Académique Documents
Professionnel Documents
Culture Documents
In this exercise, you will look at case studies for successful implementation of
Microsoft Windows Server 2003. This exercise requires Internet access.
1. Open Internet Explorer and go to the Windows Server 2003 site at
http://www.microsoft.com/windowsserver2003/default.ms
px.
2. Click on Product Information.
3. Scroll down the options and choose Case Studies, then choose All Windows
Server 2003 Case Studies.
4. Per any other instructions from your instructor, choose at least five cases from
those presented. Analyze the cases and determine why Windows Server 2003
was the right operating system to install in that environment.
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
In this exercise, you will view the complete listing of top-level domains. This
exercise requires Internet Explorer and Internet connectivity.
1. Open Internet Explorer.
2. Go to http://www.icann.org.
3. Choose Top-Level Domains (TLDs).
4. Read the text and view the TLDs in the list.
5. Go back to the home page. Choose Country-Code Top-Level Domain
Resource Materials and read the text there.
In this exercise, you will run the nslookup utility in interactive mode and
become more familiar with it.
1. Open a command prompt.
2. At the command line, enter nslookup.
3. At the interactive prompt, type help.
4. View the list of possibilities.
5. Enter the name of a server and view the results.
6. Enter the command ls.
7. You should now see the addresses within the domain. Enter the command
exit.
This lab demonstrates how to use the WHOIS search to see what names are
available. It requires Internet access.
1. Open Internet Explorer.
2. Go to http://www.verisign.com/nds/naming/.
3. Beneath WHOIS, enter Sybex.com.
4. Notice the detailed information, including the status and name server.
5. Enter a series of random keystrokes, and add .com on the end to see the results
when the domain is available.
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
In this exercise, you will convert a FAT or FAT32 partition to NTFS, without data
loss. To do this exercise, you must have a FAT/FAT32 partition on the existing
workstation.
1. Open a command prompt.
2. At the command line, enter convert C: /fs:ntfs.
3. Follow the prompts to complete the conversion.
In this exercise, you will use the PING utility to test network connectivity from the
host.
1. Open a command prompt.
2. Enter the command ping 127.0.0.1.
3. You’ll see a display of echo responses from the loopback address. When it’s
completed, enter the command ping w.x.y.z, where w.x.y.z is the IP
address currently in use on your host.
4. Enter the command ping a.b.c.d, where a.b.c.d is the IP address of
your default gateway.
5. Enter the command ping e.f.g.h, where e.f.g.h is the IP address of a
neighboring host.
6. Enter the command ping name, where name is the name of the remote host
that you earlier pinged by IP address.
Upon completion of these steps, you will have verified that connectivity exists and
name resolution is working properly.
In this exercise, you will use the TRACERT utility in place of PING to test
network connectivity from the host and see the route that data is taking.
1. Open a command prompt.
2. Enter the command tracert w.x.y.z, where w.x.y.z is the IP address
currently in use on your host. The response should be almost immediate; you
can see that there was not truly a route taken in order to go from your machine
back to your machine.
3. Enter the command tracert a.b.c.d, where a.b.c.d is the IP address
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
In this exercise, you will use the PATHPING utility to test network connectivity
from the host and see the route that is taken.
1. Open a command prompt.
2. Enter the command pathping 127.0.0.1.
3. A display of echo responses from the loopback address appears. When it’s
completed, enter the command pathping w.x.y.z, where w.x.y.z is
the IP address currently in use on your host.
4. Enter the command pathping a.b.c.d, where a.b.c.d is the IP
address of your default gateway.
5. Enter the command pathping e.f.g.h, where e.f.g.h is the IP
address of a neighboring host.
6. Enter the command pathping i.j.k.l, where i.j.k.l is the IP
address of a remote host on another network. Not only will you see that the
host is accessible, but also the path that is taken to reach that host. This
combines the best of PING with the best of TRACERT.
