Lesson Configuring Remote Desktop to Administer a Server

What Is Remote Desktop for Administration Why Use Remote Desktop for Administration What Are the Requirements for Remote Desktop Service What Are Client Preferences for Remote Desktop Connection Remote Desktop Connection vs. Remote Desktops How to Conned to a Remote Seiver Guidelines for Using Remote Administration Tools Introduction This lesson explains how to configure Remote Desktop for Administration and how to configure the client to allow access to the servers by using Remote Desktop for...

Lab A Implementing Printing

Install printers Set printer locations Objectives After completing this lab, you will be able to Install printers. Set printer locations. Instructions Before you begin this lab, log on to the domain by using the Note This practice focuses on the concepts in this lesson and as a result may not comply with Microsoft security recommendations. For example, this practice does not comply with the recommendation that users log on with domain user account and use the Run as command when performing...

How to Configure Timeout Settings for Remote Connections

Yo u r in structo r wi I i demo n strate how to configure timeout settings tor Remote Connections Introduction Using timeout settings can help you manage server resources. After you set up session connection limits, you can run server administration more efficiently. Timeout settings For example, another administrator left for a two-week vacation and forgot to e*amp e log off a remote connection. If you configured the timeout settings, that connection is automatically logged off after a...

What Is Task Manager

nogrsms and processes funning sn your computer You computer's sarformarce - adynamic overview fCcnxa Frau 1 ta nra Hmrtrinp Lui C*uea H JTT > J Tir-tal-TJiSrf.l Tnu fif. T V )- QUO** JUJ M v. v in t-Jw-ind Cn-nwi ijm Hi. Jf'Jr -Vi ltiKT IJ Tv mH - Dtfli jfi *S - iv uiKsn . mt Number rt users mir.ected to the compute' what they aits waking cn and slews sdnriisTaters 'o sertf a _ message Introduction Task Manager provides an overview of system activity and performance. It provides information...

Practice Using Offline Caching

Create a shared folder with no caching for documerts or programs In this practice, you will create a shared folder and use different caching options. Log on to the domain as ComputerName Admin. Note You cannot use the Run as command with Windows Explorer, so you must log on as ComputerName.Admin to have the permissions that you need to complete this practice. Review the procedures in this lesson that describe how to perform this task. The Human Resources department wants you to configure a...

Lab A Using Group Policies Reports

After completing this lab, you will be able to Create a report by us ng the Group Policy Modeling Wizard Verify that policy setting were applied by using the Group Policy Results Wiiard Objectives After completing this lab, you will be able to Create a report by using the Group Policy Modeling Wizard. Verify that policy settings were applied by using the Group Policy Results Wizard. Instructions Before you begin this lab Log on to the domain by using the ComputerNameUser account. Open CustomMMC...

How to Create a Computer Account

Your instructor will demonstrate how b Create a computer account by using Active Directory Users and Computers Create a compute account by using dsadd introduction By default, members of the Account Operators group can create computer accounts in the Computers container and in new organizational units. However, they cannot create computer accounts in the Builtin, Domain Controllers, ForeignSecurityPrincipals, LostAndFound, Program Data, System, or Users containers. Procedure To create a...

User Account Password Options

Unit must change theii nsmrdsHenexl lime they log (in to the itefworh A user dees nol have the psmissions fc ctiangc (hcirctti* password A user password is p-evented tior expiring A usor cannol tog on by using the selected asccunt Introduction As a systems administrator, you can manage user account password options. These options can be set when the user account is created or in the Properties Password options The administrator can choose from the following password options to protect User must...

Practice Monitoring Server Memory

In this practice, you will configure System Monitor to monitor selected memory counters Objective In this practice, you will configure System Monitor to monitor selected memory Scenario You are the systems administrator for an organizational unit on a large network. Recently, you installed an application on a server. Since you installed the application, users are complaining that the system appears to slow down gradually. You want to monitor memory to determine whether a memory leak is causing...

What Is a Partition

A physical dish is divided into separate sections called partitions PartitionIng can create up to 24 drive tetters Disk must first be initialized and foimattea before partitioning Basic disks can have up to and gn e Extended partitqn E ilerufsd partitions can b subdivided Into logical drives Piintary partition cannot be subdivided Disk partitioning is a way to divide a basic physical disk into sections so that each section, or partition, functions as a separate unit. You can use partitioning to...

Lesson Managing Printer Drivers

* What la a Printer Driver How to Install Printer Drivers How to Add Printer Drivers for Other Client Operating Systems Introduction This lesson introduces you to the skills and knowledge that you need to manage Lesson objectives After completing this lesson, you will be able to Explain what a printer driver is. Install new or updated printer drivers. Add printer drivers for other client operating systems. Software that com pule r programs use o communicate with printers and platters Translates...

What Is Delegation of Control of an Organizational Unit

Assigning the responsibility of managing an c rga n izatic nal u n it to a noth er u ser o r grou p Eases the derail a3rninis native urdei of a by districting routine aminiaxative tasks Provides jaera orgrcups in cur rgaii atior mirs corlrai over heal networi ounces Helps to eliminate the need tor multiple acministnatw accounts tnat have broad authority, sich as for an entiie domain Definition Delegation of control is the ability to assign the responsibility of managing Active Directory objects...

