0% found this document useful (0 votes)
22 views

CSS Q2 Module 1 UC3 LO2B Copy Final

Uploaded by

Brent Bangcayaon
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

CSS Q2 Module 1 UC3 LO2B Copy Final

Uploaded by

Brent Bangcayaon
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

12

Computer Systems
Servicing
Quarter 2 Module 1:
Configure Network Services
TLE/TVL – Grade 11-12
Alternative Delivery Mode
Quarter 2 – Module 1: Configure Network Services
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Writers : Deover M. Pasco
Editors : Cecille T. Godin
Reviewers : Alpha D. Palconit
Illustrator : Charlie C. Tocmo
Layout Artist: Rendel D. Baldonado

Management Team
Chairperson Josephine L. Fadul, ED. D, CESO V
Schools Division Superintendent
Co-Chairperson Melanie P. Estacio ED.D
Asst. Schools Division Superintendent
Members
Alpha D. Palconit, ED.D, EPS-TLE-TVE
Lorna C. Ragos, EPS-LRMDS
Jecson L. Oafallas, PDO II
Jeffrey E. Santiago, Librarian II

Printed in the Philippines by ________________________

Department of Education – Region XI

Office Address: ____________________________________________


____________________________________________
Telefax: ____________________________________________
E-mail Address: ____________________________________________
12 SHS

COMPUTER SYSTEMS
SERVICING
Quarter 2: SETUP COMPUTER SERVERS

Module 1:
Configure Network Services
Introductory Message
For the facilitator:
Welcome to the COMPUTER SYSTEMS SERVICING Alternative Delivery Mode
(ADM) Module on (Configure Network Services)!
This module was collaboratively designed, developed and reviewed by
educators both from public and private institutions to assist you, the teacher or
facilitator in helping the learners meet the standards set by the K to 12 Curriculum
while overcoming their personal, social, and economic constraints in schooling.
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this also aims
to help learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of
the module:

Notes to the Teacher


This contains helpful tips or strategies that
will help you in guiding the learners.

As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.
Let Us Learn!

Welcome!

The unit of competency, “SETTING UP COMPUTER SERVERS” is one


of the competencies of COMPUTER SYSTEMS SERVICING NC II, a course
which comprises the knowledge, skills and attitudes required for a Computer
Technician to possess.

This module is prepared to help you achieve the required Learning


Outcome, Configure Network Services. This will be the source of information
that will enable you to acquire the knowledge, skills and attitudes in this
particular trade independently at your own pace or with minimum
supervision or help from your instructor.

- Talk to your trainer and agree on how you will both organize the
training of this unit. Read through the learning guide carefully.
It is divided into sections which cover all the skills and knowledge
you need to successfully complete this module.
- Use the self-check questions at the end of each section to test
your own progress.
- When you have completed this module (or several modules) and
feel confident that you have had sufficient practice, your trainer
will arrange an appointment with you to asses you. The result of
your assessment will be recorded in your Competency
Achievement Record.

This module contains the following Lesson:


- Configure Network Services

1
Let Us Learn!

After completing this lesson, you will meet these objectives:

 Identify Dynamic Host Configuration Protocol.


 Install DHCP Server role.
 Classify DHCP Scope types.
 Configure IPv4 scopes.
 Explain creating client computer.
 Create a virtual computer to be joined to the domain.
 Familiarize joining client computer to a domain.
 Connect two virtual machines.
 Join client computers to a domain.
 Explain File Server role.
 Add the File Server role.
 Familiarize Network file sharing in Microsoft Windows
 Create shared folders.
 Explain Print and Document Services role.
 Add the Print and Document Services role.
 Familiarize adding printers to a print server
 Add a printer to a print server.

2
LESSON
CONFIGURE NETWORK
1 SERVICES

Let us try

I. Multiple Choice. Select the letter of your choice.


1. An alphanumeric identifier for administrative purposes.
A. Network ID
B. Router
C. Scope Name
D. Exclusion range
2. A collection of scopes grouped together such that they can be enabled
and disabled as a single entity.
A. Normal scope
B. Multicast scope
C. Superscope
D. Broadcast scope
3. A DHCP option that allows DHCP clients to access remote networks.
A. Leased duration
B. Router
C. Scope Name
D. Network IP
4. Quota that allows users to exceed the limit and is used to monitor
volume (or folder) use by your users.
A. File Server
B. Soft
C. Fsutil
D. Hard
5. Command-line tool used in manipulating disk quotas.
A. File Server
B. Soft
C. Fsutil
D. Hard
6. Installs tools for generating storage reports, configuring quotas, and
defining file screening policies.
A. Distributed File System
B. File Server Resource Manager
C. Services for Network File System
D. Windows Search Service

3
7. This hidden share is used during remote administration of a
computer.
A. ADMIN$
B. PRINT$
C. NETLOGON
D. SYSVOL
8. This share is used when you remotely administer a network printer.
A. ADMIN$
B. PRINT$
C. NETLOGON
D. SYSVOL
9. Recipients can both view and change the file contents and save
(overwrite) the file at its current location.
A. Read
B. Change
C. Full Control
D. Edit
10. Installs the Print Management console for Microsoft Management
Console (MMC), which enables administrators to deploy, monitor, and
manage printers throughout the enterprise.
A. Print Server
B. Distributed Scan
C. Internet Printing
D. LPD Service
11. Enables you to monitor network scanners and scan servers, process
scanned documents, and then route the scanned documents to
network folders, Windows SharePoint Web sites, and to e-mail
recipients.
A. Server Manager
B. Print Management
C. Scan Management
12. Enables UNIX clients running the line printer remote (LPR) program to
send their print jobs to Windows printers.
A. Print Server
B. Distributed Scan
C. Internet Printing
D. LPD Service
II. Identification. Write your answers on the space provided.
___________ 1. You can specify whether the computer can be used to
dial in and remotely connect to remote access servers in
your domain.
___________ 2. This tab shows the operating system running on the
computer and the service packs that have been installed.
___________ 3. On this tab, you can specify whether the computer
should be trusted for delegation.

4
III. True or False. Write T if the statement is True and F if False. Write
your answer on the space provided.
_____ 1. In a Domain configuration, computers are connected but there is no
central control.
_____ 2. When you create a domain, the Computers container is created by
default and this container is an organizational unit.
_____ 3. You can delegate the permission to create computer objects to the
appropriate administrators or support personnel.
_____ 4. A number of manufacturers (such as Intel and Hewlett-Packard)
make both internal and external print server devices that can be
installed in (or on) a printer.
_____ 5. A direct-connect printer is a printer attached to a computer other
than your server.
_____ 6. After the printer is installed, you can view it in the Printers window.
Select Start and then Control Panel.

IV. Fill in the blanks.


1. DHCP can be used not just to provide ______ with an IP address, but also
additional information such as the name of the parent domain and the IP
addresses of both preferred and alternate DNS servers.
2. A DHCP ______ defines one or more ranges of IP addresses from which an
IP address may assigned to a client and the duration of the IP address
lease
3. In ________ mode, clients obtain both an IP address and other information
(such as DNS addresses) through the DHCPv6 server.

5
Let Us Study

3.2.5-A CONFIGURING DHCP SERVERS

INTRODUCTION

Dynamic Host Configuration Protocol (DHCP) is an extremely powerful


and popular mechanism by which IP addresses and other related network
information are dynamically assigned to network clients when they are
attached to a network. This provides significant reductions in terms of
network management overheads, particularly on large networks, by avoiding
the necessity to manually assign settings to each client.
This part of the module is designed to provide details on how to install,
configure and manage a DHCP server on a Windows Server system using the
graphical DHCP console tool.

INSTALLING THE DHCP SERVER ROLE

The first step in setting up a DHCP server on a Windows Server system


is to install the DHCP Server feature on any servers which are required to
provide the service. Before performing even this initial task, it is highly
recommended that any systems designated to act as DHCP servers are
assigned a static IP address. If the server is currently obtaining a dynamic IP
address from another DHCP server, begin the installation process by
assigning the system a static IP address. This can be achieved by launching
the Server Manager and clicking View Network Connections. Right click on
the network adapter on which the DHCP service is to be run and
select Properties where either, or both the IPv4 or IPv6 address may be
changed from automatically obtaining an IP address to specifying a static
address. Once configured, exit from the properties dialog and network
connections window leaving the Server Manager running.
Installation of the DHCP Server Role is performed by
selecting Roles from the tree in the left hand pane of the Server Manager tool.
On the Roles page, click on the Add Role link to launch the Add Roles Wizard.
Dismiss the welcome screen if it is displayed, and in the Select Server Roles
screen select the check box next to DHCP Server before clicking
the Next button, read the information provided and click Next again to
proceed to the Network Connection Binding screen. It is within this screen that
the DHCP server is associated with specific network adapters installed in the
system. Select the network adapters for which the DHCP service will be
provided and click Next.
DHCP can be used not just to provide clients with an IP address, but
also additional information such as the name of the parent domain and the
IP addresses of both preferred and alternate DNS servers. If the DHCP server

6
is required to provide these details for IPv4 clients, enter them into the Specify
IPv4 DNS Server Settings page and click Next.
On the IPv4 WIN Server Settings page, enter addresses of the Preferred
and Alternate WINS servers if required. Otherwise, leave the WINS is
not required for applications on this network option selected and proceed to
the next configuration page.
The next page allows initial DHCP scopes to be configured. A DHCP
scope defines one or more ranges of IP addresses from which an IP address
may assigned to a client and the duration of the IP address lease (6 days for
wired clients and 8 hours for wireless clients). This may either be configured
now, or at a later point in the configuration process.
With the initial DHCP IPv4 configuration steps completed, the wizard
subsequently moves on to the IPv6 settings. This is where a little background
information is useful. Windows Server supports two modes of IPv6 DHCP
operation, known as stateless and stateful. In stateful mode, clients obtain
both an IP address and other information (such as DNS addresses) through
the DHCPv6 server. In stateless mode, the clients receive only the non-IP
address information from the DHCPv6 server. In this case, the IP address
must be provided using some other mechanism, either by configuring of static
IP addresses or through the implementation of IPv6 auto-configuration.
On the Configure DHCPv6 Stateless Mode screen, select either stateful
or stateless mode in accordance with your specific enterprise requirements.
If stateless mode is selected the next screen will prompt for the IPv6 DNS
information to be provided to clients. Enter the information and click on Next.
If the DHCP is part of an Active Directory domain, the Authorize DHCP
Server page will appear. Enter the credentials (either your own as shown, or
alternate credentials via the Alternate Credentials button) necessary to
authorize the new DHCP server. Alternatively, the authorization may be
performed later by skipping this step by clicking on Next.

