Windows Server 2022 Courseware
Windows Server 2022 Courseware
4 Administration
Kevin Brown
MCT (Microsoft Certified Trainer) since 2000
Azure Security Engineer
Azure Solutions Architect
Azure Administrator
Microsoft 365 Enterprise Administrator
MCSE NT 4.0, 2000, 2003, 2008, 2012, 2016
CISSP
What you will learn Bonus
Group
Policy
Course Outline
https://RTSnetworking.com/demo https://RTSnetworking.com/demo
Hyper-V lab VirtualBox lab
Windows Server 2022 ISO download Windows Server 2022 ISO download
Enabling Hyper-V Installing VirtualBox
Installing Windows Server 2022 using Hyper-V Installing Windows Server 2022 using VirtualBox
Hyper-V post installation tasks VirtualBox post installation tasks
https://rtsnetworking.com/demo
Module 1:
4 Introducing
Windows Server 2022
Module overview
In this lesson, you’ll learn about Windows Server 2022 editions and their capabilities
Topics
o Windows Server 2022 editions
o Hardware requirements for Windows Server 2022
o Overview of deployment options
Edition removed: Hyper-V server 2019 is that products last version and will continue to be supported under
its lifecycle policy until January 2029
End-of-Life Support for Windows Server 2022
Windows Server 2012R2 offers Extended Security Updates through October 13, 2026.
Windows mainstream and extended end dates refer to the support life cycle for each new version of Windows.
Mainstream support lasts for five years and includes non-security hotfixes, and new features. Extended
support lasts for another five years and only includes security and reliability patches. After extended
support ends, the version of Windows is no longer supported by Microsoft.
Hardware requirements for Windows Server 2022
Hardware requirements will vary depending on:
o Server roles
Component Requirement
Clean install:
o Boot the physical machine or virtual machine from the Windows Server 2022 media
o Choose the installation language, time and currency formats, and keyboard layout
o Choose the architecture (either Standard or Datacenter) with or without Desktop Experience
o Accept the license
In-place upgrade
o Insert the disk or mount the ISO of Windows Server 2022 media and then run Setup.exe
o Choose the architecture (either Standard or Datacenter) with or without Desktop Experience
o Accept the license
o Choose what to keep: personal files and apps, or nothing
Demo: Windows Server 2022 Installation
Generation =Generation 2
You can use servicing channels to choose whether new features and functionality will be delivered regularly
during a server’s production lifespan, or when to move to a new server version
There are two release channels:
o Long-Term Servicing Channel
• A new major version of Windows Server is released every 2-3 years. Users are entitled to 5
years of mainstream support and 5 years of extended support. This channel is appropriate for
systems that require a longer servicing option and functional stability. The Long-Term
Servicing Channel will continue to receive security and non-security updates, but it will not
receive the new features and functionality.
o Semi-Annual Channel
• The Semi-Annual Channel is perfect for customers who are innovating quickly to take
advantage of new operating system capabilities at a faster pace, focused in on containers and
microservices. Windows Server products in the Semi-Annual Channel will have new releases
available twice a year, in spring and fall. Each release in this channel will be supported for 18
months from the initial release.
Licensing and activation models for Windows Server
Licensing for Windows Server Standard and Datacenter is based on the number of cores, not processors
Each Windows Server has the following minimum license requirement:
o All physical cores must be licensed
o There must be 8 core licenses per processor
o There must be 16 core licenses per server
Client Access Licenses (CALs) are required for each user or device that connects to the server for any
purpose
Licensing and activation models for Windows Server
To ensure that your organization has the proper licenses, you must activate every copy of Windows Server
that you install
Windows Server activation methods:
o Manual activation requires a product key
o Automatic activation options:
• Key Management Services
• Active Directory-based activation
• Multiple Activation Key
• Automatic virtual machine activation
Lesson 2 overview
In this lesson, you’ll learn about the differences between Server Core and Windows Server with Desktop
Experience, and when one is the preferred option
Topics
o Server Core vs. Windows Server with Desktop Experience
Server Core is a minimal installation option for Windows Server that does not include the traditional
graphical user interface (GUI). Instead, it provides a command-line interface and support for remote
management tools. This makes it a more lightweight and secure option for running server workloads, as it
reduces the attack surface and minimizes the resources required for running the operating system.
