The wizard creates the new virtual machine, and it appears in the Hyper-V Manager console. Lab 7: Creating and Configuring Virtual Machine Settings 57 Question Why would a virtual machine in this default configuration fail 2 to boot if you were to start it? Completion time 10 minutes Create a new Hyper-V virtual machine named Vmachine2, with a GB virtual hard disk and MB of startup memory using the same default settings as the one you created with the New Virtual Machine Wizard in Exercise 7.
Write out the Windows PowerShell command s that will execute the required settings. Exercise 7. Mindset How can you tell how much memory a virtual machine needs at any given time? In the Hardware list, click the Memory icon. The Memory page appears see Figure In the Startup RAM text box, type Question What is the maximum amount of memory that Vmachine1 can use in 3 its current configuration with Startup RAM set to megabytes?
Increase the Memory Weight value by pushing the slider all the way to the right. Completion time 10 minutes Using Windows PowerShell commands only, configure the Vmachine2 virtual machine you created in the previous challenge to use dynamic memory, using the same values you assigned to Vmachine1 in Exercise 7. Write out the Windows PowerShell command s that will apply the required settings. What hardware options are available when creating virtual hard disks in Hyper-V?
The Choose Disk Format page appears. The Choose Disk Type page appears see Figure Figure The Choose Disk Type page 5. Select the Fixed size option and click Next. What happens to the parent disk as a result of creating the differencing disk? In the Name text box, type Fixed1 and click Next. The Configure Disk page appears.
Leave the Create a new blank virtual hard disk option selected and, in the Size text box, type 20 and click Next. If you were to select the Copy the contents of the specified Question physical disk option and then select one of the listed physical 3 disks, would you or would you not be creating a pass-through disk?
The wizard creates the new virtual disk file. Exercise 8. Mindset Under what conditions is it necessary to edit a VHD? The Locate Virtual Hard Disk page appears. An Open combo box appears.
Select the Fixed1. The Choose Action page appears. Select the Expand option and click Next. The Expand Virtual Hard Disk page appears. In the New Size text box, type 25 and click Next. The wizard expands the file and closes it. Mindset How do you mount an existing VHD into a new virtual machine? In the Name text box, type Vmachine3 and click Next.
Select the Use an existing virtual hard disk option, and then click Browse. Mindset Under what conditions would you want to use a pass-through disk, rather than a virtual hard disk? In the Name text box, type Vmachine4 and click Next.
Select the Attach a virtual hard disk later option and click Next. Select the Vmachine4 virtual machine you just created and, in the right pane, click Settings. On the right side of the dialog box, select Hard Drive and click Add. The Hard Drive page appears. Select the Physical hard disk option to create a pass-through disk. However, the drop- down list does not contain any drives, so you cannot create a pass-through disk.
Click Cancel to close the Settings dialog box. In the left pane, select the Disk Management node. In the Disk Management snap-in, right-click the Disk 3 panel and, from the context menu, select Offline.
The status of the disk changes to offline. Close the Computer Management console. On the right-side of the dialog box, select Hard Drive and click Add. This time, the disk you took offline appears in the drop-down list. Select Disk 3 in the drop-down list. Click OK to close the Settings dialog box. Lab Challenge Creating a Snapshot Overview To complete this challenge, you must create a snapshot of a virtual machine, preserving its state at a particular date and time.
Mindset Which type of switch should you create? In the left pane, select New virtual network switch. The new switch appears in the left pane, selected so that the Virtual Switch Properties page appears in the right pane. The Virtual Switch Manager dialog box closes. Mindset What hardware, virtual or otherwise, is necessary for Hyper-V virtual machines to communicate with each other? In the Connection drop-down list, select Internal Switch and click Next. Repeat steps 1 to 8 to create a second virtual machine, this one named Vmachine5.
Assuming that the virtual machines you just created have Windows Server installed on them, in its default Question configuration, and all of the computers are configured with 1 appropriate IP addresses, what communications would be possible on this virtual network? How would the communication capabilities of the virtual Question network differ if you had created an external virtual switch 2 instead of an internal one?
