US 6842– Install a multi-user computer and peripherals Computing (Computer Support) US 6860Install a local area computer network Computing (Computer Support) US 6741Administer a Local Area Computer Network Computing (Computer Operations) Version 2.0 – January 2015 National Technology Institute Name: Course: Division: Class: January 2015 Table of Contents WINDOWS SERVER 2008 R2............................................................................................................................................... 3 INSTALLING SERVER 2008 R2 ........................................................................................................................................... 6 INSTALLATION OF SERVER 2008 R2 ............................................................................................................................... 7 IP ADDRESS ........................................................................................................................................................................... 15 FEATURES AND ROLES OF SERVER 2008 R2 ............................................................................................................. 20 ADDS ........................................................................................................................................................................................ 23 DHCP ........................................................................................................................................................................................ 43 INSTALLING PRINTER ........................................................................................................................................................ 49 ORGANISATIONAL UNITS (OU’S) ................................................................................................................................... 59 USER ......................................................................................................................................................................................... 62 GROUP POLICY OBJECT (GPO) ........................................................................................................................................ 68 HOME FOLDER ...................................................................................................................................................................... 70 DOMAIN CONTROLLER POLICY ...................................................................................................................................... 79 IP SECURITY POLICY .......................................................................................................................................................... 83 WINDOWS SERVER BACKUP ........................................................................................................................................... 86 Level 6 Mod B – Networking NOTES ...................................................................................................................................................................................... 97 ©2015 - National Technology Institute Windows Server 2008 R2 Introduction Windows Server 2008 R2, or simply R2 for short, is the second release of Windows Server 2008. It isn’t a completely new release, but rather adds additional features and refinements to the existing release. In this book, we focus on the new features and refinements in R2. We assume you have at least a general knowledge of Windows Server, and that you have some familiarity with Windows Server 2008, although we don’t assume you’re actively running Windows Server 2008. Where an R2 feature is a refinement of a feature that was new in Windows Server 2008, we provide background on the Windows Server 2008 feature to provide context Release Cadence Beginning with Windows Server 2003, Microsoft moved to a server release cycle that was designed to have a major release every three to five years (Windows Server 2003, Windows Server 2008), with a minor release at the approximate midpoint of the major release cycle (Windows Server 2003 R2, Windows Server 2008 R2). This change allowed Microsoft to move away from including new functionality in service packs (SPs), while providing customers with a more stable and predictable server environment. An R2 release is more than an SP, but less than a full major release. Windows Server 2008 R2 includes Windows Server 2008 SP2, but it also adds many new features and functionality that were not part of Windows Server 2008. Editions Before embarking on the installation of Windows Server 2008 R2, it is important to first gain an understanding of the different editions available and the corresponding hardware requirements. It is also important to be aware of the upgrade options available with each edition. With this objective in mind, this chapter will focus on providing an overview of both the different Windows Server 2008 R2 editions and the recommended hardware requirements. Windows Server 2008 R2 Foundation Edition The Foundation edition of Windows Server 2008 R2 is the new entry level edition and is designed specifically with the small business in mind. It is the least expensive of the various editions and lacks some of the more advanced functionality typically found in the higher end editions such as full Active Directory support and Hyper-V virtualization capabilities. In addition, the Foundation edition limits some of the included features, such as restricting the number of concurrent remote desktop services connections to 50 and is able to access a maximum of 1 processor and 8GB of RAM. 3|Page January 2015 Windows Server 2008 R2 Standard Edition Windows Server 2008 R2 Standard is another one of Microsoft's entry level server offerings (alongside Windows Web Server R2 2008 and Windows Server R2 2008 Foundation). As previously stated, whilst the original version of Windows Server 2008 supported both 32-bit and 64-bit versions, the R2 version supports only 64-bit processors. In terms of hardware, Standard Edition supports up to 4GB of RAM and 4 processors. Windows Server 2008 is primarily targeted at small and mid-sized businesses (SMBs) and is ideal for providing domain, web, DNS, remote access, print, and file and application services. Support for clustering, however, is notably absent from this edition. An upgrade path to Windows Server 2008 R2 Standard is available from Windows Server 2008, Windows 2000 Server and Windows Server 2003 Standard Edition. Windows Server 2008 R2 Enterprise Edition Windows Server 2008 R2 Enterprise Edition provides greater functionality and scalability than the Standard Edition. As with Standard Edition both 32-bit and 64-bit versions are available. Enhancements include support for as many as 8 processors and up to 2TB of RAM. Additional features of the Enterprise edition include support for clusters of up to 16 nodes and Active Directory Federated Services (AD FS). Windows Server 2000, Windows 2000 Advanced Server, Windows Server 2003 Standard Edition and Windows Server 2003 Enterprise Edition may all be upgraded to Windows Server 2008 R2 Enterprise Edition. Level 6 Mod B – Networking Windows Server 2008 R2 Datacentre Edition The Datacentre edition represents the top end of the Windows Server 2008 R2 product range and is targeted at mission critical enterprises requiring stability and high uptime levels. Windows Server 2008 R2 Datacentre edition supports up to 2TB of RAM and a minimum of 8 processors up to a maximum of 64. Upgrade paths to Windows Server 2008 R2 Datacentre Edition are available from the Datacentre editions of Windows Server 2008, Windows 2000 and 2003. Windows Web Server 2008 R2 Windows Web Server R2 2008 is essentially a version of Windows Server 2008 R2 designed primarily for the purpose of providing web services. It includes Internet Information Services (IIS) 7.0 along with associated services such as Simple Mail Transfer Protocol (SMTP) and Telnet. It supports up to 4 processors but RAM is limited to 32GB. ©2015 - National Technology Institute As with other entry level editions, Windows Web Server 2008 R2 lacks many of the features present in other