CSS Q2 Module 1 UC3 LO2B Copy Final
CSS Q2 Module 1 UC3 LO2B Copy Final
Computer Systems
Servicing
Quarter 2 Module 1:
Configure Network Services
TLE/TVL – Grade 11-12
Alternative Delivery Mode
Quarter 2 – Module 1: Configure Network Services
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.
Management Team
Chairperson Josephine L. Fadul, ED. D, CESO V
Schools Division Superintendent
Co-Chairperson Melanie P. Estacio ED.D
Asst. Schools Division Superintendent
Members
Alpha D. Palconit, ED.D, EPS-TLE-TVE
Lorna C. Ragos, EPS-LRMDS
Jecson L. Oafallas, PDO II
Jeffrey E. Santiago, Librarian II
COMPUTER SYSTEMS
SERVICING
Quarter 2: SETUP COMPUTER SERVERS
Module 1:
Configure Network Services
Introductory Message
For the facilitator:
Welcome to the COMPUTER SYSTEMS SERVICING Alternative Delivery Mode
(ADM) Module on (Configure Network Services)!
This module was collaboratively designed, developed and reviewed by
educators both from public and private institutions to assist you, the teacher or
facilitator in helping the learners meet the standards set by the K to 12 Curriculum
while overcoming their personal, social, and economic constraints in schooling.
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this also aims
to help learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of
the module:
As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.
Let Us Learn!
Welcome!
- Talk to your trainer and agree on how you will both organize the
training of this unit. Read through the learning guide carefully.
It is divided into sections which cover all the skills and knowledge
you need to successfully complete this module.
- Use the self-check questions at the end of each section to test
your own progress.
- When you have completed this module (or several modules) and
feel confident that you have had sufficient practice, your trainer
will arrange an appointment with you to asses you. The result of
your assessment will be recorded in your Competency
Achievement Record.
1
Let Us Learn!
2
LESSON
CONFIGURE NETWORK
1 SERVICES
Let us try
3
7. This hidden share is used during remote administration of a
computer.
A. ADMIN$
B. PRINT$
C. NETLOGON
D. SYSVOL
8. This share is used when you remotely administer a network printer.
A. ADMIN$
B. PRINT$
C. NETLOGON
D. SYSVOL
9. Recipients can both view and change the file contents and save
(overwrite) the file at its current location.
A. Read
B. Change
C. Full Control
D. Edit
10. Installs the Print Management console for Microsoft Management
Console (MMC), which enables administrators to deploy, monitor, and
manage printers throughout the enterprise.
A. Print Server
B. Distributed Scan
C. Internet Printing
D. LPD Service
11. Enables you to monitor network scanners and scan servers, process
scanned documents, and then route the scanned documents to
network folders, Windows SharePoint Web sites, and to e-mail
recipients.
A. Server Manager
B. Print Management
C. Scan Management
12. Enables UNIX clients running the line printer remote (LPR) program to
send their print jobs to Windows printers.
A. Print Server
B. Distributed Scan
C. Internet Printing
D. LPD Service
II. Identification. Write your answers on the space provided.
___________ 1. You can specify whether the computer can be used to
dial in and remotely connect to remote access servers in
your domain.
___________ 2. This tab shows the operating system running on the
computer and the service packs that have been installed.
___________ 3. On this tab, you can specify whether the computer
should be trusted for delegation.
4
III. True or False. Write T if the statement is True and F if False. Write
your answer on the space provided.
_____ 1. In a Domain configuration, computers are connected but there is no
central control.
_____ 2. When you create a domain, the Computers container is created by
default and this container is an organizational unit.
_____ 3. You can delegate the permission to create computer objects to the
appropriate administrators or support personnel.
_____ 4. A number of manufacturers (such as Intel and Hewlett-Packard)
make both internal and external print server devices that can be
installed in (or on) a printer.
_____ 5. A direct-connect printer is a printer attached to a computer other
than your server.
_____ 6. After the printer is installed, you can view it in the Printers window.
Select Start and then Control Panel.
5
Let Us Study
INTRODUCTION
6
is required to provide these details for IPv4 clients, enter them into the Specify
IPv4 DNS Server Settings page and click Next.
On the IPv4 WIN Server Settings page, enter addresses of the Preferred
and Alternate WINS servers if required. Otherwise, leave the WINS is
not required for applications on this network option selected and proceed to
the next configuration page.
The next page allows initial DHCP scopes to be configured. A DHCP
scope defines one or more ranges of IP addresses from which an IP address
may assigned to a client and the duration of the IP address lease (6 days for
wired clients and 8 hours for wireless clients). This may either be configured
now, or at a later point in the configuration process.