What Are Domain Local Groups

Mixed mode User accounts and global g'OLps from any domain Native mode Jsef acoonrls. global groups, and ur ersal gr ujs from any domain in Hie foresl, ard domain losal groups from Ihe same comsin Native mode Iionain local grojps ir saTie domain Domain tn which he n fccal g'aup belongs Characteristics of domain local groups A domain local group is a security or distribution group that can contain universal groups, global groups, other domain local groups that are from its own domain, and...

Lesson Using Security Templates to Secure Computers

What Is a Security Policy What Are Security Templates What Are Security Template Settings How to Create a Custom Security Template * How to Import a Security Template Introduction You can create security templates to create a security policy and alter a security policy to meet the security needs of your company. You can implement security policies in several different ways. The method you use depends on your organization's size and security needs. Smaller organizations, or those not using...

Lesson Saving Queries

What Is a Saved Query How to Cr ate a Saved Query Introduction You can use saved queries to quickly and consistently access a common set of Active Directory objects that you want to perform specific tasks on or monitor. Lesson objectives After completing this lesson, you will be able to Explain what a saved query is. Create a saved query. Introduction Active Directory Users and Computers has a Saved Queries folder in which you can create, edit, save, and organize saved queries. Before saved...

Multimedia The Primary Server Subsystems

Server environments described in this presentation file and print servers, application servers, and domain servers Server subsystems memory, processor, disk, and network Which subsystem has the greatest effect on each server environment File location To view the The Primary Server Subsystems presentation, open the Web page on the Student Materials compact disc, click Multimedia, and then click the title of the presentation. Do not open this presentation unless the instructor tells you to....

Practice Using Device Driver Rollback

In this practice, you will roil back to a previous version of a driver In this practice, you will roll back to a previous version of a device driver. You are the systems administrator for an organizational unit on a large network. A user in the organization downloaded an unsigned driver from the Internet and installed it, which has caused the mouse on the computer to stop working. You must roll back to the previous version of the driver. 1. Log on to the nwtraders domain as ComputerUser with a...

Who Can Back Up Data

You must have certain permissions or user rights Only adrrinistrators. backup operators, and server operator groups are allowed to back up data by default on local server* Or you must be the owner of 1he ires and fsiders yoL want to back 141 Or yon must have ore w nrore jf t se pemiiKions Read. Rsad ti-id -trxeLiulu. Modiv. i* Fu I Cstrad You car riot back up your files if there are disk quota restrictions Access to backup files can also be restricted * For security, backup and restore rights...

Lesson Scheduling Printer Availability

When to Schedule Printer Availability Guidelines For Scheduling Printer Availability How to Schedule Printer Avail ability Introduction This lesson introduces you to skills and knowledge that you need to schedule Lesson objectives After completing this lesson, you will be able to Explain when to schedule printer availability. Describe the guidelines for scheduling printer availability. Schedule printer availability. When to Schedule Printer Availability Schedule printer availability Id print...

What Is the Purpose of a Mounted Drive

Adds volumes to systems without adding separate drive letters for each new volume Disk Management assigns a drve path to the drive rattier than a d'ive letter D'ive paths retain (heir association to the drive Add or rearrange storage devices without the drive path failing increases number of drives, not storage space Manages data storage based on work environment and system usage Create multiple mounted drives per volume Using NTFS mounted drives is a convenient way to add volumes to a computer...

Why Monitor Disks

Monitor disks to deterrnine Presence of disk bottlenecks Need for disk del rag men tat on Need for additional or faster disks Presence of eicce& alvo paging Disk efficiency Introduction Monitor disks to keep your systems working efficiently. You can also use the data that you collect when you monitor disks to plan for future hardware and software upgrades. Disk bottlenecks The existence of a disk bottleneck is indicated by the presence of all of the Sustained rate of disk activity well above...

What Is ntbackup

In addition to Backup, Windows Server 2003 provides a command-line tool, ntbackup, that you can use to back up and restore data. You can perform backup operations from a command prompt or from a batch file by using the ntbackup command, followed by various parameters. There are two important limitations to using batch files to back up your data When you use the ntbackup command, you must back up entire folders only. You cannot designate individual files for backup. However, you can designate a...

How to Modify User and Computer Account Properties

Your instructor will demonstrate how to modify user and computer accounts Introduction As a systems administrator, you must be able to modify user and computer account properties to manage the network efficiently. Procedure To modify user and computer accounts 1. In Active Directory Users and Computers, in the console tree, navigate to the container that contains the user or computer account that you want to modify. 2. In the details pane, select the user or computer account that you want to...

Practice Creating User Accounts

Create a local user account by using Computer Management Create a domain account by using Active Directory Users and Computers Create a domain user account by using Run as Create a domain user account by using dsadd Create a local user account by using Computer Management. Create a domain account by using Active Directory Users and Computers. Create a domain user account by using Run as. Create a domain user account by using dsadd. Log on to the student computer by using the ComputerNameUser...

How to Create a Simple Volume

Your instructor will demonstrate how to Create an a pimple volume by using Disk Management Create a si mpl e volurn e by u sin g Disk Pa rt Procedure for creating a simple volume by using Disk Management Procedure for creating a simple volume by using DiskPart Create a single volume on a dynamic disk if you plan to expand the volume in the future. To create a simple volume by using Disk Management 1. In Computer Management, open Disk Management. 2. Right-click the unallocated space on the...

