Network and System Administration in Window 2016
Network and System Administration in Window 2016
INSTITUTE OF TECHNOLOGY
SCHOOL OF COMPUTING
INFORMATION TECHNOLOGY ACADEMIC PROGRAM
LAB MANUAL
Program: Undergraduate
Course Code: ITec4112
Year: Four
Course Title: System and Network Administration
Prepared By:
Minalu Chalie (MSc)
Information Technology Academic Program
Table of Contents
Objective of the Manual........................................................................................................................ iii
CHAPTER ONE ..................................................................................................................................... 1
1. Windows workgroup ........................................................................................................................ 1
1.1. Change workgroup in Windows 10 from System Properties ................................................... 1
1.1. Change the workgroup in Windows 10 from Command Prompt............................................. 4
1.2. Change workgroup in Windows 10 from PowerShell ............................................................. 5
CHAPTER TWO .................................................................................................................................... 6
2. Introduction to Windows Server 2016 ............................................................................................. 6
2.1. Installation of Windows server 2016 ....................................................................................... 6
2.2. Working as an Administrator on Windows server 2016 ........................................................ 12
2.2.1. Rebooting the Server .......................................................................................................... 12
2.2.4. Creating a local user account in Windows server 2016...................................................... 14
2.2.5. The Run Prompt and the Command Line ........................................................................... 16
2.2.6. Configuring the Windows Firewall .................................................................................... 17
2.2.7. Adding Roles and Features ................................................................................................. 17
CHAPTER THREE .............................................................................................................................. 21
3. Installation and Configuration of Domain Name System (DNS) .................................................. 21
3.1. Installation of Domain Name System (DNS) Role ................................................................ 21
3.2. Configuration of a DNS Server .............................................................................................. 26
3.3. Nslookup ................................................................................................................................ 35
CHAPTER FOUR ................................................................................................................................. 40
4. Active Directory ............................................................................................................................. 40
4.1. Active Directory Domain (AD Domain) ................................................................................ 40
4.1.1. Microsoft Active Directory Domain Services (AD DS) .................................................... 41
4.1.2. Installation of Active Directory Domain Services role ...................................................... 41
4.1.3. Promote the Server as a Domain Controller ....................................................................... 47
4.2. Active Directory Console ....................................................................................................... 51
CHAPTER FIVE .................................................................................................................................. 52
5. Creating of Users, Computers and Groups Account in Active Directory Domain Services ......... 52
5.1. User Account creation in a Domain controller....................................................................... 52
5.2. Creating steps of users group account .................................................................................... 56
5.3. Adding a Domain user account in to a Domain group account ............................................. 59
Page | i
5.4. Creating a client machine (Computer) Account in a domain controller ................................ 59
5.5. Joining a Client Machine to a Domain controller server from the client side ....................... 61
5.6. Enabling and Using Fine-Grained Password Policies in Active Directory Domain Services64
CHAPTER SIX ..................................................................................................................................... 68
6. File and Storage Services ............................................................................................................... 68
6.1. Shared folder setup ................................................................................................................. 68
6.2. Disk quota management ......................................................................................................... 78
6.2.1. Creating a quota .................................................................................................................. 80
6.3. File Screening Management ................................................................................................... 82
CHAPTER SEVEN .............................................................................................................................. 88
7. Group policy Management ............................................................................................................. 88
7.1. Configuration of a Group policy ............................................................................................ 88
CHAPTER EIGHT ............................................................................................................................... 95
8. Installation and Configuration of DHCP role ................................................................................ 95
8.1. Steps of the installation of DHCP role ................................................................................... 95
8.2. Configuration of DHCP role after installation ..................................................................... 100
8.2.1. Creating a new IPv4 DHCP scope .................................................................................... 104
CHAPTER NINE ................................................................................................................................ 112
9. Installation and Configuration of a Print Server .......................................................................... 112
9.1. Print and Document Services role installation ..................................................................... 112
CHAPTER TEN.................................................................................................................................. 117
10. Backup ..................................................................................................................................... 117
10.1. Types of Backups ................................................................................................................. 118
10.1.1. Full Backup ................................................................................................................... 118
10.1.2. Incremental Backup ...................................................................................................... 118
10.1.3. Differential Backup ....................................................................................................... 118
10.1.4. Synthetic Full Backup ................................................................................................... 119
10.1.5. Incremental-Forever Backup ........................................................................................ 119
10.2. Installation of Windows server 2016 Backup components .................................................. 119
References ........................................................................................................................................... 129
Page | ii
Objective of the Manual
This laboratory manual is prepared to help and guide Network and System Administration course to
understand the general practical application concepts using Windows Server 2016 operating system.
After successfully completing the learning session using this manual, students are expected to
understand and be able to implement the following topics:
➢ Windows Server 2016 installation and administration
➢ Adding Roles and Features
➢ Domain Name System (DNS)
➢ Active Directory and Active Directory Domain Name Service
➢ Fine-Grained password policies in Active Directory Domain Name Service
➢ Shared folder setup
➢ File server and Disk quota management
➢ Group Policy Management
➢ Audit policy
➢ Dynamic Host Configuration Protocol (DHCP)
➢ Configuration of File transfer protocol (FTP)
➢ Install and configure a print server
➢ Backup and Restore
➢ Removing roles and features from Windows Server 2016
Page | iii
Required Hardware and Software
Hardware and Software required for the practical session are listed in the following tables:
Page | iv
CHAPTER ONE
1. Windows Workgroup
In computer networking, a workgroup is a collection of computers on a local area network (LAN)
that share common resources and responsibilities. The term is most commonly associated with
Microsoft Windows workgroups but also applies to other environments. Windows workgroups can be
found in homes, schools, and small businesses.