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
In this lab, you will edit the HOSTS file, which can be used in place of DNS for
name resolution..
1. Open a command prompt.
2. Enter the command ping sybexbooks. An error message will tell you that
the host is unknown.
3. Start a text editor of your choice.
4. Open the file HOSTS in the \Windows\System32\drivers\etc
folder.
5. The last line of the file should identify the loopback address; it will look
something like this:
127.0.0.1 localhost
Move to one space past this entry and add sybexbooks such that the line now
reads
127.0.0.1 localhost sybexbooks
Note: Make sure that no pound character (#) appears in this line.
6. Enter the command ping sybexbook. The echo messages from the local
host should now appear.
In this exercise, you will check to see if TCP/IP is configured and the values that
are currently in use.
1. From the Start menu, choose Control Panel, and then Network Connections,
Local Area Connection.
2. The General tab showing the status of the network connection will be open.
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
In this exercise, you will use the IPCONFIG utility and examine how TCP/IP is
configured from the command line.
1. From the Start menu, choose Command Prompt.
2. At the command prompt, type IPCONFIG.
3. Note the IP address and subnet values.
4. At the command prompt, type IPCONFIG /ALL.
5. In addition to the IP address and subnet values, notice that you now also see
values for DNS and WINS configuration.
This lab demonstrates the different views available within System Monitor.
1. Start System Monitor and notice that it loads with a default of three objects
being monitored.
2. From the command line, do a directory listing of the hard drive (dir /s) to
create some activity, and notice how it looks within System Monitor.
3. Change to Histogram view by clicking the Histogram View button on the
toolbar.
4. Switch to Report view and repeat the process.
This lab will illustrate how Windows Server 2003 can monitor its operations and
send an alert when thresholds are exceeded.
1. Open the System Monitor tool, and expand Performance Logs and Alerts.
2. Right-click Alerts and click New Alert Settings.
3. Name the alert Test1.
4. In the General tab, track the Network Interface > Bytes Total/Sec counter. Set
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
an Alert when the value is over 100 with a sample of once per second.
5. In the Action tab, enter net send computername Network
activity over 100 (replacing computername with the name of your
computer).
6. Right-click the new alert and start it from the shortcut menu. Have a partner
ping your IP address, or connect to one of your shared folders and copy a file
from it. The alert should be triggered.
This lab illustrates how to test password configuration settings that were set in Lab
15.
1. From the Start menu, choose Administrative Tools Computer Management
Local Users and Groups.
2. Choose Users and add a new user. Use your own username and information.
3. Uncheck the box User Must Change Password at Next Logon.
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
4. In both of the password boxes, enter walker and click the Create button.
5. An error message tells you that the password does not meet the minimum
length requirements. Change the password to jameswalker in both boxes and
click Create. This time, the user will be added without any errors.
In this exercise, you will validate a security policy from the command line with
the SECEDIT.EXE utility.
1. From the Start menu, choose Command Prompt.
2. Move to the security\templates folder under Windows on the root
drive.
3. Type secedit /validate hisecws.inf. A message will report that
the template file is validated.
4. Enter copy hisecws.inf emmett.inf.
5. Type secedit /validate emmett.inf. A message will report that the
template file is validated.
6. Start a text editor of your choice and open the emmett.inf file.
7 Near the top of the file will be the variable $Chicago$. Change this to
$Ballpoint$, then save and exit the file.
8. Type secedit /validate emmett.inf. A message will indicate that
the file is corrupt and should not be used.
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
In this exercise, you will refresh a computer policy from the command line. The
book illustrates that this can be done with SECEDIT using the /refreshpolicy
switch, but that is no longer possible. This exercise illustrates the method by which a
policy is now refreshed in Windows Server 2003.
1. From the Start menu, choose Command Prompt.
2. Type gpupdate. A message reports that both the computer policy and the
user policy have been refreshed.
In this exercise, you will use the SECEDIT utility to export the current
configuration to a template file that can be used should the current settings ever need to
be reapplied.