Practice Managing File Compression

In this practice, you will Compress fattens Move and copy compressed filas and folders and track the results Move and copy compressed files and folders, and track the results. Identify the effects of moving and copying compressed files and folders. You are the systems administrator for an organizational unit on a large network. The accounting department manager complains to you about the amount of free disk space left on his server's hard disk drive. He wants at least 20 percent more free space...

Classroom Setup Review

The classroom is configured as one Windows Server 2U03 domain nwlradm.msft London is a dcm a in controller and the instructor computer Glasgow is a member server and is used as a remote computer for student labs * Student computers are running Windows Server 2Q03. Enterprise Edition Each student computer has an organizational unit Students are administrators for their server and organization 4 unit Introduction Now that you have been introduced to the basic components of an Active Directory...

Organization unit

Course files There are files associated with the labs and practices in this course. The lab files for Unit 1 are located in the C MOC 2274 folder on the student computers. The lab files for Unit 2 are located in the C MOC 2275 folder on the student computers. Classroom setup The classroom configuration consists of one domain controller and multiple student computers. Each computer is running Windows Server 2003, Enterprise Edition. The name of the domain is nwtraders.msft. It is named after...

Offline File Caching Options

J You Cdn choc ic whether -ard how Jhe cwtenls o 11 he - ie vd be I ivflilstJ* lio us* Mxi offW* , O J- m IKy i -j J -ji' V dlli * Al lies and picgrwe figi ueeie apon lr rr the share mS be outcmdlicaty WMm OfltW Eft M programa liom th stwie wi not be - aMble dline Fci m e W tmaBCfi s hhJ dflne setfing , e*i Heia Offline Files caches files that are often accessed from a shared folder. This is similar to the way in which a Web browser keeps a cache of recently visited Web sites. When you create...

Blocking the Deployment of a GPO

You can prevent a child container from inheriting any GPOs from parent containers by enabling Block Policy inheritance on the child container. Enabling Block Policy inheritance on a child container prevents the container from inheriting all Group Policy settings, not just selected Group Policy settings. This is useful when an Active Directory container requires unique Group Policy settings, and you want to ensure that Group Policy settings are not inherited. For example, you can use Block...

Lesson Configuring Folder Redirection

Settings Required to Configure Folder Redirection Security Considerations for Configuring Folder Redirection How to Coflfigure Folder Redirection Introduction Windows Server 2003 enables you to redirect folders that are part of the user profile from users' local hard disks to a central location on a server. By redirecting these folders, you can ensure that users' data is located in a central location and that users' data is available to them regardless of the computers to which they log on....

Student Materials Compact Discs Contents

The Student Materials compact discs contain the following files and folders Autorun.exe. When the compact disc is inserted into the CD-ROM drive, or when you double-click the Autorun.exe file, this file opens the compact disc and allows you to browse the Student Materials compact disc. Autorun.inf. When the compact disc is inserted into the compact disc drive, this file opens Autorun.exe. Default.htm. This file opens the Student Materials Web page. It provides you with resources pertaining to...

How to Determine Effective Permissions for Active Directory Objects

Your instructor will demonstrate how to determine effective permission For Active Directory objects Introduction Use the following procedure to view the effective permissions log for Active Procedure To view the effective permissions log 1. In Active Directory Users and Computers, in the console tree, browse to the organizational unit or object for which you want to view effective permissions. 2. Right-click the organizational unit or object, and then click Properties. 3. In the Properties...

Delegating Administrative Control

In this exercise, you will delegate administrative control of objects in an organizational unit. Northwind Traders wants all IT personnel to be able to create, delete, and modify groups in every city organizational unit. You must delegate authority in your ComputerName organizational unit to enable a global group named G NWTraders IT Personnel to have permissions to Create, delete and manage groups and to Modify membership of a group. 1. Delegate control of the ComputerName Groups...

Lab A Managing Printing

Set printer priority and schedule printer availability Objectives After completing this lab, you will be able to Set printer priority and schedule printer availability. Instructions Before working on this lab Log on to the domain as ComputerName Admin. Ensure that you have a local printer created on LPT1 called ComputerName Datacenter IT Printer. Estimated time to complete this lab 20 minutes In this exercise, you will install printers and create a printing pool. The home office in London needs...

How to Assign Change or Remove a Drive Letter

Your instructor will demonstrate how to Assign, change end remove a drive Setter by using Dish Management Assign, changs and remove a drive letter by using DiskPart You can use either Disk Management or DiskPart to assign, change or remove drive letters on partition. As an administrator, you will manage disk drive letters by using these tools. To assign, change, or remove drive letters by using Disk Management 1. In Computer Management, open Disk Management. 2. Right-click a partition, logical...

R

Create groups basfrd on admlnislrallve needs Use local groups on a campuler lint is nota member of a cfoni in Add user accounts, to tin a group tri t is most restrictive U se uitt Lui(t-lii group when possible i nstead of crating 3 w grw p Use Ihe Auftetilitjited Users grwip instead ol the Evertue group to grant most user rii hts and permissions Limit the nun 11 er of usera in th e At m i n rst i gron p irmtall personnel that are rambers et the Administrai ors. Power Users, Print Operators, and...