Why is this so? Lab 9: Creating and Configuring Virtual Networks 75 Lab Challenge Creating an Isolated Network Overview To complete this challenge, you must use Windows PowerShell cmdlets to create and configure the components required to build a virtual network that is completely isolated from all external physical networks and the Hyper-V Host computer.
Completion time 15 minutes Using Windows PowerShell cmdlets only, you must create a new virtual network connecting the Vmachine4 and Vmachine5 virtual machines you created previously in this lab. The new virtual network must be completely isolated, both from the Hyper-V server hosting the virtual machines and from the physical network to which the server is connected.
To create the new network, you need to create a new virtual switch and add a new network adapter to each of the virtual machines. Write out the Windows PowerShell commands needed to create and configure the required components. When connecting a virtual machine to an isolated network, Question should you install a synthetic network adapter or a legacy 3 network adapter? Explain why. Mindset What IPv4 addressing policies does your organization have in place?
Completion time 20 minutes To complete this exercise, you must determine what IPv4 addresses you should use on the workgroup for which you are responsible. Your supervisor has assigned you a group of computers that consists of three servers and seven workstations. Your entire department must share an IPv4 network with the address Create a list of the network addresses your subnetting can create, using CIDR notation.
Then choose one of the subnets for use by your computers and list the IP addresses in that subnet, along with the correct subnet mask value. Exercise Mindset What parameters do you have to configure to ensure that the computers on your network can communicate with each other?
Using the IP addresses you calculated in Exercise In the left pane of the Server Manager console, click the Local Server icon. Question How did the computer obtain its current IP address? How can 1 you determine this? When the Server Manager console appears, click the Local Server icon. Write the necessary commands in the Lab 10 worksheet. In the Command Prompt window, type ping The computer successfully pings the specified address.
In the Command Prompt window, type ping svr-dc-a and press Enter. The computer successfully pings the specified computer. Question What does the result of this ping test prove? In the Command Prompt window, type ping svr-mbr-c and press Enter. The computer fails to ping the specified computer. Question Why did these three ping tests fail, when the previous tests 7 succeeded?
Check your available server resources and consider the number of DHCP clients on your network. The Installation progress page appears as the wizard installs the selected roles and features see Figure The Authorization page appears. Click Commit to use the default Authorization settings. The Summary page appears.
Expand the svr-dc-a. Expand and right-click the IPv4 node and, from the context menu, select New Scope. The New Scope Wizard appears. Click Next to bypass the Welcome page.
The Scope Name page appears. In the Name text box, type The IP Address Range page appears. In the Start IP address text box, type In the End IP address text box, type Question Notice that the wizard automatically adds a value to the 1 Subnet mask text box.
Where did this value come from? In the Subnet mask text box, key The Add Exclusions and Delay page appears. The address appears in the Excluded address range list. Question Why is it necessary to exclude addresses from the range of 2 addresses included in the scope? Question How would it be possible to leave the The Lease Duration page appears. Click Next to accept the default value. Click Next to accept the Yes, I want to configure these options now option.
The Router Default Gateway page appears. In the IP address text box, key Click Next to bypass the page. The Activate Scope page appears.
Click Next to accept the default Yes, I want to activate this scope now option. The Completing the New Scope Wizard page appears. The scope is added to the console. Expand the IPv4 node and the new scope, and then select the Address Pool folder. Mindset What IPv6 addressing policies does your organization have in place? In the Name text box, type IPv6. The Scope Prefix page appears see Figure In the Prefix text box, type fd and click Next.
The Add Exclusions page appears. In the Start IPv6 address text box, type and click Add. The Scope Lease page appears. The wizard creates the scope. Expand the Scope [fd] IPv6 node you just created. Click the Scope Options node, then right-click it, and, from the context menu, select Configure Options.
The Scope Options dialog box appears. In the New IPv6 address text box, type fd and click Add. Wait for DNS Validation to complete. The address appears in the Current IPv6 address list. Click OK to close the Scope Options dialog box. Launch Server Manager and, in the left pane, click the Local Server icon. In the Properties tile, click the Ethernet setting. The Network Connections window appears. Right-click the Ethernet icon and, from the context menu, select Properties. Then click OK.