1. From the Start menu, choose Command Prompt.
2. Enter the command secedit /export /CFG sybex.inf. A message
indicating that the sybex.inf file does not exist should appear.
3. Enter the command type sybex.inf. View the newly created template.
This lab shows how to terminate a runaway application and prevent it from further
utilizing resources.
1. Launch the Notepad program. Imagine that it is a runaway and won’t close by
normal methods.
2. Right-click on a blank space on the taskbar and choose Task Manager from the
pop-up menu.
3. Locate the entry for Notepad in the Applications tab, and select it.
4. Click End Task.
5. Notice that the Notepad Window closes.
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
Events from Certificate Services are written to the Application log (which can be
viewed with Event Viewer). This lab illustrates how to add verbose details to events
written to the Application log. This is useful for troubleshooting.
1. From the Start menu, choose Command Prompt.
2. At the command line, enter net stop certificate.
3. At the command line, enter certutil –setreg ca\loglevel 4.
4. Enter net start certificate.
This lab illustrates how to use GPRESULT.EXE to get RSoP information from the
command line.
1. From the Start menu, choose Command Prompt.
2. At the command line, enter gpresult. Notice the items calculated and
displayed.
3. At the command line, enter gpresult /v. You can see that turning on the
verbose mode provides considerably more information.
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
In this exercise, you will use the net use commands to map a network drive on
a server from the command line in Windows Server 2003.
1. From the Start menu, choose Command Prompt.
2. At the command line, enter net share. You’ll see a list of shares available
on your host. Those ending with a dollar sign ($) are hidden shares, one of
which should exist for each drive (C$, D$, etc.).
4. Assuming that you do not have a drive X:, enter the command net use
x: \\server\C$, where server is the name of your server.
5. Switch to the X: drive and do a directory listing to confirm that you have just
mapped C: to X:.
In this exercise, you will use the net use commands to remove a network map
from the command line in Windows Server 2003. You must have already finished Lab 25
before attempting this lab.
1. From the Start menu, choose Command Prompt.
2. At the command line, enter net use.
3. You should now see a list of network connections, and in that list drive X: is
mapped to \\server\C$, where server is the name of your server.
4. Switch to the C: drive and enter the command net use x: /delete.
5. Attempt to switch to the X: drive and do a directory listing. An error will state
that the system cannot find the drive specified.
6. At the command line, enter net use. Verify that the map no longer appears.
This lab must be done on a computer that has a shared folder and users who are
accessing it.
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
This lab continues on from the preceding one and must be done on a computer that
has a shared folder and users who are accessing it.
1. From the Start menu, choose Administrative Tools Computer Management.
2. Expand Shared Folders, and click Sessions.
3. The display shows the user and computer accessing your shares and the
number of open files. Click on Open Files to see the actual files in use.
4. Go back to Sessions. Right-click the user and choose Close Session from the
pop-up menu.
5. Exit Computer Management.
This lab must be done on a computer that has a shared folder and users who are
accessing it.
1. From the Start menu, choose Administrative Tools Computer Management.
2. Expand Shared Folders, and click Sessions.
3. Right-click below the list of open sessions and choose Disconnect All Sessions
from the pop-up menu.
4. At the warning, choose OK to verify that you do wish to close all sessions.
5. Exit Computer Management.
This lab illustrates how to use the MOUNTVOL utility to see the mounted volume
names.
1. Open a command prompt.
2. At the command line, enter mountvol.
The standard help message appears, indicating that you did not give the correct
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.
0782144519 Ancillaries
syntax. At the end of that will be a list of mounted volume names. There
should be one volume for each drive in the system (A:, C:, etc.).
3. Enter mountvol c: /l. Only the volume name for C: appears.
MCSE: Windows Server 2003 Active Directory Planning, Implementing, and Maintenance Study Guide, Second
Edition © Wiley Inc. 2006. All Rights Reserved.