With the initial DHCP IPv4 configuration steps completed, the wizard
subsequently moves on to the IPv6 settings. This is where a little background
information is useful. Windows Server supports two modes of IPv6 DHCP
operation, known as stateless and stateful. In stateful mode, clients obtain
both an IP address and other information (such as DNS addresses) through
the DHCPv6 server. In stateless mode, the clients receive only the non-IP
address information from the DHCPv6 server. In this case, the IP address
must be provided using some other mechanism, either by configuring of static
IP addresses or through the implementation of IPv6 auto-configuration.
On the Configure DHCPv6 Stateless Mode screen, select either stateful
or stateless mode in accordance with your specific enterprise requirements.
If stateless mode is selected the next screen will prompt for the IPv6 DNS
information to be provided to clients. Enter the information and click on Next.
If the DHCP is part of an Active Directory domain, the Authorize DHCP
Server page will appear. Enter the credentials (either your own as shown, or
alternate credentials via the Alternate Credentials button) necessary to
authorize the new DHCP server. Alternatively, the authorization may be
performed later by skipping this step by clicking on Next.
7
If a DHCP server is to operate within an Active Directory domain (and
is not running on a domain controller) it must first be authorized. This can
be achieved either as part of the DHCP Server role installation, or
subsequently using either DHCP console or at the command prompt using
the netsh tool.
If the DHCP server was not authorized during installation, invoke the
DHCP console (Start -> All Programs -> Administrative Tools -> DHCP), right
click on the DHCP to be authorized and select Authorize. To achieve the same
result from the command prompt, enter the following command:
netsh dhcp server serverID initiate auth
In the above command syntax, serverID is replaced by the IP address or
full UNC name of system on which the DHCP server is installed.
8
Let Us Practice
Self-check 1
9
Let Us Practice More
ACTIVITY SHEET
Title: Installing DHCP Server Role
10
Performance Criteria Checklist
CRITERIA
Did you…. YES NO
1. Open the Server Manager.
2. Select Add Roles. At the opening screen of the Add
Roles Wizard, click Next.
3. On the next screen, select the DHCP Server role
(select the appropriate check box). Then click Next.
4. On the Introduction to DHCP Server window, click
Next.
5. On the Network Connection Bindings window, click
Next.
6. On the IPv4 DNS Settings window, click Next.
7. On the IPv4 WINS Settings window, click Next.
8. On the DHCP Scope window, for the meantime click
Next.
9. On the DHCPv6 Stateless Mode window, select
Disable DHCPv6 stateless mode, then click Next.
10. On the DHCP Server Authorization window, click
Next.
11. On the Confirmation window, click Install.
12. On the Results window, click Close.
11
Let Us Study
INTRODUCTION
12
Each subnet can have a single DHCP scope that has a single
continuous range of IP addresses. Specific addresses or groups of addresses
can be excluded from the range that the DHCP scope specifies. Normally, only
one scope can be assigned to a subnet. If more than one scope is required on
a subnet, the scopes must first be created then combined into a super scope.
For example, if there are two subnets, then users can create two
separate scopes for the separate subnets on one DHCP server. Users create a
separate scope because the subnets have different IP addressing schemes.
13
defined scope which are not available for assignment to clients. Multiple
exclusion ranges may be defined within a single scope by using
the Add button to add new ranges
The next screen of the New DHCP Scope wizard relates to the topic
of Lease Duration for the IP addresses in the current scope. Lease duration
refers to the amount of time an IP address is assigned to a particular client
computer or device. If the subnet on which the DHCP server operates has a
high turnover of clients then a short lease is recommended (since the server
will end up holding IP addresses for clients which are no longer connected,
potentially exhausting the pool of IP addresses). For subnets where the
connected clients are fairly stable, longer leases might be more appropriate.
To define a lease duration use the spin boxes provided, specifying the duration
in units of days, hours and even minutes (the default is 8 days).
The next screen provides the option to configure DHCP options (such
as default gateway, DNS and WINS servers) which will be provided to clients
along with the dynamic IP address. If the yes option is selected, the wizard
will present a series of screens where these options may be specified if
required. On each screen enter the appropriate information, or leave the page
blank if the option is required (for example not all configurations require a
WINS server). If "no" is selected the wizard will skip to the Activate
Scope screen where, as the name suggests, the new scope may be activated.
Once activated the wizard may be closed. The new scope is now defined and
active.
14
Let Us Practice
Self-check 2
Multiple Choice.
1. The period of time that the DHCP server holds an IP address for a
client.
A. Subnet Mask
B. Lease Duration
C. Scope Name
D. Network ID
2. Used to assign IP address ranges for Class D networks.
A. Normal scope
B. Broadcast scope
C. Superscope
D. Multicast scope
3. An alphanumeric identifier for administrative purposes.
A. Network ID
B. Router
C. Scope Name
D. Exclusion range
4. A collection of scopes grouped together such that they can be enabled
and disabled as a single entity.
