Server Notes
Server Notes
## Managing Users:
```cmd
```
- `-samid UserName`: Specifies the Security Account Manager (SAM) account name
(username).
- `-upn [email protected]`: Specifies the User Principal Name (UPN) for the user.
```cmd
dsadd computer "CN=ComputerName,OU=Computers,DC=domain,DC=com" -samid
ComputerName
```
- `-samid ComputerName`: Specifies the Security Account Manager (SAM) account name
(computer name).
```cmd
```
```cmd
dsadd ou "OU=OrganizationalUnit,DC=domain,DC=com"
- `dsadd ou`: Specifies that you want to create an organizational unit (OU) object.
These `dsadd` commands allow you to create user, computer, group, and organizational unit
objects in Active Directory using the command line. Make sure to replace placeholders such as
"UserName," "ComputerName," "GroupName," "OrganizationalUnit," "domain," and "com"
with your actual values. Additionally, exercise caution when using commands that modify or
create objects in Active Directory.
```powershell
```powershell
```powershell
These PowerShell commands leverage the Active Directory module to manage users, computers,
groups, and OUs. Adjust the parameters and values according to your specific requirements, and replace
placeholders such as "UserName," "ComputerName," "GroupName," "domain," and "com" with your
actual values. Always exercise caution when performing actions that modify or create objects in Active
Directory.
Active Directory is a directory service developed by Microsoft for Windows domain networks. It
serves as a centralized and standardized system for managing and organizing information about network
resources and users. Active Directory stores data as objects, such as users, computers, and groups, and
it provides a set of services to ensure the security and scalability of network resources. AD plays a crucial
role in facilitating the management of users, permissions, and network resources in a Windows
environment.
1. User Authentication: Active Directory enables users to log in to the network using their
credentials (username and password) and verifies their identity.
3. Group Policy: AD allows administrators to define and enforce security policies and
configurations across all computers in the domain.
4. Single Sign-On (SSO): Once authenticated, users can access various resources without re-
entering their credentials, promoting a seamless and efficient user experience.
7. DNS Integration: Active Directory integrates with Domain Name System (DNS) to provide
name resolution services and locate resources on the network.
8. Replication: AD uses replication to synchronize data across multiple domain controllers within
the network, ensuring consistency and fault tolerance.
An Active Directory Domain Controller (DC) is a server that stores a writable copy of the Active
Directory database and authenticates users within a domain. Each domain in an AD environment has at
least one domain controller, and larger environments may have multiple domain controllers for
redundancy and load balancing.
1. Authentication: Domain controllers verify the credentials of users attempting to log in to the
network. They ensure that only authorized users gain access to resources.
2. Authorization: Domain controllers enforce security policies and permissions defined in Active
Directory, determining what actions users and groups are allowed to perform.
3. Replication: Domain controllers replicate changes to the Active Directory database with other
domain controllers in the same domain, ensuring consistency and fault tolerance.
4. Service Location: Domain controllers help clients locate services and resources on the
network by providing information about the location and availability of these resources.
5. Group Policy Application: Domain controllers apply Group Policy settings to computers and
users within their domain, helping administrators enforce consistent configurations and security
policies.
1. User and Group Management: Active Directory simplifies the management of users and
groups, allowing administrators to organize and control access to network resources efficiently.
2. Security Policy Enforcement: Active Directory facilitates the enforcement of security policies
across the network, ensuring that only authorized users have access to specific resources.
3. Centralized Authentication: Users can log in to any computer within the domain using a single
set of credentials, enhancing convenience and security.
5. Scalability and Redundancy: The use of multiple domain controllers allows for scalability and
provides redundancy to ensure continuous service availability.
6. Group Policy Management: Active Directory enables the creation and application of Group
Policy settings, ensuring consistent configurations and security policies across the domain.
7. Integration with Other Services: Active Directory integrates with other Windows services,
such as DNS, to provide a comprehensive and cohesive environment for network management.
Overall, Active Directory and Domain Controllers play a central role in managing and securing
Windows-based network environments, providing a robust foundation for user authentication, resource
management, and policy enforcement.
Group Policy is a feature in Microsoft Windows that allows administrators to manage and
configure user and computer settings centrally within an Active Directory environment. Group Policy is
primarily used in networked environments, where multiple computers are part of a domain. Here are
key characteristics of Group Policy:
2. Active Directory Integration: Group Policy is tightly integrated with Active Directory. Policies
are created and linked at the domain, site, or organizational unit (OU) level, and they are applied to
users and computers within those containers.