Workgroups are similar to Homegroups in that they are how Windows organizes resources and
allows access to each on an internal network. Windows 10 creates a Workgroup by default when
installed, but occasionally you may need to change it.
Workgroups are small peer-to-peer local area networks, where each computer has its own set of rules
and settings, managed by the administrator of that device, and a unique computer name in that
workgroup. To easily access another computer from the same network and share resources with it,
both computers must be part of the same workgroup. Since every computer in a workgroup handles
security separately, one option is to have a user account defined on the computer you want to access.
Alternatively, users can set their devices to share resources with everyone in their workgroup.
In contrast, domains are used in big networks, which include servers alongside desktop computers,
laptops, network printers, and many other devices. In network domains, everything is managed and
configured by the network administrator(s). The domain has a standard set of rules and settings that
apply to all network computers and devices. To access a computer from a domain, you don't need a
user account defined on that specific computer. You need a user account created for that domain,
assigned to you by the network administrator. Therefore, you can log to any computer from the
domain, using the same domain user account.
To view your existing Windows 10 workgroup, search for "workgroup" in your taskbar's Search field,
and then click or tap on "Show which workgroup this computer is on."
Page | 1
An alternative is to use the "View basic information about your computer" window from the Control
Panel. Where you see the existing workgroup, press on Change settings on the right.
Page | 2
The System Properties window opens, where you see your current Windows 10 workgroup in the
appropriate section of the Computer Name tab. To modify the workgroup you're in, all you have to do
is change the workgroup name. Click or tap on Change.
This opens the "Computer Name/Domain Changes" window. You can see the Workgroup field at the
bottom - in our case, the name is the default WORKGROUP. Type the name of the workgroup you
want to join instead, and click or tap OK.
Page | 3
It might take a few seconds, and a pop-up welcomes you to device requires a restart in order for the
changes to be applied. Press OK again.
Replace Workgroup_Name with the name of the workgroup you want to join or create, as seen
below.
Page | 4
1.2. Change workgroup in Windows 10 from PowerShell
If you're a fan of PowerShell, you can use this tool as well to change the Windows 10 workgroup.
First, launch PowerShell as administrator.
Second, enter the following command: Add-Computer -WorkGroupName "Workgroup_Name"
Replace Workgroup_Name with the name of the workgroup you want to join or create, as you can see
in the next image.
Page | 5
CHAPTER TWO
In this easy step by step guide, we will learn how to install and activate Windows Server 2016.
Before you start make sure you have the minimum requirements to install Windows Server on the
machine. The basic requirements are: -
Wait for a while till the setup loads all necessary files (Depending on your machine, it will take
couple of minutes)
Page | 6
Once the setup files are loaded, the setup will start with the following screen. You can change
these to meet your needs (the default values should be fine for now)
Page | 7
Select the appropriate version of the windows server that meets your organization’s needs then
click Next. Make sure that you’ve chosen an appropriate edition of Windows server.
➢
➢
Put a check mark in the box next to the I accept license terms and click on the Next button. License
term is about the way you want to buy license for your server from Microsoft.
Page | 8
Select the Custom: Install Windows only (advanced) option for clean installation. Clean installation is
the term used against upgrade. When you upgrade a Windows server you can have your settings,
apps, etc. from previous version of Windows. When you do the clean installation you can’t have the
settings, apps, etc.
Select the hard drive that you want to install the windows server on, and then click on the New button
to do the partitions.
After clicking on the New button, some options appear. Specify the amount of the drive based
on MB and click on the Apply button. A warning appears which wants you to give the permission to
system to create a drive for system files. Click on ok button, if you want to add more drives do this
process again. When finished hit Next.
Page | 9
After clicking Next the System starts coping all the files from the external drive to internal hard drive.
It will take a while so is patient. Be aware that your system will be restarted several times.
When the system copied all the files and restarted, finalize your task by entering the required details.
Type complex password (composed of uppercase, lowercase, symbol and numbers) twice in the
boxes and click on the Finish button. User name is Administrator by default.
Page | 10
After you logged in the Windows you see the something like the picture below. Welcome to
Windows Server 2016.
Once you Log in, Windows Server 2016 will show the Server Manager
Page | 11
2.2. Working as an Administrator on Windows server 2016
There are a couple of different ways to access the administrative tools in Windows Server 2016. One
way involves using the Server Manager. As you can see in the below figure, the Server Manager’s
Tools menu contains all of the administrative tools that you are probably familiar with the other
previous versions of Windows Servers.
Page | 12
2.2.3. Accessing Applications
To access all of the tiles that the Start screen is hiding, right click on an empty area of the Start
screen. When you do, a blue bar will appear at the bottom of the screen, as shown in the below
Figure, Click on the All Apps icon that appears on this bar.