editions such as clustering, BitLocker drive encryption, multipath I/O, Windows Internet Naming Service (WINS), Removable Storage Management and SAN Management. Windows Server 2008 R2 Features Matrix Now that we have covered in general terms the various different editions of Windows Server 2008 R2 we can now look in a little more detail at a feature by feature comparison of the four different editions. This is outlined in the following feature matrix: Feature Enterprise Datacentre Standard Itanium Web Foundation Active Directory Yes Certificate Services Yes Limited No No Limited Active Directory Domain Yes Services Yes Yes No No Yes Active Directory Yes Federation Services Yes No No No No Active Lightweight Services Yes Yes No No Yes Active Directory Rights Yes Management Services Yes Yes No No Yes Application Server Yes Yes Yes Yes No Yes DHCP Server Yes Yes Yes No No Yes DNS Server Yes Yes Yes No Yes Yes Fax Server Yes Yes Yes No No Yes File Services Yes Yes Limited No No Limited Hyper-V Yes Yes Yes No No No Yes Yes Limited No No Limited Yes Yes Yes No No Yes Remote Desktop Services Yes Yes Limited No No Limited Web Services (IIS) Yes Yes Yes Yes Yes Yes Windows Services Yes Yes Yes No No Yes Windows Server Update Yes Services (WSUS) Yes Yes No No Yes Directory Directory Yes Network Policy Access Services Print and Services and Document Deployment 5|Page January 2015 Installing Server 2008 R2 System Requirements Category Minimum / Recommended Requirements Processor • Minimum: 1.4GHz (x64 processor) • Recommended: 2GHz or faster Note: For Itanium based systems an Intel Itanium 2 processor is required. Memory • Minimum: 512MB RAM • Recommended: 2GB RAM or greater • Maximum (32-bit systems): 4GB (Standard) or 64GB (Enterprise and Datacentre) • Maximum: 8GB (Foundation) 32GB (Standard) or 2TB (Enterprise, Datacentre and Itanium-Based Systems) Available Disk Space • Minimum: 10GB • Recommended: 40GB or greater Note: Systems with RAM in excess of 16GB will require greater amounts of disk space to accommodate paging, hibernation, and dump files Drive DVD-ROM drive Display and Peripherals • Super VGA or greater-resolution monitor (800x600) • Keyboard • Microsoft Mouse or compatible pointing device Level 6 Mod B – Networking Hardware Compatibility The "Certified for Windows Server® 2008 R2" and "Certified for Windows Server® 2008" logos identify hardware and software solutions that meet Microsoft standards for compatibility and recommended practices with the respective Windows Server operating systems. Solutions that have earned the Certified for Windows Server 2008 R2 and Certified Windows Server 2008 logos take advantage of top-performing technologies, such as 64-bit and virtualization. Certified for Windows Server 2008 R2 and Certified for Windows Server 2008 applications have been tested by a third party test vendor. ©2015 - National Technology Institute Installation of Server 2008 R2 Windows Server 2008 R2 is a network operating system Microsoft, and can be deployed in medium to large scale industries in order to allow administrators to centrally manage the entire network setup right from a single location. The main difference between a client operating system, such as Microsoft Windows 8, Microsoft Windows 7, etc. and a network operating system such as Microsoft Windows Server 2008 RTM/R2, Windows Server 2003 and Windows 2000 Server is that the network operating system (NOS) has some additional server specific features integrated in it. These additional features include: Active Directory Domain Services (AD DS) Dynamic Host Configuration Protocol (DHCP) Domain Name System (DNS) Active Directory Certificate Services (AD CS) Active Directory Federation Services (AD FS) Distributed File System (DFS), etc. Although Windows Server 2008 R2 is a network operating system, it is initially installed just as a normal client operating system, i.e. without any additional server oriented services or features installed in it. In order to make the installed network operating system work as a typical server, systems administrators must install the server services and/or features according to the role that they want the computer to play in the network. Administrators must follow the steps given below to install Windows Server 2008 R2: 1. Power on the computer on which Microsoft Windows Server 2008 R2 is to be installed. 2. Enter into the BIOS setup to make the computer boot from DVD. 3. Insert Microsoft Windows Server 2008 R2 bootable installation media. 4. Once inserted, reboot the computer. 7|Page January 2015 Level 6 Mod B – Networking 5. When prompted for an installation language and other regional options, make your selection and press Next. 6. Next, press Install Now to begin the installation process. ©2015 - National Technology Institute 7. Product activation is now also identical with that found in Windows Vista/7. Enter your Product ID in the next window, and if you want to automatically activate Windows the moment the installation finishes, click Next. 9|Page January 2015 8. If you do not have the Product ID available right now, you can leave the box empty, and click Next. You will need to provide the Product ID later, after the server installation is over. Press No. Level 6 Mod B – Networking 9. Because you did not provide the correct ID, the installation process cannot determine what kind of Windows Server 2008 R2 license you own, and therefore you will be prompted to select your correct version in the next screen, assuming you are telling the truth and will provide the correct ID to prove your selection later on. ©2015 - National Technology Institute 10. If you did provide the right Product ID, select the Full version of the right Windows version you're prompted, and click Next. 11. Read and accept the license terms by clicking to select the checkbox and pressing Next. 11 | P a g e January 2015 12. In the "Which type of installation do you want?" window, click the only available option –Custom (Advanced). Level 6 Mod B – Networking 13. In the "Where do you want to install Windows?", if you're installing the server on a regular IDE hard disk, click to select the first disk, usually Disk 0, and click Next. ©2015 - National Technology Institute 14. 11. The installation now begins, copying the setup files from the DVD to the hard drive only takes about one minute. The exact time it takes to install server core depends upon your hardware specifications. Faster disks will perform much faster installs… Windows Server 2008 takes up approximately 10 GB of hard drive space. 15. The installation process will reboot your computer . 16. Then the server reboots you'll be prompted with the new Windows Server 2008 type of login screen. Press CTRL+ALT+DEL to log in. 17. Click on Other User. 13 | P a g e January 2015 18. The default Administrator is blank, so just type Administrator and press Enter. Level 6 Mod B – Networking 19. You will be prompted to change the user's password. You have no choice but to press Ok. 20. In the password changing dialog box, leave the default password blank, and enter a new, complex, at-least-7-characters-long new password twice. 21. Someone thought it would be cool to nag you once more, so now you'll be prompted to accept the fact that the password had been changed. Press Ok. 22. Finally, the desktop appears and that's it, you're logged on and can begin working. You will be greeted by an assistant for the initial server configuration, and after performing some initial configuration tasks, you will be able to start working. ©2015 - National Technology Institute IP Address Every machine on a network has a unique identifier. Just as you would address a letter to send in the mail, computers use the unique identifier to send data to specific computers on a network. Most networks today, including all computers on the Internet, use the TCP/IP protocol as the standard for how to communicate on the network. In the TCP/IP protocol, the unique identifier for a computer is called its IP address. In Microsoft Windows, you can enter ipconfig in the command prompt app to view your computer's current IP address configuration. There are two standards for IP addresses: IP Version 4 (IPv4) and IP Version 6 (IPv6). All computers with IP addresses have an IPv4 address, and many are starting to use the new IPv6 address system as well. Here's what these two address types mean: IPv4 uses 32 binary bits to create a single unique address on the network. An IPv4 address is expressed by four numbers separated by dots. Each number is the decimal (base-10) representation for an eight-digit binary (base-2) number, also called an octet. For example: 216.27.61.137 IPv6 uses 128 binary bits to create a single unique address on the network. An IPv6 address is expressed by eight groups of hexadecimal (base-16) numbers separated by colons, as in 2001:cdba:0000:0000:0000:0000:3257:9652. Groups of numbers that contain all zeros are often omitted to save space, leaving a colon separator to mark the gap (as in 2001:cdba::3257:9652). 