AUTHORIZING DHCP SERVERS IN THE ACTIVE DIRECTORY

7
If a DHCP server is to operate within an Active Directory domain (and
is not running on a domain controller) it must first be authorized. This can
be achieved either as part of the DHCP Server role installation, or
subsequently using either DHCP console or at the command prompt using
the netsh tool.
If the DHCP server was not authorized during installation, invoke the
DHCP console (Start -> All Programs -> Administrative Tools -> DHCP), right
click on the DHCP to be authorized and select Authorize. To achieve the same
result from the command prompt, enter the following command:
netsh dhcp server serverID initiate auth
In the above command syntax, serverID is replaced by the IP address or
full UNC name of system on which the DHCP server is installed.

8
Let Us Practice

Self-check 1

Fill in the blanks.

1. DHCP is mechanism by which ________________ and other related network


information are dynamically assigned to network clients when they are
attached to a network.
2. Installation of the DHCP Server Role is performed by selecting Roles from
the tree in the left hand pane of the ___________________ tool.
3. DHCP can be used not just to provide _______ with an IP address, but also
additional information such as the name of the parent domain and the IP
addresses of both preferred and alternate DNS servers.
4. A DHCP _______defines one or more ranges of IP addresses from which an
IP address may assigned to a client and the duration of the IP address
lease
5. In ________ mode, clients obtain both an IP address and other information
(such as DNS addresses) through the DHCPv6 server.
6. If a DHCP server is to operate within an Active Directory domain (and is
not running on a domain controller) it must first be _______________.

9
Let Us Practice More

ACTIVITY SHEET
Title: Installing DHCP Server Role

Performance Objective: Demonstrate the ability to install DHCP Role


Supplies/Materials: VirtualBox with a VM installed Windows
Server 2008 R2
Equipment/Tool: Computer
Steps/Procedure:
1. Open the Server Manager.
2. Select Add Roles. At the opening screen of the Add Roles Wizard, click
Next.
3. On the next screen, select the DHCP Server role (select the appropriate
check box). Then click Next.
4. On the Introduction to DHCP Server window, click Next.
5. On the Network Connection Bindings window, click Next.
6. On the IPv4 DNS Settings window, click Next.
7. On the IPv4 WINS Settings window, click Next.
8. On the DHCP Scope window, for the meantime click Next.
9. On the DHCPv6 Stateless Mode window, select Disable DHCPv6
stateless mode, then click Next.
10. On the DHCP Server Authorization window, click Next.
11. On the Confirmation window, click Install.
12. On the Results window, click Close.
Assessment Method: Portfolio assessment using the Performance Criteria
Checklist

10
Performance Criteria Checklist

CRITERIA
Did you…. YES NO
1. Open the Server Manager.
2. Select Add Roles. At the opening screen of the Add
Roles Wizard, click Next.
3. On the next screen, select the DHCP Server role
(select the appropriate check box). Then click Next.
4. On the Introduction to DHCP Server window, click
Next.
5. On the Network Connection Bindings window, click
Next.
6. On the IPv4 DNS Settings window, click Next.
7. On the IPv4 WINS Settings window, click Next.
8. On the DHCP Scope window, for the meantime click
Next.
9. On the DHCPv6 Stateless Mode window, select
Disable DHCPv6 stateless mode, then click Next.
10. On the DHCP Server Authorization window, click
Next.
11. On the Confirmation window, click Install.
12. On the Results window, click Close.

11
Let Us Study

3.2.5-B UNDERSTANDING DHCP SCOPE TYPES

INTRODUCTION

A DHCP scope is a valid range of IP addresses that are available for


assignment or lease to client computers on a particular subnet. In a DHCP
server, a scope is configured to determine the address pool of IPs that the
server can provide to DHCP clients.
Scopes determine which IP addresses are provided to the clients. They
should be defined and activated before DHCP clients use the DHCP server for
its dynamic IP configuration. Users can configure as many scopes on a DHCP
server as required in the network environment.

DHCP SCOPE PROPERTIES

 Network ID – The network ID for the range of IP addresses.


 Subnet Mask – The subnet mask for the network ID.
 Network IP address range – The range of IP address that are available
to the clients.
 Lease Duration – The period of time that the DHCP server holds a
leased IP address for a client before removing the lease.
 Router – A DHCP option that allows DHCP clients to access remote
networks.
 Scope name – An alphanumeric identifier for administrative
purposes.
 Exclusion range – The range of IP addresses in the scope that is
excluded from being leased.

12
Each subnet can have a single DHCP scope that has a single
continuous range of IP addresses. Specific addresses or groups of addresses
can be excluded from the range that the DHCP scope specifies. Normally, only
one scope can be assigned to a subnet. If more than one scope is required on
a subnet, the scopes must first be created then combined into a super scope.
For example, if there are two subnets, then users can create two
separate scopes for the separate subnets on one DHCP server. Users create a
separate scope because the subnets have different IP addressing schemes.

UNDERSTANDING DHCP SCOPE TYPES

DHCP scopes are used to define ranges of addresses from which a


DHCP server can assign IP addresses to clients. Scopes fall into Normal,
Multicast and Superscope categories as follows:
 Normal Scope - Allows A, B and C Class IP address ranges to be
specified including subnet masks, exclusions and reservations.
Each normal scope defined must exist within its own subnet.
 Multicast Scope - Used to assign IP address ranges for Class D
networks. Multicast scopes do not have subnet masks, reservation
or other TCP/IP options. Multicast scope address ranges require
that a Time To Live (TTL) value be specified (essentially the number
of routers a packet can pass through on the way to its destination).
 Superscope - Essentially a collection of scopes grouped together
such that they can be enabled and disabled as a single entity.

CONFIGURING IPV4 SCOPES USING THE DHCP CONSOLE

New scopes on Windows Server can either be configured from the


graphical DHCP console, or from the command prompt using
the netsh utility. To create a new scope in the DHCP console (launched
from Start -> All Programs -> Administrative Tools -> DHCP) click on the server
name in left hand panel so that IPv4 and IPv6 categories are listed in the main
panel. Right click on the required IP version and select New scope from the
menu top invoke the New Scope Wizard. Click on Next to skip the welcome
screen so that the Scope Name dialog is displayed.
Enter a suitable name and description for the scope and press Next to
proceed to the IP Address Range screen. In this screen, enter the start and
end addresses of the IP address scope followed by the subnet mask, either in
terms of bit length or in IP format (for example 255.255.255.0 or 24 bits). Note
that when the start and end addresses are entered the subnet mask fields are
filled in automatically, but may be changed manually if required.
If the address range specified encompasses multiple subnets (for
example 192.168.2.1 through to 192.168.3.254) the wizard will warn that the
designated range is too large for a single scope and provide the option to create
a superscope made up of a number of different scopes depending on how
many subnets are contained within the range.
Assuming that all addresses in the scope range are on the same subnet,
the wizard will provide the option to specify exclusions within the scope.
Exclusions are essentially ranges of one or more IP addresses within the

13
defined scope which are not available for assignment to clients. Multiple
exclusion ranges may be defined within a single scope by using
the Add button to add new ranges
The next screen of the New DHCP Scope wizard relates to the topic
of Lease Duration for the IP addresses in the current scope. Lease duration
refers to the amount of time an IP address is assigned to a particular client
computer or device. If the subnet on which the DHCP server operates has a
high turnover of clients then a short lease is recommended (since the server
will end up holding IP addresses for clients which are no longer connected,
potentially exhausting the pool of IP addresses). For subnets where the
connected clients are fairly stable, longer leases might be more appropriate.
To define a lease duration use the spin boxes provided, specifying the duration
in units of days, hours and even minutes (the default is 8 days).
The next screen provides the option to configure DHCP options (such
as default gateway, DNS and WINS servers) which will be provided to clients
along with the dynamic IP address. If the yes option is selected, the wizard
will present a series of screens where these options may be specified if
required. On each screen enter the appropriate information, or leave the page
blank if the option is required (for example not all configurations require a
WINS server). If "no" is selected the wizard will skip to the Activate
Scope screen where, as the name suggests, the new scope may be activated.
Once activated the wizard may be closed. The new scope is now defined and
active.