Desktop Experience is the full installation option for Windows that includes the GUI and all the features and
tools typically found in a desktop operating system. This installation option is designed for users who need a
more familiar interface and access to applications using a GUI
Server Core vs Desktop Experience
The following table lists the major advantages and disadvantages of Server Core
Advantages Disadvantages
Small footprint that uses fewer server resources and Some applications are not supported on a Server
less disk space, as little as 4 GB for a basic Core installation.
installation
Because Server Core installs fewer components, Some roles and role services are not available.
there are fewer software updates. This reduces the
number of monthly restarts required and the time
required for you to service Server Core.
The small attack surface makes Server Core much No local Graphical User Interface (GUI)
less vulnerable to exploits.
Server Core installation and post-installation tasks
o Keyboard
In this lesson, you’ll learn about Workgroups, Domains, and Active Directory components.
Topics:
o Understanding workgroups and domains
o Active Directory terms
o Active Directory Domains and Forests
o Understanding Active Directory objects
o Understanding Domain Controllers
o Global Catalog
Types of Networks
WORKGROUP DOMAIN
A domain:
o A repository for User, Computers and other objects
o A replication boundary
o An administrative boundary
A domain controller is a server that has Active Directory Domain Services (AD
DS) installed
AD DS Domains and Forests
RTS.COM
AD DS Domains and Forests
A forest:
o Is a security boundary
o One or more domains that share a trust relationship
Trust relationships:
o A relationship between domains that allows access to resources in other
domains within the same forest
AD DS Domains and Forests
RTS.COM ATLANTIS.COM
RTS.COM ATLANTIS.COM
User objects
o Authentication of the user at logon
o Access control
Group objects
o Simplify assigning permissions
Computer objects
o Authentication of the computer at startup
Organizational Units and Containers
Domain controllers:
Are servers that host the AD DS database (Ntds.dit) and SYSVOL
Host the Kerberos authentication service and KDC services to perform authentication
Have best practices for:
o Availability:
In a single domain, you should configure all the domain controllers to hold a copy of the global
catalog
When you have multiple sites, you should also make at least one domain controller at each site a
global catalog server
Lesson 2
In this lesson, you’ll learn about configuring Group Policy for client, user, and server administration.
Topics:
What are Group Policy Objects?
Using GPupdate
Using GPresult
What are GPOs?
Group Policy Preferences are a collection of Group Policy client-side extensions that deliver preference
settings to domain-joined computers.
Preference settings differ from policy settings because users have a choice to alter the administrative
configuration. Policy settings administratively enforce setting, which restricts user choice.
Preferences can be targeted to specific groups, operating systems, IP addresses, MAC addresses, and
more.
Group Policy Preferences
1. Local GPOs
2. Site-level GPOs
3. Domain-level GPOs
Block inheritance
Enforced
Security filtering
What is an Active Directory Site?
GPUpdate
What is GPUpdate?
Gpupdate is a command-line utility from Microsoft that comes with all versions of the Windows operating
system. It’s a utility that controls the application of group policy objects (GPOs) on assigned Active Directory
computers.
Gpupdate /Force will process all GPOs regardless if they have changed or not
GPResult
Verify the GPOs that are currently applying to a user and computer account
Examine the settings that apply to the user and computer and determine which GPO applied the setting
Lesson 3 overview
In this lesson, you’ll learn about Windows Server administration best practices and the tools used for
management.
Topics
o Overview of the least-privilege administration concept
Most security breaches or data loss incidents are the result of human error, malicious activity, or a
combination of both. Least privilege is the concept of restricting access rights for users and computing
processes to only those resources absolutely required to perform their job roles.
The principle states that all users should log on with a user account that has the absolute minimum
permissions necessary to complete the current task and nothing more. Doing so provides protection against
malicious code, among other attacks. This principle applies to computers and the users of those computers.
Delegated privileges
Accounts that are members of high-privilege groups such as Enterprise Admins and Domain Admins
need to be guarded, but occasionally non-admins need rights to perform certain functions, such as
resetting passwords or modifying group memberships.
Built-in groups with pre-defined admin rights exist to allow users to perform specific admin tasks. If those
groups do not suit your needs, you can delegate more granular permissions by using the Delegation of
Control Wizard.
o The wizard has pre-defined tasks that can be assigned to users or groups, or custom permissions
can be assigned.
