Computer System Servicing NC Ii: Sta. Isabel College
Computer System Servicing NC Ii: Sta. Isabel College
Isabel College
Taft Avenue, Manila, Philippines
ARMANDO G. HERMOGENO
Duration
Unit of Competency Learning Outcome Methodology Assessment Approach
(hours)
1. Install and 1.1. Assemble computer Lecture Written 65
configure hardware Discussion examination
computer 1.2. Install operating system Demonstration Practical
systems
and drivers for examination
peripherals/ devices. Viewing multimedia
1.3. Install the computer
application software
1.4. Conduct testing and
documentation
2. Set-up 2.1. Install network cables Lecture Written 50
computer 2.2. Set network configuration examination
Discussion
networks
2.3. Set router/Wi-Fi/ wireless Demonstration Practical
access point/repeater examination
Viewing multimedia
configuration
2.4. Inspect and test the
configured computer
networks
3. Set-up 3.1. Set-up user access Lecture Written 15
Computer 3.2. Configure network examination
Discussion
Servers services Demonstration Practical
3.3. Perform testing, examination
Viewing multimedia
documentation and pre-
deployment practices
4. Maintain and 4.1. Plan and prepare for Lecture Written 30
repair computer maintenance and repair examination
Discussion
systems and 4.2. Maintain computer Demonstration Practical
networks
systems and networks examination
Viewing multimedia
4.3. Diagnose faults of
computer systems
4.4. Rectify/correct defects in
computer systems
4.5. Inspect and test the
computer systems and
networks
CONTENTS
1. Assemble computer hardware
2. Install operating system and drivers for peripheral devices
3. Installed application software
4. Conduct testing and documentation
(2) Mouse: It’s a pointing device. The mouse is rolled over the mouse pad, which in turn controls the
movement of the cursor in the screen. We can click, double click or drag the mouse. Most of the mouse’s
have a ball beneath them, which rotates when the mouse in moved. The ball has 2 wheels of the sides,
which in turn mousse with the movement of the ball. The sensor notifies the speed of its movements to the
computer, which in turn moves the cursor/pointer on the screen.
(3) Scanner: Scanners are used to enter information directly in to the computer’s memory. This device
works like a Xerox machine. The scanner converts any type of printed or written information including
photographs into digital pulses, which can be manipulated by the computer.
(4) Track Ball: Track ball is similar to the upside- down design of the mouse. The user moves the ball
directly, while the device itself remains stationary. The user spins the ball in various directions to effect the
screen movements.
(5) Light Pen: This is an input device which is used to draw lines or figures on a computer screen. It’s
touched to the CRT screen where it can detect raster on the screen as it passes.
(6) Optical Character Rader: It’s a device which detects alpha numeric characters printed or written on a
paper. The text which is to be scanned is illuminated by a low frequency light source. The light is absorbed
by the dark areas but reflected from the bright areas. The reflected light is received by the photocells.
(7) Bar Code Reader: This device reads bar codes and coverts them into electric pulses to be processed by
a computer. A bar code is nothing but data coded in form of light and dark bars.
(8) Voice Input Systems: This devices converts spoken words to M/C language form. A micro phone is
used to convert human speech into electric signals. The signal pattern is then transmitted to a computer
when it’s compared to a dictionary of patterns that have been previously placed in a storage unit of
computer. When a close match is found, the word is recognized.
(9) Plotter: Plotter is an O/P device that is used to produce graphical O/P on papers. It uses single color or
multi-color pens to draw pictures as blue print etc.
(10) Digital Camera: It converts graphics directly into digital form. It looks like an ordinary camera, but no
film is used therein, instead a CCD (changed coupled Divide) Electronic chip in used. When light falls, on
the chip though the lens, it converts light waves into electrical waves.
OHS or Occupational Health and Safety refers to the legislation, policies, procedures and activities that aim
to protect the health, safety and welfare of all people at the workplace.
1. Don't Force Anything. If it has to be forced, it will probably break. If there are no screws on the back
of the case for the cover, check the plastic face-plate on the front. Some pry off to reveal screws or
release levers (remember, careful inspection). If everything on the front has its own bezel around it
(including the LEDs) then maybe the plastic front pops off (or maybe the case slides off the front).
2. Make sure any screws removed are for the cover. You don't want to unscrew the power supply by
accident and have it fall inside your computer. That's a bad thing.
3. After the case is removed, place it in a safe place, where it won't get knocked of a table, kicked or
stepped on and bent.
5.
6. Again, documentation is very important. Since some of the module cards have a specific
configuration, like for example a 16-bit ISA card will probably work in any 16-bit ISA slot, but there
may be a reason it's in that particular one. Document the type of card and which slot it comes from.
7. Check the card for any cables or wires that might be attached and decide if it would be easier to
remove them before or after you remove the card.
8. Undo the screw that holds the card in place.
9. Grab the card by its edges, front and back, and gently rock it lengthwise to release it. Do not wiggle
it side to side as you can break the card, the slot, or the solder. Sometimes it helps to grasp the
inside corner of the card with one hand and place a finger from the other hand under the
associated port out the back of the computer to pry up the one end of the card.
10. Once the card is removed, you may want to record any jumper settings you see, just in case one is
accidentally dislodged. Try to store the card in an antistatic bag. If you don't plan on replacing the
card then a cover should be installed over the slot opening.
12.
13. Removing drives is not that difficult. They usually have a power connector and a data cable
attached from the device to a controller card or a connector on the motherboard. CD-ROMs may
have an analog cable connected to the sound card.
14. The power will be attached using one of two connectors, a large Molex connector or a
smaller Berg connector for the floppy drive. The Molex connector may need to be wiggled slightly
from side to side while applying gentle pressure outwards. The Berg connector may just pull
straight out or it may have a small tab that has to be lifted with a tiny flat screwdriver.
15. The data cables need to be documented. Remember the pin one rule. Know where each one goes
before you pull it out and record its orientation (which side is the stripe on, where is pin 1?).
Pull data cables gently and carefully.
16. Can the entire drive bay be removed? Does the drive come out the back of the bay or does it slide
out the front. If a bay is removable, you may have to remove some screws or unclip a lever then
slide the bay back and off. If the bay is not removable, there should be access ports on the other
side of the case that allow for access to those screws.
18.
19. Memory modules are one of the chips that can be damaged by as little as 30 volts. Be careful of
ESD and handle them only by the edges. SIMMs and DIMMs are removed differently:
20. SIMM - gently push back the metal tabs holding the SIMM in the socket. Tilt the SIMM away from
the tabs to about a 45% angle. It should now lift out. Put each SIMM in its own protective bag.
23.
24. Make sure it's unplugged.
25. All power connectors should be removed, including the connection to the motherboard and any
auxiliary fans. Watch the little plastic tabs on ATX connectors (you’d rather not break them). AT
power supplies have a two piece power connector that may be labeled P-8 and P-9. Make note of
the orientation. The black wires should be in the middle, black to black.
26. Remove the connection to the remote power switch at the front of the case. Orientation of the
colored wires at this switch is critical. Make sure you document well, and during re-assembly plug
the computer into a fused surge protector before turning it on (this could save your motherboard
and components from melting if you've reconnected improperly). If you're putting the same power
supply back, it's better to remove the entire switch and leave the connectors intact. The remote
switch on an ATX form factor attaches to the motherboard.
27. Remove the four screws at the back of the case and gently slide the power supply out of the case.
While removing these screws, hold onto the power supply. You don't want it falling into the case.
28. How to Remove Mother Board
You can access BIOS Setup utility screens from the following interfaces:
Use a USB keyboard, mouse, and VGA monitor connected directly to the server.
Use a terminal (or terminal emulator connected to a computer) through the serial port on the back
panel of the server.
Connect to the server using the Sun ILOM Remote Console.
To access BIOS configuration screens and to change the system’s parameters, complete the following
steps:
1. Power on or power cycle the server.
2. To enter the BIOS Setup utility, press the F2 key while the system is performing the power-on self-
test
Press F2 to Run Setup Prompt
When BIOS is started, the main BIOS Setup utility top-level screen appears. This screen provides
seven menu options across the top of the screen.