3. Granular Control: Administrators can define a wide range of settings using Group Policy,
including security settings, application settings, desktop configurations, and more. Policies can be
applied based on user accounts, computer accounts, or both.
4. Hierarchy: Group Policies are applied in a hierarchical manner, with policies at higher levels
(domain or OU) taking precedence over conflicting settings at lower levels.
5. Scalability: Group Policy is designed to scale across large network environments, allowing
administrators to efficiently manage a diverse set of configurations for various users and computers.
Local Policy:
Local Policy, often referred to as Local Security Policy, is a feature available on individual
Windows computers and is not dependent on Active Directory. It allows administrators to configure
security settings on a specific computer. Here are key characteristics of Local Policy:
1. Local Configuration: Local Policy is configured on an individual computer and is not centrally
managed. Each computer has its own set of local security settings.
2. Independent of Active Directory: Unlike Group Policy, Local Policy does not rely on Active
Directory. It is applied only to the specific computer on which the settings are configured.
3. Limited to a Single Computer: Settings configured in the Local Policy apply only to the
computer on which they are set. Changes made to the Local Policy on one computer do not affect other
computers in the network.
4. Less Scalable: Local Policy is not designed for large-scale management. It is more suitable for
configuring security settings on a standalone computer or in a workgroup environment.
5. User Rights and Security Options: Local Policy includes settings related to user rights
assignments and security options, allowing administrators to control access and behavior on an
individual machine.
Summary:
In summary, the main difference between Group Policy and Local Policy lies in their scope and
management. Group Policy is designed for centralized management in networked environments,
leveraging Active Directory, and allows administrators to apply settings across multiple computers and
users. On the other hand, Local Policy is specific to an individual computer, is not centrally managed,
and is applied only to that particular machine. Group Policy is well-suited for enterprise environments
with multiple computers, while Local Policy is more appropriate for standalone or workgroup
computers.
- Description: Manages the Domain Name System (DNS) for your network, translating human-friendly
domain names into IP addresses.
3. DHCP Server:
- Description: Manages the distribution of IP addresses and network configuration settings to devices
on a network.
- Description: Provides file server capabilities, including features like Distributed File System (DFS), File
Server Resource Manager (FSRM), and Storage Spaces.
- Description: Installs the Internet Information Services (IIS) web server, allowing you to host and
manage websites and web applications.
6. Hyper-V:
- Description: Enables virtualization on the server, allowing you to create and manage virtual
machines.
- Description: Allows users to access applications and desktops remotely. Includes roles like Remote
Desktop Session Host (RDSH) and Remote Desktop Connection Broker (RDCB).
- Description: Provides network access policies, including roles such as Network Policy Server (NPS),
Routing, and Remote Access.
- Description: Provides public key infrastructure (PKI) services, including certificate issuance,
revocation, and management.
- Description: Allows for the deployment of Windows operating systems over the network.
- Description: Manages the distribution of updates released by Microsoft for Windows operating
systems.
These are just a few examples of the server roles available in Windows Server 2012. Depending on your
organization's needs, you can install and configure additional roles to customize the functionality of your
server. The installation commands provided are PowerShell commands that you can use to install the
respective roles.
1. Firewall Profiles:
- Windows Firewall has three profiles: Domain, Private, and Public. Each profile can have different rules
depending on the type of network the server is connected to.
- Inbound rules control the traffic coming into the server, while outbound rules control the traffic
leaving the server. Rules can be configured based on protocols, ports, and programs.
- You can manage the Windows Firewall through the Server Manager or Control Panel.
- Server Manager: Navigate to "Manage" > "Add Roles and Features" > "Features" > "Windows Firewall
with Advanced Security."
2. PowerShell:
- Windows Firewall can be managed using PowerShell cmdlets. For example, to enable the firewall, you
can use the command `Set-NetFirewallProfile -Enabled True`.
- PowerShell Command:
```powershell
- PowerShell Command:
```powershell
- PowerShell Command:
```powershell
- PowerShell Command:
```powershell
Get-NetFirewallRule
5. Restoring Default Rules:
- PowerShell Command:
```powershell
- In the "Advanced Security" console, you can configure detailed settings, including connection security
rules, authentication methods, and monitoring.
2. Security Logging:
- Windows Firewall can log allowed and blocked traffic, helping in troubleshooting and auditing. Log
entries can be viewed in the Event Viewer.