A. Normal scope
B. Multicast scope
C. Superscope
D. Broadcast scope
5. A DHCP option that allows DHCP clients to access remote networks.
A. Leased duration
B. Router
C. Scope Name
D. Network IP
6. Allows A, B and C Class IP address ranges to be specified including
subnet masks, exclusions and reservations.
A. Normal scope
B. Multicast scope
C. Superscope
D. Broadcast scope
15
Let Us Practice More
ACTIVITY SHEET
Title: Configuring IPv4 Scopes
Performance Objective: Demonstrate the ability to configure IPv4
Scopes using the DHCP console.
Supplies/Materials: VirtualBox with a VM installed Windows
Server 2008 R2
Equipment/Tool: Computer with VirtualBox
Steps/Procedure:
1. Open the DHCP Console. Select Start, All Programs, Administrative
Tools, DHCP.
2. Select the server name. Example: Click tnts_server1. IPv4 and IPv6
categories are listed in the main panel.
3. Select IPv4.
4. Create a new scope. Right-click IPv4, then select New Scope, click Next.
5. Provide for a Name and Description. Example:
Name-SCOPE1
Description-leave it blank.
6. Provide IP Address Range. Example:
Start IP address - 192.168.0.1
End IP address - 192.168.0.100
7. For the Add Exclusions and Delay window, click Next.
8. For the Lease Duration window, click Next.
9. For the Configure the DHCP Options window, select No and click Next.
10. To complete, click Finish.
Assessment Method: Portfolio assessment using the Performance Criteria
Checklist
16
PERFORMANCE CRITERIA CHECKLIST
CRITERIA
Did you…. YES NO
1. Open the DHCP Console
2. Select the server name.
3. Select IPv4
4. Create a new scope
5. Provide for a Name and Description
6. Provide IP Address Range
7. For the Add Exclusions and Delay window, click
Next.
8. For the Lease Duration window, click Next.
9. For the Configure the DHCP Options window,
select No and click Next.
10. To complete, click Finish.
17
Let Us Study
INTRODUCTION
Three things are required for you to join a computer to an Active Directory
domain:
A computer object must be created in the directory service.
You must have appropriate permissions to the computer object. The
permissions allow you to join a computer with the same name as the
object to the domain.
You must be a member of the local Administrators group on the
computer to change its domain or workgroup membership.
18
COMPUTERS CONTAINER
You should consider creating at least two OUs for computer objects:
one to host clients computer accounts and another for servers. These two OUs
are in addition to the Domain Controllers OU created by default during the
installation of Active Directory. In each of these OUs, computer objects can
be created. There is no technical difference between a computer object in a
clients OU and a computer object in a servers or domain controllers OU;
computer objects are computer objects. But separate OUs are typically
created to provide unique scopes of management so that you can delegate
management of client objects to one team and server objects to another.
Two OUs created for all computers accounts. You might consider
further dividing your client and server OUs. Creating sub-OUs beneath a
server or client OU to collect and manage specific types of computers, for
example, an OU for file and print servers and an OU for database servers. By
doing so, the team of administrators for each type of server can be delegated
permissions to manage computer objects in the appropriate OU.
19
workgroup. Select the Domain box to join the client to a domain. In the
Domain box type in the name for the domain. Click on OK to accept. The
Domain Username and Password box will appear. Type in the username and
password of a domain user who has the right to join clients to the domain,
e.g. the Domain Administrator account. Click on OK to continue. Click on OK
to reboot the computer.
The new client appears on the Domain Controller inside the Computers
container.
PRESTAGING COMPUTERS
20
Let Us Practice
Self-check 3
_____ 1. Before you can log on to a computer with a domain account, that
computer must belong to the domain.
_____ 2. credentials enable the computer to authenticate against the domain
and to create a secure relationship that then enables users to log on
to the system with domain accounts.
_____ 3. In a Domain configuration, computers are connected but there is no
central control.
_____ 4. When you create a domain, the Computers container is created by
default and this container is an organizational unit.
_____ 5. You can delegate the permission to create computer objects to the
appropriate administrators or support personnel.
_____ 6. To join a domain, the client must have the correct TCP/IP settings
and point to the correct DNS server that hosts the domain.
_____ 7. The computer account created automatically by Windows is not
placed in the default computer container, which is not where the
computer object belongs in most enterprises.
21
Let Us Practice More
ACTIVITY SHEET
Title: Creating a Virtual Computer to be joined to
the Domain
Performance Objective: Demonstrate the ability to create a virtual
machine to be used in joining into the Domain
using Windows 10 as its operating system.
Supplies/Materials:
Equipment/Tool: Computer with VitualBox and Windows 10
image file (.iso)
Steps/Procedure:
1. Create a new Virtual Machine.
Name : PC-1
Type : Microsoft Windows
Version: Windows 10 (64 bit)
CRITERIA
Did you…. YES NO
1. Create a new Virtual Machine.
2. Assign the appropriate image (ISO) file for the VM.
3. Install Windows 10 on the new virtual machine
created.