Design a DNS namespace for your organization that conforms to the following guidelines. All of the additional domains you create must be subordinate to this domain.
Each division must be represented by a separate subdomain in the namespace. Your host names should identify the function of each computer.
These servers must be in the domain adatum. On the worksheet shown in Figure and in your Lab 12 worksheet file, write the domain names and the fully qualified domain names you have selected for the computers in the appropriate spaces. The first step in implementing the DNS namespace you designed is to create a zone representing your root domain. The DNS Manager console appears. The New Zone Wizard appears.
The Zone Type page appears. Click Next to accept the default setting. The Zone Name page appears. In the Zone name text box, type the internal domain name from the diagram you created in Exercise The Dynamic Update page appears. Select the Allow both nonsecure and secure dynamic updates option and click Next.
The Completing the New Zone Wizard page appears. The new zone appears in the Forward Lookup Zones folder in the console. Question What resource records appear in the new zone you created 2 by default? In this exercise, you create the departmental domains you specified in your namespace design. Mindset What is the difference between creating a second-level domain and a third-level domain? When you create a domain within a zone, you specify the name for the NOTE new domain relative to the zone name.
For example, to create the hr. Repeat steps 1 to 2 to create the domains for the Sales and Production departments from your namespace design. Question What resource records appear in the new domains you 3 created by default? Mindset What good are zones and domains without resource records? The New Host dialog box appears, as shown in Figure In the Name text box, type the host name of the Internet web server you specified in your namespace design. In the IP Address text box, type Click Add Host.
A DNS message box appears, stating that the resource record was created. A new, blank Add Host dialog box appears. In the three domains you created in Exercise For the purposes of this exercise, the actual IP addresses you use when NOTE creating your resource records do not matter. In an actual DNS deployment, you must either specify an appropriate IP address for each host, based on the subnet to which the computer is connected, or rely on DHCP to create the resource records for the computers.
Click Done to close the Add Host dialog box. Close the DNS Manager console. Mindset What are the minimum requirements for a domain controller server? Does this server fulfill them? Lab Installing Domain Controllers 3. Select the Active Directory Domain Services check box. The Active Directory Domain Services page appears. The Active Directory Users and Computers console fails to open properly. In this exercise, you create a new domain in a new forest and configure the server to function as the domain controller for that domain.
Click the More link. Click the Promote this server to a domain controller link. Select the Add a new forest option, and in the Root domain name text box, type adatum. The Domain Controller Options page appears. The DNS Options page appears. The Paths page appears. The Review Options page appears. Click the View Script button. A Notepad window appears, containing a Windows PowerShell script equivalent to the settings you just configured in the wizard.
Close the Notepad window without saving the file and click Next. The Prerequisites check page appears. The wizard performs the necessary checks, and a notice appears on the page, indicating that all prerequisite checks have passed successfully. The Installation page appears as the wizard creates the new forest and promotes the server to a domain controller.
After several minutes, the computer restarts. Mindset How does the process of creating a subdomain differ from that of creating a forest root domain? On the Installation progress page that appears at the end of the Active Directory Domain Services role installation procedure, click the Promote this server to a domain controller hyperlink.
Select the Add a new domain to an existing forest option and, in the Select domain type drop-down list, leave Child Domain selected. Question What would the difference in results be if you were to choose 2 the Tree Domain option rather than the Child Domain option? By default, the wizard configures this domain controller to Question function as a DNS server.
Under what circumstances would it 3 be practical not to configure this domain controller to be a DNS server? Click Select.
A Credentials for deployment operation dialog box appears. A Select a domain from the forest dialog box appears. Select adatum. The domain name appears in the Parent domain name field of the Deployment Configuration page.
In the New domain name text box, type NY and click Next. Lab Installing Domain Controllers Why does the Domain Controller Options page have a Question Domain functional level drop-down menu, but not a Forest 4 functional level drop-down menu? The Prerequisites Check page appears. After the system passes all the prerequisite checks, click Install.
The wizard creates the new domain and configures the server to function as a domain controller. To complete this challenge, you must configure the server to function as a replica domain controller for the adatum. Write out the necessary commands, using all the required parameters and the correct syntax. Mindset Is it always necessary to create computer objects manually? The Active Directory Users and Computers console appears. In the left pane, expand the adatum.
In the Computer name text box, type Wkstn1. Under User or group, click Change. The Select User or Group dialog box appears. The group appears in the User or group text box. The wizard creates the computer object. Mindset How many other ways are there to create a user object? In the First name text box, type Lori and in the Last name text box, type Kane. In the User logon name text box, type lkane and click Next.
The second page of the New Object — User Wizard appears. Clear the User must change password at next logon check box and click Next. A confirmation page listing the settings you configured appears. The wizard creates the user object and closes. The Active Directory Administrative Center console appears.
In the left pane, select the adatum local node and, in the center pane, double-click the Computers container. The contents of the Computers container appears in the center pane. The Create Computer dialog box appears see Figure Figure The Create Computer dialog box 4. In the Computer name text box, type Wkstn8. Under Member of, click Add.
The Select Groups dialog box appears. The group appears in the Member Of text box. The new object appears in the Computers container. In the left pane, select the adatum local node and, in the center pane, double-click the People OU.
The contents of the People container appears in the center pane. The Create User dialog box appears see Figure Figure The Create User dialog box In the First name text box, type Monica, and in the Last name text box, type Brink. Scroll down and, in the Member of section, click Add.
The new user object appears in the People OU. Disable the User must change password at next logon option and enable the Password never expires option. Completion time 15 minutes To complete this challenge, create a correctly formatted LDIF input data file to create the following domain user accounts in the People OU of the adatum.
For the user principal name, use an e-mail address formed from the user logon name and the domain name. Mindset Under what conditions is it necessary to create a new organizational unit?
In the Name text box, type Rome. The wizard creates the Rome OU object. The Create Organizational Unit dialog box appears see Figure In the Name text box, type London and click OK.
The new OU appears in the center pane. On the Taskbar, click the Windows PowerShell icon. The Administrator: Windows PowerShell window appears. Question What must you do to assign the same Group Policy settings 1 to the systems in all three of the OUs you just created?
Take a screen shot of the adatum. Mindset What is the function of the domain local groups in a group nesting arrangement? The New Object - Group dialog box appears see Figure In the Group name text box, type Rome Backup. Under Group scope, select the Domain local option and click OK.
The new group object appears in the Rome OU. What must you do to enable the members of the Rome Question Backup group to perform backup operations on the local 2 system?
Repeat steps 2 to 4 to create a domain local group called Rome Printing. Mindset What is the function of the global groups in a group nesting arrangement? The Create Group dialog box appears see Figure In the Group name text box, type Backup Managers. Under Group scope, select Global and click OK. The new group appears in the Rome OU.
Completion time 15 minutes To complete this challenge, you must nest the groups you created previously in this lab so that the members of the Print Managers group will receive the privileges assigned to the Rome Printing group, and the Backup Managers group will receive the privileges assigned to the Rome Backup group.
List the changes you must make to complete the challenge. Mindset How do you delegate administrative privileges to users without giving them full control?
The Delegation of Control Wizard appears, displaying the Welcome page. The Users or Groups page appears. The group appears on the Users or Groups list. The Tasks to Delegate page appears see Figure The Completing the Delegation of Control Wizard page appears. Mindset What is the most convenient location to manage your enterprise Group Policy strategy?
Lab Creating Group Policy Objects 5. Scroll down and select the Group Policy Management check box. The Tools menu appears, which now contains the Group Policy Management console. Leave all windows open for the next exercise.
