Vous êtes sur la page 1sur 155

MICROSOFT CERTIFIED

PROFESSIONAL

Microsoft Certified System Engineer


Introduction to MCSE
The new MCSE track requires 7 exams. Only 1 of those is an elective. The Networking component
has 4 required exams. They are as follows:

Exam 70-290: Managing and Maintaining a Microsoft Windows Server 2003 Environment
Exam 70-291: Implementing, Managing, and Maintaining a Microsoft Windows Server
2003 Network Infrastructure
Exam 70-293: Planning and Maintaining a Microsoft Windows Server 2003 Network
Infrastructure
Exam 70-294: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003
Active Directory Infrastructure

The client component consists of a choice between the existing client exams Windows XP
Professional (70-270) or Windows 2000 Professional (70-210). If you have already passed one of
these exams, then you do not need to worry about the client component.
The Design component consists of 1 exam and you will have a choice between 2 exams:

Exam 70-297: Designing a Microsoft Windows Server 2003 Active Directory and Network
Infrastructure
Exam 70-298: Designing Security for a M
Microsoft Windows Server 2003 Network
You can take both of these exams and use 1 of them to satisfy your elective requirement
which is discussed next.

Microsoft Certified Professional

70-270: Installing Configuring and Administering


Microsoft Windows XP Professional
70-290: Managing and Maintaining a Microsoft
Windows Server 2003 Environment

INDEX
Chapter 1: Introduction to Windows 2003. 8
Chapter 2: Installing Windows XP / Server 2003..15
Chapter 3: Configuring Windows 2003 Server Environment...26
Chapter 4: Managing Users & Groups...32
Chapter 5: Working with Group Policy and Active Directory .39
Chapter 6: Managing Disks.....50
Chapter 7: Accessing Files / Folders using Windows Server 2003 and XP......64
Chapter 8: Managing Network Connections ......79
Chapter 9: Manage Printing 87
Chapter 10: Administering Terminal Services ..103
Chapter 11: Optimizing windows 2003 Server ..118
Chapter 12: Performing System Recovery Functions 130
Chapter 13: Using Windows Backup ..140
Chapter 14: Using Recovery Console .150

Chapter 1

Apple
Mac OS

Introduction to Windows 2003

Novell
LAN 2.2
LAN 3.11
LAN 3.12
LAN 4.X
LAN 4.X

UNIX
Solaris Sun
HP
HP
AIX IBM
XENIX
SCO-Unix

Microsoft

LINUX
Red hat
Suse

NT 4.0

DOS 1, 2, 3, 4, 5, 6.22.
Lan Manager
Win 3.1 / 3.11
NT 3.5, NT 3.51
Win 95
Win 98
Win ME

Win 2000
XP-Home
Win 2003
Vista Home
Win 2008

1.1 Common Features of Popular Microsoft Operating Systems


Features of Windows9X
Only 32 Bits Edition
Graphical User Interface
Multitasking
No multiprocessing
Plug & play
Log on is not mandatory
File System: - FAT 16/32

Features of Windows NT 4.0


32 Bits
Graphical User Interface
Multitasking
Multiprocessing (Max 2)
Log on is mandatory
File System: - FAT 16/NTFS
Can be used as Domain controller
TCP/IP services DHCP/DNS/WINS
Not Plug & play
No support for FAT 32 Bit
No Active Directory support
Features of Windows2000
32 Bits
Graphical User Interface
Multitasking
Multiprocessor (16 Processors max)
Log on is mandatory
File System: - FAT 16/32/NTFS
Can be used as Domain controller
TCP/IP services DHCP/DNS/WINS
Plug & play
Supports Active Directory Service
Terminal Service
Disk Quota
EFS (Encrypted file system)
IIS 5.0
Features of windows Server2003
32 Bits/64 bits Editions
Graphical User Interface
Multitasking
Multiprocessor (32 max | 64 Max.)
Log on is mandatory
File System Supported: - FAT 16/32/NTFS
Can be used as Domain controller
TCP/IP services DHCP/DNS/WINS
Plug & play

Additional Features of 2003 server


Active Directory Service
Terminal Service
Disk Quota
EFS (Encrypted file system)
IIS 6.0
Remote Desktop
Shadow Copy

1.2 Microsoft OS Family

NT 4.0
NT Server 4.0

NT Wks 4.0

Windows 2000
Windows 2000 server
Windows 2000 advanced server
Windows 2000 datacenter server

Windows 2000 Professional

Windows 2003 server


Windows 2003 Server Web Edition
Windows 2003 Server Standard Edition
Windows 2003 Enterprise Edition
Windows 2003 Datacenter Edition

10

Windows XP Professional

Features of Web Server Edition


Targeted at enterprise, as front-end web server.
1 to 2 x86 CPUs,
Up to 2GB memory,
Available only in 32 bit edition.
Network load balancing services. ASP. net, IIS 6.0
Application Blocking
Restricted Functions of Web Server Edition
NO Domain controller, certificate services, media server, real time communication, share
point team services, RIS, IAS. (Radius).
Reduced: 10 SMB session, 1VPN, Terminal service in remote administration mode only.
Features of Standard Edition Server
Targeted for small organization departmental server
1 to 4 X86 CPUs
UP to 4GB memory
Basic functions as of windows 2000 server
Network Load balancing Services
Full active directory,
Restricted Functions of Standard Edition Server.
No Microsoft Meta directory services
No games, Open GL S/savers, MSN Explore.
Features of Enterprise Edition
Targeted for medium and large Enterprise.
Available in 32 and 64 bit editions
1 to 8 CPUs (X86 and IA 64)
32 GB memory for X86 and 64 GB for IA64
All features of standard server
2 to 8 node clustering
Microsoft Meta Directory Services (MMS)
Hot add memory
Windows System Resources Managers (WSRM)
Features of Datacenter Edition
Targeted at enterprise (SQL/TS/IIS)
Up to 32 CPU x86 and 64 (IA-64)
64 GB (x86) and 128 GB (IA-64)
All features of Enterprise server
2-8 node clustering
Window System Resource Manager (WSRM)

Features of 64 bit Editions of Windows XP and server2003


11

64 bit edition of windows 2003 server run only on Intel Itanium based computers which provide
higher clock speeds and faster floating point processor operations.
64-Bit editions do not support 16-bit windows applications, Real mode application, POSIX
application and print service for Apple Macintosh Clients.

12

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

13

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

14

Chapter 2

Installing Windows XP / Server 2003

2.1 Installing Windows XP/Server 2003


Plan your installation:When you run the Windows Server 2003 Setup program, you must provide information about how
to install and configure the operating system. Planning can make your installation of Windows
Server 2003 more efficient by helping you to avoid potential problems during installation. An
understanding of the configuration options will also help to ensure that you have properly
configured your system.
There are some important things you should take into consideration when planning for your
Windows Server 2003/XP installation:

Check System Requirements


Check Hardware and Software Compatibility
Determine Disk Partitioning Options
Choose the Appropriate File System: FAT, FAT32, NTFS
Decide on a Workgroup or Domain Installation
Complete a Pre-Installation Checklist

After you have made sure you can start the installation process.
Hardware Requirements for Windows XP
Processor

P-233Mhz (Minimum) PII-300MHZ (Recommended)