- Windows Firewall settings can be configured through Group Policy, allowing centralized management
of firewall rules across multiple servers.
- GPOs can be applied to specific profiles (Domain, Private, Public) to enforce consistent firewall
settings.
### Recommendations:
1. Default Settings:
- It's recommended to keep the Windows Firewall enabled and configure rules as needed to allow
necessary traffic.
2. Regular Auditing:
- Regularly review firewall logs and audit settings to ensure that the server is properly protected.
3. Testing Rules:
Here's a basic guide on setting up a roaming profile in Windows Server 2012 R2:
1. Create a Shared Folder: First, create a shared folder on the server where you'll store the roaming
profiles. Set appropriate permissions to allow users to access and modify their profiles.
2. Configure User Profiles: On the server, go to "Server Manager" -> "Tools" -> "Active Directory Users
and Computers." Locate the user account for which you want to set up a roaming profile.
3. Set Profile Path: Right-click the user account, select "Properties," then go to the "Profile" tab. In the
"Profile Path" field, enter the path to the shared folder where you want to store the roaming profile,
typically in the format: `\\ServerName\SharedFolder\%Username%`.
4. Permissions: Ensure the user has appropriate permissions to access the shared folder where the
roaming profile will be stored. They should have full control or modify permissions.
5. Group Policy: You may also configure Group Policy settings to enforce roaming profiles for a group of
users or computers. To do this, use the Group Policy Management Console (`gpmc.msc`) and navigate to
"User Configuration" -> "Policies" -> "Administrative Templates" -> "System" -> "User Profiles." Enable
the policy "Set roaming profile path for all users logging onto this computer" and set the path.
6. Test: Log in with the user account on a client machine connected to the network. Check if the roaming
profile loads correctly and the user settings, documents, and desktop configurations are available.
Remember, roaming profiles can be quite large, so ensure you have enough storage space on the server
and a robust network to handle the data transfer between the server and client machines.
Always backup important data, as issues with roaming profiles or network connectivity could potentially
cause data loss or profile corruption.
Roaming profiles in Windows refer to a feature that allows a user's personalized settings, files, and
preferences to move ('roam') with them when they log in to different computers within a network. This
means that regardless of which computer a user logs into within the network, they will have access to
their familiar desktop background, icons, application settings, documents, and other personalized
configurations. This helps maintain consistency and convenience for users working across various
machines in an organization.
When users log into the network, they can access their home directory, which is specific to their
account. This directory allows users to store and retrieve their files from any computer connected to the
network. It provides a consistent and secure location for users to save their data, ensuring that their
information is accessible and backed up centrally. Admins can set permissions and access controls on
these folders to manage user access and security within the network.
- Purpose: It's a designated storage location for individual users within a network.
- Usage: Users store their files, documents, and data in their home directory.
- Accessibility: It's specific to a user's account and provides a consistent space for personal data across
network-connected devices.
- Customization: Often used for personal storage and organization but doesn’t necessarily capture all
settings or configurations.
- Control: Administrators can manage permissions and access controls for each user's home directory.
2. Roaming Profile:
- Purpose: It's a user profile that captures settings, configurations, and some personalization across
different computers within a network.
- Usage: When users log in, their roaming profile is fetched from a central server, providing a
consistent environment regardless of the computer they use.
- Content: Captures more than just files and documents—it includes desktop settings, application
configurations, and more.
- Syncing: Changes made to the roaming profile are synchronized back to the central server, updating
the user's profile for future logins on other network-connected computers.
- Control: Admins can manage roaming profiles to ensure uniformity and consistency in user
experience across multiple devices.
In summary, while both serve as storage spaces for users in a networked environment, the key
difference lies in their scope and purpose: a home directory is mainly for file storage and personal data,
while a roaming profile captures a broader range of settings and configurations to ensure a consistent
user experience across multiple devices.
1. **Shared Usage**: gMSAs can be used by multiple servers or services simultaneously, allowing for
centralized management of service account credentials.
2. **Automated Password Management**: The passwords for gMSAs are automatically managed and
updated by the domain controllers. This helps ensure better security by regularly changing the
passwords without manual intervention.
3. **Simplified Administration**: Administrators don't need to manually manage passwords for each
service or server using the gMSA, reducing the administrative burden and enhancing security.
4. **Integration with Active Directory**: gMSAs are stored in Active Directory and benefit from its
security features and policies.