Page | 13
2.2.4. Creating a local user account in Windows server 2016
To create a local user account
➢ Open Computer Management.
➢ In the console tree, click Users.
Where?
➢ Server Manager\ Tools\ Computer Management\ Local Users and Groups
Page | 14
Under Local Users and Groups select Users folder and on the Action menu, click New User.
Page | 15
Additional considerations:
To perform this procedure, you must provide credentials for the Administrator account on the local
computer (if you are prompted), or you must be a member of the Administrators group on the local
computer.
A user name cannot be identical to any other user name or group name on the computer that is being
administered. The user name can contain up to 20 uppercase characters or lowercase characters,
except for the following: “ “ / \ { } [ ] : ; | = + , * ? < > @.
A user name cannot consist only of periods (.) Or spaces.
In Password and Confirm password, you can type a password containing up to
127 characters.
The use of strong passwords and appropriate password policies can help protect your computer from
attack.
Page | 16
2.2.6. Configuring the Windows Firewall
It’s possible to control the Windows Firewall through group policy settings or manually. If you need
to access the Windows Firewall you can do so by opening the Server Manager and then choosing
the Windows Firewall with Advanced Security command from the Tools menu, as shown in the
below Figure.
Page | 17
When the wizard begins, click Next to bypass the Welcome screen. The next screen that you will see
asks you if you want to perform a Role based or a feature-based installation or if you would prefer
to perform a Remote Desktop Services installation. Unless you are configuring the server to run the
Remote Desktop Services, you should choose the Role Based or Feature Based Installation option.
Click Next to continue.
The next screen that you will see is very different from anything that existed in previous versions of
Windows Server. This screen asks you where you would like to install the role or feature. Although
this is a seemingly simple question, the wizard gives you a few different options, as shown in the
below Figure.
Page | 18
In previous versions of Windows Server, it was assumed that if you were installing a role or a feature
then you were performing the installation on the local server. Windows Server 2016 still allows you
to perform local installations of roles and features. As a matter of fact, this is the default behavior. If
you were to simply click Next on the screen above then the wizard would assume that the roles or
features that you choose later on will be installed on the local server. Although this is the default
behavior, it is not your only option.
The advantage to populating the server pool is that doing so allows you to manage multiple Windows
servers through a single pane of glass.
If you want to add additional servers to the server pool, open Server Manager and choose the Add
Servers command from the Manage menu as shown in below figures.
In the previous article I walked you through the process of installing roles and features onto
Windows Server 2016. I want to wrap up this series by showing you what to do after the roles and
features have been installed. If you look the figure in below, you will see the Server Manager
dashboard. There are several items on this screen that are worth paying attention to.
Page | 19
The first thing that you will probably notice is the big, orange section near the center of the screen.
This section is designed to help you to quickly get the server configured. As you can see in the figure,
this section contains links that you can click to add roles and features, add other servers to
manage, or to create server groups. As you have seen throughout this series, all of these tasks can be
performed manually, but if you forget how to do so then you can simply click on one of these links to
get the ball rolling.
The next most important thing is the column on the left. This column lists a number of different
Server Manager Views. At the moment the Dashboard view is selected, but you can switch to a
different view by clicking on the view.
Some of the views that are listed are standard for Windows Server 2016. The Dashboard, Local
Server, All Servers, and File and Storage Services views are created by default. There are also views
that may exist as a result of the way that you have configured your server. For example, in the figure
above the AD DS and DNS exist as a direct result of installing the corresponding roles and features.
Page | 20
CHAPTER THREE
Steps:
To add a new role to Windows Server 2016, you use Server Manager. Start Server Manager, click the
Manage menu, and then select Add Roles and Features.
Click Next on the Add Roles and Features Wizard Before you begin window that pops up. If you
checked Skip this page by default sometime in the past, that page will, of course, not appear.
Page | 21
Now, it's time to select the installation type. For DNS servers, you will be selecting the Role-based
or feature-based installation.
Page | 22
Next, you will choose which server you want to install the DNS server role on from the server pool.
Select the server you want, in our case there is one server named “DMUServer” with IP address
192.168.0.1 and the operating System is Microsoft Windows Server 2016 and click Next.
Next, Select “DNS Server” from “Add Roles and features Wizard” popup window
At this point, you will see a pop-up window informing you that some additional tools are required to
manage the DNS Server. These tools do not necessarily have to be installed on the same server you
are installing the DNS role on.
Page | 23
N.B If your working environment only does remote administration; you do not have to install the
DNS Server Tools.
Next you should see the Features window. No need to make any changes here; just click Next, and
now there is an informational window about DNS Server and what it does, although one would
assume that if you've gotten this far, you are already aware of what it is. Click Next to move on.
This is the final confirmation screen before installation completes. You can check the box to “Restart
the destination server automatically”, if you like. Installing the DNS Server does not require a
restart, but unless you've planned for the downtime, keep that box unchecked, just in case.
Page | 24
After you clicked “Install” button from the previous step; the installation process is staring and
click Close button when it finishes the installation process.
Page | 25
Finally, The DNS Server role should be installed on your server. There should be a new DNS Role
tile in your Server Manager.
Page | 26
Select your server on the left side of DNS Manager Window to open zone list.
