The document discusses new features in Windows Server 2019 including Windows Admin Center, System Insight, Storage Migration Service, Storage Spaces Direct, and Storage Replica. It explains that Windows Admin Center is a browser-based tool for managing Windows servers and clients. Storage Migration Service allows migrating servers and data to new hardware or virtual machines. Storage Spaces Direct pools storage across servers for hyperconverged or converged deployments with options for mirroring or parity resiliency. Storage Replica enables replication of volumes for disaster recovery between servers or clusters.
Windows Server 2022 is now in preview, the next release in our Long-Term Servicing Channel (LTSC), which will be generally available later this calendar year. It builds on Windows Server 2019, our fastest adopted Windows Server ever. This release includes advanced multi-layer security, hybrid capabilities with Azure, and a flexible platform to modernize applications with containers.
basic router configuration ppt , what is router in networking
I run a knowledge sharing YouTube channel called (SILICON CHIPS TAMILAN). Please like, share, subscribe, and support me.
YouTube Link : https://www.youtube.com/channel/UCenZp9ho_PP0K5iYrdocvrw
Notes Link Below attached
https://siliconchipstamilan.blogspot.com/2022/12/what-is-outlook-mail.html
This document provides an overview of Cisco router modes, commands, and configuration options. It lists the different router modes including user exec mode, privileged exec mode, global configuration mode, interface configuration mode, and router configuration mode. It also lists many common Cisco router commands used for configuration, troubleshooting, and management. These commands allow configuration and management of interfaces, routing protocols, access control lists, NAT, DHCP, and other router functions. The document provides brief descriptions and examples of using some key commands.
This document provides an introduction to the Python programming language. It covers Python's history and features, including its syntax, types, operators, control flow, functions, classes, and tools. Python is a readable, dynamic language suitable for web development, GUIs, scripting, and more. It has a focus on readability and productivity. Major companies and organizations that use Python include Google, NASA, Dropbox, IBM, Instagram, and Mozilla.
Linux is an operating system similar to Unix. The document lists and describes 27 common Linux commands, including commands for listing files (ls), removing files and directories (rm, rmdir), viewing file contents (cat, more, less), navigating and creating directories (cd, mkdir), moving and copying files (mv, cp), searching files (grep), counting characters (wc), checking the current working directory (pwd), getting command help (man), finding files and programs (whereis, find, locate), editing files (vi, emacs), connecting remotely (telnet, ssh), checking network status (netstat, ifconfig), getting information about internet hosts (whois, nslookup, dig, finger), testing network connectivity
This document provides an overview of the Linux operating system. It discusses that Linux was originally developed in 1991 as a free Unix-like kernel and has since grown significantly through contributions from open source developers worldwide. It describes Linux's origins and key characteristics, such as being free and open source, highly customizable, stable, and secure. The document also outlines popular uses of Linux including on servers, smartphones, and embedded devices, and highlights some of its major advantages over other commercial operating systems.
This document provides an overview of installing Windows Server 2012, including selecting editions, performing clean installations, using Server Core and the minimal interface, upgrading servers, and migrating roles. Key points covered include the system requirements, editions, roles, and licensing models of Windows Server 2012. Instructions are provided for clean installations, upgrading existing servers, and migrating roles between servers using the Windows Server Migration Tools.
Linux is an open source operating system initially developed for Intel processors but now available on other platforms. The Linux kernel was created by Linus Torvalds and forms the core of any Linux distribution. Distributions package the kernel with other software and come in different categories for embedded systems, desktops, and servers. Common distributions include Ubuntu, Fedora, and CentOS. The command line interface provides power and flexibility, while the graphical user interface offers accessibility through desktop environments like GNOME.
This document provides a history of Microsoft Windows Server operating systems from 1993 to 2016. It describes the key releases including Windows NT 3.1 Advanced Server in 1993, Windows 2000 in 2000 which introduced Active Directory, Windows Server 2003 in 2003 with improved security and server roles, Windows Server 2008 in 2008 with new features like Hyper-V virtualization, Windows Server 2012 in 2012 with cloud-oriented features and a default Server Core installation, and Windows Server 2016 in 2016 with additional container and software-defined networking support and a new Nano Server deployment option. Each new release brought performance improvements and additional capabilities for managing networks, storage, security and workloads.
This document summarizes the server configuration and Active Directory setup at a school. It describes the primary and secondary ESXi servers that run domain controllers, file servers, backup servers, and terminal servers. It explains how the domain controllers manage computers and users across different domains, including the staff1, student1, and root ocaat1 domains. It provides instructions for adding user accounts, setting up group policies, configuring the DHCP and DNS servers, and establishing file sharing permissions.
This document provides a summary of the Unix and GNU/Linux command line. It begins with an overview of files and file systems in Unix, including that everything is treated as a file. It then discusses command line interpreters (shells), and commands for handling files and directories like ls, cd, cp, and rm. It also covers redirecting standard input/output, pipes, and controlling processes. The document is intended as training material and provides a detailed outline of its contents.
The document provides an overview of Linux, including its history and features. It discusses how Linux originated from the GNU project and was started by Linus Torvalds. Linux is an open source operating system that can run on various platforms. It provides features like multi-user access, multitasking, and security benefits compared to other operating systems. The document also describes the typical Linux desktop environment and popular software applications available for Linux.
Updating Embedded Linux devices in the field requires robust, atomic, and fail-safe software update mechanisms to fix bugs remotely without rendering devices unusable. A commonly used open source updater is SWUpdate, a Linux application that can safely install updates downloaded over the network or from local media using techniques like separate recovery systems and ping-ponging between OS images. It aims to provide atomic system image updates with rollback capabilities and audit logs to ensure devices remain functional after updates.
Linux is an operating system created by Linus Torvalds that enables applications and users to access computer devices. It is similar to Windows and OS X but is unique in being modular and flexible, allowing developers to use many languages. Linux has become very popular, powering major websites and representing a $25 billion ecosystem in 2008 as it is installed on computers and relied on by companies like Google, Twitter, and YouTube.
This document provides an overview of Linux including:
- Different pronunciations of Linux and the origins of each pronunciation.
- A definition of Linux as a generic term for Unix-like operating systems with graphical user interfaces.
- Why Linux is significant as a powerful, free, and customizable operating system that runs on multiple hardware platforms.
- An introduction to key Linux concepts like multi-user systems, multiprocessing, multitasking and open source software.
- Examples of common Linux commands for file handling, text processing, and system administration.
This document discusses storage management in Linux. It covers disk partitioning, file systems, logical volume management (LVM), and some common tools. It describes:
1. How hard disks can be partitioned into primary, extended, and logical partitions using tools like fdisk and parted.
2. The components of storage including files, directories, file systems, and how logical and physical storage relate.
3. How LVM allows logical volumes to span physical disks, be dynamically resized, and helps solve issues with traditional partitioning.
4. Common commands to manage physical volumes, volume groups, and logical volumes with LVM.
Fedora is a Linux distribution created by Red Hat as a community project in 2003. It serves as a source of software innovations for Red Hat Enterprise Linux releases. The latest version, Fedora 17 code named "Beefy Miracle", features the GNOME Shell 3.4 desktop environment and was released in May 2012. It provides full-featured applications for email, instant messaging, media playback, image editing and more through packages like Evolution, Empathy, Totem, Rhythmbox, GIMP and LibreOffice. Fedora also supports large file systems up to 100TB and encrypted file systems through technologies like ext4 and LUKS.
El documento resume la evolución de Linux desde su creación en 1991 por Linus Torvalds hasta 2007. Comenzó como un proyecto personal de Torvalds en la Universidad de Helsinki. Richard Stallman también jugó un papel importante al iniciar el movimiento de software libre y crear el proyecto GNU. Linux ha pasado por varias series principales (0.x, 1.x, 2.x, 3.x) con cada nueva versión agregando más soporte de hardware y software. Linux ahora se usa ampliamente en servidores, estaciones de trabajo y sistemas embebidos
The document discusses the history and advantages of Linux compared to other operating systems like Windows, DOS and UNIX. It explains how the GNU project was started to develop a free and open source UNIX-like operating system. It then describes how Linus Torvalds developed the initial Linux kernel in 1991 building on the work of the GNU project. It highlights some key advantages of Linux like high security, many available tools and the flexibility of the environment. It also provides a brief overview of some common Linux components like the kernel, shells, KDE/GNOME desktop environments and the directory structure.
The document summarizes the 6 main steps of the Linux booting process:
1) BIOS performs initial checks and loads the master boot record (MBR) from the hard drive.
2) The MBR loads the GRUB boot loader.
3) GRUB loads and executes the Linux kernel and initrd images.
4) The kernel initializes hardware and mounts the initrd, then loads modules and root partition.
5) The init process reads /etc/inittab to determine the default runlevel and loads appropriate programs.
6) Runlevel programs like sendmail start based on the runlevel and sequence numbers in their names.
This document provides an overview of the Android operating system. It discusses that Android is an open-source, Linux-based software stack for mobile devices. The document outlines Android's architecture which includes the Linux kernel, libraries, Android runtime and application framework. It also describes how to develop Android applications using building blocks like activities, intents and services. The document notes both advantages of Android like its open nature and portability, as well as disadvantages regarding security and open-source issues.
This document provides guidance on hardening a Linux server for security. It recommends following the CIS and NSA security benchmarks. It suggests choosing a server-oriented Linux distribution, keeping partitions and filesystems separate, encrypting partitions and the running server, securing the boot process, using iptables and TCP wrappers for firewalls, restricting root access and using sudo, enforcing password policies, removing unnecessary packages and services, securing remote administration like SSH, disabling unnecessary Linux modules, and implementing auditing and integrity checks.
The document discusses Linux file systems. It begins with an overview of file system architecture, including inodes, dentries, superblocks, and how data is never erased but overwritten. It then covers various local file systems like Ext2, Ext3, Ext4, ReiserFS, and XFS. Next it discusses log-structured and pseudo file systems. It also covers network file systems like NFS and CIFS. Finally it summarizes cluster, distributed, and Hadoop file systems. The document provides a technical overview of Linux file system types, structures, features and capabilities.