Ram

64 MB(Minimum) 128 MB (Recommended)

Hard Disk Space

1.5 GB (Minimum) 2GB (Recommended)

You will also need the following


1. CD of the operating system
2. Min 12X CD-ROM
3. HCL (Hardware Compatibility List)

15

Hardware requirements for windows server 2003


Hardware

Web

Std

Enterprise

Data Centric

Min Ram
Rec RAM
Max Ram

128 MB
256 MB
2 GB

128 MB
256 MB
4 GB

CPU Min

233 MHz

233 MHz

CPU Rec
Multiprocessor

550 MHz
2

550 MHz
4

128 MB
256 MB
32bit- 32GB
64bit-64GB
32-233 MHz
64-733Mhz
733 MHz
8

Disk Space

1.5GB

1.5GB

512 MB
1 GB
32bit-64GB
64bit-512GB
32-400 MHz
64-733Mhz
733 MHz
32-32
64-64
32-1.5GB
64-2GB

32-1.5GB
64-2GB

You can install Windows Server 2003 in several methods - all are valid and good, it all
depends upon your needs and your limitations.
Method 1 Start setup by booting directly from cd: - Enter the bios settings and set the first
boot device to cd-rom drive. Insert the cd and restart the computer. Now the setup will
automatically start.
Method 2 Start setup from existing windows computer: - Copy the I386 folder from CD.
Run the setup process by going into the I386 folder and using WINNT32.exe command.
After starting the setup, complete following steps.
Phase 1: The text-based portion of the Setup program
The setup process begins loading a blue-looking text screen (not GUI). In that phase you will be
asked to accept the EULA and choose a partition on which to install 2003, and if that partition is
new, you'll be asked to format it by using FAT, FAT32 or NTFS.
1. You can press F6 if you need to install additional SCSI adapters or other mass-storage
devices. If you do you will be asked to supply a floppy disk with the drivers and you
CANNOT browse it (or a CD for that matter). Make sure you have one handy.

16

Fig.2.1

If you want, you can press F2 to run the ASR sequence. For that you need a good backup
created by the Windows Server 2003 backup program, and the ASR floppy disk. If you plan
to install a new copy of 2003 - don't do anything.

Setup will load all the needed files and drivers.

Select To Setup Windows Server 2003 Now. If you want, and if you have a previous
installation of the OS, you can try to fix it by pressing R. If not, just press ENTER.

Fig.2.2

Read and accept the licensing agreement and press F8 if you accept it.
17

Select or create the partition on which you will install Windows Server 2003.
Depending upon your existing disk configuration choose one of the following:

If the hard disk is unpartitioned you can create and size the partition on which you will
install Windows Server 2003.

Fig.2.3

Fig.2.4

18

If the hard disk is already partitioned, but has enough unpartitioned disk space,
you can create an additional partition in the unpartitioned space.

Fig.2.5

If the hard disk already has a partition that is large enough, you can
install Windows Server 2003 on that partition. If the partition has an
existing operating system, you will overwrite that operating system if
you accept the default installation path. However, files other than the
operating system files, such as program files and data files, will not be
overwritten.
If the hard disk has an existing partition, you can delete it to create more
unpartitioned space for the new partition. Deleting an existing partition
erases all data on that partition.

If you select a new partition during Setup, create and size only the partition on which
you will install Windows Server 2003. After installation, use Disk Management to
partition the remaining space on the hard disk.

Select a file system for the installation partition after you create the partition on which
you will install Windows Server 2003. 2003 supports the NTFS file system as well as
the file allocation table (FAT) and FAT32 file systems. we will use FAT32

19

Fig.2.6

Setup will then begin copying necessary files from the installation point (CD, local
I386 or network share).

Fig.2.7
9. The computer will restart in graphical mode, and the installation will continue

20

Phase 2 - GUI Setup mode


It will then begin to load device drivers based upon what it finds on your
computer.

Click Customize to change regional settings, if necessary.


Type your name and organization.
Type the product key.
Enter the appropriate license type and number of purchased licenses.
Type the computer name and a password for the local Administrator account. The
local
Administrator account resides in the SAM of the computer, not in Active
Directory. If you will be installing in a domain, you need either a pre-assigned
computer name for which a domain account has been created, or the right to
create a computer account within the domain.
If you enter a password that is blank or does not match the required complexity
settings you will get a warning message.
Select the date, time, and time zone settings.

Setup will now install the networking components.


In the Workgroup or Domain window enter the name of your workgroup or domain.
A workgroup is a small group of computers on a network that enables
users to work together and does not support centralized
administration.
A domain is a logical grouping of computers on a network that has a
central security database for storing security information.
Centralized security and administration are important for computers
in a domain because they enable an administrator to easily manage
computers that are geographically distant from each other. A
domain is administered as a unit with common rules and
procedures. Each domain has a unique name, and each computer
within a domain has a unique name.
If you're a stand-alone computer, or if you don't know what to enter, or if you don't have the
sufficient rights to join a domain - leave the default entry selected and press next.

Next the setup process will finish copying files and configuring the setup. You do not
need to do anything.
Setup will now reboot the system. if you see the login screen, your installation is
successful.

21

2.2 Upgrading to Windows 2003/XP


Upgrade is the process of installing new operating system on a computer with an existing operating
system without loosing the data and user settings.
Old OS

New OS

Data
Software
Applications

Data
Software
Applications

Upgrade Path
You can upgrade your computer from any of the following operating systems to Windows XP.

Windows 98
Windows ME
windows NT 4.0 workstation
Windows 2000 Professional

Windows XP Professional

You can upgrade windows server 2003 from following server operating systems

NT 3.5 server
NT 4.0 server
Windows 2000 server

Windows Server 2003

Starting Upgrade Process:You can start the upgrade process by running the i386\winnt32 file from the existing operating
system.
Put the CD of XP in CD-ROM
\I386winnt32 and select Upgradation

22

Compatibility Problems with Windows 9X:9X has different Registry setting. So it may give a problem related to the compatibility. For this
first update 9x with latest pack files.
You can verify the compatibility issues related to installed software and application.
Winnt32/checkupgradeonly
Chkupgrd.exe (Down load from Internet)
Check Compatibility.
Unsupported Options when upgrading to windows XP.
Application filters files. Ex Antivirus & Disk Quota (Remove it before Installation)
Custom Plug & Play tools (remove it before installation)
3rd party application software used for disk management Eg. PQmagic and Seagate Disk
Manager
Application that supports virtual disk drive (VXDs)
Old application of 16 bit.

23

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

24

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

25

Chapter 3

Configuring windows 2003 server Environment

3.1 There are mainly four tools to configure windows environment (2003/XP)
1)
2)
3)
4)

Control panel
Computer management
MMC (Microsoft Management Control).
Registry

1) Control Panel:This is the most important tools which are used in 2003 & XP computer. You can add remove
software programs; install hardware, modem and printer. You can change setting related to
mouse, keyboard, Internet option, Network connection option, power management and also
system related settings.

Fig.3.1

26

2) Computer Management:You can use computer management to administer networks, computers, services, and other system
components.
To start computer management go toStartProgramsAdministrative ToolsComputer Management
Contents of computer management
1) System Tools
A) Event Viewer
Application
Security
System
B) Shared Folder
Shares
Sessions
Open Files
C) Local Users and Groups
User
Groups
D) Performance Logs and Alerts
E) Device Manager
2) Storage

Removable Storage
Disk Defragmenter
Disk Management

3) Services & Applications


Services
3) MMC (Microsoft Management Console):MMC is a tool, which is used to customize the different administrative utilities under a single MMC
window .You can create your own Console files for the management tools you use frequently.
To create a new console
Type MMC in StartRun.
From file menuadd /remove snap- ins ..Select the tools you want to add and then save the snap-in
to any location you want.

27

The extension of the MMC file is .MSC

Fig.3.2

28

4) Windows Registry:Windows stores its configuration information in a database called the registry. The registry
also stores the information related to hardware, application settings and user profiles.
Win 98------------REGEDIT
NT 4.0------------REGEDT32
Win 2000---------REGEDT32
Win 2003---------REGEDIT
The registry has five keys.
Folder/predefined key

Description
Contains the root of the configuration information for the user
who is currently logged on. The user's folders, screen colors,
HKEY_CURRENT_USER
and Control Panel settings are stored here. This information is
referred to as a user's profile.
Contains the root of all user profiles on the computer.
HKEY_USERS
HKEY_CURRENT_USER is a sub key of HKEY_USERS.
Contains configuration information particular to the computer
HKEY_LOCAL_MACHINE
(for any user).
Is a sub key of HKEY_LOCAL_MACHINE\ Software. The
HKEY_CLASSES_ROOT
information stored here ensures that the correct program opens
when you open a file by using Windows Explorer.
Contains information about the hardware profile used by the
HKEY_CURRENT_CONFIG
local computer at system startup.