3. Use the left and right arrow keys to select the different menu options.
As you select each menu option, the top-level screen for that menu option appears.
4. To select an option on a top-level screen, use the up and down arrow keys to scroll up and down the
options presented.
Only options that can be modified are highlighted when you press the up and down arrow keys.
If a field can be modified, as you select the option, user instructions for modifying the option appear
in the right column of the screen.
If a field is a link to a sub-screen, instructions to press the Enter key to access the sub screen
appear in the right column.
5. Modify the setup field and press the Esc key to save the changes and exit the screen.
Some screens present a confirmation dialog box that enables unwanted changes to be retracted.
8. Press and release the right arrow key until the Exit menu screen appears.
9. Follow the instructions on the Exit menu screen to save or discard your changes and exit the BIOS
Setup utility.
The BIOS Boot screens enable you to configure the boot device priority (storage drives and the DVD-ROM
drive).
BIOS Setup Utility: Boot - Boot Device Priority
BIOS Setup Utility: Boot - Wake on LAN Configuration
LO 2. PREPARE INSTALLER
ASSESSMENT CRITERIA
1. Portable bootable devices are created in accordance with software manufacturer instruction
2. Customized installers are prepared in accordance with software utilization guide and end user agreement
3. Installation of portable applications are carried out in accordance with software user guide and software
license
Creating System Image applicable procedure for Windows 2008 R2 and Windows 7
This describes a process to create a bootable USB drive which can be used to install the operating system
onto your system. Transferring the installation files to a USB drive makes loading the operating system
faster (21 Mb/s vs 480 Mb/s) and gives you the ability to load the operating system on devices like tablets
that support USB but don’t support optical media.
The following steps guide you on how to make the USB drive bootable and get the contents onto the drive.
1. Insert the USB drive.
2. Open a CMD prompt using the Run as Administrator option.
3. Start the DISKPART tool by typing Diskpart and press ENTER.
4. List all disks recognized by the system by typing list disk and pressing ENTER.
Image 2
5. Select your USB drive from the list returned (Disk 2 in this example) by typing Select Disk 2 and pressing
ENTER.
Image 3
6. Remove all data from the disk by typing clean (Note: This will destroy all of the data on the USB drive)
and pressing ENTER.
Image 4
9. List all volumes recognized by the system by typing list volume and pressing ENTER.
Image 7
10. Select your volume from the list (Volume 3 in this example) by typing: select volume 3 and pressing
ENTER.
Image 8
11. Quick format the disk using Fat32 by typing format fs=fat32 quick and pressing ENTER.
Image 9
12. Insert your desired operating system media or mount your ISO.
13. Copy the entire contents of the installation media from the installation media to your USB drive.
14. In the root of the USB drive, open the \efi\Microsoft\boot directory.
15. Copy the directory contents up one level so the files also reside under \efi\boot.
16. Copy the bootmgfw.efi file from the root directory of the ISO or disc to the \efi\boot directory, and
rename it to bootx64.efi.
You’re now ready to use the USB drive as UEFI installation media on your system Just boot to the USB
drive and setup will begin, or just insert the USB drive and allow setup to auto run, or open setup from a file
explorer window.
Note: There are several methods and application programs that can be utilized to create this image.
Example: xboot, power iso, Windows image creator, etc.
1. Rufus requires an account with admin access in order to make the necessary changes to
hardware. After authenticating, insert the USB flash drive and launch Rufus. It will detect the drive
almost immediately. Since Rufus can handle various partition schemes and file structures, ensure that
the correct settings are set that match the UFD you're going to build
2. Click the optical drive button next to the Create a bootable disk using checkbox, and you'll be
prompted to search for the ISO image to use.
3. When using ISO images, Rufus will automatically modify the settings to best match it. Once
everything is set correctly, click the Start button to begin the process. You'll be prompted with a
warning that all data on the UFD will be destroyed. Click OK to proceed with the creation process
Figure C
4. Depending on the ISO image size, the process may take several minutes to complete. For the log
readout of each step in the process, click the Log button to open a side window and save the output
details
5. The longest part of the entire process is the file copy portion. This is typically the last step and
varies depending on file size/number of files to copy
6. When complete, double-check the external drive to verify the files were copied
With the process completed, simply eject the UFD, insert it into the device you wish to install the OS on,
and boot as you normally would. The days of carrying multiple CD/DVDs with you and dealing with lagging
installs are drawing to a close with the ubiquitous use of USB drives—and the storage capacity can't be
beat.
ASSESSMENT CRITERIA
1. Operating system (OS) is installed in accordance with established installation procedures and to comply
with end-user requirements
2. Peripherals/devices drivers are installed and configured in accordance with manufacturer’s instructions
and/or OS installation procedures.
3. OS and drivers updates/patches are accessed and installed in accordance with manufacturer’s
recommendations and requirements
4. On-going checks of the quality of the work are undertaken in accordance with established procedures
A Basic Install
Since we’re doing a base install and not an upgrade, so we choose the Custom (advanced) option.
Windows will take a little while with your install, and reboot a few times.
Once the install is finished, we’re prompted to change our password before logging in.
The Initial Configuration Tasks window pops up as soon as you logon. You could also type in Oobe.exe in
the Command Prompt to arrive here.
One of the first things we want to correct is the time, so choose Set time zone. Make sure that you set the
time zone first, because the date and time will shift after.
Installation of Windows 7 is quite similar to the process you encountered with Windows 2008 R2.
Next we want to choose Configure Networking. The first server installed in a network needs to be a Domain
Controller, and since they require a static IP, we are going to need to set one up now. Double-click
on Local Area Connection, and once the information box pops up, click on Properties.
Click on Internet Protocol Version 4 in the Networking box, then click Properties. Change the radial button
to Use the following IP address: and then enter the settings for your specific server and network IP
addresses. When you’re finished, click OK to save those settings.
Installation of Software
ASSESSMENT CRITERIA
1. Cable routes are determined and planned in accordance with network design and actual installation site.
2. Network materials necessary to complete the work are identified and obtained in accordance with
established procedures and checked against systems requirements
3. Tools, equipment and testing devices needed to carry out the installation work are obtained in accordance
with established procedures and checked for correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies and procedures are followed
5. Copper cable splicing is performed based on Electronic Industries Alliance/Telecommunications Industry
Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with established procedures and installation
requirements
7. Installation work is performed and is checked to ensure no unnecessary damage has occurred and complies
with requirements
8. OHS standards and 5S principles are followed according to enterprise requirements
9. Excess components and materials are disposed of based on WEEE directives and 3Rs waste management
program
CONTENTS
1. Install network cables
2. Set network configuration
3. Set router/Wi-Fi/ wireless access point/ repeater configuration
This is a simple network cable management necessary to finish the task. Using the necessary
tools, materials and equipment design your own data and cabling easement to create and establish
connection with your client (Windows 7) and your server (Windows 2008 R2)
The expected output to transmit data from client to server and server to client
1. Cat5e Ethernet cable - I recommend purchasing a box of Cat5e cable. You will save money by
purchasing your cable in bulk.
2. RJ-45 connectors
3. Crimper Tool - capable of crimping 8 wire (RJ-45) and 6 wire (RJ-11). Most tools have built in
cutters too.
4. Stripper Tool
5. Scissors - I prefer using a scissors
6. Cable Tester - For testing that your cable connections are good and there are not any open or
crossed wires
A scissors, a crimping tool, and a stripping tool
Cable testers
Steps to make a straight through Ethernet cable:
1. Cut a piece of cable to the length you will need. Give a little extra to make room for mistakes.
2. Strip a half inch to an inch of the outer jacket away from the cable. If you use strippers make
sure not to nick the wire pairs and expose the copper, this could introduce crosstalk onto your wires. I
prefer to use a scissor and my fingers to tear away the jacket. Then I cut with the scissors to clean up
the edge.