15 | P a g e January 2015 At the dawn of IPv4 addressing, the Internet was not the large commercial sensation it is today, and most networks were private and closed off from other networks around the world. When the Internet exploded, having only 32 bits to identify a unique Internet address caused people to panic that we'd run out of IP addresses. Under IPv4, there are 232 possible combinations, which offers just under 4.3 billion unique addresses. IPv6 raised that to a panic-relieving 2128 possible addresses. How does your computer get its IP address? An IP address can be either dynamic or static. A static address is one that you configure yourself by editing your computer's network settings. This type of address is rare, and it can create network issues if you use it without a good understanding of TCP/IP. Dynamic addresses are the most common. They're assigned by the Dynamic Host Configuration Protocol (DHCP), a service running on the network. DHCP typically runs on network hardware such as routers or dedicated DHCP servers. Dynamic IP addresses are issued using a leasing system, meaning that the IP address is only active for a limited time. If the lease expires, the computer will automatically request a new lease. Sometimes, this means the computer will get a new IP address, too, especially if the computer was unplugged from the network between leases. This process is usually transparent to the user unless the computer warns about an IP address conflict on the network (two computers with the same IP address). An address conflict is rare, and today's technology typically fixes the problem automatically. IP Classes Earlier, you read that IPv4 addresses represent four eight-digit binary numbers. That means that each number could be 00000000 to 11111111 in binary, or 0 to 255 in decimal (base-10). In other words, 0.0.0.0 to 255.255.255.255. However, some numbers in that range are reserved for specific purposes on TCP/IP networks. These reservations are recognized by the authority on TCP/IP addressing, the Internet Assigned Numbers Authority (IANA). Four specific reservations include the following: Level 6 Mod B – Networking 0.0.0.0 -- This represents the default network, which is the abstract concept of just being connected to a TCP/IP network. 255.255.255.255 -- This address is reserved for network broadcasts, or messages that should go to all computers on the network. 127.0.0.1 -- This is called the loopback address, meaning your computer's way of identifying itself, whether or not it has an assigned IP address. 169.254.0.1 To 169.254.255.254 -- This is the Automatic Private IP Addressing (APIPA) range of addresses assigned automatically when a computer's unsuccessful getting an address from a DHCP server. The other IP address reservations are for subnet classes. A subnet is a smaller network of computers connected to a larger network through a router. The subnet can have its own address system so computers on the same subnet can communicate quickly without sending data across the larger network. A router on a TCP/IP network, including the Internet, is configured to recognize one or more subnets and route network traffic appropriately. The following are the IP addresses reserved for subnets: ©2015 - National Technology Institute 10.0.0.0 To 10.255.255.255 -- This falls within the Class A address range of 1.0.0.0 to 127.0.0.0, in which the first bit is 0. 172.16.0.0 To 172.31.255.255 -- This falls within the Class B address range of 128.0.0.0 to 191.255.0.0, in which the first two bits are 10. 192.168.0.0 To 192.168.255.255 -- This falls within the Class C range of 192.0.0.0 through 223.255.255.0, in which the first three bits are 110. Multicast (formerly called Class D) -- The first four bits in the address are 1110, with addresses ranging from 224.0.0.0 to 239.255.255.255. Reserved for future/experimental use (formerly called Class E) -- addresses 240.0.0.0 to 254.255.255.254. The first three (within Classes A, B and C) are those most used in creating subnets. If you only connect one computer to the Internet, that computer can use the address from your ISP. Many homes today, though, use routers to share a single Internet connection between multiple computers. Wireless routers have become especially popular in recent years, avoiding the need to run network cables between rooms. If you use a router to share an Internet connection, the router gets the IP address issued directly from the ISP. Then, it creates and manages a subnet for all the computers connected to that router. If your computer's address falls into one of the reserved subnet ranges listed earlier, you're going through a router rather than connecting directly to the Internet. IP addresses on a subnet have two parts: network and node. The network part identifies the subnet itself. The node, also called the host, is an individual piece of computer equipment connected to the network and requiring a unique address. Each computer knows how to separate the two parts of the IP address by using a subnet mask. A subnet mask looks somewhat like an IP address, but it's actually just a filter used to determine which part of an IP address designates the network and node. A subnet mask consists of a series of 1 bits followed by a series of 0 bits. The 1 bits indicate those that should mask the network bits in the IP address, revealing only those that identify a unique node on that network. In the IPv4 standard, the most commonly used subnet masks have complete octets of 1s and 0s as follows: 255.0.0.0.0 = 11111111.00000000.00000000.00000000 = eight bits for networks, 24 bits for nodes 255.255.0.0 = 11111111.11111111.00000000.00000000 = 16 bits for networks, 16 bits for nodes 255.255.255.0 = 11111111. 11111111.11111111.00000000 = 24 bits for networks, eight bits for nodes People who set up large networks determine what subnet mask works best based on the number of desired subnets or nodes. For more subnets, use more bits for the network; for more nodes per subnet, use more bits for the nodes. This may mean using non-standard mask values. For instance, if you want to use 10 bits for networks and 22 for nodes, your subnet mask value would require using 11000000 in the second octet, resulting in a subnet mask value of 255.192.0.0. 