22
Let Us Study
INTRODUCTION
After you have created the account, the Active Directory Users and
Computers snap-in provides you with the capability to manage the computer.
For example, you can disable the computer account if you think there is a
security issue or some other issue related to the computer. Right-click the
computer name in the Details pane and select Disable Account. The computer
can no longer log on to the domain.
You can also move the account from one domain to another; right-click
the computer account and then select Move. The Move dialog box opens. You
24
can use it to expand the node for a particular domain that appears in the
domain tree. When you're finished, click OK to relocate the computer account
to that domain.
You can also manage the client computer by opening its Computer
Management snap-in from the Active Directory Users and Computers snap-
in (this is true for Windows Vista, Windows XP, and Windows 2000 clients
and Windows 2003 and Windows 2008 member servers). You can then add
or remove local user accounts and even manage volumes and disks on the
client computer.
You can also view the properties for the computer associated with the
Active Directory computer account (both clients and member servers). You
can view the operating system that the computer is running (including service
packs installed) and set other features related to the computer, such as
whether the computer should be trusted for delegation.
To open the Properties dialog box for a computer listed in the Active Directory,
right-click the account and select Properties. The Properties dialog box for the
computer opens. This dialog box contains seven tabs:
General— This tab provides the computer name, the DNS name, and
the role of the computer.
Operating System— This tab shows the operating system running
on the computer and the service packs that have been installed.
Location— This enables you to specify the building or the floor where
the computer is located.
Delegation— On this tab, you can specify whether the computer
should be trusted for delegation.
Managed By— This tab is used to specify which user or group has
the management rights to the computer.
Dial-In— You can specify whether the computer can be used to dial
in and remotely connect to remote access servers in your domain.
Member Of— This tab shows the group to which the computer
belongs. The default is Domain Computers. This tab also shows the
domain container where the computer resides.
When you have finished viewing (or changing) the properties for a
computer account, click OK to close the dialog box. You are returned to the
Active Directory Computer and Users snap-in.
You can also access additional tabs related to a computer account's
Properties dialog box by selecting the Advanced Features command under the
View menu. After you enable Advanced Features (a check mark appears next
to the command on the View menu), you also have access to the Object tab,
which provides the canonical name of the object, and the Security tab. The
Security tab enables you to set the different permission levels for users and
groups in relation to the management of the computer account.
25
Let Us Practice
Self-check 4
Identification.
Based on the given below, select the Property that fits the statement.
___________ 1. This tab shows the group to which the computer
belongs.
___________ 2. This tab provides the computer name, the DNS name,
and the role of the computer.
___________ 3. You can specify whether the computer can be used to
dial in and remotely connect to remote access servers in
your domain.
___________ 4. This tab shows the operating system running on the
computer and the service packs that have been installed.
___________ 5. On this tab, you can specify whether the computer
should be trusted for delegation.
___________ 6. This enables you to specify the building or the floor
where the computer is located.
26
Let Us Practice More
ACTIVITY SHEET
Title: Connect the two Virtual Machines
Performance Objective: Demonstrate the ability to setup VirtualBox
Settings to connect the two virtual machines
(SRV-1 and PC-1)
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedure:
1. Open Oracle VirtualBox.
2. Open Settings of SRV-1.
Right-click SRV-1.
Select Settings.
3. Change Network Adapter settings SRV-1.
Select Network.
On the Adapter 1 tab, change Attached to setting from NAT to
Internal Network.
Click Advanced. Change Promiscuous Mode from Deny to Allow
All.
Click Ok to complete.
4. Open Settings of PC-1.
Right-click PC-1.
Select Settings.
5. Change Network Adapter settings of PC-1.
Select Network.
On the Adapter 1 tab, change Attached to setting from NAT to
Internal Network.
Click Advanced. Change Promiscuous Mode from Deny to Allow
All.
Click Ok to complete.
Assessment Method: Portfolio assessment using the Performance Criteria Checklist
CRITERIA
Did you…. YES NO
1. Open Oracle VirtualBox.
2. Open Settings of SRV-1.
3. Change Network Adapter settings SRV-1.
4. Open Settings of PC-1.
5. Change Network Adapter settings of PC-1.
27
Let Us Practice More
ACTIVITY SHEET
Title: Joining Client Computer to a Domain
Performance Objective: Demonstrate the ability to join Client
computers to a Domain)
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedure:
1. Open Oracle VirtualBox.
2. Start SRV-1.
3. Start PC-1.
4. On PC-1, change it Network settings.
Right-click the Network icon on the lower right corner of your
screen.
Select Open Network and Sharing Center.