3. Now you need to untwist the wire pairs (not too much, only undo one or two twists) so you can
align them according to the EIA-TIA568B wire color sequence. I use my fingers to straighten the
wires by bending them back and forth, straightening them as they warm up.
1 2 3 4 5 6 7 8
4. Trim the ends of the wires so they line up and create a straight edge.
5. Now holding an RJ-45 connector with the tab side facing down, push the 8 wires into the
connector, sliding each wire into a groove. While holding the connector tab side down the
white/orange wire should be on the far left and the brown wire should be on the far right. It is very
important that the wires push all the way up and into the connector so that when the pins are pushed
down during crimping they will make contact with the wires. The sleeve or jacket of the cable (light
blue below) should also be pushed in as far as it can go so it will be held in place once crimped. You
may want to pull the wires out and put them back in to make sure they are sliding in correctly, this will
also further straighten the wires.
Notice the tab make sure it is facing down push the wires and sleave into the connector
6. Before crimping, examine the cable and connector from the side. Did the wires slide all the way up
in to the proper grooves? Are the colors in the proper order when observed from tab side down? Did
the jacket slide all the way into the connector? If not, you may need pull the cable out of the
connector, trim the wires or the jacket accordingly, and reinsert.
7. If everything looks good, using your crimper tool insert the connector and cable into the 8 wire slot
and press down tightly. This will cause a piece of plastic in the connector to press down on the jacket
and hold the cable in the connector preventing it from accidentally pulling out. Crimping also forces
copper pins in the connector to push down and make contact with the separate wires.
8. You are now finished terminating one end of the cable. Repeat the process on the other end of the
cable and when you are done, insert the cable into a cable tester and run a wire test to make sure
that none of the wires are accidentally crossed, by not being in the right order, or open by not
touching the connector pins. Depending on the cable tester you may need to read the manual to
understand the device output.
9. Lastly, test your cable by using it on your network. Attach the cable to your computer's NIC and the
other end to your switch. Do you see green lights? Open the Network Connections dialogue box in
Windows, does it show a properly enabled and active connection on the NIC. You can also look for
the status in your system tray network connections icon. If you have an internet connection, can you
browse the web? If not can you ping your gateway from a command prompt?
10. Remember follow the diagram on how to create standard straight thru cable as for the patch panel
look for the T568B label and follow also the diagram in punching on it
ASSESSMENT CRITERIA
1. Client Device systems settings are configured in accordance with manufacturers’ instructions and end-user
preferences
2. Local area network (LAN) port is configured in accordance with manufacturers’ instructions and network
design
3. Wide area network (WAN) port is configured in accordance with manufacturers’ instructions and network
design
4. Wireless settings are configured in accordance manufacturers’ instructions, network design and end-user
preferences
5. Security/Firewall/Advance settings are configured in accordance with manufacturers’ instructions and end-
user preferences
The standard networking technology is Ethernet. Ethernet works by means of adapters known as Network
Interface Cards (NICs) in each computer. The NICs are connected with cables which vary depending on
the cabling option chosen. Many recent computers have built-in (motherboard) network capability.
Ethernet comes in two flavors. Fast Ethernet operates at 100 Megabits per second (Mbps) and is overkill
for a SOHO. Regular or original Ethernet operates at 10 Mbps which is fast enough for a small LAN. NICs
can be purchased to fit into an EISA card slot or a PCI slot and can also be found to fit a laptop PCMCIA
slot.
There are two different Ethernet cabling options one of which will be usually used in any given LAN. NICs
can be purchased with any of these interface connectors or even with two connectors. If the NIC has more
than one connector a jumper plug or software configuration is usually used to select which connector is in
use. NICs cost as little as $20 each.
The coax interface, also known as 10-base-2, or "thin", or "BNC" Ethernet works with a coaxial bayonet
"BNC" connector on the NIC. Computers are connected together in a "daisy chain" using BNC "T" adapters
plugged into each NIC. A coaxial 50 ohm cable connects each "T" to the "T" on the next computer. The first
and last computers will have a terminator resistor plugged into the unoccupied arm of the "T". Coax is only
available in 10 megabit speed. Hubs and NICs that provide coax are harder to find and BNC cards are now
largely obsolete.
The twisted pair interface, also known as "UTP" or 10-base-T or "RJ-45" has an RJ-45 jack on the NIC. The
RJ-45 connectors look similar to the standard telephone RJ-11 jack (but are somewhat larger) and are
used with cables that look similar to standard telephone twisted pair cables to connect the NICs to a "hub",
high speed modem, or router. The hub has between 4 and 32 RJ-45 jacks. New office buildings are
The coax 10-base-2 approach is simpler since no hub is required. Larger LANs almost universally use 10-
base-T because in-wall wiring is neater and the network is not disrupted by someone connecting or
disconnecting their computer. Routers and newer computers that come with Ethernet capability usually use
10-base-T.
Virtually all new computers come with built-in RJ-45 wired internet capability and most have wireless Wi-Fi
capability.
Ethernet transmits data by means of packets and automatically adjusts to addition of computers to a net.
NICs all have a unique address built in at the factory to facilitate this.
When the network is completed you can specify specific drives or directories to be shared with other
computers on your LAN under "sharing" which will appear under the pull-down "file" menu. You can share
individual directories or entire drives for read-only access or access with a password. You can also specify
printers to be shared. When directories, drives, or devices are shared you will see a hand symbol attached
to the icon for that item. Modern printers often have built-in wireless capability and can be shared with any
wireless-equipped device in range.
Protocols are formats and procedures for transfer of data. The IPX protocol (originally developed by Novell)
is used by many applications programs including games such as Duke Nukem 3D.
Groupware
Although you can share files so that any computer on the LAN can open the same file on the same drive
there is a complication in that if more than one computer tries to open and change the same file
simultaneously the changes from one person will be lost. Many applications such as Microsoft Word will not
open a file that is already open on someone else’s computer. Applications specifically designed for
collaboration ("groupware" or "work group applications") avoid this problem.
Email is the ultimate "poor man’s" groupware application since you can accomplish many group functions
such as adding to or modifying other people’s text, setting up meetings, etc. using email, especially if you
have a more sophisticated email client.
Networks of computers all of which are used as work stations are commonly known as "peer" networks. A
server network requires an additional dedicated server machine, usually running expensive "server"
software and therefore may be less attractive in a SOHO context. When investigating groupware
applications make sure to understand if a server and specific server software is required or if the
application can run on a peer network.
You may want set up a local network for the Internet protocol TCP/IP (in addition to IPX) to allow use of
applications which use TCP/IP and TCP/IP only games like Quake on your network. In addition you may
want to set up TCP/IP to allow computers on your LAN to access the Internet as described below. To do
You can usually connect multiple computers to a network that also includes a cable modem or DSL modem
to allow all the computers Internet access. Inexpensive router boxes can be used to connect a single
modem to multiple computers. Cable or DSL modems may have built-in routers, even wireless routers.
Cable and DSL "always on" services normally semi-permanently assign an IP address and Internet name
to your account. This can have privacy implications.
Inexpensive router boxes are now available to support voice over IP (VOIP) services provided by Vonage
or other Internet based telephone service. These units connect to the Internet via RJ-45 cable connecting
to your cable or DSL modem and typically provide two RJ-11 phone connectors and three RJ-45 Ethernet
connectors. The Ethernet connectors can be connected directly to up to three computers. The phone
connectors can be connected to ordinary phones to provide up to two lines of phone service. The phone
lines can be routed to many phones via standard building phone lines. However, these small VOIP boxes
may not be able to drive as many ringers as a typical telephone company line. If you are using more than
one phone on each line, check with the box vendor to see how many phones each line can handle. A
The quality of the VOIP service is mostly dependent on the quality of the underlying Internet service. For
example, if you are having problems with Vonage it is more likely that the actual problem is with your cable
or DSL supplier. If you are using a separate router (e.g. wireless router) the VOIP box should be connected
to the modem and the router connected to the VOIP box. This way the VOIP box will have priority over the
computer's access and voice quality will be better during times when your computers are accessing the
Internet.