CONFIGURING DHCP RESERVATIONS

DHCP reservations provide a mechanism by which IP addresses may be


permanently assigned to a specific client based on the MAC address of that
client.
The MAC address of a Windows client can be found running
the ipconfig /all command. For Linux systems the corresponding command
is ifconfig -a. Once the MAC address has been identified, the reservation may
be configured using either the DHCP console or at the command prompt using
the netsh tool. One important point to note is that ifconfig displays the MAC
address delimited by colons (:), for example 06:EC:E6:11:47:BD. When
entering the MAC address into the New Reservations dialog on Windows the
colons will need to be replaced with dashes (-), for example 06-EC-E6-11-47-
BD. Failure to do this will result in a warning dialog stating that the Unique
identifier you have entered may not be correct.
To configure reservation using the DHCP console, select Start ->
All Programs -> Administration Tools -> DHCP and select the DHCP server
and unfold the appropriate scope from the tree in the left panel. Within the
scope sub-list, select Reservations.

14
Let Us Practice

Self-check 2

Multiple Choice.
1. The period of time that the DHCP server holds an IP address for a
client.
A. Subnet Mask
B. Lease Duration
C. Scope Name
D. Network ID
2. Used to assign IP address ranges for Class D networks.
A. Normal scope
B. Broadcast scope
C. Superscope
D. Multicast scope
3. An alphanumeric identifier for administrative purposes.
A. Network ID
B. Router
C. Scope Name
D. Exclusion range
4. A collection of scopes grouped together such that they can be enabled
and disabled as a single entity.
A. Normal scope
B. Multicast scope
C. Superscope
D. Broadcast scope
5. A DHCP option that allows DHCP clients to access remote networks.
A. Leased duration
B. Router
C. Scope Name
D. Network IP
6. Allows A, B and C Class IP address ranges to be specified including
subnet masks, exclusions and reservations.
A. Normal scope
B. Multicast scope
C. Superscope
D. Broadcast scope

15
Let Us Practice More

ACTIVITY SHEET
Title: Configuring IPv4 Scopes
Performance Objective: Demonstrate the ability to configure IPv4
Scopes using the DHCP console.
Supplies/Materials: VirtualBox with a VM installed Windows
Server 2008 R2
Equipment/Tool: Computer with VirtualBox
Steps/Procedure:
1. Open the DHCP Console. Select Start, All Programs, Administrative
Tools, DHCP.
2. Select the server name. Example: Click tnts_server1. IPv4 and IPv6
categories are listed in the main panel.
3. Select IPv4.
4. Create a new scope. Right-click IPv4, then select New Scope, click Next.
5. Provide for a Name and Description. Example:
Name-SCOPE1
Description-leave it blank.
6. Provide IP Address Range. Example:
Start IP address - 192.168.0.1
End IP address - 192.168.0.100
7. For the Add Exclusions and Delay window, click Next.
8. For the Lease Duration window, click Next.
9. For the Configure the DHCP Options window, select No and click Next.
10. To complete, click Finish.
Assessment Method: Portfolio assessment using the Performance Criteria
Checklist

16
PERFORMANCE CRITERIA CHECKLIST

CRITERIA
Did you…. YES NO
1. Open the DHCP Console
2. Select the server name.
3. Select IPv4
4. Create a new scope
5. Provide for a Name and Description
6. Provide IP Address Range
7. For the Add Exclusions and Delay window, click
Next.
8. For the Lease Duration window, click Next.
9. For the Configure the DHCP Options window,
select No and click Next.
10. To complete, click Finish.

17
Let Us Study

3.2.6-A CREATING COMPUTERS AND JOINING A DOMAIN

INTRODUCTION

The default configuration of Windows Server and Windows 10 is that


the computer belongs to a workgroup.
Before you can log on to a computer with a domain account, that
computer must belong to the domain. To join the domain, the computer must
have an account in the domain which, like a user account, includes a logon
name, a password, and a security identifier (SID) that uniquely represent the
computer as a security principal in the domain.
Those credentials enable the computer to authenticate against the
domain and to create a secure relationship that then enables users to log on
to the system with domain accounts.
A Windows 2000/2003/2008/XP/Vista/7 Professional machine can be
either a member of a Domain or a Workgroup. The full benefits of Windows
2000/2003/2008/XP/Vista/7 can only be achieved by placing all of the
computers on the network into domains. In order to utilize all of the features
of Windows 2x domains, computers must be running either Windows
2000/XP Professional or Windows 2000/2003/2008 Server families.
In a Workgroup configuration, computers are connected but there is no
central control. Although files and folders may still be shared, security policies
have to be set at each individual computer. In a workgroup, every computer
stores its own security database. In a domain environment all security policies
are managed centrally. The Domain Controller decides what all the client
machines can and cannot do, allowing for a more secure and easily managed
network environment. In a domain, all security is managed centrally. User
details are stored on the Domain Controller. The domain controller downloads
user’s details into whichever workstation he logs on to. The user can now log
onto any computer in the domain and his profile will follow him, e.g. His
desktop, wallpaper and Documents folder will be the same on all the machines
in the domain.

REQUIREMENTS FOR JOINING A COMPUTER TO THE DOMAIN

Three things are required for you to join a computer to an Active Directory
domain:
 A computer object must be created in the directory service.
 You must have appropriate permissions to the computer object. The
permissions allow you to join a computer with the same name as the
object to the domain.
 You must be a member of the local Administrators group on the
computer to change its domain or workgroup membership.

18
COMPUTERS CONTAINER

When you create a domain, the Computers container is created by


default (CN=Computers, . . .). This container is not an organizational unit
(OU); it is an object of class container. There are subtle but important
differences between a container and an OU. You cannot create an OU within
a container, so you cannot subdivide the Computers OU, and you cannot link
a Group Policy object to a container. Therefore, it is highly recommended to
create custom OUs to host computer objects instead of using the Computers
container.

CREATING OUs FOR COMPUTERS

You should consider creating at least two OUs for computer objects:
one to host clients computer accounts and another for servers. These two OUs
are in addition to the Domain Controllers OU created by default during the
installation of Active Directory. In each of these OUs, computer objects can
be created. There is no technical difference between a computer object in a
clients OU and a computer object in a servers or domain controllers OU;
computer objects are computer objects. But separate OUs are typically
created to provide unique scopes of management so that you can delegate
management of client objects to one team and server objects to another.
Two OUs created for all computers accounts. You might consider
further dividing your client and server OUs. Creating sub-OUs beneath a
server or client OU to collect and manage specific types of computers, for
example, an OU for file and print servers and an OU for database servers. By
doing so, the team of administrators for each type of server can be delegated
permissions to manage computer objects in the appropriate OU.

DELEGATING PERMISSION TO CREATE COMPUTERS

You can delegate the permission to create computer objects to the


appropriate administrators or support personnel. The permission required to
create a computer object is Create Computer Objects. This permission,
assigned to a group for an OU, allows members of the group to create
computer objects in that OU. To assign this permission you will need to enable
the Advanced Features view in Active Directory Users and Computers.
Select View and click Advanced Features. Right click the OU and select
Properties. Click Advanced. Click Add. Select the group and Click OK. Select
the Object tab. Ensure the Apply to This object and all descendant objects is
selected. Select Create Computer objects. Click OK.
New Domain Clients
To join a domain the client must have the correct TCP/IP settings and
point to the correct DNS server that hosts the domain. You must also have an
account with appropriate privileges to join a computer to the domain –
normally this is the domain administrator. To join the client to the domain
you must point it to the DNS server for that domain. To join the client to the
domain right-click on My Computer. Select Properties. Select Computer
Name. Select Change. The computer Admin2 is currently a member of a

19
workgroup. Select the Domain box to join the client to a domain. In the
Domain box type in the name for the domain. Click on OK to accept. The
Domain Username and Password box will appear. Type in the username and
password of a domain user who has the right to join clients to the domain,
e.g. the Domain Administrator account. Click on OK to continue. Click on OK
to reboot the computer.
The new client appears on the Domain Controller inside the Computers
container.

PRESTAGING COMPUTERS

The best practice is to prestage a computer account prior to joining the


computer to the domain. Unfortunately, as seen previously Windows enables
you to join a computer to a domain without following best practices.
There are three problems with this behavior of Windows:
 First, the computer account created automatically by Windows is
placed in the default computer container, which is not where the
computer object belongs in most enterprises.
 Second, you must move the computer from the default computer
container into the correct OU, which is an extra step that is often
forgotten.
 Third, any user can join a computer to the domain—no domain-level
administrative permissions are required. Because a computer object
is a security principal, and because the creator of a computer object
owns the object and can change its attributes, this exposes a
potential security vulnerability.
To create the computer right click the relevant OU and select
New>Computer. Type in the computer name, to assign the rights to join this
computer to the domain, click Change. Select the user or group and click OK.
Then click Next. Click Finish. The new computer object has been created.