Windows Server 2022 represents a milestone in server operating systems, offering a cutting-edge platform designed to meet the ever-evolving needs of modern businesses. With an unwavering commitment to security, scalability, and hybrid cloud integration, this iteration introduces Secured-Core Server technology, fortifying the system against advanced threats and firmware vulnerabilities. Boasting improvements in containerization, virtualization, and storage management, Windows Server 2022 provides a robust foundation for organizations embracing digital transformation. The integration of Azure services, enhanced management tools like Windows Admin Center, and support for the latest application frameworks underline its status as a comprehensive solution, empowering enterprises to efficiently manage diverse workloads across on-premises, cloud, and edge environments.
At its core, Windows Server 2022 prioritizes performance, responding to the demands of modern hardware configurations with optimizations that ensure heightened responsiveness and reliability. With features such as Storage Migration Service, Active Directory updates, and advancements in GPU virtualization, Windows Server 2022 stands as a versatile and forward-looking server operating system, empowering businesses to navigate the complexities of today's IT landscape with confidence and efficiency.
Increase security, evolve your datacentre, and innovate faster with Microsoft Windows Server 2016—the cloud-ready operating system.
Learn more about:
» Windows Server 2016 as the 4th Era of Windows Server
» Editions & features
» Hardware requirements
» Features:
• Nano server
• Containers
• Hyper-V Hot-Add Virtual Hardware
• Nested Virtualization
This document provides an overview of the Linux operating system. It discusses that Linux was originally developed in 1991 as a free Unix-like kernel and has since grown significantly through contributions from open source developers worldwide. It describes Linux's origins and key characteristics, such as being free and open source, highly customizable, stable, and secure. The document also outlines popular uses of Linux including on servers, smartphones, and embedded devices, and highlights some of its major advantages over other commercial operating systems.
This document provides an overview of installing Windows Server 2012, including selecting editions, performing clean installations, using Server Core and the minimal interface, upgrading servers, and migrating roles. Key points covered include the system requirements, editions, roles, and licensing models of Windows Server 2012. Instructions are provided for clean installations, upgrading existing servers, and migrating roles between servers using the Windows Server Migration Tools.
Linux is an open source operating system initially developed for Intel processors but now available on other platforms. The Linux kernel was created by Linus Torvalds and forms the core of any Linux distribution. Distributions package the kernel with other software and come in different categories for embedded systems, desktops, and servers. Common distributions include Ubuntu, Fedora, and CentOS. The command line interface provides power and flexibility, while the graphical user interface offers accessibility through desktop environments like GNOME.
This document provides a history of Microsoft Windows Server operating systems from 1993 to 2016. It describes the key releases including Windows NT 3.1 Advanced Server in 1993, Windows 2000 in 2000 which introduced Active Directory, Windows Server 2003 in 2003 with improved security and server roles, Windows Server 2008 in 2008 with new features like Hyper-V virtualization, Windows Server 2012 in 2012 with cloud-oriented features and a default Server Core installation, and Windows Server 2016 in 2016 with additional container and software-defined networking support and a new Nano Server deployment option. Each new release brought performance improvements and additional capabilities for managing networks, storage, security and workloads.
This document summarizes the server configuration and Active Directory setup at a school. It describes the primary and secondary ESXi servers that run domain controllers, file servers, backup servers, and terminal servers. It explains how the domain controllers manage computers and users across different domains, including the staff1, student1, and root ocaat1 domains. It provides instructions for adding user accounts, setting up group policies, configuring the DHCP and DNS servers, and establishing file sharing permissions.
This document provides a summary of the Unix and GNU/Linux command line. It begins with an overview of files and file systems in Unix, including that everything is treated as a file. It then discusses command line interpreters (shells), and commands for handling files and directories like ls, cd, cp, and rm. It also covers redirecting standard input/output, pipes, and controlling processes. The document is intended as training material and provides a detailed outline of its contents.
The document provides an overview of Linux, including its history and features. It discusses how Linux originated from the GNU project and was started by Linus Torvalds. Linux is an open source operating system that can run on various platforms. It provides features like multi-user access, multitasking, and security benefits compared to other operating systems. The document also describes the typical Linux desktop environment and popular software applications available for Linux.
Updating Embedded Linux devices in the field requires robust, atomic, and fail-safe software update mechanisms to fix bugs remotely without rendering devices unusable. A commonly used open source updater is SWUpdate, a Linux application that can safely install updates downloaded over the network or from local media using techniques like separate recovery systems and ping-ponging between OS images. It aims to provide atomic system image updates with rollback capabilities and audit logs to ensure devices remain functional after updates.
Linux is an operating system created by Linus Torvalds that enables applications and users to access computer devices. It is similar to Windows and OS X but is unique in being modular and flexible, allowing developers to use many languages. Linux has become very popular, powering major websites and representing a $25 billion ecosystem in 2008 as it is installed on computers and relied on by companies like Google, Twitter, and YouTube.
This document provides an overview of Linux including:
- Different pronunciations of Linux and the origins of each pronunciation.
- A definition of Linux as a generic term for Unix-like operating systems with graphical user interfaces.
- Why Linux is significant as a powerful, free, and customizable operating system that runs on multiple hardware platforms.
- An introduction to key Linux concepts like multi-user systems, multiprocessing, multitasking and open source software.
- Examples of common Linux commands for file handling, text processing, and system administration.
This document discusses storage management in Linux. It covers disk partitioning, file systems, logical volume management (LVM), and some common tools. It describes:
1. How hard disks can be partitioned into primary, extended, and logical partitions using tools like fdisk and parted.
2. The components of storage including files, directories, file systems, and how logical and physical storage relate.
3. How LVM allows logical volumes to span physical disks, be dynamically resized, and helps solve issues with traditional partitioning.
4. Common commands to manage physical volumes, volume groups, and logical volumes with LVM.
Fedora is a Linux distribution created by Red Hat as a community project in 2003. It serves as a source of software innovations for Red Hat Enterprise Linux releases. The latest version, Fedora 17 code named "Beefy Miracle", features the GNOME Shell 3.4 desktop environment and was released in May 2012. It provides full-featured applications for email, instant messaging, media playback, image editing and more through packages like Evolution, Empathy, Totem, Rhythmbox, GIMP and LibreOffice. Fedora also supports large file systems up to 100TB and encrypted file systems through technologies like ext4 and LUKS.
El documento resume la evolución de Linux desde su creación en 1991 por Linus Torvalds hasta 2007. Comenzó como un proyecto personal de Torvalds en la Universidad de Helsinki. Richard Stallman también jugó un papel importante al iniciar el movimiento de software libre y crear el proyecto GNU. Linux ha pasado por varias series principales (0.x, 1.x, 2.x, 3.x) con cada nueva versión agregando más soporte de hardware y software. Linux ahora se usa ampliamente en servidores, estaciones de trabajo y sistemas embebidos
The document discusses the history and advantages of Linux compared to other operating systems like Windows, DOS and UNIX. It explains how the GNU project was started to develop a free and open source UNIX-like operating system. It then describes how Linus Torvalds developed the initial Linux kernel in 1991 building on the work of the GNU project. It highlights some key advantages of Linux like high security, many available tools and the flexibility of the environment. It also provides a brief overview of some common Linux components like the kernel, shells, KDE/GNOME desktop environments and the directory structure.
The document summarizes the 6 main steps of the Linux booting process:
1) BIOS performs initial checks and loads the master boot record (MBR) from the hard drive.
2) The MBR loads the GRUB boot loader.
3) GRUB loads and executes the Linux kernel and initrd images.
4) The kernel initializes hardware and mounts the initrd, then loads modules and root partition.
5) The init process reads /etc/inittab to determine the default runlevel and loads appropriate programs.
6) Runlevel programs like sendmail start based on the runlevel and sequence numbers in their names.
This document provides an overview of the Android operating system. It discusses that Android is an open-source, Linux-based software stack for mobile devices. The document outlines Android's architecture which includes the Linux kernel, libraries, Android runtime and application framework. It also describes how to develop Android applications using building blocks like activities, intents and services. The document notes both advantages of Android like its open nature and portability, as well as disadvantages regarding security and open-source issues.
This document provides guidance on hardening a Linux server for security. It recommends following the CIS and NSA security benchmarks. It suggests choosing a server-oriented Linux distribution, keeping partitions and filesystems separate, encrypting partitions and the running server, securing the boot process, using iptables and TCP wrappers for firewalls, restricting root access and using sudo, enforcing password policies, removing unnecessary packages and services, securing remote administration like SSH, disabling unnecessary Linux modules, and implementing auditing and integrity checks.
The document discusses Linux file systems. It begins with an overview of file system architecture, including inodes, dentries, superblocks, and how data is never erased but overwritten. It then covers various local file systems like Ext2, Ext3, Ext4, ReiserFS, and XFS. Next it discusses log-structured and pseudo file systems. It also covers network file systems like NFS and CIFS. Finally it summarizes cluster, distributed, and Hadoop file systems. The document provides a technical overview of Linux file system types, structures, features and capabilities.
Windows Server 2022 represents a milestone in server operating systems, offering a cutting-edge platform designed to meet the ever-evolving needs of modern businesses. With an unwavering commitment to security, scalability, and hybrid cloud integration, this iteration introduces Secured-Core Server technology, fortifying the system against advanced threats and firmware vulnerabilities. Boasting improvements in containerization, virtualization, and storage management, Windows Server 2022 provides a robust foundation for organizations embracing digital transformation. The integration of Azure services, enhanced management tools like Windows Admin Center, and support for the latest application frameworks underline its status as a comprehensive solution, empowering enterprises to efficiently manage diverse workloads across on-premises, cloud, and edge environments.