17 | P a g e January 2015 Another important thing to note about IP addresses in a subnet is that the first and last addresses are reserved. The first address identifies the subnet itself, and the last address identifies the broadcast address for systems on that subnet. Create a table where all the classes of IP addresses are shown with their starting and ending range. Level 6 Mod B – Networking Notes ©2015 - National Technology Institute Static and Dynamic IP Addresses Static IP Addressing If you feel the need to always know what your IP address is then you need a Static IP address, because it is constant. Static IP addresses are more reliable for Voice over Internet Protocol (VOIP), more reliable to host a gaming website or to play X-Box, Play Station, use Virtual Private Network for secure access to files from your company network computer, etc. Static IP addresses are also great if you use your computer as a server, as it should give your file server faster file uploads and downloads. Another plus with Static IP's, when hosting a website you are not sharing your IP with another company who sends out a lot of E-mail SPAM and not only has their website been shut down but in turn gets your IP address blacklisted. In contrast a static IP address can become a security risk, because the address is always the same. Static IP's are easier to track for data mining companies. Static IP addressing is less cost effective than Dynamic IP Addressing. Dynamic IP Addressing The biggest advantages of Dynamic IP Addressing are less security risk as the computer is assigned a new IP address each time the customer logs on, they are cost effective and there is automatic network configuration (the less human intervention with network configuration the better). Dynamic addressing is usually used by ISP's so that one IP address can be assigned to several users, however some ISP's use Sticky Dynamic IP Addressing and do not change the IP address very often. Dynamic IP Addressing can be used by families with several computers or by a small business owner who has a home office. The software that comes with a router allows for Dynamic Host Configuration Protocol (DHCP) setup and assigns each computer attached to the router an IP address automatically. In contrast, Dynamic IP addressing should not be used for VOIP, VPN, playing online games or game hosting because Dynamic IP addressing is less reliable then Static IP addressing and could cause the service to disconnect while you are on a VOIP, VPN or gaming. Notes 19 | P a g e January 2015 FEATURES AND ROLES OF SERVER 2008 R2 What is Server Manager? Server Manager is a new feature that is included in Windows Server 2008, which is designed to guide information technology (IT) administrators through the process of installing, configuring, and managing server roles and features that are part of the Windows Server 2008 release. Server Manager is launched automatically after the administrator completes the tasks listed in Initial Configuration Tasks. If the Initial Configuration Tasks window has been turned off, Server Manager is also launched automatically when an administrator logs on to the server. Level 6 Mod B – Networking Server Manager is a Microsoft Management Console (MMC) snap-in that provides a consolidated view of the server, including information about server configuration, status of installed roles, and links for adding and removing roles and features. Server Manager replaces a number of features from Microsoft Windows® Server® 2003 such as Manage Your Server, Configure Your Server, and Add or Remove Windows Components. It is composed of the following elements: A new feature in Windows Server 2008 that is started automatically after setup is complete, Initial Configuration Tasks helps the administrator complete the setup and initial configuration of a new server. It includes tasks such as joining the server to an existing domain, enabling Windows Update, and configuring feedback sent to Microsoft. Initial Configuration Tasks: Add Roles Wizard: Add Role Services Wizard: Add Features Wizard: Remove Roles Wizard: Use this wizard to add one or more roles to the server. The Add Roles Wizard automatically checks for dependencies between roles, and ensures that all required roles and features are installed based on user selections. For some roles, such as Terminal Services and Active Directory Certificate Services, the Add Roles Wizard also provides configuration pages that allow the user to specify how the role should be configured as part of the installation process. Some roles, such as File Services, Terminal Services, and Active Directory Certificate Services, are composed of multiple sub-elements, which are identified as role services in the Server Manager interface. After a role is installed, you can add more role services by using the Add Role Services Wizard. Similar to the Add Roles Wizard, this wizard enables you to install features on the server. the computer. Use this wizard to remove a role that is no longer needed on Use this wizard to remove a role service that is no longer needed on the computer. Remove Role Services Wizard: Remove Features Wizard: Role management home pages: Use this wizard to remove a feature that is no longer needed on the computer. When Server Manager starts, it detects which roles are installed. For each installed role, a role management home page is added to ©2015 - National Technology Institute Server Manager. Role home pages provide a high-level view of the status of each role (for example, which services are running, errors that are logged to the event log) as well as links to role-specific tools and Help content. Tools on the role management home page allow you to filter events displayed in the Summary area, and set preferences for Windows system services that are required by the role. A new command-line feature in Server Manager allows unattended installation and removal of Windows Server 2008 technologies. The ServerManagerCmd.exe command-line tool exposes the key set of Server Manager Tasks, such as installation or removal of roles, role services and features, validation, and querying the current state of the computer. It also allows for installation or removal of multiple roles, role services, or features in a single command instance by using XML answer files. Command-line tools: 21 | P a g e January 2015 Level 6 Mod B – Networking Notes ©2015 - National Technology Institute ADDS (Active Directory Domain Services) The first step is to assign an IP to the server that you going to deploy the AD. It’s necessary to install it as DNS server too. So it’s better to have fixed IP it doesn't mean you cannot install AD without fixed IP address but it will solve lot of issues if you used fixed IP. Windows Server 2008 can properly install and configure DNS during the AD DS installation if it knows that the DNS is local. You can accomplish this by having the private network adapter’s preferred DNS server address point to the already assigned IP address of the same private network adapter, as follows: From the Windows Start menu, open Administrative Tools > Server Manager. In the Server Summary section of the Server Manager window, click View Network Connections. In the Network Connections window, right-click the private adapter and select Properties. 23 | P a g e January 2015 Level 6 Mod B – Networking Select Internet Protocol Version 4, and then click Properties. ©2015 - National Technology Institute Copy the IP address that is displayed in the IP address box and paste it into the Preferred DNS server box. Then, click OK. Click OK in the Properties dialog box, and close the Network Connections window. Note: The last step for prepping W2K8 for AD is adding the proper Server Role. The “Active Directory Domain Services” Role will be added. This only installs the framework for W2K8 to become a DC and run AD. It does not promote the server to DC or install AD. Add the Active Directory Domain Services Role Adding the Active Directory Domain Services role installs the framework for Windows Server 2008 to become a DC and run AD DS. It does not promote the server to a DC or install AD DS. In the Server Manager window, open the Roles directory and in the Roles Summary section, click Add Roles. 25 | P a g e January 2015 On the Before You Begin page of the Add Roles Wizard, click Next. Level 6 Mod B – Networking On the Select Server Roles page, select the Active Directory Domain Services check box, and then click Next on this page and on the Confirmation page. Notes ©2015 - National Technology Institute On the Installation Progress page, click Install. 27 | P a g e January 2015 On the Results page, after the role is successfully added, click Close. Level 6 Mod B – Networking Enable the Remote Registry Open the Server Manager window if it is not already open. In the Properties area of the Local Servers page, click Remote Managemen. Select the Enable remote management of this server from other computers check box. Install Active Directory Domain Services (DCPROMO) Now that you have prepared the server, you can install AD DS. Tip: As an alternative to performing steps 1 through 3, you can type dcpromo.exe at the command prompt. Then, skip to step 4. If it is not already open, open the Server Manager window. Select Roles > Active Directory Domain Services. In the Summary section,click Run the Active Directory Domain Services Installation Wizard (dcpromo.exe). ©2015 - National Technology Institute On the Welcome page of the Active Directory Domain Services Installation Wizard, ensure that the Use advanced mode installation check box is cleared, and then click Next. Notes 29 | P a g e January 2015 Level 6 Mod B – Networking On the Operating System Capability page, click Next. Notes ©2015 - National Technology Institute On the Choose a Deployment Configuration page, select Create a new domain in a new forest and then clickNext. 