Practice Determining Effective Permissions on NTFS Files and Folders

Bilder Kraftv Rme

In this practice, you will determine effective NTFS permissions Objective In this practice, you will determine the effective NTFS permissions. Instructions Before you begin this practice Log on to the domain as ComputerName Admin. Note You cannot use the Run as command with Windows Explorer, so you must log on as ComputerName,Admin to have the permissions that you need to complete this practice. Review the procedures in this lesson that describe how to perform this task. Scenario The HR Manager...

Names Associated with Organizational Units

0U MyQfganizat 01 a Unit, DC-m it' soft, DC com Ylicroscrl. eom MyCrgan iza'jonal Unit Introduction Each object in Active Directory can be referenced by several different types of names that describe the location of the object. Active Directory creates a relative distinguished name, a canonical name, and a relative distinguished name for each object, based on information that is provided when the object is created or modified. LDAP relative The Lightweight Directory Access Protocol (LDAP)...

Naming Guidelines for Groups

Incorporate tfce scope in the naming convention of the group name The name should reflect the ownership (division or lean name) Place torn* in names or abbreviations al the teg idling of the group name Use a descriptor to entity Hie mdmiim permissions a group can hove, such as 0S_ IT London OU Admins For distribution groups Use a short alias name Do not include a users alias name as part of a display name Allow a maximum of fivE co-owners ol a single distribution group In Active Directory,...

Tasks Associated with Managing the Security Log Files

I 'liUllltj. i> 3ut1 I4.A4 ft+Ulfl AH ivu-i Ji i. -j . yjii 1 m BJ 'II -ILI- -L'll.Ly JL I. IL J. Ld .i r'n I 3. 'irr JctJ f ajCH--' M t Ttt I -J Introduction All events related to operating system security in Windows NT, Windows Server 2003, and Microsoft Windows XP are recorded in the security log in Event Viewer. Security-related events may also be recorded in the application and system logs. Evaluate the Before you enable audit policies, you must evaluate whether...

Practice Moving Active Directory Domain Objects

In this practice, you will m ove organ rational units In this practice, you will move domain objects from one organizational unit to another. Log on to the domain by using the ComputerNameUser account. Open CustomMMC with the Run as command. Use the user account Nwtraders Com uterNameAdmin (Example LondonAdmin). Ensure that CustomMMC contains Active Directory Users and Computers. Review the procedures in this lesson that describe how to perform this task. The systems engineers are testing some...

Practice Monitoring Processor Usage

Jn tbis practice, you will configure System Monitor to monitor selected processor counters In this practice, you will configure System Monitor to monitor selected processor counters. You are the systems administrator for an organizational unit on a large network. Recently, you installed an application on a server. Since you installed the application, users are complaining that the system is slow and you want to monitor the processor to determine whether the application is causing a bottleneck....

Practice Configuring an Alert

In this practice, you will configure an alert In this practice, you will configure an alert. You are the systems administrator for an organizational unit on a network. The organizational unit recently acquired a new file server. You determine that the processor on this server should never exceed 50 percent usage. You want to configure an alert to warn you when the processor exceeds this figure, and you also must test the alert. 1. Log on as ComputerUser with a password of P ssw0rd. 2. Open the...

What Properties Are in a Template

A propsrties exD )1 Profile path and Home folder, netted new user's logon nere There are numerous properties associated with each account. However, only a limited number of properties can be copied in a template. The following table lists the user properties that can be copied from an existing domain user account to a new domain user account. Properties tab Properties copied to new domain user account Address All properties, except Street Address, are copied. Account All properties, except...

Connecting to a Remote Console Session

In this exercise, you will connect to a remote console session by using Remote Desktops. 1. Connect to a remote computer using Remote Desktops. a. Open Control Panel, and then open Administrative Tools. c. Maximize the Remote Desktops window, and then maximize the Console Root Remote Desktops window. d. Right-click Remote Desktops, and then click Add New Connection. e. Connect to Glasgow using the following data Server name or IP Address Glasgow Connection name Glasgow User name Administrator...

Creating Shortcuts to Administration Tools

In this exercise, you will create shortcuts to commonly used administrative tools. 1. Create a shortcut to Computer Management. a. Create a shortcut to Computer Management by right-clicking the desktop, clicking New, and then clicking Shortcut. b. In the Type the location of the item box, type runas user nwtraders administrator mmc windir system32 compmgmt.msc and c. In the Type a name for this shortcut box, type Computer Management and then click Finish. 2. Create a shortcut to Active...

What Is System State Data

The computer uses System Stats data files to load, configure, and run the operating system All System State date relevant to your server is backed up You can back up the following system components The computer uses System Stats data files to load, configure, and run the operating system All System State date relevant to your server is backed up You can back up the following system components When this component ii included in System State if it t& 8 CsnJflcite S vi(9t Swvsr Sya sTi files M...

Multimedia Strategy for Using Groups in a Single Domain

This presentation explains the AGDLP strategy tor using groups File location To view the Strategy for Using Groups in a Single Domain presentation, open the Web page on the Student Materials compact disc, click Multimedia, and then click the title of the presentation. Do not open this presentation unless the instructor tells you to. Key points User accounts Global groups Domain Local groups Permissions

How to Identify and Resolve Network Bottlenecks

Network Utilisation (in Task Manager) Network internes Byt rs. o fll'sec .ess thai 5' G the c isdycf the bancwiclti ct the network card Upgrade net ork adapter Tshysiool nstwo'lt reff nm further aisl aig to letirmin ause of sroblsm Upgiade n t 'ork adapter ar ahysital netwo'k Introduction Network bottlenecks are difficult to monitor because most networks are complex. Also, many elements can affect the performance of the network. You can monitor various objects and counters on the network, such...

Lesson Assigning Scripts with Group Policy

What Are Group Policy Script Settings How to Assign Scripts wIth Group Policy Introduction You can use Group Policy to deploy scripts to users and computers. A script is a batch file or a Microsoft Visual Basic script that can execute code or perform management tasks. You can use Group Policy script settings to automate the process of running scripts. There are script settings under both Computer Configuration and User Configuration in Group Policy. You can use Group Policy to run scripts when...

What Is the Performance Console

The Pe rfo rma n ce con so le contai ns System Monitorand Performance Logs and Alerts You can oollecL and view real-time data of a local computer or several remote computers You can create graphs, histograms, and performance counter data Provides logging and alert capabilities Defines sitings ioi counter logs, trace logs., and alerts Introduction Windows Server 2003 provides the following tools as part of the Performance console for monitoring resource usage on your computer System Monitor...

How to Create Striped Volumes

Your instructor will demonstrate how to Create a striped volume by using Disk Wan-age merit Create a striped volume by using DiskPart Procedure for creating a striped volume Procedure for creating a striped volume One way of managing your disks is to use dynamic volumes. To provide the best performance for accessing large databases, for example, configure a dynamic disk as a striped volume. To create a striped volume by using Disk Management 1. In Computer Management, open Disk Management. 2....

Lesson Configuring Group Policy Settings

What Are Disabled and Enabled Group Poilcy Settings How to Edit s Group Policy Setting Introduction After completing this lesson, you will be able to configure Group Policy Lesson objectives After completing this lesson, you will be able to Explain why you use Group Policy. Explain what disabled and enabled Group Policy settings are. Edit a Group Policy setting. Enforce a consistent desktop eilriroriment Introduction Managing user environments means controlling what users can do when logged on...

How to Create a User Account Template

Your instructor will demonstrate how to create a user account template introduction To create an account that you can use as a template, you create a user account, configure the settings that you want, disable the account, and then copy the account when you need to create a new user. Procedure To create a new user account template 1. Create a new domain user account, or copy an existing domain user account. 2. Type the user name and user logon name information for the new user account, and then...

What Is the Disk Part Tool

You can use the DiskPart command'line tool to manage Before you can use DiskPart command, you must first list, then select the object to give it focus When an object has focus, any DiskPart command that you type will act on that object Use DiskPart to run scripts to do repetitive tasks Introduction By using the DiskPart command-line tool, you can perform many disk management tasks from the command line. Use DiskPart to perform disk-related tasks at the command line as an alternative to using...

Microsoft

Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is...

Practice Modifying Permissions for Active Directory Objects

Remove the inherited permissians for your city organizational unit Document ihe security changes made to yaurcity organisational unit Remove the inherited permissions for your city organizational unit. Document the security changes made to your city organizational unit. Log on to the domain by using the ComputerNameUser account. Open CustomMMC with the Run as command. Use the user account Nwtraders ComputerNameAdmm Example LondonAdmin . Ensure that CustomMMC contains Active Directory Users and...

What Is Group Nesting

It means adding a group as a member of another group N es L g ro up s to conso I id at e g mn p rn ana g em cnt Nesting options depend on whether the domain functional level of your Windows Server 2003 domain is set to Windows 2500 native or Windows 2000 mixed Introduction Using nesting, you can add a group as a member of another group. You can nest groups to consolidate group management. Nesting increases the member accounts that are affected by a single action and reduces replication traffic...

Multimedia Logon and Authentication

This activity presents information about Difference between local and domain authentic alio 11 How to perform a secondary logon Contents of an access token File location To start the Logon and Authentication activity, open the Web page on the Student Materials compact disc, click Multimedia, and then click the title of the activity. Questions Review the information and processes in Logon and Authentication, and then 1. What is the difference between authentication of a local logon and...

How to Create User Accounts

Yo u r i n structor wi 11 de rrio n strate how to Create a domain user account Create a local use account Introduction Domain user accounts enable users to log on to a domain and access resources anywhere on the network, and local user accounts enable users to log on and access resources only on the computer on which you create the local user account. As a systems administrator, you must create domain and local user accounts to manage your network environment. Important You cannot create local...

What Are Domain Functional Levels

W rdows N Server 4,0, lAlrdows mo, Definition The characteristics of groups in Active Directory depend on the domain functional level. Domain functionality enables features that will affect the entire domain and that domain only. Three domain functional levels are available Microsoft Windows 2000 mixed, Windows 2000 native, and Microsoft Windows Server 2003. By default, domains operate at the Windows 2000 mixed functional level. You can raise the domain functional level to either Windows 2000...

Testing the High CPU Usage Alert

In this exercise, you will test the high CPU usage alert. Start the following program In Performance, view System Monitor. In the CPU Stress dialog box, change the activity for Thread 1 to Maximum. When the CPU usage exceeds 50 , the alert will trigger a message every 5 seconds. Close CPU Stress to stop the messages.