At its core, Windows Server 2022 prioritizes performance, responding to the demands of modern hardware configurations with optimizations that ensure heightened responsiveness and reliability. With features such as Storage Migration Service, Active Directory updates, and advancements in GPU virtualization, Windows Server 2022 stands as a versatile and forward-looking server operating system, empowering businesses to navigate the complexities of today's IT landscape with confidence and efficiency.
Increase security, evolve your datacentre, and innovate faster with Microsoft Windows Server 2016—the cloud-ready operating system.
Learn more about:
» Windows Server 2016 as the 4th Era of Windows Server
» Editions & features
» Hardware requirements
» Features:
• Nano server
• Containers
• Hyper-V Hot-Add Virtual Hardware
• Nested Virtualization
This document provides information about setting up a computer server using Windows Server 2008 R2. It begins with learning objectives about defining computer server setup and learning how to configure Windows Server 2008 R2. It then discusses the differences between Windows Server 2008 and Windows Server 2008 R2, including new features introduced in each version. Finally, it outlines the 8 steps for setting up Windows Server 2008 R2, such as booting the server, selecting the operating system, allocating disk space, and configuring Windows Server.
Horizon View 5.2 introduces several new features including hardware accelerated 3D graphics, support for Microsoft Lync 2013 with rich media services, support for Windows 8 desktops and clients, streamlined access to View desktops from Horizon Workspace, HTML access to connect from any device, and an enhanced experience for touch-based mobile devices. The release also improves the user experience with large pool creation and multi-VLAN support, improved View Administrator performance, and accelerated provisioning, recompose, and rebalance operations. Management is eased through support for Virtual Center virtual appliances, a tech preview of View integration into the vSphere web client, and more efficient use of storage capacity with space efficient disks.
Chapter 1 Installing Windows Server 2016(1).pptxPRAMNOORBATH1
This document provides an overview of installing and configuring Windows Server 2016. It discusses system requirements, editions, features and roles, virtualization options like Hyper-V and containers, upgrading and migrating servers, activation methods, servicing models, using Windows Deployment Service (WDS) for deploying OS images, and Features on Demand. The objectives are to determine installation requirements, choose appropriate editions, install Windows Server 2016, install features and roles, perform server upgrades and migrations, and configure Windows Server Core.
This document provides an overview of using Microsoft Azure Infrastructure as a Service (IaaS) virtual machines (VMs). It discusses common IaaS workloads that can be run on Azure VMs like line of business apps, databases, and developer environments. It also covers provisioning VMs to the cloud, supported Windows and Linux operating systems, disk types, images, and managing VMs through extensions and at scale with VM scale sets.
The document provides an agenda and overview for a seminar on using Microsoft virtualization technologies. It discusses topics like virtualization concepts and usage scenarios, licensing and support, architecture and future plans, operations, and management. The seminar is scheduled from 9:30-16:30 over four sessions with breaks, and will be presented by Ronald Beekelaar, a Microsoft MVP for virtual machine technology.
Windows Server 2016 on pilve-valmis operatsioonisüsteem, mis toetab ettevõtte praegusi töövooge, samal ajal tutvustades uusi tehnoloogiaid, mis teevad pilve ülemineku sujuvaks, kui aeg õige. Millised on põhilised uuendused ja kuidas need ettevõtteid aitavad - nendele küsimustele leiate vastused esitlusest.
What are the Latest Updates in Windows Server Azure Edition?Direct Deals, LLC
Windows Server 2022 Download is specifically built to run as an Azure IaaS (Infrastructure as a service) VM (Virtual Machines) in Azure or as a VM on an Azure Stack HCI cluster. This Azure edition has many exclusive features to enhance business productivity with remote work.
Shop Here: - https://www.directdeals.com/software/microsoft-windows-server/windows-server-2022.aspx
Using Microsoft Virtualization Technologies: Today and ...webhostingguy
The document provides an overview and agenda for a seminar on using Microsoft virtualization technologies. It discusses topics like virtualization concepts and usage scenarios, licensing and support, architecture and future plans, operations, and management. The presenter is introduced and their background and consulting services are described.
Windows Server 2003 End-of-Service: A Comprehensive, Market-Shifting OpportunityIngram Micro Cloud
This presentations covers a few simple questions on how your customers can grow your infrastructure deals substantially in H1. Given the huge cross-sell/upsell opportunity, this breakout will ensure you:
- Understand the breadth of the opportunity around upgrading Windows Server 2003/R2 and SQL 2005
- Take inventory of all the great resources at your disposal to expedite the discovery, planning, targeting and execution of a migration.
- Arm yourself with Azure as a target destination for your migrations, and transform your practice simultaneously.
Transform into an Azure Managed Service Provider - WVD.pptxsdcs1
Transform into an Azure Managed Service Provider - WVD.pptx
csa;clllas;c;asc;agvdfvbfdbdfbdfbvdfvdfrgv
gvs fesfesffesfedfdes fesdfesfes ewed efegfe
e
e eefefefed feew e fewfefefefee fewe e efefesfef efwefwef ewgewg ewgfe ewfr we egewge gfefefef rewewfef e ew gege ge ee ee ewgewege eewgewg gewgew ege feg ewefefefefefew frewrf ewewewdefe
This document summarizes the editions, licensing, and features of Windows Server 2016. It includes six editions ranging from Datacenter for highly virtualized environments to Storage Server for storage solutions. Licensing transitions from processor-based to core-based, requiring a minimum of 16 cores per server. Existing customers will receive core grants to help transition. New features vary by edition, with Datacenter including the most like Shielded VMs and unlimited virtual machines.
The document provides instructions on installing and configuring Provisioning Services. It discusses determining installation options, key components, integrating with Active Directory, preparing target devices, and supported operating systems, hypervisors, and databases. The summary includes an overview of Provisioning Services technology and components, farm and site design considerations, and the configuration steps to complete a Provisioning Services installation.
Pivotal Cloud Foundry 2.5: A First LookVMware Tanzu
This document provides a summary of new features and updates in Pivotal Cloud Foundry 2.5, including:
- Improved manifest editing experience with a "manifest diff" view in Ops Manager 2.5.
- Beta release of Platform Automation for PCF to automate upgrades and installations.
- New weighted routing feature in PAS 2.5 to control traffic splitting for rolling deployments.
- PAS 2.5 now supports apps using multiple custom ports.
- Various updates for Windows support, .NET, and Steeltoe in PAS for Windows 2.5.
- Coming updates for Spring Cloud Data Flow, Single Sign-On, and other services.
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...Celine George
Analytic accounts are used to track and manage financial transactions related to specific projects, departments, or business units. They provide detailed insights into costs and revenues at a granular level, independent of the main accounting system. This helps to better understand profitability, performance, and resource allocation, making it easier to make informed financial decisions and strategic planning.
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetSritoma Majumder
Introduction
All the materials around us are made up of elements. These elements can be broadly divided into two major groups:
Metals
Non-Metals
Each group has its own unique physical and chemical properties. Let's understand them one by one.
Physical Properties
1. Appearance
Metals: Shiny (lustrous). Example: gold, silver, copper.
Non-metals: Dull appearance (except iodine, which is shiny).
2. Hardness
Metals: Generally hard. Example: iron.
Non-metals: Usually soft (except diamond, a form of carbon, which is very hard).
3. State
Metals: Mostly solids at room temperature (except mercury, which is a liquid).
Non-metals: Can be solids, liquids, or gases. Example: oxygen (gas), bromine (liquid), sulphur (solid).
4. Malleability
Metals: Can be hammered into thin sheets (malleable).
Non-metals: Not malleable. They break when hammered (brittle).
5. Ductility
Metals: Can be drawn into wires (ductile).
Non-metals: Not ductile.
6. Conductivity
Metals: Good conductors of heat and electricity.
Non-metals: Poor conductors (except graphite, which is a good conductor).
7. Sonorous Nature
Metals: Produce a ringing sound when struck.
Non-metals: Do not produce sound.
Chemical Properties
1. Reaction with Oxygen
Metals react with oxygen to form metal oxides.
These metal oxides are usually basic.
Non-metals react with oxygen to form non-metallic oxides.
These oxides are usually acidic.
2. Reaction with Water
Metals:
Some react vigorously (e.g., sodium).
Some react slowly (e.g., iron).
Some do not react at all (e.g., gold, silver).
Non-metals: Generally do not react with water.
3. Reaction with Acids
Metals react with acids to produce salt and hydrogen gas.
Non-metals: Do not react with acids.
4. Reaction with Bases
Some non-metals react with bases to form salts, but this is rare.
Metals generally do not react with bases directly (except amphoteric metals like aluminum and zinc).
Displacement Reaction
More reactive metals can displace less reactive metals from their salt solutions.
Uses of Metals
Iron: Making machines, tools, and buildings.
Aluminum: Used in aircraft, utensils.
Copper: Electrical wires.
Gold and Silver: Jewelry.
Zinc: Coating iron to prevent rusting (galvanization).
Uses of Non-Metals
Oxygen: Breathing.
Nitrogen: Fertilizers.
Chlorine: Water purification.
Carbon: Fuel (coal), steel-making (coke).
Iodine: Medicines.
Alloys
An alloy is a mixture of metals or a metal with a non-metal.
Alloys have improved properties like strength, resistance to rusting.
How to Set warnings for invoicing specific customers in odooCeline George
Odoo 16 offers a powerful platform for managing sales documents and invoicing efficiently. One of its standout features is the ability to set warnings and block messages for specific customers during the invoicing process.
*Metamorphosis* is a biological process where an animal undergoes a dramatic transformation from a juvenile or larval stage to a adult stage, often involving significant changes in form and structure. This process is commonly seen in insects, amphibians, and some other animals.
Multi-currency in odoo accounting and Update exchange rates automatically in ...Celine George
Most business transactions use the currencies of several countries for financial operations. For global transactions, multi-currency management is essential for enabling international trade.