Fig.3.3
.

29

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

30

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

31

Chapter 4

Managing Users & Groups

4.1 Introduction
A user is an authorized person who regularly uses the computer. In win 2003 server or windows XP
by default you get two built-in user accounts.
1. Administrator --------Highest Rights
2. Guest ------------------Lowest Rights (By default Guest user is disabled)
On A stand alone (workgroup) computer you can create user from local user & groups.

Fig.4.1

NOTE:-The users created by this tool are stored in the SAM file locally and are only able to
log on to the computer on which they are created

Fig.4.2

32

4.2 Creating Local Users and Groups:To create users Right click My ComputerClick ManageOpen Local Users and
GroupsRight Click Users and click new user.
Enter the information in the following screen and click on create. The created user will be by
default member of users group.

Fig.4.3

Uncheck This Box

Creating Groups: - Open the same window which you opened for users. Right click on
groups and click new group. Enter the information in the following screen and click, create.
Now you can add users to groups

Fig.4.4

33

A group is a collection of users. Groups simplify assigning permission to resources on the


windows 2003/XP, by default following built-in groups are available in windows. Which have
some permission already assigned to them in the system.

Fig.4.5

Administrators- Administrators have complete and unrestricted access to the


Computer/domain.

Backup operators - Backup Operators can override security restrictions for the sole
Purpose- of backing up or restoring files.

Guests- Guests have the same access as members of the Users group by default,
except for the Guest account which is further restricted.

Network configuration operators- Members in this group can have some administrative
privileges to manage configuration of networking features.

Power users- Power Users possess most administrative powers with some Restrictions.

Remote desktop user- Members in this group are granted the right to logon remotely.

Replicator - Supports file replication in a domain.

Users- Users are prevented from making accidental or intentional system-wide changes.

Help service group- Group for the Help and Support Center.

34

The user Administrator is the member of Administrators group and the Guest is a member of
Guests group.
You can not do the following when you logon as a Standard User.

Change system time.


Shut down the computer.
Go to disk management.
Create new user group.

* You must be an administrator to do the above tasks

4.3 User Profiles


User profile contains users personal settings like Wallpaper, screen savers, themes, appearance
settings and my documents, Desktop folders. In Domain users get a default profile first time from
where they log on. The profile is stored in the documents & setting folder of that local computer.
The Documents and Setting folder in C drive contains profiles of all users. Whenever the user
logs on for the first time, his profile is created in Documents and Settings folder.

Fig.4.6

35

Roaming User Profile: It is a server based profile, which is stored on central location .roaming profile allows users to get
the same profile even if they logon from different machines each time.
Creating Roaming profile: 1) Create a folder profile and share the folder.
2) On the DC in active directory user and computer in user profile profile specify the path.
\\computername\sharefolder\username (for one user)
\\computername\sharefolder\%username% (for multiple or all user)

4.4 Hardware Profiles


Hardware Profile: - Hardware profile stores the configuration setting of the hardware. It allows you
to choose different hardware configurations while booting.You can create hardware profiles from
System PropertiesHARDWARE HARDWARE PROFILES

Fig.4.7
Click copy and rename the new profile. Boot from the new profile and make necessary changes to
the profile. Hardware profiles are used mostly with portable computers.

Fig.4.8

36

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

37

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

38

Chapter 5

Working with Group Policy and Active Directory

5.1 Local Group policy


Group policy it is a utility, which is used to manage security-setting desktop setting, user settings
and computer settings. You can restrict or permit users and groups from changing settings
/shutdown the Computer and many more things.
To open group policy on local computer type GPEDIT.MSC in RUN

Fig.5.1
Overview of group policy
Account Policy: - It is used to set the password setting & security related to user log on this option
contains password policy & account policy.
Account policy is not applied to users who are created before the policy was set.
Password Policy: - contains password related policies.
1) Enforce password history
2) Maximum password age
3) Minimum password age
4) Minimum password length
5) Password must meet complexity requirement
6) Store passwords using reversible encryption

39

Account lockout policy: - setting related to account lockout


1) Account lockout duration
2) Account lockout threshold
3) Reset account lockout counter
Local Policy:-contains following policies
1) Audit Policy: 2) User Rights assignments
3) Security Option

Administrative Templates:-Used to specify what options users will get when they logon.
Using administrative templates you can lock control panel, command prompt, and many tools that
are critical to the system.

Fig.5.2

40

5.2 Installing Active Directory Service


Active directory is a centralized database which stores users/groups, printers and other network
information. It helps in managing users and computers centrally.
The computer with active directory installed is called a Domain Controller (DC).
Before installing active directory you must do the following.
1) Windows Server 2003
2) Install LAN card.
3) Configure starting I/P address (192-168-22-1)
4) Install DNS service from control panel
5) Add Forward Lookup-zone (pune.com) in the DNS
6) Convert FAT/File System to NTFS (Use command:- Convert d: /fs:NTFS )
To install Active Directory there are 9 steps.
Run DCPROMO from STARTRUN and follow the instruction on screen
1) Choose domain controller for new domain

Fig.5.3

41

2) Choose New Forest.

Fig.5.4

3) Type the domain name.

Fig.5.5

42

4) It will display the NETBIOS name.

Fig.5.6
5) Select the database location.

Fig.5.7

43

6) Select location on NTFS drive for SYSVOL folder.

Fig.5.8
7) Select the Permission type.

Fig.5.9

44

8) Type restore mode password.

Fig.5.10
9) Summery is displayed.

Fig.5.11

45

5.3 Managing Active Directory Users


Creating new Users in Active Directory:
On a domain controller you can create users using Startprograms Administrative Tools
Active Directory Users and Computers. Right click on users and click new user.

Fig.5.12
Users container

By default domain users created from here can log on from any client in the domain. You can
use user properties to restrict the logon computers and logon hours. You can set the account
expiry also. To set these right click any user and click properties. And select account TAB

Fig.5.13

46

5.4 Creating Groups in Active Directory


Open active directory users and computers and Right click on users and click new Group, type
the group name and select the group type and click create.

Fig.5.14

There are three group scopes in the active directory


1. Domain local groups
2. Global groups
3. Universal groups

Fig.5.15

47

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

48

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

49

Chapter 6 Managing Disks

6.1 Introduction
Data is an important element of computer systems. To store data, many devices are available
in the market. Most widely used device is the HARD DISK which comes in many types and
capacities. in a desktop computer IDE or SATA hard disks are common but in most servers
SCSI Hard Disks are used .SCSI disks provide a great speed and reliability ,they are hot
swappable, which means if they fail they can be changed without shutting down the servers.
High-end servers like IBM, HP and DELL have multiple slots for these SCSI disks.
Hard disk is a permanent storage device.

6.2 What is a Partition


A Partition is a logical division of the hard disk space. You can create partitions to organize
your data.

6.3 Formatting the Disks:-Formatting creates a file system on the hard disk. File system
is needed for storing files on the disk. You can choose FAT, FAT32 or NTFS file system on
windows XP or Server 2003 computers. You can also create and format the partitions during
installation of windows XP or Server 2003.NTFS is the newest file system which supports
many new features like compression. Encryption etc, FAT and Fat32 are used for Windows
95/98 and ME. In servers mostly NTFS is used. Compact disks use CDFS.

6.4 File System Comparison


Features

FAT 16

FAT 32

NTFS

1) OS Support

All

Win95 OS R2
Win98
Win2000
Win2003

NT
2000
win 2003

2) LFN (Long File Name)


3) Disk Quota
4) File compression
5) File Encryption
6) Local File Security

Yes
No
No
No
No

Yes
No
No
No
No

Yes
Yes
Yes
Yes
Yes

7) Network File Security


8) Maximum Volume size
9) Minimum Volume Size

No
2GB
1MB

No
32GB
7MB

Yes
2 TB
50MB

50

To convert FAT to NTFS C:\>convert D: /fs: NTFS


Converting file system is the one way process.