Practice Delegating Control of an Organizational Unit

Delegate control of Tie Computers organizational unit Test delegated permissions iaryour Computers organizational unit Delegate control of lie Users organizational unit Test delegated permissions for your Users organizational unit Delegate control of the Computers organizational unit. Test delegated permissions for your Computers organizational unit. Delegate control of the Users organizational unit. Test delegated permissions for your Users organizational unit. Log on to the domain by using...

Practice Enabling and Disabling User and Computer Accounts

In this practice, you will enable and disable a user account and computer account In this exercise, you will disable and enable a user account and a computer account. Log on to the domain by using the ComputerNameUser account. Open CustomMMC with the Run as command. Use the user account Nwtraders ComputerNameAdmm Example LondonAdmin . Ensure that CustomMMC contains Active Directory Users and Computers. Review the procedures in this lesson that describe how to perform this task. The security...

Permissions Inheritance for Active Directory Object Permissions

Users As5- n d Acc s Permission for Pi rent Ctrntaiier Benefits of permissions A parent object is any object that has a relationship with another object called a inheritance child. A child object inherits permissions from the parent object. Permissions inheritance in Active Directory minimizes the number of times that you need to grant permissions for objects. Permissions inheritance in Windows Server 2003 simplifies the task of managing permissions in the following ways You do not need to...

Lesson Changing the Location of the Print Spooler

Why Change the Location of the Print Spooler How to Change the Location of the Print Spooler Introduction This lesson introduces you to the skills and knowledge that you need to change Lesson objectives After completing this lesson, you will be able to Explain the purpose of the print spooler. Explain situations that require you to change the location of the print spooler. Change the location of the print spooler. An executable file that manages the printing process, which Involve Retrieving...

What Are Local Groups

Local Uaaf asrnUrts fem tiie computer Definition A local group is a collection of user accounts or domain groups created on a member server or a stand-alone server. You can create local groups to grant permissions for resources residing on the local computer. Windows 2000 or Windows Server 2003 creates local groups in the local security database. Local groups can contain users, computers, global groups, universal groups, and other domain local groups. Because groups with a domain local scope...

Active Directory Terms

Introduction To manage a Windows Server 2003 environment, you must understand which operating system edition is appropriate for different computer roles. You must also understand the purpose of a directory service and how Active Directory directory service provides a structure for the Windows Server 2003 environment. Lesson objectives After completing this lesson, you will be able to Describe the different computer roles in a Windows Server 2003 environment. Describe the uses of the different...

How to Configure MMC to Manage a Server Remotely

Your instructor will demonstrate how to configure MMC to manage a server remotely Introduction Systems administrators are often required to work off-site. As a systems administrator, you may be located at one site but must perform maintenance on a server at a second site. In this case, you can use an MMC console to remotely manage a server. For example, you can start or stop services on a remote server, review the event log, manage shares, or manage disks. Procedure To configure MMC to manage a...

How to Identify and Resolve Memory Bottlenecks

H nd llw process tiat li cajsmg patjinu Ato RAM fclitiirmirp sfKfco total memay FneHhf prxKa tnat is ushg RAM A t RAM Frfttj t-ipt 4 utiflg RAM Ad RAM rndrhe- prxess tiat ia eatiwig paging flat RAM Introduction The most common resource bottleneck in servers is caused by lack of memory. Adding memory is the most effective way to improve server performance. Paged and nonpaged In Microsoft Windows Server 2003, RAM is divided into two categories paged RAM and nonpaged. Paged RAM is virtual memory,...

Organizational Unit Hierarchical Models

As a systems administrator, you do not select the design of the Active Directory structure for your organization. However, it is important to know the characteristics and ramifications of each structure. This knowledge may be critical to you when performing systems administrator tasks within the Active Directory structure. This topic describes the four basic hierarchy designs. The function-based hierarchy is based on only the business functions of the organization, without regard to...

Practice Configuring MMC to Manage Files on a Remote Server

Configure IVMC to manage aid monitor a local server arid a remote server Configure MMC to manage and monitor a local server and a remote server. Use the Run as command to open MMC. You are the systems administrator for an organizational unit on a network. You are responsible for managing and monitoring the shared folders on your server and on a remote server. You will create an MMC snap-in that allows you to manage and monitor shared folders on both servers simultaneously. You will also create...

How to Create a GPO Link

Your instructor will demonstrate how to create a GPO Sink Procedure for creating and linking a GPO Use the following procedures to create and link GPOs, link existing GPOs, unlink a GPO, delete a GPO link, delete a GPO, and disable a GPO. 1. In Group Policy Management, in the console tree, expand the forest containing the domain in which you want to create and link a GPO, expand Domains, and then do one of the following To create a GPO and link it to a domain, right-click the domain, and then...

How to Enable and Disable User and Computer Accounts

Your instructor will demonstrate how to enable and disable user and computer accounts flddtD a q'fl-p m MHMwai I rij gt lilf ttotfit J Introduction When an account is disabled, the user cannot log on. The account appears in the details pane with an X on the account icon. Procedure To enable and disable a user or computer account by using Active Directory 1. In Active Directory Users and Computers, in the console tree, select the container or the user that contains the account to be enabled or...

