: Deny access to the Group Policy Limit permissions to Group Policy
Note: The Authenticated Users group includes all user and computer accounts that have been authenticated to AD DS.
1 1 1 1 1 1
1-3 1 Note: As a best practice, you should never deny access to the Authenticated User group. If you do, then security principies would never receive the GPO settings.
Scenario
The following illustration represents a portion of the A. Datum Corporation's AD DS structure, which contains the Sales OU with its child OUs and the Servers OU.
20 minuete
* e H1
ae
GPO2 locks down desidops, removes access to Control ' 1'5' Panel, and configures printers GP03 configures power options for client laptops
Some users in the Sales OU have administrative rights on their computers, and have created local policies to specifically grant access to Control Panel.
Discussion Questions
Based on this scenario, answer the following questions: Question: What power options will the servers in the Servers OU receive? Question: What power options will the laptops in the Sales Laptops OU receive? Question: What power options will all other computers in the domain receive? Question: Will users in the Sales Users OU who have created local policies to grant access to Control Panel be able to access Control Panel? Question:If you needed to grant access to Control Panel to some users, how would you do it? Question: Can GPO2 be applied to other department OUs?
Lesson 3
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Lesson Objectives
After completing this lesson, you will be able to: Describe the Central Store. Describe ad ministrative templates. Describe how administrative templates work. Describe managed and unmanaged policy settings.
WhatlstheCentralStore?
If your organization has multiple administration workstations, there could be potential issues when editing GPOs. If you do not have a Central Store that contains the template files, then the workstation from which you are editing will use the .admx (ADMX) and .adml (ADML) files that are stored in the local PolicyDefinitons folder. If different administration workstations have different operating systems or are at different service pack levels, there might be differences in the ADMX and ADML files. For example, the ADMX and ADML files that are stored on a workstation running Windows 7 with no service pack installed might not be the same as the files that are stored on a domain controller running Windows Server 2012. This could lead to administrators not seeing the same settings in a GPO. The Central Store addresses this issue. The Central Store provides a single point from which administration workstations can download the same ADMX and ADML files when editing a GPO. The Central Store is detected automatically by Windows operating systems (Windows Vista or newer or Windows Server 2008 or newer). Because of this automatic behavior, the local workstation that the administrator uses to perform administration always checks to see if a Central Store exists before loading the local ADMX and ADML files in the Group Policy Management Editor window. When the local workstation detects a Central Store, it then downloads the template files from there. In this way, there is a consistent administration experience among multiple workstations.
The Central Store: ts a central repository for ADMX and ADML fi1es la stored in SYSVOL Must be created manually Is detected automatically by Windows operating terns
ADML files that generate the user interface to configure the Administrative Templates policy settings in the Group Policy Management Editor window. ADML files are language-specific. ADMX and ADML files are stored in the %SystemRoot%\PolicyDefinitions folder or in the Central Store. You can also create your own custom administrative templates in XML format. Administrative templates that control Microsoft Office products (such as Office Word, Office Excel and Office PowerPoint) are also available from the Microsoft website. Administrative templates have the following characteristics: They are organized into subfolders that house configuration options for specific areas of the environment, such as network, system, and Windows components. The settings in the Computer section edit the HKEY_LOCAL_MACHINE registry hive, and settings in the User section edit the HKEY_CURRENT_USER registry hive. Some settings exist for both User and Computer. For example, there is a setting to prevent Windows Messenger from running in both the User and the Computer templates. In case of conflicting settings, the Computer setting prevails. Some settings are available only to certain versions of Windows operating systems. Double-clicking the settings displays the supported versions for that setting. Any setting that cannot b processed by an older Windows operating system is simply ignored by that system.
ADM Files
Prior to Windows Vista, administrative templates had an .adm file extension (ADM). ADM files were language-specific, and were difficult to customize. ADM files are stored in SYSVOL as part of the Group Policy template. If an ADM file is used in multiple GPOs, then the file is stored multiple times. This increases the size of SYSVOL, and therefore increases the size of Active Directory replication traffic.
Nodes Control Panel Network Printers - System Windows Components All Settings
User settings
Control Panel - Desktop - Network - Shared Folders Start Menu and Taskbar System WindowsComponents All Settings
Most of the nodes contain multiple subfolders to further organize settings into logical groupings. Even with this organization, finding the setting that you need might be a daunting task. To help you locate settings in the All Settings folder you can filter the entire list of settings in either the computer or the user section. The following filter options are available: Managed or unmanaged Configured or not configured Commented By keyword By platform
You can also combine multiple criteria. For example, you could filter to find alI the configured settings that apply to Internet Explorer 10 by using the keyword ActiveX.
Changes made by a Group Policy setting and the UI lockout are released if the user or computer falls out of scope of the GPO. For example, if you delete a GPO, managed policy settings that had been applied to a user are released. Typically, the setting then resets to its previous state. Also, the UI interface for the setting is enabled.
Objectives
After completing this lab, you will be able to: Configure a Central Store. Create GPOs.
Lab Setup
Estimated Time:40 minutes
Virtual machines
20410C-LON-DC1 20410C-LON-CL1
Adatum\Administrator Pa $$w0rd
2. 3. 4.
5. Repeat steps 2 and 3 for 20410C-LON-CL1. Do not sign in until directed to do so.
K Task 1: View the location of administrative templates in a Group Policy Object (GPO)
1. 2. 3. Sign in to LON-DC1 as Administrator with a password of Pa$$wOrd. Start the Group Policy Management Console (GPMC). In the Group Policy Object folder, open the Default Domain Policy and view the location of the administrative templates.
Results: After completing this exercise, you should have configureci a Central Store.
Hint: Select All Settings in Administrative Templates and filter for an exact match by using the keywords General page.
2.
u Task 3: Create an Internet Explorer Restrictions G PO from the Internet Explorer Restrictions starter GPO
Create a new GPO named IE Restrictions that is based on the Internet Explorer Restrictions starter GPO, and then link it to the Adatum.com domain. Task 4: Test the GPO for Domain Users Sign in to LON-CL1 as Adatum\Brad, with a password of Pa$$wOrd. Open Control Panel. Attempt to change your home page. Open Internet Options to verify that the General tab has been restricted. Sign out from LON-CL1.
K 1. 2. 3. 4. 5.
u 1. 2.
Task 5: Use security filtering to exempt the IT Department from the Internet Explorer Restrictions policy On LON-DC1, open the GPMC. Configure security filtering on the Internet Explorer Restrictions policy to deny access to the IT department. Task 6: Test the GPO app for IT department users Sign in to LON-CL1 as Brad, with a password of Pa$$wOrd. Open Control Panel. Attempt to change your home page. Verify that the Internet Properties dialog box opens to the
General tab, and all settings are available.
K 1. 2. 3.
4. n 1. 2. 3. 4. 5.
Sign out from LON-CL1. Task 7: Test Application of the GPO for other domain users Sign in to LON-CL1 as Boris, with a password of Pa$$wOrd. Open Control Panel. Attempt to change your home page. Open Internet Options to verify that the General tab has been restricted. Sign out from LON-CL1.
should h-OvecreateCI GP
ri Prepare for the next module After you finish the lab, reved the virtual machines back to their initial state. To do this, complete the following steps: 1. 2. 3. 4. On the host computer, start Hyper-V Manager. In the Virtual Machines list, right-click 20410C-LON-DC1, and then click Revert. In the Revert Virtual Machine dialog box, click Revert. Repeat steps 2 and 3 for 20410C-LON-CL1.
policy that is being applied to the entire Sales OU. All sales user accounts and sales groups reside in the Sales OU. How would you exempt the Sales Managers group?
Question: What Windows command can you use to force the immediate refresh of all GPOs on a client computer?
Best Practices
The following are recommended best practices: Do not use the Default Domain and Default Domain Controllers policies for uses other than their default uses. Instead, create new policies. Limit the use of security filtering and other mechanisms that make diagnostics more complex. If they have no settings configured, disable the User or Computer sections of policies. If you have multiple administration workstations, create a Central Store. Add comments to your GPOs to explain what the policies are doing. Design your OU structu re to support Group Policy application.
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Tools
Tool Group Policy Management Console (GPMC) Group Policy Management Editor snap-in Resultant Set of Policy (RSoP) Group Policy Modeling 1 Wizard Use Controls all aspects of Group Policy _ Configure settings in GPOs i Accessed by editing any GPO Where to find ft i In Server Manager, on the Tools 1 menu
In the GPMC
Test what would occur if settings : In the GPMC were applied to users or computers, prior to actually applying the settings Configure Group Policy settings that apply only to the local computer I Accessed by creating a new l Microsoft Management Console (MMC) on the local computer, and adding the Group Policy Management Editor snap-in
7-1
Module 7
Securing Windows Servers Using Group Policy Objects
Contents:
Module Overview Lesson 1: Windows Operating Systems Security Overview Lesson 2: Configuring Security Settings Lab A: Increasing Security for Server Resources Lesson 3: Restricting Software Lesson 4: Configuring Windows Firewall with Advanced Security Lab B: Configuring AppLocker and Windows Firewall Module Review and Takeaways 7-1 7-2 7-6 7-17 7-24 7-28 7-33 7-39
Module Overview
Protecting IT infrastructure has always been a priority for organizations. Many security risks th reaten companies and their critical data. When companies fail to have adequate security policies, they can lose data, experience server unavailability, and lose credibility. To protect against security threats, companies must have well-designed security policies that include many organizational and IT-related components. Security policies must be evaluated on a regular basic because as security threats evolve, so must IT evolve. Before you begin designing security policies to help protect your organization's data, services, and IT infrastructure, you must learn how to identify security threats, plan your strategy to mitigate security threats, and secu re your Windows Server 2012 infrastructure.
Objectives
After completing this module, you will be able to: Describe Windows Server operating system security. Configure security settings by using Group Policy. Increase security for server resources. Restrict unauthorized software from running on servers and clients. Configure Windows Firewall with Advanced Security.
Lesson 1
Lesson Objectives
Atter completing this lesson, you will be able to: Identity security risks for Windows Server 2012 and the costs associated with them. Apply the defense-in-depth model to increase security. Describe best practices for increasing Windows Server 2012 security.
10 minutes
ecurity
Security policy measures need to operate within the context of organizational policies regarding security best practices. For example, enforcing a strong user password policy is not helpful if users write down their passwords and place them next to their computer screens; users must be educated a bout how to protect their passwords. Another example of a security best practice is ensuring that users do not leave their desktop computer without first locking the desktop or signing off of the computer. When establishing a security foundation for your organization's network, it is a good idea to start by establishing appropriate policies and procedures and then make users aware of them. You can then progress to the other aspects of the defense-in-depth model.
Physical Security
If any unauthorized person can gain physical access to a computer on your network, then most other security measures can be more easily bypassed. You must ensure that computers containing the most sensitive data (such as servers) are physically secure, and that physical access is granted only to authorized personnel.
Perimeter
These days, no organization is an isolated enterprise. Organizations operate within the Internet, and many organizational network resources are available from the Internet. This might include a website that describes your organization's services, or internal services that you make available externallysuch as web conferencing and emailso that users can work from home or from branch offices. Perimeter networks mark the boundary between public and private networks. Providing reverse proxy servers in the perimeter network enables you to provide more secure corporate services across the public network. Many organizatTons implement network access quarantine control, where computers that connect to the corporate network are checked for different security criteria, such as whether the computer has the latest security updates, antivirus updates, and other company-recommended security settings. If these criteria are met, the computer is allowed to connect to corporate network. If not, the computer is placed in an isolated network, called a quarantine, with no access to corporate resources. Once the computer has its security settings remediated, it is removed from the quarantine network and is allowed to connect to corporate resources.
Note: A reverse proxy, such as Microsoft Forefront Threat Management Gateway 2010 1.:1 (Forefront TMG), enables you to publish services such as email or web services, from the corporate intranet without placing the email or web servers in the perimeter or exposing them to externa! users. Forefront TMG acts as both reverse proxy and as a firewall solution.
Networks
Once you connect your computers to a network (either internal or public), they are susceptible to a number of threats including eavesdropping, spoofing, denial of service, and replay attacks. By implementing Internet Protocol Security (IPsec), you can encrypt network traffic and protect data while in transfer between computers. When communication takes place over public networks, such as by employees who are working from home or from remote offices, as a best practice they should connect to a firewall solution such as Forefront TMG 2010 to protect from different types of network threats.
Data Security
The final layer of security is data security. To help ensure the protection of your network, you should: Ensure the proper use of file user permissions by using Access Control Lists (ACLs). Implement the encryption of confidential data with Encrypting File System (EFS). Perform regular data backups.
Additional Reading: For the latest Microsoft security bulletin and advisory information, see Security for IT Pros at http://go.microsoft.com/fwlink/?LinkID=266741. For more information about common types of network attacks, see http://go.microsoft.com/fwlink/?LinkID=266742.
Question: How many layers of the defense-in-depth model should you Implement in your organization?
1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1
Additional Reading: For more information aboilt best practices for enterprise security, see http://go.microsoft.com/fwlink/?LinkID=266743.
~~
Lesson 2
Additional Reading: For a detailed list of Group Policy settings, see the document "Group Policy Settings Reference for Windows and Windows Server" at: http://go.microsoft.com/fwlink/?LinkID=266744.
Lesson Objectives
After completing this lesson, you will be able to: Describe how to configure security templates. Describe what user rights are, and how to configure them. Describe how to configure Security Options.
~~ Describe how to configure UAC. Describe how to configure Security Auditing. Describe how to configure Restricted Groups. Describe how to configure Account Policy Settings. Describe Security Compliance Manager (SCM).
Event log. App, system, and security event log settings Restricted Groups. Mem bership of groups that have special rights and permissions System Services. Startup and permissions for system services Registry. Permissions for registry keys File System. Permissions for folders and files
When you configure a security template, you can use it to configure a single computer or to configure multiple computers on the network. The following are a few ways that you can configure and distribute securitytemplates: Secedit.exe. You can use the secedit.exe command-line tool to compare the current configuration of a computer running Windows Server 2012 to specific security templates. Security Templates snap-in. You can use this snap-in to create a security policy by using security templates. Security Configuration and Analysis Wizard. You can use this wizard to analyze and configure computer security. Group Policy. You can use Group Policy to analyze and configure computer settings, and to distribute specific security settings. SCM. You can use the SCM to view security settings, compare settings to security baselines (which are groups of settings designed on the basis of Microsoft security guides and best practices), customize settings, and import or export GPO backups. SCM is described in detail in a later topic.
Some examples of commonly used user rights (and policies configured by them) are: Add workstations to domain. Determines which users or groups can add workstations to the domain. Allow log on locally. Determines which users can sign in to the computer. Allow log on through Remote Desktop Services. Determines which users or groups have permission to sign in by using Remote Desktop Services Client. Back up files and directories. Determines which users have permissions to back up files and folders on a computer. Change the system time. Determines which users or groups have the rights to change the time and date on the interna! clock of the computer. Force shutdown from a remote system. Determines which users are allowed to shut down a computer from a remote location on the network. Shut down the system. Determines which of the users who are locally signed in to a computer are allowed to shut down the computer.
You can configure settings for Security Options by accessing the following location from the GPMC: Computer Configu ration \ Policies\Windows Settings\SecuritySettings\ Local Policies\ Secu rity Options
The following are examples of commonly used Security Options: Prompt user to change password before expiration. Determines how many days before a user's password expiring that the operating system provides a warning. Interactive logon: Do not display last user narre. Determines whether the name of the last user to sign in to the computer s displayed in the Windows logon window. Accounts: Rename administrator account. Determines whether a different account name is associated with the security identifier (SID) for the administrator account. Devices: Restrict CD-ROM access to locally logged-on user only. Determines whether a CD-ROM is accessible to both local and remote users simultaneously.
Note: Since Windows Server 2008, the built-in Administrator account does not run in Admin Approval Mode. The result is that no UAC prompts display when using the local Administrator account.
If the user is not an administrator, then a username and password for an account that has administrative permissions needs to be entered. Providing administrative credentials temporarily gives the user administrative privileges, but only to complete the current task. After the task is complete, permissions change back to those of a standard usen.
When using this process of notification and elevation to administrator account privileges, changes cannot be made to the computer without the user knowing, because a prompt asks the user for permission or for administrator credentials. This can help prevent malicious software (malware) and spyware from being installed on or making changes to a computer. UAC allows the following system-level changes to occur without prompting, even when a user is signed in as a local user: Install u pdates from Windows Update Install drivers from Windows Update or those that are packaged with the operating system View Windows operating system settings Pair Bluetooth devices with the computer Reset the network adapter, and perform other network diagnostic and repair tasks
The following are examples of some GPO settings that you can configure for UAC: User Account Control: Run all administrators in Admin Approval Mode. Controls the behavior of all UAC policy settings for the computer. If this setting is disabled, UAC will not run on this computer. User Account Control: Administrator Approval Mode for the built-in Administrator account. When you enable this setting, the built-in Administrator account uses Admin Approval Mode. User Account Control: Detect app installations and prompt for elevation. This setting controls the behavior of app installation detection for the computer. User Account Control: Only elevate executables that are signed and validated. When you enable this setting, a Public Key Infrastructure (PKI) check is performed on the executable file to verify that it originates from a trusted source. If the file is verified, then the file is permitted to run.
11_ 1 "1 Note: By default, UAC is not configured or enabled in Server Core installations of Windows
Server 2012.
You can configure settings for Security Auditing by accessing the following location from the GPMC: Computer Configuration Policies \Windows Settings\ Security Settings \ Local Policies\Audit Policy
The following are examples of some GPO settings that you can configure for auditing: Audit account logon events. Determines whether the operating system audits each time the computer validates an accounts credentials. Audit accounting management. Determines whether to audit each event of account management, such as creating, changing, renaming, or deleting a user account, changing a password, or enabling or disabling a user account. Audit object access. Determines whether operating system audits have access to nonActive Directory objects, such as folders or files. Before configuring audit settings with Group Policy, you must configure system access control lists (SACLs) on folders or files to allow auditing for a specific type of action, such as write, read, or modify. Audit system events. Determines whether the operating system audits system-related events, such as attempting to change the system time, attempting a system startup or shutdown, or the security log size exceeding a configurable threshold warning.
When working with security auditing, be aware of the following concerns. Configuring Windows Server 2012 to audit activities generates a large amount of data that is difficult to analyze. A large amount of data might cause servers or domain controllers to run out of disk space because the Security Event Log can become very large. Recording a large amount of data may also cause poor performance on legacy servers.
Additional Reading: For more information about security auditing, see the article "What's
Although you can control domain groups by assigning Restricted Groups policies to domain controllers, you should use this setting primarily to configure membership of critical groups such as Enterprise Admins and Schema Admins. You can also use this setting to control the membership of built-in local groups on workstations and member servers. For example, you can place the Helpdesk group into the local Administrators group on all workstations. You cannot specify local users in a domain GPO. Local users who currently are in the local group that the Restricted Groups policy controls will be removed, depending on the Restricted Groups policy option that you choose. The only exception to this is that the local Administrators account is always in the local Administratorsgroup. You can configure settings for Restricted Groups by accessing the following location from the GPMC: - Computer Configuration\Policies\Windows Settings\Security Settings\Restricted Groups
Account policies mtigate the threat of brute force guessing of account passwords
Account Policies
Account policy componente include password policies, account lockout policies, and Kerberos policies. The policy settings under Account policies are implemented at the domain levet. A Windows Server 2012 domain can have multiple password and account lockout policies, which are called fine-grained password policies. You can apply these multiple policies to a user orto a global security group in a domain, but not to an OU.
L_''=
Note: If you need to apply a fine-grained password policy to users of an OU, you can use a shadow group, which is a global security group that is logically mapped to an OU.
You can configure settings for Account policies by accessing the following location from the GPMC: - Computer Configuration \Policies\WindowsSettings\SecuritySettings\AccountPolicies
Password Policy
Password policies that you can configure are listed in the following table. Policy Password must meet complexity requirements Function Requires passwords to: Be at least as long as specified by the Minimum Password Length, with a minimum of 3 characters if the Minimum Password Length is set to O. Best practice Enable this setting. These complexity requirements can help ensure a strong password. Strong passwords are more difficult to decrypt than those containing simple letters or numbers. Instruct users to use pass phrases to create long passwords that are easy to remember.
- Contain a combination of at least three of the following types of characters: u ppercase letters, lowercase letters, numbers, and symbols (punctuation marks). Must not contain the user's user name or screen name.
Prevents users from creating a new password that is the same as their current password or a recently used password. To specify how many passwords are remembered, provide a value. For example, a value of 1 means that only the last password is remembered, and a value of 5 means that the previous five are remembered.
The greater number ensures better security. The default value is 24. Enforcing password history ensures that passwords that have been compromised are not used repeatedly.
Sets the maximum number of days that a password is valid. After this number of days, the user will have to change the password.
The default value is 42 days. Setting the number of days too high provides hackers with an extended window of opportunity to crack or brute force the password. Setting the number of days too low frustrates users who have to change their passwords too frequently, and could result in more frequent calls to the IT help desk. Set the minimum password age to at least 1 day. By doing so, you require that the user can only change their password once a day. This helps enforce other settings. For example, if the past five passwords are remembered, this ensures that at least five days must pass before the user can reuse the original password. If the minimum password age is set to O, the user can change their password six times on the same day and begin reusing the original password on the same day.
Sets the minimum number of days that must pass before a password can be changed.
1
7-14 Securing Windows Seivers Using Group PoNcy Objects
(continued from previous page) Policy Minimum password length Function Specifies the fewest number of characters that a password can have. Best practic,e Set the length to between 8 and 12 characters (provided that they also meet complexity requirements). A longer password is more difficult to crack than a shorter password, assuming the password is not a common word. Do not use this setting unless you use an app that requires it. Enabling this setting decreases the security of stored passwords.
1
1
Provides support for apps that need to know a user password for authentication purposes.
1 1
1 1 1
A setting of 5 allows for reasonable 1 user error, and limits repeated login attempts for malicious purposes. Note that the threshold can have a negative impact by allowing for a denial of service attack on user objects, especially from the Internet. Because of this, some organizations are going toward a higher threshold. After the threshold has been reached and the account is locked out, the account should remain locked long enough to block or deter any potential attacks, but short enough not to interfere with productivity for legitimate users. A duration of 30 to 90 minutes works well in most situations. Using a timeframe between 30 and 60 minutes is usually sufficient to deter automated attacks and manual attempts by an attacker to guess a password.
1
1 1 e 1
Allows you to specify a timeframe, in minutes, after which the account automatically unlocks and resumes normal operation.If you specify O, then the account is locked indefinitely until an administrator manually unlocks it. -
Defines a timeframe for counting the incorrect login attempts. If the policy is set for one hour, and the account lockout threshold is set for three attempts, a user can enter the incorrect login information three times within one hour. If they enter incorrect information twice, but get it correct the third time, the counter will reset after one hour has elapsed (from the first incorrect entry) so that future failed attempts will again start counting at one.
1
1 1 1
Kerberos Policy
This policy is for domain user accounts, and determines Kerberos-related settings such as ticket lifetimes and enforcement. Kerberos policies do not exist in Local Computer Policy.
Objectives
After completing this lab, you will be able to: Use Group Policy to secure member servers. Audit who is accessing specific files. Audit domain logons.
Lab Setup
Estimated time: 60 minutes
Virtual machines
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. 2. 3. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410C-LON-DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. 4. Sign in using the following credentials: o o 5. 6. User nanne:Adatum\Administrator Password: Pa$$wOrd
Repeat steps 2 through 4 for 20410C-LON-SVR1 and 20410C-LON-SVR2. Repeat steps 2 and 3 for 20410C-LON-CL1. Do not sign in to LON-CL1 until directed to do so.
2. Create a Server Administrators group. 3. Create a Member Server Security Settings Group Policy Object (GPO) and link it to the Member Servers OU. Configure group membership for local administrators to include Server Administrators and Domain Admins. 5. 6. 7. Verify that Computer Administrators has been added to the local Administrators group. Modify the Member Server Security Settings GPO to remove Users from Allow Log On Locally. Modify the Member Server Security Settings GPO to enable User Account Control: Admin Approval Mode for the Built-in Administrator account. Verify that a non-administrative user cannot sign in to a member server.
4.
8.
Task 1: Create a Member Servers organizational unit (OU) and move servers into it
1. 2. 3. On LON-DC1, open Active Directory Users and Computers. Create a new OU named Member Servers OU. Move servers LON-SVR1 and LON-SVR2 to Member Servers OU.
~~ On LON-DC1, in Member Servers OU, create a new global security group called Server Administrators.
n
1. 2.
Task 3: Create a Member Server Security Settings Group Policy Object (GPO) and link it to the Member Servers OU
On LON-DC1, open the Group Policy Management Console. In the Group Policy Management Console, in the Group Policy Objects container, create a new GPO with a name Member Server Security Settings. In the Group Policy Management Console, link the Member Server Security Settings to Member Servers OU.
3.
E Task 4: Configure group membership for local administrators to include Server Administrators and Domain Admins
1. 2. On LON-DC1, open the Group Policy Management Console. For the Default Domain Policy, open the Group Policy Management Editor window.
3.
In the Group Policy Management Editor window, go to Computer Configuration\Policies \Windows Settings \Security Settings\Restricted Groups.
4. 5.
Add the Server Administrators and Domain Admins groups to the Administrators group. Close the Group Policy Management Editor window.
n
1. 2.
Task 5: Verify that Computer Administrators has been added to the local Administrators group
Switch to LON-SVR1. Open a Windows PowerShell window, and at the Windows PowerShell prompt, type following command: 1, Gpupdate /force
3.
Open Server Manager, open the Computer Management console, and then expand Local Users and Groups.
4.
Confirm that the Administrators group contains both ADATUM \Domain Admins and ADATUM \Server Administrators as members. Cose the Computer Management console.
5.
1.
Task 6: Modify the Member Server Security Settings GPO to remove Users from Allow Log On Locally
On LON-DC1, in the Group Policy Management Console, edit the Member Server Security Settings GPO.
2.
In the Group Policy Management Editor window, go to Computer Configuration \Policies \Windows Settings \Security Settings\Local Policies\User Rights Assignment.
3. Configure Allow log on locally for Domain Admins and Administrators security groups.
Task 7: Modify the Member Server Security Settings GPO to enable User Account Control: Admin Approval Modeforthe Built-in Administratoraccount
1. On LON-DC1, in the Group Policy Management Editor window, go to Computer Configuration \Policies \Windows Settings\Security Settings \Local Policies \Security Options. Enable User Account Control: Admin Approval Mode for the Built-in Administrator account. Close the Group Policy Management Editor window. -
2. 3.
u
1. 2.
3. 4.
Sign out from LON-SVR1. Try to sign in to LON-SVR1 as Adatum \Adam with the password Pa$$wOrd. Verify that you cannot sign in to LON-SVR1.
5. To prepare for the next exercise, sign out of LON-SVR1, and sign back in to LON-SVR1 as Adatum\Administrator with the password Pa$$wOrd.
K Task 1: Modify the Member Server Security Settings GPO to enable object access auditing
1. 2. 3. Switch to LON-DC1. In the Group Policy Management Console, edit the Member Server Security Settings GPO. In the Group Policy Management Editor window, go to Computer Configu ration \Policies \Windows Settings\Security Settings \Local Policies \Audit Policy. 4. 5. Enable Audit object access with both Success and Failure settings. Sign out of LON-DC1.
1. On LON-SVR1, in the Local Disk (C:) window, configure auditing on the Marketing folder, with following settings: o o o o Select a principal: Domain Users Type: All Permission: Read & execute, List folder content, Read, Write Leave other settings with their default values
2.
Refresh Group Policy by typing the following command at the Windows PowerShell prompt:
gpupdate /force
I 1. 2.
3. 4. 5.
Close the Command Prompt window. Sign out from LON-CL1, and then sign in again as Adatum\Adam with the password Pa$$wOrd. Open the Marketing folder on LON-SVR1, by using the following Universal Naming Convention (UNC) path: \\LON-SVR1\Marketing.
6. 7. Ll 1. 2. 3.
Create a text document with a name Employees. Sign out from LON-CL1.
Task 5: View the results in the security log on the domain controller
Switch to LON-SVR1, and start Event Viewer. In the Event Viewer window, expand Windows Logs, and then open Security. Verify that following event and information is displayed: o o o o Source: Microsoft Windows Security Auditing Event ID: 4663 Task category: File System An attempt was made to access an object
Results: After completing this exercise, you should have enabled file system access auditing.
H Task 1: Modify the Default Domain Policy GPO 1. Sign in to LON-DC1 as Adatum \Administrator with the password Pa$$wOrd. 2. On LON-DC1, start Server Manager, and then from Server Manager, start GPMC. 3. On LON-DC1, in the Group Policy Management Console, edit the Default Domain Policy GPO. 4. In the Group Policy Management Editor window, go to Computer Configuration\Policies
\Windows Settings\Security Settings\Local Policies \Audit Policy.
5. Enable Audit account logon events with both Success and Failure settings. 6. Update Group Policy by using the gpupdate /force command. Task2: Run GPUpdate 1. Sign in to LON-CL1 as Adatum \Administrator with the password Pa$$wOrd.
LI
2. Open the Command Prompt window and type the following command: IIIIIIIIIII~IIIIIIIIIIIIIIIIIIIIII~ gpupdate /forc, 3. Cose the Command Prompt window, and sign out from LON-CL1. ti Task 3: Sign in to LON-CL1 with an incorrectpassword Sign in to LON-CL1 as Adatum\Adam with the password password.
Note: This password is intentionally incorrect to generate a security log entry that shows that that an unsuccessful sign in attempt has been made.
Task 4: Review event logs on LON-DC1 1. On LON-DC1, start Event Viewer. 2. In the Event Viewer window, expand Windows Logs, and then click Security. 3. Review the event logs for the following message: "Event ID 4771 Kerberos pre-authentication
failed. Account Information: Security ID: ADATUM\Adam."
Task 5: Sign in to LON-CL1 with the correct password 1. Sign in to LON-CL1 as Adatum\Adam with the password Pa$$wOrd.
Note: This
2. In the Event Viewer window, expand Windows Logs, and then click Security. 3. Review the event logs for the following message: "Event ID 4624 An account was successfully
logged on. New Logon: Security ID: ADATUM\Adam."
Results: Aftercompleting this exercise, you should have enabled domain logon auchting.
n
-
Lesson 3
Restricting Software
Users need to have access to the apps that help them do their jobs. However, unnecessary or unwanted apps often get installed on client computers, whether unintentionally or for malicious or non-business purposes. Unsupported or unused software is not maintained or secured by the administrators, and could be used as an entry point for attackers to gain unauthorized access or spread computer viruses. Consequently, it is of the utmost importance for you to ensure that only necessary software is installed on all the computers in your organization. It is also vital that you prevent software from running that is not allowed or is no longer used or supported.
Lesson Objectives
After completing this lesson, you Will be able to: . Explain how to use software restriction policies (SRPs) to restrict unauthorized software from running on servers and clients. Describe the purpose of AppLocker. Describe AppLocker rules and how to use them to restrict unauthorized software from running on servers and clients. Describe how to create AppLocker rules.
Rules
Rules govern how SRP responds to an app that is being run or installed. Rules are the key constructs within an SRP, and a group of rules together determines how an SRP responds to apps that are being run. Rules can be based on one of the following criteria that apply to the primary executable file for the app in question: Hash. A cryptographic fingerprint of the file. Certificate. A software publisher certificate that is used to digitally sign a file. Path. The local or UNC path to where the file is stored. Zone. The Internet zone.
Security Levels
Each applied SRP is assigned a security level that governs the way that the operating system reacts when the app that is specified in the rule is run. The three available security levels are as follows: Disallowed. The software identified in the rule will not run, regardless of the access rights of the user. Basic User. Allows the software identified in the rule to run as a standard, non-administrative user. Unrestricted. Allows the software identified in the rule to run unrestricted by SRP.
Using these three settings, there are two primary ways to use SRPs: If an administrator has a comprehensive list of all the software that is allowed to run on clients, the Default Security Level can be set to Disallowed. All apps that are allowed to run can be identified in SRP rules that apply either the Basic User or Unrestricted security level to each individual app, depending on the security requirements. If an administrator does not have a comprehensive list of the software that is allowed to run on clients, the Default Security Level can be set to Unrestricted or Basic User, depending on security requirements. All apps that are not allowed to run can then be identified in SRP rules, which would use a security level setting of Disallowed.