20
Let Us Practice

Self-check 3

True or False. Write T if the statement is True and F for False

_____ 1. Before you can log on to a computer with a domain account, that
computer must belong to the domain.
_____ 2. credentials enable the computer to authenticate against the domain
and to create a secure relationship that then enables users to log on
to the system with domain accounts.
_____ 3. In a Domain configuration, computers are connected but there is no
central control.
_____ 4. When you create a domain, the Computers container is created by
default and this container is an organizational unit.
_____ 5. You can delegate the permission to create computer objects to the
appropriate administrators or support personnel.
_____ 6. To join a domain, the client must have the correct TCP/IP settings
and point to the correct DNS server that hosts the domain.
_____ 7. The computer account created automatically by Windows is not
placed in the default computer container, which is not where the
computer object belongs in most enterprises.

21
Let Us Practice More

ACTIVITY SHEET
Title: Creating a Virtual Computer to be joined to
the Domain
Performance Objective: Demonstrate the ability to create a virtual
machine to be used in joining into the Domain
using Windows 10 as its operating system.
Supplies/Materials:
Equipment/Tool: Computer with VitualBox and Windows 10
image file (.iso)
Steps/Procedure:
1. Create a new Virtual Machine.
Name : PC-1
Type : Microsoft Windows
Version: Windows 10 (64 bit)

Memory Size: 512 MB


Hard Drive : 40 GB
2. Assign the appropriate image (ISO) file for the VM.
Filename: Win7Ent.iso
3. Install Windows 10 on the new virtual machine created.
Edition : Ultimate
Partitions: 1st Partition (Partition 2) size = 20530
2nd Partition (Partition 3) size = remaining disk space
User Name: Client1
Password : 123456
Assessment Method: Portfolio assessment using the Performance Criteria
Checklist

Performance Criteria Checklist

CRITERIA
Did you…. YES NO
1. Create a new Virtual Machine.
2. Assign the appropriate image (ISO) file for the VM.
3. Install Windows 10 on the new virtual machine
created.

22
Let Us Study

3.2.6-B JOINING CLIENT COMPUTERS A DOMAIN

INTRODUCTION

Windows domains provide network administrators with a way to


manage a large number of PCs and control them from one place. One or more
servers – known as domain controllers – have control over the domain and
the computers on it.
When a computer is joined to a domain, it doesn’t use its own local user
accounts. User accounts and passwords are managed on the domain
controller. When you log into a computer on that domain, the computer
authenticates your user account name and password with the domain
controller. This means you can log in with the same username and password
on any computer joined to the domain.

WORKGROUPS VS. DOMAINS

Every Windows computer not joined to a domain is part of a workgroup.


A workgroup is a group of computers on the same local network. Unlike on a
domain, no computer on a workgroup has control over any other computer –
they’re all joined together as equals. A workgroup doesn’t require a password,
either.
Workgroups were previously used for home file and printer sharing on
previous versions of Windows. You can now use a homegroup to easily share
files and printers between PCs at home. Workgroups have now been pushed
to the background, so you shouldn’t need to worry about them – just leave
the default workgroup name of WORKGROUP and set up homegroup file
sharing.

JOINING CLIENT COMPUTERS

Windows Server supports a variety of client computer operating


systems, including Windows 2000 Professional, Windows XP Professional,
Windows Vista and Windows 10. So in terms of desktop operating system
options, Windows Server provides the same possibilities as those that were
provided by Windows Server 2003 (even including Windows desktop legacy
versions such as Windows NT and 9X).
However, because Windows Server and Windows Vista were really parts
of a single Microsoft development project, a number of advanced features
related to event monitoring, local print job rendering, network access
protection, and even IPv6 deployment are best realized when Windows Vista
is run on the desktop. And although you may be thinking that Terminal
Services can still allow you to get a little more mileage out of legacy desktop
operating systems, even some advanced Terminal Services features, such as
23
Terminal Services web access, are limited to clients running Windows Vista
(SP1 or better) and Windows XP (SP3 or better).
In an ideal situation (although an ideal situation probably does not exist
in the networking world), running only one or two types of the possible client
operating systems such as Windows Vista (and perhaps Windows XP) allows
you to standardize the user desktop as much as possible. This keeps you from
having to configure (and troubleshoot) many different client platforms.
Another aspect of standardizing client computers is standardizing their
hardware configurations. If you have the luxury (the budget, in most cases)
of configuring your client computers with a consistent hardware
configuration, it will be easier to select and configure a particular client
operating system.
A network client must be configured so that a user (or users) can log on
to the domain. However, the computer must also be configured with the
appropriate network protocol (in most cases TCP/IP) so that it can "talk" to
the domain controller that grants a user access to the domain and the other
servers on the network that provide services such as file and print services.
Setting up and configuring client computers is a somewhat consistent task
when you are working with Microsoft operating systems such as Windows
Vista and Windows XP. And if you do plan on running some legacy operating
systems such as Windows 2000, you will find that the network configuration
only differs slightly (when compared to Vista or XP). Because computers are
added to the Active Directory from the server, the minor differences between
desktop operating systems doesn't even play a role.
Windows XP, and Windows Vista/Windows 10 clients must be added to
the domain (as opposed to a legacy Windows operating system such as
Windows 9X), which means these operating systems provide a secure user
environment because the domain administrator determines the computers
that are added to the domain and the level of access these computers have to
network resources. Let's take a look at how a computer can be added to the
domain using the Active Directory for Users and Computers snap-in.

Using Active Directory to Add Computers to the Domain

A user needs a domain user account to log on to a domain. The user's


client computer must also be added to the domain. You can add the computer
to the domain by using the Active Directory Users and Computers snap-in,
which can be run in the MMC or in the Server Manager.

Managing a Computer Account

After you have created the account, the Active Directory Users and
Computers snap-in provides you with the capability to manage the computer.
For example, you can disable the computer account if you think there is a
security issue or some other issue related to the computer. Right-click the
computer name in the Details pane and select Disable Account. The computer
can no longer log on to the domain.
You can also move the account from one domain to another; right-click
the computer account and then select Move. The Move dialog box opens. You

24
can use it to expand the node for a particular domain that appears in the
domain tree. When you're finished, click OK to relocate the computer account
to that domain.
You can also manage the client computer by opening its Computer
Management snap-in from the Active Directory Users and Computers snap-
in (this is true for Windows Vista, Windows XP, and Windows 2000 clients
and Windows 2003 and Windows 2008 member servers). You can then add
or remove local user accounts and even manage volumes and disks on the
client computer.

Viewing Computer Account Properties

You can also view the properties for the computer associated with the
Active Directory computer account (both clients and member servers). You
can view the operating system that the computer is running (including service
packs installed) and set other features related to the computer, such as
whether the computer should be trusted for delegation.
To open the Properties dialog box for a computer listed in the Active Directory,
right-click the account and select Properties. The Properties dialog box for the
computer opens. This dialog box contains seven tabs:
 General— This tab provides the computer name, the DNS name, and
the role of the computer.
 Operating System— This tab shows the operating system running
on the computer and the service packs that have been installed.
 Location— This enables you to specify the building or the floor where
the computer is located.
 Delegation— On this tab, you can specify whether the computer
should be trusted for delegation.
 Managed By— This tab is used to specify which user or group has
the management rights to the computer.
 Dial-In— You can specify whether the computer can be used to dial
in and remotely connect to remote access servers in your domain.
 Member Of— This tab shows the group to which the computer
belongs. The default is Domain Computers. This tab also shows the
domain container where the computer resides.

When you have finished viewing (or changing) the properties for a
computer account, click OK to close the dialog box. You are returned to the
Active Directory Computer and Users snap-in.
You can also access additional tabs related to a computer account's
Properties dialog box by selecting the Advanced Features command under the
View menu. After you enable Advanced Features (a check mark appears next
to the command on the View menu), you also have access to the Object tab,
which provides the canonical name of the object, and the Security tab. The
Security tab enables you to set the different permission levels for users and
groups in relation to the management of the computer account.

25
Let Us Practice

Self-check 4

Identification.
Based on the given below, select the Property that fits the statement.
___________ 1. This tab shows the group to which the computer
belongs.
___________ 2. This tab provides the computer name, the DNS name,
and the role of the computer.
___________ 3. You can specify whether the computer can be used to
dial in and remotely connect to remote access servers in
your domain.
___________ 4. This tab shows the operating system running on the
computer and the service packs that have been installed.
___________ 5. On this tab, you can specify whether the computer
should be trusted for delegation.
___________ 6. This enables you to specify the building or the floor
where the computer is located.

Given: Delegation, General, Dial-In, Member Of, Operating System,


Location.

26
Let Us Practice More

ACTIVITY SHEET
Title: Connect the two Virtual Machines
Performance Objective: Demonstrate the ability to setup VirtualBox
Settings to connect the two virtual machines
(SRV-1 and PC-1)
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedure:
1. Open Oracle VirtualBox.
2. Open Settings of SRV-1.
 Right-click SRV-1.
 Select Settings.
3. Change Network Adapter settings SRV-1.
 Select Network.
 On the Adapter 1 tab, change Attached to setting from NAT to
Internal Network.
 Click Advanced. Change Promiscuous Mode from Deny to Allow
All.
 Click Ok to complete.
4. Open Settings of PC-1.
 Right-click PC-1.
 Select Settings.
5. Change Network Adapter settings of PC-1.
 Select Network.
 On the Adapter 1 tab, change Attached to setting from NAT to
Internal Network.
 Click Advanced. Change Promiscuous Mode from Deny to Allow
All.
 Click Ok to complete.
Assessment Method: Portfolio assessment using the Performance Criteria Checklist

PERFORMANCE CRITERIA CHECKLIST

CRITERIA
Did you…. YES NO
1. Open Oracle VirtualBox.
2. Open Settings of SRV-1.
3. Change Network Adapter settings SRV-1.
4. Open Settings of PC-1.
5. Change Network Adapter settings of PC-1.