31 | P a g e January 2015 Level 6 Mod B – Networking Notes On the Name the Forest Root Domain page, enter the domain name that you choose during preparation steps. Then, click Next. ©2015 - National Technology Institute Notes After the installation verifies the NetBIOS name, on the Set Forest Functional Level page, select Windows Server 2008 R2 in the Forest function level list. Then, click Next. 33 | P a g e January 2015 Level 6 Mod B – Networking Notes ©2015 - National Technology Institute The installation examines and verifies your DNS setting. On the Additional Domain Controller Options page, ensure that the DNS server check box is selected, and then click Next. 35 | P a g e January 2015 Level 6 Mod B – Networking In the message dialog box that appears, click Yes. Notes ©2015 - National Technology Institute On the Location for Database, Log Files, and SYSVOL page, accept the default values and then click Next. 37 | P a g e January 2015 Level 6 Mod B – Networking Notes On the Directory Services Restore Mode Administrator Password page, enter the domain administrator password that you chose during the preparation steps. This is not your admin password that was emailed to you during the creation of your server, although you can use that password if you want to. Then, click Next. ©2015 - National Technology Institute Notes On the Summary page, review your selections and then click Next. The installation begins. 39 | P a g e January 2015 Level 6 Mod B – Networking Notes If you want the server to restart automatically after the installation is completed, select the Reboot on completion check box. ©2015 - National Technology Institute If you did not select the Reboot on completion check box, click Finish in the wizard. Then, restart the server. After a few minutes, reconnect to your server by using the Console in your Control Panel or RDP. To log in, perform the following steps: a. Click Switch User, and then click Other User. b. For the user, enter the full domain name that you chose, followed by a back slash and Administrator. 41 | P a g e January 2015 c. Enter the password that was emailed to you when you first built the server. If you changed your password for the local admin account to this server before you began the installation of AD DS, use that password. d. Click the log in button. The installation of Active Directory Domain Services on your server is complete. Level 6 Mod B – Networking ©2015 - National Technology Institute DHCP A Dynamic Host Configuration Protocol (DHCP) is responsible for assigning IP addresses to the computers automatically. IP addresses assigned to the computers by DHCP server are known as dynamic IP addresses, and the computers that are configured to obtain the IP addresses automatically from the DHCP server are called DHCP client computers. To install and configure Dynamic Host Configuration Protocol (DHCP) on Windows Server 2008 R2, administrators must follow the steps given as below: Log on to Windows Server 2008 R2 computer with the domain administrator or enterprise administrator account credentials on which DHCP server is to be installed and configured. Make sure that the computer has been assigned with a static IP address. Ensure that the DNS server is available anywhere in the network and is properly configured. On the desktop screen, click Server Manager icon from the taskbar. On the Server Manager window, from the console tree in the left, make sure that Roles option is selected. On the right pane, make sure that the Roles Summary section is expanded. From the expanded section, click Add Roles. Click Add Roles On Add Roles Wizard window, click Next. 43 | P a g e January 2015 Check DHCP Server Checkbox On the DHCP Server page, click Next. On Select Network Connection Bindings page, make sure that the IP address representing the network connection that is to be bound is checked from the Network Connectionslist. Level 6 Mod B – Networking On Select Server Roles page, from the Roles list, check DHCP Server checkbox and click Next. ©2015 - National Technology Institute Notes Select Network Connection Click Next to continue. On Specify IPv4 DNS Server Settings page, populate the Preferred DNS serer IPv4 address and optional Alternate DNS server IPv4 address fields with the correct values. 45 | P a g e January 2015 Once specified, click Validate to confirm the availability of DNS server and click Next. Specify DNS Server Level 6 Mod B – Networking On Specify IPv4 WINS Server Settings page, leave everything as default and click Next. On Add or Edit DHCP Scopes page, click Add. On Add Scope box, populate the Scope name, Starting IP address, and Ending IP address fields with the desired values and click OK. ©2015 - National Technology Institute Add Scope Back on Add or Edit DHCP Scope page, click Next. On Configure DHCPv6 Stateless Mode page, leave everything as default and click Next. On Specify IPv6 DNS Server Settings page, leave everything as default (assuming that the network setup doesn’t have IPv6 addressing scheme) and click Next to proceed. On Authorize DHCP Server page, make sure that the Use current credentials radio button is selected. Alternatively, Use alternate credentialsradio button can also be selected to specify the domain admin credentials that is to be allowed to authorize DHCP server in AD DS. Authorize DHCP Note: Authorize DHCP Server page will be displayed only when an Active Directory Domain Controller is present in the network. In case the Active Directory Domain Controller is absent, the page is not displayed. Click Next to proceed. On Confirm Installation Selections page, review the settings and click Install to start the DHCP installation and configuration process. Once installed, click Close on the Installation Results page. 47 | P a g e January 2015 Close Server Manager window when done. Level 6 Mod B – Networking ©2015 - National Technology Institute Installing Printer Adding a network printer was certainly easier in Windows Server 2003. It’s not difficult in Windows Server 2008, just several more steps. As I’m in the process of re-installing my main workstation I thought I would blog how to add a network printer in Windows Server 2008 R2 – hopefully saving someone else some time! Like everything all components in Windows Server 2008, components are broken down to Roles and Features. To add a network printer, you need to install ‘Print and Document Services’ role. This role enables centralisation of print servers and network printer tasks. Note: before you begin, ensure you have installed the latest drivers for your printer. Open Server Manager and navigate to roles. Select ‘Add Roles’ in the right pane. Select Next to begin in the ‘Add Roles Wizard’. 49 | P a g e January 2015 Level 6 Mod B – Networking Locate and select ‘Print and Document Services’ role. ©2015 - National Technology Institute You have option to install four role services: Print Server Print Server role service installs the Print Management snap-in and is used for managing multiple printers or print servers and migrating printers to and from other Windows print servers. After you share a printer, Windows enables the File and Printer sharing exception in Windows Firewall with Advanced Security. LPD Service Line Printer Daemon (LPD) Service installs and starts the TCP/IP Print Server (LPDSVC) service. This enables UNIX-based computers or other computers that are using the Line Printer Remote (LPR) service to print to shared printers on this server. An inbound exception is created for port 515 in Windows Firewall with Advanced Security. Internet Printing Internet Printing role service creates a Web site enabling users to: Manage print jobs on the server. Use a Web browser to connect and print to shared printers on the server by using the Internet Printing Protocol (IPP). (Users must have Internet Printing Client installed.) Distributed Scan Server Distributed Scan Server role service receives and routes scanned documents from network scanners. Scan Management snap-in is installed to manage network scanners and configure scan processes. 