5. **Enhanced Security**: They provide a higher level of security by reducing the risk of credential theft
or unauthorized access due to their automated password management and limited scope of usage
Overall, Group Managed Service Accounts in Windows Server 2012 offer a convenient and secure way to
manage service account credentials across multiple servers and services within an Active Directory
domain.
Group Policy settings are configured within Group Policy Objects (GPOs), which can be linked to sites,
domains, or organizational units (OUs) within Active Directory. These policies are then applied to users
and computers in those specific areas, ensuring that the desired settings and restrictions are enforced
consistently across the network.
Group Policy in Windows Server 2012 offers granular control over a wide range of settings, allowing
administrators to streamline management tasks, enforce security measures, and ensure compliance
with organizational standards. It simplifies the process of maintaining and configuring multiple
computers and users within an enterprise environment.
Primary zones are writable and maintain the master database of DNS information for a particular
domain. They are the primary source for DNS records and are used to serve DNS queries for the domain
they represent. Changes and updates to the DNS records within a primary zone can be made directly on
the server hosting that zone.
Multiple DNS servers can host primary zones, allowing for redundancy and fault tolerance. These servers
synchronize the DNS records within the primary zone through zone transfers to ensure consistency and
availability of DNS information across the network.
- **Domain Policy:** This policy, often referred to as Group Policy within Active Directory, contains
settings that apply to user and computer objects within the entire domain. It allows administrators to
define and enforce various configurations, security settings, software installations, and other
preferences that affect all users and computers within the domain. Changes made to the Domain Policy
are applied to all objects in the domain unless overridden by more specific policies.
- **Domain Controller Policy:** This policy specifically targets the domain controllers within the
domain. It contains settings that are specifically related to the behavior and configuration of domain
controllers, such as security settings, authentication protocols, replication settings, and other domain
controller-specific configurations. These policies are applied only to domain controllers and are used to
manage and secure the operations of the domain controller infrastructure.
Both Domain Policy and Domain Controller Policy are crucial for managing and maintaining the settings,
security, and configurations within a Windows Server Active Directory environment, with the Domain
Policy applying to all objects in the domain and the Domain Controller Policy focusing specifically on
domain controller-related configurations.
With folder redirection, folders like Documents, Desktop, Downloads, Pictures, and others can be
redirected from their default location on a user's local computer to a network location, such as a file
server. This means that when users save files or data to these folders, they are actually storing them on
the network, rather than on their individual machines.
2. **Data Security:** Storing data on a server ensures that important information is not lost if a user's
computer fails or is replaced. It also allows for better control over access permissions and security
settings.
3. **User Mobility:** As the data is stored on the network, users can access their files and folders from
any device connected to the network, promoting mobility and flexibility.
4. **Reduced Storage on Local Machines:** Redirecting folders helps in saving local storage space on
individual computers, especially in environments where users generate a lot of data.
Configuring folder redirection involves using Group Policy in Windows Server to define where specific
folders should be redirected. Administrators can choose the target location on the network where the
redirected folders will reside and set various options related to permissions, synchronization, and
caching.
However, it's crucial to plan folder redirection carefully, considering network bandwidth, server storage
capacity, and user behavior to ensure an optimal setup that meets both performance and data security
requirements.
2. **Select "Map network drive":** Click on the "Map network drive" option typically found in the
toolbar or in the context menu.
3. **Choose Drive Letter:** Select an available drive letter from the dropdown list that you want to
assign to the network location.
4. **Enter the Folder Path:** In the "Folder" or "Path" field, enter the path to the shared folder or
resource you want to access. This might look like "\\ServerName\SharedFolder" where "ServerName" is
the name of the server and "SharedFolder" is the shared folder name.
5. **Connect using Different Credentials (if needed):** If the shared resource requires different
credentials (username/password), check the "Connect using different credentials" box and provide the
necessary login details.
6. **Reconnect at Sign-in:** You can also check the box that says "Reconnect at sign-in" if you want the
drive to be automatically connected every time the user logs in.
Once the drive is mapped, it will appear as a new drive in File Explorer with the assigned drive letter.
Users can open, modify, save, and manage files and folders stored in the mapped network drive just like
they would with local files.
Mapping network drives can streamline access to shared resources across a network, making it easier
for users to work with files and folders stored on remote servers without having to constantly navigate
through network paths. It's a convenient way to access and manage shared data across an organization.