Jump servers
A jump server is a hardened server used to access and manage devices in a different security zone, such
as between an internal network and a perimeter network
Overview of Windows Admin Center
Windows Admin Center consolidates multiple admin tools into a single console that can be easily
deployed and accessed through a web interface
Windows Admin Center is a modular web application comprised of the following four modules:
o Server manager
o Failover clusters
o Hyper-converged clusters
o Windows 10 and Windows 11 clients
Server Manager
Server Manager initially opens to the dashboard, which provides quick access to:
o Add roles and features
To enable IT administrators to remotely manage roles and features in Windows Server from a computer
that is running Windows 11 or Windows 10, use RSAT
RSAT include:
o Active Directory Domain Services tools
Modules:
o Cmdlets specific to a product are packaged together and installed as modules
o Some are installed with the product and some need to be added manually
Windows PowerShell
PowerShell Console
o Run PowerShell commands and execute scripts
PowerShell ISE
o PowerShell Integrated Scripting Environment (ISE) is a graphical user interface–based tool that
allows you to:
o Run commands, create, modify and execute scripts
Get-help
Get-help *event*
Get-help *eventlog*
Get-help get-eventlog
Get-help get-eventlog -detailed
Get-help get-eventlog -examples
Get-help get-eventlog -full
Get-help get-eventlog –online
Update-help
Save-help
Module 3:
Managing Dynamic Host
4 Configuration Protocol
(DHCP)
Lesson 1 overview
Topics:
Overview of the DHCP role
Install and configure the DHCP role
Configure DHCP scopes
DHCP AD DS authorization
DHCP Failover for high availability
Overview of the DHCP role
Split scopes:
Involve two DHCP servers that are configured with non-overlapping scopes
DHCP failover:
Scopes are replicated from one DHCP to another DHCP partner
Strongly preferred to implement high availability for DHCP
Topics:
DNS components
DNS records
DNS zones
Create records in DNS
Configure DNS zones
DNS forwarding
Integrating DNS with Active Directory
DNS components
7. Response COM
3. Recursive Query
RTSnetworking
8. Query .COM
Local DNS Server 9. Response
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
Root
COM
RTSnetworking
www.RTSnetworking.com 185.230.63.186
RTS-Client1
Root
COM
RTSnetworking
www.RTSnetworking.com 185.230.63.186
RTS-Client1
1. Local Client Cache
Root
COM
RTSnetworking
www.RTSnetworking.com 185.230.63.186
RTS-Client1
1. Local Client Cache
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
Root
COM
3. Recursive Query
RTSnetworking
www.RTSnetworking.com 185.230.63.186
RTS-Client1
1. Local Client Cache
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
Root
COM
3. Recursive Query
RTSnetworking
www.RTSnetworking.com 185.230.63.186
RTS-Client1
1. Local Client Cache
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
Root
COM
3. Recursive Query
RTSnetworking
www.RTSnetworking.com 185.230.63.186
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
6. Iterative Query Root
COM
3. Recursive Query
RTSnetworking
www.RTSnetworking.com 185.230.63.186
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
6. Iterative Query Root
7. Response COM
3. Recursive Query
RTSnetworking
www.RTSnetworking.com 185.230.63.186
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
6. Iterative Query Root
7. Response COM
3. Recursive Query
RTSnetworking
www.RTSnetworking.com 8. Query .COM 185.230.63.186
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
6. Iterative Query Root
7. Response COM
3. Recursive Query
RTSnetworking
www.RTSnetworking.com 8. Query .COM 185.230.63.186
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
6. Iterative Query Root
7. Response COM
3. Recursive Query
RTSnetworking
www.RTSnetworking.com 8. Query .COM 185.230.63.186
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
6. Iterative Query Root
7. Response COM
3. Recursive Query
RTSnetworking
www.RTSnetworking.com 8. Query .COM 185.230.63.186
2. HOSTS file:
C:\Windows\System32\Drivers\etc\HOSTS
DNS records
Primary zones:
o Are authoritative for a portion of a DNS namespace
Secondary zones
o Read-only copies of primary zones
Stub zones
o contain only the records required to locate and communicate with name servers
Forwarders:
Receive DNS requests, and forward requests for zones for which it is not authoritative
Are common for external name resolution
Conditional forwarders:
Forward requests for a specific domain anme
Typical between partners and trusted organizations
Stub zones:
Have a similar role to conditional forwarders
Are used within the same company
Requires configuration on both DNS Servers
DNS Forwarding
Module 5:
4 Managing File Servers and
Storage
Module Overview
This module describes how to configure file servers and storage in Windows Server:
Lessons:
o Volumes and file systems in Windows Server
o Implementing sharing in Windows Server
o Implementing Storage Spaces in Windows Server
When selecting a file system, consider the differences between FAT, NTFS file system, and ReFS:
FAT/FAT32 provides:
o Basic file system
o No Security
o exFAT developed for flash drives
NTFS provides:
o Auditing
o Security (permissions and encryption)
o Compression
ReFS provides:
o Backward compatibility support for NTFS
Read
Read and Execute
Write
Modify
Full Control
List Folder Contents
Managing NTFS Permissions
Sales-Reports
Sales Managers
Modify
Bob
Read
Sales Users
Managing Shared Folders
Inheritance
Sales-Reports
Modify
Read
Jan-Reports
Modify
Read
Overview of File Server Resource Manager
Finance Reports
Lesson 2 Overview
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
Lesson 3 Overview
• Data Deduplication, often called Dedup for short, is a feature that can help reduce the impact of
redundant data on storage costs.