51 | P a g e January 2015 Level 6 Mod B – Networking Select ‘Install’ to install the role services. ©2015 - National Technology Institute Once installed click Close to complete the installation. In Server Manager a Print and Document Services management snap-in has been added. Navigate to ‘Roles’ > ‘Print and Document Services’ > ‘Print Management’ > ‘Print Servers’ > [Print Server Name] > Printer. Right click and select ‘Add Printer…’ 53 | P a g e January 2015 This begins the Network Printer Installation Wizard. Select the correct option for you. If you are searching the network for printers or adding the printer by TCP/IP address ensure you have the correct privileges. Level 6 Mod B – Networking For this example I have the printer connected. Select ‘Add a new printer using an exiting port’ option and select ‘Next’. ©2015 - National Technology Institute Select ‘Use an existing printer driver on the computer’ and select the printer from the drop down. Enter a friendly name for the printer; you have the option to share the printer at this point. Select Next to begin installing the network printer. 55 | P a g e Level 6 Mod B – Networking January 2015 It is advisable to print a test page. To do this select the ‘Print test page’ option and select ‘Finish’. ©2015 - National Technology Institute A test document should now be printing. In you return to Server Manager Print and Document Services snap-in you will see the printer server installed. 57 | P a g e January 2015 Install an HP printer and ask your tutor to check whether it is working or not? Mention the steps below of how to install the printer on your server. Level 6 Mod B – Networking Notes ©2015 - National Technology Institute Organisational Units (OU’s) An organizational unit (OU) is a container within a Microsoft Active Directory domain which can hold users, groups and computers. It is the smallest unit to which an administrator can assign Group Policy settings or account permissions. Organizational units are Active Directory containers into which you can place users, groups, computers, and other organizational units. An organizational unit cannot contain objects from other domains. An organizational unit is the smallest scope or unit to which you can assign Group Policy settings or delegate administrative authority. Using organizational units, you can create containers within a domain that represent the hierarchical, logical structures within your organization. Creating and Managing OU’s Start by opening up your Server Manager, then expand the Roles section. Next expand the Active Directory Domain Services section and click on Active Directory Users and Computers. To create a new Organization Unit, right-click on your domain name, point to the New option and then select Organizational Unit. 59 | P a g e January 2015 Type in the name of your OU and make sure that the box is checked next to Protect container from accidental deletion. When done, click OK. We now have a new Organizational Unit in our Active Directory. Level 6 Mod B – Networking Create 5 OU’s with your desired names and ask your tutor to check Notes ©2015 - National Technology Institute 61 | P a g e January 2015 User How to Create a New User Account in Active Directory Level 6 Mod B – Networking To start let’s go ahead and open up Server Manager Next we will open up the Roles section, next to Active Directory Users and Computers section and finally the Active Directory Users and Computers. You should now see your domain name. We are going to click on our Users section where we are going to create a new User Account. To do so, right-click on the blank section, point to New and select User. In this window you need to type in the user’s first name, middle initial and last name. Next you will need to create a user’s logon name. When done, click on the Next button. ©2015 - National Technology Institute In the next window you will need to create a password for your new user and select appropriate options. In our example we are going to have the user change his password at his next logon. You can also prevent a user from changing his password, set the password so that it will never expire or completely disable the account. When you are done making your selections, click the Next button. 63 | P a g e January 2015 And finally, click on the Finish button to complete the creation of new User Account. Level 6 Mod B – Networking Create 2 different users in the OU’s you created before, make sure that every OU should have 2 different users with their account “disabled” Notes ©2015 - National Technology Institute Logon Hours Open up Active Directory Users and Computers, and double click on the user you want to limit or right click on the user and select properties. Then move over to the accounts tab, and click on the button that says “Logon Hours” 65 | P a g e Level 6 Mod B – Networking January 2015 Once you click on that button, a window will appear that allows you to select the hours the user can logon. Simply make your choice, and now the user is limited to logon the hours you selected. If they try to logon during a restricted time, they will be greeted with this message: ©2015 - National Technology Institute Now you don’t have to worry about users sneaking in when they shouldn’t be. Create different logon hours for every user you just created and ask your tutor to check whether they are working or not? Notes 67 | P a g e January 2015 Group Policy Object (GPO) In Windows Server 2008 R2, a Group Policy Object (GPO) is a collection of settings that define what a system will look like and how it will behave for a defined group of users. Microsoft provides a program snap-in that allows you to use the Group Policy Microsoft Management Console (MMC). The selections result in a Group Policy Object. The GPO is associated with selected Active Directory containers, such as sites, domains, or organizational units (OUs). The MMC allows you to create a GPO that defines registrybased polices, security options, software installation and maintenance options, scripts options, and folder redirection options. To create a Group Policy object Level 6 Mod B – Networking 1. In the GPMC console tree, right-click Group Policy Objects in the forest and domain in which you want to create a GPO. 2. Click New . 3. In the New GPO dialog box, specify a name for the new GPO, and then click OK . ©2015 - National Technology Institute To edit a Group Policy object 1. In the GPMC console tree, double-click Group Policy Objects in the forest and domain containing the GPO that you want to edit. 2. Right-click the GPO, and then click Edit . 3. In the console tree, edit the settings as appropriate Create 4 different GP in your current console and show it to your tutor Notes 69 | P a g e January 2015 Home Folder Creating Home Folder for the User To create home folder for the user, Select a drive e.g. volume (F :) Right click in the drive and select New then folder from the menu to create new folder Level 6 Mod B – Networking ©2015 - National Technology Institute After creating New folder Rename it as the Home Folder in the F: drive Right click on the Home Folder and select properties from the menu 71 | P a g e January 2015 In the Home Folder properties Window click on Sharing tab and select Advance Sharing to set the sharing permissions for the folder Level 6 Mod B – Networking ©2015 - National Technology Institute In the Home Folder properties window click on add tab, In the Select Users, Computers, Groups Window write the user account name (LubnaAijaz) or click on Check Names tab to select user name for setting Home Folder permissions on the user account and click OK Select the check boxes Full Control Change and Read for the specified account (LubnaAijaz) click Apply to get the changes 73 | P a g e January 2015 The Home Folder is now shared for the user account Level 6 Mod B – Networking ©2015 - National Technology