Download presentation
Presentation is loading. Please wait.
Published byKerry Stone Modified over 9 years ago
1
Instructor: Michael J. Teske
2
Agenda Introductions Course Requirements Course Content Course Goals Course Overview Syllabus Timeline Brief Microsoft Networking overview
3
Introductions Name Past related work experience (if any) Why Network Specialist Program?
4
Course Requirements Have you taken Network: Client Operating Systems Do you have experience with Microsoft operating systems and general networking knowledge. Do you know what an IP address is? Configuring computer TCP/IP settings Peer to peer networking Operating system installations OSI reference model Basic network protocol routing. If not, you should reconsider your decision to take this course immediately. If you withdraw today, you can receive a full refund. Tomorrow, only 80%.
5
Course Goals Technical Get a fundamental understanding of: ○ Microsoft Windows Server 2008 R2 ○ Active Directory Domain Services ○ Group Policies ○ Domain Name Service (DNS) ○ File Sharing and securing file systems ○ Data backups ○ Microsoft Windows Server 2008 R2 inherent applications ○ Troubleshooting fundamentals Non-technical Communication Interpersonal
6
Course Overview Stacked Lecture/Lab format Labs are typically dependent upon each other. Most presentations and labs highlight topics that will be on quizzes Grade is based up: Formative Assessments ○ Several lab exercises ○ Quizzes (expect 5-8) Summative Assessments ○ Midterm written ○ Final written ○ Mid-term lab practical ○ Final lab practical
7
Syllabus Review (see handout) Please send an email to michael.teske@nwtc.edu with the appropriate subject line found in your syllabus. michael.teske@nwtc.edu
8
Timeline See website http://network.nwtc.edu/mteske http://network.nwtc.edu/mteske This is subject to change
9
General This is course is intended to provide a fundamental understanding of the Microsoft Server platform and what’s “in the box”. Most labs are a step-by-step to aid you in completing the exercise and accompanied with some brief “why we do this” explanations. As you proceed in this program(and industry), you will no longer be able to rely on step-by-step instructions. Along the way, you will be provided with additional resources to complete certain tasks on your own.
10
Questions?
11
Windows Server 2008 R2 Installation Guidelines Terms Disk Management Security Groups New Technology File System (NTFS) Creating a share
12
Windows Server 2008 R2 Why network? Meet the needs of your company. ○ Email ○ Data redundancy and storage ○ Web site ○ Business management software Centralized networking requires server based software Windows Server 2008 R2-Windows Server 2012 Microsoft Small Business Server Essentials Unix/Linux Types of server applications File servers Sharing data (documents, spreadsheets) Print servers Centrally sharing printers Email servers interoffice email/Internet email Groupware servers Email, calendar sharing etc. Database servers SQL, MySQL, Oracle
13
Windows Server 2008 R2 System Requirements Processor 64bit processor RAM Min. 512 MB( ) Max. 32 GB ( )(standard) 2TB (Enterprise, Datacenter, Etc) Disk 32GB minimum DVD Monitor Keyboard Internet Access
14
Windows Server 2008 R2 Installation best practices (short version) Documentation ○ Hostname ○ Network information(IP Addresses) ○ Installed roles/features ○ Any other pertinent information Perform Windows updates prior to production rollout Rename server (yes, we have to reboot) ○ Role/function/location ○ Version ○ Etc. Statically assign IP address(es)
15
Links System Requirements/Installation/Upgrade paths: http://technet.microsoft.com/en- us/library/dd379511(v=ws.10) http://technet.microsoft.com/en- us/library/dd379511(v=ws.10)
16
Terms System Reserved Partition DISKPART Server Manger Roles File Services Roles Security Group Permission Rights Universal Naming Convention IT:Network:Microsoft Server 1 Copyright 2010
17
Disk Management Can be configured using: User interface (UI) ○ Server Manager->Disk Management Command line interface (CLI) ○ Diskpart Both options allow for complete configuration of your internal and external volumes (disks) IT:Network:Microsoft Server 1 Copyright 2010
18
Security Groups Built-in System Groups INTERACTIVE: anyone using computer locally Network: all users connected over the network to the computer Everyone: All current users, including guests, and users from other domains System: the operating system Creator Owner: the creator/owner of subdirectories, files, and print jobs Authenticated users: any user who has been authenticated to the system. A more secure alternative to Everyone Anonymous Logon: a user who has logged in anonymously, such as an anonymous FTP user Batch: an account that has logged in as a batch job Service: an account that has logged in as a service Dialup: users who are accessing the system via DUN IT:Network:Microsoft Server 1 Copyright 2010
19
New Technology File System (NTFS) IT:Network:Microsoft Server 1 Copyright 2010 Security groups found on the NTFS Access Control list Every folder/file on an NTFS formatted volume will have security settings.
20
NTFS Read - Read the file and its ownership and attributes Write - In addition to the Read permissions, the user can overwrite the file and change its attributes. Read & Execute - In addition to the Read permissions, the user can run applications. In the folder permissions, this level can also traverse folders and list the folder contents. Modify - In addition to the Read & Execute and Write permissions, the user can delete the file or folder. Full Control - This permission is inclusive of previous rights. In addtion, it grants the user/group the right to modify the Access Control List(ACL). This right also allows a user/group to take ownership of files/folders. List Folder Contents -allows the user to list the folder and subfolder contents. IT:Network:Microsoft Server 1 Copyright 2010
21
Creating a Share Permissions Read—Read files and folders and their attributes, run application files, and change folders that are contained in the shared folder. Change—Create folders and files. Change data and attributes in files and delete files and folders. The Change permission can also perform the same actions as the Read permission Full Control—This permission can allow the same rights as READ and CHANGE. In addition, it grants the user/group the right to modify the Access Control List(ACL). Modifying the ACL means changing permissions as well as adding or removing groups/users. IT:Network:Microsoft Server 1 Copyright 2010
22
Creating a Share Requirements Must install the File Services Role Add through Server Manager Allows you to add supporting Role Services Added automatically through Windows Explorer when creating a share for the first time Does not give the option to add supporting Role Services Must be a member of the Administrators or Power Users groups IT:Network:Microsoft Server 1 Copyright 2010
23
Creating a Share Once share is successfully created, it can be accessed “across the wire” either through: Universal Naming Convention ○ \\servername\sharename\folder\..\ \\servername\sharename\folder\..\ ○ \\ipaddress\sharename\folder..\ \\ipaddress\sharename\folder..\ Net command to map a drive ○ Net use g: \\servername\common\\servername\common Or browsing the Network
24
Questions??????????
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.