6.5 Using Disk Management in windows 2003 server


Windows server 2003 has a built in tool called DISK MANAGENT, to manage disks,
create/delete partitions and volumes.
To open disk management:-Right click on my computer click manageselect disk
management.

Fig.6.1
By default the disk type is basic in windows XP and server 2003.
1) Basic Disks: - It is a default storage into 2003 & XP. A basic disk contains primary partitions,
extended partitions, or logical drives. Partitions are logical division of a Disk. Basic disk can have
four primary partitions or three primaries and one extended partition.
Creating Partitions with Basic Disks :
You can create 3 types of partitions with basic disk.
1. Primary Partition (total 4 or 3 primary and one extended)
2. Extended Partition (only one)
3. Logical Partition (up to 23)

51

To create partitions on a Basic Disk


1. Right click on the unallocated space of the disk and select new partition (as shown in fig)

Fig.6.2
2. Select the Partition type (as shown in fig)

Fig.6.3

52

3. Select the Partition Size.

Fig.6.4
4. Select the Drive Letter

Fig.6.5

53

5. Select the File System

Fig.6.6

Changing the Drive Letter of a Partition.


1. Right click on the partition and select change drive letter and path

Fig.6.7

54

2. Click change and select the new drive letter

Fig.6.8
Using Mounted Drives
Mounted drives let you mount your partition to an empty folder on any NTFS drive. This way you
can save the Drive letters for other drives.
1. Create a new empty folder on any NTFS drive
2. Create partition using the above method. In step 4 dont assign the drive letter. Select mount in
the empty folder and browse to the folder you created in step 1.

Fig.6.9

55

3. The mounted drive will be available when you open the folder in which you mounted the drive.

Fig.6.10
Deleting partitions: - Deleting the partition will delete all your data.
1. Right click the partition and select delete.

Dynamic Disks: - Dynamic disks provide features that basic disks do not, such as the ability to
create volumes and the ability to create fault tolerant volumes (mirrored and RAID-5 volumes). All
volumes on dynamic disks are known as dynamic volumes.
Converting Basic Disk to Dynamic

Fig.6.11

56

Once you convert the basic disk to dynamic disk, you have to delete all the volumes from dynamic
HDD to revert it back to Basic disk.
Windows server supports five types of volumes
1. Simple Volume
2. Spanned Volume
3. Striped Volume

Win XP
Win 2003 Srv

4. Mirrored Volume
5. RAID 5 Volume (Stripe set with parity)

1. Simple volume: - A simple volume contains free space from a single Dynamic disk. The
space from the single disk can be contiguous or noncontiguous.
C:

Simple volume

D:

Simple volume

2. Spanned Volume: - (Min-2, Max-32)


D0

D1

D2

C:

D:

F:

500 MB

1GB

500 MB

2
GB

Extend

Spanned volume consists of disk space on two or more dynamic disks (up to 32). In spanned
volume data written sequentially filling space on one physical drive before writing to another
physical disk you can extend the spanned volume it. You can allocate different amount of space
from each disk in spanned volume. You can extend an existing spanned volume with new free disks
space.
The main disadvantage of the spanned volume is that if any drive in spanned volume set fail we
loose access to entire spanned volume.

57

3. Striped Volume (Min-2, Max-32): D0

D1

D2

C:

D:

F:

1 GB

1 GB

1 GB

3GB

Striped Volume is created using equal free space from minimum 2 dynamic disks up to 32 dynamic
disks. Data is written sequentially in a striped volume so the I/O performance is faster. You can not
extend striped volume once created. The main disadvantage of the striped volume is, if a single disk
fails in a striped volume set you loose access to a entire striped volume.

6.7 Fault Tolerant Volumes


1) Mirrored Volume (only 2 disks):C:

Mirror

C:

D:

Mirror

D:

Disk Mirroring

Disk Duplexing

One controller & 2 HDD

2 controllers & 2 HDD

Mirror volumes are copies of two Simple volumes which are stored on two separate physical disks.
User can see only one volume, but data is written to both the copies simultaneously. When one disk
fail data is still available on the second disk. You can mirror the full disk or only selected volume.

58

2) Raid 5 Volume: - (min-3HHD, max-32 HDD)

Raid
75% 25%
Data parity

D:

D:

D:

D:

10 GB10 GB
10 GB 10 GB
D: = 30 GB for data and 10 GB parity.

HP/HCL server machine

C
C

Raid 5 volume is similar to stripped volume. Data is striped on multiple disks. Raids5 volume
places a parity strip across the volume (Parity is a mathematical calculation performed on the -data that provides information that can be used to rebuild data on failed disks). If a single
within the volume set fails the parity information stored on the other drive to rebuild the data for the
drive. They are fault tolerance and provide good performance.

59

6.8 Creating Volumes in Dynamic Disks:Right click the unallocated partition and select new volume

Fig.6.12
Select the volume type to create

Fig.6.13

60

Recovering failed mirror volume


1) In disk management tool right-click from mirror volume and choose remove mirror volume
2) Remove the failed HDD and place new.
3) Use disk management to recreate the mirror volume.
Recover failed Raid 5 Volume
1) Replace the failed HDD.
2) From the disk management tool, Right-click the failed volume and choose repair volume.
3)

6.9 Using Diskpart Command:Diskpart is a command utility for disk management. You can create/format partitions, assign drive
letters and delete partitions using this utility.
To start diskpart type DISKPART at the command prompt. and use the following commands.
1. Help :- This command displays the list of available commands in diskpart.
2. List

: - This command is used to view disks, partitions and volumes.

3. Select :- Use this command to select disk, partitions or volumes. You must
select disk before you select partitions or volumes and make operations on
them.
4. Create partition:- This command creates partition of specified size
Eg- create partition primary size =1024 .
5. Assign:- This command assigns or deletes drive letter to the partition or
Volume. Eg- assign letter=m
6. Delete :- This command deletes the selected partition.

61

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

62

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

63

Chapter 7

Accessing Files / Folders in Windows Server 2003/XP

7.1 NTFS Features:1.


2.
3.
4.

Disk Quota
Data Compression
Encrypted File System
NTFS File/Folder Permissions

Disk Quota
Disk quota is used to specify how much disk space a user is allowed to use on a NTFS volume
Guidelines for Disk Quota: 1) Disk quota can be specified only on NTFS volume.
2) Disk Quota is applied at volume level.
3) Disk Quota is applied at volume on file and folder ownership, i.e. when a user creates &
copies or takes ownership of any folder or files the user is an owner. And the files size is
calculated for quota.
In short we can say that disk usage is calculated based on the files owned by the user.
4) When a user installs any application on disk Quota see the available size and not the actual
size.
Disk Quota is not applied to the administrator group.
Disk Quota is not applied to user who has accessed the disk Quota volume before the
Quota was applied.
When you apply disk Quota it is specified for all users by default
You can also specify disk Quota It is specified on per user basis.

To apply quota to all users, Right click the volume propertiesQuota tab.
Select enable quota management and select limit disk space to.
If you want to deny the users who exceed the limit, select deny disk space to users exceeding
quota limit

64

Fig.7.1
Data Compression
Data compression is a process of storing data in compressed form that take less space than
uncompressed data. You can compress files only on NTFS volume. Encrypted files cannot be
compressed.
To compress a folder/file.
Right click propertiesadvanced and check the checkbox shown below, and click ok. When
you compress a file or folder they are display in blue color

Fig.7.2

65

Encrypted File System (EFS)


Data Encryption is a way to increase data security. Encryption is a process of translating data in to
code that is not easily readable.

ABC

#&)!