Institute Continuing the steps creating home folder for the user account select Start menu, administrative Tools and then active Directory Users and Computers In active Directory Users and Computers window select the user account (LubnaAijaz in the Students OU) right click and select Properties 75 | P a g e January 2015 In the user account properties (LubnaAijaz) select Profile Tab. In the Home folder select Connect radio button, select drive letter (L) and go to: define path of HomeFolder\\ServerName\HomeFolder\UserName (\\SystemDC\HomeFolder\Lubna) click OK to get settings Level 6 Mod B – Networking ©2015 - National Technology Institute Client Side View You can login and check the configuration for the user account to do so Login to system and follow the steps: Select Start menu and go to Computer In the computer window you can now check the drive (L :) created for user account (LubnaAijaz) 77 | P a g e January 2015 Level 6 Mod B – Networking Create a home folder named NTI and show it to your tutor, make sure that the sharing is working and that the permission is set to only read-only. ©2015 - National Technology Institute Domain Controller Policy Domain security policy settings provide Active Directory with domain-wide security options for handling authentication and authorization of Active Directory security principals. These policy settings are implemented as security settings within the Default Domain Policy GPO. Domain policy is applied to all security principal accounts in the domain, unless inheritance is specifically blocked or overridden by another policy. Security Policy settings are applied at the domain level by default for the following categories: Account Policies, which include: Password Policy Account Lockout Policy Modifying Domain Security Policy You can make changes to Group Policy by modifying the default GPO or by creating a new GPO. The recommendation for making changes to domain security policy is to always modify the default GPO. The primary reason for this recommendation is that APIs that were developed for earlier versions of the operating system update policy settings in the Default Domain Policy GPO. For this reason, make all changes to domain security policy settings by editing this GPO. To increase comprehensive security for your domain, apply the Password Policy, Account Lockout Policy, and Kerberos Policy settings that are recommended in this guide. Password Policy In Windows Server 2003, the most common means of authenticating a user’s identity is the use of secret user passwords. After a user has been identified and authenticated, the user can perform any tasks or access any resource for which the user’s account is authorized. Strong passwords generally enhance security for Active Directory users. Using strong passwords helps avoid the threat of an unauthorized user guessing (cracking) a weak password and acquiring the credentials of the compromised user account. This benefit applies especially to administrative accounts, because an unauthorized user could obtain administrative credentials and thereby gain elevated privileges. A complex password that changes regularly reduces the likelihood of a successful spoofing attack. Password Policy settings control the complexity and lifetime for passwords. Table 13 includes the default and recommended Password Policy settings for a domain. 79 | P a g e January 2015 Level 6 Mod B – Networking Table 13 Default and Recommended Password Policy Settings Policy Default Recommended Comments Enforce password history 24 passwords remembered (No change) Prevents users from reusing passwords. Maximum password age 42 days (No change) N/A Minimum password age 1 day (No change) Prevents users from cycling through their password history to reuse passwords. Minimum password length 7 characters (No change) Sets minimum password length. Password must meet complexity requirements Enabled (No change) For the definition of a complex password, see “Creating a Strong Administrator Password” in theEstablishing Secure Domain Controller Build Practices section. Store password using reversible encryption Disabled (No change) N/A Account Lockout Policy More than a few unsuccessful password tries during the logon process can represent an attempt by an attacker to determine an account password by trial and error. Windows Server 2003 keeps track of logon attempts, and it can be configured to respond to this type of attack by disabling the account for a preset period of time. This response is referred to as account lockout. Account Lockout Policy settings control the threshold for this response and the actions to be taken when the threshold is reached. Table 14 includes the default and recommended Account Lockout Policy settings. ©2015 - National Technology Institute Table 14 Default and Recommended Account Lockout Policy Settings Policy Default Recommended Reason Account lockout duration Not defined 0 minutes The value 0 means that after account lockout an Administrator is required to reenable the account before account lockout reset has expired. Account lockout threshold 0 invalid logon attempts 20 invalid logon attempts The value 0 means that failed password tries never cause account lockout. Not defined 30 minutes Reset account lockout counter after Because an account lockout duration of 0 minutes (administrator reset) is recommended, a small number for this setting can result in frequent administrator interventions. This setting protects against a sustained dictionary attack by imposing a nontrivial delay after 20 unsuccessful attempts. Notes Create some password policy and account lockout policy and ask your tutor to check. 81 | P a g e Level 6 Mod B – Networking January 2015 ©2015 - National Technology Institute IP Security Policy An IPsec policy consists of general IPsec policy settings and rules. General IPsec policy settings apply, regardless of which rules are configured. These settings determine the name of the policy, its description for administrative purposes, key exchange settings, and key exchange methods. One or more IPsec rules determine the types of traffic IPsec must examine, how traffic is treated, how to authenticate an IPsec peer, and other settings. After the policies are created, they can be applied at the domain, site, OU, and local level. Only one policy can be active on a computer at one time. Policies distributed and applied using Group Policy objects override local policies. Creating a policy Unless you are creating policies on only one computer and its IPsec peer, you will probably have to create a set of IPsec policies to fit your IT environment. The process of designing, creating, and deploying policies can be complex, depending on the size of your domain, the homogeneity of the computers in the domain, and other factors. Typically, the process is as follows: Create IP filter lists that match the computers, subnets, and conditions in your environment. Create filter actions that correspond to how you want connections to be authenticated, data integrity to be applied, and data to be encrypted. The filter action can also be either Block or Permit, regardless of other criteria. The Block action takes priority over other actions. Create a set of policies that match the filtering and filter action (security) requirements you need. First, deploy policies that use Permit and Block filter actions and then monitor your IPsec environment for issues that might require the adjustment of these policies. Deploy the policies using the Negotiate Security filter action with the option to fall back to clear text communications. This allows you to test the operation of IPsec in your environment without disrupting communications. As soon as you have made any required refinements to the policies, remove the fall back to clear text communications action, where appropriate. This will cause the policies to require authentication and security before a connection can be created. Monitor the environment for communications that are not taking place, which might be indicated by a sudden increase in the Main Mode Negotiation Failures statistic. 