How to Determine the Effective Permissions on Combined Shared Folder and NTFS Permissions

Your instructor will demonstrate how to determine effective permissions on combined shared folder and NTFS permissions Use Windows Explorer to view effective permissions on shared folders. To determine effective permissions, you need to first determine the maximum NTFS and the shared folder permissions and then compare the permissions. To determine the maximum permissions a user has for a file on an NTFS volume 1. In Windows Explorer, locate the file or folder for which you want to view...

Lab A Implementing Group Policy

Link a GPQ to an organizational unit Identify he effects of Inheritaiee when multiple GPOs are assigned Fcrce a GPO tn be applied ta child organizational units Filter a GPQ so that i is applied to selected users and groups in an organizational unit After completing this lab, you will be able to Link a GPO to an organizational unit. Identify the effects of inheritance when multiple GPOs are assigned. Block Group Policy inheritance. Force a GPO to be applied to child organizational units. Filter...

Exporting Disk Quota Entries

In this exercise, you will export the disk quota entries that you created to a binary file. 1. Export disk quota entries to a binary file. In Disk Management, highlight the new quota entries that you created in the previous exercise, and then on the Quota menu, click Export. Name the quota entries file export.bin and then save the file in C MOC 2275 Labfiles. Close the Quota Entries for New Volume D window, close the New Volume D Properties dialog box, and then click OK to close the remaining...

Why Monitor Server Memory

Monitor server memory to determine whether any of the following conditions exist Memory bottleriecki Insufficient memory -- Excessive paging Memory leaks Introduction Lack of memory is the most common cause of serious performance problems in computer systems. Even if you suspect other problems, check memory counters to rule out a memory shortage. Conditions to look for Monitor server memory to assess the amount of available memory and the level of paging, and to observe the effects of a memory...

Types of Backup

Backup types define what data is backed up Backup types use archive attributes that show ttiefile has charged sin the last backup Seleiled files and folcera that changed since Ihe aet normal incremental backup Sebrled filss and falcers that changed Gincs Ihe astbEckijs Sslested liles and fDlceia tost changed durirg h3 dHy The Backup utility provides five backup types that specify what data is backed up, such as only files that have changed since the last backup. Some backup types use an archive...

Lesson Managing Access to Shared Files Using Offline Caching

What Is Offline Files How Offline Files Are Synchranized Offline Caching Options How to Us Offline Caching Introduction The information in this lesson presents the skills and knowledge that you need to manage access to shared files by using offline caching. Lesson objectives After completing this lesson, you will be able to Explain what Offline Files is. Explain how offline files are synchronized. Explain the offline file caching modes.

What Is a Counter

Each performance object provides performance counters that represent data about specific aspects of a sytem or server Counter logs define what data is stored in the log file gj t Oiwi hiTH.r BCndwv b Iff - JE ff i H, - r. gt M vu The cwpifr log prowl bwy- frf.n fp-flfcwt. Introduction Windows Server 2003 collects data about system resources, such as disks, memory, processors, and network components. Also, applications and services that you run on your system, such as Microsoft Exchange Server,...

How to Set Up Run As Shortcuts

Your instructor will demonstrate how to set up a Run as shortcut to. Performance Computer Management Device Manager Disk Manager Active Directory MMC To save time, you can configure Run as desktop shortcuts to the administrative To set up a Run as shortcut to Performance 1. Right-click the desktop, point to New, and then click Shortcut. 2. On the Create Shortcut page, in the Type the location of the item box, type runas user Nwtraders administrator mmc windir system32 perfmon.msc and then click...

What Is a Signed Device Driver

Digital signature indicates that the device driver meets a certain level of testing and that It has not been altered by another program's installation process lt Use signed device drivers to ensure the performance and stability of your system To ensure that device drivers and system files remain iri their original, dig tally-signed state, Windows provides Introduction Each device driver and operating system file that is included with Windows has a digital signature. The digital signature...

Role of MMC in Remote Administration

Provides an interface to snap-ins fiat manage hardware, software, and network services for servers running Windows Server 003 and computers running Windows XP Why Use MMC in remote administration Use for tasks frequently accompli shed on remote Use to manage similar tasks- on many remote computers Introduction Microsoft Management Console MMC provides an interface that you can use to create, save, and open administrative tools, called snap-ins, that manage the hardware, software, and network...

How to Create a Group

Your instructor will demonstrate how to Create a group in a domain Create a local group on a member server i Create a group by using the command line Delete a group Delete a group by using lie command line Introduction In most corporate environments, you will create groups in domains. Active Directory has security and tracking features that limit the addition of users to groups. Active Directory also gives corporations the flexibility to use groups on member servers. Corporations often have...

How to Identify and Resolve Processor Bottlenecks

nd pretil jsing erHEsina pnocessinime Lpgra e or add anoufce' procesar pgrace or add additions pnoceaszr 'ind prccesa jsing exKsswe procesar lim ijpgrace or add anortba' pnrcessir ind c i t amp IIm'sad benefiting irlcrupTS Introduction Just about every activity that occurs on a server involves the processor. The processor on an application server is generally busier than the processor on a file and print server. As a result, the level of processor activity, and what is considered normal, is...