The Group Policy Management console appears. In the left pane, expand the Forest: adatum. The new starter GPO appears in the console. In the right pane, double-click the Prohibit user configuration of offline files policy. The Prohibit user configuration of offline files dialog box appears. Select the Enabled option and click OK. The New GPO dialog box appears. Expand the Group Policy Objects node. Close the Group Policy Management Editor console. Mindset How do you control which computers receive the settings in a specific GPO?
Click the Group Policy Inheritance tab. Which of these 2 values will a computer in the Paris OU use after processing all its Group Policy settings? In the Security Filtering area, click Add. The Select User, Computer, or Group dialog box appears. Lab Creating Group Policy Objects 6. In the Enter the object name to select text box, type Servers and click OK.
The Servers group appears in the Security Filtering list. Select the Authenticated Users group and click Remove. Click OK to confirm the removal.
Mindset How can you tell when Group Policy settings are active? Prove that this is the case by taking screen shots of the computer that demonstrate that the Account Lockout Threshold value has changed. Mindset How can you control access to your network computers using security policies? Browse to the Group Policy Objects folder.
Right-click the Group Policy Objects folder and, on the context menu, click New. The Group Policy Management Editor console appears. In the Security Options folder, double-click the Devices: Allowed to format and eject removable media policy. The Devices: Allowed to format and eject removable media policy dialog box appears see Figure Select the Define this policy setting check box, and in the drop-down list, select Administrators and Interactive Users.
In the Group Policy Management console, right-click the adatum. The Select GPO dialog box appears. Select the adatum. Lab Challenge Assigning User Rights Overview In this exercise, you add a selection of user rights assignments to the ones that already exist.
Completion time 15 minutes Your organization has created a new job role called the director, and your job is to provide the new directors with the domain controller user rights they need to perform their jobs.
The Directors group has already been created in the adatum. To complete this challenge, you must grant the Directors group the following user rights to all the domain controllers on the network, without interfering with any of the existing rights. Mindset How can you use the auditing capabilities in Windows Server to increase the security of your network without overwhelming yourself with data? The audit policies appear in the right pane.
Double-click the Audit account logon events policy. The Audit account logon events Properties sheet appears. Select the Define these policy settings check box. Select the Failure check box, clear the Success check box, and click OK.
Question Why, in this case, is the auditing of event failures more useful 3 than the auditing of successes? Double-click the Audit object access policy. The Audit object access Properties sheet appears. Select the Failure and the Success check boxes and click OK. Under Security Settings, select the Event Log node. In the right pane, double-click the Maximum security log size policy. Select the Define this policy setting check box, leave the spinbox value at kilobytes, and click OK.
Question Why is it prudent to limit the event log size when using 4 auditing. Click the File Explorer icon on the Taskbar.
The File Explorer window appears. In the left pane, browse to the C: drive on the local computer. The Windows Properties sheet appears. Click the Security tab.
Click Advanced. The Advanced Security Settings for Windows dialog box appears. Click the Auditing tab see Figure The Auditing Entry for Windows dialog box appears. Click Select a Principal. In the Enter the object name to select text box, type Administrator and click OK. Select the Full Control check box and click OK. Click Continue to bypass error messages, if necessary. Click OK to close the Windows Properties sheet. Mindset How do you display auditing data? Completion time 10 minutes To complete this challenge, display the auditing data you configured your server to gather in Exercise Mindset How can you stop network users from wasting time with games and other non-productive programs?
Lab Configuring Application Restriction Policies 5. The default policies and subfolders appear. The New Hash Rule dialog box appears see Figure Figure The New Hash Rule dialog box 9. Click Open.
The information to be hashed appears in the File Information box. The hash rule appears in the Additional Rules folder. What problem would occur if you changed the default Question software restriction to Disallowed and configured a hash rule 1 setting the regedit. Click the File Explorer button on the Taskbar. A message box appears, informing you that access to the file is blocked.
A message box appears, prompting you to confirm your action. Mindset How does the process of creating AppLocker rules differ from that of creating software restriction policies? Expand the AppLocker folder see Figure Figure The AppLocker folder 8.