You can configure settings for SRPs by accessing the following location from the GPMC: Computer Configu ration \ Policies\WindowsSettings\Security Settings\Software Restriction Policies
What Is AppLocker?
AppLocker, which was introduced in the Windows 7 operating system and Windows Server 2008 R2, is a security setting feature that controls which apps users are allowed to run. AppLocker provides administrators a variety of methods for determining quickly and concisely the identity of apps that they may want to restrict, or to which they may want to permit access. You apply AppLocker through Group Policy to computer objects within an OU. You can also apply Individual AppLocker rules to individual AD DS users or groups. AppLocker also contains options for monitoring or auditing the application of rules. AppLocker can help organizations prevent unlicensed or malicious software from running, and can selectively restrict ActiveX controls from being installed. It can also reduce the total cost of ownership by ensuring that workstations are standardized across the enterprise, and that users are running only the software and apps that are approved by the enterprise. Using AppLocker technology, companies can reduce administrative overhead and help administrators control how users can access and use files, such as .exe files, scripts, Windows Installer files (.msi and .msp files), DLLs, and packaged apps (Windows Store apps).
AppLocker applies Application Control Policies in Windows Server 2012 and Windows 8 AppLocker contains capabilities and extensions that: Reduce administrativa overhead Helps administrators control how usen can access and use files: ,exe files Windows Installer files (.msi and .msp files) scripts Packaged apps (Windows Store apps) . Das Benefits of AppLocker: Controls how users can access and ron all types of apps Afiows the definition of rules basad on a ;vide variety of variables Provides for importing and exporting entire AppLocker policies
You can use AppLocker to restrict software that: Is not allowed to be used in the company. For example, software that can disrupt employees' business productivity, such as social networking software, or software that streams video fles or pictures that can use large amounts of network bandwidth and disk space. Is no longer used or it has been replaced with a newer version. For example, software that is no longer maintained, or for which licenses have expired. Is no longer supported in the company. Software that is not updated with security updates might pose a security risk. Should be used only by specific departments.
You can configure settings for AppLocker by accessing the following location from the GPMC: Computer Configuration \Policies \Windows Settings\Security Settings\Application Control Policies
LTJ
Note: AppLocker uses the Application Identity service to verify the attributes of a file. This
service should be configured to start automatically on each computer where AppLocker will be applied. If the Application Identity service is not running, then AppLocker policies will not be enforced.
Additional Reading: For more information about AppLocker, see AppLocker overview at http://go.microsoft.com/fwlink/?LinkID=266745.
AppLocker Rules
AppLocker defines rules based on file attributes that are derived from the digital signature of the file. File attributes in the digital signature include: Publisher name Product name File name File version
AppLock er defiines tules basad on fila attributes such , Publisher neme Product name ~~ File name File version Rule actions Allow or Deny conditions rce or Audit Only policies
Default Configuration
By default, no AppLocker policies are defined, which means that no apps are blocked. You can configure default rules for each rule collection. The default rules ensure that apps in the Program Files and Windows directories are allowed to run, and all apps are allowed to run for the Administrators group. The default rules should be enabled if you are going to implement AppLocker policies, as these apps are necessary for Windows operating systems to run and operate normally.
Demonstration Steps Create a GPO to enforce the default AppLocker Executable rules
1. 2. 3. On LON-DC1, open the Group Policy Management Console. Create a new GPO named WordPad Restriction Policy. Edit the WordPad Restriction Policy's Security Settings by using AppLocker to create a new Executable Rule. Set the permission of the new rule to Deny, the condition to Publisher, and then select wordpad.exe. If prompted, click OK to create default rules. In the Group Policy Management Editor window, go to Computer Configuration \Policies \Windows Settings \Security Settings \Application Control Policies\Applocker. In AppLocker, configure enforcement with Enforce rules. In the Group Policy Management Editor window, go to Computer Configuration \Policies \Windows Settings \Security Settings\System Services. Configure Application Identity Properties with Define this policy setting, and Select service startup mode with Automatic.
4.
5.
6. 7.
8.
Lesson 4
Lesson Objectives
After completing this lesson, you will be able to: Describe the features of Windows Firewall with Advanced Security. Explain why a host-based firewall is important. Describe Firewall Profiles. Describe connection security rules. Explain how to deploy Windows Firewall rules. Secure network traffic by using Windows Firewall.
You can configure settings for Windows Firewall on each computer individually, or by accessing the following location from the GPMC: Computer Configu ration \ Policies\Windows Settings \Security Settings \Windows Firewall with Advanced Security
Note: Windows Server 2012 introduces the additional option for administering Windows Firewall by using the Windows PowerShell command-line interface.
Why is it important to use a host-based firewall such as Windows Firewall with Advanced Security?
FirewallProfiles
Windows Firewall with Advanced Security uses firewall profiles to provide a consistent configuration for networks of a specific type, and allows you to define a network as either a domain network, a public network, or a private network. With Windows Firewall with Advanced Security, you can define a configuration set for each type of network; each configuration set is referred to as a firewall profile. Firewall rules are activated only for specific firewall profiles. Windows Firewall with Advanced security includes the profiles in the following table. Profile Public Description 1 Use when you are connected to an untrusted public network. Other than domain networks, all networks are categorized as Public. By default, the Public profile (which is the most restrictive) is used in Windows Vista, Windows 7, and Windows 8. Private Use when you are connected behind a firewall. A network is categorized as private only if an administrator or a program identifies the network as private. Networks marked as Home or Work in Windows Vista, Windows 7, and Windows 8 are added to the Private profile. Domain Use when your computer is part of a Windows operating system domain. Windows operating systems automatically identify networks on which it can authenticate access to the domain controller. The Domain profile is assigned to these networks, and this setting cannot be changed. No other networks can be placed in this category. Windows Server 2012 allows multiple firewall profiles to be active on a server simultaneously. This means that a multi-homed server that is connected to both the interna! network and the perimeter network can apply the domain firewall profile to the interna! network, and the public or private firewall profile to the perimeter network.
Firewall profiles are a set configuration settings that apply to a particular twork type The firewall profiles are: Domain Public te ows Server 2012 includes multiple active firewall profiles
ility to have
The configurable connection security rules are: Isolation. An isolation rule isolates computers by restricting connections that are based on credentials such as domain membership or health status. Isolation rules allow you to implement an isolation strategy for servers or domains. Authentication Exemption. You can use an authentication exemption to designate connections that do not require authentication. You can designate computers by a specific IP address, an IP address range, a subnet, or a predefined group such as a gateway. Server-to-Server. A server-to-server rule protects connections between specific computers. This type of rule usually protects connections between servers. When creating the rule, specify the network endpoints between which communications are protected. Then designate requirements and the authentication that you want to use. Tunnel. With a tunnel rule, you can protect connections between gateway computers. Typically, you use a tunnel rule when connecting across the Internet between two security gateways. Custom. Use a custom rule to authenticate connections between two endpoints when you cannot set up authentication rules that you need by using the other rules available in the new Connection Security Rule Wizard.
Using Group Policy. The preferred way to distribute firewall rules is by using Group Policy. After creating and testing a GPO with the required firewall rules, you can deploy the firewall rules quickly and accurately to a large number of computers.
Exporting and importing firewall rules. Windows Firewall with Advanced Security also gives you the option to import and export firewall rules. You can export firewall rules to create a backup before you manually configure firewall rules during troubleshooting.
15
Note: When you import firewall rules, they are treated as a complete set, and replace all currently-configured firewall rules.
Validate ICMP v4
On LON-CL2, ping 10.10.0.11. Notice that the ping goes through successfully.
Objectives
After completing this lab, you will be able to: Configure AppLocker Policies. Configure Windows Firewall.
Lab Setup
Estimated time: 60 minutes
Virtual machines
Adatum\Administrator Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must complete the following steps: 1. 2. On the host computer, click Start, point to Administrative Tools, and then click Hyper-V Manager. In Hyper-V Manager, click 20410C-LON- DC1, and in the Actions pane, click Connect. Wait until the virtual machine starts. 3. If needed, sign in using the following credentials: o o User name:Adatum\Administrator Password: Pa$$wOrd
The main tasks for this exercise are as follows: 1. 2. 3. 4. 5. 6. 7. 8. 9. Create an OU for client computers. Move LON-CL1 to the Client Computers OU. Create a Software Control GPO and link it to the Client Computers OU. Run GPUpdate. Run appl.bat in the C:\CustomApp folder. View AppLocker events in an event log. Create a rule that allows software to run from a specific location. Modify the Software Control GPO to enforce rules. Verify that an application can still be run.
K Task2:MoveLON-CL1totheClientComputersOU
On LON-DC1, in Active Directory Users and Computers, move LON-CL1 to Client Computers OU.
K Task 3: Create a Software Control GPO and link itto the Client Computers OU
1. 2. On LON-DC1, open the Group Policy Management Console. In the Group Policy Management Console, in the Group Policy Objects container, create a new GPO with the name Software Control GPO. For the Software Control GPO, open the Group Policy Management Editor window. In the Group Policy Management Editor window, go to Computer Configuration/Policies /Windows Settings/Security Settings/Application Control Policies/AppLocker. Create default rules for the following: o o o o Executable Rules Windows Installer Rules Script Rules Packaged app Rules
3. 4.
5.
6. Configure rule enforcement with the Audit only option for the following: o o o o 7. 8. 9. Executable Rules Windows Installer Rules Script Rules Packaged app Rules
In the Group Policy Management Editor window, go to Computer Configuration \Windows Settings\Security Settings. Click System Services, and then double-click Application Identity. In the Application Identity Properties dialog box, click Define this policy setting and aboye Select service startup mode, click Automatic, and then click OK.
10. Close the Group Policy Management Editor window. 11. In the Group Policy Management Console, link the Software Control GPO to Client Computers OU.
Note: If no events are displayed, ensure that the Application Identity service has started, and try again.
K Task 7: Create a rule that allows software to run from a specific location
1. 2. On LON-DC1, edit the Software Control GPO. In the Group Policy Management Editor window, go to Computer Configuration/Policies /Windows Settings/Security Settings/Application Control Policies/AppLocker. 3. Create a new script rule with the following configuration: o o o o Permissions:Allow Conditions: Path Path: %OSDRIVE%\CustomApp\appl.bat
K Task 8: Modify the Software Control GPO to enforce rules 1. Use the Enforce rules option to configure rule enforcement for the following: o o o o Executable Rules Windows Installer Rules Script Rules Packaged app Rules
2. Close the Group Policy Management Editor window. K 1. 8. Task 9: Verify that an application can still be run Switch to LON-CL1. Open the Command Prompt window, and type the following command:
gpupdate /force
2. 3. 4.
Close the Command Prompt window and restad LON-CL1. Sign in to LON-CL1 as Adatum \Tony with the password Pa$$wOrd. Open the Command Prompt window and verify that you can run the appl.bat app, which is located in the C:\CustomApp folder. Task 10: Verify that an app cannot be run On LON-CL1, from the CustomApp folder, copy appl.bat to the Documents folder. Verify that app cannot be run from the Documents folder, and that the following message appears: "This program is blocked by Group Policy. For more information, contact your system ad ministrator."