Be advised that fax machines typically do not work well with VOIP. This is because any momentary delay,
slowdown, or dropped packets, which do not cause any problem with the computer Internet connection,
and only cause a click on the voice line, can interfere with the operation of the analog modem in the fax
causing a dropped fax error. If you are having problems faxing, try setting the fax's modem to operate at a
slower speed (2400 baud) instead of the normal 14,400 baud. If the fax's instruction manual does not say
how to do this (they frequently do not), try searching on the Internet. Unfortunately, if it works today it still
might not work tomorrow when if the Internet is busier.
Many people report they are totally unable to obtain reliable fax operation through VOIP. It is futile to look
to the VOIP service for a solution and your Internet provider is likely to blame the VOIP provider. An
obvious solution that eliminates the need to even have a fax machine is to have capability for receiving
faxes as an email attachment and for sending faxes from a scanned or PDF document file uploaded to the
VOIP provider. This would allow you to send and receive faxes at your laptop in the field as well as at your
SOHO and also allows you to store faxes on your hard drive as opposed to paper file. For some unknown
reason, Vonage does not provide this capability although they do provide the capability for receiving voice
mail messages as email attached audio files. You may obtain fax capability from myfax.com, which allows
faxes to be sent by sending an email with or without attachment to 13015552525@myfax.com, allows
All the participating devices (computers, routers, etc.) in an Internet network need certain configuration data
to operate including the Internet Protocol (IP) address to be used by the device, IP address of the upstream
gateway, mask defining the size of the local network, and name server addresses. Modern software and
hardware can use DHCP to get this information automatically from the upstream side at startup and avoid
the need for manual entry. However, you need to initialize the boxes in a particular order for this to work. If
you first turn on the cable or DSL modem, the modem will get its information from the Internet service
provider company. Then you can turn on your router box, which will get its information from the modem.
Then turn on computers so they can get their configuration data from the router box. If power fails
frequently in your area you may want to use a small uninterruptible power supply (UPS). To power the
modem and router boxes to avoid having to go through this sequence later.
See Using ISDN. In the U.S. ISDN is largely replaced with DSL (over phone line) or cable high speed
Internet access.
Wireless
Inexpensive wireless routers are now available that connect to a cable or DSL modem and provide a local
wireless Internet "hot spot" in addition to providing typically three RJ-45 connections for wired service.
Modern laptops, netbooks, and smart phones typically come with built-in wireless capability. Small wireless
adapters that plug into a USB port can be used to connect an older desktop machine to the wireless
Here is a description of a typical Internet enabled small office network for a small company "SmallCo":
Five PC type computers running Windows or MacOS are connected via NICs to an Ethernet using 10-base-
T RJ-45 wiring and an 8 port hub. PCs are configured to use TCP/IP protocol and to use file and printer
sharing over the IPX/SPX protocol so all employees can use all the printers and can use a common file
areas or drives on the PCs. A stand-alone router is used to connect to the Internet via DSL, cable, or
analog modem using an Internet access provider and single user account. The company, has a web site at
www.smallco.com hosted elsewhere by an ISP or web site developer. (Some DSL and cable providers
object to users running web sites from their DSL or cable accounts.) Each employee has an email address
such as tom@smallco.com, Fred@smallco.com, etc. The web site provider furnishes POP email mail
boxes for each employee. Alternately, the web site provider can supply aliases to route mail from
"tom@smallco.com" to an access provider mail box such as "tom3344@ibm.net". Email clients on the
employee computers access the POP mail boxes to receive mail and send mail via an access provider
SMTP server. See Mail Note for return address considerations.
Cable modems, DSL modems, and routers usually have a built-in web server that displays administrative
pages. By entering the proper numerical IP address in your browser, you can contact this web server and
configure the operation of the device. Modems also usually display diagnostic information including
incoming signal strength, etc. This information is very useful when talking to your provider about any
problem. Modems, routers, and your individual computers all can be configured to act as firewalls. This
can cause confusion if, for example, you are trying to alter the firewall to allow some new service. Also see
DHCP above.
MODULE DESCRIPTOR
This module covers the outcomes required in setting-up computers networks for LANs and small-office home-office
(SOHO) systems. It consists of competencies to install network cables, set network configuration, set router/Wi-Fi/
wireless access point/repeater configuration as well as to inspect and test the configured computer networks
QUALIFICATION LEVEL NC II
ASSESSMENT CRITERIA
1. User folder is created in accordance with network operating system (NOS) features
2. User access level is configured based on NOS features and established network access policies/end-user
requirements
3. Security check is performed in accordance with established network access policies/end-user requirements
CONTENTS
1. Set – up user access
2. Configure network services
3. Performed testing, documentation and pre deployment procedures
Minimum: Single processor with 1.4 GHz (x64 processor) or 1.3GHz (Dual Core)
Minimum: 32 GB or greater
The first step is to assign an IP to the server that you going to deploy the AD. It’s necessary to
install it as DNS server too. So it’s better to have fixed ip it doesn't mean you cannot install AD
without fixed IP address but it will solve lot of issues if you used fixed IP.
In here the server ip is 10.0.0.14. Since we going to make it as DNS server too you should use the same ip
as the preferred DNS server.
Next step is to install the Active directory roles. Unlikely the older version of windows servers
Microsoft highly recommend to use server manager option to install roles before you run dcpromo.
Select the roles from the right hand panel and click on add roles option.
From the roles list select the "Active Directory Domain Services" role and Click "Next"
It will take few minutes to complete and when it’s done you will get this confirmation. And then click
on "Close"
After reboot please open up the "server Manager" again. And then click on "Roles" there you will
see the "Active Directory Domain Services" is successfully installed in there. Click on it then you
will get a window like below.
So please click on that link and it will start the DCPROMO wizard.
Click on "Next"
Since we going to install New domain Controller in new forest please select the option "Create a
new domain in new forest" option and click on "Next"
Now we have to provide the name for our domain controller. It must be FQDN. In our case I used
rebeladmin.com as the domain. Please click "Next" after it.
In this window it will ask to select forest function level. If you going to add server 2003 domain
controller to your forest later don't select the function level as server 2008. If you going to use full
features of 2008 Ad you must select forest function level as server 2008. In my case I used server
2008. Click on "Next" after the select.
In next window since it's the first DC we should make it as DNS server too. Leave the default
selection and click on "Next"
If the wizard cannot create a delegation for the DNS server, it displays a message to indicate that
you can create the delegation manually. To continue, click "Yes"
In next window it will show up the database location. It it’s going to be bigger AD its good if you can
keep NTDS database in different partition. Click on "Next" after changes.
In next window it’s asking to define a restore mode password. It’s more important if you had to do a
restore from backup in a server crash. Click on "Next" after filling it.
Then it will start the installation of the AD. It will take some time to complete. After complete of the
installation perform a server reboot.
After the reboot now you can login to the domain. Please use the login as following example
Password: XXXXXXXX
Now it’s done and you can view the active directory options on administrative tools menu
To start first need to log in to the server with administrator privileges. Then start the “server Manager” by
clicking on “Server Manager” icon on task bar. Then go to “Roles”
Then it will load the Roles Wizard and select the “DHCP Server” From the list and click next to continue.
Then it will give description about the role. Click next to continue.
Next window is asking to use which interface to serve DHCP clients. If server has multiple NIC with multiple
IP you can add them also to serve DHCP clients.
In next window it will give opportunity to add DNS settings that should apply for DHCP clients.
In next window we can add the scope, the Starting IP, End IP of the DHCP range, subnet mask, default
gateway, leased time etc.
Then it will give the confirmation window before begin the install. Click on “Install”
Once installation finishes DHCP server interface can open from Start > Administrative Tools > DHCP
Using the DHCP it is possible to even configure multiple Scopes configurations to the network. In a network
there can be different network segments. It is waste to setup different DHCP servers for each segment.
Instead of that it is possible to create different Scopes to issue DHCP for them.
File Services
To perform this procedure, you must be a member of the Administrators group on the local computer.