Click Adapter Settings
Right-click Local Area Connection.
Select Properties.
Uncheck IPv6
Click IPv4 and select Properties
Tick Use the following IP address
IP Address : 192.168.0.11
Subnet Mask : 255.255.255.0
Default Gateway: 192.168.0 10
Preferred DNS : 192.168.0.10
Click OK
Click Close to complete
Close Network Connections window
5. Change Remote Settings.
Open the Windows Explorer.
Right-click the Computer.
Select Properties, Remote settings
Click Allow connections
Click Ok, Apply then Ok
6. Change Firewall Settings.
Select Start, Control Panel.
Select System and Security, Windows Firewall
select Turn Windows Firewall on or off
Tick Turn off on the two settings
Click Ok to complete.
28
7. Join the client computer to a domain.
Open the Windows Explorer.
Right-click the Computer.
Select Properties, Change settings, Change
Tick Domain
Type the Domain name. Example: TNTS.COM, then click Ok
Provide the appropriate Username and Password.
Example:
Username: Administrator
Password: tnts_server1
Click Ok. It will prompt for a restart. Then click Ok
Click Close to complete.
Assessment Method: Portfolio assessment using the Performance Criteria
Checklist
CRITERIA
Did you…. YES NO
2. Open Oracle VirtualBox.
2. Start SRV-1.
3. Start PC-1
4. On PC-1, change it Network settings.
5. Change Remote Settings.
6. Change Firewall Settings.
7. Join the client computer to a domain.
29
Let Us Study
INTRODUCTION
Windows Server systems, out of the box, can be used to share folder
data right after installation. To get the most out of the system, the File
Services role should be added. Adding the File Services role not only
configures settings to optimize the system for file sharing, but also enables
the administrator to choose which file server options as well as which tools
for managing the file system will be installed.
A file server provides a repository for files that the users on your
network must access. Not only do file servers provide data access to users,
but they also often serve as a place where users can save files in either a home
directory or a directory that other users can also access. You can configure a
domain controller or a domain member server as a file server.
These are some of the important terms that you have to know for the
File Server role:
File Server – Although not required to share files, adding this core role
service allows you to use the Share And Storage Management snap-in.
Distributed File System – Enables sharing files using the DFS
namespace and replicating files between DFS servers. If you select this
role service, the wizard will prompt you to configure a namespace.
File Server Resources Manager – Installs tools for generating storage
reports, configuring quotas, and defining file screening policies. If you
select this role service, the wizard will prompt you to enable storage
monitoring on the local disks.
Services for Network File System – Provides connectivity for UNIX
client computers that use Network File System (NFS) for file sharing.
Note that most modern UNIX operating systems can connect to
standard Windows file shares, so this service is typically not required.
Windows Search Service – Indexes files for faster searching when
clients connect to shared folders. This role service is not intended for
enterprise use. If you select this role service, the wizard will prompt you
to enable indexing on the local disks.
Windows Server 2003 File Services – Provides services compatible
with computers running Windows Server 2003.
30
a RAID 5 configuration would provide fast and dependable access for your
users.
Before configuring a server as a file server, configure the drives and
volumes that will be used to hold the shared folders. Use the NTFS file format
on your file server. This enables you to take advantage of NTFS permissions
and also monitor NTFS volumes, using the new Windows Server File Server
Resource Manager.
The Quota Management snap-in enables you to create quotas that limit
the space allowed for a volume or folder. These quotas can be also be applied
to subfolders on a particular volume (or a particular folder).
Windows Server enables you to control and track shared volume usage
on a per-volume and per-user basis. Notifications can also be built into the
quota settings, alerting you or folder owners when a particular threshold has
been reached.
Windows Server also provides a command-line tool, fsutil, for working
with disk volumes. Its capabilities include manipulating disk quotas. For
example, fsutil quota is used to create and edit user disk quotas.
You definitely will want to spend some planning time to determine an
appropriate disk space for your users before enabling disk quotas. Quotas
can be created that are specific to a volume or folder, and you can also create
auto-apply quotas that also apply to any subfolders in a volume or folder to
which you assign the auto-apply quota.
Two types of quotas are available to you: hard quotas and soft quotas.
Hard quotas dictate a size limit that users cannot exceed. A soft quota allows
users to exceed the limit and is used to monitor volume (or folder) use by your
users.
Disk quotas can be created with the Quota Management snap-in (in the
Server Manager or the MMC, it is a subnode of the File Server Resource
Manager). Templates are provided (using various threshold settings) that can
be used to create both your "regular" quotas and you auto-apply quotas.
After you have configured shares on the server, you can manage all the
parameters related to shares by using the Share and Storage Management
snap-in and the File Server Resource Manager. The Share and Storage
Management snap-in enables you to configure new shares and volumes via
the Provision Share Wizard and the Provision Storage Wizard respectively.