27
Let Us Practice More

ACTIVITY SHEET
Title: Joining Client Computer to a Domain
Performance Objective: Demonstrate the ability to join Client
computers to a Domain)
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedure:
1. Open Oracle VirtualBox.
2. Start SRV-1.
3. Start PC-1.
4. On PC-1, change it Network settings.
 Right-click the Network icon on the lower right corner of your
screen.
 Select Open Network and Sharing Center.
 Click Adapter Settings
 Right-click Local Area Connection.
 Select Properties.
 Uncheck IPv6
 Click IPv4 and select Properties
 Tick Use the following IP address
IP Address : 192.168.0.11
Subnet Mask : 255.255.255.0
Default Gateway: 192.168.0 10
Preferred DNS : 192.168.0.10
 Click OK
 Click Close to complete
 Close Network Connections window
5. Change Remote Settings.
 Open the Windows Explorer.
 Right-click the Computer.
 Select Properties, Remote settings
 Click Allow connections
 Click Ok, Apply then Ok
6. Change Firewall Settings.
 Select Start, Control Panel.
 Select System and Security, Windows Firewall
 select Turn Windows Firewall on or off
 Tick Turn off on the two settings
 Click Ok to complete.

28
7. Join the client computer to a domain.
 Open the Windows Explorer.
 Right-click the Computer.
 Select Properties, Change settings, Change
 Tick Domain
 Type the Domain name. Example: TNTS.COM, then click Ok
 Provide the appropriate Username and Password.
Example:
Username: Administrator
Password: tnts_server1
 Click Ok. It will prompt for a restart. Then click Ok
 Click Close to complete.
Assessment Method: Portfolio assessment using the Performance Criteria
Checklist

PERFORMANCE CRITERIA CHECKLIST

CRITERIA
Did you…. YES NO
2. Open Oracle VirtualBox.
2. Start SRV-1.
3. Start PC-1
4. On PC-1, change it Network settings.
5. Change Remote Settings.
6. Change Firewall Settings.
7. Join the client computer to a domain.

29
Let Us Study

3.2.7-A ADDING THE FILE SERVER ROLE

INTRODUCTION

Windows Server systems, out of the box, can be used to share folder
data right after installation. To get the most out of the system, the File
Services role should be added. Adding the File Services role not only
configures settings to optimize the system for file sharing, but also enables
the administrator to choose which file server options as well as which tools
for managing the file system will be installed.

CONFIGURING A FILE SERVER

A file server provides a repository for files that the users on your
network must access. Not only do file servers provide data access to users,
but they also often serve as a place where users can save files in either a home
directory or a directory that other users can also access. You can configure a
domain controller or a domain member server as a file server.
These are some of the important terms that you have to know for the
File Server role:
 File Server – Although not required to share files, adding this core role
service allows you to use the Share And Storage Management snap-in.
 Distributed File System – Enables sharing files using the DFS
namespace and replicating files between DFS servers. If you select this
role service, the wizard will prompt you to configure a namespace.
 File Server Resources Manager – Installs tools for generating storage
reports, configuring quotas, and defining file screening policies. If you
select this role service, the wizard will prompt you to enable storage
monitoring on the local disks.
 Services for Network File System – Provides connectivity for UNIX
client computers that use Network File System (NFS) for file sharing.
Note that most modern UNIX operating systems can connect to
standard Windows file shares, so this service is typically not required.
 Windows Search Service – Indexes files for faster searching when
clients connect to shared folders. This role service is not intended for
enterprise use. If you select this role service, the wizard will prompt you
to enable indexing on the local disks.
 Windows Server 2003 File Services – Provides services compatible
with computers running Windows Server 2003.

Whether you need a dedicated file server on the network depends on


the amount of data that must be accessed and the number of users accessing
this data. On a larger network, a dedicated file server that takes advantage of

30
a RAID 5 configuration would provide fast and dependable access for your
users.
Before configuring a server as a file server, configure the drives and
volumes that will be used to hold the shared folders. Use the NTFS file format
on your file server. This enables you to take advantage of NTFS permissions
and also monitor NTFS volumes, using the new Windows Server File Server
Resource Manager.

FILE SERVER DISK QUOTAS

The Quota Management snap-in enables you to create quotas that limit
the space allowed for a volume or folder. These quotas can be also be applied
to subfolders on a particular volume (or a particular folder).
Windows Server enables you to control and track shared volume usage
on a per-volume and per-user basis. Notifications can also be built into the
quota settings, alerting you or folder owners when a particular threshold has
been reached.
Windows Server also provides a command-line tool, fsutil, for working
with disk volumes. Its capabilities include manipulating disk quotas. For
example, fsutil quota is used to create and edit user disk quotas.
You definitely will want to spend some planning time to determine an
appropriate disk space for your users before enabling disk quotas. Quotas
can be created that are specific to a volume or folder, and you can also create
auto-apply quotas that also apply to any subfolders in a volume or folder to
which you assign the auto-apply quota.
Two types of quotas are available to you: hard quotas and soft quotas.
Hard quotas dictate a size limit that users cannot exceed. A soft quota allows
users to exceed the limit and is used to monitor volume (or folder) use by your
users.
Disk quotas can be created with the Quota Management snap-in (in the
Server Manager or the MMC, it is a subnode of the File Server Resource
Manager). Templates are provided (using various threshold settings) that can
be used to create both your "regular" quotas and you auto-apply quotas.

MANAGING THE FILE SERVER

After you have configured shares on the server, you can manage all the
parameters related to shares by using the Share and Storage Management
snap-in and the File Server Resource Manager. The Share and Storage
Management snap-in enables you to configure new shares and volumes via
the Provision Share Wizard and the Provision Storage Wizard respectively.
You can manage quotas, file screening, and storage reports via the File
Server Resource Manager. Quotas, file screening, and reports each have a
node and set of tools for creating and managing each aspect of managing
shares.
The easiest way to access all these tools in a single window is to use the
Server Manager. When the Share and Storage Management node and the File
Server Resource Manager node are expanded in the Server Manager, you can
access all the tools and wizards.

31
Let Us Practice

Self-check 5

Multiple Choice. Select the letter of your choice.

1. Quotas that dictate a size limit that users cannot exceed.


A. File Server B. Soft
C. Fsutil D. Hard
2. A repository for files that the users on your network must access.
A. File Server B. Soft
C. Fsutil D. Hard
3. Quota that allows users to exceed the limit and is used to monitor volume
(or folder) use by your users.
A. File Server B. Soft
C. Fsutil D. Hard
4. Command-line tool used in manipulating disk quotas.
A. File Server B. Soft
C. Fsutil D. Hard
5. Installs tools for generating storage reports, configuring quotas, and defining
file screening policies.
A. Distributed File System B. File Server Resource Manager
C. Services for Network File System D. Windows Search Service
6. Indexes files for faster searching when clients connect to shared folders.
A. Distributed File System B. File Server Resource Manager
C. Services for Network File System D. Windows Search Service
7. Enables sharing files using the namespace and replicating files between
servers.
A. Distributed File System B. File Server Resource Manager
C. Services for Network File System D. Windows Search Service
8. Provides connectivity for UNIX client computers that use Network File
System (NFS) for file sharing.
A. Distributed File System B. File Server Resource Manager
C. Services for Network File System D. Windows Search Service

32
Let Us Practice More

ACTIVITY SHEET
Title: Adding the File Server Role
Performance Objective: Demonstrate the ability to add the File
Server role using the Server Manager.
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedure:
1. Open the Server Manager.
2. Select Add Roles then click Next.
3. Select File Services then click Next.
4. On the Select Role Services window, make sure that the File
Services option is marked with check. Then click Next.
5. On the Confirm Installation Selections window, click Install.
6. On the Installation Results window, click Close.
Assessment Method: Portfolio assessment using the Performance Criteria
Checklist

Performance Criteria Checklist

CRITERIA
Did you…. YES NO
1. Open the Server Manager.
2. Select Add Roles then click Next.
3. Select File Services then click Next.
4. On the Select Role Services window, make sure that
the File Services option is marked with check. Then
click Next.
5. On the Confirm Installation Selections window, click
Install.
6. On the Installation Results window, click Close.

33
Let Us Study

3.2.7-B NETWORK FILE SHARING IN MICROSOFT WINDOWS

INTRODUCTION

Back in the days of old, a file server was a file server and an e-mail
server was an e-mail server and so on. In many environments today, however,
organizations are seriously exploiting the general purpose nature of modern
operating systems and deploying all kinds of services or roles to all kinds of
servers. At the core, though, file serving -- one of the original "killer-apps" that
introduced networking to many an organization -- still reigns supreme on the
needs list. Although file serving is one of the most basic functions handled by
servers, the administrative challenges and effort remain in place.