Right click on Forward Lookup Zones and click on New Zone from context menu to bring up the
New Zone Wizard.
A forward lookup zone is used for DNS clients to obtain such information as Internet Protocol (IP)
addresses that correspond to DNS domain names or services that is stored in the zone.
Page | 27
➢ In the next window click Next.
In the next step you can select the type of DNS you want to use. The primary zone will be located on
your server; the secondary zone will be located on another server. The secondary zone is used in large
networks for load balancing. Choose Primary zone and click on Next to continue.
➢ Enter a name for the new zone and click on Next button.
Page | 28
➢ Select “don’t allow dynamic updates”, Dynamic updates allows to DNS clients to register their
resource records in DNS database automatically, but if the network is small we can make updates of
DNS database manually.
Page | 29
➢ In earlier step we have chosen “Do not to allow dynamic updates”; so we should add records to
zone manually. First, add record of the server itself. To do this right click on zone name and click
on New Host (A or AAAA).
Then the enter name and IP-address of the DNS Server in appropriate fields and then click Add Host.
Page | 30
As you can see on the right side of the DNS Manager window, the new host is now created and it’s
possible to create records for client computers in exactly the same way.
Next we have to add Reverse Lookup Zone. To do this right click on Reverse Lookup Zone and
click on New Zone to bring up the New Zone Wizard.
Reverse lookup zone provides mapping from Internet Protocol (IP) addresses back to DNS domain
names.
Page | 31
➢ Choose Primary zone and click on Next to continue.
➢ Select the type of IP-address, check on IPv4 and click on Next to continue.
Page | 32
➢ In Network ID field enter the first three octets of your DNS Server IP address.
Page | 33
Check “Do not allow dynamic updates” and press Next.
➢ Click on Finish button and the DNS server is now configured and ready for use.
As you can see on the right side of DNS Manager Window, Reverse Lookup Zone is now created.
Page | 34
3.3. Nslookup
Nslookup is a command line driven utility supplied as part of most Windows operating systems that
can reveal information related to domain names and the Internet Protocol (IP) addresses associated
with them.
Open your Administrator: windows PowerShell on your server or CMD on your windows client
machine and type Nslookup command.
c:\nslookup (Press enter)
Default Server: DMUServer.dmucs.local (The default DNS Server)
Address: 192.168.0.1 (IP address of the default DNS Server)
Here for the first time when we are trying to run Nslookup command on powershell our server name
will be definitely expressed as an unknown.
The reason for this is the DNS server does not possess a record for the server itself. Or simply it does
not know what its own name is. By creating a New Pointer (PTR) static entry we can fix this and let
DNS server know its own name.
Follow the following Steps:
1. Open the DNS management console, go to your reverse lookup zone and right click on it
and select “New Pointer (PTR)”.
Page | 35
2. In the New Pointer (PTR) window enter the IP address of DNS server and click Browse
button to select the host name of the server
Page | 36
Page | 37
Page | 38
3. Finally, go to Server Manager Tools menu and select Services option and find the DNS Server
service and right click on it and select Restart.
Page | 39
CHAPTER FOUR
4. Active Directory
Active directory is a centralized and standardized system that automates network management of
user data, security, and distributed resources; Enables interoperation with other directories.
Active Directory is designed especially for distributed networking environments.
Page | 40
Active Directory domains can be identified using a DNS name, which can be the same as an
organization's public domain name, a sub-domain or an alternate version (which may end in
.local). While Group Policy can be applied to an entire domain, it is typical to apply policies to
sub-groups of objects known as organizational units (OUs). All object attributes, such as
usernames, must be unique within a single domain and, by extension, an OU.
The structure of the hierarchy includes an Active Directory Forest, the forest's domains and
organizational units in those domains. AD DS integrates security by authenticating logons and
controlling who has access to directory resources.
An Active Directory Forest is the highest level of organization within Active Directory. Each
forest shares a single database, a single global address list and a security boundary. By default, a
user or administrator in one forest cannot access another forest.
An organizational unit (OU) is a container within a Microsoft Active Directory domain which
can hold users, groups and computers. It is the smallest unit to which an administrator can assign
Group Policy settings or account permissions. An organizational unit can have multiple OUs
within it, but all attributes within the containing OU must be unique. Active Directory
organizational units cannot contain objects from other domains.
Page | 41
➢ Install Active Directory Domain Service
1. Add Roles and Features
First, Open server manager-> Select Add roles and features from Dashboard/Mange options.
Page | 43
4. Add Features
After selecting Role, it will pop up a window to install additional services, choose add features
from popup window.
Page | 44
If you want to install any other additional features you can select from this page.
The next window is “AD DS” which describes about the AD DS and its functions.
Page | 45
5. Installation of Active Directory Domain Name Service
6. Select Next in Add Roles and Features Wizard page.
7. Confirm the installation selections. Check the Restart check box to restart server
automatically after installation and click “Install”
8. The installation starts and it takes some minutes to finish; after the installation is finished
click Close button.
Page | 46
4.1.3. Promote the Server as a Domain Controller
Select Deployment option as per your requirement. Here we are installing our first Active
directory in our server, so we have to select “Add a New Forest”.
Page | 47
Next, Give the root domain name, in our case as you can see in the below figure the root domai
is “dmucs.local”.