ABC

EFS is a technology used in win2000 server/professional, win2003 server/XP. Every user who is
owner of his own file and folder can encrypt and decrypt the files. If owner of encrypted file and
folder is not available than DRA (Data Recover Agent) can decrypt the files on the behalf of the
user.
To Encrypt File or Folder
Right clickadvanced select encrypt contents to secure data. Once the file or folder is encrypted
they are displayed in green color.

Fig.7.3
You can use the command line tool to encrypt files and folders.
Open Command prompt and type any of the following command.
1)
2)
3)
4)
5)

C:\>cipher /e /a file name


C:\>cipher /d /a file name
C:>cipher /e /s:data /a
C:>cipher /d /s:data /a
C:>cipher /? For help

66

7.2 NTFS File/Folder Permissions


In windows XP and server 2003, you can set permissions to the folders and files, so that no one can
access your private data. These permissions are called NTFS file permissions.
NTFS file/folder permissions are used to control the access that a user or group has to folders and
files. They are referred to as NTFS permissions because a drive must be formatted with NTFS in
order to utilize these permissions. Table 7.1 shows NTFS file permissions that are used.
NTFS Standard Folder Permissions:
NTFS Folder permissions determine the access that is granted to a folder and the files and
subfolders within that folder. These permissions can be assigned to a user or group. The following
table displays the different permissions for folders.
Full Control

Read, write, modify, and execute files in the folder, change attributes, permissions,
and take ownership of the folder or files within.

Modify

Read, write, modify, and execute files in the folder, and change attributes of the
folder or files within.

Display the folder's contents and display the data, attributes, owner, and permissions
Read
&
for files within the folder, and run files within the folder (if they're programs or have
Execute
a program associated with them for which you have the necessary permissions).
Display the folder's contents and display the data, attributes, owner, and permissions
List Folder
for files within the folder, and run files within the folder (if they're programs or have
Contents
a program associated with them for which you have the necessary permissions).
Read

Display the file's data, attributes, owner, and permissions.

Write

Write to the file, append to the file, and read or change its attributes.
Table 7.1

Highest NTFS folder permission are full control.


Lowest NTFS folder permission are Read & Execute, List folder contain, Read.

NTFS Standard file permissions


Full Control

Read, write, modify, execute, change attributes, permissions, and take


ownership of the file.

Modify

Read, write, modify, execute, and change the file's attributes.

Display the file's data, attributes, owner, and permissions, and run the file
Read & Execute (if it's a program or has a program associated with it for which you have
the necessary permissions).
Read

Display the file's data, attributes, owner, and permissions.

Write

Write to the file, append to the file, and read or change its attributes.
Table 7.2

67

Highest NTFS folder permission are full control.


Lowest NTFS folder permission are Read & Execute, Read.

Copying, Moving, and Inheritance:


The next table shows what happens to files when they are copied or moved within or across NTFS
partitions. Table 7.3 displays the relation between the copying moving and the inheritance
Moving within a
partition

Does not create a new file - simply updates location in directory. File
keeps its original permissions.

Moving across a
partition

Creates a new file and deletes the old one. Inherits the target folders
permissions.

Copying within a
partition

Creates a new file which inherits permissions of target folder.


Table 7.3

Remember that file permissions override the permissions of its parent folder. Anytime a new file is
created, the file will inherit permissions from the target folder.

Fig7.4

68

NTFS permissions are assigning in two methods.


1) Implicit In this method only allow group & users to whom you want to assign permission.
2) ExplicitIn this method, add the user & group to whom you want to allow the access and
also add user & group to whom you want to deny the access.

7.3 Managing Folder Option


Folder options in windows Xp and server 2003 are used to configure desktop view and the view of
the folders
To open folder options
Open windows explorer and select toolsfolder options. Folder options can also be opened from
control panelfolder options.

Folder options have four tabs.


1. General Folder options: - This option is used to set the folder general options

Fig7.5

69

2. Folder view options:- These options are used to change the view of a folder

Fig7.6
3. File type options :- These options are used to set the file extensions and the programe used
to open these file types

Fig7.7

70

4. Offline Folder Options:- This option lets you configure the offline file settings. Offline files let
you work on network files even when you are not connected to the network.

Fig7.8

71

7.4 Ownership of Files and Folders


A user who creates file & folder is the owner of the file and folder. If the owner of the folder is
not available then administrator can take the ownership of any file & folder .to view or change
the owner go to advanced optionowner tab As shown in the image

Fig.7.9

72

7.5 Managing Network Access


Sharing is a process of allowing access to the resource on the network. You can not share a single
file, you can share only folder. By default administrator, power user & server operator have the
rights to share folder and everyone group has read permissions.

Creating shared folders


To share a folder you must logon as the member of the administrators or power users group.
You can enable and configure sharing through the sharing tab of the folder properties as shown
in the Fig 7.10

Fig 7.10

7.6 Share Permissions in Windows XP/Server2003


Shares are administered through the MMC, My Computer or through Explorer and permissions can
be set on a share in the "Share Permissions" tab. Share level permissions only apply when a file or
folder is being accessed via the network and do not apply to a user logged into the machine locally.
The following are the different share-level permissions:
Read

View files and subdirectories. Execute applications. No changes can be made.

Change

Includes read permissions and the ability to add, delete or change files or
subdirectories

Full Control

Can perform any and all functions on all files and folders within the share.

73

The Deny permission can also be applied to shares. The Deny permission overrides all others. When
folders on FAT and FAT32 volumes are shared, only the share level permissions apply as these
systems do not support file and directory (NTFS) permissions. When folders on NTFS volumes are
shared, the effective permission of the user will be the most restrictive of the NTFS and share
permissions.

You can use the net share command to share or stop sharing folders
Ex. Net share Soft=C:\Software .the name soft is the share name and the c:\software is the path of
the folder you want to share.
When you share a folder by default the everyone group gets read permission.

7.7 Sharing resources using Computer Management


Computer management is also the easy way to create and manage shares.You can also view all the
shared folders of your computer from this tool.
To open computer managementright click My Computer and click manage.

Fig 7.11

74

7.8 Creating Hidden share


Hidden share can not be seen from the network to access hidden share name hidden can map hidden
share by using drive letter. To create a hidden share put a $ after the share name.

Fig 7.12

7.9 Mapping a network drive


You can use network share as a drive by mapping it
To map the network drive
1.

Open Windows Explorer or My Computer from the Windows Start Menu. Or right
click my computer

2. From the Tools menu, click Map Network Drive. A new Map Network Drive
window opens.

Fig 7.13
3. In the Map Network Drive window, choose an available drive letter from the dropdown
list located next to the "Drive:" option. Any drives already mapped will have a shared
folder name displayed inside the dropdown list, next to the drive letter.
4. Type the name of the folder to map. This name must follow UNC. Alternatively, click
the Browse button to find the correct folder by browsing available network shares.
75

5.Click the "Reconnect at login" checkbox if this network drive should be mapped
permanently. Otherwise, this drive will un-map when the user logs out of this computer.
6. If the remote computer that contains the shared folder requires a different username and
password to log in, click the "different user name" hyperlink to enter this information.
7. Click Finish.
8. If the Finish operation succeeds, the network drive will be mapped. If the network drive
cannot be mapped, ensure the folder name is spelled correctly, that this folder was
correctly set up for sharing on
9. The remote computer, that (if necessary) the correct username and password have been
entered, and that the computer network connections are functioning properly.
Note:-You can use a net use command to map a network share.
C:\>Net use X: \\computername\sharefolder Where x: is the drive
\\computername\sharefolder is the UNC path of the share you want to map.

Sharing Commands
net share
Display all the share folders with path
Net share sharename = path
It creates a new share folder.
Eg- net share India=c:\india
Net share sharename /delete
Eg - net share India /delete

76

letter

and

the

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

77

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

78

Chapter 8

Managing Network Connections

8.1 Introduction
Network plays an important role in our day-to-day computer needs. Even small organizations have
started to build networks. Networks help Administrators to take centralized control of the computers
and make the data available to all of the users. To successfully create the network you must have a
network adapter (NIC) installed in your computer.