You can manage quotas, file screening, and storage reports via the File
Server Resource Manager. Quotas, file screening, and reports each have a
node and set of tools for creating and managing each aspect of managing
shares.
The easiest way to access all these tools in a single window is to use the
Server Manager. When the Share and Storage Management node and the File
Server Resource Manager node are expanded in the Server Manager, you can
access all the tools and wizards.
31
Let Us Practice
Self-check 5
32
Let Us Practice More
ACTIVITY SHEET
Title: Adding the File Server Role
Performance Objective: Demonstrate the ability to add the File
Server role using the Server Manager.
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedure:
1. Open the Server Manager.
2. Select Add Roles then click Next.
3. Select File Services then click Next.
4. On the Select Role Services window, make sure that the File
Services option is marked with check. Then click Next.
5. On the Confirm Installation Selections window, click Install.
6. On the Installation Results window, click Close.
Assessment Method: Portfolio assessment using the Performance Criteria
Checklist
CRITERIA
Did you…. YES NO
1. Open the Server Manager.
2. Select Add Roles then click Next.
3. Select File Services then click Next.
4. On the Select Role Services window, make sure that
the File Services option is marked with check. Then
click Next.
5. On the Confirm Installation Selections window, click
Install.
6. On the Installation Results window, click Close.
33
Let Us Study
INTRODUCTION
Back in the days of old, a file server was a file server and an e-mail
server was an e-mail server and so on. In many environments today, however,
organizations are seriously exploiting the general purpose nature of modern
operating systems and deploying all kinds of services or roles to all kinds of
servers. At the core, though, file serving -- one of the original "killer-apps" that
introduced networking to many an organization -- still reigns supreme on the
needs list. Although file serving is one of the most basic functions handled by
servers, the administrative challenges and effort remain in place.
34
Full Control: Allows setting an extra level of advanced permissions
for systems running the NT file system (NTFS), used mostly on legacy
business networks.
The File Services role is added in Server Manager to enable file sharing
and install the management tools.
The effective permission for a user to access a shared folder is
the more restrictive of the least restrictive Share Permission and the least
restrictive NTFS Permission. A Deny permission for a user or a group they are
a member of always overrides Allow permissions.
Use the Share and Storage Management console to create and manage
shared folders.
Encrypting File System (EFS) is transparent to the user and works only
on NTFS; you cannot both encrypt and compress a file.
With the exception of Public folders that involve moving or copying a file
to a new location, sharing files in Windows involves taking specific action in
the context of the given file or folder. In Windows 10, right-click on a file or
folder in File Explorer, for example, to reveal a Give access to option.
File-sharing can fail due to permissions issues, network outages, and
other technical glitches. Use the troubleshooting wizards in the Control Panel
(under Network and Sharing Center) to diagnose problems with network
connections, shared folders, or the HomeGroup.
Besides the sharing facilities built into Microsoft Windows, some third-
party software systems such as Dropbox also support file sharing between
Windows computers plus other non-Windows devices on the network. Consult
the documentation for these third-party packages for additional details.
Users can turn off file and printer sharing on a computer from
the Windows Advanced Sharing Settings page. If the computer had previously
joined a homegroup, leave that group through Control Panel. Any files in
the Public folder should also be removed to prevent that form of sharing.
Finally, uninstall any third-party sharing software that may be present on the
device.
35
Shares can be created (or provisioned as it is defined in the Windows
2008 environment) in the Provision a Shared Folder Wizard. A share is simply
a drive or folder that you share for user access.
You can open the Share and Storage Management snap-in in the Server
Manager (expand the Roles and File Services nodes) or in the MMC (Start,
Administrative Tools, Share and Storage Management).
The Share and Storage Management snap-in provides two tabs: Shares
and Volumes. By default the shares are listed by protocol and you can use
the details buttons on the Shares tab to list the shares by other parameters
such as local path, quota, or whether or not shadow copy has been applied to
the share. You can see any existing shares on the server. This includes any
shares you may have created using other tools (such as the Computer folder)
and also shows the administrative shares.
Depending on the roles that you have configured for a server running
Windows Server, a number of administrative shares are created
automatically. These administrative shares serve as special resources related
to specific server features. You do not access these special shares as a user
would access a share providing files; instead, these administrative shares are
accessed by server processes and services.
Whereas some of these administrative shares are configured as hidden
shares, others are not. It is important that these special shares not be deleted,
moved, or renamed—doing so affects the server's functionality. Some of these
special administrative shares are listed here:
ADMIN$— This hidden share is used during remote administration
of a computer. It serves as the path to system root.
NETLOGON— This share is installed on domain controllers and
helps facilitate user logon.
SYSVOL— This share serves as a domain controller resource and is
important to domain client computer functionality.
PRINT$— This share is used when you remotely administer a
network printer.