Page | 48
4.1.3.3. Domain Controller Options
Select forest and domain functional level. You have to also set your DSRM password here.
Next screen is DNS delegation; if you have any other DNS in your network, you can delegate the
DNS options. This screen might display this message: “A delegation for this DNS server
cannot be created because the authoritative parent zone cannot be found”.
Page | 49
Next, select the folder path for Active directory database files; by default it will be stored in
“C:\Windows\NTDS” folder.
Page | 50
Finally, Prerequisites check window will appear and if the prerequisite check passed successfully
click Install button to start the installation process.
Page | 51
CHAPTER FIVE
Page | 52
Type the name Staff on the name field of the Organizational Unit. Check the Protect container from
accidental deletion option. This option will protect this object from accidental deletion.
Step 3: Create a New domain user account under the organizational unit
Right-click the Informatic_staff Organizational Unit (OU), click New and click User.
Page | 53
Now type the user information. Type the first name and last name. Here user logon name is the name
that the user will use to actually log in the computer in the network. So when user tries to log in, he
will type [email protected] on username field. Then, click Next.
Now type the password. Check user must change password at next logon. The user will be forced
to change the password when user logs in. Click Next.
Page | 54
Finally, Review the user configuration and click Finish.
You have successfully created a user account. You can open the properties of the user account to
configure settings.
Page | 55
Summary of creating a Domain user account in Active Directory Domain name service:
➢ Click Start, point to Programs, point to Administrative Tools, and then click Active
Directory Users and Computers.
➢ In the Active Directory Users and Computers window, expand <domain name>.com.
➢ Right-click Users, point to New, and then click User.
➢ In the New Object - User dialog box, do the following:
Use this To do this
First name Type a first name for the account
User logon name Type the appropriate account name from the
previous list
➢ Click Next.
➢ In the Password box, type a password for the account, and then in the Confirm password
box, type the password again.
➢ Select User must change password at next logon then click next.
➢ Click Finish.
➢ Repeat steps 3 through 8 for all your remaining accounts.
Page | 56
➢
Type the name of the new group. Use a name that you can easily associate with the role or service for
which you are creating.
In the New Object - Group dialog box, do the following:
➢ In Group scope, click Global scope.
➢ In Group type, click Security.
➢ Click Ok.
Page | 57
➢ Repeat steps 3 through 7 for all your remaining groups.
Here we are created “TAs” Group which is associated to Technical Assistants of our
dmucs.local domain.
Page | 58
5.3. Adding a Domain user account in to a Domain group account
Right click on your user account which you want to add in a group account.
Enter your group name which you want to adding a user in it in the place of text area and click
ok.
➢
Finally, you have to get a message for the operation successfulness
Page | 59
Right click on your domain and from the drop-down options select New -> Computer
The “New Object-Computer” window will pop up and write the name of the client machine
on the Computer name: field, if you want to assign the client machine to a specific user or
group other than to a Domain Administrator click the Change button in the right side of User or
group: field.
Page | 60
In our case we are assigned the Minalu pc to the user Long Chalie in a dmucs.local
domain.
5.5. Joining a Client Machine to a Domain controller server from the client side
First you have to set up a static IP address for the client.
Page | 61
Steps:
Open your client machine “Computer” and click on the System Properties button. In our case
the client machine is Windows 10.
Now click on the advanced system settings link on the left-hand side.
1. When the advanced system settings open, switch to the computer name tab.
2. Click on the change button, from here you can change your Computers Name to a more
friendly name.
Page | 62
3. Now type in the name of your domain, ours is dmucs.local, but yours will be whatever
you made it when you set up Active Directory.
Page | 63
4. When you enter client machine, or click OK, you will be asked for the user’s name and
password of a Domain Administrator user account.
5. If you specify the correct credentials, you will be welcomed to the Domain.
6. Finally, you must restart the client machine to apply these changes.
7. After restarting the client machine, the window log on status changed. By clicking Switch
User tab you can log on to the domain
8. By clicking other user, you can log on to DMUCS domain using an already domain
member user account.
9. Next, you have to change the already given password for your domain member account
by yours own new one, and be able to log on, Click “OK”.
10. Next, enter your old password and the new one with confirmation and go on.
11. If your new password meets the password policy of the domain password policy, you
have to get a message that says “Your password has been changed” and click “OK”
then “Welcome” and “Preparing your desktop” screens will appear successively.
5.6. Enabling and Using Fine-Grained Password Policies in Active Directory Domain
Services
Fine-grained password policies are used to specify multiple password policies in a single domain
and apply different restrictions for password and account lockout policies to different sets of
users in a domain. Fine-grained password policies apply only to global security groups and user
objects and also, they cannot be applied to an organizational unit directly.
Other considerations are:
➢ Only members of the Domain Admins group can set fine-grained password policies, but
this can be delegated.
➢ Managing the policies is done through Active Directory Administrative Center and/or
Windows PowerShell.
To enable the Fine-grained password policies (FGPP) the following steps will be satisfied: -
Open the Active Directory Administrative Center (ADAC) from the Server Manger Tools menu,
Switch to the Tree View and navigate to the System, Password Settings Container.
