Windows Server 2012

advertisement
October 25th, 2012
Windows Server 2012
Richard Oertle
Subject Matter Expert / Instructor
www.NetComLearning.com
Windows Server 2012
New Features and Certifications
• Certification Changes
• Microsoft Certified Solution Expert in Windows Server
2012
• Microsoft Certified Solution Administrator in Windows
Server 2012
• Administration Changes
• Screen and Navigation changes
• PowerShell changes
• Version 3.0 with 2400 cmdlets
Starting from the beginning:
Become an MCSA
• Pass the following 3 tests to gain the equivalent of
passing the 70-417 test
• 70-410
• Installing and Configuring Windows Server® 2012
• 70-411
• Administering Windows Server® 2012
• 70-412
• Configuring Advanced Windows Server® 2012 Services
• Then consider continuing on for an MCSE in the 3 previous
categories of Desktop, Private cloud or Server Administration
Upgrading from
MCITP to MCSE
• Must renew MCSE status every three years!
• MCITP upgrade test is 70-417 (course 20417)
• MCITP accepted certifications includes:
• Lync Administrator
• SharePoint Administrator
• Desktop Administrator
• Enterprise Messaging Administrator
• Windows Server 2008 Administrator
Pass the 70-417 upgrade test
THEN:
• Take and pass the specialist area tests shown below
• Determine which of 3 MCSE specialist areas to focus on:
• MCSE in Server Infrastructure
• 70-413 Designing and Implementing a Server
Infrastructure
• 70-414 Implementing an Advanced Server
Infrastructure
• MCSE in Desktop Infrastructure
• 70-415 Implementing a Desktop Infrastructure
• 70-416 Implementing Desktop Application
Environments
MCSE Information continued
• MCSE in Private Cloud Infrastructure
• 70-246 Monitoring and Operating a Private Cloud with
System Center 2012, Course 10751 (5 days)
• 70-247 Configuring and Deploying a Private Cloud
with System Center 2017, Course 10750 (5 days)
Some of the New Administration features of
Windows Server 2012
Active Directory Administrative Center,
is a task-oriented tool based on Windows PowerShell
Password Settings Objects
You can use fine-grained password policies to specify
multiple password policies within a single domain
Fine-grained password policies:
• Apply only to user objects (or inetOrgPerson objects) and
global security groups
• Cannot be applied to an OU directly
• Do not interfere with custom password filters that you
might use in the same domain
Configuring Password Settings Objects
Windows Server 2012 provides two tools for configuring
PSOs
•
Windows PowerShell cmdlets
• New-ADFineGrainedPasswordPolicy
• Add-FineGrainedPasswordPolicySubject
•
Active Directory Administrative Center
• Is a graphical user interface
• Uses Windows PowerShell cmdlets to create and
manage PSOs
Managed Service Account
Use to automate password and SPN management for
service accounts used by services and applications
• Requires a Windows Server 2008 R2 or Windows Server 2012 server
installed with:
• .NET Framework 3.5.x
• Active Directory module for Windows PowerShell
• Recommended to run with AD DS configured at the
Windows Server 2008 R2 functional level or higher
• Can be used in a Windows Server 2003 or 2008 AD DS environment:
• With Windows Server 2008 R2 schema updates
• With Active Directory Management Gateway Service
Group Managed
Service Accounts
Group managed service accounts extend the capability of standard
managed service accounts by:
•
Enabling an MSA to be used on more than one computer in
the domain
•
Storing MSA authentication information on domain
controllers
Group MSA requirements:
•
Must have at least one Windows Server 2012 domain
controller
•
Must have a KDS root key created for the domain
The Central Store
The Central Store:
• Is a central repository for ADMX and ADML files
• Is stored in SYSVOL
• Must be created manually
• Is detected automatically by Windows Vista or Windows
Server 2008
ADMX files
Windows Vista
or Windows Server 2008
workstation
Domain controller
with SYSVOL
Domain controller
with SYSVOL
Group Policy Preferences
Group Policy preferences expand the range of configurable
settings within a GPO
Group Policy preferences:
• Enable IT professionals to configure, deploy, and manage
settings that were not manageable by using Group Policy
• Are natively supported on Windows Server 2008 and Vista SP2 or newer
• Can be created, deleted, replaced, or updated
Comparing Group Policy Preferences
and GPO Settings
Group Policy Settings
Group Policy Preferences
Strictly enforce policy settings by
writing the settings to areas of
the registry that standard users
cannot modify
Are written to the normal locations in
the registry that the application or
operating system feature uses to store
the setting
Typically disable the user
interface for settings that Group
Policy is managing
Do not cause the application or
operating system feature to disable the
user interface for the settings they
configure
Refresh policy settings at a
regular interval
Refresh preferences by using the same
interval as Group Policy settings by
default
Group policy
Management Editor
• Allows editing of the ADMX file
• Extends the functionality of GPMC
Features of Group Policy Preferences
Common Tab
Is used to configure additional
options that control the behavior
of a Group Policy preference item
Targeting Features
Determines to which users and
computers a preference
item applies
Deploying a Cloned Virtualized
Domain Controller
You can safely clone an existing virtual domain controller by:
1. Creating a DcCloneConfig.xml file and storing it in the
AD DS database location
2. Taking the VDC offline and exporting it
3. Creating a new virtual machine by importing the exported
VDC
DcCloneConfig.xml to
AD DS database
location
Export the VDC
Import the VDC
Overview of the Active Directory Module
for Windows PowerShell
The Active Directory module for Windows PowerShell provides
full administrative functionality in these areas:
•
•
•
•
•
•
•
•
•
•
•
User management
Computer management
Group management
OU management
Password policy management
Searching and modifying objects
Forest and domain management
Domain controller and operations masters management
Managed service account management
Site replication management
Central access and claims management
Windows PowerShell Web Access
• Allows remote management of computers by running Windows
PowerShell sessions in a web browser.