• When enabled, Data Deduplication optimizes free space on a volume by examining the data on the
volume by looking for duplicated portions on the volume.
• Duplicated portions of the volume's dataset are stored once and are compressed for additional
savings.
Data Deduplication
1. Scan the file system for files meeting the optimization policy
Data Deduplication
5. Replace the original file stream of now optimized files with a reparse point to the chunk store
Deploy Data Deduplication
Prior to installing and configuring Data Deduplication in your environment, plan your deployment using the
following steps:
1. Determine target deployments (the drive to which you want to deploy dedpup)
2. Determine which volumes are candidates for deduplication
3. Evaluate savings with the Deduplication Evaluation Tool
4. Plan the rollout and deduplication policies
Deploy Data Deduplication
After completing your planning, deploy Data Deduplication to a server in your environment by performing
the following steps:
1. Install Data Deduplication components on the server
2. Enable Data Deduplication
3. Configure Data Deduplication jobs
4. Configure Data Deduplication schedules
Backup and restore considerations with Data Deduplication
Data collection
https://RTSnetworking.com/demo
Overview of Hyper-V
Provides the ability to install the Hyper-V role within a guest virtual machine
Requirements:
o Both the Hyper-V host and the guest virtual machine must be Windows Server 2016 or later
o Sufficient amount of static RAM
o Virtual Networking
o Managing Checkpoints
VM generation versions
Generation 1 VMs:
o Support 32 and 64-bit operating systems
o Only support boot volumes a maximum of 2 TB
o Supports legacy BIOS
Generation 2 VMs:
o Support only 64-bit operating systems
o Support secure boot and shielded VMs
o Support boot volumes a maximum of 64 TB
o Supports Unified Extensible Firmware Interface (UEFI)
VM settings Generation 1 settings
Consider the following factors when planning storage for virtual hard disks:
o High-performance connection to storage
o Redundant storage
o High-performance storage
o Adequate growth space
Virtual hard disk formats and types
o Paused
o Saved
Manage VM states and checkpoints
Checkpoints:
o Allows you to take a snapshot of a
virtual machine at a specific point
in time
o Two types of checkpoints
• Production checkpoints
• Standard checkpoints
o Maximum of 50 checkpoints per
virtual machine allowed
Module 7:
4 Implementing Windows Print
Server
Lesson 1 overview
In this lesson, you’ll learn about Windows Print Server management, security, and performance capabilities
and configurations.
Topics:
o Windows Print Server
o Print Permissions
o Print Pooling
o Print Priority
Windows Print Server
A Windows print server is a computer that manages printers and makes them available to print clients on a
network. It acts as a central point for managing print jobs and printer settings.
Benefits of using a Windows print server
There are several benefits to using a Windows print server, including:
•Centralized management: A print server provides a central location for managing all of the printers on a
network. This makes it easier to install and configure printers, update printer drivers, and troubleshoot
printing problems.
•Improved performance: A print server can improve the performance of printing by spooling print jobs and
sending them to printers in an efficient manner.
•Security: A print server can help to improve the security of printing by restricting access to printers and
printer settings.
•Scalability: A print server can be scaled to support a large number of printers and users.
