Mcse notes pdf
Authoritative restore: This is useful when we want to restore a specific object or specific object by incrementing the USN value. When we want to perform authoritative restore, we have to restart the system in directory services restore mode DSRM by pressing F8.
While booting and selecting DSRM. Going to backup utility we can restore system state data on completion of the restoration system prompt us to restart the system. Tombstone: It is an object deleted from AD but not removed. It remains in the AD for 90 days. There are two versions in IP 1.
Version 4. Version 6. Which are not changeable. DHCP: useful for extremely larger networks where we want to centralize the I. Case2: Useful for smaller networks where there are no administrators or administrator may not be comfortable with assigning IPs. If the client machine is restarted again the DHCP lease process takes place and again the client gets an IP for 8 days. Group of scopes is called as super scope. Note: when we have multiple scopes only one scope can be active in order to enable all the scopes we have to merge all the scopes with super scope.
Creating super scope Requires multiple scopes Create 2 scopes. Right click on server Say new super scope Specify the super scope name Select 2 scopes by holding ctrl key Next — finish. Address Pool: gives the range of IP addresses we have specified Address leases: specifies the client names and the IP addresses assigned Reservations: useful when we want to dedicate a particular IP to a particular system.
Ex: managerial systems, important clients. Scope options: Using scope options we can specify the other servers addresses available in the network. So that the DHCP server maintains information about all other servers and provides it to the client machines along with the I. For NT — 66servers addresses - for - Server options: Useful when we have multiple scopes and provide information to all the scopes. Where as scope options are limited only to that scope.
Resolver: It is a file which will contain the mapping information of the clients. System name and its IP address. NetBIOS names are the names without extensions. Supports all type of OS. Issues queries that ask for specific types of mapping of computers and IP addresses records Query types determine behavior of DNS server receiving query. Lookup types determine whether a name to IP mapping or an IP to name mapping is sought. Recursive Queries: When a client start a query, query is passed onto local DNS for resolution if a query cannot find the solution then the DNS on behalf of client forwards the query to another DNS, And to another DNS and so on until it finds the mapping information or an answer.
If the DNS cannot resolve it sends a negative response to the client, then the client has to contact another DNS and so on. Zone: Zone is a subtree of DNS database. Forward Look up zone: Contains host record, which contain host names to IP, address mapping information. Records: It is a database which contains information about the zone There are a few types of records. Right click on the zone you have created - new host — specify the servers address —and IP Add host - ok - done.
Right click on zone — new alias Specify www. Right click on the R-L zone New zone — next - zone type - next — specify the IP address — zone file — next — allow both — next — finish.
Right click on reverse lookup zone. New- pointer — specify IP Browse host record — ok. Secondary Zone: There are created on the second DNS server where it holds a read only copy of the zone.
Secondary zones provide fall tolerance and load balancing to the primary zone. Secondary zone is a back up for primary zone. Zone transfer: Zone transfer is a process of transferring the zone from primary to secondary or secondary to primary.
Zone transfers occur when there is a change or modification taken place on either of the zones. AD integrated zones: These are useful when we want to maintain zone information in the AD.
If it is a primary zone, zone is saved as a normal text file as a result we have to back p the zone separately, AD integrated zone is created when we install AD with a domain name. Stub zones are useful for resolving the query faster. On DC Create a primary zone with a host record ex: hp. There are a few types of resource records. These are useful for locating the services. There are totally 6 service records created when we install AD.
They are located in DNS under domain subtree. When we install AD, system automatically creates an AD integrated zone with the corresponding domain name. Provides DNS information in entire forest. Move onto member server refresh the zone This process is we call as safe zone transfer.
For accessing C drive through command prompt. Create secondary zone for dc zone. Open DNS right click on the zone properties Type of zone secondary If we want to change click on change. Dynamic updates take place when there is a modification or change done at the client or when we have DHCP server. DNS gets updated as and when what all the hosts come online get their names registered with DNS server. Disable recursion: By default this is disabled i.
BIND version 4. Faster zone transfer is possible by transferring multiple zones at a time besides compression. If the secondary zone comes across stale records or unwanted records the zone will not be loaded if we check this box. Secure cache against pollution: By default the cache DNS information is secured against pollution. Once configured as root sever disable forwarders and root hints. Root servers zone name is always represented by a dot.
Next - zone file — allow both-Next — finish. Security: We can add sub administrator for administrator and set permission on these administrators. Monitoring: used for troubleshooting DNS. Debug Logging: to assist with debugging we can record the packets sent and received by the DNS server to a log file. Debug logging is disabled by default. Verification: Go to command prompt. Win I. Details Select F. Services Ok — next. Right click on the. Virtual Directory: These are useful for creating child websites or links Ex: mail servers, chat servers, advertisement servers etc….
Browse WebPages folder Check the box browse - next — finish. Redirection is useful in various cases. Case1: renaming of the website where users are unaware of the change. Case2: when the website is under construction Case3: when the website hosting server is unavailable, we go for redirection. Create 2 websites Select web content create 2 websites Select web content Create 2 zones with host records corresponding Open I.
Useful for publishing advertisements in a particular websites and seen as a footer for the website Open I. Right click on the website Properties Documents Check the box enable documents footer Browse webpages folder Select any. It is a new feature in We can backup and restore websites. Open I. Right click on the websites Select website from file Browse the backup file we have saved Click on read file Select the site name — ok. Get Type the filename to be downloaded Type the filename to be saved as same file name.
Turning off interactive mode: prompt system does not prompt for conformation while downloading multiple files. When we want to secure the ftp contents or when we want ftp users to have their own folders with ftp site we use isolating users.
Zoom, India. Verification: On Member server Open I. Security Groups: These are used for setting permissions on the objects printer, data it can also be used as a distribution groups.
This can also be used for maintaining distribution list. Group scope: identifies the extent of the group within in a domain or a forest. UG: used for or organizing the users, groups from more than one domain. By default UGs are not available because the O. In order to enable UGs. Select windows native raise. Software router: A server with 2 NICs called software router.
NAT enables one way communication. Verification: On private network Go to command prompt Ping public network It should ping Move on to public network Ping private network It should not ping. Dynamic: It requires dynamic routing protocols there are a few dynamic routing protocols.
Dynamic routing enables a router could prepare dynamically automatically on its own. On command prompt Type root print. Network destination: destination of the packet reached Net mask: subnet mask of the system. It is a protocol responsible for listening to the client request for assigning an IP to the clients dynamically on behalf of DHCP server from the other network. Does not support routing. Suitable for larger networks.
It is a routable protocol. IP — supported by many OS. It is a routable and robust ever changing protocol. Using public network for private use we call it as VPN. Terminal Services: Terminal Server is a server used for centralizing the management of applications. It provides remote administration for administrators. It is used when a company cannot upgrade their client machines, hardware infrastructure.
During the session the terminal server uses the protocol called RDP. Only the mouse clicks and key stokes are sent to the TS. If we want to configure T. Application mode offers remote administration as well as applications. In win we can install T. Fully Relaxed mode: Provides access to registry and other system resources useful when the security is not criteria or for performing remote administration.
By default when we install T. It is a free license provided by T. License manager: responsible for maintaining the T. When a T. Licensing mode: There are 2 modes 1. Domain Licensing mode 2. Enterprise licensing mode. NOTE: T. Only one T. Session on both T. Remote control: R. Remote Control: To have remote control of the user, an administrator has to login to the TS and only through the TS he can take the remote control of the user. Login as administrator In terminal session Start — p — admin tools Open terminal services manager Right click on user — remote control Select the release keys ex.
Notepad, cmd, etc. ISA Internet Security Accelerator It is useful to speedup internet access and to protect private network from public network. Software firewall: ISA server Checkpoint Smooth wall Firewall: a firewall protects networked computers from international hostile intrusions. Foot printing 2. Scanning 3. Dos attack denial of service 4. Exploits ex. Cgi scripts, perl scripts etc.
Trojan horses ex: netbus, bo2k 6. Port scanner. Foot printing: the art of gathering the complete security profiles of an organization or a target computer. By using a combination of tools and techniques the hacker can take up the system and determine its IP address and domain names. Scanning: Scanning the system for bugs and loopholes in OS. DOS attack: Denial of service attack which is an attempt to get the service or the server down by overflowing the buffer.
Win spoof a7, my spoof. Exploits: Exploits are usually bugs in applications or OS which can be exploited by using a piece of code often referred as scripts.
Ex: CGI scripts, perl scripts etc.. Trojan Horses: Trojan horses are a program that pretends to be a useful tool but actually installs malicious or damaging software. Trojan Horses can be used to take over the remote system sending viruses to steal the data. Netbus, Bo2k. Port scanner: Scanning the port to get into the application ex: port scanner, etc.
ISA can be configured as firewall or proxy server. Packets are allowed or dropped through the device depending on the access control list. If it is configured as proxy it acts like a web server Application gateway: ex: proxy server. Packets are allowed based on type of application and IP address. Application level gateways can also be used to log user activity and logins. Server deployment stand-alone only multiple servers with centralized management.
IP: Cache mode: select this option if security is not the criteria as it is used for accelerating the access speed of websites by the private network users. Firewall: useful if we want to configure ISA as firewall, which protects the private network from public network. With the help of some protocol rules and policy elements we can set the security. We can also control the type of traffic to be allowed in or allowed-out.
Expand policy elements Right click on client address set New — set name of the set — ex. Sales Add the range of available IP adds. Including ISA — ok. Creating a destination set: Expand policy elements Right click on destination set New set - specify the destination Website name — click on add — specify the destination name Which site we want to block — Ok. Verification: Move on to private network Try to access yahoo.
Verification: Move onto private network Typing the source website we should find the redirected website. Yahoo redirected to google. Images Apply — ok Move onto private network Open the website We should notice no images. Client side Requirements. When it is doing so it client broadcasts network broadcast, MAC address on the network. With the help of these services can perform remote installation of OS on to the requested client.
RIS services: 1. Whenever there is a repetition of file copying occurs, it omits copying file, instead it creates a pointer and this pointer will be pointing to the actual files. Performing remote install on client On the client machine Boot from pxe enabled NIC or remote bootable floppy. Press F12 key when the system prompts and installation proceeds. Next — answer further questions.
Once it is over the riprep image is ready. We can also implement software rate, and disk analysis. To open Disk manager Start — run — diskmgmt. Start — run — diskmgmt. Creating extended partition:. Right click on the green color partition New — logical — drive — next — alter the size Next — drive letter Type of file system Next — finish.
Dynamic disks: simple volume — spanned volume — stripped volume — mirrored volume — RAID — 5v. Basic Disk: These are referred to partitions. Using basic disks we can create partitions like primary, extended, logical. Basic disks are useful for providing backward compatibility with older OS.
Like DOS, 95, 98 etc.. Basic disks are useful while implementing clustering and when we want to have dual OS in our computers. Basic disks can have 1primary, 1 extended and logical partition Or four primary or 3 primary 1 extended and so on. Basic disks can be converted to dynamic disks For converting it requires 1MB of free space. We can convert form basic to dynamic but not vice versa. Possible when we get advanced. Converting from basic to Dynamic: requires 1MB of free space Go to disk management Right click on the disk1 Convert to dynamic disk.
Volume: Volume is made up of free space club or merged fro more than one H. Easy to administer. Dynamic volume: Dynamic disks refer to volumes. Using dynamic disks we can implement and extend volumes and implement raid.
Dynamic disk can be attached or detached on the file. Simple Volumes: simple volumes are similar to partitions which can be created only one Hard disk which do not offer fall tolerance. Span volumes offer extending of volume. Do not offer fall tolerance Maximum 32 Hdds Min 2 Hdds.
Open disk management Right click on the black bar New — volume Select simple volume Alter the space — next Drive letter File system Check box perform quick format Next — finish.
Drive letter — next Perform — quick format — finish. Extending volume: Right click on the volume we want to extend Extend volume - next Select the drive on which we want to extend the volume Specify the size - next — finish. Fault Tolerance: It is a technique used for protecting data against hardware failures. Which is not a guaranteed fault tolerance?
Offers highest fault tolerance. Requires min 2 Hdds, max 32 Hdds. Offers no fault tolerance Suitable when performance is criteria. Data is written evenly on to all drives If any one of the drives fails whole data is lost.
Space selected on all the drives should be of identical size. Requires min. If one drive fails data is still available in the second drive. Break mirror: Breaks the mirror and retains the partition and data and changes the drive letter Right click on desired drive Select break mirror.
The first bit of first octet is always 0. The first two bits of first octet are reserved as 10 Class C: The first three octets are reserved as network portions. The first three bits of first octet are reserved as Class D: Used for Multicasting. The first four bits of first octet are reserved as Class D: Used for Experimentation. AD is a centralized hierarchical Directory Database. AD is a searchable Database. We have to install A. Domain Controller D. A server where A. Functionality of A. It provides single point of administration.
Purpose of A. Provides user logon authentication services. Features of A. Fully integrated security system with the help of Kerberos. Easy administration using group policy. Extensible modify the schema New features in 6. Cross —forest trust relationship. Site-to-Site replication is faster. It is directory access protocol. It runs on the port no. D: Requirements: Windows O.
Components: Logical structure is useful for organizing the network. Logical components cannot be seen Physical structure is useful for representing our organization for developing the organizational structure. It reflects the organization mirrors Physical structure can be seen. TREE: A tree is a group of domains which share contiguous name space.
If more than one domain exits we can combine the multiple domains into hierarchical tree structures. The first domain created is the root domain of the first tree.
Additional domains in the same domain tree are child domains. A domain immediately above another domain in the same domain tree is its parent. The two forest wide predefined groups — Enterprise. Administrators and schema administrators reside in this domain. Sites provide replication There are 2 types of replications 1. Intrasite replication 2. Intersite replication Intrasite Replication: It is a replication with in the same site.
Intersite Replication: It is a replication between two different sites. Intersite replication is implemented when the sites are away from each other. DIT C:windowsntdsntds. Directory Information Tree It is a file logically divided into four partitions. Schema partition 2. Configuration partition 3. Domain partition 4.
Ad is constructed with the help of classes and attributes. Forms the database structures in which data is stored. Collection of objects is called class. Piece of information about the object is called attribute. Configuration Partition: Logical partition in AD database. Domain Partition: Logical partition in AD database. Collections of users, computers, groups etc. Units of replication. Domain controllers in a domain replicate with each other and contain a full copy of the domain partition for their domain.
DCs do not replicate domain partition information for other domains 4. Application Partition: It is a newly added partition in win It can be added or removed It can be replicated only to the specified DCs. Schema master 2. Domain Naming master Domain wide master operation 3. PDC emulator 4. RID master 5. Infrastructure master Schema Master: Responsible for overall management of the entire schema in a forest. The first DC installed acts as a schema master in the entire forest.
It maintains the uniqueness of domain names. There can be only one DNM in the entire forest. If it is running in mixed mode PDC updates the password changes made by the users. It is also responsible for synchronizing the time. There can be only one PDC emulator per domain. It is divided into two parts. DID Domain Identifier 2. It also maintains universal group membership. There can be only one infrastructure master per domain The term flexibility means we can transfer any of the 5 roles from DC to ADC.
Transfer of Roles : We can transfer the roles for some temporary maintenance issues on to ADC and again we can transfer back the roles onto DC. We can transfer the roles in two ways 1.
Command mode 2. Graphical mode Global Catalog runs on the port number All types of queries are first heard on this port number and forward the query to port no. Maintains the complete information about the objects within the same domain and partial information about other domains.
GC communicates to infrastructure master. The primary functions of GC To maintain universal group membership information, to easily locate the objects with in the AD. Installing New Domain tree in an existing forest: Requirements: Forest initial domain controller or root domain controller On member server or stand-alone machine. Select Domain tree in an existing forest. Functional Levels: 1.
This mode supports older versions of win We can add NT, flavors in networks. Interim: This mode can have NT and Useful when we upgrade NT to Windows server: This mode supports only server family. External — one way non-transitive NTLM trusts. Realm — one or two way non-transitive Kerberos trusts. Establishing Trusts: The Domain where we have user accounts is called trusted domain.
The domain where we have resource is called trusting domain. Trust between parent and child is two way transitive trusts. Ex; A trusts B, automatically B trusts A this is a two way trust.
Trust between parent and Grandchild domain is called implicit trust. One way out going trust: A is offering resources to B and B is getting resources from A Benefits of Domain Functional Level: Win server Level: The moment we raise the functional level, form mixed mode to win mode we get the following benefits.
Universal groups Group nesting Domain renaming tools. Benefits of Forest Functional Level: Win level We get complete benefits of when we raise the level from to win server. We can implement forest trusts. Acceleration of global catalog replication information. Server, which is part of the Domain, is called Member Server. Member Servers are used Load balancing Load sharing form DCs A member server can be configured as any of the following servers. Domain User Accounts: These are created in the AD and they proved centralized management of users besides easy administration 2.
Local User Accounts: These can be created on the Local machines where the client works. XP prof. These accounts do not provide centralized management. Suitable only for smaller organizations where there is no server.
Creating a Domain User Accounts. Verify: On DC logon as a user Disabling password complexity policy: The moment we create a share on a server, server acts like a file server. Permissions Using permissions an administrator can either allow or deny access to a resource.
Resource can be a network resource or local resource Permissions are of two types 1. Share level 2. Share level permissions are not applied on the local machine where the resource is existing.
NTFS permissions are useful for securing locally available resources. Experiment2: Login as administrator on member server Create a folder Folder properties Security Advanced-uncheck the box allow inheritable permissions.. Remove Apply — ok. Add the users we have created along with the administrator Administrator -full control U1 — full control U2 — modify U3 — read — apply — ok Full control permissions This permission offers complete control i.
Users who have full control permission can take ownership of a resource The moment a user creates a folder he becomes an owner of a folder. When a user logs in for the first time the user will be loaded with a default user profile.
Default user profile is located under C:documents and settingsdefault user Types of profiles: Local profile Roaming profile Mandatory profile Local profile: It is a profile loaded for the user and saved in the local hard drive where the user works. And profile will be saved when a user logs off Local profiles are limited only to the machine where they are saved.
A user with a local profile will not be loaded with a network profile when he logs on from another machine.
Verifying the type of the profile: My computer Properties Advanced User profile — settings Roaming Profile: It is a profile, which is saved in the shared folder on the server. Hence available in the entire network. Mandatory Profile: Mandatory Profile is a profile used for controlling desktop environment setting especially used for restricting user from saving user data, setting, and configuration on the desktop.
It is a type of roaming profile but settings are not saved when a user logs off. Changes will be available only for the session where user is active. If the home folder is in the server an administrator can secure it and back-up.
If the home folders are created in the local machine backing up is not that easy. Creating a user home folder in a server On member server Create a home folder for user1 Share it Permissions Remove everyone Add administrator and user1 Give full control for both DFS Distributed File System DFS allows administrators to make it easier for users to access and manage file that are physically distributed across a network.
With DFS, you can make files distributed across multiple servers. It may appear for users that files actually reside in one place computer on the network. Benefits of DFS 1. Easily access: users need not remember multiple locations form where they get data just by remembering one location they get access to the data.
Load balancing: if all the DFS root servers and targets are working fine it leads to load balancing. PDF Stamping Tool is fully featured stamp and watermark creator tool which allow you to make a watermark Besides images, texts and graphics, PDF Stamp is able to add links and notes. PDF Stamping Tool is extensively used by legal professionals, medicals.
PDF Stamping Software is an advanced tool designed with features to create watermark using images, texts, graphics and to add links etc. PDF Creator installs as a virtual printer. It has been specifically designed for busy managers who need to easily sign or protect a business document, be it a purchase order, an invoice, a report, a proposal, compliance statement or assessment review. It provides. All you have to do is open the iPhone backup folde, select required messages, choose the document format to convert and click the.
Do you have to share your Notes mailbox information with others? Then share it as PDF files. Thanks to the security options it offers, PDF file format is the most popular document format when it comes to sharing information through emails, Internet, or even pen drives.
0コメント