36
Let Us Practice
Self-check 6
A. Multiple Choice. Write the letter of your answer on the space provided.
37
Let Us Practice More
ACTIVITY SHEET
Title: Creating Shared Folders
38
Performance Criteria Checklist
CRITERIA
Did you…. YES NO
1. Open the two virtual machines (SRV-1 and PC-1).
2. On the desktop of SRV-1, create a folder to be
shared.
3. Change Sharing settings.
4. Change Security settings.
5. Click Close to complete
6. Check if the shared folder allows changes in PC-1
39
Let Us Study
INTRODUCTION
There are three primary tools that you can use to manage Windows
print servers and scan servers:
Server Manager
Print Management
Scan Management
In Windows Server, you use Server Manager to install the Print and
Document Services server role and role services. These role services also
install the Print Management and Scan Management snaps-ins. The Print
Management and Scan Management snaps-ins are also available on
computers running Windows 10.
Print Management helps you to monitor print queues and receive
notifications when print queues stop processing print jobs. It also enables you
to migrate print servers and deploy printer connections using Group Policy.
Scan Management enables you to monitor network scanners and scan
servers, process scanned documents, and then route the scanned documents
to network folders, Windows SharePoint Web sites, and to e-mail recipients.
40
Print Server - Installs the Print Management console for Microsoft
Management Console (MMC), which enables administrators to
deploy, monitor, and manage printers throughout the enterprise.
Distributed Scan - Server Enables the computer to receive
documents from network-based scanners and forward them to the
appropriate users.
Internet Printing - Creates a website that enables users on the
Internet to send print jobs to shared Windows printers.
LPD Service - Enables UNIX clients running the line printer remote
(LPR) program to send their print jobs to Windows printers.
41
Windows Server installs the Print Management console when you add
the Print And Document Services role to the computer. You can also install
the console without the role by adding the Print And Document Services Tools
feature, found under Remote Server Administration Tools, Role
Administration Tools in the Add Roles And Features Wizard.
DEPLOYMENT SCENARIOS
42
Let Us Practice
Self-check 7
43
Let Us Practice More
ACTIVITY SHEET
Title: Adding the Print and Document Services
role
Performance Objective: Demonstrate the ability to the Print and
Document Services role using the Server
Manager.
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedure:
1. Open the Server Manager.
2. Select Add Roles then click Next.
3. Select Print and Document Services then click Next.
4. On the Introduction to Print and Document Services window, click
Next.
5. On the Select Role Services window, make sure that the Print Server
option is marked with check. Then click Next.
6. On the Confirm Installation Selections window, click Install.
7. On the Installation Results window, click Close.
Assessment Method: Portfolio assessment using the Performance Criteria Checklist
CRITERIA
Did you…. YES NO
1. Open the Server Manager.
2. Select Add Roles then click Next.
3. Select Print and Document Services then click
Next.
4. On the Introduction to Print and Document Services
window, click Next.
5. On the Select Role Services window, make sure that
the Print Server option is marked with check. Then
click Next.
6. On the Confirm Installation Selections window, click
Install.
7. On the Installation Results window, click Close.
44
Let Us Study
INTRODUCTION
45
your printers (whether locally, remotely, or directly) to the network so that the
appropriate printer can be "identified" during the process of configuring a
server for print services.
46
a printer. These devices then connect directly to the network over the same
network media (such as twisted-pair cable connected to a hub or switch) that
other devices and computers on the network use.
Because TCP/IP is the default network protocol for Windows Server,
printers using direct-connect devices can be configured with an IP address
(using the configuration software that ships with the device or the printer) or
can receive an IP address from the domain's DHCP server. When a DHCP
server is used on the network, the DHCP server assigns an IP address as soon
as the direct-connect printer is attached to the network and brought online.
You can find this IP address using the DHCP snap-in; all you have to do is
examine the new leases that have been supplied to devices on the network.
47
Let Us Practice
Self-check 8
____ 1. The Server Manager enables you to install the Print Services role on a
server and to quickly view print-related events when the Print Services
role is selected.
____ 2. A remote printer is a printer that is directly attached to a server.
____ 3. A number of manufacturers (such as Intel and Hewlett-Packard) make
both internal and external print server devices that can be installed in
(or on) a printer.
____ 4. A direct-connect printer is a printer attached to a computer other than
your server.
____ 5. After the printer is installed, you can view it in the Printers window.
Select Start and then Control Panel.
____ 6. Remote printer is outfitted with an internal or external direct
connection hardware device (which acts as both a local print server
and a network interface card for the printer).
____ 7. The Print Management snap-in allows for centralized management of
the printing environment in the domain.
48
Let Us Practice More
ACTIVITY SHEET
Title: Adding a Printer to a Print Server
49
Performance Criteria Checklist
CRITERIA
Did you…. YES NO
1. Open the Print Management tool.
2. Open the Print Servers node.
3. Expand node of the name of the server that you are
using.