Page | 64
Right-click the Password Settings Container object and select “New”, “Password Settings”
Page | 65
In the “Create Password Policy” UI, fill all the fields that are appropriate.
Page | 66
It’s suggested a descriptive name and description of why you create a new policy, how this
policy differ from the default Password policy. And what group it will apply to.
Page | 67
CHAPTER SIX
There are different ways to share a folder in Server 2016. Most efficient way is to use the Server
Manager. Here, we will configure some shared folder from domain controller named dmucs.
local. So, let’s setup some shared folders. To do so, open Server Manager. Click File and
Storage Services on the left pane. Then click Shares from the list. You will see the list of shared
folders on this server. As you can see below there are two folders, netlogon and sysvol shared by
default. This is because the server is Active Directory Domain Control.
Now let’s have a scenario, we want to share a folder named Academic Materials to Technical
Assistant users’ group. We want only the Technical Assistant group of users to view and execute
the contents of the folder. We already have Students users group set up and assigned users into the
group. So, let’s create the shared folder. To create a new shared folder, click Tasks and click New
Share in Server Manager Console.
Page | 68
New Share wizard pops up. There are number of share profiles by default. You can choose any
of these share profiles as you can see below. In our case we will choose SMB Share – Quick
and click Next.
Now you are asked to provide the share location of the folder that you want to share. Here the
chosen custom location is as C:\Acadamic Materials. Then click Next.
Page | 69
Type the Share name and description of the shared folder. Then click Next. Click OK to create
the new directory on path doesn’t exist warning will pop up.
Page | 70
Now configure other settings. Here, you will check to Enable access-based enumeration. This
option makes the folder visible for users that have permission to access the folder otherwise the
folder will be hidden. Allow caching of share option makes the folder to be accessed even when
the user is offline. Click Next.
Then, configure the folder permission. The shared folder has shared folder permission and NTFS
permission. These both permission works together to allow/deny users to access the shared
folder. Microsoft recommends allowing full control for share permission and using NTFS
permission to restrict and configure folder access. As you can see below, Share permissions:
Everyone Full Control. The permission shown here is the inherited NTFS permission from drive
NTFS permission. To change the permission, click Customize permission.
Page | 71
Click Disable inheritance. Then select Convert inherited permission into explicit
permissions on this object.
You can see the changes below. Remove both User groups from the permission. This Users group
contains all the users of the domain. We don’t want all the users of the domain to access this
shared folder so remove it. Click Add to add the Technical Assistant group. Click Select a
principal and add TAs group. Select the basic permissions and click OK.
Page | 72
Page | 73
Now the overall permission for the Academic Materials folder looks like this. Users of TAs
group can only read the files of Academic Materials folder.
Page | 74
Now let’s come back to the wizard and Click Next.
Page | 75
Review the settings and click Create.
The shared folder is now created. You can view the shared folder in Server Manager Console.
In this way you can configure shared folder using Server Manager. Remember, NTFS
permissions and shared folder permissions are different. If NTFS permission and shared folder
permission are conflicting, then the most restrictive permission is applied. For example, if you
configure NTFS permission to Full Control and shared permission to Read on a folder then the
permission applied will be Read only. Best practice to manage permissions for shared folder is,
configure full control permission for everyone and restrict the folder access using NTFS
permission. You can see the details of the shared folder by right clicking on it and select
properties from the given options.
Page | 76
In the properties of a shared folder window there are three options that you are going to see
and configure, these are permissions, settings and management properties.
Page | 77
6.2. Disk quota management
Disk quota management is a permission specified by administrators that set limits on the user,
workgroups, or other groups of storage space. By setting a quota, this helps prevents a server or
share from becoming full of data, but still allows users to save files.
Before to set or enable a disk quota the File Server Resource Manager (FSRM) role must be
installed in your server, to install it follow the next steps:
➢ Go to the Server manager and click on Add Roles and features from the Manage
menu.
➢ Select role- based or feature based installation and click Next in the next pop-up window.
➢ Select your destination server from the server selection window and click Next.
➢ Select file and storage services -> File and ISCSI services -> File server resource
manager roles from server roles window.
Page | 78
Click on Add Features.
Click Next.
Page | 79
In the confirmation window click Install button and the installation takes few minutes to
complete.
Page | 80
In the left pane of File Server Resource Manager, expand Quota Management and click
Quotas. In the Actions menu click Create Quota.
In the Create Quota dialog, click Browse to select the folder to which you want to apply the
quota. In this example, c:\Acadamic Materials and then selected Auto apply template and
create quotas on existing and new subfolders to make certain that any folders added for new
users are also included in the quota policy.
Page | 81
Derive properties from this quota template (recommended), Select the quota template you’d like
to apply and click Create.
Page | 82
➢ Create file screening exceptions that extend the flexibility of the file screening rules.
For example, you can:
Ensure that no music files are stored on personal folders on a server—yet you could allow
storage of specific types of media files that support legal rights management or comply with
company policies. In the same scenario, you might want to give a boss in the company special
privileges to store any type of files in his personal folder.
Implement a screening process to notify you by e-mail when an executable file is stored on a
shared folder, including information about the user who stored the file and the exact location of
the file, so that you can take the appropriate precautionary steps.