NIC (Network Interface Card)


A network adapter is required for the system to access network resources. Windows 2003/XP
without network adapter can not be part of the network. The network adapter connects the computer
physically to the network. Each network card installed in the computer will have the following
components, which are called network components.
Networking Components
When you install NIC on windows 2003 server /XP computer you get some default networking
component i.e. services, clients and protocols.
1) Client for Microsoft Network: - This is default service used by Microsoft computer to get
access to the network, if you remove this service from computer your system will be unable
to access the Microsoft network.
2) File & Printer Sharing: - File & printer sharing for Microsoft network, allows the other
systems on the network to access share resources of your system.
3) Protocol: - Windows 2003 server/XP supports the following protocols.

NW Link IPX/SPX/NET Bios compatible transport this protocol is mainly use if you
want to connect Novell NetWare (network)
TCP/IP as a universal protocol. This protocol is used by almost all networks and it is
very important protocol.
Apple talk is used if you want to connect to the Macintosh computers.

79

Fig.8.1
1. In the above diagram we can see two networks. The first network contains a domain
controller and xp clients, and the other network has Netware server with xp clients. Here the
gateway server will help windows clients to access the Netware server shares and the
windows clients will see the shares as if they reside on their server, but those shares will be
on the Netware server.

8.2 Overview of TCP/IP Protocol


TCP/IP it is a universal protocol and it uses for IP address for communication; it is a base protocol
for Internet. It is a routable protocol.
The IP address is a 32 bit address divided in 4 sections each of 8 bits
8bit.8bit.8bit.8bit=32 Bits
Classes of IP address
Class A ---1 to 126
Class B----128 191
Class C--- 192-223
127.0.0.0 is reserved as a loop back address.
EX. 192.168.22.1 is a C class address
80

8.3 TCP/IP Services


1) DHCP (Dynamic Host Configure Protocol)
In a large network where managing the ip addresses of multiple computers is not feasible A DHCP
server can assign IP address automatically to DHCP clients. it can minimize the administration
required for maintaining the ip addresses and other configuration related to the TCP/IP protocol.
Clients can take following configuration information from the DHCP server
IP address
Subnet mask
Default Gateway (Router address)
DNS address
WINS address

DHCP Server

Fig.8.2

81

2) DNS (Domain Name System)


DNS servers are vital part of any windows 2003 network. They help network computers find the
address of the servers and other computers. It works as a name resolver that helps computers
convert ip address to host name and vice versa.

Fig.8.3

3) WINS (Windows Internet Naming System)

Fig.8.4
WINS was developed by Microsoft for their network it dose the same work as DNS but DNS can be
used for any network and Wins is only for Microsoft networks.

82

8.4 Interoperate with other O/S

Novell Netware
(IPX/SPX)

RedHat Linux
(TCP/IP)

Microsoft Windows
(IPX/SPX)
(TCP/IP)
(Apple)

Apple Macintosh
(Apple)
Fig.8.5

8.5 Interoperate with Novell Netware


There are two services for windows to connect to a Novell Server. Client Services for NetWare
(CSNW), which runs on client and Gateway Services for NetWare (GSNW), which runs on
windows 2003 Server.
These services allow Microsoft Networks to use the resources that reside on a Novell Network.
Novell Networks must purchase a product called File and Print Services for Novell to use resources
on an NT Domain. We will see how GSNW works.
Domain Controller

GATEWAY server

NOVEL Netware IPX

(GSNW)

XP

XP
(CSNW)

XP

XP

XP
Fig.8.6

83

XP

8.6 Interoperate with Apple Macintosh

Microsoft Windows

Apple Macintosh

Fig.8.7

o File Service for Macintosh


o Print service for Macintosh
o Share folder is on NTFS partition(Apple Talk)
Path to install service of apple
Control Panel
Add Remove Program
Other network file & print services (details)
services for Macintosh & Print services for Macintosh.

84

Windows Component
Check mark on file

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
85

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

86

Chapter 9

Manage Printing

9.1 Introduction
Printing is the process of converting soft copies into hard copies. This process involves two devices,
1. Printer Which is software installed on the computer.
2. Pint Device Which is the actual print hardware which comes in many shapes and sizes.
You can find many types of these print devices, some are small while others are
big and heavy duty which are used in corporate sectors like bank and billing
sections.

In a Small Organization

Fig 9.1
Print Server
In a Large Organization

IP=192.168.22.11

Fig 9.2

87

These print devices are connected to your computer using various ports some of them are
listed below.
Ports used for connecting print devices
1) Parallel Port this is the most popular port used to connect a print device to a computer.
2) USB Port- universal serial bus is the newest technology which provides higher speeds then
the old parallel ports
3) NIC - Print device, which has a NIC port, is called network printer, which is directly
connected to the network.

9.2 Installing Printer in Windows XP and Server 2003


You can install printer from printer & fax option in the control panel

Fig 9.3

88

Once you are inside click add printer.

Fig. 9.4

Step 1Select local printer attached to this computer

Fig 9.5

89

Step 2Select printer port

Fig 9.6
Step 3Select the printer make and model install printer software.

Fig 9.7

90

Step 4Specify printer name.

Fig 9.8

Step 5 Share the printer (YES/NO)

Fig 9.9

91

Step6 Location and comment

Fig 9.10
Step7Select yes if you want to print a test page

Fig 9.11

92

Stpe8Display the summery and finish the wizard

Fig 9.12

9.3 Manage Printer Settings


Following properties are helpful in managing the printer.
1)General: - Displays printer name, location, driver and features. From this tab you can
print a test page and set printing preferences

.
Fig 9.13

93

2) Sharing: - Enables you to share printers and publish them in the active directory or stop
sharing the printer.

Fig 9.14
3) Additional Drivers:-You can configure additional drivers for other systems which are pre
windows200.

Fig 9.15

94

4) Ports: - You can select port used by the printer. you can add new port to redirect the print
jobs to other printers, delete ports and enable printer pooling(using same driver for
multiple print devices

Fig 9.16
Redirecting Print Jobs: - This option helps you to redirect the print jobs sent to your printer to
some other printer on the network when your printer is down for maintenance

Fig.9.16

95

Open the ports tab in printer properties, Click add port

Fig.9.17
Select local port and click New Port

Fig.9.18
Type the UNC path of the printer where you want to redirect the print jobs
And click ok.
All the print jobs which are sent to your printer will be redirected to this printer now.
And the users who had your printer installed on their computers will not need to change anything at
their computer settings.

Enabling Printer Pooling:- Printer pooling is the technique where you can use multiple print
devices with one driver. That means in your computer you will only see one printer installed but the
printer will be using multiple physical print devices. This helps in distributing the print jobs sent to
one print server to multiple print devices attached to the server. When printer pool is enabled the
print job is given to the print device that has shortest print job queue. The print devices must be of
same make and model for the pooling to work .you can enable printer pooling from the ports tab in
printer properties.

96

Multiple Print
devices of
same model
and make

Print server with one


printer installed

Fig.9.19

Select the ports


where the Print
Devices are
connected

Check this box

Fig.9.20

97

Advanced :-These options are used to configure advanced settings like


1.
2.
3.
4.
5.

Print schedule
print priority
update printer driver
configure spooling
separator page settings

Fig 9.21

Setting printer priority: - To set the printer priorities, install the same printer with new driver.
Assign low priority (1) to the old driver and assign higher priority (99) to new driver. Tell users to
install the printer with priority 2 if they need high priority given to their documents. Other users will
use the low priority printer with priority 1.

Fig.9.22

98

Security:- This option is used to set permissions on the printer


There are three permissions available.
1. Print:-with this permission the user can connect to the printer, print their
documents on the printer. and cancel his own print jobs.
2. Manage printers:-this is full control permission to the printer. By default
administrators, print operators and server operators get this permission.