A measles outbreak originating in West Texas has been linked to confirmed cases in New Mexico, with additional cases reported in Oklahoma and Kansas. The current case count is 795 from Texas, New Mexico, Oklahoma, and Kansas. 95 individuals have required hospitalization, and 3 deaths, 2 children in Texas and one adult in New Mexico. These fatalities mark the first measles-related deaths in the United States since 2015 and the first pediatric measles death since 2003.
The YSPH Virtual Medical Operations Center Briefs (VMOC) were created as a service-learning project by faculty and graduate students at the Yale School of Public Health in response to the 2010 Haiti Earthquake. Each year, the VMOC Briefs are produced by students enrolled in Environmental Health Science Course 581 - Public Health Emergencies: Disaster Planning and Response. These briefs compile diverse information sources – including status reports, maps, news articles, and web content– into a single, easily digestible document that can be widely shared and used interactively. Key features of this report include:
- Comprehensive Overview: Provides situation updates, maps, relevant news, and web resources.
- Accessibility: Designed for easy reading, wide distribution, and interactive use.
- Collaboration: The “unlocked" format enables other responders to share, copy, and adapt seamlessly. The students learn by doing, quickly discovering how and where to find critical information and presenting it in an easily understood manner.
As of Mid to April Ending, I am building a new Reiki-Yoga Series. No worries, they are free workshops. So far, I have 3 presentations so its a gradual process. If interested visit: https://www.slideshare.net/YogaPrincess
https://ldmchapels.weebly.com
Blessings and Happy Spring. We are hitting Mid Season.
INTRO TO STATISTICS
INTRO TO SPSS INTERFACE
CLEANING MULTIPLE CHOICE RESPONSE DATA WITH EXCEL
ANALYZING MULTIPLE CHOICE RESPONSE DATA
INTERPRETATION
Q & A SESSION
PRACTICAL HANDS-ON ACTIVITY
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schoolsdogden2
Algebra 1 is often described as a “gateway” class, a pivotal moment that can shape the rest of a student’s K–12 education. Early access is key: successfully completing Algebra 1 in middle school allows students to complete advanced math and science coursework in high school, which research shows lead to higher wages and lower rates of unemployment in adulthood.
Learn how The Atlanta Public Schools is using their data to create a more equitable enrollment in middle school Algebra classes.
1. 4
Windows Server 2022
Administration
Kevin Brown
MCT (Microsoft Certified Trainer) since 2000
Azure Security Engineer
Azure Solutions Architect
Azure Administrator
Microsoft 365 Enterprise Administrator
MCSE NT 4.0, 2000, 2003, 2008, 2012, 2016
CISSP
3. Course Outline
1. Introduction to Windows Server 2022
2. Active Directory Domain Services on Windows Server 2022
3. Managing DHCP on Windows Server 2022
4. Managing DNS on Windows Server 2022
5. Implementing File Servers and Storage
6. Implementing Hyper-V Virtualization
7. Implementing Windows Print Servers on Windows Server 2022
8. Disaster Recovery in Windows Server 2022
9. Managing SAN Storage and Failover Clustering
10. Implementing WSUS on Windows Server 2022
11. Implementing Remote Access on Windows Server 2022
12. Performance Monitoring in Windows Server 2022
4. Microsoft Azure
Windows Server 2022 integration with Azure Virtual Machines
Windows Server 2022 integration with Azure File Shares
Windows Server 2022 integration with Microsoft Entra ID (formerly Azure AD)
5. Lab Setup
https://RTSnetworking.com/demo
Hyper-V lab
Windows Server 2022 ISO download
Enabling Hyper-V
Installing Windows Server 2022 using Hyper-V
Hyper-V post installation tasks
https://RTSnetworking.com/demo
VirtualBox lab
Windows Server 2022 ISO download
Installing VirtualBox
Installing Windows Server 2022 using VirtualBox
VirtualBox post installation tasks
https://rtsnetworking.com/demo
7. Module overview
This module introduces you to Windows Server 2022
Lessons
Requirements for Windows Server 2022
Windows Server 2022 Editions
Deployment Options
Overview of Windows Server Core
Overview of administration methods and tools
8. Lesson 1 overview
In this lesson, you’ll learn about Windows Server 2022 editions and their capabilities
Topics
o Windows Server 2022 editions
o Hardware requirements for Windows Server 2022
o Overview of deployment options
o Servicing channels for Windows Server
o Licensing and activation for Windows Server
9. Windows Server 2022 editions
Windows Server 2022 is released in four editions:
o Windows Server 2022 Essential
• Small businesses with up to 25 users and 50 devices
o Windows Server 2022 Standard
• Physical or minimally virtualized environments
o Windows Server 2022 Datacenter
• Highly virtualized datacenters
o Windows Server 2022 Azure edition:
• Allows you to run Server 2022 as a VM in Azure.
Edition Comparison
https://learn.microsoft.com/windows-server/get-started/editions-comparison-windows-server-2022?tabs=full-comparison
11. Windows Server 2022 Azure Edition
Azure Automanage - Hotpatch
Hotpatching, part of Azure Automanage, is a new way to install updates on new Windows Server Azure
Edition virtual machines (VMs) that doesn't require a reboot after installation.
SMB over QUIC (Quick UDP Internet Connection)
SMB over QUIC updates the SMB 3.1.1 protocol to use the QUIC protocol instead of TCP in Windows Server
2022 Datacenter: Azure Edition, Windows 11 and later, and third party clients if they support it. By using
SMB over QUIC along with TLS 1.3, users and applications can securely and reliably access data from edge
file servers running in Azure. Mobile and telecommuter users no longer need a VPN to access their file
servers over SMB when on Windows.
Extended network for Azure
Azure Extended Network enables you to stretch an on-premises subnet into Azure to let on-premises virtual
machines keep their original on-premises private IP addresses when migrating to Azure.
12. About Microsoft Azure
The bonus module of this course will cover Azure topics:
• Creating an Azure subscription
• Creating Azure Virtual Machines
• Creating Azure Storage Accounts
• Creating Azure File Shares
• Understanding Microsoft Entra ID (formerly Azure AD)
• Creating and managing Entra ID users and groups
• Synchronizing on-premises Active Directory Domain Services to Microsoft Entra ID in Azure
13. Windows Server 2022 editions
Edition removed: Hyper-V server 2019 is that products last version and will continue to be supported under
its lifecycle policy until January 2029
14. End-of-Life Support for Windows Server 2022
Extended End Date
Mainstream End Date
Start Date
Listing
Oct 14, 2031
Oct 13, 2026
Aug 18, 2021
Windows Server 2022
Extended End Date
Mainstream End Date
Start Date
Listing
October 14, 2031
October 13, 2026
August 18, 2021
Windows Server 2022
January 9, 2029
January 9, 2024
November 13, 2018
Windows Server 2019
January 11, 2027
End of Servicing
October 10, 2015
Windows Server 2016
October 10, 2023
End of Servicing
November 25, 2013
Windows Server 2012R2
Windows Server 2012R2 offers Extended Security Updates through October 13, 2026.
Windows mainstream and extended end dates refer to the support life cycle for each new version of Windows.
Mainstream support lasts for five years and includes non-security hotfixes, and new features. Extended
support lasts for another five years and only includes security and reliability patches. After extended
support ends, the version of Windows is no longer supported by Microsoft.
15. Hardware requirements for Windows Server 2022
Hardware requirements will vary depending on:
o Server roles
• Many roles have specific requirements
o Resource usage
Minimum hardware requirements for Windows Server 2022:
Requirement
Component
64 bit
Processor architecture
1.4 gigahertz (GHz)
Processor speed
512 MB (2 GB for Desktop Experience)
RAM
32 GB
Hard drive space
1 gigabit per second throughput
Network
16. Overview of deployment options (1 of 2)
Clean install:
o Boot the physical machine or virtual machine from the Windows Server 2022 media
o Choose the installation language, time and currency formats, and keyboard layout
o Choose the architecture (either Standard or Datacenter) with or without Desktop Experience
o Accept the license
o Choose custom installation
o Choose the volume that will host the installation
17. Overview of deployment options (2 of 2)
In-place upgrade
o Insert the disk or mount the ISO of Windows Server 2022 media and then run Setup.exe
o Choose the architecture (either Standard or Datacenter) with or without Desktop Experience
o Accept the license
o Choose what to keep: personal files and apps, or nothing
18. Demo: Windows Server 2022 Installation
Prerequisite: Create a new virtual machine
Name = RTS-DC1
Generation =Generation 2
Memory = 2048 MB (2GB) recommended 4096 MB (4GB)
Virtual Switch = Name: External. Type: External
VHD: Accept default
ISO: Browse to downloaded Windows Server 2022 ISO file
VirtualBox Demo: https://RTSnetworking.com/demo
19. Servicing channels for Windows Server
You can use servicing channels to choose whether new features and functionality will be delivered regularly
during a server’s production lifespan, or when to move to a new server version
There are two release channels:
o Long-Term Servicing Channel
• A new major version of Windows Server is released every 2-3 years. Users are entitled to 5
years of mainstream support and 5 years of extended support. This channel is appropriate for
systems that require a longer servicing option and functional stability. The Long-Term
Servicing Channel will continue to receive security and non-security updates, but it will not
receive the new features and functionality.
o Semi-Annual Channel
• The Semi-Annual Channel is perfect for customers who are innovating quickly to take
advantage of new operating system capabilities at a faster pace, focused in on containers and
microservices. Windows Server products in the Semi-Annual Channel will have new releases
available twice a year, in spring and fall. Each release in this channel will be supported for 18
months from the initial release.