K 1. 2.
ttsult1:-Mter.orrtpletiugthis exerciSe,,yott'shoui0 have IgOfe 0.01:ttpkei poliCisfor users:whs computer accounts are located >in the Client C99:109,1e .,!:sOU The p(-pes you confgured sho, l allow these.users to ron apps that are oeato tn t rarn Files, a' ors
pl batir,:tb.d:\CIOtOrrtjSO:fO
u Task 5: Use security filtering to limit the Application Server GPO to members of Application Server group
1. 2. 3. On LON-DC1, open the Group Policy Management Console. Expand the Member Servers OU, and then click Application Servers GPO. In the right-hand pane, under Security Filtering, remove Authenticated Users, and configure Application Servers GPO to apply only to the Application Servers security group.
4.
Best Practices
The following are best practices: Always make a detailed security risk assessment before planning which security features your organization should deploy. Create a separate GPO for security settings that apply to different type of users in your organization, because each department might have different security needs. Ensure that the security settings that you configure are reasonably easy to use so that employees accept them. Frequently, very strong security policies are too complex or difficult for employees to adopt. Always test security configurations that you plan to implement with a GPO in an isolated, non-production environment. Only deploy policies in your production environment after you complete this testing successfully.
After configuring auditing, there are too many events logged in the Security Event Log in Event Viewer.
Some users complain that their business apps can no longer access resources on the server.
Tools
Tool Group Policy Management Console AppLocker Use A graphical tool that you use to create, edit, and apply GPOs VVhere to find it Server Manager/Tools
Applies security settings that control which apps are allowed to be run by users A host-based firewall that is included as a feature in Windows Server 2008 and later
Server Manager/Tools if configured individually, or Group Policy Management Editor snap-in for deploying with Group Policy Download from the Microsoft website at http://go.microsoft.com "link/?LinIdD=266746.
Deploying security policies based on Microsoft Security Guide recommendations and industry best practices
8-1
Module 8
Implementing Server Virtualization with Hyper-V
Contents:
Module Overview Lesson 1: Overview of Virtualization Technologies Lesson 2: Implementing Hyper-V Lesson 3: Managing Virtual Machine Storage Lesson 4: Managing Virtual Networks Lab:Implementing Server Virtualization with Hyper-V Module Review and Takeaways 8-1 8-2 8-8 8-17 8-26 8-32 8-38
Module Overview
Server virtualization has only been a part of the Windows Server operating system since the release of Windows Server 2008 and the introduction of the Hyper-V role. By using Server virtualization, your organization can save money through server consolidation. However, to use Server Virtualization more efficiently, server administrators need to be able to decide which server workloads will run effectively in virtual machines, and which server workloads must remain deployed in a more traditional server environment. This module introduces you to the Hyper-V role in Windows Server 2012 and Windows Server 2012 R2, the components of the role, how best to deploy the role, and the new features of the Hyper-V role that are introduced with Windows Server 2012 and Windows Server 2012 R2.
Objectives
After completing this module, you will be able to: Describe virtualization technologies. Implement Hyper-V. Manage virtual machine storage. Manage virtual networks.
Lesson 1
OverviewofVirtualizationTechnologies
You can deploy many different types of virtualization technologies on networks where Windows operating systems are deployed. The types of virtualization technologies that you select depend on what your organization needs to accomplish. Although this module is focused primarily on server virtualization, in this lesson you will learn about other types of virtualization technologies, and the situations in which it is appropriate to deploy them.
Lesson Objectives
After completing this lesson, you will be able to: Describe server virtualization using Hyper-V. Describe Windows Azu re-. Explain when you would use desktop virtualization. Determine the components required to implement presentation virtualization. Explain the advantages of using Microsoft application virtualization rather than traditional application deployment.
ServerVirtualization
With server virtualization, you can create separate virtual machines and run them concurrently on a single server that is running Hyper-V. These virtual machines are known as guests. The computer that is running Hyper-V is known as the virtualization server or the management operating system. Virtual machine guests function as normal computers. When users are signed into a guest virtual machine remotely using Remote Desktop Connection (RDC) ora Windows PowerShell remote session, you would have to examine closely the properties of the computer on which the user is working to determine whether it is a virtual machine ora traditionally deployed physical machine. Virtual machines that are hosted on the same virtualization server are independent of one another. You can run multiple virtual machines that are using different operating systems on a virtualization server simultaneously, provided the virtualization server has enough resources. Benefits of server virtualization with Hyper-V: Invisible to users Guest machines can use different operating systems More efficient use of hardware Service and application isolation Workload consolidation ~~ Smplifies server deployment by us g: Virtual machine templates Virtual machine self-service portals
This is a simplified example. In real-world environments, you must make adequate preparations before co-locating virtual machines. You have to ensure that the hardware resource needs of all the virtual machines that are hosted on the virtualization server do not exceed the server's hardware resources.
Consolidating Servers
With server virtualization, you can consolidate servers that would otherwise need to run on separate hardware onto a single virtualization server. Because each virtual machine on a virtualization server is isolated from the other virtual machines on the same server, it is possible to deploy services and applications that are incompatible with one another on the same physical computer, provided that you host them within virtual machines. Examples of such services and applications include Microsoft Exchange Server 2013, SQL Server 2012, and Active Directory Domain Services (AD DS). This means that an organization only needs to deploy one physical server in place of the three servers that they would have needed in the past.
Best Practice: We recommend that you do not deploy a Microsoft Exchange mailbox server on the same computer that contains a domain controller role. We also recommend that you do not deploy a SQL Server 2012 database engine instance on the same computer that contains the domain controller role. Instead, deploy each of these workloads on separate virtual machines and then run those virtual machines as guests on the same virtualization server; this is a supported configuration.
Desktop Virtualization
Client Hyper-V
Desktop virtualization includes the following technologies: Client (Local) Hyper-V
You can install the Hyper-V role on computers that are running the Windows 8 Pro, Windows 8 VDI Enterprise Windows 8.1 Pro and Windows 8.1 RernoteFX allow virtual machines to display rich Enterprise operating systems. This allows you to graphics and video capabilities run virtual machine guests on client computers. RemoteFX requires: Client Hyper-V, the Hyper-V feature in Windows 8 GPU that supports DirectX .0c or tater CPU that supports SIAT and Windows 8.1 operating systems, has slightly different processor requirements than Hyper-V on Windows Server 2012 or Windows Server 2012 R2. Specifically, with the Windows 8 and Windows 8.1 client operating systems, the computer must have an x64 platform that supports Second-Level Address Translation (SLAT), and have a minimum of 4 gigabytes (GB) of randorh access memory (RAM). This differs from Hyper-V on Windows Server 2012 and Windows Server 2012 R2 which does not require SLAT.
You can also use VDI to implement a Bring Your Own Device (BYOD) policy. In this scenario, workers bring their own computer to the office and use RDC software to connect to the virtual machine to which they are assigned.
RemoteFX
RemoteFX is a technology that benefits VDI deployments by providing a set of enhancements to remote desktop connections. With RemoteFX, virtual machines can display rich graphics and video capabilities including media streaming. It also provides support for multi-touch. To use RemoteFX, the Hyper-V host must have at least one GPU that supports DirectX 9.0c or later, and a CPU that supports second-level address translation (SLAT). If multiple GPU are installed on the Hyper-V host, all GPUs must be identical.
Presentation Virtualization
Presentation virtualization differs from desktop virtualization in the following ways: In desktop virtualization, each user is assigned their own virtual machine that is running a client operating system. In presentation virtualization, users sign in and run separate sessions on a server or servers. For example, users Adam and Gavin might be signed in simultaneously to the same remote desktop server, yet be running different sessions using RDC.
Diferentes between desktop virtualizationand presentation virtuatizaton Desktop virtualization: Presentation virtuatzation:
Usen are assigned their osen virtual mochines that are running ctient operating system - The desktop and apps ton enhilo anual mochines Usen sign in and nos separase sessions on the server The desktop and apps ara on the haat server
With desktop virtualization, the applications run within virtual machines. With presentation virtualization, the desktop and the applications run on the virtualization server.
On networks that use Windows Server 2012, presentation virtualization is provided by the Remote Desktop Services server role. Clients can access presentation virtualization in the following ways: Full Desktop. Clients can use a remote desktop client such as RDC to access a full desktop session and run applications on the Windows Server 2012 virtualization server. RemoteApp programs. Rather than use a full desktop client such as RDC, the Windows Server feature RemoteApp makes it possible for applications that run on the Windows Server 2012 server to display on the client computer. Remote Desktop Web Access. Using Remote Desktop Web Access (RD Web Access), clients can access a website on a specially configured server, and then launch RemoteApp programs and Remote Desktop sessions from their browser.
UE-V
Application and operating system settings follow users across multiple computers
Lesson 2
Implementing Hyper-V
Understanding how Hyper-V works and how virtual machines function is critical to deploying server virtualization effectively in a Windows Server 2012 network environment. This lesson discusses Hyper-V, and the hardware requirements for deploying Hyper-V on a computer running Windows Server 2012. This lesson also discusses the components of a virtual machine (with an emphasis on Dynamic Memory), and the benefits of virtual machine integration services. Finally, it discusses how to measure virtual machine resource use with Windows PowerShell cmdlets.
Lesson Objectives
After completing this lesson, you will be a ble to: Install the Hyper-V role onto a server. Describe the appropriate hardware for Hyper-V deployment. Describe virtual machine hardware components. Configure Dynamic Memory. Configure virtual machine integration services. Configure virtual machine start and stop actions. Perform Hyper-V resource metering tasks. Describe the new features of Hyper-V in Windows Server 2012 R2.
What is Hyper-V?
Hyper-V is the hardware virtualization role that is available in Windows Server 2012. Hardware virtualization provides a hypervisor layer that has direct access to the host server's hardware. The host operating system and all virtual machines running on the host access the hardware through the hypervisor layer. This is in contrast to software virtualization products such as Microsoft Virtual Server 2005 R2, that use the virtualization server's operating system to provide indirect access to the server's hardware. You can deploy Hyper-V to a computer that is running Windows Server 2012 by using the Add Roles and Features Wizard. You can configure Windows Server 2012 as a virtualization server by using the Hyper-V role. Windows Server 2012 can then host virtual machine guests that are running supported operating systems. You can manage virtual machine administration locally through Windows PowerShell, or you can manage it remotely through the Hyper-V Managerconsole. You can install the Hyper-V role on both the Server Core installation of Windows Server 2012, and Windows Server 2012 in the non-server core configuration. There is also a Microsoft Hyper-V Server 2012 edition, which includes only the components necessary to host virtual machines. Hyper-V:
Is the hardware virtualization role in Windows Server 2012 UN/es virtual machne guests direct access to the host's hardware Compatible Windows Server operating systems: Windows Server 2012 Microsoft Hyper-V Server 2012
Note: In some documentation, the virtualization server (for example, the Windows Server 2012 computer that is running Hyper-V) is called the parent partition, and a virtual machine that is running on the server is called the child partition.