Lesson Determining Applied GPOs

What Is Gp update What Is Gpresult What Is Group Policy Reporting How to Use Group Policy Reporting What Is Group Policy Modeling Haw to Use Group Policy Modeling What la Group Policy Results How to Use Group Policy Results Introduction Group Policy is the primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization. In an Active Directory environment, Group Policy is applied to users or...

Importing Disk Quota Entries

In this exercise, you will import the disk quota entries on drive E. 1. Import disk quota entries to another drive. a. In Computer Management, open the Properties dialog box for New Volume E drive. b. On the Quota tab, select the Enable quota management check box, and then open the Quota Entries window. c. Open the Import Quota Settings dialog box, and then import the export.bin file. 2. Verify that the three quota entries are displayed. In the Quota Entries for New Volume E window, verify that...

NTFS File and Folder Permissions

Read S Execute Write Fsad Lis Folder Contents NTFS permissions are used to specify which users, groups, and computers can access files and folders. NTFS permissions also dictate what users, groups, and computers can do with the contents of the file or folder. The following table lists the standard NTFS file permissions that you can grant and the type of access that each permission provides. Change permissions, take ownership, and perform the actions permitted by all other NTFS file permissions...

How to Delegate Control of an Organizational Unit

Your instructor wifl de mon strate how tu delegate control of an organizational unit Procedure for delegating control for common tasks To grant permissions at the organizational unit level, use the Delegation of Control Wizard. You can grant permissions for managing objects, or you can grant permissions for managing specific attributes of those objects. Using the Delegation of Control Wizard is the preferred method for delegating control, because it reduces the possibility of unwanted effects...

How to Monitor Processor Usage

Your instructor will demonstrate how to Monitor processor usage by using Perfomnance Monitor processor usage by using Tesk Manager Procedure for monitoring processor usage by using Performance Procedure for monitoring processor usage by using Task Manager To keep your system running efficiently, you must monitor the system's processor to detect any bottlenecks from time to time. Bottlenecks occur only when the processor is so busy that it cannot respond to requests on time. These situations are...

What Is a GPO Link

Introduction All GPOs are stored in a container in Active Directory called Group Policy Objects. When a GPO is used by a site, domain, or organizational unit, the GPO is linked to the Group Policy Objects container. As a result, you can centrally administer and deploy the GPOs to many domains or organizational units. Creating a linked GPO When you create a GPO linked to a site, domain, or organizational unit, you actually perform two separate operations creating the new GPO, and then linking it...

What Are Effective Permissions for Active Directory Objects

Permissions are cum dative Deny permissions override all other permissions Object owners can always change permissions Retrieving effective permissions Introduction You can use the Effective Permissions tool to determine what the permissions for an Active Directory object are. The tool calculates the permissions that are granted to the specified user or group and takes into account the permissions that are in effect from group memberships and any permissions inherited from parent objects....

Computer Account Options

There are two optional features that you can enable when creating a computer account. You can assign a computer account as a Pre-Windows 2000 computer or as a backup domain controller BDC . Select the Assign this computer account as a pre-Windows 2000 computer check box to assign a password based on the computer name. If you do not select this check box, a random password is assigned as the initial password for the computer account. The password automatically changes every five days between the...

How to Install and Share a Network Printer

Your instructor wil' demonstrate how to install and Introduction In larger organizations, most print devices have a network interface. Using these print devices has several advantages. There is greater flexibility in where you locate your printers. In addition, network connections transfer data quicker than printer cable connections. Procedure for installing To install a network printer a network printer 1. In the Printers and Faxes folder, double-click Add Printer. 2. In the Add Printer...

How to Enable and Disable Disk Quotas

Your instructor will demonstrate how to Enable disk quotas by using Windows Explorer Disable disk quotas gt y using Windows Explprer Use the following procedures to enable and disable disk quotas. To enable disk quotas 1. In Windows Explorer, right-click the disk volume for which you want to enable disk quotas, and then click Properties. 2. In the Properties dialog box, on the Quota tab, select the Enable quota management check box. 3. Select one or more of the following options a. Deny disk...

Multimedia Introduction to Managing a Microsoft Windows Server Environment

This presentation describes the primary job functions of administering accounts and resources and defines basic concepts of Active Directory In this presentation, you are introduced to the primary job functions of administering accounts and resources in a Windows Server 2003 environment. The tasks and concepts in this presentation are explained in more detail throughout the course. To view the Introduction to Administering Accounts and Resources presentation, open the Web page on the Student...

What Are Administrative Tools

Commonly used administrative tools Active Directory Users anc Computers Active Directory Sites and Seivicas Active Directory Domains and Trusts Computer ManaijerriBni DNS Remote Desktops install to perform remote administration Introduction Administrative tools enable network administrators to add, search, and change computer and network settings and Active Directory objects. You can install the administrative tools for managing a Windows Server 2003 environment on computers running Microsoft...

How to Set File Parameters for a Counter

Your instructor will demonstrate how to set file parameters for a coulter log Introduction When you set file parameters for a counter log, you must select a log file format. Select the log file format that is most appropriate for your environment. For example, if you are responsible for a few servers, the text file or the binary file format is best choice. If you are responsible for a hundred servers, logging your data to a SQL database is the best choice. Procedure To set file parameters for a...