20. Licensing and activation models for Windows Server
Licensing for Windows Server Standard and Datacenter is based on the number of cores, not processors
Each Windows Server has the following minimum license requirement:
o All physical cores must be licensed
o There must be 8 core licenses per processor
o There must be 16 core licenses per server
Client Access Licenses (CALs) are required for each user or device that connects to the server for any
purpose
22. Licensing and activation models for Windows Server
To ensure that your organization has the proper licenses, you must activate every copy of Windows Server
that you install
Windows Server activation methods:
o Manual activation requires a product key
o Automatic activation options:
• Key Management Services
• Active Directory-based activation
• Multiple Activation Key
• Automatic virtual machine activation
23. Lesson 2 overview
In this lesson, you’ll learn about the differences between Server Core and Windows Server with Desktop
Experience, and when one is the preferred option
Topics
o Server Core vs. Windows Server with Desktop Experience
o Server Core installation and post-installation tasks
o Install features on demand
o Use sconfig in Server Core
24. Server Core vs Desktop Experience
Server Core is a minimal installation option for Windows Server that does not include the traditional
graphical user interface (GUI). Instead, it provides a command-line interface and support for remote
management tools. This makes it a more lightweight and secure option for running server workloads, as it
reduces the attack surface and minimizes the resources required for running the operating system.
Desktop Experience is the full installation option for Windows that includes the GUI and all the features and
tools typically found in a desktop operating system. This installation option is designed for users who need a
more familiar interface and access to applications using a GUI
25. Server Core vs Desktop Experience
The following table lists the major advantages and disadvantages of Server Core
Disadvantages
Advantages
Some applications are not supported on a Server
Core installation.
Small footprint that uses fewer server resources and
less disk space, as little as 4 GB for a basic
installation
Some roles and role services are not available.
Because Server Core installs fewer components,
there are fewer software updates. This reduces the
number of monthly restarts required and the time
required for you to service Server Core.
No local Graphical User Interface (GUI)
The small attack surface makes Server Core much
less vulnerable to exploits.
26. Server Core installation and post-installation tasks
To install Server Core:
Connect to the installation source
Choose:
o Language
o Time and currency
o Keyboard
Select the operating system to install
Accept license
Choose installation type
o Upgrade
o Custom
Choose install disk
Provide admin password
27. Using sconfig in Server Core
sconfig is a menu-based utility that allows you configure Server Core
sconfig eliminates the need for scripting initial configuration settings
29. Module overview
This module introduces you to Active Directory on Windows Server 2022
Lessons
Overview of AD DS (Active Directory Domain Services)
Deploying domain controllers on Windows Server 2022
Implementing Group Policy
30. Lesson 1
In this lesson, you’ll learn about Workgroups, Domains, and Active Directory components.
Topics:
o Understanding workgroups and domains
o Active Directory terms
o Active Directory Domains and Forests
o Understanding Active Directory objects
o Understanding Domain Controllers
o Global Catalog
31. WORKGROUP
No Centralized Authentication
No Centralized Administration
Max of 20 computers supported
Low Security
DOMAIN
Centralized Authentication
Centralized Administration
Unlimited number of computers
High Security
Types of Networks
33. Active Directory Domain Services (AD DS)Terms
AD DS is composed of both logical and physical components
Physical components
Logical components
• Domain Controllers
• Read-only Domain
Controllers
• Domains
• Domain trees
• Forests
• OUs
• Containers
34. AD DS Domains and Forests
A domain:
o A repository for User, Computers and other objects
o A replication boundary
o An administrative boundary
A domain controller is a server that has Active Directory Domain Services (AD
DS) installed
36. AD DS Domains and Forests
A forest:
o Is a security boundary
o One or more domains that share a trust relationship
Trust relationships:
o A relationship between domains that allows access to resources in other
domains within the same forest
37. AD DS Domains and Forests
RTS.COM
INDIA.RTS.COM US.ATLANTIS.COM CA.ATLANTIS.COM
ATLANTIS.COM
40. AD DS objects
User objects
o Authentication of the user at logon
o Access control
Group objects
o Simplify assigning permissions
Computer objects
o Authentication of the computer at startup
41. Organizational Units and Containers
Use containers to group objects within a domain:
o You cannot apply GPOs to containers
o Containers are used for system objects and as
the default location for new objects
Create OUs to:
o Configure objects by assigning GPOs to them
o Delegate administrative permissions
42. Domain Controllers
Domain controllers:
Are servers that host the AD DS database (Ntds.dit) and SYSVOL
Host the Kerberos authentication service and KDC services to perform authentication
Have best practices for:
o Availability:
• Use at least two domain controllers in a domain
43. What is the Global Catalog?
The global catalog:
o Hosts a partial attribute set for other domains in the forest
o Supports queries for objects throughout the forest
In a single domain, you should configure all the domain controllers to hold a copy of the global
catalog
When you have multiple sites, you should also make at least one domain controller at each site a
global catalog server
44. Lesson 2
In this lesson, you’ll learn about configuring Group Policy for client, user, and server administration.
Topics:
What are Group Policy Objects?
Understanding Domain-based Group Policy Objects
Implementing Group Policy Preferences
Implementing Group Policy Inheritance
Group Policy Processing
Using GPupdate
Using GPresult
45. What are GPOs?
Group Policy is a powerful administrative tool
You can use it to enforce various types of settings to a large number of users and computers
Typically, you use GPOs to:
o Apply security settings
o Manage desktop application settings
o Deploy application software
o Manage Folder Redirection
o Configure network settings
47. What are Group Policy Preferences?
Group Policy Preferences are a collection of Group Policy client-side extensions that deliver preference
settings to domain-joined computers.
Preference settings differ from policy settings because users have a choice to alter the administrative
configuration. Policy settings administratively enforce setting, which restricts user choice.
Preferences can be targeted to specific groups, operating systems, IP addresses, MAC addresses, and
more.
48. Group Policy Preferences
F5= Enable all settings
F6= Enable selected setting
F7= Disable selected setting
F8= Disable all settings
49. Overview of GPO scope and inheritance
GPOs are processed on a client computer in the
following order:
1. Local GPOs
2. Site-level GPOs
3. Domain-level GPOs
4. Organizational Unit GPOs
52. GPUpdate
What is GPUpdate?
Gpupdate is a command-line utility from Microsoft that comes with all versions of the Windows operating
system. It’s a utility that controls the application of group policy objects (GPOs) on assignedActive Directory
computers.
Gpupdate /Force will process all GPOs regardless if they have changed or not
53. GPResult
Verify the GPOs that are currently applying to a user and computer account
Examine the settings that apply to the user and computer and determine which GPO applied the setting
54. Lesson 3 overview
In this lesson, you’ll learn about Windows Server administration best practices and the tools used for
management.
Topics
o Overview of the least-privilege administration concept
o Implementing Delegated privileges
o Deploying Jump servers
o Overview of the Windows Server Admin Center
o Exploring Server Manager
o Implementing Remote Server Administration Tools (RSAT)
o Introduction to Windows PowerShell
55. Overview of the least-privilege administration concept
Most security breaches or data loss incidents are the result of human error, malicious activity, or a
combination of both. Least privilege is the concept of restricting access rights for users and computing
processes to only those resources absolutely required to perform their job roles.
The principle states that all users should log on with a user account that has the absolute minimum
permissions necessary to complete the current task and nothing more. Doing so provides protection against
malicious code, among other attacks. This principle applies to computers and the users of those computers.
56. Delegated privileges
Accounts that are members of high-privilege groups such as Enterprise Admins and Domain Admins
need to be guarded, but occasionally non-admins need rights to perform certain functions, such as
resetting passwords or modifying group memberships.
Built-in groups with pre-defined admin rights exist to allow users to perform specific admin tasks. If those
groups do not suit your needs, you can delegate more granular permissions by using the Delegation of
Control Wizard.
o The wizard has pre-defined tasks that can be assigned to users or groups, or custom permissions
can be assigned.