Virtual machines have the following simulated hardware by default: BIOS. Simulates the computer's BIOS. On a standalone computer you can configure various BIOSrelated parameters, and similarly, on a virtual machine you can configure some of the same para mete rs. These include: o o The boot order for the virtual machine's virtual hardware. From which device the virtual machine boots (for example, from a DVD drive, Integrated Drive Electronics (IDE), legacy network adapter, or floppy disk). o Whether Num Lock is enabled at boot.
~~ Processor. You can allocate up to 64 virtual processors to a single virtual machine. IDE controller O. A virtual machine can support only two IDE controllers and, by default, two are allocated to each virtual machine. Each IDE controller can support two devices. You can connect virtual hard drives or virtual DVD drives to an IDE controller. You can use IDE controllers to connect virtual hard disks and DVD drives to virtual machines that use any operating system that does not support integration services. IDE controller 1. Allows additional virtual hard drives and DVD drives to be deployed to the virtual machine. SCSI controller. You can use a small computer system interface (SCSI) controller only on virtual machines that have operating systems that support integration services. Synthetic network adapter. Synthetic network adapters represent computer network adapters. You can only use synthetic network adapters with supported virtual machine guest operating systems. COM 1. Allows you to configure a connection through a named pipe. COM 2. Allows you to configure an additional connection through a named pipe. Disk drive. Allows you to map a virtual floppy disk image to a virtual disk drive.
You can add the following hardware to a virtual machine by editing the virtual machine's properties and then clicking Add Hardware: SCSI controller. You can add up to four virtual SCSI devices. Each controller supports up to 64 disks. Network adapter. A single virtual machine can have a maximum of eight synthetic network adapters.
~~ Legacy network adapter. You can use legacy network adapters with any operating systems that do not support integration services. You can also use legacy network adapters to deploy operating system imagen throughout the network. A single virtual machine can have up to four legacy network adapters. Fibre Channel adapter. If you add a Fibre Channel adapter to a virtual machine, the virtual machine can then connect directly to a Fibre Channel SAN. You can only add a Fibre Channel adapter to a virtual machine if the virtualization server has a Fibre Channel host bus adapter (HBA) that also has a Windows Server 2012 driver that supports virtual Fibre Channel. RemoteFX 3D video adapter. If you add a RemoteFX 3D video adapter to a virtual machine, the virtual machine can then display high performance graphics by leveraging Microsoft DirectX and graphics processing power on the host Windows Server 2012 server.
Additional Reading: For more information about virtual Fibre channel adapters, see HyperV Virtual Fibre Channel Overview at http://go.microsoft.com/fwlink/?LinkId=269712.
Thus, by using Dynamic Memory you no longer have to guess how much memory a virtual machine requires; instead, you can configure Hyper-V so that the virtual machine is allocated as much memory as it needs. With Windows Server 2012, you can modify some of the Dynamic Memory minimum and maximum memory values while the virtual machine is running. This was not possible with Windows Server 2008 R2 SP1. You can perform this task from a Virtual Machine's Settings dialog box.
Note: Virtual machines must support Hyper-V integration services to use Dynamic Memory.
Smart Paging
Virtual machines may need more memory during startup than they need during normal operation. Smart Paging, which is a new feature in Windows Server 2012, assigns additional temporary memory to a virtual machine when you restart the virtual machine. This means that you can allocate memory based on what the virtual machine needs when it is operating normally, rather than the amount that it needs during startup. Smart Paging uses disk paging to assign additional temporary memory to a virtual machine while it is restarting. However, using Smart Paging may result in lower performance because it uses disk resources that would otherwise be used by the host server and other virtual machines.
Note: You can configure virtual machine memory using the Set -VMMemory Windows PowerShell cmdlet.
Additional Reading: For more information about Hyper-V Dynamic Memory, see Hyper-V Dynamic Memory Overview at http://go.microsoft.com/fwlink/?LinkId=269713.
ConfiguringVirtual MachineIntegrationServices
You must install Virtual Machine Integration Services if you want to use features such as operating system shutdown, time synchronization, and if you want to install virtual hardware components, such as SCSI adapters and synthetic network adapters, onto the virtual machines. Virtual machine guest operating systems that are supported by Hyper-V and that can use Integration Services include: r1,7 113 Windows Server 2012 Windows Server 2008 R2 with SP1 Windows Server 2008 with Service Pack 2 (SP2) Windows Server 2003 R2 with SP2 Windows Home Server 2011 Windows MultiPoint Server 2012 Windows Small Business Server 2011 Windows Server 2003 with SP2 CentOS 6.0-6.2 CentOS 5.5-5.7 Red Hat Enterprise Linux 6.0-6.2 Red Hat Enterprise Linux 5.5-5.7 SUSE Linux Enterprise Server 11 with SPlor SP2 SUSE Linux Enterprise Server 10 with Service Pack 4 (SP4) Windows 7 with SP1 Windows Vista with SP2 Windows XP with Service Pack 3 (SP3) Possible integration services:
Operating system shutdown Time synchronization Data exchange
Note: Support for the Windows XP operating system expires in April 2014. Support for Windows Server 2003 and Windows Server 2003 R2 expires in July 2015.
You can install the Hyper-V integration services components on an operating system by accessing the Virtual Machine Connection window, and then in the Action menu, clicking the Insert Integration Services Setup Disk item. You can then install the relevant operating system drivers either manually or automatically. You can also enable the following virtual machine integration components: Operating system shutdown. Allows the server running Hyper-V to initiate a graceful shutdown of the guest virtual machine. Time synchronization. Allows the virtual machine to use the virtualization server's processor for the purpose of time synchronization. Data exchange. Allows the server running Hyper-V to write data to the registry of the virtual machine.
Heartbeat. Allows Hyper-V to determine if the virtual machine has become unresponsive. Backup (volume checkpoint). Allows the Volume Shadow Copy Service (VSS) provider to create checkpoints of the virtual machine for the purposes of backup operation, without interrupting the virtual machine's normal operations.
ConfiguringVirtualMachineStartandStopActions
You can use virtual machine start and stop actions to ensure that critica] virtual machines always start automatically whenever a server running Hyper-V is restarted, and that they are shut down gracefully if the server receives a shutdown command. When you configure the virtual machine start and stop actions, you select the steps that the server running Hyper-V will perform on specific virtual machines when the physical server is started or shut down. You configure startup and shutdown settings for each virtual machine by editing the properties of the virtual machine. Possible automatic start actions:
Nothing Automatically start if it was running when the service stopped Always start this virtual machine automatically Possible automatic stop actions: Save the virtual machine state Turn off the virtual machine Shut down the guest operating system
= 9
Note: You can also configure virtual machine automatic start and stop actions by using the Windows PowerShell cmdlet Set-VM with the AutomaticStartAction and AutomaticStopAction parameters.
Maximum disk space allocation. Incoming network traffic for a network adapter. Outgoing network traffic for a network adapter.
By measuring how much of these resources each virtual machine uses, an organization can bill departments or customers based on how much resources their virtual machines use, rather than charging a fat fee per virtual machine. An organization with only internal customers can also use these measurements to see patterns of use and plan future expansions. You perform resource metering tasks from a Windows PowerShell command-line interface using the following cmdlets: Enable-VMResourceMetering. Starts collecting data on a per virtual machine basis. Disable -VMResourceMetering. Disables resource metering on a per virtual machine basis. Reset-VMResourceMetering. Resets virtual machine resource metering counters. Measure -VM. Displays resource metering statistics for a specific virtual machine.
Note: There is no GUI tool that you can use to perform resource metering.
Additional Reading: For more information about resource metering for Hyper-V, see Hyper-V Resource Metering Overview at http://go.nnicrosoft.conn/fwlink/?LinkId=269714.
1 1 1 1 1 1 1 1 1
New or Improved
. ,
Feature
Shared virtual hard disk Automatic virtual machine activation Enhanced session mode Storage guality of service Virtual machine generation Improved in Resize virtual hard disk Windows Server 2012 R2 live migration Failover Clustering Mtegration services Export Replica linux support Management
You can use this feature to cluster virtual machines by using shared virtual hard disk (VHDX format) files. You can configure this feature to automatically activate virtual machines on computers running the Datacenter edition of Windows Server 2012 R2. You can use this feature to provide support for redirection of an increased number of local resources including audio, printers, clipboard, display configu ration, smart cards, USB devices and supported Plug and Play devices You can use this feature to specify maximum and minimum I/O loads in terms of I/O operations per second on a per virtual hard disk basis. You can use this feature to provide support for Generation 1 and Generation 2 virtual machines.
Improved features in Windows Server 2012 R2 Hyper-V The following table lists improved features in Windows Server 2012 R2 Hyper-V. -
j Improvement This feature allows you to resize virtual hard disks while the virtual machine is running. This feature provides improved performance, including compression of virtual machine RAM and cross-version live migration between Windows Server 2012 and Windows Server 2012 R2 Hyper-V. I This feature provides virtual network adapter protection and virtual machine storage protection. I Thi s feature provides the ability to copy files to a virtual machine without using a network connection or having to shut down the virtual machine. This feature allows you to export a virtual machine with all checkpoints or a single virtual machine checkpoint while the virtual machine is running.
o
1 1
Failover Clustering
Integration Services
Export
Feature Replica
improvement This feature su pports extended replication and configurable replication frequency. This feature provides support for Linux virtual machine backup and for VMs running Linux to support dynamic memory. This feature provides support for managing Hyper-V on Windows Server 2012 R2 from computers running Windowse 8 or Windows Server 2012.
Linux support
Management
Additional Reading: For more information, see "What's New in Hyper-V in Windows Server 2012 R2" at http://go.microsoft.com/fwlink/?LinkID=331078.
Lesson 3
Lesson Objectives
After completing this lesson, you will be able to: Describe the purpose of virtual hard disk. Describe SMB 3.0. Explain how to create a virtual hard disk type. Explain how to manage virtual hard disks. Explain how to deploy differencing virtual hard disks to reduce storage needs. Explain how to use virtual machine checkpoints.
by multiple virtual machines 'Storage QoS allows you to limit virtual hard disk lOPS
Note: Some editions of Windows 7 and Windows Server 2008 R2 also support boot from virtual hard disk.
Virtual hard disks in .vhd format vs. virtual hard disks in .vhdx format
Virtual hard disks traditionally use the .vhd extension. Windows Server 2012 introduces a new type of virtual hard disk which uses the .vhdx extension. Virtual hard disks with the .vhdx format have the following benefits over virtual hard disks that were used in Hyper-V on Windows Server 2008 and Windows Server 2008 R2: Virtual hard disks with the .vhdx format can be as large as 64 TB, whereas virtual hard disks with the .vhd format are limited to 2 TB. Virtual hard disks with the .vhdx format are less likely to be corrupted if the virtualization server suffers an unexpected power outage. The .vhdx format supports better alignment when deployed to a large sector disk. Virtual hard disks with the .vhdx format can hold larger dynamic and differencing virtual hard disks, which means that the dynamic and differencing virtual hard disks perform better. You can convert a virtual hard disk with the .vhd format to the .vhdx format by using the Edit Virtual Hard Disk Wizard; you may want to do this if you have upgraded a Windows Server 2008 or Windows Server 2008 R2 virtualization server to Windows Server 2012 or Windows Server 2012 R2. You can also convert a virtual hard disk with the .vhdx format to the .vhd format.