Select the Executable Rules folder. Right-click the Executable Rules folder and, on the context menu, click Automatically Generate Rules. The Rule Preferences page appears. The Review Rules page appears. A message box appears, asking if you want to create default rules. The rules appear in the Executable Rules folder. Repeat steps 9 to 13 twice to create the default rules in the Windows Installer Rules and Script Rules folders.
The Permissions page appears. Select the Deny option and click Next. The Conditions page appears. Select the File hash option and click Next. The File Hash page appears. Click Browse files. Browse to the regedit file and click Open. The Name and Description page appears.
The new rule appears in the Executable Rules folder. The Registry Editor program loads. Close the Registry Editor. The Services console appears. Right-click the Application Identity service and, in the context menu, click Start.
The service starts. Question Why is it necessary to start the Application Identity service 2 before the AppLocker rules take effect? Mindset How can you use a firewall to limit access to a web server? Lab Configuring Windows Firewall 5. The Select Role Services page appears. The Installation Progress page appears as the wizard installs the selected roles and features.
Click Close after successful installation. A message box appears, offering Microsoft Web Platform. Click No. Expand the Sites folder. Right-click the Sites folder and, from the context menu, select Add Website.
The Add Website dialog box appears see Figure In the Site name text box, type Intranet. Change the value in the Port text box to The new Intranet website appears in the Sites folder.
Lab Configuring Windows Firewall Exercise Mindset What is the default Windows Firewall configuration? An Internet Explorer window appears. The browser displays the splash screen that IIS8 installs as the home page of the default website, indicating that IIS is installed and running properly on the computer. Next, test the intranet website by using the URL you specified in Exercise The browser successfully connects to the website, indicating that it is configured correctly.
The browser connects to the web server. The browser fails to connect to the intranet web server. The Windows Firewall control panel appears, as shown in Figure Click Turn Windows Firewall on or off. The Customize settings for each type of network window appears. Under Domain network settings, select the Turn off Windows Firewall not recommended option. The browser now successfully connects to both websites on the server and displays the IIS8 splash screen. The Internet Options dialog box appears.
Under Browsing History, click the Delete button. The Delete Browsing History dialog box appears. Click Delete. Then click OK to close the Internet Options dialog box. Question Why is it necessary to clear the cache before you retest the 3 web server connections? Lab Configuring Windows Firewall Question Why can you not simply leave Windows Firewall turned off 4 when you deploy an actual web server? The Allow apps to communicate through Windows Firewall window appears, as shown in Figure Question Why are you now unable to connect to the website from the 5 client?
Then, click OK. Question Why are you unable to connect to the intranet site from the 6 client? In this exercise, you use the Windows Firewall with Advanced Security console to create rules that will enable clients to access both websites. Mindset How do you customize the protection provided by Windows Firewall? Select the Inbound Rules container.
The list of default inbound rules appears. Double-click the rule and examine its properties. How would the opening of the port you performed in Exercise Question Right-click the Inbound Rules container and, from the context menu, select New Rule.
Select the Port option and click Next. The Protocol and Ports page appears. Leave the default TCP and Specific local ports options selected. In the Specific local ports text box, type 80, and click Next. The Action page appears. Leave the default Allow the connection option selected and click Next. The Profile page appears.
Clear the Private and Public check boxes, leaving only the Domain check box selected, and then click Next. The Name page appears. The wizard creates and enables the new rule and then adds it to the Inbound Rules list. How would the rule creation procedure you just performed Question differ if you wanted to restrict client access to the intranet site 8 to computers on the local network only? Double-click the rule you just created.
Close OK to close the Properties sheet. Question What are the results, and why are they different from the 9 results you experienced with the program exception? Each student requires a basic workstation that accesses virtual machines hosted by servers on the Internet.
Each student requires a server or workstation capable of running as many as three Windows Server virtual machines simultaneously, using a hypervisor product, such as Microsoft Hyper-V or Microsoft Virtual Server. Each student or group of students requires three servers running Windows Server , connected to an independent local area network.