3. Manage documents:-this permission allows the user to manage all print jobs
of all the users.

Fig 9.23

99

Managing Print Spooler Service:Print spooler folder path:StartsettingsPrinter and FaxFile menuServer propertiesAdvanced

Fig.9.24

This option is used to view and change the spool folder and path
From the same option you can enable or disable printer notification.

If the print job is jammed and you cannot cancel or restart the print job then
Stop and restart the print spooler service.

Fig.9.25

100

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

101

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

102

Chapter 10

Administering Terminal Services

10.1 Introduction
Remote management

Fig 10.1

Telnet
Unix

Dos

Fig 10.2

Telnet
Router

Switch
Fig 10.3

There are some third party software available.


1 .Pc Anyware
2. VNC
3. Citrix (for applications)

103

Terminal services with windows2000:Microsoft introduced terminal services first time in windows 2000 server
Windows 2003 Terminal Server contains two modes
1. Remote administration mode
2. Application serer mode
Remote Administration Mode:

Only used by Administrators


Only allows 2 connections
Does not require license

Windows 2000 Server


98/NT4.0
Win2000srv/prof

Terminal client

XP/win2003 srv
Remote Desktop Connection
Fig 14.4

104

Application Server Mode:

Used for sharing applications.


It requires license.
You can use only for 90 days without license.

Windows 2000
Terminal server

98

98
NT
Terminal clients

NT

Fig 10.5

10.2 Windows 2003 Terminal Services

Win 2003 Server

Windows 2003 remote desktop:

It is only used for administrators


Only allows 2 conections
Win2003 Srv/XP
Does not require license
Win2000 Srv
Prof/NT

RDC

T.C.
Fig 10.6

105

To enable remote Desktop

Fig 10.7
To connect to the remote windows Xp machine
Go to runtype MSTSC and press enter.
Type the IP address of the computer you wish to connect to, and click connect

Fig 10.8

To access the console


Go to runtype MSTSC /console and press enter.

106

Remote desktop in win XP allows only one session. If anyone loges to the XP machine the XP
machine will be locked.

Remote desktop
enable
System is locked

RDC
WinXP

WinXP
Fig 10.9

To view the remote users connected to your system go to task managerusers

Fig 10.10

107

10.3 Terminal Services in Windows 2003 Server

Used for sharing applications.


It requires license.
You can use only for 120 days without license.

Windows 2003
Terminal server

XP

XP
2000 prof
Terminal clients

2000 prof

Fig 10.11

Windows 2003 terminal services allow to share and run applications on terminal client computers
which contain not enough hardware.
Terminal clients are mainly called as thin clients because they only give input of keyboard and
mouse and all the processing takes place at the server.

10.4 Hardware Requirements for Terminal Service.


1)
2)
3)
4)
5)
6)

Pentium class processor.


128-256 Ram.
Additional 10-20 MB RAM per client connection.
SCSI hard disk drive.
PCI cards.
High performance network adapter.

108

Terminal service components:There are three components of the terminal service.


1. Terminal server service.
2. Terminal client service.
3. Remote desktop protocol.

10.5 Installing Terminal Service.


Start setting Control panel Add remove programWindows component Terminal server

Fig 10.12

109

11.6 Terminal Services Options


There are two options from which you can manage and configure terminal service client.
1) Terminal Service Manager: - from this console screen you can see connection connected
terminal client you can disconnect, log off, Rest, send message and also check the status of
the terminal client.

Fig 10.13
2) Terminal Services Configuration: - from this option in the server setting you can remove
the restriction per user permission, change permission compatibility, remote desktop
protocol properties.

Fig 10.14

110

RDP Properties :- From this option you can set encryption setting, set log on settings, terminal
client session, set terminal client environment, configure remote control, configure the client setting
and network adapter service and also set the terminal service permissions.

Fig 10.15

1. General:-

Fig 10.16

111

2. Logon settings

Fig 10.17
3. Sessions

Fig 10.18

112

4. Environment

Fig 10.19

5. Permissions

Fig 10.20

113

6. Network Adapter

Fig 10.21
7. Client Settings

Fig 10.22

114

8. Remote Control

Fig 10.23

Remote Control: - Remote control allows viewing the terminal session of terminal client. you can
configure to require user permission before you see or interact with his session or you can choose
not to interact with the user session.
Note: - To view remote control the admin need to access terminal service from a terminal client
machine because remote control is not allowed from the terminal server.

115

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

116

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

117

Chapter 11

Optimizing Windows 2003 Server

11.1 Determine System Performance


Win 2003 provides performance tools which helps create a base line.
1) Create a base line: - A base line is snapshot of how the system is performing current.
2) Identifying System Bottlenecks: - System bottlenecks are the system resources that
inefficient compact with the rest of the computer system.
Common cause of bottlenecks includes
A) A resource is being over used so, additional resource needs to be added in to system.
B) If you have multiple instance of services.
C) A specific application is using active system resource.
D) A resource might not be working properly.

11.2 Determine Trends: -Determine the various trends faults with proactive management you
track the problem before it occurs.

11.3 Using System Monitor: - System monitor is used to connect and see Real Time
Performance data for local and remote computer on network it allows to
1) Collection data from local & Remote computer
2) View data in graph, Hectograph or report
Data in graph view

Fig 11.1

118

Histogram chart view

Fig 11.2

Report view

Fig 11.3

119

11.4 Performance Log & Alerts


1) Counter logs: - It records data about hardware usage and activity of system services. you can
Configure logging manually or automatically.
2) Trace log: -Trace log data that is collected by the OS or programs.

Fig 11.4
3) Alerts: - Alerts can be generated when the specific counter exceeds a specified value. You
can send alerts to other computer over the network.

Fig 11.5
120

Alert message

Fig 11.6

11.5 Managing Virtual Memory in Windows 2003 Server


Virtual memory is very important when optimizing the windows server 2003 operating system.
Virtual memory is the area on the hard disk which is treated as RAM. The system swaps the least
recently used data from the ram to the disk and back from the disk to the ram when that data is
needed again. The virtual memory uses a file called PAGEFILE.SYS for this purpose. the size of
this file is usually 1 of the RAM .you can set the size from the advanced tab from system
properties

Fig 11.7

121

Fig 11.8

122

11.6 Task Manager


Task manager: - Task manager allows you to start new application and to view all running process
on computer. You can end a running process and view the performance of CPU & memory. you can
also view the network utilization & the currently logged on user. The task manager is very helpful
when your computer is running slow or any program is not responding

Application Tab

Fig 11.9

123

Processes Tab

Fig.11.10

Set Affinity

Fig 11.11

124

Performance Tab

Fig 11.12
Networking Tab

Fig 11.13

125

Users Tab

Fig 11.14
Manage Memory Crash Failure
If there is a memory crash, windows 2003 OS dumps the memory information in a file called as
memory dump file which is located under WINDOWS\MEMORY.DMP
You can set the memory system failure from
Right-Click My Computer Properties Advanced Startup & Recovery setting

Fig 11.15
126

Managing Application Crash


Windows 2003/XP provides utility called doctor Watson to verify the crash and also create a dump
file in case of application problem.
You can use following applications.
WINDOWS\SYSTEM32\
DRWATSON.EXE Check the faults

Fig 11.16

DRWTSN32.EXE Allow configuring the crash dump file.

Fig 11.17

127

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

128

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
129

Chapter 12

Performing System Recovery Functions

12.1 Update the Windows Server 2003


To keep the system up to date you can use two options.
1) Windows Update: - Windows update connects the system to the Microsoft website and
updates the system with the following components.
1)
2)
3)
4)
5)

Internet Explorer
Latest device driver
Updated the system files (.dll)
Update the registry
Latest hot fixes

Fig.12.1

130

Windows Software Update Service (WSUS)

2003 server With


WSUS
Internet

WSUS clients
Fig.12.2

2) Service Pack: - Service pack contains latest pack files which are released by Microsoft
periodically on the internet. Different versions of service packs are available for different
operating systems.
Winver command is used to check the service pack install on system.
NT4.0
- SP1 / SP2 / SP3 / SP4 / SP5 / SP6
Win2000 - SP1 / SP2 / SP3 / SP4
Win2003 - SP1 / SP2

12.2 Recovery Techniques in Windows 2003 Server


There are several tools which can be used to recover the system from failure.
1) Event Viewer
2) Safe mode
3) Last known good configuration
4) Device Rollback
5) System restore
6) Windows backup
7) Recovery console

1) Event Viewer: - Event viewer utility is used to view the events that are logged. The
information includes hardware & software events and security events.
131

Fig.12.3

1) Application Log: - Track Event that is related to application running on the computer.
2) System Log: - It tracks events that are related to win 2003 OS
3) Security Log: - Security log contains events that are enabled in auditing. You can audit
file & folder access located only on NTFS volume, to audit file & folder enable audit
object access option (success & failure) from group policy audit option. To audit a
Specific folder go to the folder properties Security Advanced Audit Add the
user & groups to audit. you can also audit system logon

There are five types of Events


1) Information
2) Warning
3) Error
4) Success
5) Failure
Each event detail contains, date, time, type, user, computer, source, event ID and description.

132

Fig.12.4

12.3 Managing Log files


Contains two options
1. General
2. Filter

In log properties you can view log filename & path or set log file size. You can clear the log file and
also filter the log as per your needs.

133

1) General Option

Fig.12.5
2) Filter Option

Fig.12.6
134

12.4 Boot Process of Windows XP /2003 Server


Pre Boot Process: - (Bios) checks devices, then checks MBR (Master Boot Record).
Booting is the process of Loading of system files on memory.
In Boot process of 2003/XP OS following files are involved.
1)
2)
3)
4)
5)

NTLDR
BOOT.INI
BOOTSECT.DOS
NTBOOTDD.SYS
NTDETECT.COM

1) NTLDR: -NT loader it is the first file that is loaded during the system initiation.
2) BOOT.INI: - It builds OS menu choices that are displayed during the boot process to select
OS to start in case of multi boot system. It also specifies the location of the OS on the
partition.

Fig.12.7
ARC path
IN THE ABOVE boot.ini file
Multi ( ) used when disk is IDE or (SCSI with BIOS enabled)
SCSI ( ) used when disk is SCSI with BIOS disabled
Disk ( ) Used with SCSI
Rdisk ( ) Used with multi
Partition ( ) specifies Partition number where OS is installed.

135

We can modify the boot.ini from


1) Notepad (C:\Boot.ini notepad file)
2) Right-Click My Computer Properties Advanced Startup & Recovery Tab
3) Bootsect.dos: - It is an optional file that is loaded if we choose to load an OS other that NT,
2000, 2003/XP.
4) Ntbootdd.sys: -This is also an optional file that is used when we have SCSI adapter with
BIOS disabled.
5) Ntdetect.com: - This is a compulsory file it is used to detect any H/W i.e. installed & add
that that Information about to the registry.

12.5 Using Advance Startup Option in Windows 2003 and XP


By pressing F8 at starting
1) Safe mode
2) Safe mode with N/W
3) Safe mode with command prompt
1) Safe Mode: - Safe mode starts the system with minimal configuration & default driver
2) Safe Mode with Networking:- This mode starts safe mode with network support.
3) Safe Mode with Command Prompt:- Starts safe mode with command prompt only.
4) Enable Boot logging: - Windows\ NTBtlog.txt tracks loading of driver & services.
It will create a log file at Windows\NTBTLOG.txt
5) Enable VGA Mode: - This option loads the standard VGA driver without starting the
computer in safe mode. this mode is helpful if you have problems with the VGA settings.
6) Last Known Good Configuration: - This option boots the win2003/XP with the settings
that ware saved last time the computer was successfully booted.

7) Directory Service Restore mode: - This option is used by win2003 server computers
that are configured as D.C. (Domain Controller) to restore the ADS database.
8) Debugging Mode: - This option runs the kernel debugger. If the utility is installed it is for
advanced trouble shooting.

136

Fig.12.8

137

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

138

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

139

Chapter 13

Using Windows Backup

13.1 Introduction
Backup is an additional copy of database.
Win NT 4.0 windows backup supports only Tape Devices.
But win2000/2003 backup supports FDD, HDD, CD Zip drive & Tape Devices.
What to backup?
Important thing for backup are
1) ADS
2) Registry
3) User Data
4) Application Data
5) Group Policy
6) Login Script
7) Profiles
Who will backup?
Allow groups for backup are
1) Administrator
2) Backup Operator
When to backup?
Online/offline (After Office Hours)
Using Windows Backup
Startprograms Accessoriessystem ToolsBackup
Or use the command NTBACKUP.EXE

13.2 Types of Backup in windows


1)
2)
3)
4)
5)

Normal
Incremental
Differential
Daily
Copy

140

1) Normal + Incremental
Normal
Mon

All

Incremental
Tue
F2
F4
Modified

Incremental
Wes
F1
F5
Modified

Incremental
Thu
--Modified

Incremental
Fri
-F6
Modified

Normal Backup takes all data to backup folder.


Incremental Backup backups the files modified on that day, incremental backup is faster.

2) Normal + Deferential
Normal
Mon
All

Deferential
Tue
F1
F3

Deferential
Wes
F2

Deferential
Thu
---

F1, F3

F1, F2, F3

F1, F2, F3

Deferential
Fri
F5
F6
F1, F2, F3, F5,
F6

In deferential Backup backups all files modified after the normal backup. Backup is slower.

13.3 Restoring the Backup.


To Restore the Incremental Backup: - First restore the normal backup then all days incremental
backup incremental is slower.
Restoring Deferential Backup: - When you restore the deferential back first you restore normal
backup and then last day deferential backup. Deferential restore is faster.

141

13.4 System State Backup

Fig 13.1

System State Data Backup Includes


1.
2.
3.
4.
5.
6.

ADS database (Only On DC)


SYSVOL folder (Only On DC)
Registry.
System startup files.
COM + registration files
Certificate service database.

142

Taking Backup

Fig 13.2

Fig 13.3

143

Fig 13.4

Fig 13.5

144

Fig 13.6

Fig 13.7

145

Fig 13.8

Fig 13.9

146

Fig 13.10

Fig 13.11

147

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

148

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

149

Chapter 14 Using Recovery Console


14.1 Introduction
It is a tool designed for administrators and advance users. You can perform copy, replace, rename,
operating, system files & folder, Enable or Disable loading services tasks from recovery console.
When the computer is restarting due to MBR problems you can perform the following using
recovery console.
Repair the system MBR.
Create & Format partition from R.C.

14.2 Starting Recovery Console


1) Start the recovery console using win2003 server CD.
Boot the computer with the windows setup CD and Press R to go to recovery console
2) Install recovery console on the computer with Winnt32.exe /Cmdcons command.
Step1

Fig. 14.1
Step 2

Fig. 14.2
150

Step 3

Fig. 14.3

After the recovery console is installed the recovery console option is added to the boot.ini file

This screen will display the recover console option during startup

Fig. 14.4

151

The recovery console screen

Fig. 14.5
Once the recovery console is started you can access the following.
1. Only root drives (c:, d:, e:)
2. System root folder (Windows)
3. CMDCONS folder if you have installed the recovery console.
4. CD-ROM and floppy disk drive.

Recovery console commands


1. Help: - Displays list of commands available in the recovery console.
2. LISTSVC: - Lists the services and their status.
3. Disable/enable service name: - Disables or enables the specified service.
4. Diskpart: - Used to create and delete the partitions.
5. Fixmbr :- Used to fix the master boot record.
6. Chkdsk c: /r: - Repair the disk.
7. Exit :- Restart the computer

152

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________

153

Notes
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
154

5th Floor Shan-Hira Heights, 13, M.G. Road,


Camp, Pune- 411001. India
Ph- +91-20-65242358/59 Web Site: www.prolabs.co.in

155

Vous aimerez peut-être aussi