USE WINDOWS PUBLIC FOLDER SHARING

Introduced first in Windows Vista, Public is an operating system folder


specially configured for file sharing. Users can copy files and folders to this
location and, in turn, share them with other Windows (Vista or newer)
computers on the local network. Users can also allow others to update these
files or post new ones to the same location.
Public folder sharing can be enabled or disabled from the Windows
Advanced Sharing Settings page (go to Control Panel > Network and Sharing
Center > Advanced sharing settings).

UNDERSTAND WINDOWS FILE SHARING PERMISSIONS

Windows 10 and other Windows computers offer two basic permission


levels for sharing files:
 Read: Recipients can open the file and view its contents but cannot
change the file without making a separate copy.
 Read/Write: Recipients can both view and change the file contents
and save (overwrite) the file at its current location.
Windows Server and newer Windows has the option to restrict sharing
to specific people — either a specific list of people (network account names)
or a Windows HomeGroup — or to anyone on the local network.
On all versions of Windows, Advanced Security options also exist,
configurable under the Share menu of the file or folder properties. Advanced
Security supports three permission types:
 Read: Recipients can open the file and view its contents but cannot
change the file without making a separate copy.
 Change: Recipients can both view and change the file contents and
save (overwrite) the file at its current location.

34
 Full Control: Allows setting an extra level of advanced permissions
for systems running the NT file system (NTFS), used mostly on legacy
business networks.

The File Services role is added in Server Manager to enable file sharing
and install the management tools.
The effective permission for a user to access a shared folder is
the more restrictive of the least restrictive Share Permission and the least
restrictive NTFS Permission. A Deny permission for a user or a group they are
a member of always overrides Allow permissions.
Use the Share and Storage Management console to create and manage
shared folders.
Encrypting File System (EFS) is transparent to the user and works only
on NTFS; you cannot both encrypt and compress a file.

MECHANICS OF WINDOWS FILE SHARING

With the exception of Public folders that involve moving or copying a file
to a new location, sharing files in Windows involves taking specific action in
the context of the given file or folder. In Windows 10, right-click on a file or
folder in File Explorer, for example, to reveal a Give access to option.
File-sharing can fail due to permissions issues, network outages, and
other technical glitches. Use the troubleshooting wizards in the Control Panel
(under Network and Sharing Center) to diagnose problems with network
connections, shared folders, or the HomeGroup.

NON-WINDOWS AND THIRD-PARTY SHARING SOLUTIONS

Besides the sharing facilities built into Microsoft Windows, some third-
party software systems such as Dropbox also support file sharing between
Windows computers plus other non-Windows devices on the network. Consult
the documentation for these third-party packages for additional details.

HOW TO TURN OFF WINDOWS FILE SHARING

Users can turn off file and printer sharing on a computer from
the Windows Advanced Sharing Settings page. If the computer had previously
joined a homegroup, leave that group through Control Panel. Any files in
the Public folder should also be removed to prevent that form of sharing.
Finally, uninstall any third-party sharing software that may be present on the
device.

USING THE SHARE AND STORAGE MANAGEMENT SNAP-IN

Windows Server provides a new snap-in, the Share and Storage


Management snap-in, that makes it easy for you to manage network shares.
The Share and Storage Management snap-in also allows you to manage
storage disks on a server. For example, you can extend a volume, format a
volume, or delete a volume directly from the snap-in.

35
Shares can be created (or provisioned as it is defined in the Windows
2008 environment) in the Provision a Shared Folder Wizard. A share is simply
a drive or folder that you share for user access.
You can open the Share and Storage Management snap-in in the Server
Manager (expand the Roles and File Services nodes) or in the MMC (Start,
Administrative Tools, Share and Storage Management).
The Share and Storage Management snap-in provides two tabs: Shares
and Volumes. By default the shares are listed by protocol and you can use
the details buttons on the Shares tab to list the shares by other parameters
such as local path, quota, or whether or not shadow copy has been applied to
the share. You can see any existing shares on the server. This includes any
shares you may have created using other tools (such as the Computer folder)
and also shows the administrative shares.
Depending on the roles that you have configured for a server running
Windows Server, a number of administrative shares are created
automatically. These administrative shares serve as special resources related
to specific server features. You do not access these special shares as a user
would access a share providing files; instead, these administrative shares are
accessed by server processes and services.
Whereas some of these administrative shares are configured as hidden
shares, others are not. It is important that these special shares not be deleted,
moved, or renamed—doing so affects the server's functionality. Some of these
special administrative shares are listed here:
 ADMIN$— This hidden share is used during remote administration
of a computer. It serves as the path to system root.
 NETLOGON— This share is installed on domain controllers and
helps facilitate user logon.
 SYSVOL— This share serves as a domain controller resource and is
important to domain client computer functionality.
 PRINT$— This share is used when you remotely administer a
network printer.

SHARE AND STORAGE MANAGEMENT CONSOLE CAPABILITIES


With Windows Server, Microsoft has revamped the File Services role and
created the Share and Storage Management Console to help administrators
better manage storage volumes and shared folders and volumes. Here's a
short list of the major administrative tasks that can be accomplished with the
Share and Storage Management Console:
 Add or remove disks and volumes to and from the server.
 Enable or disable shared access to server resources, including files,
folders and volumes.
 Secure access to shared resources based on a variety of factors.
 View the users currently accessing a resource and, if necessary,
disconnect them.

To start the Share and Storage Management Console, go to Start |


Administrative Tools | Share and Storage Management.

36
Let Us Practice

Self-check 6

A. Multiple Choice. Write the letter of your answer on the space provided.

1. This share is installed on domain controllers and helps facilitate


user logon.
A. ADMIN$ B. PRINT$ C. NETLOGON D. SYSVOL
2. This share serves as a domain controller resource and is important
to domain client computer functionality.
A. ADMIN$ B. PRINT$ C. NETLOGON D. SYSVOL
3. This hidden share is used during remote administration of a
computer.
A. ADMIN$ B. PRINT$ C. NETLOGON D. SYSVOL
4. This share is used when you remotely administer a network printer.
A. ADMIN$ B. PRINT$ C. NETLOGON D. SYSVOL
5. Recipients can both view and change the file contents and save (overwrite)
the file at its current location.
A. Read B. Change C. Full Control D. Edit
6. Allows setting an extra level of advanced permissions for systems running
the NT file system (NTFS), used mostly on legacy business networks.
A. Read B. Change C. Full Control D. Edit
7. Recipients can open the file and view its contents but cannot change the
file without making a separate copy.
A. Read B. Change C. Full Control D. Edit

37
Let Us Practice More

ACTIVITY SHEET
Title: Creating Shared Folders

Performance Objective: Demonstrate the ability to create shared


folders on the Server
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedure:
1. Open the two virtual machines (SRV-1 and PC-1).
2. On the desktop of SRV-1, create a folder to be shared.
 Right-click on the desktop
 Choose New, New Folder
 Type the name of the new folder. Example: Share1
3. Change Sharing settings.
 Right-click the folder
 Select Properties
 Select Advanced Sharing
 Choose Share this folder
 Select Permissions
 Select Add, type Domain Users on the name box then click Ok
 Tick Allow on the Change box, then click Ok, and Ok again
4. Change Security settings.
 Select the Security tab
 Choose Edit, then Add. Type Domain Users and click Ok
 Tick Allow on the Modify box
 Click Apply then Ok
5. Click Close to complete
6. Check if the shared folder allows changes in PC-1
 Open PC-1
 Select Start
 On the Search box, type \\SRV-1 to open the shared resources of the
server.
 Open Share1 folder
 Create a new folder. (If it allows you to create a new folder, Share1 is
allows changes).
Assessment Method: Portfolio assessment using the Performance Criteria
Checklist

38
Performance Criteria Checklist

CRITERIA
Did you…. YES NO
1. Open the two virtual machines (SRV-1 and PC-1).
2. On the desktop of SRV-1, create a folder to be
shared.
3. Change Sharing settings.
4. Change Security settings.
5. Click Close to complete
6. Check if the shared folder allows changes in PC-1

39
Let Us Study

3.2.8-A ADDING PRINT AND DOCUMENT SERVICES ROLE

INTRODUCTION

Print and Document Services is a server role in Windows Server that


enables you to share printers and scanners on a network, set up print servers
and scan servers, and centralize network printer and scanner management
tasks. You can do these tasks using the Print Management and Scan
Management Microsoft Management Console (MMC) snap-ins. You can use
the snap-ins to monitor network printers and scanners, and to manage
Windows print servers and scan servers in your organization.

MANAGING PRINT AND SCAN RESOURCES

There are three primary tools that you can use to manage Windows
print servers and scan servers:
 Server Manager
 Print Management
 Scan Management

In Windows Server, you use Server Manager to install the Print and
Document Services server role and role services. These role services also
install the Print Management and Scan Management snaps-ins. The Print
Management and Scan Management snaps-ins are also available on
computers running Windows 10.
Print Management helps you to monitor print queues and receive
notifications when print queues stop processing print jobs. It also enables you
to migrate print servers and deploy printer connections using Group Policy.
Scan Management enables you to monitor network scanners and scan
servers, process scanned documents, and then route the scanned documents
to network folders, Windows SharePoint Web sites, and to e-mail recipients.