Classrooms using the MLO option require no setup or preparation beyond the acquisition of credentials providing access to the MLO web site. Each MLO lab consists of an independent environment consisting of two or three virtual machines, with all required software already installed and configured. Students only have to log on and select the lab they want to complete. For courses using a classroom-based virtual machine solution, each student must have a computer with sufficient memory and other hardware resources to support three instances of Windows Server , each running in a separate virtual machine.
The instructor or lab manager is responsible for outfitting the computers, and for selecting and installing the hypervisor product that will support the virtual machines.
For courses using traditional server hardware, without virtual machines, students must have three servers to complete all of the exercises in the lab manual. Here again, the instructor or lab manager is responsible for designing and implementing the hardware configuration for the classroom. This document provides operating system setup instructions for each of the labs in the manual. For classroom-based solutions, either virtual or traditional, instructors or lab managers are responsible for deploying the operating systems needed for each lab and configuring them using the individual requirements for each lab, as described in the following sections.
However, many schools already have procedures in place for automating the OS deployment and configuration processes. Any method is acceptable, as long as it provides the operating environment each lab requires. The column headings in each table provide the computer names by which the servers are identified in the lab manual. Lab 1. Installing Servers Because it requires students to install and upgrade servers, Lab 1 has some unique setup requirements.
One server must be in a bare metal configuration, that is, with all the hardware necessary to install and run Windows Server , but with its hard disk completely blank. Lab 1 is unique in that it requires Windows Server R2 to be installed on two of its servers. One of these will be upgraded to Windows Server during the lab, and the other will function as the source system for a side-to-side migration.
Configuring Servers Lab 2 introduces students to the setup procedures you must perform immediately after installing Windows Server For that purpose, you must first install a domain controller for a new domain.
The students will then join a second, newly installed server to the domain during the lab. Configuring Local Storage This lab requires students to work with the Windows Server storage subsystem.
To accommodate this, one of the three servers SVR-MBR-C must have three hard disks, in addition to the one on which the operating system is installed. This is, obviously, most easily accomplished in a virtual machine environment.
The three disks can be any size, and should be in their newly installed—that is, offline—state at the beginning of the lab. Configuring File and Share Access Lab 4 uses an additional hard disk to create and configure shares. However, it is also possible to complete the exercises with a single additional disk, or by using only the system disk. In these cases, the only changes needed will be to the drive letter that the students use to create the directories they will share.
Configuring Print and Document Services In Lab 5, students use a member server to practice creating and configuring printers. Then, they use Group Policy to deploy a printer through Active Directory Domain Services, using the domain controller to confirm their success.
Configuring Servers for Remote Management In Lab 6, the students use their servers to establish administrative connections in a variety of ways. This lab uses a standard three-server configuration that will be repeated in many of the labs upcoming in this manual. Creating and Configuring Virtual Machine Settings In this lab, students practice creating and configuring virtual machines in a Hyper-V environment.
This presents a problem when the lab environment itself relies on virtual machines. This is because DISM. Also, although you can create virtual machines on a second generation Hyper-V server that is, a guest Hyper-V server running on a host Hyper-V server , you cannot actually run them. Lab 7 is designed so that the lab servers can run as guests on a Hyper-V host server. In a virtualized classroom environment, you can provide students with a Hyper-V server running three guest servers on virtual machines, and they will be able to complete the labs successfully.
The labs have not been tested with any other hypervisor products. Creating and Configuring Virtual Machine Storage In Lab 8, students continue their work with Hyper-V virtual machines and, in this case, their virtual storage capabilities. For this lab, the two member servers must have the Hyper-V role installed prior to the commencement of the lab.
You must initialize the disks and create simple volumes on them before the commencement of the lab. New eBooks. Search Engine. Installing and Configuring Windows Server R2.
Fully updated for Windows Server R2! Prepare for Microsoft Exam - and help demonstrate your real-world mastery of implementing and configuring core services in Windows Server R2. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Install and configure servers Configure server roles and features Configure Hyper-V Deploy and configure core network services Install and administer Active Directory Create and manage Group Policy This Microsoft Exam Ref: Organizes its coverage by exam objectives.
0コメント