How a Windows Print Server works
When a user sends a print job to a print server, the print server spools the print job and then sends it to the
appropriate printer. The print server also monitors the status of printers and print jobs, and it can notify
users if there are any problems.
Deploying a Windows print server
To deploy a Windows print server, you will need to:
1. Install the Print Server role on a Windows server.
2. Add printers to the print server.
3. Configure printer settings and permissions.
4. Point print clients to the print server.
Windows Print Server Best Practices
In this lesson, you’ll learn about Windows Server backup and restore capabilities and the integration with
Azure Backup
Topics:
o Overview of Windows Server Backup
Depending on what you need to backup, the procedures and options in Windows Server Backup might vary
Some of the most common backup procedures that you should consider include:
• Backing up file servers and web servers
• Backing up AD DS
• Backing up Microsoft Exchange Server
Back up and restore Hyper-V VMs
Azure Backup is a subscription service that you can use to provide off-site protection against critical data
loss caused by disasters
Azure Backup replaces or extends your existing on-premises or off-site backup solution
Some of the most important features in Azure Backup include:
• Automatic storage management
• Unlimited scaling
• Data encryption
• Offload on-premises backup
• Back up Azure VMs
Implement backup and restore with Azure Backup
o WSUS Requirements
o WSUS Deployment Options
o Managing Updates
o Configuring Clients
Overview of Windows Update
Windows Update is a Microsoft service that provides updates for Microsoft software
Orchestrator on devices scans for and downloads updates
Clients and servers can be configured to get updates from the Windows Update Services server
What is WSUS?
Prerequisites:
1.4 gigahertz (GHz) or faster x64 processor
2 gigabytes (GB) of random-access memory (RAM) or greater (above that needed for other roles)
10 GB or greater
100 megabits per second (Mbps) or greater network adapter
.NET Framework 4.0
Microsoft Report Viewer Runtime 2012
Windows Internal Database or Microsoft SQL Server Microsoft
Update
WSUS server deployment options
Microsoft
Update
WSUS implementation:
Single server
Multiple servers
WSUS hierarchies:
Autonomous mode
Replica mode
WSUS database:
Windows Internal Database
SQL Server database
WSUS Administration Console
To use Automatic Maintenance for installing updates on computers running Windows 8 and Windows
Server 2012 and later, configure a GPO to:
Enable automatic updates with the following option:
4 - Auto download and schedule the install
Module 10:
4 Implementing Remote Access
on Windows Server 2022
Lesson 1 overview
Topics:
o VPN scenarios
o Options for VPN tunneling protocols
o VPN authentication options
o Configure a VPN Server
VPN Scenarios
A VPN provides a point-to-point connection between a private network’s components by using a public
network, such as the Internet.
Options for VPN tunneling protocols
Windows Server supports four VPN tunneling protocols.
CHAP A challenge-response authentication protocol that uses the An improvement over PAP in that the password
industry-standard MD5 hashing scheme. is not sent over the PPP link.
Requires a plaintext version of the password to
validate the challenge response. Does not
protect against remote server impersonation.
MS-CHAPv2 An upgrade of MS-CHAP. Provides two-way authentication, Provides stronger security than CHAP.
also known as mutual authentication. The remote access
client receives verification that the remote access server to
which it is dialing in to has access to the user’s password.
EAP Allows for arbitrary authentication of a remote access Offers the strongest security by providing the
connection through the use of authentication schemes, most flexibility in authentication variations.
known as EAP types.
Module 11:
4 Managing SAN Storage and
Failover Clustering
Module overview
Lessons:
Lesson 1: ISCSI SAN
Lesson 2: Planning for failover clustering implementation
Lesson 3: Creating and configuring failover clusters
Lesson 1 overview
Topics:
ISCSI SAN
Demo: ISCSI installation and configuration
ISCSI Storage Area Networks (SAN)
Lesson 2 overview
Topics:
What is failover clustering?
High availability with failover clustering
Failover clustering components
Cluster quorum in Windows Server
Considerations for planning failover clustering
What is failover clustering?