57. Jump servers
A jump server is a hardened server used to access and manage devices in a different security zone, such
as between an internal network and a perimeter network
58. Overview of Windows Admin Center
Windows Admin Center consolidates multiple admin tools into a single console that can be easily
deployed and accessed through a web interface
Windows Admin Center is a modular web application comprised of the following four modules:
o Server manager
o Failover clusters
o Hyper-converged clusters
o Windows 10 and Windows 11 clients
59. Server Manager
Server Manager allows server administrators to:
o Manage the local server and remotely manage multiple servers
o Configure the local server
o Query event logs
o Monitor status of services
o Perform best practice analysis
o Check performance monitors
Server Manager initially opens to the dashboard, which provides quick access to:
o Add roles and features
o Add other servers to manage
o Create a server group
o Connect this server to cloud services
60. Remote Server Administration Tools
To enable IT administrators to remotely manage roles and features in Windows Server from a computer
that is running Windows 11 or Windows 10, use RSAT
RSAT include:
o Active Directory Domain Services tools
o DHCP server tools
o DNS server tools
o File services tools
o Group Policy management tools
61. Windows PowerShell
Windows PowerShell is a command line shell and scripting language
Windows PowerShell cmdlets execute in a Windows PowerShell console or can be executed as
PowerShell scripts
Cmdlets:
o Are small commands that perform specific functions
Modules:
o Cmdlets specific to a product are packaged together and installed as modules
o Some are installed with the product and some need to be added manually
62. Windows PowerShell
PowerShell Console
o Run PowerShell commands and execute scripts
PowerShell ISE
o PowerShell Integrated Scripting Environment (ISE) is a graphical user interface–based tool that
allows you to:
o Run commands, create, modify and execute scripts
Windows PowerShell remote management:
o Allows Windows PowerShell to remotely run cmdlets on other Windows systems
63. Windows PowerShell vs CMD Prompt
CMD Prompt
Ping
Ping rtsnetworking.com
Ping –t rtsnetworking.com
IPconfig
Ipconfig /all
DiskPart utility
Unique syntax only used in DiskPart
PowerShell
Verb-Noun
Test-connection rtsnetworking.com
Test-connection rtsnetworking.com –count 10
Get-eventlog
Get-eventlog –LogName System
66. Lesson 1 overview
Topics:
Overview of the DHCP role
Install and configure the DHCP role
Configure DHCP scopes
DHCP AD DS authorization
DHCP Failover for high availability
67. Overview of the DHCP role
DHCP automates management of IP configuration on clients and devices
DHCP lease renewal is attempted at:
Startup
50% of lease time
87.5% of lease time
68. Install and configure the DHCP role
To install the DHCP role:
Windows Admin Center > Roles and Features
Server Manager
Add-WindowsFeature DHCP -IncludeManagementTools
To manage a DHCP server by using Windows Admin Center, you must install the DHCP PowerShell tools
69. Install and configure the DHCP role
DHCP local security groups:
DHCP Administrators
DHCP Users
To create the DHCP local security groups:
Server Manager > Post-Install Configuration Wizard
Add-DhcpServerSecurityGroup -Computer DhcpServerName
70. Configure DHCP scopes
Properties of a DHCP scope:
Name (mandatory)
IP address range (mandatory)
Subnet mask (mandatory)
Exclusions
Delay
Lease duration
Options
Activation
Name
Option code
Router (Default Gateway)
3
DNS servers
6
DNS domain name
15
71. DHCP AD DS authorization
A DHCP server on Windows Server must be authorized in AD DS to lease IP addresses:
To authorize a DHCP server by using Windows PowerShell, run:
Add-DHCPServerinDC <name or IP address of DHCP server>
A standalone server with DHCP will not lease IP addresses if an authorized DHCP server is detected
Non-Windows DHCP servers and devices will function regardless of authorization
72. DHCP High availability
Split scopes:
Involve two DHCP servers that are configured with non-overlapping scopes
DHCP failover:
Scopes are replicated from one DHCP to another DHCP partner
Strongly preferred to implement high availability for DHCP
Failover configuration modes:
Load balance
Hot standby
74. Lesson 1 overview
Topics:
DNS components
DNS records
DNS zones
Create records in DNS
Configure DNS zones
DNS forwarding
Integrating DNS with Active Directory
75. DNS components
DNS domain names:
Are a portion of DNS namespace
Can be public or private
DNS servers:
Respond to name resolution requests
Stores resource records locally in a database on the DNS server
DNS zones and resource records:
A zone is a local copy of a DNS namespace on a DNS server
Resource records are created and stored in a zone
DNS resolvers:
Request DNS information from DNS servers
Cache results
76. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
3. Recursive Query
4. Determines is the name is local or remote
5. Checks DNS Server cache
6. Iterative Query
7. Response
8. Query .COM
9. Response
10. Placed in DNS Server Cache
11. Resolved named passed to client
78. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
www.RTSnetworking.com
79. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
www.RTSnetworking.com
80. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
3. Recursive Query
www.RTSnetworking.com
81. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
3. Recursive Query
4. Determines is the name is local or remote
www.RTSnetworking.com
82. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
3. Recursive Query
4. Determines is the name is local or remote
5. Checks DNS Server cache
www.RTSnetworking.com
83. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
3. Recursive Query
4. Determines is the name is local or remote
5. Checks DNS Server cache
6. Iterative Query
www.RTSnetworking.com
84. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
3. Recursive Query
4. Determines is the name is local or remote
5. Checks DNS Server cache
6. Iterative Query
7. Response
www.RTSnetworking.com
85. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
3. Recursive Query
4. Determines is the name is local or remote
5. Checks DNS Server cache
6. Iterative Query
7. Response
8. Query .COM
www.RTSnetworking.com
86. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
3. Recursive Query
4. Determines is the name is local or remote
5. Checks DNS Server cache
6. Iterative Query
7. Response
8. Query .COM
9. Response
www.RTSnetworking.com
87. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
3. Recursive Query
4. Determines is the name is local or remote
5. Checks DNS Server cache
6. Iterative Query
7. Response
8. Query .COM
9. Response
10. Placed in DNS Server Cache
www.RTSnetworking.com
88. Local DNS Server
1. Local Client Cache
RTS-Client1
Root
RTSnetworking
185.230.63.186
COM
2. HOSTS file:
C:WindowsSystem32DriversetcHOSTS
3. Recursive Query
4. Determines is the name is local or remote
5. Checks DNS Server cache
6. Iterative Query
7. Response
8. Query .COM
9. Response
10. Placed in DNS Server Cache
11. Resolved named passed to client
www.RTSnetworking.com
89. DNS records
Forward lookup zones include:
Host (A)
Host (AAAA)
Alias (CNAME)
Service location (SRV)
Pointer (PTR)
90. Create records in DNS
Manual creation methods:
Windows Admin Center
DNS manager
Windows PowerShell
Dynamic creation:
Clients register name and IP address in a zone
91. DNS zones
A DNS zone is the portion of a DNS
namespace hosted on a DNS server:
Forward lookup zones:
o Resolve names to IP addresses
o Can contain many other record types
Reverse lookup zones:
o Resolve IP addresses to names
o Are in the in-addr.arpa namespace
92. DNS zones
Primary zones:
o Are authoritative for a portion of a DNS namespace
o Are where resource records are created
Secondary zones
o Read-only copies of primary zones
Stub zones
o contain only the records required to locate and communicate with name servers
Active Directory-integrated zones
o Can only reside on domain controllers
o Replicates with active directory
94. DNS Forwarding
Forwarders:
Receive DNS requests, and forward requests for zones for which it is not authoritative
Are common for external name resolution
Conditional forwarders:
Forward requests for a specific domain anme
Typical between partners and trusted organizations
Stub zones:
Have a similar role to conditional forwarders
Are used within the same company
Requires configuration on both DNS Servers
97. Module Overview
This module describes how to configure file servers and storage in Windows Server:
Lessons:
o Volumes and file systems in Windows Server
o Implementing sharing in Windows Server
o Implementing Storage Spaces in Windows Server
o Implementing Data Deduplication
o Deploying Distributed File System
98. Lesson 1 Overview
This lesson describes file systems security in Windows Server:
Topics:
o Overview of File Systems in Windows Server
o Understanding File and Folder level security
o Managing NTFS permissions
o Managing Share permissions
o Managing Permission inheritance
o File Server Resource Manager (FSRM)
o Implementing Quotas
o Implementing File Screens
99. Overview of file systems in Windows Server
When selecting a file system, consider the differences between FAT, NTFS file system, and ReFS:
FAT/FAT32 provides:
o Basic file system
o No Security
o exFAT developed for flash drives
NTFS provides:
o Auditing
o Security (permissions and encryption)
o Compression
ReFS provides:
o Backward compatibility support for NTFS
o Enhanced data verification and error correction
o Support for larger files, directories, and volumes
100. File and Folder Level Security
Read
Read and Execute
Write
Modify
Full Control
List Folder Contents
104. Overview of File Server Resource Manager
• Create quotas to monitor and limit the amount of space consumed
• Use a file screen to monitor and block files based on the file extension
106. Lesson 2 Overview
This lesson describes file systems and volumes in Windows Server:
Topics:
o Overview of Disk Volumes
o Basic and Dynamic Disk types
o RAID
107. Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
108. Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
109. Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
110. Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
111. Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
112. Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
113. Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
114. Overview of disk volumes
When selecting a type of disk for use in Windows Server, you can choose between:
Basic disk
Dynamic disk
In Windows Server, if you are using dynamic disks, you can create a number of different types of disk
volumes:
Simple volumes
Spanned volumes
Striped volumes
Mirrored volumes
RAID-5 volumes
115. Lesson 3 Overview
This lesson describes storage spaces in Windows Server:
Topics:
o What are Storage Spaces
o Storage Spaces usage scenarios
116. What are Storage Spaces?
Use Storage Spaces to:
Add physical disks of any type and size to a storage pool
Create highly-available virtual disks from the pool:
o To create a virtual disk, you need:
• One or more physical disks
• A storage pool that includes the disks
• Virtual disks (or storage spaces)
that are created with disks from the
storage pool
• Disk drives that are based on
virtual drives
Physical disk
Storage pool
Virtual disk
Disk drive
117. Storage Spaces usage scenarios
Storage Spaces was designed to enable storage administrators to:
Implement and easily manage scalable, reliable, and inexpensive storage
Use inexpensive storage with or without external storage
Combine multiple drives into storage pools that administrators can manage as a single entity
Implement different types of storage in the same pool
Grow storage pools as required
Provision storage as required from existing storage pools
Designate specific drives as hot spares
118. Lesson 4: Overview
This lesson describes how to implement the Data Deduplication feature:
Topics:
o Data Deduplication components
o Data Deduplication process
o Deploying Data Deduplication
o Backup and restore considerations with Data Deduplication
119. Data Deduplication
• Data Deduplication, often called Dedup for short, is a feature that can help reduce the impact of
redundant data on storage costs.
• When enabled, Data Deduplication optimizes free space on a volume by examining the data on the
volume by looking for duplicated portions on the volume.
• Duplicated portions of the volume's dataset are stored once and are compressed for additional
savings.