USING PRINT AND DOCUMENT SERVICES ROLE

All the printer sharing and management capabilities are available on


any Windows Server computer in its default installation configuration.
However, installing the Print And Document Services role on the
computer provides additional tools that are particularly useful to
administrators involved with network printing on an enterprise scale.
When you install the Print And Document Services role by using Server
Manager’s Add Roles And Features Wizard, a Select Role Services page
appears, enabling you to select from the following options:

40
 Print Server - Installs the Print Management console for Microsoft
Management Console (MMC), which enables administrators to
deploy, monitor, and manage printers throughout the enterprise.
 Distributed Scan - Server Enables the computer to receive
documents from network-based scanners and forward them to the
appropriate users.
 Internet Printing - Creates a website that enables users on the
Internet to send print jobs to shared Windows printers.
 LPD Service - Enables UNIX clients running the line printer remote
(LPR) program to send their print jobs to Windows printers.

As always, Windows Server adds a new icon to the Server Manager


navigation pane when you install a role. The Print Services home page
contains a filtered view of print-related event log entries, a status display for
the role-related system services and role services, and performance counters.
The Print Management console, an administrative tool, consolidates the
controls for the printing components throughout the enterprise into a single
console. By using this tool, you can access the print queues and Properties
sheets for all the network printers in the enterprise, deploy printers to client
computers by using Group Policy, and create custom views that simplify the
process of detecting print devices that need attention due to errors or depleted
consumables.

41
Windows Server installs the Print Management console when you add
the Print And Document Services role to the computer. You can also install
the console without the role by adding the Print And Document Services Tools
feature, found under Remote Server Administration Tools, Role
Administration Tools in the Add Roles And Features Wizard.

INSTALL PRINT AND DOCUMENT SERVICES

Before installing Print and Document Services in Windows Server,


consider the Printing and Scanning scenarios that your organization will
benefit from and what kind of advanced features are required. In addition to
local installation of role services, Windows Server Server Manager supports
remote installation and configuration of role services and can be used to
install Print and Document Services on a remote computer in your
organization. You can then remotely manage your print server from your local
computer. Start the Print Management console on your local computer, and
then add the remote print server to the console.

DEPLOYMENT SCENARIOS

Windows Server Print and Document Services consists of several


different role services that can be installed individually to support basic
functionality, or can be combined with other role services to provide more
advanced features. When installing Print and Document Services features to
support advanced functionality it is helpful to think of the scenarios that are
enabled by those advanced features. Windows Server Server Manager will
prompt the administrator to select the role services to be installed at the time
of installation and to choose which role services are installed on each server
in the deployment.

42
Let Us Practice

Self-check 7

Multiple Choice. Select the letter of your choice.


1. Creates a website that enables users on the Internet to send print jobs to
shared Windows printers.
A. Print Server
B. Distributed Scan
C. Internet Printing
D. LPD Service
2. Helps you to monitor print queues and receive notifications when print
queues stop processing print jobs.
A. Server Manager
B. Print Management
C. Scan Management
3. Installs the Print Management console for Microsoft Management Console
(MMC), which enables administrators to deploy, monitor, and manage
printers throughout the enterprise.
A. Print Server
B. Distributed Scan
C. Internet Printing
D. LPD Service
4. Enables you to monitor network scanners and scan servers, process
scanned documents, and then route the scanned documents to network
folders, Windows SharePoint Web sites, and to e-mail recipients.
A. Server Manager
B. Print Management
C. Scan Management
5. Enables UNIX clients running the line printer remote (LPR) program to
send their print jobs to Windows printers.
A. Print Server
B. Distributed Scan
C. Internet Printing
D. LPD Service
6. Install the Print and Document Services server role and role services.
A. Server Manager
B. Print Management
C. Scan Management
7. Server Enables the computer to receive documents from network-based
scanners and forward them to the appropriate users.
A. Print Server
B. Distributed Scan
C. Internet Printing
D. LPD Service

43
Let Us Practice More

ACTIVITY SHEET
Title: Adding the Print and Document Services
role
Performance Objective: Demonstrate the ability to the Print and
Document Services role using the Server
Manager.
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedure:
1. Open the Server Manager.
2. Select Add Roles then click Next.
3. Select Print and Document Services then click Next.
4. On the Introduction to Print and Document Services window, click
Next.
5. On the Select Role Services window, make sure that the Print Server
option is marked with check. Then click Next.
6. On the Confirm Installation Selections window, click Install.
7. On the Installation Results window, click Close.
Assessment Method: Portfolio assessment using the Performance Criteria Checklist

Performance Criteria Checklist

CRITERIA
Did you…. YES NO
1. Open the Server Manager.
2. Select Add Roles then click Next.
3. Select Print and Document Services then click
Next.
4. On the Introduction to Print and Document Services
window, click Next.
5. On the Select Role Services window, make sure that
the Print Server option is marked with check. Then
click Next.
6. On the Confirm Installation Selections window, click
Install.
7. On the Installation Results window, click Close.

44
Let Us Study

3.2.8-B ADDING PRINTERS TO A PRINT SERVER

INTRODUCTION

There are several ways on installing a printer on a Windows based


network, with a Windows 2008 (R2) Domain Controller – either a Standard
server or Enterprise server. Ideally all your printers should have a built-in
networking capability, or shared on the network from the PC they are attached
to, and you need to make sure you have downloaded all the drivers for the
different versions of Windows client on your network. When you have both 64
and 32 bit versions of a print driver it is essential to make sure that the
version numbers of the driver package are identical, otherwise it will not work.

NETWORKING PRINTING AND WINDOWS SERVER

Windows Server makes managing printers and print servers very


straightforward. It provides two tools for managing print issues: the Server
Manager and the Print Management snap-in. The Server Manager enables you
to install the Print Services role on a server and to quickly view print-related
events when the Print Services role is selected.
After the Print Services role is installed, you also have access to the
Print Management snap-in (in the Server Manager or MMC). This snap-in
enables you to install, view, and manage printers and print servers on the
network.
Before any discussion of setting up a print server and the print-related
tools, you need to know some of the terminology used for working with domain
print services. A shared printer is simply a printer that accepts print jobs from
more than one computer. Printers on the network actually fall into two
different categories, depending on where the printer is located in relation to
your network server: local printer or remote printer.
A local printer is a printer that is directly attached to a server. The
printer is only local, however, in relation to the server (to which it is
connected). This server assumes the role of print server for the printer. A
remote printer is a printer attached to a computer other than your server. You
can configure a server running Windows Server to act as the print server for
a printer that is attached to another computer on the network.
A third type of printer is used on networks: the direct-connect printer.
This printer is outfitted with an internal or external direct connection
hardware device (which acts as both a local print server and a network
interface card for the printer). A direct-connect printer is connected to the
network hub or other connectivity device by a twisted-pair cable (or the same
networking media that you use to connect the computers on your network).
Establishing a print server on the network is really just a matter of connecting

45
your printers (whether locally, remotely, or directly) to the network so that the
appropriate printer can be "identified" during the process of configuring a
server for print services.

INSTALLING A LOCAL PRINTER

Setting up a local printer is really just a matter of directly attaching the


printer to the Windows Server computer with a USB cable. Because Windows
Server embraces Plug and Play, most printers (unless you are dealing with a
fairly old legacy printer) are recognized automatically and installed by the
network operating system.
To add a plug-and-play printer to a server, connect the printer to the
server. A message box appears in the system tray letting you know that the
system is installing the device driver software. Click the message box to view
the status of the printer's driver installation. When the installation is
complete, the Driver Installation Box provides a summary of the device
(printer) installation and the status of the device.
After the printer is installed, you can view it in the Printers window.
Select Start and then Control Panel. Double-click the Printers icon to open
the Printers window. The newly installed printer appears in the list of printers
in the window's right pane. If this is the first printer installed on the server, it
is marked as the default printer for the computer.

INSTALLING DIRECT-CONNECT NETWORK PRINTERS

An alternative to attaching the printer directly to the server is attaching


the printer directly to the network. To attach the printer directly to the
network, the printer needs a network card that also provides the spooling and
processing power to handle incoming print jobs (directly connected printers
also typically have a lot more memory installed in them to avoid print buffer
overflow).
A number of manufacturers (such as Intel and Hewlett-Packard) make
both internal and external print server devices that can be installed in (or on)

46
a printer. These devices then connect directly to the network over the same
network media (such as twisted-pair cable connected to a hub or switch) that
other devices and computers on the network use.
Because TCP/IP is the default network protocol for Windows Server,
printers using direct-connect devices can be configured with an IP address
(using the configuration software that ships with the device or the printer) or
can receive an IP address from the domain's DHCP server. When a DHCP
server is used on the network, the DHCP server assigns an IP address as soon
as the direct-connect printer is attached to the network and brought online.
You can find this IP address using the DHCP snap-in; all you have to do is
examine the new leases that have been supplied to devices on the network.

MANAGING PRINTERS AND PRINT SERVERS

The Print Management snap-in (which can be accessed in the Server


Manager or the MMC) enables you to manage printers and print servers in
your domain. You can view print servers and the printers that they provide
for the domain. You can even locate (using filters) printers that currently have
print jobs and printers that are not ready (meaning paused or offline).
The Print Management snap-in allows for centralized management of
the printing environment in the domain. For example, you can use it to
quickly view the printers that are attached to a particular print server. Expand
the Print Management node and then expand the Print Servers node. Expand
the node for a print server and then click the Printers node. The printers
attached to the print server are listed in the Details pane.
A number of tasks can be accomplished from the Print Management
snap-in, including adding printers to a print server, managing device drivers,
and deploying printers via Group Policy. Let's take a look at how to add a print
server to the Print Management snap-in and then sort out some of the other
capabilities that this snap-in provides for managing printers.