In the Create File Group Properties window, in the File group name box, you can see the
available included and excluded file groups and create your own file group by right click on File
group.
➢
Page | 83
➢
In the Create File Group Properties window, in the File screen template name box, you can see
the available file templates with screening type and file group groups and also you can create
your own file templates by right clicking on File screen template and select Create file template.
You can create a file screen option for your shared folder on file screens name box by right
clicking and selecting Create File Screen option.
Page | 84
On the File screen window the first step is click the Browse button under file screen path option
and select your shared folder directory or the file screen path.
Page | 85
Page | 86
For file screen properties you can either use properties from a file screen template
(recommended) or define your custom file screen properties.
In this example the selected file screen property is “Block Executable Files” under derive
property of the file screen template
Finally, after you select the file screen path and the file screen property you can create your file
screen by clicking the button Create.
You have successfully created a file screen for the folder Acadamic Materials as shown as
below.
Exercise
1. Write steps and make disk partition in window server 2016?
Page | 87
CHAPTER SEVEN
Page | 88
As usual on the domain server, create a new GPO, in our case the new GPO will be Technical
Assistant.
Page | 89
Next, on the Group Policy Management Editor, expand User Configuration, Policies, and
Administrative Templates, and then click System, next double click Don’t run specified
Windows applications, click Enabled and click Show.
In the Show Contents box, in the Value list, type notepad.exe, Calc.exe, and Paint.exe then
click OK
Page | 90
Next, click Control Panel, on the right pane, double click Prohibit access to Control Panel
and PC Settings, then click Enabled and click OK…
Page | 91
Next, let’s Link the Technical Assistant GPO to our domain, right click dmucs.local and click
Link an Existing GPO…
Page | 92
On the Select GPO box, under Group Policy Object, click Technical Support and then click
OK to proceed…
Next, you can open Command prompt (CMD) and type gpupdate /boot /force
Page | 93
Next, log in to your Windows client PC, in our case the client machine operating system is
Windows 10 ultimate and log in as a long DMUCS domain user account. Once you successfully
log on, try open notepad and Control Panel and you will be presented with Restrictions
warning box Next, back to your Domain Server and open Control Panel (remember that our
Domain Server is longed in as Domain Administrator).
What you need to do to solve the above small issue just a simple step where as in the Group
Policy Management, click Technical Assistant GPO, on the right pane, under Security
Filtering, click Authenticated Users and then click Remove and click OK to confirm remove
the Authenticated Users group.
Next, still in the Security Filtering, we can “Add” Students group so that only this group will
effected with this GPO.
Exercise
1. How to make Audit police setting in Window Server 2016?
2. How to change an account name, enabled or disabled an account, created or deleted an
account, changed a password, or changed a user group.
3. How to change local security policies and to see if someone has changed user rights
assignments, auditing policies, or trust policies?
Page | 94
CHAPTER EIGHT
Benefits of DHCP
Safe and reliable configuration. DHCP minimizes configuration errors caused by manual IP
address configuration, such as typographical errors, as well as address conflicts caused by a
currently assigned IP address accidentally being reissued to another computer.
Page | 95
➢ From the Roles lists, check the DHCP Server role, click Add Features on the popup
window.
Page | 96
➢ Just Click Next.
➢ Select additional features you desire or leave as default and click Next.
Page | 97
Page | 98
Keep in mind ‘Things to note’ and click Next.
Page | 99
➢ After installation process is completed, click Close.
Page | 100
➢ On DHCP Post-Install wizard, click next.
On Authorization, select a domain user account that has permissions to create objects in the Net
Services container in Active directory (For security lock-down) or simply use a domain admin
account and click Next.
Page | 101
Confirm on summary page that the security groups had been created and Authorizing DHCP
server role done. Close the screen
For the security groups to come into effect, we need to restart the DHCP Server service.
Page | 102
Click on Tools on Server Manager menu and click on Services
Page | 103
Finally Locate “DHCP Server” service, click on the Restart Service icon to restart the service.
Page | 104
➢ Click Next
➢ Give the scope a meaningful name that you want in addition to the description about it and click
Next.
Page | 105
➢ In this case the scope starts at .20 and let it end at .254. You may wish to change this to
your needs.
➢ In this our IPV4 scope we do not set exclusions or delays but you may need them and can
exclude some range of IP address here.
Page | 106
➢ Accept the defaults and click Next
Page | 107
➢ In our case the router is at 192.168.160.2 and Click Next.
➢ Under normal circumstances the wizard will detect the DNS server that is installed during the
installation of the DNS server role or a domain. Click Next.
Page | 108
➢ Here we do not support any WINS servers so just Click Next.
Page | 109
➢ Just Click Finish
Page | 110
Exercise
1. How to enable Web Server (IIS) role and FTP Server role service in Window Server 2016?
2. How to create FTP users?
3. How to creating FTP site?
4. How to make Window Firewall setup?
Page | 111
CHAPTER NINE
2. On the Before You Begin page click Next and select Role-based or feature based installation
then click Next.
3. On the Server Selection page, choose the server you want then click Next.
4. Select and tick the check box of “Print and Document Services” on the Server Roles page.
5. Now the component and features want to be installed; just click Add Features and then click
Next.
Page | 112
6. Leave the Features page by default and click Next. You don’t need to install any features
for print and document services, so do nothing on this page.