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Additional Reading: For more information about virtual hard disk formats, see Hyper-V Virtual Hard Disk Format Overview at http://go.microsoft.com/fwlink/?LinkId=269715._
IDE vs. SCSI adapters Virtual hard disks can be connected to virtual machines using two different virtual storage controller types: IDE or SCSI. When connected to an IDE controller, the virtual disk is accessed as an ATA device. When connected to a SCSI controller, the virtual disk is accessed as a SCSI device. The difference betweea the two is described in the following table. IDE Controllers .. Available only in Generation 1 virtual machines. - A virtual machine can have two IDE controllers. - Each IDE controller supports a maximum of two connected IDE devices (disks or virtual DVD drives). You cannot add or remove devices from an IDE controller when a virtual machine is running. - Generation 1 virtual machines can only be booted locally off a device that is connected to an IDE controller. SCSI Controllers Available in both Generation 1 and Generation 2 virtual machines. A virtual machine can have up to 4 SCSI controllers. Each SCSI controller supports up to 64 attached devices. - Can add or remove SCSI devices while a virtual machine is running. - Generation 2 virtual machines can only boot of a device that is attached to a SCSI controller.
1 1 1 1 1 1 1
Although there are differences in performance when you use an IDE or SCSI controller in a host virtual machine, these differences are not apparent when you use virtualized IDE or SCSI controllers.
QoS Management
Virtual hard disks in Windows Server 2012 R2 support the configuration of quality of service (QoS) parameters. When you configure the QoS parameters, you can specify the maximum number of input/output operations (IOPS) for the virtual disk, which minimizes the chance that a single virtual hard disk will consume the majority of the IOPS capacity of the underlying storage. You also can configure a virtual hard disk to trigger an alert if the number of IOPS falls below a'threshold value. IOPS are measured in 8 KB increments. You cannot configure storage QoS when you are using shared virtual hard disks.
Additional Reading: For more information about virtual hard disk sharing, see http://go.microsoft.com/fwlink/?LinkID=331079.
Additional Reading: For more information about the storage quality of service for HyperV, see http://go.microsoft.com/fwlink/?LinkID=331080.
WhatisSMB3.0
SMB 3.0 is a high-performance network file sharing protocol that became available with the release of Windows Server 2012. Previous versions of the Windows Server operating system used earlier versions of the SMB protocol for network file sharing. When you use Hyper-V in Windows Server 2012, you can store virtual machine configuration files and virtual hard disk files on SMB 3.0 shares. The following table lists several features of SMB 3.0 that make it useful to support virtual machine storage.
SMB 3.0 can be sed as shared storage to host highly available virtual machines The following features of SMB 3.0 are useful when supporting highly-available virtual machines: SMB Transparent Failover SMB Scale Out SMB Multichannel SMB Direct (SMB over RDMA) SMB Encryption VSS for SMB File Shares
1 1
Function Enables clients that are accessing an SMB 3.0 share that is hosted on a failover cluster to continue to do so without interruption when the node hosting the file share fails. Provides simultaneous access to files by using direct I/O through all nodes that make up the file server cluster. Enables the share to use multiple network interfaces to aggregate bandwidth and provide fault tolerante.
SMB Multichannel
SMB Direct
Enables shares to use network adapters that su pport Remote Direct Memory Access (RDMA). Enables files that are transferred across the network to remain in an encrypted state without requiring a certificate services deployment. Enables files that are hosted on SMB shares to be backed up in a consistent manner while they are open.
SMB Encryption
Additional Reading: For more information about updated links on Windows Server 2012 file server and SMB 3.0, see http://go.microsoft.com/fwlink/?LinkID=331081.
CreatingVirtualDiskTypes
When you configure a virtual hard disk, you can choose between several different disk types, including fixed, dynamic, and direct-attached storage.
[1 . Note: Disk fragmentation is less of an issue when virtual hard disks are hosted on RAID
volumes, or on SSDs. Improvements in Hyper-V since it was first introduced with Windows Server 2008 also minimize the performance differences between dynamic and fixed virtual hard disks.
To create a fixed virtual hard disk, perform the following procedure: 1. 2. 3. 4. Open the Hyper-V Manager console. On the Actions pane, click New, and then click Hard Disk. On the Before You Begin page of the New Virtual Hard Disk Wizard, click Next. In the New Virtual Hard Disk Wizard, on the Choose Disk Format page, click either VHD or VHDX, and then click Next. On the Choose Disk Type page, click Fixed size, and then click Next. On the Specify Name and Location page, enter a name for the virtual hard disk, and then specify a folder in which to host the virtual hard disk file.
5. 6.
7.
On the Configure Disk page, choose one of the following options: o o Create a new blank virtual hard disk of the specified size. Copy the contents of a specified physical disk. With this option you can replicate an existing physical disk on the server as a virtual hard disk. The fixed virtual hard disk will be the same size as the physical disk. Replicating an existing physical hard disk does not change the data on that disk. Copy the contents of a specified virtual hard disk. With this option, you can create a new fixed hard disk based on the contents of an existing virtual hard disk.
Note: You can create a new fixed hard disk using the Windows PowerShell cmdlet New-VHD with the - Fixed parameter.
Note: You can create a new dynamic hard disk using the Windows PowerShell cmdlet New-VHD with the -Dynamic parameter.
Direct-attached Storage
Direct-attached storage makes it possible for a virtual machine to access a physical disk drive. You can use direct-attached storage to connect a virtual machine directly to an iSCSI logical unit number (LUN). When you use direct-attached storage, the virtual machine must have exclusive access to the target disk. To ensure this, you must take the disk offline. You can attach direct-attached storage by performing the following procedure: 1. Ensure that the target hard disk is offline. If it is not, then use the Disk Management console on the virtualization server to take it offline. Use the Hyper-V Manager console to edit the existing virtual machine's properties. Click an IDE or SCSI controller, click Add, and then click Hard Drive. In the Hard Drive dialog box, click Physical Hard Disk. From the drop-down menu, select the disk that you want to use as direct-attached storage.
2. 3. 4.
Note: If you connect direct-attached storage to a virtual machine's SCSI controller, then you do not have to shut down the virtual machine. If you want to connect to a virtual machine's IDE controller, then you must first shut down the virtual machine.
Question: Why might you consider using fixed virtual hard disks instead of dynamically expanding virtual hard disks? Question: In what situations might you encounter difficulties if you use dynamically expanding disks?
ManagingVirtualHardDisks
From time to time, you need to perform maintenance operations on virtual hard disks. For example, you might want to convert a virtual hard disk to another format as your needs change, or you might want to compact a virtual hard disk to free up space. You can perform the following maintenance operations on virtual hard disks: Convert the disk from fixed to dynamic Convert the disk from dynamic to fixed Convert a virtual hard disk in .vhd format to .vhdx format The following are maintenance operations you can perform on virtual hard disks: Convert from fixed to dynamic Convert from dynamic to fixed Convert from VHD to VHDX format Convert from VHDX to VHD format Shrink a dynamic virtual hard disk Expand a dynamic or fixed virtual hard disk
~~ Convert a virtual hard disk in .vhdx format to .vhd format Compact a dynamically expanding virtual hard disk Expand a dynamically expanding virtual hard disk Expand a fixed virtual hard disk
Converting a Disk
When you convert a virtual hard disk, the contents of the existing virtual hard disk are copied to a newly-created virtual hard disk. For example, when you convert a fixed virtual hard disk to a dynamically expanding virtual hard disk, a new dynamic disk is created, the contents of the fixed disk are copied to the new dynamic disk, and then the fixed disk is deleted. To convert a virtual hard disk from fixed to dynamic or from dynamic to fixed, perform the following steps: 1. In the Hyper-V Manager console, from the Actions pane, click Edit Disk. 2. 3. In the Edit Virtual Hard Disk Wizard, on the Before You Begin page, click Next. On the Local Virtual Hard Disk page, click Browse, and then select the virtual hard disk that you want to convert. 4. 5. 6. On the Choose Action page, click Convert, and then click Next. On the Convert Virtual Hard Disk page, choose between the VHD and the VHDX formats. On the Convert Virtual Hard Disk page, choose between Fixed Size and Dynamically Expanding. If you also want to convert the hard disk type, choose the appropriate type, and then click Next. 7. On the Configure Disk page, choose the destination location for the disk.
To create a differencing virtual hard disk using the New -VHD Windows PowerShell cmdlet, follow the pattern of the following example. To create a new differencing virtual hard disk named c:\diff-disk.vhd that uses the virtual hard disk c:\parent.vhd, use the following Windows PowerShell command: iff-disk.vhd -ParentPath C:\paren
Using Checkpoints
A checkpoint is a static image of the data on a virtual machine ata given moment. Checkpoints are stored in either .avhd or .avhdx format depending on the virtual hard disk format. You can create a checkpoint of a virtual machine from the Action menu of the Virtual Machine Connection window, or from the Hyper-V Manager console. Each virtual machine can have a maximum of 50 checkpoints. Prior to Windows Server 2012 R2, checkpoints were known as "snapshots." You can create checkpoints at any time, even when a virtual machine is shut down. When you create a checkpoint of a running virtual machine, the checkpoint includes the contents of the virtual machine's memory. When taking checkpoints of multiple virtual machines that are part of the same group, for example a virtual domain controller and virtual member server, you should create these checkpoints simultaneously. This ensures that items such as computer account passwords are the same on all of the checkpoints. Remember that when you revert to a checkpoint, you are reverting to a computer's state at that point in time. If you revert a virtual machine back to a point before it had performed a computer password change with a domain controller, you need to rejoin that computer to the domain or run the netdom resetpwd command.
A checkpoinf is a stattc rmag e of the data on a virtual machine al a given moment Checkponts are not replacements for backups You can perforen a virtual machine export of a checkpoint When you <reate a checkpoint Hyper-V writes differencing virtual hard disk When you apply a checkpoint the virtual medible reverts to the configuration as it existed at the time the checkpoint was created
Exporting Checkpoints
You can perforen a virtual machine export of a checkpoint. When you do this, Hyper-V creates full virtual hard disks that represent the state of the virtual machine at the time the checkpoint was created. If you choose to exportan entire virtual machine, all checkpoints associated with the virtual machine are also exported.