Failover clustering is a group of computers that work together to increase the availability and scalability of
clustered roles
The clustered servers (called nodes) are connected by physical cables and by software
If one or more of the cluster nodes fail, other nodes begin to provide service in a process known as
failover
Clustered roles are proactively monitored to verify that they are working properly
If they are not working another node in the cluster runs the workload
High availability with failover clustering
Shared bus or
Service or iSCSI connection Service or
application application
Cluster storage
The network
connects the The dedicated network
Node 1 Node 2
failover cluster connects the failover nodes
and the clients
Clients
Cluster quorum in Windows Server
In failover clusters, quorum defines the consensus that enough cluster members are available to provide
services.
Quorum:
Is based on votes in Windows Server
Enables nodes, file shares, or a shared disk to have a vote, depending on the quorum mode
Enables the failover cluster to remain online when sufficient votes are available
Configure quorum options
The default and recommended best practice is to always use dynamic quorum
Lesson 3 overview
Topics:
The Validation a Configuration Wizard and cluster support policy requirements
Create a failover cluster
Configure storage
Configure networking
Configure quorum options
Configure roles
Manage failover clusters
Configure cluster properties
The Validate a Configuration Wizard and a cluster support policy
requirements
The Validate a Configuration Wizard is used to perform a variety of tests to ensure the cluster components
are configured in a supportable manner.
Before creating a new failover cluster, confirm the configuration to ensure all validation tests are passed.
Cluster validation is intended to:
Ensure clustering is working properly
Find hardware or configuration issues
Perform diagnostic tests
Ensure requirements for:
o Hardware
o Network/Infrastructure
o Software
Create a failover cluster
Failover clusters require shared storage to provide consistent data to a virtual server after a failover
Shared storage options include:
SAS
iSCSI
Fibre Channel
Shared .vhdx
Clustered storage spaces can also be implemented to achieve high availability at the storage level
Configure networking
To configure networking:
The network hardware must be compatible with Windows Server
In the network infrastructure that connects your cluster nodes, avoid having single points of failure
Configure roles
To configure roles:
1. Install the Failover Clustering feature
2. Verify the configuration
3. Create a cluster
4. Install the role on all cluster nodes by using Server Manager
5. Create a clustered application by using the Failover Clustering Management snap-in
6. Configure the application
7. Test the failover
Manage failover clusters
To control how the cluster responds, adjust the failover and failback settings.
Include preferred owners
Considerations for using preferred owners:
Set preferred owners are set on the clustered role
Set multiple preferred owners can be set in an ordered list
Setting preferred owners gives control over:
o The order in which a role selects a node to run
Resource Monitor provides an in-depth understanding at the real-time performance of your server
Overview of Performance Monitor
Performance Monitor enables you to observe current performance statistics or to study historical data that
Data Collector Sets have gathered
Overview of Reliability Monitor
Reliability Monitor monitors hardware and software issues that occur during the selected time interval and
assigns a number called the stability index that indicates the server’s reliability
Overview of Event Viewer
Event Viewer provides categorized lists of essential Windows log events and log groupings for individual
installed applications and specific Windows component categories
Bonus Module:
4 Microsoft Azure
Lesson Overview
Azure is a cloud computing platform provided by Microsoft that offers a wide range of services to help
individuals and businesses build, deploy, and manage their applications and services.
Think of Azure as a collection of powerful tools and resources that are available to you over the internet.
Instead of buying and maintaining your own servers and infrastructure, Azure allows you to use Microsoft's
infrastructure and services to run your applications and store your data.
Here are a few key aspects of Azure:
Scalability: Web and Mobile Apps
Storage and Backup: AI and Machine Learning
Virtual Machines: Security and Compliance
Overall, Azure simplifies the process of building, deploying, and managing applications by providing a
comprehensive set of services that are accessible over the internet. It helps you focus on your core business
objectives without worrying about the underlying IT infrastructure.
Understanding Microsoft Entra ID?
Microsoft Entra ID is Microsoft’s cloud-based identity and access management service, which helps your
employees sign in and access resources in:
•External resources, such as Office 365 and thousands of other applications.
•Internal resources, such as apps on your corporate network and intranet, along with any cloud apps
developed by your own organization.
Entra
Microsoft Entra ID versus Active Directory Domain Services (AD DS)
Microsoft Entra Connect is the Microsoft tool that allows accounts from your Active Directory Domain
Services in your on-premise environment to synchronize to Microsoft Entra ID:
Thank you for attending
• Microsoft Azure
• Microsoft 365
• Active Directory
• Group Policy
• Security
• Hyper-V
• Powershell
• Networking
• ChatGPT