7. On the Print and Document Services page read all notification and click Next. It is necessary
once to read this page carefully.
8. Select the Print Server and Internet Printing options from Role Services.
Page | 113
Print and Document Role Services:
Page | 114
9. Click Install on the Confirmation page to finish the IIS Web Server options.
10. Finally click Close due to the installation of Print and document services successful
completion.
Page | 115
Exercise
1. How to install of printer in Window Server 2016?
2. How to share a printer to domain user computers?
Page | 116
CHAPTER TEN
10. Backup
A backup, or the process of backing up, refers to the copying and archiving of computer data so
it may be used to restore the original after a data loss event.
Backup causes:
➢ Software bugs routinely corrupt documents.
➢ Users accidentally delete data files.
➢ Hackers and disgruntled employees erase disks.
➢ Hardware problems and natural disasters take out entire machine rooms
If executed correctly, backups allow an administrator to restore a filesystem to the condition it
was in at the time of the last backup. Backups must be done carefully and on a strict schedule.
The backup system and backup media must also be tested regularly to verify that they are
working correctly.
Backups Recommendations:
➢ Perform all backups from a central location
➢ Label your media
➢ Pick a reasonable backup interval
➢ Choose filesystems carefully
➢ Make daily dumps fit on one piece of media
➢ Keep media off-site
➢ Protect your backups
➢ Limit activity during backups – use snapshots
➢ Verify your media
➢ Develop a media life cycle
➢ Design your data for backups
➢ Prepare for the worst
Page | 117
10.1. Types of Backups
The primary disadvantage to incremental backups is that they can be time-consuming to restore.
Going back to the above example, suppose that you wanted to restore the backup from
Wednesday. To do so, you would have to first restore Monday's full backup. After that, you
would have to restore Tuesday's backup disk, followed by Wednesday's. If any of the disks
happen to be missing or damaged, then you will not be able to perform the full restoration.
A differential backup is similar to an incremental backup in that it starts with a full backup, and
subsequent backups only contain data that has changed. The difference is that while an
incremental backup only includes the data that has changed since the previous backup, a
differential backup contains all of the data that has changed since the last full backup.
Suppose for example that you wanted to create a full backup on Monday and differential
backups for the rest of the week. Tuesday's backup would contain all of the data that has
changed since Monday. It would therefore be identical to an incremental backup at this point.
On Wednesday, however, the differential backup would backup any data that had changed since
Monday.
.
Page | 118
10.1.4. Synthetic Full Backup
A synthetic full backup is a variation of an incremental backup. Like any other incremental
backup, the actual backup process involves taking a full backup, followed by a series of
incremental backups. But synthetic backups take things one step further.
What makes a synthetic backup different from an incremental backup is that the backup server
actually produces full backups. It does this by combining the existing full backup with the data
from the incremental backups. The end result is a full backup that is indistinguishable from a full
backup that has been created in the traditional way.
As you can imagine, the primary advantage to synthetic full backups is greatly reduced restore
times. Restoring a synthetic full backup doesn't require the backup operator to restore multiple
tape sets as an incremental backup does. Synthetic full backups provide all of the advantages of a
true full backup, but offer the decreased backup times and decrease bandwidth usage of an
incremental backup.
What makes an incremental-forever backup different from a normal incremental backup is the
availability of data. As you will recall, restoring an incremental backup requires the tape
containing the full backup, and every subsequent backup up to the backup that you want to
restore. While this is also true for an incremental-forever backup, the backup server typically
stores all of the backup sets on either a large disk array or in a tape library. It automates the
restoration process so that you don't have to figure out which tape sets need to be restored. In
essence, the process of restoring the incremental data becomes completely transparent and
mimics the process of restoring a full backup.
Page | 119
➢ In the PowerShell console, type add-windowsfeature windows-server-backup and
press Enter.
➢ Or you can follow the GUI procedure to install the Windows Server Backup feature from
the Server manager window Add roles and Features option.
➢ Open Server Manager from the desktop taskbar (or from the Start screen if it’s not
already open) and select Windows Server Backup from the Tools menu.
Page | 120
In the webadmin console, click Local Backup in the left pane.
Now select Backup Schedule under Actions in the far right pane.
Page | 121
On the Select Backup Configuration screen, select Full server (recommended) and click Next.
Page | 122
On the specify Backup time select the time when do you want to run a backup in this example
once in a day at 9:00 is selected because usually most of the backup in the organizations was
done in the night due to the server goes very slow when making the backup.
Page | 123
On the Specify Backup Destination Type screen, select your dedicated backup destination type in
this case Backup to a volume is selected.
On the Select Destination volume screen click Add button and add your dedicated backup
volume in the Backup destination menu.
Page | 124
Select your backup destination volume and click OK.
Page | 125
Just Click Next.
Page | 126
After successfully created the backup schedule close the backup schedule wizard.
Page | 127
Exercise
Question 1. How to restore a Windows Server 2016 Domain Controller from a Backup?
Question 2. How to removing roles and features in Windows Server 2016?
Question 3: How to control a computer from a remote location?
Question 3: Install and configure Ubuntu Server 14.04 Trusty Tahr?
Page | 128
References
Page | 129