4. Open Printers node.
5. Add a printer
6. Click Finish to close.
50
Let Us Remember
51
Let Us Assess!
ACTIVITY SHEET
Title: Create a new Virtual Machine, Join this to
the domain, Create a shared folder and Add
a printer to the Print Server.
Performance Objective: In this activity, you should be able to create
a new Virtual Machine and join this to the
domain, create a shared folder, and add a
printer to the Print Server.
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedures:
Edition : Ultimate
Partitions: 1st Partition (Partition 2) size = 20530
2nd Partition (Partition 3) size = remaining disk space
User Name: Client2
Password : 123456
52
Performance Criteria Checklist
CRITERIA Yes No
Did you…..?
1. Apply the necessary occupational health and safety
policies.
53
Let Us Reflect
DHCP can be used not just to provide clients with an IP address, but
also additional information such as the name of the parent domain
and the IP addresses of both preferred and alternate DNS servers.
A DHCP scope is a valid range of IP addresses that are available for
assignment or lease to client computers on a particular subnet.
Before you can log on to a computer with a domain account, that
computer must belong to the domain.
You should consider creating at least two OUs for computer objects:
one to host clients computer accounts and another for servers.
Every Windows computer not joined to a domain is part of a
workgroup. A workgroup is a group of computers on the same local
network.
Adding the File Services role not only configures settings to optimize
the system for file sharing, but also enables the administrator to
choose which file server options as well as which tools for managing
the file system will be installed.
Disk quotas can be created with the Quota Management snap-in (in
the Server Manager or the MMC, it is a subnode of the File Server
Resource Manager).
The effective permission for a user to access a shared folder is
the more restrictive of the least restrictive Share Permission and the
least restrictive NTFS Permission.
Installing the Print And Document Services role on the computer
provides additional tools that are particularly useful to administrators
involved with network printing on an enterprise scale.
There are several ways on installing a printer on a Windows based
network, with a Windows 2008 (R2) Domain Controller – either a
Standard server or Enterprise server.
The Print Management snap-in allows for centralized management of
the printing environment in the domain.
54
References
1. Windows Server 2008 for Dummies, Ed Tittel and Justin Korelc,
Wiley Publishing, Inc., 2008
2. Windows Server 2008 R2 Unleashed, Alex Lewis-Colin Spence-Jeff
Guillet-Jon Skoog-Stefan Garaygay and Tyson Kopczynski, Pearson
Education Inc., January 2010
3. Introducing Windows Server 2008 R2, Charlie Russel and Craig
Zacker, Microsoft Press, 2010
4. Sams Teach Yourself Windows Server 2008 in 24 Hours, Joe
Habraken, Sams Publishing, May 14, 2008
5. https://docs.microsoft.com/en-us/windows-server/identity/ad-
ds/get-started/virtual-dc/active-directory-domain-services-overview
6. https://www.computerweekly.com/de/definition/Domain-
Controller-Promoter-DCPromo
7. https://www.techotopia.com/index.php/Windows_Server_2008_R2_
Remote_Desktop_(RD)_Services#:~:text=Remote%20Desktop%20Serv
ices%20provides%20both,is%20displayed%20on%20the%20client.&t
ext=Remote%20applications%20are%20covered%20in,on%20Windo
ws%20Server%202008%20R2.
8. https://www.computerperformance.co.uk/longhorn/server-2008-
features-services-2/
9. https://searchwindowsserver.techtarget.com/definition/organizatio
nal-unit-OU
10. https://kb.iu.edu/d/atvu
11. https://www.varonis.com/blog/the-difference-between-
organizational-units-and-active-directory-groups/
12. https://networkencyclopedia.com/object-in-active-directory/
13. https://www.sciencedirect.com/topics/computer-science/file-
service-role
14. https://www.free-online-training-courses.com/installing-the-file-
server-role/
15. https://petri.com/windows-2008-print-server-management
16. https://www.techrepublic.com/blog/the-enterprise-cloud/using-
the-share-and-storage-management-console-in-windows-server-
2008/
17. https://www.lifewire.com/network-file-sharing-in-microsoft-
windows-818219
18. http://winintro.ru/pmc.en/html/12485e2d-bf0f-4640-
96b7f29fa19025f5.htm#:~:text=Print%20and%20Document%20Servi
ces%20is,printer%20and%20scanner%20management%20tasks.
19. https://www.techveze.com/using-print-document-services-role/
20. https://docs.microsoft.com/en-us/previous-versions/windows/it-
pro/windows-server-2012-r2-and-
2012/jj134159(v=ws.11)
21. https://www.techotopia.com/index.php/Setting_Up_a_Windows_Ser
ver_2008_R2_Print_Server
55