47
Let Us Practice

Self-check 8

True or False. Write T if the statement is True and F if False.

____ 1. The Server Manager enables you to install the Print Services role on a
server and to quickly view print-related events when the Print Services
role is selected.
____ 2. A remote printer is a printer that is directly attached to a server.
____ 3. A number of manufacturers (such as Intel and Hewlett-Packard) make
both internal and external print server devices that can be installed in
(or on) a printer.
____ 4. A direct-connect printer is a printer attached to a computer other than
your server.
____ 5. After the printer is installed, you can view it in the Printers window.
Select Start and then Control Panel.
____ 6. Remote printer is outfitted with an internal or external direct
connection hardware device (which acts as both a local print server
and a network interface card for the printer).
____ 7. The Print Management snap-in allows for centralized management of
the printing environment in the domain.

48
Let Us Practice More

ACTIVITY SHEET
Title: Adding a Printer to a Print Server

Performance Objective: Demonstrate the ability to add a printer to a


Print Server using the Print Management tool
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedure:
1. Open the Print Management tool.
 Click Start, Administrative Tools and Print Management.
2. Open the Print Servers node.
 Click Print Servers.
3. Expand node of the name of the server that you are using.
 Click SRV-1 (local)
4. Open Printers node.
 Click Printers
5. Add a printer
 Right-click on the empty space on the right side of the node
 Select Add a new printer using existing port (LPT1: Printer port),
the hit Next
 Select Install a new driver then hit Next
 Select intended printer to install. Example: HP Laserjet 4100
Series then hit Next
 Change the Printer Name if necessary. Example: Front Office
Printer then hit Next
 On the Printer Found window, hit Next
6. Click Finish to close.

Assessment Method: Portfolio assessment using the Performance Criteria


Checklist

49
Performance Criteria Checklist

CRITERIA
Did you…. YES NO
1. Open the Print Management tool.
2. Open the Print Servers node.
3. Expand node of the name of the server that you are
using.
4. Open Printers node.
5. Add a printer
6. Click Finish to close.

50
Let Us Remember

 Dynamic Host Configuration Protocol (DHCP) is an extremely powerful


and popular mechanism by which IP addresses and other related
network information are dynamically assigned to network clients when
they are attached to a network..Servers supports multiple processors.
 If a DHCP server is to operate within an Active Directory domain (and is
not running on a domain controller) it must first be authorized.
 When you create a domain, the Computers container is created by
default.
 When a computer is joined to a domain, it doesn’t use its own local user
accounts.
 A user needs a domain user account to log on to a domain.
 A file server provides a repository for files that the users on your
network must access.
 The Quota Management snap-in enables you to create quotas that limit
the space allowed for a volume or folder.
 Introduced first in Windows Vista, Public is an operating system folder
specially configured for file sharing.
 Windows Server provides the Share and Storage Management snap-in,
that makes it easy for you to manage network shares and also allows
you to manage storage disks on a server
 Print and Document Services is a server role in Windows Server that
enables you to share printers and scanners on a network, set up print
servers and scan servers, and centralize network printer and scanner
management tasks.
 Print Services includes the following options: Print Server, Distributed
Scan, Internet Printing and LPD Services.
 A local printer is a printer that is directly attached to a server.
 A remote printer is a printer attached to a computer other than your
server.
 A direct-connect printer is connected to the network hub or other
connectivity device by a twisted-pair cable (or the same networking
media that you use to connect the computers on your network).

51
Let Us Assess!

ACTIVITY SHEET
Title: Create a new Virtual Machine, Join this to
the domain, Create a shared folder and Add
a printer to the Print Server.
Performance Objective: In this activity, you should be able to create
a new Virtual Machine and join this to the
domain, create a shared folder, and add a
printer to the Print Server.
Supplies/Materials:
Equipment/Tool: Computer with VirtualBox and the two VMs
Steps/Procedures:

1. Apply the necessary occupational health and safety policies.


2. Gather all the materials and equipment needed for the installation.
3. Create a new Virtual Machine to be joined to the Domain.
Name : PC-2
Type : Microsoft Windows
Version: Windows 10 (64 bit)
Memory Size: 512 MB
Hard Drive : 40 GB

Edition : Ultimate
Partitions: 1st Partition (Partition 2) size = 20530
2nd Partition (Partition 3) size = remaining disk space
User Name: Client2
Password : 123456

4. Setup VirtualBox Settings to connect this virtual machine to SRV-1.


5. Joint PC-2 to the Domain.
6. Create a shared folder in SRV-1 named Share3
7. Add a printer to the Printer Server of SRV-1.
Printer Desc: Epson LX-300+ II
Printer Name: CSS Printer

8. Follow the 5S and 3R procedure.


Assessment Method: Refer to the Performance Criteria Checklist

52
Performance Criteria Checklist

CRITERIA Yes No
Did you…..?
1. Apply the necessary occupational health and safety
policies.

2. Gather all the materials and equipment needed for


the installation.
3. Create a new Virtual Machine to be joined to the
Domain.
4. Setup VirtualBox Settings to connect this virtual
machine to SRV-1.

5. Joint PC-2 to the Domain.

6. Create a shared folder in SRV-1 named Share3

7. Add a printer to the Printer Server of SRV-1

8. Follow the 5S and 3Rs procedure.

53
Let Us Reflect

 DHCP can be used not just to provide clients with an IP address, but
also additional information such as the name of the parent domain
and the IP addresses of both preferred and alternate DNS servers.
 A DHCP scope is a valid range of IP addresses that are available for
assignment or lease to client computers on a particular subnet.
 Before you can log on to a computer with a domain account, that
computer must belong to the domain.
 You should consider creating at least two OUs for computer objects:
one to host clients computer accounts and another for servers.
 Every Windows computer not joined to a domain is part of a
workgroup. A workgroup is a group of computers on the same local
network.
 Adding the File Services role not only configures settings to optimize
the system for file sharing, but also enables the administrator to
choose which file server options as well as which tools for managing
the file system will be installed.
 Disk quotas can be created with the Quota Management snap-in (in
the Server Manager or the MMC, it is a subnode of the File Server
Resource Manager).
 The effective permission for a user to access a shared folder is
the more restrictive of the least restrictive Share Permission and the
least restrictive NTFS Permission.
 Installing the Print And Document Services role on the computer
provides additional tools that are particularly useful to administrators
involved with network printing on an enterprise scale.
 There are several ways on installing a printer on a Windows based
network, with a Windows 2008 (R2) Domain Controller – either a
Standard server or Enterprise server.
 The Print Management snap-in allows for centralized management of
the printing environment in the domain.

54
References
1. Windows Server 2008 for Dummies, Ed Tittel and Justin Korelc,
Wiley Publishing, Inc., 2008
2. Windows Server 2008 R2 Unleashed, Alex Lewis-Colin Spence-Jeff
Guillet-Jon Skoog-Stefan Garaygay and Tyson Kopczynski, Pearson
Education Inc., January 2010
3. Introducing Windows Server 2008 R2, Charlie Russel and Craig
Zacker, Microsoft Press, 2010
4. Sams Teach Yourself Windows Server 2008 in 24 Hours, Joe
Habraken, Sams Publishing, May 14, 2008
5. https://docs.microsoft.com/en-us/windows-server/identity/ad-
ds/get-started/virtual-dc/active-directory-domain-services-overview
6. https://www.computerweekly.com/de/definition/Domain-
Controller-Promoter-DCPromo
7. https://www.techotopia.com/index.php/Windows_Server_2008_R2_
Remote_Desktop_(RD)_Services#:~:text=Remote%20Desktop%20Serv
ices%20provides%20both,is%20displayed%20on%20the%20client.&t
ext=Remote%20applications%20are%20covered%20in,on%20Windo
ws%20Server%202008%20R2.
8. https://www.computerperformance.co.uk/longhorn/server-2008-
features-services-2/
9. https://searchwindowsserver.techtarget.com/definition/organizatio
nal-unit-OU
10. https://kb.iu.edu/d/atvu
11. https://www.varonis.com/blog/the-difference-between-
organizational-units-and-active-directory-groups/
12. https://networkencyclopedia.com/object-in-active-directory/
13. https://www.sciencedirect.com/topics/computer-science/file-
service-role
14. https://www.free-online-training-courses.com/installing-the-file-
server-role/
15. https://petri.com/windows-2008-print-server-management
16. https://www.techrepublic.com/blog/the-enterprise-cloud/using-
the-share-and-storage-management-console-in-windows-server-
2008/
17. https://www.lifewire.com/network-file-sharing-in-microsoft-
windows-818219
18. http://winintro.ru/pmc.en/html/12485e2d-bf0f-4640-
96b7f29fa19025f5.htm#:~:text=Print%20and%20Document%20Servi
ces%20is,printer%20and%20scanner%20management%20tasks.
19. https://www.techveze.com/using-print-document-services-role/
20. https://docs.microsoft.com/en-us/previous-versions/windows/it-
pro/windows-server-2012-r2-and-
2012/jj134159(v=ws.11)
21. https://www.techotopia.com/index.php/Setting_Up_a_Windows_Ser
ver_2008_R2_Print_Server

55

You might also like