123. Data Deduplication
5. Replace the original file stream of now optimized files with a reparse point to the chunk store
124. Deploy Data Deduplication
Prior to installing and configuring Data Deduplication in your environment, plan your deployment using the
following steps:
1. Determine target deployments (the drive to which you want to deploy dedpup)
2. Determine which volumes are candidates for deduplication
3. Evaluate savings with the Deduplication Evaluation Tool
4. Plan the rollout and deduplication policies
125. Deploy Data Deduplication
After completing your planning, deploy Data Deduplication to a server in your environment by performing
the following steps:
1. Install Data Deduplication components on the server
2. Enable Data Deduplication
3. Configure Data Deduplication jobs
4. Configure Data Deduplication schedules
126. Backup and restore considerations with Data Deduplication
One of the benefits of using Data Deduplication is that backup and
restore operations typically are faster
127. Lesson 5: Overview
This lesson describes how to manage DFS databases
Topics:
o Understanding DFS namespace
o Understanding DFS Replication
o Implement DFS namespace and replication solutions
128. DFS namespaces
DFS namespaces can be configured as:
o Domain-based namespaces
o Standalone namespaces
129. DFS Replication
Three DFS scenarios:
Branch office Hub site or branch office
Sharing files
across branch
offices
Branch office Hub site
Data collection
Branch office Hub site
Data distribution
131. Lesson 1 Overview
This lesson provides an overview of Hyper-V :
Topics:
o Understanding Hyper-V
o Hyper-V manager
o Best practices for Hyper-V configurations
132. Overview of Hyper-V
Hyper-V is a hardware virtualization server role available for Windows Server
Provides a software layer known as the Hypervisor, used to control access to physical hardware
Supports many types of guest operating systems including:
o All supported Windows versions
o Linux
General Hyper-V features can be grouped as follows:
o Management and connectivity
o Portability
o Disaster recovery and backup
o Security
o Optimization
134. Overview of Hyper-V
System requirements for installing the Hyper-V server role include:
o A 64-bit processor
o Sufficient memory
o Intel Virtualization Technology (Intel VT) or Advanced Micro Dynamics (AMD) Virtualization
(AMD-V) enabled
To verify you meet the requirements, run MSINFO32
Methods to install the Hyper-V server role include:
o Server Manager
o Install-WindowsFeature PowerShell cmdlet
135. Overview of Hyper-V Manager
A graphical user interface used
to manage both local and
remote Hyper-V host machines
Other management tools
include:
o Windows PowerShell
o Windows Admin Center
136. Best practices for configuring Hyper-V hosts
Consider the following when provisioning Windows Server as a Hyper-V host:
o Provision the host with adequate hardware
o Deploy virtual machines on separate disks, solid state drives
o Do not collocate other server roles
o Manage Hyper-V remotely
o Run Hyper-V by using a Server Core configuration
137. Overview of nested virtualization
Provides the ability to install the Hyper-V role within a guest virtual machine
Requirements:
o Both the Hyper-V host and the guest virtual machine must be Windows Server 2016 or later
o Sufficient amount of static RAM
Set-VMProcessor -VMName <VMName> -ExposeVirtualizationExtensions $true
138. Lesson 2 Overview
This lesson describes configuring virtual machines:
Topics:
o Configuring VMs
o VM Settings
o Virtual Hard Disks
o Virtual Networking
o Managing Checkpoints
139. VM generation versions
Generation 1 VMs:
o Support 32 and 64-bit operating systems
o Only support boot volumes a maximum of 2 TB
o Supports legacy BIOS
Generation 2 VMs:
o Support only 64-bit operating systems
o Support secure boot and shielded VMs
o Support boot volumes a maximum of 64 TB
o Supports Unified Extensible Firmware Interface (UEFI)
140. VM settings
VM settings are grouped into
two main areas:
o Hardware
o Management
Available hardware components
depend on the generation
version of the VM
Generation 1 settings
Generation 2 settings
141. Storage options in Hyper-V
Consider the following factors when planning storage for virtual hard disks:
o High-performance connection to storage
o Redundant storage
o High-performance storage
o Adequate growth space
142. Virtual hard disk formats and types
Virtual hard disk formats include:
o VHD
• Up to 2040 GB in size
• Typically used to support older Hyper-V versions
o VHDX:
• Up to 64 TB in size
• Recovery from corruption issues
• Supports larger block size resulting in increased performance
Use the Edit Virtual Hard Disk Wizard to convert between hard disk formats
Various tools can be used to create and mange virtual hard disks:
o Hyper-V Manager
o Disk Management/Diskpart
o PowerShell (New-VHD)
o Windows Admin Center
143. Virtual hard disk formats and types
Description
Type of disc
Allocates all of the hard disk space immediately
Fixed
The disk only uses the amount of space that
needs to be allocated, and it grows as necessary
Dynamic
Associated with another virtual hard disk in a
parent-child configuration. Any changes made to
the differencing disk does not affect the parent
disk.
Differencing
Allows the virtual machine to connect directly to
an Internet Small Computer Systems Interface
(iSCSI) (logical unit number) LUN or a physical
disk attached on the host machine
Pass through
144. Overview of Hyper-V networking
Description
Virtual switch type
Provides external access outside of the host machine by mapping to a
network adapter in the host, which is used for communication.
External
Used to communicate between the virtual machines on a host server
and to communicate between the virtual machines and the host itself
Internal
Used to only communicate between virtual machines on a Hyper-V
host, but does not allow communication with the host itself
Private
Hyper-V supports three types of virtual switches:
145. Manage VM states and checkpoints
A VM can be in one of the following
states:
o Off
o Starting
o Running
o Paused
o Saved
146. Manage VM states and checkpoints
Checkpoints:
o Allows you to take a snapshot of a
virtual machine at a specific point
in time
o Two types of checkpoints
• Production checkpoints
• Standard checkpoints
o Maximum of 50 checkpoints per
virtual machine allowed
148. Lesson 1 overview
In this lesson, you’ll learn about Windows Print Server management, security, and performance capabilities
and configurations.
Topics:
o Windows Print Server
o How a Windows Print Server works
o Windows Print Server Best Practices
o Type 3 vs Type 4 Printer
o Print Permissions
o Print Pooling
o Print Priority
149. A Windows print server is a computer that manages printers and makes them available to print clients on a
network. It acts as a central point for managing print jobs and printer settings.
Benefits of using a Windows print server
There are several benefits to using a Windows print server, including:
•Centralized management: A print server provides a central location for managing all of the printers on a
network. This makes it easier to install and configure printers, update printer drivers, and troubleshoot
printing problems.
•Improved performance: A print server can improve the performance of printing by spooling print jobs and
sending them to printers in an efficient manner.
•Security: A print server can help to improve the security of printing by restricting access to printers and
printer settings.
•Scalability: A print server can be scaled to support a large number of printers and users.
Windows Print Server
150. When a user sends a print job to a print server, the print server spools the print job and then sends it to the
appropriate printer. The print server also monitors the status of printers and print jobs, and it can notify
users if there are any problems.
Deploying a Windows print server
To deploy a Windows print server, you will need to:
1. Install the Print Server role on a Windows server.
2. Add printers to the print server.
3. Configure printer settings and permissions.
4. Point print clients to the print server.
How a Windows Print Server works
151. Best practices for using a Windows print server
•Use a dedicated print server: If possible, use a dedicated server for printing. This will help to improve the
performance and reliability of printing.
•Keep printer drivers up to date: Make sure to keep the printer drivers on the print server and print clients
up to date. This will help to prevent printing problems.
•Configure printer permissions carefully: Carefully configure printer permissions to restrict access to printers
and printer settings. This will help to improve the security of printing.
•Monitor printer usage: Monitor printer usage to identify printers that are not being used frequently and to
identify printers that are experiencing a high volume of print jobs. This information can be used to make
informed decisions about printer placement and configuration.
Windows Print Server Best Practices
153. Print Permissions
On Windows systems, there are three levels of print permissions:
•Print: This permission allows users to connect to the printer and print, pause, resume, start, and cancel their
own documents.
•Manage Documents: This permission allows users to control job settings for all documents and to pause,
restart, and delete all documents.
•Manage Printer: This permission allows users to pause and restart the printer, change spooler settings,
share a printer, adjust printer permissions, and change printer properties.
By default, all users on a network have the Print permission. However, system administrators can change
these permissions to restrict access to certain printers or to allow users to perform only certain printing
tasks.
157. Lesson 1 overview
In this lesson, you’ll learn about Windows Server backup and restore capabilities and the integration with
Azure Backup
Topics:
o Overview of Windows Server Backup
o Implement backup and restore
o Back up and restore Hyper-V VMs
o Overview of Azure Backup
158. Overview of Windows Server Backup
Windows Server Backup provides you with the ability to perform
backup and recovery in a Windows Server environment
By using Windows Server Backup you can backup:
• A full server (all volumes), or just selected volumes
• Individual files and folders
• System state
• Individual virtual machines on a Hyper-V host
WBAdmin is a command-line utility built into Windows Server
159. Implement backup and restore
Depending on what you need to backup, the procedures and options in Windows Server Backup might vary
Some of the most common backup procedures that you should consider include:
• Backing up file servers and web servers
• Backing up AD DS
• Backing up Microsoft Exchange Server
160. Back up and restore Hyper-V VMs
You can use the following methods to back up VMs:
• Backup the VM from the host
• Backup the VM’s VHDs
• Backup inside the VM
You can perform online backups that do not incur VM downtime, if you meet the following conditions:
• The VM being backed up has integration services installed and enabled
• Each disk that the VM uses is running NTFS file system basic disks
• The VSS is enabled on all volumes within the VM
161. Overview of Azure Backup
Azure Backup is a subscription service that you can use to provide off-site protection against critical data
loss caused by disasters
Azure Backup replaces or extends your existing on-premises or off-site backup solution
Some of the most important features in Azure Backup include:
• Automatic storage management
• Unlimited scaling
• Data encryption
• Offload on-premises backup
• Back up Azure VMs
162. Implement backup and restore with Azure Backup
To use Azure Backup, you need to install a
backup agent on your local servers, and you
need to configure an Azure Recovery Services
vault
You can use Recovery Services vaults to hold
backup data for various Azure services such as
VMs (Linux or Windows) and Azure SQL
databases
Within an Azure subscription, you can create up
to 25 Recovery Services vaults per region
Azure Backup for files and folders relies on the
Azure Recovery Services agent to be installed on
the Windows client or server
164. Lesson 1 overview
This lesson describes Windows Server Update Service (WSUS).