1. On Content-01, click Start, point to Administrative Tools, and then click Server Manager.
2. In Roles Summary, click Add Roles.
3. In the Add Roles Wizard, on the Before You Begin page, click Next.
4. On the Select Server Roles page, select File Services, and then click Next.
7. On the Confirm Installation Selections page, confirm your selections, and then click Install.
8. On the Installation Results page, confirm that your installation of the File Services role and required
role services completed successfully, and then click Close.
File sharing in Windows Server 2008 R2 is managed from the Network and Sharing Center, accessed by
selecting Start -> Network and clicking on the Network and Sharing Center button located in the toolbar of
the Network dialog. Once invoked, the Network and Sharing Center will list the current file sharing
configuration and options as illustrated in the following figure:
To enable public file sharing, begin by clicking on the Change advanced sharing settings link located near
the top left hand corner of the dialog. This will display the Advanced sharing settings screen as illustrated in
the following figure:
For each network environment in which the system operates a different profile is created by Windows
Server 2008 R2. This is a feature that is primarily of use in Windows versions that are more frequently used
on laptops such as Windows 7. Regardless, this feature is still present in Windows Server 2008 R2. Be
sure to select correct the profile by clicking on the up and down arrows to fold and unfold the different
profiles (if you are unsure of which profile to use, the currently active profile is marked as “current profile”).
Once the settings for the required profile are unfolded, the various settings are displayed and made
available for modification. These settings are as follows:
Network discovery – Makes the system visible to other computers on the network and also allows
this computer to see other computers on the network. This must be turned on to enable resource
sharing.
File and printer sharing – Allows select file and printer resources on the local system to be
accessed by other computers on the network. Once this setting has been enabled, these resources
must be individually configured to be shared before they will accessible.
Public folder sharing – Controls whether or not the contents of the %System Drive
%\Users\Public folder is accessible to users on other computers on the network.
'Password protected sharing – When enabled, resources on the local system are only accessible to
users on remote computers that also have login accounts on the local computer. To allow any users on
the network to access shared resources simply disable this setting
Shared folders can be configured using Windows Explorer, simply by navigating to the folder to be shared,
right clicking on the folder and selecting Properties from the menu. In the properties dialog, click on
the Sharing tab to display and modify the current shared folder settings as illustrated in the following figure:
Within the sharing property panel, click on the Share... button to access the File Sharing dialog. Within this
dialog, the users who may access this shared folder are specified. If file sharing has been restricted to
users with local accounts and passwords, a list of users can be obtained by clicking on the down arrow. In
this situation, select and add users, or select Everyone if access is to be made available to all users with
local accounts: Note: I recommend to type in the box the word domain users then check names once
underlined click apply and ok.
Once these settings are complete, click on the Share button to initiate the file sharing process. Once this
initial phase of the share setup is complete a dialog will appear announcing this fact, listing the full
Universal Naming Convention (UNC) path to the shared folder and providing the option to email users to
notify them of this fact:
Having specified which users will have access to the folder the next step is to enable the sharing of the
folder, specify share permissions and configure a Share Name by which the folder will be referenced and
accessed. In addition caching of shared files can be configured. Caching allows users to maintain local
copies of shared files so that they can be accessed off-line (for example when the server hosting the files is
not available to the user's local system). With caching configured, local copies of shared files are stored on
the user's local system so that they can be accessed without a connection to the server. When a
connection is re-established, any changes made to the local copy of the file are synchronized with the
original copy on the server.
To configure these settings, click on the Advanced Sharing button to display the following dialog:
In this dialog, set the Share this folder option to enable the sharing of the folder. Once this has been
selected the Share name field and associated button will activate enabling a share name to be entered. By
default the name of the folder being shared will be displayed, although this may be changed to another
name if desired. If the number of concurrent users accessing a shared folder is of concern, modify the
number of simultaneous users accordingly. Enter optional comments about the share before clicking on
Caching to configure the off-line file settings. This will invoke the Offline Settings dialog where a number of
options are available including allowing each user to specify which files they would like to be able to access
off-line, only having files that users actually access available off-line and disabling off-line sharing
altogether:
The final step in the folder sharing setup is to click on Permissions to configure the share permissions,
details of which are covered in a later section of this chapter.
Windows Explorer provides an excellent mechanism for configuring shares on the local system. This
approach falls a little short in terms of convenience, however, when it is necessary to configure shares on a
remote server. Fortunately Windows Server 2008 R2 addresses this need by allowing shares to be
configured from the Computer Management tool. One point to note is that while this section will focus on
the remote configuration of file shares, the steps outlined here may equally be used to share files on a local
server. In fact, the Create a Shared Folder Wizard can be invoked on a local machine either from Computer
Management or by entering shrpubw at the command prompt or in a Run dialog.
After starting Computer Management on the local system, right click on Computer Management in the left
panel tree and select Connect to another computer... In the resulting dialog box either enter the name of
the remote computer or click on Browse and then Advanced... to search the network or domain for the
remote system. Once a connection has been established to the remote server the Computer Management
interface will refresh and the Computer Management link in the tree will also display the name of the
selected remote server.
Once Computer Management is configured to administer a remote server, the next step is to begin the
folder sharing process. Begin by unfolding the System Tools, then Shared Folders branches of the tree in
the left panel. Select Shares to obtain a list of current shares configured on the remote system. The
following figure illustrates Computer Management with a list of shares configured on a remote system
named WINSERVER-2:
The creation of a new shared folder on the remote server (although as previously mentioned this can also
be used on local computers) involves the use of something called the Create a Shared Folder Wizard,
which, as the name suggests provides a user friendly way of configuring shared folders. To invoke this
wizard, simply right click on New Share..., then click on Next on the wizard's welcome screen. In the
resulting Folder Path screen, either type in the path of the folder to be shared, or browse the file systems to
locate it. With the required folder path selected click on Next to configure the name and description
settings. On this screen, specify the share name by which the folder will be accessed from remote
computers together with an optional description of the shared folder. Next, configure the off-line file settings
for the folder contents by clicking on Change.
Once these settings are configured, click on Next once again to configure the share permissions for the
selected folder. Either select one of the pre-configured options or select Customize permissions and click
on Custom to configure share permissions on a per user basis. Finally, click on finish to complete the
sharing process. If the configuration is successful a summary screen similar to the one illustration in the
following figure will be displayed:
First, you can use the new Server Manager tool and Browse to Roles | Active Directory Domain Services |
Active Directory Users and Computer. Figure A below shows you this tool in the context of Server Manager.
The second method is to start Active Directory Users and Computers directly, which is how the tool was
used in previous versions of Windows. To do so, click Start | All Programs | Administrative Tools | Active
Directory Users and Computers. When you do, you'll see the screen shown in Figure B. This article uses
this method to manage Active Directory Users and Computers.
Figure B
If you've ever worked with Microsoft Management Console (MMC) before, the layout should be familiar.
Across the top notice the set of pull-down menus. Beneath the menu bar is a button bar that provides quick
access to frequently used procedures. Finally, you'll see two panes. The left pane provides a tree view of
your Active Directory structure. The right pane shows the objects for containers highlighted in the left pane.
Menu choices
File: In the File menu lies the Options menu, which allows you to clean up console information. You
can also quit Active Directory Users and Computers by clicking Exit.
Action: This menu allows you to perform different actions depending on which container object
you've selected. For example, if you select the Users container, you might see the Delegate Control
menu option and options that allow you to create new users and groups, but if you select a particular
User object, you'll see actions about what you can do to a user, such as resetting passwords and
disabling accounts. When the domain object is selected, this menu contains options to raise the
domain functional level and to modify the servers that are considered operations masters, such as the
PDC emulator and the schema master.
View: This menu choice allows you to customize the appearance of Active Directory Users and
Computers. You can change how objects appear, how many columns Active Directory Users and
Computers displays, and filter out objects you don't want to appear.
Window: This menu choice allows you to display multiple MMC windows and control how those
windows appear on your server.
Help: As would be expected, this choice allows you to access Active Directory Users and
Computers Help files.