83 | P a g e January 2015 To create a new IPsec policy Level 6 Mod B – Networking Right-click the IP Security Policies node, and then click Create IP Security Policy. In the IP Security Policy Wizard, click Next. Type a name and a description (optional) of the policy, and then click Next. Either select the Activate the default response rule check box or leave it unselected, and then click Next. If you are using the default response rule, select an authentication method, and then click Next. For more information about the default response rule, see IPsec Rules. Leave the Edit properties check box selected, and then click Next. You can add rules to the policy as needed. Add or change a rule to a policy To add a policy rule Right-click the IPsec policy, and then click Properties. If you want to create the rule in the property dialog box, clear the Use Add Wizard check box. To use the wizard, leave the check box selected. Click Add. The following instructions are for creating a rule using the dialog box. In the New Rule Properties dialog box, on the IP Filter List tab, select the appropriate filter list, or click Add to add a new filter list. If you have already ©2015 - National Technology Institute created filter lists, they will appear in the IP Filter Lists list. For more information about creating and using filter lists, see Filter Lists. On the Filter Action tab, select the appropriate filter action, or click Add to add a new filter action. For more information about creating and using filter actions, seeFilter Actions. On the Authentication Methods tab, select the appropriate method, or click Add to add a new method. For more information about creating and using authentication methods, see IPsec Authentication. On the Connection Type tab, select the connection type to which the rule applies. For more information about connection types, see IPsec Connection Type If you are using a tunnel, specify the endpoints on the Tunnel Settings tab. By default, no tunnel is used. For more information about using tunnels, see IPsec Tunnel Settings. Tunnel rules cannot be mirrored. When all the settings are complete, click OK. To change a policy rule Right-click the IPsec policy, and then click Properties. In the Policy Properties dialog box, select the rule, and then click Edit. In the Edit Rule Properties dialog box, on the IP Filter List tab, select the appropriate filter list, or click Add to add a new filter list. For more information about creating and using filter lists, see Filter Lists. On the Filter Action tab, select the appropriate filter action, or click Add to add a new filter list. For more information about creating and using filter actions, see Filter Actions. On the Authentication Methods tab, select the appropriate method or click Add to add a new method. For more information about creating and using authentication methods, see IPsec Authentication. On the Connection Type tab, select the connection type to which the rule applies. For more information about connection types, see IPsec Connection Type. If you are using a tunnel, specify the endpoints on the Tunnel Settings tab. By default, no tunnel is used. For more information about using tunnels, see IPsec Tunnel Settings. When all the settings are complete, click OK. 85 | P a g e January 2015 Windows Server Backup The Windows Server Backup feature provides a basic backup and recovery solution for computers running the Windows Server® 2008 operating system. Windows Server Backup introduces new backup and recovery technology and replaces the previous Windows Backup (Ntbackup.exe) feature that was available with earlier versions of the Windows operating system. The Windows Server Backup feature in Windows Server 2008 consists of a Microsoft Management Console (MMC) snap-in and command-line tools that provide a complete solution for your day-to-day backup and recovery needs. You can use four wizards to guide you through running backups and recoveries. You can use Windows Server Backup to back up a full server (all volumes), selected volumes, or the system state. You can recover volumes, folders, files, certain applications, and the system state. And, in case of disasters like hard disk failures, you can perform a system recovery, which will restore your complete system onto the new hard disk, by using a full server backup and the Windows Recovery Environment. You can use Windows Server Backup to create and manage backups for the local computer or a remote computer. You can also schedule backups to run automatically and you can perform one-time backups to augment the scheduled backups. To install backup and recovery tools Level 6 Mod B – Networking Click Start, click Server Manager, in the left pane click Features, and then in the right pane click Add Features. This opens the Add Features Wizard. In the Add Features Wizard, on the Select Features page, expand Windows Server Backup Features, and then select the check boxes for Windows Server Backup and Command-line Tools. You will receive a message that Windows PowerShell is also required to be installed with these features. Click Add Required Features, and then click Next. On the Confirm Installation Selections page, review the choices that you made, and then click Install. If there is an error during the installation, it will be noted on the Installation Results page. Then, to access these backup and recovery tools, do the following: o To access the Windows Server Backup snap-in, click Start, click Administrative Tools, and then click Windows Server Backup. ©2015 - National Technology Institute Launching the “Backup Once” wizard Click on “Backup Once…” in the Actions pane: In Step 1, the wizard asks you if you want to run a manual backup using the same settings as the existing scheduled backup or a brand new backup: 87 | P a g e January 2015 Choose “Different Options” Level 6 Mod B – Networking In Step 2, you are asked if you want a Full Server or if you want to “pick and choose”: ©2015 - National Technology Institute Select “Full Server” In Step 3, you specify the destination type: 89 | P a g e January 2015 Choose “Local drives” Level 6 Mod B – Networking In Step 4, you specify the destination: ©2015 - National Technology Institute Here the USB drive appears as E: You will see a final warning: Click “OK” (you do not want to backup the backup!) (Actually, you really do not have a choice: “Cancel” brings you back to Step 4) A confirmation window will appear and then the backup will start: 91 | P a g e January 2015 Notice that WBS separates the backup into 4 items: Level 6 Mod B – Networking System Reserved (boot and system volume information) Local Disk (it will contain the data) System State (information about the server) Bare metal recovery (information needed to recover to a new hardware) And it is done: ©2015 - National Technology Institute The 14 GB backup was created in about 10 minutes. This wizard is very simple. After you have launched it once, it is just a matter of clicking Next-Next (except the very first screen where you have to choose “Different Options). You can repeat this manual task every week, just before leaving work and let it run. You will always have a “Full Server” backup to rely on. 93 | P a g e January 2015 Windows Restore In the “Recover” wizard, WSB does not differentiate a “Full Server” backup from a “Custom” backup. It will just ask the date of the backup you want to use: Level 6 Mod B – Networking And then the type of restore: ©2015 - National Technology Institute Choose “Files and Folders” 95 | P a g e January 2015 Browse to the desired files or folders. Level 6 Mod B – Networking The wizard will restore them where you want (original or another location). ©2015 - National Technology Institute Notes _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ 97 | P a g e January 2015 _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ Level 6 Mod B – Networking _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ ©2015 - National Technology Institute _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ 99 | P a g e January 2015 _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ Level 6 Mod B – Networking _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ _____________________________________________________________________________________________________________ ©2015 - National Technology Institute