• Powershell replaces tab completion with Visual Studio style
drop down options
• Many former scripts are now compiled into cmdlets
Polls
What Is NTDSUtil?
With NTDSUtil you can:
• Manage and control single master operations
• Perform AD DS database maintenance
Perform offline defragmentation
• Create and mount snapshots
• Move database files
•
• Maintain domain controller metadata
• Reset Directory Services Restore Mode password
Creating AD DS Snapshots
• Create a snapshot of Active Directory
•
NTDSUtil
• Mount the snapshot to a unique port
•
NTDSUtil
• Expose the snapshot
•
•
Right-click the root node of Active Directory Users and Computers, and
choose Connect to Domain Controller
Enter serverFQDN:port
• View (read-only) snapshot
•
Cannot directly restore data from the snapshot
• Recover data
•
Connect to the mounted snapshot, and export/reimport objects with LDIFDE
•
Restore a backup from the same date as the snapshot
•
Manually reenter data
www.netcomlearning.com
Configuring the Active Directory
Recycle Bin?
• Active Directory Recycle Bin provides a way to restore deleted
objects without AD DS downtime
• Uses Windows PowerShell with Active Directory Module or the
Active Directory Administrative Center to restore objects
Dynamic Access Control
Dynamic Access Control provides:
• A safety net over all file server-based
resources
• Data identification
• Access control to files
• File access auditing
• Optional RMS protection integration
What Is FSRM?
• FSRM Enables the following functionality:
• Storage quota management
• File screening management
• Storage reports management
• Classification management
• File management tasks
Using FSRM to Manage Quotas, File Screens,
and Storage Reports
•
•
•
•
•
•
•
•
•
What Is Quota Management?
What Are Quota Templates?
Monitoring Quota Usage
What Is File Screening Management?
What Are File Groups?
What Are a File Screen Templates and File Screen Exceptions?
What Are Storage Reports?
What Is a Report Task?
Demonstration: How to Use FSRM to Manage Quotas, File
Screens, and Generate On-Demand Storage Reports
Monitoring Quota Usage
• You can monitor quota usage by:
Viewing quota information in the FSRM console
• Generating a quota usage report
• Creating soft quotas
• Using the Get-FSRMQuota Windows PowerShell cmdlet
•
File Screening Management
File screen management provides a method for controlling the
types of files that can be saved on file servers
• File screen management consists of:
• Creating file screens
• Defining file screen templates
• Creating file screen exceptions
• Creating file groups
Storage Reports
Storage reports provide information about file usage on
a file server
• Types of storage reports include:
Duplicate Files
File Screening Audit
Files by File Group, Owner, or Property
• Folders by Property
• Large Files
• Quota Usage
• Least and most recently accessed files
•
•
•
Classification Management
Classification management enables you to create and assign
classification properties to files using an automated mechanism
Classification Rule
File Management Task
Classification Property
Payroll.rpt
IsConfidential
Classification Properties
A Classification Properties is a configurable value that can be
assigned to a file
• Classification properties can be any of the following:
•
•
•
•
•
•
•
Yes/No
Date/Time
Number
Multiple choice list
Ordered list
String
Multi-String
Options for Storage Optimization
in Windows Server 2012
Storage optimization features include:
• File access auditing
• Features on Demand
• Data deduplication
• NFS data stores
Implementing IPAM
•
•
•
•
•
•
What Is IPAM?
IPAM Architecture
Requirements for IPAM Implementation
Managing IP Addressing Using IPAM
IPAM Management and Monitoring
Considerations for Implementing IPAM
What Is IPAM?
IPAM facilitates IP management in organizations with complex networks by
enabling administration and monitoring of DHCP and DNS
Managing IP Addressing Using IPAM
You can view and manage the IP address space using the
following views:
• IP address blocks
• IP address ranges
• IP addresses
• IP inventory
• IP address range groups
You can monitor the IP address space using the following views:
• DNS and DHCP servers
• DHCP scopes
• DNS zone monitoring
• Server groups
IPAM Management
and Monitoring
With IPAM, you can:
• Monitor IP address space utilization
• Monitor DNS and DHCP health
• Configure many DHCP properties and values from the IPAM
console
• Use the event catalog to view a centralized repository for all
configuration changes
What Is iSCSI?
TCP/IP protocol
iSCSI transmits SCSI commands over IP networks
iSCSI client that
runs the iSCSI
Initiator
Storage
Array
iSCSI Target Server
iSCSI Target Server and iSCSI Initiator
Considerations for
Implementing iSCSI Storage
Consider the following when designing your iSCSI storage
solution:
• Deploy the solution on fast networks
• Design a highly available network infrastructure for your iSCSI storage
solution.
• Design an appropriate security strategy for the iSCSI storage solution
• Follow the vendor-specific best practices for different types of
deployments
• The iSCSI storage solution team must contain IT administrators from
different areas of specialization
• Design application-specific iSCSI storage solutions together with
application specific administrators, such as Exchange Server and SQL
Server administrators
Thank You! Back to Rinchen
Stick around for Raffle and Q&As
www.NetComLearning.com
Download