Lecture Notes Unit 4 Network Administration
Lecture Notes Unit 4 Network Administration
ADMINISTRATI
SUB CODE: KS_C_FC-592
9TH SEM M.SC. (CA & IT)
ON
• PROCESS
MANAGEMENT
• AUTOMATED TASKS
• ARCHIVING
NETWORK ACCESS
• INTRODUCTION OF
Password Resets
PROCESS Freeing Up Server Disk Space
MANAGEMENT Disk Usage Scans
& AUTOMATED Restarting Services
TASKS Reboots
Malware Scans
Malware Scans
ARCHIVING
NETWORK
ACCESS
Network Access (Logs)
ARCHIVING
NETWORK Archiving Network Access
ACCESS
Why log archival is important for
network security?
Network devices like workstations, servers,
routers, and firewalls generate a large
volume of logs every day.
ARCHIVING These digital bread crumbs can be your
NETWORK greatest ally in network security;
ACCESS following them could point you towards
potential data breaches and network
vulnerabilities.
Besides analysing logs, it’s equally
important to preserve them.
Logs can be crucial in mitigating attacks
Discovering an attack is often just the tip of
the iceberg.
In cases where an attacker infiltrated your
ARCHIVING
NETWORK network ahead of time, forensic analysis of
logs can help you discover how the network
ACCESS was compromised in the first place.
Once that’s established, you can take
measures to ensure the same vulnerability
isn’t exploited again.
For instance, say multiple unauthorized
access attempts from a suspicious source
ARCHIVING are detected on a critical server and you
NETWORK need to investigate the incident.
ACCESS At times like these, your network logs will
be crucial in charting out your course of
action.
Archiving logs for compliance
Preserving relevant electronic records such
ARCHIVING as network logs is essential in complying
NETWORK with regulations like the Sarbanes-Oxley
Act of 2002, established a set of auditing
ACCESS and financial regulations that public
companies in the United States must adhere
to.
INTRODUCTION
OF WINDOWS
SERVER &
INSTALLATION
Microsoft Windows Server OS is a series of
INTRODUCTION enterprise-class server operating systems
OF WINDOWS designed to share services with multiple
SERVER & users and provide extensive administrative
INSTALLATION control of data storage, applications and
corporate networks.
Development for Windows Server started in
the early 1980s when Microsoft produced
two operating system lines: MS-DOS and
INTRODUCTION Windows NT.
OF WINDOWS Prior to the release of Windows NT, many
SERVER & companies relied on the Unix operating
INSTALLATION system that required expensive RISC-based
hardware to run file and printing services.
Windows NT had the ability to run on less
costly x86 machines.
A key feature in the NT architecture is
INTRODUCTION symmetric multiprocessing.
OF WINDOWS Later iterations of Windows Server can be
SERVER & deployed either on hardware in an
INSTALLATION organization's data center or on a cloud
platform, such as Microsoft Azure.
Key features in later versions of Windows
Server include
Active Directory, which automates the
INTRODUCTION management of user data, security and
OF WINDOWS distributed resources, and enables
SERVER & interoperation with other directories; and
INSTALLATION Server Manager, which is a utility to
administer server roles and make
configuration changes to local or remote
machines.
Planning:
The Windows Server 2012 R2 Edition you
INTRODUCTION choose should be based on multiple factors,
OF WINDOWS including:
SERVER & The roles you intend the servers to perform
INSTALLATION The virtualization strategy you intend to
implement
The licensing strategy you plan to use
Windows Server 2012 R2 Core Editions:
INTRODUCTION Windows Server 2012 R2 Datacenter
OF WINDOWS Windows Server 2012 R2 Standard
SERVER &
Windows Server 2012 R2 Essentials
INSTALLATION
Windows Server 2012 R2 Foundation
Datacenter:
Designed for large and powerful servers
INTRODUCTION Supports up to 64 processors
OF WINDOWS Fault tolerance—hot-add processors
SERVER & Only available to purchase through:
INSTALLATION Microsoft volume-licensing program
Originalequipment manufacturers (OEMs),
bundled with a server
Standard:
INTRODUCTION Includes the full set of Windows Server
OF WINDOWS 2012 R2 features
SERVER & Only differs from Datacenter by the number
INSTALLATION of virtual machine instances permitted by
the license
Essentials:
Includesnearly all features from Datacenter
and Standard editions, except:
INTRODUCTION Server Core
OF WINDOWS Hyper-V
SERVER & Active Directory Federation Services
INSTALLATION
Limited to one physical or virtual server
instance
Maximum of 25 users
Foundation:
Reduced version of the operating system
INTRODUCTION designed for small businesses
Supports only basic server features:
OF WINDOWS
SERVER & File and print services
INSTALLATION Application support
No virtualization rights
Limited to 15 users
Supporting Server Roles:
3 basic categories of server roles:
Directory services
Store, organize, and supply information
INTRODUCTION
about a network and its resources.
OF WINDOWS
Infrastructure services
SERVER &
Provide support services for network clients
INSTALLATION
Application services
Provide communication services, operating
environments or programming interfaces for
specific applications.
Supporting Server Virtualization:
POSE: Physical operating system environment
VOSE: Virtual operating system environment
INTRODUCTION
OF WINDOWS Edition POSE Instances VOSE Instances
SERVER & Datacenter 1 Unlimited
INSTALLATION
Standard 1 2
Foundation 1 0
CONFIGURING
ADDS
What is Authorization?
Authorization is a process of verifying
OVERVIEW OF that an authenticated user has permission
ACTIVE to perform an action.
DIRECTORY Authorization happens frequently and
INFRASTRUCTU unobtrusively whenever users request
RE, services, like
CONFIGURING opening their home folder,
ADDS reading/writing files, or
when requesting access to an AD DS
aware application.
OVERVIEW OF
ACTIVE
DIRECTORY The user only sees the result of the
INFRASTRUCTU authorization. (they are granted or denied
RE, access.)
CONFIGURING
ADDS
OVERVIEW OF WhyDeploy ADDS (Active Directory
ACTIVE Domain Services) ?
DIRECTORY A central repository for identity
INFRASTRUCTU management.
RE, Provides authentication and
CONFIGURING authorization services through Group
ADDS Policy.
OVERVIEW OF Provides information management and
ACTIVE sharing services enabling users to find
DIRECTORY any component by searching the
INFRASTRUCTU directory.
RE, Inessence, Active Directory acts like a
CONFIGURING phonebook for your network so you can
ADDS look up and manage devices easily.
ADDS is composed of both physical and
logical components: