Looking for:
(PDF) Complete Windows Server StepByStep v | Zulfadli Saad - .How to configure iis in windows server r2 step by step Jobs, Ansættelse | Freelancer.Install Windows Server and Windows Server R2 | Microsoft Docs
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Meta's new front-end, back-end, mobile and database development courses prepare entry-level professionals for development careers in less than eight months. With so many project management software options to choose from, it can seem daunting to find the right one for your projects or company. IDEs are essential tools for software development. Here is a list of the top IDEs for programming in Knowing the terminology associated with Web 3. This quick glossary will introduce and explain concepts and terms vital to understanding Web 3.
Customer engagement and retention requires a strategic plan that attempts to measure, quantify and ultimately create a complete satisfying user experience on both an IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field.
IIS Manager extensions make it easy to administer local and remote Web servers. NET Framework 3. This article describes general procedures for installing Windows Server or Windows Server R2; links for more detailed information can be found throughout the article. Windows Server and Windows Server R2 are available in multiple editions to support the varying server and workload needs of organizations.
Processor — Processor performance depends not only on the clock frequency of the processor, but also on the number of processor cores and the size of the processor cache. The following are the processor requirements:. Disk space requirements —The following are the approximate disk space requirements for the system partition.
Itanium-based and xbased operating systems will vary from these estimates. Additional disk space may be required if you install the system over a network:. Computers with more than 16 GB of RAM require more disk space for paging, hibernation, and dump files.
Figure : Server21 Resources Double-click the Common resources so that you are connected to it Figure A new window will open up and display the contents of the folder it will be empty as there are no files in the folder Figure Attempt to create a new text file. Figure : Create New Text Document Could you create the file? A new window will open up and display the contents of the folder Figure Before we begin this exercise, we have done some preliminary setup.
We add mad. But for Tech Support group, we set Full Control permissions. In the earlier exercise, we add ali. Launch Map Network Drive wizard. Select Z as drive and enter the location of the network resource in the Folder: box Figure You must specify the name of the server and the share name. Figure : Map Network Drive Wizard Click Finish button to apply. A new window will open up and display the contents of the Common folder Figure Attempt to create a new test file Figure This can be time-consuming and frustrating for users.
Resources can be published in Active Directory, making them easy to find. In the next exercise you will publish the resource into Active Directory. Right-click domain myserver. Figure : Launch Shared Folder Wizard Figure : Shared Folder Wizard Click OK button to finish.
The new shared folder appears in the right windows pane of Active Directory Figure Figure : Active Directory Users and Computer Close Active Directory Users and Computer windows. Log on to the client computer as ocah. Click the Search Active Directory Figure In the Find drop box, select Shared Folders and in the In drop box, select you domain - myserver Figure Figure : Find Shared Folders A list of shared folders available is displayed Figure Select U as drive and enter the location of the network resource in the Folder: box Figure Note how the location for the server share is filled in automatically.
There are now one additional drive appears at the bottom Figure If you want to secure any resources by restricting access, you should ensure that the appropriate permissions have been set at both the share and file system level. Publishing shared folders in Active Directory simplifies the task of locating resources. You will specify a network home directory for users and arrange for this directory to be mapped when the user logs on.
Finally, you will specify disk space restrictions for specific users. Figure : Group Policy Management Editor 8. Expand the Windows Setting folder Figure Double-click Logon Figure Figure : Logon Properties Create new text document.
Double-click the text document. This will load the Notepad editor. Type the following text into the file Figure Save the file as Stkm. Figure : Menu bar - Save As… Enter Stkm. Click Save button Figure Figure : Save Button Close the Notepad editor. Close the Script windows by clicking the X button at the right top corner of the windows Figure On the Logon Properties window, click Add… button Figure Figure : Logon Properties — Add… Click Browse… button on the Add a Script window Figure Select Stkm.
Figure : Browse — Stkm. Click Open button Figure Figure : Open Button Now you can see the Stkm. Click OK button to continue Figure Figure : Logon Properties window Close the Group Policy Management Editor window. Expand the System folder Figure Click the Scripts folder Figure Double-click the Run logon scripts visible option Figure The Run logon scripts visible Properties appear.
Click the Enabled button to enable this setting Figure Figure : Run logon scripts visible Properties In the same folder, double-click the Run logon scripts synchronously option Figure The Run logon scripts synchronously Properties appear. Figure Run logon scripts visible Properties Figure : Run logon scripts visible — Enabled Close the Group Policy Management Editor.
Figure : Run Window The logon script should appear same as figure below Figure Figure : Logon Script Summary Scripts allow for both user and computer environments to be configured. The four scripts available are startup, shutdown, logon and logoff. You will map a home directory for a specific user, so that when they log on to the network, they will have a drive mapped to their home directory on the server.
Figure Administrator Login 2. So in this exercise my folder named will be User Rename the folder as User21 Figure Figure Rename Folder 5. Open the User21 folder properties. Figure : User21 Folder Properties - Sharing 7. Figure : Advanced Sharing… button 8. Specify the share name as Users Figure Click Permissions button Figure Figure : Permissions button Figure : Add button Figure : Select Users, Computers, or Groups Select Ahmad Akmal account from the list Figure Tick Allow box for Full Control permission.
This will give Ahmad Akmal full control over the folder User So he can read and write to the User21 folder on the myserver. Figure Folder Permissions For Users Now we add Administrator account to give Administrator permission to manage the shared folder.
Select Administrator user account from the list Figure This will give Administrator full control over the folder User So the Administrator can manage the User21 folder on the myserver. Figure : Folder Permissions For Users Figure : Advanced Sharing window Figure : User21 Properties window Click Close all remaining windows. Figure : Active Directory Users and Computers — domain Click the Sted Organization Unit Figure Right-click Ahmad Akmal and select Properties Figure Click Profile tab Figure Specify the name of your server instead of Server21 as in this example.
Click Sted OU and click Refresh button. Close Active Directory Users and Computer window. Double-click the Network Drives to access the zul. The folders are empty. Figure : Ahmad Akmal Home Directory Rename the file as Test Figure Figure Computer Checking The Users Home Directories Figure : Launch Windows Explorer Expand D: drive Figure Figure : Windows Explorer — D: Drive Expand User21 folder Figure You can see the folder zul.
Click zul. Figure : Windows Explorer — zul. Are there any files on it? You should see the Test. Summary Home directories allow users to store their files on the network.
This is especially suited to roaming users. Right-click D: drive and select Properties Figure Click the Quota tab Figure Enable the check box Enable quota management Figure Figure : Enable quota management 6.
Enable the check box Deny disk space to users exceeding quota limit Figure Select Limit disk space to option and set to 25 MB Figure Set the Set warning level to option to 5 MB Figure Click the Quota Entries… button Figure Figure : Quota Entries… button A list of quota entries will be displayed Figure Figure : Quota Entries Key-in zul.
Figure : Select Users After button Check Names are clicked, Active Directory will locate all matching or similar object names for zul. If there are matching or similar object names found, the complete name with email will be shown Figure Figure : Select Users — Ahmad Akmal Click OK button to confirm Figure Set the following parameters for zul. Select the option Limit disk space to and set the value to 10MB. Set the value for Set warning level to option to 8MB. Figure : Add New Quota Entry Now there is a new quota entries added to the Quota Entries list for zul.
Close the Quota Entries window. Figure : Local Disk D: Properties window The Disk Quota confirmation message appear, just click OK to enable the quota system now Figure Log on the client computer as zul.
View Home Directory capacity. Right-click on L: drive and select Properties Figure The zul. Look at the directory capacity, it only 10 MB. Same as the Disk Quota Entry we set earlier Figure Click OK button to close Figure Copy Bliss. Right-click Bliss. Figure : Copy Bliss. Paste the Bliss. Right-click L: drive and select Paste Figure Figure : Paste Bliss. Copy and Paste another file into zul. Figure : Disk Quota Warning Why this happen? Click OK button to close the warning message Figure Look at the Used space: size, you have used almost 10 MB.
The home directory almost full Figure Summary Disk quotas allow administrators to restrict disk space to users so that disk space can be effectively managed. This means you will need to create a ZAP file in order to publish the application. In the second part of this exercise you will publish this software to members of the Sklr OU, and then test the deployment of the software.
Figure : Launch Windows Explorer 3. So in this exercise my folder named will be SoftDist Rename the folder as SoftDist21 Figure Open the SoftDist21 folder properties. Figure : Advanced Sharing 9. Specify the share name as ESoftware Figure Figure Remove Everyone First, we add first user of Sklr OU. Select Ain Syahmi account from the list Figure Tick Allow box for Read permission.
So she can read from the SoftDist21 folder on the myserver. Click Apply button Figure Now we add second user of Sklr OU. Select Aliuddin account from the list Figure This will give Aliuddin Read permission over the folder SoftDist This will give Administrator full control over the folder SoftDist So the Administrator can manage the SoftDist21 folder on the myserver. Figure : SoftDist21Properties window Download file WinRar 3. Download file Sample. Figure Notepad Figure : Notepad — Save As Key-in the following text into the winrar.
Figure winrar. After finish insert the text, save and close the winrar. Expand Forest: myserver. Expand the Software Settings folder Figure Browse the network and locate the winrar. Figure : Network Figure : Network — Server21 - ESoftware Figure : Network — Server21 — ESoftware — winrar. Select Published Figure Figure : Deploy Software Update Group Policy In order for the software to install however, the user needs sufficient rights on the local computer.
Launch Control Panel. Figure : Launch Control Panel Click Performance and Maintenance Figure Click Administrative Tools Figure Figure : Performance and Maintenance Double-click Computer Management icon Figure Figure : Computer Management Double-click Power Users Figure Key-in ain.
Enter username as ain. Figure : Power User Properties Close all the remaining windows. Log on to the server from client computer as ain. Copy the file sample. Right-click on Sample. Figure : ESoftware on Server21 Double-click the sample. WinRar installation wizard appeared. Install the WinRar Figure Figure : WinRar installation wizard After finish install WinRar, close all remaining windows.
And then double-click the sample. The Sample. Now you can read or extract contents of the Sample. Figure : Sample. Figure : Windows Explorer — D Drive Create subfolder called FrontPage. Rename the folder as FrontPage Figure Select the CD drive Figure Expand the SoftDist folder. Figure : Windows Explorer — Paste Folder Click the FrontPage folder to confirm all files are copied Figure Figure : Software installation — New - Package Browse the network and locate the FP Figure : Network — Server21 Select Advanced Figure Click the Deployment tab and select Assigned Figure Figure : Assigned Software Figure Log on to Windows XP Note how FrontPage appears on the start menu Figure The installation process will begin.
When requested, enter the CD key and click Next button Figure Click Next button until reach the Summary windows Figure Click the Install button Figure Wait until the installations process complete Figure Figure : Setup Completed Click Finish button to complete the FrontPage installation Figure After running FrontPage , log off the client computer.
Log on to the client computer as zul. Is FrontPage available on the Start menu? We only deployed a software application to a Sklr OU users. Summary In this exercise you deployed a software application to a group of users. The software application and Zap file were placed on a network share. This software was then associated with a group policy for the Sklr Organizational Unit.
The software deployment was then tested when a user of the Sklr OU logged onto a client computer. In installing software on the client computer, the installer needed the required permissions. In this exercise, the users were made members of the Power Users group to enable the installation of the software. In actual use, members would be set up with the required permissions, rather than perhaps being made a member of this group on the local computer.
Managing the software distribution can simply the administration of the network and ensure that users only get the applications that have been assigned to them. This is important because when there is a problem, often the cause is logged by the system.
The event logs are a good source to look for problems in configuration or access. Launch Event Viewer. Figure : Launch Event Viewer 3. The Event Viewer windows displays the current event logs. There are a number of logs available Figure Under Windows Logs, click the Security log. Note the large number of events that are listed in the middle windows Figure Figure : Even Viewer — Security Logs 5.
All events have a Source and Task Category. Note these two columns in the window Figure It is handy to sometimes restrict the events being viewed to just those events that are of interest. Often the event log has hundreds of events listed, so you need the ability to look for only those events that are relevant to what you are trying to resolve.
On the right window, click the Filter Current Log… Figure Figure : Even Viewer — Security Logs 7. Select all Event level: Figure In Event sources: drop-down menu, select Microsoft Windows security auditing Figure Figure : Filter Current Log window - Event sources 9.
Set the Task category: to Logon Figure Figure : Filter Current Log window Note that only Microsoft Windows security auditing events with Logon task category are now listed Figure Figure : Even Viewer — Security events Double-click the first event to see the event properties Figure The event properties of the first event appeared.
The dialog box gives an indication of the event [including the event ID, which is helpful when exploring your server as to possible problems] Figure Figure : Event Properties Click Close button Figure Close the event viewer.
Summary Windows Server logs activity to event logs. These events can be viewed with Event Viewer. Typical events are printing, security, auditing, logon and logoff, as well as other events generated by application software or other services such as DNS. Events are helpful in determining problems with configuration or security. You will use event viewer to view the logged accesses.
Often, if you find that you cannot resolve problems in user access, enabling auditing and viewing the audit logs with event viewer can help you determine the cause of the problem. Figure : Group Policy Management - Forest 4. Edit the Default Domain Policy. Figure : Edit the Default Domain Policy. Expand Computer Configuration Figure Figure : Expand Computer Configuration. Expand Policies Figure Figure : Expand Policies.
Expand Windows Settings Figure Figure : Expand Windows Settings. Figure : Expand Security Settings. Expand Local Policies Figure Figure : Expand Local Policies. Expand Audit Policy Figure Figure : Expand Audit Policy. Open Audit logon events properties. Figure : Open Audit logon events properties. Enable the Success and Failure attempts Figure Figure : Define policy settings. Enable the following events Figure : i. Audit account logon events — Success ii.
Audit account management — Success iii. Audit directory service access — Success iv. Audit logon events — Success, Failure v. Audit object access - Success, Failure vi. Audit policy change — Success vii. Audit system events - Success Figure : Group policy management editor. Close the group policy management editor.
No comments:
Post a Comment