As in most MMCs, the button bar in Active Directory Users and Computers closely resembles a Web
browser. Like browser buttons, these buttons are relatively self-explanatory. Left to right, these buttons are:
You'll notice that as you go from container to container in the left pane, buttons sometimes will become
unavailable. For example, if you go to the Computers container, you can't use the Create New
Organizational Unit button.
Take special note of the Show/Hide action pane button. In most of their new products, Microsoft has moved
to a screen layout that includes what they call an action pane. The action pane provides quick access to all
of the functions available with regard to a particular object.
In Figure C below, note that the user object named Administrator is selected. In the Action pane on the
right, there are two More Actions options. One is below the Users heading and provides shortcut access to
the same options that would be available if you right-clicked Users container. Likewise, underneath the
Administrator heading, the More Actions button provides quick access to the options that would be
available if you were to right-click the Administrator user.
The Action Pane provides quick access to the functions available to an object.
Before you proceed through the rest of this article, make sure you are looking at the Advanced view, which
gives you a look at many more objects and containers. Of course, the more access you have, the easier it
is to make a mistake, so be careful, too. Figure C above was taken when the Advanced view was active. To
enable Advanced mode, choose View | Advanced Features.
The left pane is called the Console Tree. This tree displays all of the container objects for Active Directory.
Navigate through the Console Tree by clicking the plus signs to expand the various options/containers. As
you expand the tree, you'll start to get to Active Directory objects. The default objects you'll find in Windows
Server 2008's Console Tree are:
Saved Queries: Allows you to store queries that perform actions on groups of objects. Saved
queries give you a way to quickly access objects that you need to manage on a relatively regular basis.
Domain: In your own environment, the name of your Active Directory domain is listed here. This
object is the main container for your Active Directory environment and contains all of the other
container and organizational unit objects.
Built-in: Contains all of the default security groups that come with Windows Server 2008, which are
listed below. The descriptions of what each group allows/denies is right from Active Directory Users
and Computers:
COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
o Account Operators: Members can administer domain user and group accounts
o Administrators: Administrators have complete and unrestricted access to the
computer/domain
o Backup Operators: Backup Operators can override security restrictions for the sole
purpose of backing up or restoring files
o Certificate Service DCOM Access: Members of this group are allowed to connect to
Certification Authorities in the enterprise
o Cryptographic Operators: Members are authorized to perform cryptographic operations.
o Distributed COM Users: Members are allowed to launch, activate and use Distributed
COM objects on this machine.
o Event Log Readers: Members of this group can read event logs from local machine
o Guests: Guests have the same access as members of the Users group by default, except
for the Guest account which is further restricted
o IIS_IUSRS: Built-in group used by Internet Information Services.
o Incoming Forest Trust Builders: Members of this group can create incoming one-way trusts
to this forest
o Network Configuration Operators: Members in this group can have some administrative
privileges to manage configuration of networking features
o Performance Log Users: Members of this group may schedule logging of performance
counters, enable trace providers, and collect event traces both locally and via remote access to
this computer
o Performance Monitor Users: Members of this group can access performance counter data
locally and remotely
o Pre-Windows 2000 Compatible Access: A backward compatibility group which allows read
access on all users and groups in the domain
o Print Operators: Members can administer domain printers
o Remote Desktop Users: Members in this group are granted the right to logon remotely
o Replicator: Supports file replication in a domain
o Server Operators: Members can administer domain servers
o Terminal Server License Servers: Members of this group can update user accounts in
Active Directory with information about license issuance, for the purpose of tracking and reporting
TS Per User CAL usage
o Users: Users are prevented from making accidental or intentional system-wide changes
and can run most applications
o Windows Authorization Access Group: Members of this group have access to the
computed token Groups Global And Universal attribute on User objects
Computers: Contains all of the workstations and member server objects in your Active Directory.
Domain Controllers: Contains all of the domain controllers used in your Active Directory domain.
Foreign Security Principals: The container holds security identifiers associated with objects from
external, trusted domains.
Lost And Found: Here you'll find the objects that were supposed to replicate across the directory
but couldn't for some reason. Objects will appear here if they were created at the same time the
container that holds them was deleted. This will probably only happen where you have multiple network
administrators working in Active Directory.
Program Data: Contains object information pertaining to network applications, specifically data
stored directly into Active Directory.
System: Contains additional containers that store system information for Active Directory such as
Group Policies, DNS, IPSec, and DFS Configurations.
Users: This is the default container for Active Directory users.
NTDS Quotas: Stores quota objects, which restrict the number of objects a user can create in a
container.
Additional organizational units: Your Active Directory hierarchy can be structured to reflect your
organizational structure. You're not limited to placing every single user object into the Users container,
for example. You can create additional containers as necessary to meet your goals. Additional
containers can contain objects beyond users, such as groups, printers, shared folders, or even other
Organizational Units.
Within each container reside Active Directory objects, which represent every resource that has been added
to your Active Directory hierarchy. As you look through the various containers discussed above, you'll see
the objects appear in the right pane.
Microsoft has done a pretty good job of giving the objects meaningful names. You can usually quickly
guess what an object does by its name. For example, the DHCP Users object is a group object containing
members that have read-only access to DHCP. Even if you can't discern an object's purpose by its name,
Microsoft has included a Description column that tells you what each default object does. And, if worse
comes to worse, there's always Google!
Each object is made up of a group of properties, which describe the object and what it can do. View the
properties for an object by right-clicking the object and, from the resulting shortcut menu, selecting
Properties. In this article, you will learn about the properties for the following kinds of objects:
Computers
Groups
Users
Only the default tabs for each object will be discussed here. If you have added applications that extend
Active Directory's schema, such as Exchange, there may be additional tabs on some kinds of objects.
Computer Objects
The Computer object describes computers that have rights on the network. It can describe domain
controllers, member servers, or workstations. You'll find domain controllers in the Domain Controllers
container. Member servers and workstations will appear in the Computers container. When you right-click a
Computer object and select Properties, you'll see the screen shown in Figure D.
As with most Properties pages, you'll find tabs with further information. Tabs on the Computer Properties
page include:
General: This tab provides basic information about the object, including both its NetBIOS name, its
DNS name, type, Active Directory site and description.
Operating System: This tab will show you the operating system running on the computer and what
service packs, if any, have been applied to it.
Member Of: Here, you can view the computer's group memberships and make any necessary
adjustments. By default, all new computers are added to the group named Domain Computers.
Delegation: In older versions of Windows Server, this information was located on the General tab.
Select one of the 'trust' options if you want the computer to be able to request services from another
computer.
Password Replication: The Password Replication tab holds a list of the Read-Only Domain
Controllers that store cached versions of the directory.
Location: Enter details describing the computer's physical location.
Managed By: Provide information regarding the staff person responsible for the computer. You can
quickly assign someone by selecting their information directly from Active Directory.
Object: This tab displays information about the object including its name, when it was created,
when it was last updated, and the Update Sequence Numbers for it. Update Sequence Numbers are
critical components when it comes to handling Active Directory updates and keep things in check. On
this tab, you can also indicate that the object should be protected from accidental deletion.
Security: This tab controls the Active Directory rights other objects have to this object. The Group
or user names box lists the objects with rights and the Permissions box describes the permissions the
selected user or group has been granted or denied.
Dial-in: Decide whether or not users can remotely access the computer, whether by dial-up or
VPN. You can also set callback options for extra security.
Attribute Editor (new tab in Windows Server 2008): In Windows Server 2008, Microsoft has
borrowed from the ADSI Edit utility and added this tab, which allows you to directly manipulate all of the
attributes associated with the selected object.
Group Objects
There are a couple of kinds of group objects that can be created in Active Directory. The first kind, the
security distribution group, provide a way to manage access rights for multiple users (or other objects) all at
once. Rather than assign individual permissions to a file share, for example, you can give rights to the
security group and then add and remove group members as needed. Security groups can also be used as
email distribution groups. The second kind of group, called a distribution group, is used solely as an email
distribution list. This article focuses on security groups.