It provides infrastructure to download, test, and approve updates which help block attacks
Topics:
o Overview of Windows Update
o What is WSUS?
o WSUS Requirements
o WSUS Deployment Options
o WSUS Administration Console
o Managing Updates
o Configuring Clients
165. Overview of Windows Update
Windows Update is a Microsoft service that provides updates for Microsoft software
Orchestrator on devices scans for and downloads updates
Clients and servers can be configured to get updates from the Windows Update Services server
166. What is WSUS?
WSUS provides an infrastructure for managing updates for Windows devices
WSUS allows you to:
Choose the updates you want to download
Test updates before broad deployment
Choose which devices get updates and when they receive them
Track status of updates
168. WSUS Requirements
Prerequisites:
1.4 gigahertz (GHz) or faster x64 processor
2 gigabytes (GB) of random-access memory (RAM) or greater (above that needed for other roles)
10 GB or greater
100 megabits per second (Mbps) or greater network adapter
.NET Framework 4.0
Microsoft Report Viewer Runtime 2012
Windows Internal Database or Microsoft SQL Server Microsoft
Update
169. WSUS server deployment options
WSUS implementation:
Single server
Multiple servers
WSUS hierarchies:
Autonomous mode
Replica mode
WSUS database:
Windows Internal Database
SQL Server database
Microsoft
Update
170. WSUS Administration Console
You can use the WSUS Administration console to:
Manage updates
Configure computer groups
View computer status
View synchronization information
Configure and view WSUS reports
Configure WSUS settings and options
171. Computer Groups
You can use computer groups to organize
WSUS clients
The default computer groups include:
You can create custom computer groups to control
how updates are applied
172. Managing Updates
Updates can be:
Approved automatically, but it is not recommended
Declined if they are not needed
Removed if they cause problems
Updates should be tested before they are approved for production
173. Configuring Clients to use WSUS
Use a GPO to:
Configure automatic updates
Specify intranet Microsoft update service location
To use Automatic Maintenance for installing updates on computers running Windows 8 and Windows
Server 2012 and later, configure a GPO to:
Enable automatic updates with the following option:
4 - Auto download and schedule the install
175. Lesson 1 overview
Topics:
o VPN scenarios
o Options for VPN tunneling protocols
o VPN authentication options
o Configure a VPN Server
176. VPN Scenarios
A VPN provides a point-to-point connection between a private network’s components by using a public
network, such as the Internet.
177. Options for VPN tunneling protocols
Firewall access
Tunneling protocol
TCP port 1723
PPTP
UDP port 500, UDP port
4500 and UDP port 1701
L2TP/IPsec
TCP port 443
SSTP
UDP port 500
IKEv2
Windows Server supports four VPN tunneling protocols.
178. VPN authentication options
Security level
Description
Protocol
The least secure authentication protocol. Does
not protect against replay attacks, remote
client impersonation, or remote server
impersonation.
Uses plaintext passwords. Typically used if the remote access
client and remote access server cannot negotiate a more
secure form of validation.
PAP
An improvement over PAP in that the password
is not sent over the PPP link.
Requires a plaintext version of the password to
validate the challenge response. Does not
protect against remote server impersonation.
A challenge-response authentication protocol that uses the
industry-standard MD5 hashing scheme.
CHAP
Provides stronger security than CHAP.
An upgrade of MS-CHAP. Provides two-way authentication,
also known as mutual authentication. The remote access
client receives verification that the remote access server to
which it is dialing in to has access to the user’s password.
MS-CHAPv2
Offers the strongest security by providing the
most flexibility in authentication variations.
Allows for arbitrary authentication of a remote access
connection through the use of authentication schemes,
known as EAP types.
EAP
183. Lesson 2 overview
Topics:
What is failover clustering?
High availability with failover clustering
Failover clustering components
Cluster quorum in Windows Server
Considerations for planning failover clustering
184. What is failover clustering?
Failover clustering is a group of computers that work together to increase the availability and scalability of
clustered roles
The clustered servers (called nodes) are connected by physical cables and by software
If one or more of the cluster nodes fail, other nodes begin to provide service in a process known as
failover
Clustered roles are proactively monitored to verify that they are working properly
If they are not working another node in the cluster runs the workload
185. High availability with failover clustering
Availability is a level of service expressed as a percentage of time
Highly available services or systems are available more than 99 percent of the time
Planned outages typically are not included when calculating availability
186. Failover clustering components
Node 1 Node 2
Shared bus or
iSCSI connection
Service or
application
Cluster storage
The dedicated network
connects the failover nodes
Clients
Service or
application
The network
connects the
failover cluster
and the clients
187. Cluster quorum in Windows Server
In failover clusters, quorum defines the consensus that enough cluster members are available to provide
services.
Quorum:
Is based on votes in Windows Server
Enables nodes, file shares, or a shared disk to have a vote, depending on the quorum mode
Enables the failover cluster to remain online when sufficient votes are available
188. Configure quorum options
Use dynamic quorum mode with:
A disk witness
A file share witness
The Azure Cloud Witness
Use all other quorum modes only in specific use cases
The default and recommended best practice is to always use dynamic quorum
189. Lesson 3 overview
Topics:
The Validation a Configuration Wizard and cluster support policy requirements
Create a failover cluster
Configure storage
Configure networking
Configure quorum options
Configure roles
Manage failover clusters
Configure cluster properties
190. The Validate a Configuration Wizard and a cluster support policy
requirements
The Validate a Configuration Wizard is used to perform a variety of tests to ensure the cluster components
are configured in a supportable manner.
Before creating a new failover cluster, confirm the configuration to ensure all validation tests are passed.
Cluster validation is intended to:
Ensure clustering is working properly
Find hardware or configuration issues
Perform diagnostic tests
Ensure requirements for:
o Hardware
o Network/Infrastructure
o Software
191. Create a failover cluster
To create a failover cluster, you’ll need to:
Verify the prerequisites
Install the Failover Clustering feature on each node
Run the Validate a Configuration Wizard
Create the cluster using:
o The Create Cluster Wizard, or
o Windows Admin Center
Create clustered roles
192. Configure storage
Failover clusters require shared storage to provide consistent data to a virtual server after a failover
Shared storage options include:
SAS
iSCSI
Fibre Channel
Shared .vhdx
Clustered storage spaces can also be implemented to achieve high availability at the storage level
193. Configure networking
To configure networking:
The network hardware must be compatible with Windows Server
In the network infrastructure that connects your cluster nodes, avoid having single points of failure
194. Configure roles
To configure roles:
1. Install the Failover Clustering feature
2. Verify the configuration
3. Create a cluster
4. Install the role on all cluster nodes by using Server Manager
5. Create a clustered application by using the Failover Clustering Management snap-in
6. Configure the application
7. Test the failover
195. Manage failover clusters
To manage failover clusters:
Add nodes after you create a cluster
Pause nodes, which prevent resources from running on that node
Evict nodes from a cluster, which removes the node from the cluster configuration
These actions are available in the Failover Cluster Management Console, in the Actions pane
196. Configure failover and failback
To control how the cluster responds, adjust the failover and failback settings.
Include preferred owners
Considerations for using preferred owners:
Set preferred owners are set on the clustered role
Set multiple preferred owners can be set in an ordered list
Setting preferred owners gives control over:
o The order in which a role selects a node to run
o The roles that can be run on the same nodes
Options to modify failover and failback settings:
o Setting the number of times the Cluster service restarts a clustered role in a set period
o Setting or preventing failback of the clustered role to the preferred node when it becomes
available
198. Module Overview
Overview of Windows Server monitoring tools
Using Performance Monitor
Monitoring event logs for troubleshooting
199. Lesson 1: Overview
Overview of Task Manager
Overview of Resource Monitor
Overview of Performance Monitor
Overview of Reliability Monitor
Overview of Event Viewer
200. Overview of Task Manager
Task Manager helps you to identify and resolve performance-related issues
201. Overview of Resource Monitor
Resource Monitor provides an in-depth understanding at the real-time performance of your server
202. Overview of Performance Monitor
Performance Monitor enables you to observe current performance statistics or to study historical data that
Data Collector Sets have gathered
203. Overview of Reliability Monitor
Reliability Monitor monitors hardware and software issues that occur during the selected time interval and
assigns a number called the stability index that indicates the server’s reliability
204. Overview of Event Viewer
Event Viewer provides categorized lists of essential Windows log events and log groupings for individual
installed applications and specific Windows component categories
206. Lesson Overview
In this lesson, you’ll learn about Azure and Microsoft Entra ID
Topics
o What is Azure?
o Understanding Microsoft Entra ID (formerly Azure Active Directory)
o Microsoft Entra ID versus Active Directory Domain Services (AD DS)
o What is Microsoft Entra ID Connect?
207. What is Azure?
Azure is a cloud computing platform provided by Microsoft that offers a wide range of services to help
individuals and businesses build, deploy, and manage their applications and services.
Think of Azure as a collection of powerful tools and resources that are available to you over the internet.
Instead of buying and maintaining your own servers and infrastructure, Azure allows you to use Microsoft's
infrastructure and services to run your applications and store your data.
Here are a few key aspects of Azure:
Overall, Azure simplifies the process of building, deploying, and managing applications by providing a
comprehensive set of services that are accessible over the internet. It helps you focus on your core business
objectives without worrying about the underlying IT infrastructure.
Scalability:
Storage and Backup:
Virtual Machines:
Web and Mobile Apps
AI and Machine Learning
Security and Compliance
208. Understanding Microsoft Entra ID?
Microsoft Entra ID is Microsoft’s cloud-based identity and access management service, which helps your
employees sign in and access resources in:
•External resources, such as Office 365 and thousands of other applications.
•Internal resources, such as apps on your corporate network and intranet, along with any cloud apps
developed by your own organization.
Entra
209. Microsoft Entra ID versus Active Directory Domain Services (AD DS)
What it's used for
Structure
Authentication
Service
Internet-based services and applications like
Office 365, Azure services, and third-party
SaaS applications
Tenants
Includes SAML, OpenID
Connect (based on OAuth),
WS-Federation
Microsoft Entra ID
Authentication and authorization for on-
premises printers, applications, file services,
and more
Forests, domains,
organizational units
Kerberos, NTLM
Active Directory Domain
Services
210. What is Microsoft Entra Connect?
Microsoft Entra Connect is the Microsoft tool that allows accounts from your Active Directory Domain
Services in your on-premise environment to synchronize to Microsoft Entra ID:
211. Thank you for attending
• Microsoft Azure
• Microsoft 365
• Active Directory
• Group Policy
• Security
• Hyper-V
• Powershell
• Networking
• ChatGPT