Presentation is loading. Please wait.

Presentation is loading. Please wait.

Instructor: Michael J. Teske. Agenda  Introductions  Course Requirements  Course Content  Course Goals  Course Overview  Syllabus  Timeline  Brief.

Similar presentations


Presentation on theme: "Instructor: Michael J. Teske. Agenda  Introductions  Course Requirements  Course Content  Course Goals  Course Overview  Syllabus  Timeline  Brief."— Presentation transcript:

1 Instructor: Michael J. Teske

2 Agenda  Introductions  Course Requirements  Course Content  Course Goals  Course Overview  Syllabus  Timeline  Brief Microsoft Networking overview

3 Introductions  Name  Past related work experience (if any)  Why Network Specialist Program?

4 Course Requirements  Have you taken Network: Client Operating Systems  Do you have experience with Microsoft operating systems and general networking knowledge. Do you know what an IP address is? Configuring computer TCP/IP settings Peer to peer networking Operating system installations OSI reference model Basic network protocol routing.  If not, you should reconsider your decision to take this course immediately.  If you withdraw today, you can receive a full refund. Tomorrow, only 80%.

5 Course Goals  Technical Get a fundamental understanding of: ○ Microsoft Windows Server 2008 R2 ○ Active Directory Domain Services ○ Group Policies ○ Domain Name Service (DNS) ○ File Sharing and securing file systems ○ Data backups ○ Microsoft Windows Server 2008 R2 inherent applications ○ Troubleshooting fundamentals  Non-technical Communication Interpersonal

6 Course Overview  Stacked Lecture/Lab format  Labs are typically dependent upon each other.  Most presentations and labs highlight topics that will be on quizzes  Grade is based up: Formative Assessments ○ Several lab exercises ○ Quizzes (expect 5-8) Summative Assessments ○ Midterm written ○ Final written ○ Mid-term lab practical ○ Final lab practical

7 Syllabus  Review (see handout)  Please send an email to michael.teske@nwtc.edu with the appropriate subject line found in your syllabus. michael.teske@nwtc.edu

8 Timeline  See website http://network.nwtc.edu/mteske http://network.nwtc.edu/mteske  This is subject to change

9 General  This is course is intended to provide a fundamental understanding of the Microsoft Server platform and what’s “in the box”.  Most labs are a step-by-step to aid you in completing the exercise and accompanied with some brief “why we do this” explanations.  As you proceed in this program(and industry), you will no longer be able to rely on step-by-step instructions.  Along the way, you will be provided with additional resources to complete certain tasks on your own.

10 Questions?

11 Windows Server 2008 R2  Installation Guidelines  Terms  Disk Management  Security Groups  New Technology File System (NTFS)  Creating a share

12 Windows Server 2008 R2  Why network? Meet the needs of your company. ○ Email ○ Data redundancy and storage ○ Web site ○ Business management software  Centralized networking requires server based software Windows Server 2008 R2-Windows Server 2012 Microsoft Small Business Server Essentials Unix/Linux  Types of server applications File servers  Sharing data (documents, spreadsheets) Print servers  Centrally sharing printers Email servers  interoffice email/Internet email Groupware servers  Email, calendar sharing etc. Database servers  SQL, MySQL, Oracle

13 Windows Server 2008 R2  System Requirements Processor  64bit processor RAM  Min. 512 MB(  ) Max. 32 GB ( )(standard) 2TB (Enterprise, Datacenter, Etc) Disk  32GB minimum DVD Monitor Keyboard Internet Access

14 Windows Server 2008 R2  Installation best practices (short version) Documentation ○ Hostname ○ Network information(IP Addresses) ○ Installed roles/features ○ Any other pertinent information Perform Windows updates prior to production rollout  Rename server (yes, we have to reboot) ○ Role/function/location ○ Version ○ Etc. Statically assign IP address(es)

15 Links  System Requirements/Installation/Upgrade paths: http://technet.microsoft.com/en- us/library/dd379511(v=ws.10) http://technet.microsoft.com/en- us/library/dd379511(v=ws.10)

16 Terms System Reserved Partition DISKPART Server Manger Roles File Services Roles Security Group Permission Rights Universal Naming Convention IT:Network:Microsoft Server 1 Copyright 2010

17 Disk Management  Can be configured using: User interface (UI) ○ Server Manager->Disk Management Command line interface (CLI) ○ Diskpart  Both options allow for complete configuration of your internal and external volumes (disks) IT:Network:Microsoft Server 1 Copyright 2010

18 Security Groups Built-in System Groups INTERACTIVE: anyone using computer locally Network: all users connected over the network to the computer Everyone: All current users, including guests, and users from other domains System: the operating system Creator Owner: the creator/owner of subdirectories, files, and print jobs Authenticated users: any user who has been authenticated to the system. A more secure alternative to Everyone Anonymous Logon: a user who has logged in anonymously, such as an anonymous FTP user Batch: an account that has logged in as a batch job Service: an account that has logged in as a service Dialup: users who are accessing the system via DUN IT:Network:Microsoft Server 1 Copyright 2010

19 New Technology File System (NTFS) IT:Network:Microsoft Server 1 Copyright 2010 Security groups found on the NTFS Access Control list Every folder/file on an NTFS formatted volume will have security settings.

20 NTFS Read - Read the file and its ownership and attributes Write - In addition to the Read permissions, the user can overwrite the file and change its attributes. Read & Execute - In addition to the Read permissions, the user can run applications. In the folder permissions, this level can also traverse folders and list the folder contents. Modify - In addition to the Read & Execute and Write permissions, the user can delete the file or folder. Full Control - This permission is inclusive of previous rights. In addtion, it grants the user/group the right to modify the Access Control List(ACL). This right also allows a user/group to take ownership of files/folders. List Folder Contents -allows the user to list the folder and subfolder contents. IT:Network:Microsoft Server 1 Copyright 2010

21 Creating a Share Permissions  Read—Read files and folders and their attributes, run application files, and change folders that are contained in the shared folder.  Change—Create folders and files. Change data and attributes in files and delete files and folders. The Change permission can also perform the same actions as the Read permission  Full Control—This permission can allow the same rights as READ and CHANGE. In addition, it grants the user/group the right to modify the Access Control List(ACL). Modifying the ACL means changing permissions as well as adding or removing groups/users. IT:Network:Microsoft Server 1 Copyright 2010

22 Creating a Share Requirements Must install the File Services Role Add through Server Manager Allows you to add supporting Role Services Added automatically through Windows Explorer when creating a share for the first time Does not give the option to add supporting Role Services Must be a member of the Administrators or Power Users groups IT:Network:Microsoft Server 1 Copyright 2010

23 Creating a Share  Once share is successfully created, it can be accessed “across the wire” either through: Universal Naming Convention ○ \\servername\sharename\folder\..\ \\servername\sharename\folder\..\ ○ \\ipaddress\sharename\folder..\ \\ipaddress\sharename\folder..\ Net command to map a drive ○ Net use g: \\servername\common\\servername\common Or browsing the Network

24 Questions??????????


Download ppt "Instructor: Michael J. Teske. Agenda  Introductions  Course Requirements  Course Content  Course Goals  Course Overview  Syllabus  Timeline  Brief."

Similar presentations


Ads by Google