If you right click a Group object, you'll see the screen shown in Figure E.
General: This tab displays information about the object. You can view, but not change Group
Scope and Group Type for Groups. You can change all other fields on this page.
Member: Here you can add and remove group members. By clicking the Add button, you can add
individual objects or select multiple objects.
Member Of: This tab lists the groups that the object belongs to. You can add or delete group
membership here.
Managed By: Here you can enter information about who's in charge of the computer. You can
quickly assign someone by selecting their information directly from Active Directory.
Object: This tab displays information about the object including its name, when it was created,
when it was last updated, and the Update Sequence Numbers for it. On this tab, you can also indicate
that the object should be protected from accidental deletion.
Security: This tab controls the Active Directory rights other objects have to this object. The Group
or users box lists the objects with rights and the Permissions box describes the permissions the
selected object has.
Attribute Editor (new tab in Windows Server 2008): In Windows Server 2008, Microsoft has
borrowed from the ADSI Edit utility and added this tab, which allows you to directly manipulate all of the
attributes associated with the selected object.
User Objects
User objects are, well, users! Users, after all, are the foundation of your organization.
When you right-click a User object and select Properties, you'll see the screen shown in Figure F.
General: Displays general descriptive information about the user, including name, email address
and primary telephone number.
Address: This tab displays postal addresses for the selected user.
Account: The Account tab holds detailed account information for the user, including the logon
name for the user and, via the Logon Hours button on this tab, account restrictions. The Account
options section gives you a way to force users to change their password at next logon, prevent them
from changing passwords, require a Smart Card for logon, and enable delegation for the account.
You'll also use this page if the account gets locked out due to logon failures. Microsoft has made is
easy to unlock accounts by adding an "Unlock account" option to this tab.
Profile: The Profile tab holds fields that specify the paths to any logon scripts the user needs to
access. You can also specify a path to the user's profile and home folder here.
Telephones: This tab serves as a repository for any telephone numbers you have for the user,
including pagers, cell phones, and IP telephone numbers.
Organization: Don't confuse this tab with Active Directory's Organizational Unit object. Here, you'll
place information about the user's company, including job title, department, and company name. You
can also link the user to his or her manager's Active Directory object.
Terminal Services Profile: This tab is similar to the Profile tab, but this only controls profile
information for the Terminal Services session, including home folder location.
COM+: You can assign the user to be part of a COM+ partition set here. COM+ partition sets allow
users in a domain to access COM+ applications throughout the domain.
Attribute Editor (new tab in Windows Server 2008): In Windows Server 2008, Microsoft has
borrowed from the ADSI Edit utility and added this tab, which allows you to directly manipulate all of the
attributes associated with the selected object.
Security: This tab controls the Active Directory rights other objects have to this object. The Group
or users box lists the objects with rights and the Permissions box describes the permissions of the
selected object.
Environment: This tab controls the Terminal Services startup environment for the user.
Sessions: The information on the Sessions tab helps you control how the user interacts with
Terminal Services, including how long a session stays connected and what happens if she disconnect
from the server.
Remote Control: This tab indicates whether a user's Terminal Server session can be remotely
controlled. You can set options that allow you to establish view-only sessions or that allow interaction.
Published Certificates: This tab allows you to associate X.509 security certificates with the user.
Member Of: This tab lists the groups to which the user belongs. You can add or delete group
membership here.
Password Replication (new tab in Windows Server 2008): The Password Replication tab holds a
list of the Read-Only Domain Controllers that store cached versions of the user directory.
Dial-in: On the Dial-in tab, you'll decide whether or not users can remotely access the network,
whether by dial-up or VPN. You can also set callback options for extra security.
Object: This tab displays information about the object including its name, when it was created,
when it was last updated, and the Update Sequence Numbers for it. On this tab, you can also indicate
that the object should be protected from accidental deletion.
Now that you know your way around Active Directory Users and Computers, it's time to find out how to
accomplish common administration tasks.
Right-click the container where you want the new user object to reside. Click New | User. Follow the
prompts in the New Object - User screen to add information about the user such as logon name and user
name. Click Next to see additional screens and enter appropriate information.
Right-click the container where you want the new group object to reside. Click New | Group. Follow the
prompts in the New Object - Group screen to add information about the group such as group name and
group type. For most groups you create, you'll create a Global Security group. Click OK to create the group.
Right-click the domain or container where you want the new container object to reside. Click New |
Organizational Unit. In the New Object - Organizational Unit screen, enter a unique name for your
container. Click OK to create the container.
Right-click the user object. Select Add To A Group. When the Select Group window appears, type the
name of the group in the Enter the Object Name to Select box and click Check Names. If you don't know
the name, click advanced. Click Find Now to display all groups. Select the group you want the user to
belong to and click OK. Click OK again to close the Select Group window and finish.
Change a password
Right-click the user object. Select Reset Password. When the Reset Password screen appears, type the
new password in the appropriate fields. To force a user to change a password immediately, select Users
Must Change Password. Click OK.
Unlock an account
Right-click the user object. Select Properties. Click the Account tab. Remove the check from the Account Is
locked Out box.
Disable an account
Right-click the user object. Select Disable Account. Re-enable by right-clicking the user object and
selecting Enable Account.
Move a user
Right-click the user object. Select Properties. Click the Account tab. Click Logon Hours. When the Logon
Hours screen appears, select Logon Denied and click the time blocks when you don't want the user to log
on.
Delete a group
Delegate authority
Right-click the container object where you want to delegate tasks. Select Delegate Control. The Delegation
of Control Wizard appears. Follow the prompts on screen to add users or groups that you want to give
control to and what powers you want to grant to those users or groups.
Right-click the user object. Select Properties. Click the Dial-in tab. Select Allow Access (or, if you have
implemented Windows Server 2008's Network Access Protection, click Control access through NPS
Network Policy. Click OK to close.
Right-click the object. Select Properties. Click the Attribute Editor tab. Select the attribute that you want to
modify. Click the Edit button. Make your change and click OK
You also can redirect folders that are included in the user’s profile to a File Server. These features enable
you to configure the users’ desktop settings more easily and, where desirable, to create a standardized
desktop environment that meets your organization’s needs.
You can use the Folder Redirection to manage data effectively and, if you choose, to back up data.
By redirecting folders, you can ensure user access to data regardless of the computers from which a user
logs in.
So in this post, let’s go through a simple step on how to configure Folder Redirection…
1 – 1st, make sure that you have share folder for this step, for this demo, I had my shared folder created
previously (MCT Docs – OSI Branch 01)…
2 – Next, we need to create a new GPO and link it to the IT OU (you can use any OU you prefer)…
– On the Group Policy Management console, right click IT OU and then click Create a GPO in this domain
and Link it here…
3 – In the Name box, type MCT Folder Redirection, and then click OK…
4 – Next, expand IT OU, right-click MCT Folder Redirection, and then click Edit…
5 – In the Group Policy Management Editor, under User Configuration, expand Policies, expand
Windows Settings, and then expand Folder Redirection…
6 – In the Document Properties dialog box, on the Target tab, next to Setting, click the drop-down
arrow, and then select Basic – Redirect everyone’s folder to the same location…
– Ensure the Target folder location box is set to create a folder for each user under the root path…
– In the Root Path box, type \\dc01\MCT Docs – OSI Branch 01, and then click OK…
8 – Next, let’s try test the folder redirection settings, switch to your client PC and log in as any of your
domain user, right-click the desktop, and then click Personalize…
10 – In Desktop Icon Settings, select the User’s Files check box, and then click OK…
12 – In the Document Properties dialog box, verify that the location of the folder is now the network
share in a subfolder named for the user…
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Click OK
A dialog box will ask you to restart your computer. Click OK
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Click Close
Click Restart Now
Click that message and click "Turn on network discovery and file sharing":
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Click Close
d. In the Local Area Connection Status dialog box, click Properties
e. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
f. Click Properties
g. Click Use the Following IP Address
h. Provide the Preferred DNS server address (we use 127.0.0.1 for our example) and the Alternate DNS Server address
(we leave ours empty)
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
i. Click Advanced to check the values that were put in the IP Settings and DNS property pages
j. Click OK
k. Click OK
l. Click Close
m. Click Close
a.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
b. Click Next
c. In the third page of the wizard, titled DNS Server, read the text and click Next
d. Click Install
i. A small window will come up:
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
In the first page of the wizard, read the text and click Next
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
b. In the second page of the wizard, read the text and click Next
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
c. In the third page of the wizard, click Create a New Domain In a New Forest
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
d. Click Next
e. The next page asks you to create a fully-qualified domain name (FQDN). Enter a
Just have to decide and keep the scheme in mind.