Managing Checkpoints
When you apply a checkpoint, the virtual machine reverts to the configuration as it existed at the time the checkpoint was created. Reverting to a checkpoint does not delete existing checkpoints. If you apply a checkpoint after making a configuration change in a different checkpoint, you are prompted to create another checkpoint. It is only necessary to create a new checkpoint if you want to return to that current configuration. It is possible to create checkpoint trees that have different branches. For example, consider the following scenario: You create a checkpoint of a virtual machine on Monday, Tuesday, and Wednesday. On Thursday you apply the Tuesday checkpoint. Immediately after applying the Tuesday checkpoint, you make changes to the virtual machine's configuration. In this scenario, the original branch is the series of checkpoints created on Monday, Tuesday, and Wednesday. You create a new branch by applying the Tuesday checkpoint and making changes to the virtual machine. You can have multiple branches as long as you do not exceed the 50 checkpoints per virtual machine limit.
Lesson 4
Lesson Objectives
After completing this lesson, you will be able to: Describe virtual switches.
- Describe Virtual Local Area NetWorks. Describe Virtual Switch Extensions. Explain how to manage a virtual machine MAC address pool. Explain how to configure virtual network adapters. Describe advanced features of virtual network adapters. Describe NIC teaming.
Additional Reading: For more information about virtual switches, see Hyper-V Virtual Switch Overview at http://go.microsoft.com/fwlink/?LinkId =269716.
Consult third-party vendor catalogs to determine which virtual switches are available to run on the Hyper-V platform.
Additional Reading: For more information about virtual switch extensions, see "Hyper-V Virtual Switch Overview" at http://go.microsoft.com/fwlink/?LinkID=331084.
external networks, you should ensure that each server uses a different pool of MAC addresses. This ensures that separate servers that connect to the same network do not assign the same MAC addresses to the virtual machines that they host. When virtual machines are allocated IP addresses through a Dynamic Host Configuration Protocol (DHCP) reservation, you should consider using static MAC addresses. A DHCP reservation ensures that a particular IP address is always allocated to a specific MAC address. You can configure the MAC address range by performing the following steps: 1. 2. 3. 4. 5. Open the Hyper-V Manager console. Select the Hyper-V host that you wish to configure. On the Actions pane, click Virtual Switch Manager. Under Global Network Settings, click MAC Address Range. Specify a .minimum and a maximum range for the MAC address.
MAC addresses are in hexadecimal format. When configuring ranges for multiple Hyper-V hosts, you should consider changing the values of the second from the last pair of digits. The following table displays examples of ranges for multiple Hyper-V hosts. Hyper-V host Host 1 MAC address range Minimum:00-15-5D-OF-AB-00 Maximum: 00-15-5D-OF-AB-FF Host 2 Minimum:00-15-5D-OF-AC-00 Maximum: 00-15-5D-OF-AC-FF Minimum:00-15-5D-OF-AD-00 Maximum:00-15-5D-OF-AD-FF
Both synthetic network adapters and legacy network adapters support the following advanced features: MAC address allocation. You can configure a MAC address to be assigned from the MAC address pool, or you can configure the network adapter to use a fixed MAC address. You can also configure MAC address spoofing. This is useful when the virtual machine needs to provide specific network access, such as when the virtual machine is running a mobile device emulator that requires network access. DHCP Guard. This feature drops DHCP messages from virtual machines that are functioning as unauthorized DHCP servers. This may be necessary in scenarios where you are managing a server running Hyper-V that hosts virtual machines for others, but does not have direct control over the configuration of those virtual machines. Router Guard. This feature drops router advertisement and redirection messages from virtual machines that are configured as unauthorized routers. This may be necessary in scenarios where you do not have direct control over the configuration of virtual machines. Port Mirroring. This feature allows you to copy incoming and outgoing packets from a network adapter to another virtual machine that you have configured for monitoring. NIC Teaming. This feature allows you to add the virtual network adapter to an existing team on the server running Hyper-V.
Legacy network adapters emulate common network adapter hardware. You use legacy network adapters in the following situations: You want to support network boot installation scenarios for virtual machines. For example, you want to deploy an operating system image from a Windows Deployment Services (Windows DS) server or through Configuration Manager. You need to support operating systems that do not support integration services and do not have a driver for the synthetic network adapter.
Legacy network adapters do not support the hardware acceleration features that synthetic network adapters support. You cannot configure a virtual machine queue, IPsec task offloading, or single root I/O virtualization (SR-IOV) for legacy network adapters. These advanced features are covered in the next topic.
1 1 1
associations between 1 and 4,096. IP security (IPsec) task offloading requires guest operating system support and network adapter support. SR-IOV. Single-root I/O virtualization (SR-IOV) enables multiple virtual machines to share the same Peripheral Component Interconnect (PCI) Express physical hardware resources. If sufficient resources are not available, then network connectivity falls back and is provided through the virtual switch. SR-IOV requires specific hardware and special drivers to be installed on the guest operating system, and might also need to be enabled in the computer BIOS. Virtual Receive Side Scaling (vRSS). vRSS enables network adapters to balance network processing load across the processor cores assigned to a virtual machine. vRSS enables a virtual machine to process higher amounts of network traffic than it could process if only a single CPU core was responsible for processing traffic. You can implement vRSS by allocating a virtual machine multiple cores through the advanced network. To use vRSS, the host's processor must support Receive Side Scaling (RSS) and the host's network adapters must support Virtual Machine Queue (VMQ).
1 1 1 1 1 1 1
When used with virtual machines, NIC Teaming allows virtual machines to team virtual network adapters that connect to separate virtual switches. To get the benefit of NIC Teaming, the host must have at least two external virtual switches. When you have multiple virtual network adapters attached to the same switch, if the physical network adapter that the virtual switch is connected to fails, those virtual network adapters will lose connectivity. When configuring NIC teaming for virtual machines, network adapters connected to virtual switches can use SR-IOV. Enable virtual machine NIC Teaming for virtual machines on the Advanced Features page of the virtual network adapter in Hyper-V manager. You can also enable NIC Teaming for virtual machines by using the Set -VMNetworkAdapter Windows PowerShell cmdlet. To enable NIC Teaming within the virtual machine operating system, NIC Teaming must be enabled on the virtual network adapter, or, the virtual network adapter must be configured to allow MAC address spoofing. Once you have enabled virtual NIC Teaming on the virtual network adapter (or enabled MAC address spoofing), you can configure NIC teaming within the virtual machine. A new feature of Windows Server 2012 R2 is dynamic NIC Teaming. In Windows Server 2012, new traffic is assigned to a particular NIC and the traffic flow remains with that NIC throughout the session. In dynamic NIC Teaming, traffic flow is balanced across all available NICs in a team.
Objectives
After performing this lab, you will be able to: Install the Hyper-V role onto a server. Configure virtual networking. Create and configure a virtual machine. Use virtual machine checkpoints.
La b Setup
Estimated Time: 75 minutes
Before beginning the lab, you must complete the following steps: 1. 2. Reboot the classroom computer and from the Windows Boot Manager, select 20410C-LON-HOST1. Sign in to LON-HOST1 with the Administrator account and the password Pa$$w0rd.
K Task 1: Install the Hyper-V role onto a server 1. In Server Manager, click Local Server, and then configure the following network settings:
o o o o IP Address: 172.16.0.31 Subnet mask: 255.255.0.0 Default gateway: 172.16.0.1 Preferred DNS server: 172.16.0.10
2. Use the Add Roles and Features Wizard to add the Hyper-V role to LON-HOST1 with the following options: o o o Do not create a virtual switch. Use the Default stores locations. Allow the server to restart automatically if required.
3. After a few minutes, the server restarts automatically. Ensure that you restart the machine from the boot menu as 20410C- LON - HOST1. The computer will restart several times.
K Task 2: Complete the Hyper-V role installation and verify the settings
1. 2. 3. 4. Sign in to LON -HOST1 using the account Administrator with the password Pa$$word. When the installation of the Hyper-V tools completes, click Close. Open the Hyper-V Manager console, and then click LON -HOST1. Edit the Hyper-V settings of LON-HOST1, and configure the following setting. s: o o Keyboard: Use on the virtual machine Virtual Hard Disks: C:\Users\Public\Documents\Hyper-V\Virtual Hard Disks
esults:After completing this exercise, you should have installed the Hyper-V role unto a physical server.
corriplet0g oo thts ;ex a deplOyed Windows Server 2012 ser'ver rurining the El}ijoet>-
- Note: The drive letter may depend upon the number of drives on the physical host machine.
2. In the Hyper-V Manager console, create a virtual hard disk with the following properties: o o o o o 3. Disk Format: VHD Disk Type: Differencing Name: LON-GUEST1.vhd Location:E:\Program Files \Microsoft Learning\Base\LON-GUEST1\ Parent Location: E:\Program Files\Microsoft Learning \Base\ Basel4A-WS12R2.vhd
Open Windows PowerShell and execute the following command: New-VHD "E: \Program Fi 7es\Mi crosoft Learni ng\Base\LON-GUEST2\LON-GIJEST2 vhd" -ParentPath "E:\Program Fi7es\Microsoft Learning\Base\ Base14A-WS12R2.vhd"
4. Inspect the disk at E:\Program Files \Microsoft Learning \Base\LON-GUEST2\LON-GUEST2.vhd. 5. Verify that LON-GUEST2.vhd is configured as a differencing virtual hard disk with E:\Program Files \Microsoft Learning \Base\ Basel4A-WS12R2.vhd as a parent.
2.
3.
Open Windows PowerShell and execute the following command: New-VM -Name LON-GUEST2 -MemoryStartupBytes 1024MB -VHDPath "E:\Program Files\Microsoft Learning\Base\LON-GUEST2\LON-GUEST2.vhd" -SwitchName "Private Network"
4.
Use the Hyper-V Manager console to edit the settings of LON-GUEST2 by configuring the following: o o Automatic Start Action: Nothing Automatic Stop Action: Shut down the guest operating system
Resu lts: After completing this exercise, you should have deployed two separate virtual machines using a sysprepped virtual hard disk file as a parent disk for two differencing virtual hard disks.
Sign in to the virtual machine using the account Administrator and the password Pa$$wOrd. Reset the name of the virtual machine to LON - GUEST1, and then restad the virtual machine.
2. 3.
Results: After completing this exercise, you should have used virtual machine checkpoints to recover from a virtual machine misconfiguration.
Best Practices
When implementing server virtualization with Hyper-V, use the following best practices: Ensure that the processor on the computer that will run Hyper-V supports hardware assisted virtualization. Ensure that a virtualization server is provisioned with adequate RAM. Having multiple virtual machines paging the hard disk drive because they have inadequate memory decreases performance for all virtual machines on the server. Monitor virtual machine performance carefully. A virtual machine that uses a disproportionate amount of server resources can reduce the performance of all other virtual machines that are hosted on the same virtualization server.
Tools
You can use the following tools with Hyper-V to deploy and manage virtual machines. Tool I Sysinternals disk2vhd I tool Use Use to convert physical hard disks to VHD format. 1. 1 VVhere to find it Microsoft TechNet website
Course Evaluation
Your evaluation of this course will help Microsoft understand the quality of your learning experience. Please work with your training provider to access the course evaluation form. Microsoft will keep your answers to this survey private and confidential and will use your responses to improve your future learning experience. Your open and honest feedback is valuable and appreciated.
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1