For our example, we are using functionx.local
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
f. After specifying the FQDN, click Next. A window will start some operations:
g. When a dialog box comes up, read its text and click Next
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
h. On the next page, read the text and click Next. A window will come and start performing some operations:
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
i. Click Next
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
j. Click Next. If you didn't create (assign) an IP address on (to) the server, a dialog box will come up, about IP address
assignment:
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
In you didn't assign an IP address to the server, it means you plan to use a DHCP server that will automatically assign IP
addresses to the computers of the network. In this case, click Yes, ...
k. A dialog box comes up
n. The next page asks you to specify the administrator's password. Click the Password text box and type the password
o. Click the Confirm Password text box and type the same password
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
This may take a while
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
r. Click Finish
s. A new dialog box will ask you to reboot:
Click Start
a. Right-click Network and click Properties
(For our example, we are building a small network and we will just use a small range of IP addresses. In the real world or
for a large network, you would need to actually know TCP/IP, design a range of IP addresses you plan to use, then
assign those IP addresses, or design a way to assign the IP addresses to the computers)
d. Click Close
e. In the Local Area Connection Status dialog box, click Properties
f. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
g. Click Properties
h. Click Use the Following IP Address
i. Type the IP address you want the server to use (for our example, and based on the above dialog box, we type
192.168.001.102) and press Tab
Type the subnet mask (normally, it should be added automatically when you press Tab from the previous IP address text
box)
k. Type the default gateway address (use the first and the second octets of the IP address you had provided (such as
192.168) and use 001.001 for the other two bytes)
. Provide the Preferred DNS server address (we use 127.0.0.1 for our example) and the Alternate DNS Server address
(we leave ours empty)
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
m. Click OK
n. Click Close
o. Click Close
a. Click Next
b. In the next page of the wizard, type the password as Password1
c. Press Tab and type the same password. Here is an example:
d. Click Next
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
e. Click Finish
a.
Click OK
c. Click OK
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
en click OK. After creating an account for a computer, you can add it to the domain. Actually, primarily creating an account
for a computer is not required.
Joining a Domain
Preparing a Workstation
a. Click Start -> Control Panel
b. Click View Network Status and Tasks (or click Network and Internet, then Network and Sharing Center)
c. Click Local Area Connection
d. Click Properties
e. In the Networking tab of the Local Area Connection Properties, in the checked list box, click Internet Protocol Version 4 (TCP/IPv4)
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
f. Click Properties
g. Click Use the Following IP Address
Type the IP address you want the server to use. For example, add 2 (bits) to the last byte of the IP address you gave to the server and pres
i. Type the subnet mask (it should be added automatically when you press Tab from the previous text box)
Type the default gateway address (use the first and the second bytes of the IP address you had provided (such as 192.168) and use 001.00
the other two bytes)
k. For the Preferred DNS Server, type the same IP address as the server
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
l. Click OK
m. Click Close
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
n. Click Close
Joining the Domain
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
. In the Computer Name text box, enter the desired name of the computer. If you had already created an account in the domain for this comp
type that name
d. In the Member Of section, click the Domain radio button
e. Click the Domain text box and enter the name of the domain
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
f. After specifying the name of the computer and the domain to join, click OK
g. You would then be asked to provide a user name and a password for a user who has the permissions to let a computer join a domain.
Type the name of the domain, followed by \ and followed by the user name of an account that can allow a computer to join a domain and p
Tab
h. Type the account's password
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
SECTOR ELECTRONICS SECTOR
UNIT OF COMPETENCY MAINTAIN AND REPAIR COMPUTER SYSTEMS AND NETWORKS
MODULE TITLE MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS
MODULE DESCRIPTOR
This unit covers the knowledge, skills and attitudes needed to maintain and service computer systems and networks.
NOMINAL DURATION 30 HOURS
QUALIFICATION LEVEL NC II
SUMMARY OF LEARNING OUTCOMES:
Upon completion of this module, the trainee/student must be able to:
ASSESSMENT CRITERIA
1. Maintenance and/or Diagnosis of faults is planned and prepared in line with job requirements
2. Tools, equipment and testing devices needed for the maintenance are obtained and checked for correct
operation and safety
3. Materials necessary to complete the work are obtained in accordance with established procedures and
checked against job requirements.
4. OHS policies and procedures are followed in line with job requirements.
5. Computer systems and networks for maintenance are checked against job/service order or instructions and
specifications.
CONTENTS
CONDITIONS
1. Pliers
2. Screw drivers
3. Special tools
4. Soldering iron/gun
5. Wrenches
6. Utility knife/stripper
7. Hot air soldering station
8. LAN tester
9. Crimping tools
10. Maintenance bench
11. Power supply equipment
12. Multi meter
13. Calibrators
14. Signal generator
15. Oscilloscope
16. Appropriate software
17. Disk
18. Connectors
19. Adaptors
20. Wires and cables
21. Appropriate software
22. Computer storage media
23. Desktop computer
24. Googles/glasses
25. Mask
26. Gloves
27. Anti-static wrist wrap
28. Cables and connectors
Back – up
Every admin should make backups. That’s just a fact. But what backup software should we use? Many
administrators look for a third-party backup solution, however Windows Server ships with a solid and built-
in solution – Windows Server Backup (the entirely new face of NT Backup).
To install backup functionality in Windows Server 2008 R2, go to Server Manager – Features, and select
Windows Server Backup Features with additional components – Windows Server Backup (core files for
backup functionality) and Command-Line tools (for PowerShell support scripts).
Select features screen – select all the Windows Server Backup features available.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Inside the Windows Server Backup Management console, we can create a backup schedule, perform one-
time backup, recover data that was previously configured for a backup, or configure performance settings.
Note If you only wish to backup SQL Server please take a look at the SQL Server Backup Script
During the backup schedule plan creation, we can select what to backup (single files from our server,
system state, folders, volumes or the entire server), as well as when and how often backups should occur,
and finally where to store the backups. Before Windows Server 2008 R2, we could only keep our backups
on a dedicated volume, which was a serious maintenance cost for system administrators who had become
accustomed to the NTBackup tool from Windows Server 2003, which allowed backups to any storage
(including local folders).
During the setup of a Backup Schedule job, we will have to decide what to backup. We can obviously select
individual volumes, folders or files, but since Windows Server 2008 R2 we also have additional backup
options:
Continues…
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Bare Metal Recovery – backup an entire operating system. This is not the same as full backup,
which also backs-up your data.
System State – generally this option will backup all system-related settings, like registry, COM+
class registration database, Boot files (including system files), certificates, Active Directory Services,
SYSVOL folder, IIS Meta-Directory, etc.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
It is advisable to exclude certain files from the backups that are not necessary to restore. For example,
when you manually create Full Server backup and store it locally on one of your volumes, you should
perform that backup every day, because it will surely take lot of disk space and impact server performance.
Instead consider a less regular Full Server backup and more regular backups of the data which changes
more frequently.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
We can choose to backup once a day (and select an exact time when), or choose to perform backups more
than once, then we can choose more than one hour for a backup.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
So far so good, but what about Recovery? To configure recovery go back to Windows Server Backup
Console and select the Recovery option from the right pane.
We can use this option to recover specific files, entire volumes or the system state components from a
backup we setup earlier. We will need to specify where our backup file is located, it can be either on a
Local Server, or remote location (which is the normal and recommended location for any backup).
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines