COMPETENCY-BASED LEARNING MATERIALS
Sector: Electronics
Qualification Title: Computer System Servicing NC II
Unit of Competency: Set-up Computer Servers
Module Title: Setting-Up Computer Servers
Developed by: ICGI Trainer
Technical Education & Skills Development Authority
I Connect Global Institute, Inc.
Ocampo, Camarines Sur
HOW TO USE THIS COMPETENCY-BASED LEARNING
MATERIALS
Welcome to the module “Setting-Up Computer Servers”. This module
contains training materials and activities for you to complete.
The unit of competency “Set-Up Computer Servers” contains the
knowledge, skills and attitudes required for Computer System Servicing
required to obtain the National Certificate (NC) level II.
You are required to go through a series of learning activities in order to
complete each of the learning outcomes of the module. In each learning
outcome there are Information Sheets. Do these activities on your own and
answer the self-checks at the end of each Information Sheet. You also have
to perform the Operation/Task/Job Sheets and afterwards, you have to
evaluate your own performance using the performance criteria checklists.
If you have questions, don’t hesitate to ask your Trainer for assistance.
Recognition of Prior Learning (RPL)
If you have already some knowledge and skills covered in this module
because you have been working for some time; or already completed training
in this area; or if you can demonstrate competence to your Trainer in a
particular skill, talk to your Trainer so you don’t have to undergo the same
training again. If you have a qualification or Certificate of Competency from
previous trainings show it to him/her. If the skills you acquired are
consistent with and relevant to this module, they become part of the
evidence. You can present these for RPL. If you are not sure about your
competence skills, discuss this with your Trainer.
After completing this module, ask your Trainer to assess your
competence. Result of your assessment will be recorded in the Achievement
Chart/Progress Chart. All the learning activities are designed for you to
complete at your own pace.
In this module, you will find the activities for you to complete and
relevant information sheets for each learning outcome. Each learning
outcome may have more than one learning activity.
This module is prepared to help you achieve the required competency, in
receiving and relaying information. This will be the source of information
that will enable you to acquire the knowledge and skills in Setting-Up
Computer Servers independently at your own pace with minimum
supervision from your Trainer.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Computer System Servicing NC II
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
No. Unit of Competency Module Title Code
Installing and
Install and Configure ELC724331
1. Configuring Computer
Computer Systems
Systems
Set-up Computer Setting-Up Computer ELC724332
2.
Networks Networks
Set-up Computer Setting-Up Computer ELC724333
3.
Servers Servers
Maintain and Repair Maintaining and
ELC724334
4. Computer Systems and Repairing Computer
Networks Systems and Networks
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
MODULE CONTENT
UNIT OF COMPETENCY: Set-Up Computer Servers
MODULE TITLE: Setting-Up Computer Servers
MODULE DESCRIPTOR: This unit covers the knowledge, skills and
attitudes needed to set-up computer
servers for LANs and SOHO systems. It
consists of competencies to set-up user
access and configures network services as
well as to perform testing, documentation
and pre-deployment procedures.
NOMINAL DURATION: 40 Hours
LEARNING OUTCOMES:
Upon completion of this module the students/trainees must be able
to:
LO1. Set-up user access
LO2. Configure network services
LO3. Perform testing, documentation and pre-deployment procedures
LEARNING OUTCOME NO. 1
Set-up User Access
ASSESSMENT CRITERIA:
1. User folder is created in accordance with network operating system
(NOS) features
2. User access level is configured based on NOS features and
established network access policies/end-user requirements.
3. Security check is performed in accordance with established
network access policies/end-user requirements
Contents:
1. Network operating system (NOS) features
2. Computer servers and functions
3. Types of Network services
4. User access level configuration
5. Installing Active Directory Domain Services on Windows Server
2008 R2 Enterprise 64-bit.
6. Install DHCP Role And Configure
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
7. Create Users and User Templates in Windows Server 2008 Active
Directory
Conditions
The students/trainees must be provided with the following:
1. Computer system:
- Servers
- Workstations
- Printers
2. Configured Computer Network
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Information Sheet 3.1-1
INSTALLING ACTIVE DIRECTORY DOMAIN SERVICES ON
WINDOWS SERVER 2008 R2 ENTERPRISE 64-BIT
This article provides prerequisites and steps for installing Active Directory
Domain Services (AD DS) on Microsoft Windows Server 2008 R2 Enterprise
64-bit (W2K8).
This article does not provide instructions for adding a Domain Controller
(DC) to an already existing Active Directory Forest Infrastructure.
Prepare for Active Directory
Before you install AD DS on a Rackspace Cloud Server running Windows
Server 2008 R2 Enterprise 64-bit (W2K8), you must perform the following
prerequisite tasks.
Select Domain Name and Password
Select your domain name and know the domain administrator password
that you want to use.
Note: Your domain name should be reliably unique. Do not use the same
domain as your website, for example, and avoid extensions like ―.local‖
unless you have registered that domain name in DNS. We suggest a domain
name that is not used for anything else, like "internal.example.com"..
Specify the Preferred DNS Server
Windows Server 2008 can properly install and configure DNS during the AD
DS installation if it knows that the DNS is local. You can accomplish this by
having the private network adapter’s preferred DNS server address point to
the already assigned IP address of the same private network adapter, as
follows:
1. From the Windows Start menu, open Administrative Tools > Server
Manager.
2. In the Server Summary section of the Server Manager window, click
View Network Connections.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
3. In the Network Connections window, right-click the private adapter
and select Properties.
4. Select Internet Protocol Version 4, and then click Properties.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
5. Copy the IP address that is displayed in the IP address box and paste
it into the Preferred DNS server box. Then, click OK.
6. Click OK in the Properties dialog box, and close the Network
Connections window.
Note: The last step for prepping W2K8 for AD is adding the proper Server
Role. The ―Active Directory Domain Services‖ Role will be added. This only
installs the framework for W2K8 to become a DC and run AD. It does not
promote the server to DC or install AD.
Add the Active Directory Domain Services Role
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Adding the Active Directory Domain Services role installs the framework for
Windows Server 2008 to become a DC and run AD DS. It does not promote
the server to a DC or install AD DS.
1. In the Server Manager window, open the Roles directory and in the
Roles Summary section, click Add Roles.
2. On the Before You Begin page of the Add Roles Wizard, click Next.
3. On the Select Server Roles page, select the Active Directory Domain
Services check box, and then click Next on this page and on the
Confirmation page.
4. On the Installation Progress page, click Install.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
5. On the Results page, after the role is successfully added, click Close.
Enable the Remote Registry
1. Open the Server Manager window if it is not already open.
2. In the Properties area of the Local Servers page, click Remote
Management.
3. Select the Enable remote management of this server from other
computers check box.
Install Active Directory Domain Services (DCPROMO)
Now that you have prepared the server, you can install AD DS.
Tip: As an alternative to performing steps 1 through 3, you can type
dcpromo.exe at the command prompt. Then, skip to step 4.
1. If it is not already open, open the Server Manager window.
2. Select Roles > Active Directory Domain Services.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
3. In the Summary section,click Run the Active Directory Domain
Services Installation Wizard (dcpromo.exe). or Open RUN and Type
DCPROMO
4. On the Welcome page of the Active Directory Domain Services
Installation Wizard, ensure that the Use advanced mode installation
check box is cleared, and then click Next.
5. On the Operating System Capability page, click Next.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
6. On the Choose a Deployment Configuration page, select Create a new
domain in a new forest and then click Next.
7. On the Name the Forest Root Domain page, enter the domain name
that you choose during preparation steps. Then, click Next.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
8. After the installation verifies the NetBIOS name, on the Set Forest
Functional Level page, select Windows Server 2008 R2 in the Forest
function level list. Then, click Next.
The installation examines and verifies your DNS setting.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
9. On the Additional Domain Controller Options page, ensure that the
DNS server check box is selected, and then click Next.
10. In the message dialog box that appears, click Yes.
11. On the Location for Database, Log Files, and SYSVOL page,
accept the default values and then click Next.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
12. On the Directory Services Restore Mode Administrator Password
page, enter the domain administrator password that you chose during
the preparation steps. This is not your admin password that was
emailed to you during the creation of your server, although you can
use that password if you want to. Then, click Next.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
13. On the Summary page, review your selections and then click
Next. The installation begins.
14. If you want the server to restart automatically after the
installation is completed, select the Reboot on completion check box.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
15. If you did not select the Reboot on completion check box, click
Finish in the wizard. Then, restart the server.
16. After a few minutes, reconnect to your server by using the
Console in your Control Panel or RDP.
17. To log in, perform the following steps:
a. Click Switch User, and then click Other User.
b. For the user, enter the full domain name that you chose, followed
by a back slash and Administrator (for example,
Example.com\Administrator).
c. Enter the password that was emailed to you when you first built the
server. If you changed your password
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
for the local admin account to this server before you began the
installation of Active Directory Domain Services, use that password.
d. Click the log in button.
The installation of Active Directory Domain Services on your server is
complete.
STEP BY STEP GUIDE TO INSTALL DHCP ROLE AND CONFIGURE
To start first need to log in to the server with administrator privileges. Then
start the ―server Manager‖ by clicking on ―Server Manager‖ icon on task bar.
Then go to ―Roles‖
Then click on ―Add Roles‖ option to open Add roles Wizard.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Then it will load the Roles Wizard and select the ―DHCP Server‖ From the list
and click next to continue.
Then it will give description about the role. Click next to continue.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Next window is asking to use which interface to serve DHCP clients. If server
has multiple NIC with multiple IP you can add them also to serve DHCP
clients.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
In next window it will give opportunity to add DNS settings that should
apply for DHCP clients.
Next window is to define the WINS server details.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
In next window we can add the scope, the Starting IP, End IP of the DHCP
range, subnet mask, default gateway, leased time etc.
In next Window it can configure to support IPv6 as well.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Then it will give the confirmation window before begin the install. Click on
―Install‖
Once installation finishes DHCP server interface can open from Start >
Administrative Tools > DHCP
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Using the DHCP it is possible to even configure multiple Scopes
configurations to the network. In a network there can be different network
segments. It is waste to setup different DHCP servers for each segment.
Instead of that it is possible to create different Scopes to issue DHCP for
them.
How to Create Users and User Templates in Windows Server 2008
Active Directory
You probably already know that a User Account in Active Directory is an
Active Directory Object, or simply said, a record in an AD database. Most of
the time we create user accounts for people, however user accounts can also
be created for applications or processes.
User accounts allow a person to access resources on a network. But we can
just as easily deny access to certain resources on the network through the
user account. That’s why, User Account Objects are quite important and
very useful.
User Groups and Organizational Units. Now, let’s get started with creating a
user account.
How To Create a New User Account in Active Directory
1. To start let’s go ahead and open up Server Manager
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
2. Next we will open up the Roles section, next to Active Directory Users
and Computers section and finally the Active Directory Users and
Computers. You should now see your domain name.
3. We are going to click on our Users section where we are going to create a
new User Account. To do so, right-click on the blank section, point
to New and select User.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
4. In this window you need to type in the user’s first name, middle initial
and last name. Next you will need to create a user’s logon name.
In our example we are going to create a user account for Billy Miles and his
logon name will be bmiles. When done, click on the Next button.
5. In the next window you will need to create a password for your new user
and select appropriate options.
In our example we are going to have the user change his password at his
next logon. You can also prevent a user from changing his password, set the
password so that it will never expire or completely disable the account.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
When you are done making your selections, click the Next button.
6. And finally, click on the Finish button to complete the creation of new
User Account.
How To Create a User Template in Active Directory
A user template in Active Directory will make your life a little easier,
especially if you are creating users for a specific department, with exactly
the same properties, and membership to the same user groups. A user
template is nothing more than a disabled user account that has all these
settings already in place. The only thing you are doing is copying this
account, adding a new name and a password.
You may have multiple user templates for multiple purposes with different
settings and properties. There is no limit on the number of user templates,
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
but keep in mind that they are there to help you, not to confuse you, so
keep in mind less is better.
To create a user template, we are going to create a regular user account just
like we did above. A little note here, you may want to add an * as the first
character of the name so it floats at the top in AD and is much easier to
find.
1. To start out, right-click on the empty space, point to new, and select
User.
2. Type in the user’s name (with asterisks if so desired) and click Next.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
3. Create the template’s password and do not forget to check the box next to
the Account is disabled option. When ready, click Next.
4. Once the account is created, you can go ahead and add all the properties
you need for that template. To do so, double-click on that account and
navigate to a specific tab. Once done click OK.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
How To Use a User Template in Active Directory
1. Now in order to use that user template, we are going to select it, copy it
and add the unique information such as user name, password, etc.
We can do that for as many users as needed. Let’s start by right-clicking on
the template and selecting Copy.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
2. Next we are going to enter the user’s name, login and password
information while making sure the checkbox next to Account is disabled is
unchecked.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
3. Once we finish, our new user account is created with all the properties of
the template account. Now wasn’t that easy!
Group Policy in Windows 2008 Server R2
Overview of Group Policy
Group Policy is simply the easiest way to reach out and configure computer
and user settings on networks based on Active Directory Domain Services
(AD DS). If your business is not using Group Policy, you are missing a huge
opportunity to reduce costs, control configurations, keep users productive
and happy, and harden security. Think of Group Policy as ―touch once,
configure many.‖
The requirements for using Group Policy and following the instructions that
this white paper provides are straightforward:
The network must be based on AD DS (that is, at least one server must have
the AD DS role installed). To learn more about AD DS, see Active Directory
Domain Services Overview on TechNet.
Computers that you want to manage must be joined to the domain, and
users that you want to manage must use domain credentials to log on to
their computers.
You must have permission to edit Group Policy in the domain.
Although this white paper focuses on using Group Policy in AD DS, you can
also configure Group Policy settings locally on each computer. This
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
capability is great for one-off scenarios or workgroup computers, but using
local Group Policy is not recommended for business networks based on AD
DS. The reason is simple: Domain-based Group Policy centralizes
management, so you can touch many computers from one place. Local
Group Policy requires that you touch each computer—not an ideal scenario
in a large environment. For more information about configuring local Group
Policy, see Local Group Policy Editor on TechNet.
Windows 7 enforces the policy settings that you define by using Group
Policy. In most cases, it disables the user interface for those settings.
Additionally, because Windows 7 stores Group Policy settings in secure
locations in the registry, standard user accounts cannot change those
settings. So, by touching a setting one time, you can configure and enforce
that setting on many computers. When a setting no longer applies to a
computer or user, Group Policy removes the policy setting, restoring the
original setting and enabling its user interface. The functionality is all quite
amazing and extremely powerful.
Essential Group Policy Concepts
You can manage all aspects of Group Policy by using the Group Policy
Management Console (GPMC). Figure 1 shows the GPMC, and this white
paper will refer to this figure many times as you learn about important
Group Policy concepts.
Figure1. Group Policy Management Console
You start the GPMC from the Start menu: Click Start, All Programs,
Administrative Tools, Group Policy Management. You can also click Start,
type Group Policy Management, and then click Group Policy Management in
the Programs section of the Start menu. Windows Server 2008 and Windows
Server 2008 R2 include the GPMC when they are running the AD DS role.
Otherwise, you can install the GPMC on Windows Server 2008, Windows
Server 2008 R2, or Windows 7 as described in the section ―Installing the
GPMC in Windows 7,‖ later in this white paper.
Group Policy objects
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
GPOs contain policy settings. You can think of GPOs as policy documents
that apply their settings to the computers and users within their control. If
GPOs are policy documents, then the GPMC is like Windows Explorer. You
use the GPMC to create, move, and delete GPOs just as you use Windows
Explorer to create, move, and delete files.
In the GPMC, you see all the domain’s GPOs in the Group Policy objects
folder. In Figure 1, the callout number 1 shows three GPOs for the domain
corp.contoso.com domain. These GPOs are:
Accounting Security. This is a custom GPO created specifically for Contoso,
Ltd.
Default Domain Controller Policy. Installing the AD DS server role creates
this policy by default. It contains policy settings that apply specifically to
domain controllers.
Default Domain Policy. Installing the AD DS server role creates this policy by
default. It contains policy settings that apply to all computers and users in
the domain.
Group Policy Links
At the top level of AD DS are sites and domains. Simple implementations
will have a single site and a single domain. Within a domain, you can create
organizational units (OUs). OUs are like folders in Windows Explorer.
Instead of containing files and subfolders, however, they can contain
computers, users, and other objects.
For example, in Figure 1 you see an OU named Departments. Below the
Departments OU, you see four subfolders: Accounting, Engineering,
Management, and Marketing. These are child OUs. Other than the Domain
Controllers OU that you see in Figure 1, nothing else in the figure is an OU.
What does this have to do with Group Policy links? Well, GPOs in the Group
Policy objects folder have no impact unless you link them to a site, domain,
or OU. When you link a GPO to a container, Group Policy applies the GPO’s
settings to the computers and users in that container. In Figure 1, the
callout number 1 points to two GPOs linked to OUs:
The first GPO is named Default Domain Policy, and this GPO is linked to the
domain corp.contoso.com. This GPO applies to every computer and user in
the domain.
The second GPO is named Accounting Security, and this GPO is linked to
the OU named Accounting. This GPO applies to every computer and user in
the Accounting OU.
In the GPMC, you can create GPOs in the Group Policy objects folder and
then link them—two steps. You can also create and link a GPO in one step.
Most of the time, you will simply create and link a GPO in a single step,
which the section ―Creating a GPO,‖ later in this white paper, describes.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Group Policy Inheritance
As the previous section hinted, when you link a GPO to the domain, the
GPO applies to the computers and users in every OU and child OU in the
domain. Likewise, when you link a GPO to an OU, the GPO applies to the
computers and users in every child OU. This concept is called inheritance.
For example, if you create a GPO named Windows Firewall Settings and link
it to the corp.contoso.com domain in Figure 1, the settings in that GPO
apply to all of the OUs you see in the figure: Departments, Accounting,
Engineering, Management, Marketing, and Domain Controllers. If instead
you link the GPO to the Departments OU, the settings in the GPO apply only
to the Departments, Accounting, Engineering, Management, and Marketing
OUs. It does not apply to the entire domain or the Domain Controllers OU.
Moving down one level, if you link the same GPO to the Accounting OU in
Figure 1, the settings in the GPO apply only to the Accounting OU, as it has
no child OUs. In the GPMC, you can see what GPOs a container is inheriting
by clicking the Group Policy Inheritance tab (callout number 1 in Figure 2).
Figure 2. Group Policy inheritance and precedence
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
So, what happens if multiple GPOs contain the same setting? This is where
order of precedence comes into play. In general, the order in which Group
Policy applies GPOs determines precedence. The order is site, domain, OU,
and child OUs. As a result, GPOs in child OUs have a higher precedence
than GPOs linked to parent OUs, which have a higher precedence than
GPOs linked to the domain, which have a higher precedence than GPOs
linked to the site. An easy way to think of this is that Group Policy applies
GPOs from the top down, overwriting settings along the way. In more
advanced scenarios, however, you can override the order of precedence.
You can also have—within a single OU—multiple GPOs that contain the
same setting. Like before, the order in which Group Policy applies GPOs
determines the order of precedence. In Figure 2, you see two GPOs linked to
the domain corp.contoso.com: Windows Firewall Settings and Default
Domain Policy. Group Policy applies GPOs with a lower link order after
applying GPOs with a higher link order. In this case, it will apply Windows
Firewall Settings after Default Domain Policy. Just remember that a link
order of 1 is first priority, and a link order of 2 is second priority. You can
change the link order for a container by clicking the up and down arrows as
shown by callout number 2 in Figure 2.
Group Policy Settings
To this point, you have learned about GPOs. You have learned that GPMC is
to GPOs and OUs as Windows Explorer is to files and folders. GPOs are the
policy documents. At some point, you are going to have to edit one of those
documents, though, and the editor you use is the Group Policy Management
Editor (GPME), which Figure 3 shows. You open a GPO in the GPME by
right-clicking it in the GPMC and clicking Edit. Once you are finished, you
simply close the window. The GPME saves your changes automatically, so
you do not have to save.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Figure 3. Group Policy Management Editor
In Figure 3, callout numbers 1 and 2 point to Computer Configuration and
User Configuration, respectively. The Computer Configuration folder
contains settings that apply to computers, regardless of which users log on
to them. These tend to be system and security settings that configure and
control the computer. The User Configuration folder contains settings that
apply to users, regardless of which computer they use. These tend to affect
the user experience.
Within the Computer Configuration and User Configuration folders, you see
two subfolders (callout numbers 3 and 4 in Figure 3):
Policies. Policies contains policy settings that Group Policy enforces.
Preferences. Preferences contains preference settings that you can use to
change almost any registry setting, file, folder, or other item. By using
preference settings, you can configure applications and Windows features
that are not Group Policy–aware. For example, you can create a preference
setting that configures a registry value for a third-party application, deletes
the Sample Pictures folder from user profiles, or configures an .ini file. You
can also choose whether Group Policy enforces each preference setting or
not. However, standard user accounts can change most preference settings
that you define in the User Configuration folder between Group Policy
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
refreshes. You can learn more about preference settings by reading the
Group Policy Preferences Overview.
When you are first learning Group Policy, most of the settings that you will
configure will be in the Administrative Templates folders. These are registry-
based policy settings that Group Policy enforces. They are different from
other policy settings for two reasons. First, Group Policy stores these
settings in specific registry locations, called the Policies branches, which
standard user accounts cannot change. Group Policy–aware Windows
features and applications look for these settings in the registry. If they find
these policy settings, they use the policy settings instead of the regular
settings. They often disable the user interface for those settings as well.
Second, administrative template files, which have the .admx extension,
define templates for these settings. These templates not only define where
policy settings go in the registry but also describe how to prompt for them in
the GPME. In the Group Policy setting that Figure 4 shows, for example, an
administrative template file defines help text, available options, supported
operating systems, and so on.
Figure 4. Group Policy setting
When you edit a policy setting, you are usually confronted with the choices
that callout numbers 1 to 3 indicate in Figure 4. In general, clicking:
Enabled writes the policy setting to the registry with a value that enables it.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Disabled writes the policy setting to the registry with a value that disables it.
Not Configured leaves the policy setting undefined. Group Policy does not
write the policy setting to the registry, and so it has no impact on computers
or users.
Generalizing what enabled and disabled means for every policy setting is not
possible. You can usually read the help text, shown in callout number 5, to
determine exactly what these choices mean. You must also be careful to
read the name of the policy setting. For example, some policy settings say,
―Turn on feature X,‖ whereas other policy settings say, ―Turn off feature Y.‖
Enabled and disabled have different meanings in each case. Until you are
comfortable, make sure you read the help text for policy settings you
configure.
Some policy settings have additional options that you can configure. Callout
number 4 in Figure 4 shows the options that are available for the Group
Policy refresh interval policy setting. In most cases, the default values match
the default values for Windows. As well, the help text usually gives detailed
information about the options you can configure.
Group Policy Refresh
As you learned in the previous section, GPOs contain both computer and
user settings. Group Policy applies: Computer settings when Windows
starts. User settings after the user logs on to the computer.
Group Policy also refreshes GPOs on a regular basis, ensuring that Group
Policy applies new and changed GPOs without waiting for the computer to
restart or the user to log off. The period of time between these refreshes is
called the Group Policy refresh interval, and the default is 90 minutes with a
bit of randomness built in to prevent all computers from refreshing at the
same time. If you change a GPO in the middle of the day, Group Policy will
apply your changes within about 90 minutes. You don’t have to wait until
the end of the day, when users have logged off of or restarted their
computers. In advanced scenarios, you can change the default refresh
interval.
Essential Group Policy Tasks
You have now learned the essential Group Policy concepts. You know that a
GPO is like a document that contains policy settings. You manage GPOs by
using the GPMC and you edit them by using the GPME.
You also know that you link GPOs to AD DS sites, domains, and OUs to
apply the GPOs’ settings to those containers. Domains, OUs, and child OUs
inherit settings from their parents, but duplicate settings in GPOs linked to
child OUs have precedence over the same settings in GPOs linked to parent
OUs, which have precedence over GPOs linked to the domain, and so on.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
You also know that within a site, domain, or OU, the link order determines
the order of precedence (the smaller the number, the higher the precedence).
Last, you have an essential understanding of how to edit GPOs and what
types of settings they contain.
Now that you know the essential concepts, you are ready to learn the
essential tasks. This section describes how to create, edit, and delete GPOs.
It describes many other tasks, as well. For each task, you’ll find an
explanation of its purpose and step-by-step instructions with screenshots at
each step.
Creating a GPO
You create a GPO by using the GPMC. There are two ways to create a GPO:
Create and link a GPO in one step.
Create a GPO in the Group Policy objects folder, and then link it to the
domain or OU.
The instructions in this section describe how to create and link a GPO in
one step.
You can start with a blank GPO, which the instructions describe, or you can
use a starter GPO. Starter GPOs are an advanced topic that you can learn
about in Working with Starter GPOs.
To create and link a GPO in the domain or an OU
In the GPMC, right-click
the domain or OU in
which you want to create
and link a GPO, and
click Create a GPO in
this domain, and Link
it here.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
In the Name box on
the New GPO dialog box,
type a descriptive name
for the GPO, and then
click OK.
Editing a GPO
In the GPMC, you can open GPOs in the GPME to edit them within any
container. To see all of your GPOs, regardless of where you link them, use
the Group Policy objects folder to edit them.
To edit a GPO in the domain, an OU, or the Group Policy objects folder
In the left pane of the GPMC,
click Group Policy objects to
display all the domain’s GPOs
in the right pane. Alternatively,
you can click the domain or
any OU to display that
container’s GPOs in the right
pane.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
In the right pane of the GPMC,
right-click the GPO that you
want to edit, and click Edit to
open the GPO in the GPME.
In the GPME, edit the Group
Policy settings that you want to
change, and close the GPME
window when finished. You do
not have to save your changes,
because the GPME saves your
changes automatically.
Linking a GPO
If you create and link GPOs in one step, you do not have to manually link
GPOs to the domain or OUs. However, if you create a GPO in the Group
Policy objects folder or unlink a GPO and want to restore it, you will need to
manually link the GPO. The easy way to link a GPO is to simply drag the
GPO from the Group Policy objects folder and drop it onto the domain or OU
to which you want to link it.
To link a GPO to a domain or OU
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
In the GPMC, right-click the
domain or OU to which you
want to link the GPO, and then
click Link an Existing GPO.
In the Select GPO dialog box,
click the GPO that you want to
link to the domain or OU, and
then click OK.
Updating Clients
While editing, testing, or troubleshooting GPOs, you do not need to wait for
the Group Policy refresh interval (90 minutes, by default). You can manually
update Group Policy on any client computer by running Gpupdate.exe.
Gpupdate.exe supports many command-line options, which you can learn
about by typing gpupdate.exe /? in a Command Prompt windows In most
cases, however, you can follow the instructions in this section to update
Group Policy.
To manually update Group Policy by using Gpupdate.exe
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Click Start, type cmd, and
press Enter to open a
Command Prompt window.
At the Command Prompt, type
update and press Enter.
Gpupdate.exe will update any
changed settings. You can
force Gpupdate.exe to update
all settings, whether or not
they have changed recently, by
typing update /force and
pressing Enter.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
LEARNING OUTCOME NO. 2
Configure Network Services
ASSESSMENT CRITERIA:
1. Normal functions of server are checked in accordance with
manufacturer’s instructions
2. Required modules /add-ons are installed/updated based on NOS
installation procedures
3. Network services to be configured are confirmed based on
user/system requirements
4. Operation of network services are checked based on user/system
requirements
5. Unplanned events or conditions are responded to in accordance
with established procedures
Contents:
1. Network services configuration
- configuring web services
- configuring file sharing services
- configuring print sharing services
2. Web applications/technologies
3. Setting-up client/user access and security
4. Setting-up and configuring servers
5. Installing and configuring modules/add-ons
6. Configuration of network services
Conditions
The students/trainees must be provided with the following:
1. Computer system:
- Servers
- Workstations
- Printers
2. Configured Computer Network
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Information Sheet 3.2-1
SETTING-UP REMOTE DESKTOP SERVICES
Step 1: Begin the installation
Launch Server Manager, and select "roles." Once the roles manager
screen is up, check the box for Remote Desktop Services (see Figure
1).
Figure 1
After clicking Next, you should see an introduction to Remote Desktop
Services (see Figure 2).
Figure 2
Step 2: Select Remote Desktop Services roles you want to install
Remote Desktop Services (RDS) includes several components (see Figure 3).
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
These components can be on one machine or many. Let's take a look at each
of them.
Remote Desktop Session Host: This is the new name of Terminal
Server.
Remote Desktop Virtualization Host: This component integrates with
Hyper-V. This allows for the pooling of virtual machines on Hyper-V to be
used for virtual desktops.
Remote Desktop Connection Broker: This component is used to bridge
the user with a virtual desktop, remote application or Terminal Server
session.
Remote Desktop Licensing: This is the new name of Terminal Server
licensing server that also includes licensing for Microsoft's Virtual
Desktop Infrastructure (VDI).
Remote Desktop Gateway: This provides a single connection point for
clients to connect to a specific virtual desktop, remote app or Terminal
Server session.
Remote Desktop Web Access: This provides clients an interface to
access their virtual desktop, remote app or Terminal Server sessions.
Figure 3
Step 3: Pick the license mode
As with past Terminal Server licensing, there are two license options: per
device and per user (see Figure 4).
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Figure 4 (Click image for enlarged view.)
Step 4: Allowing access to Terminal Server (not required)
Select which users to give access to the local terminal services. This
component is not required for RDS to work. If you choose to install "Remote
Desktop Session Host" as I have, you will get this prompt (see Figure 5).
Figure 5
Step 5: Configure the client experience
The next screen is "Configure Client Experience" (see Figure 6). This is where
you set the defaults for the experience the end user will have with the VDI
system.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Figure 6
Step 6: Configure license scope (see Figure 7)
Just as with Terminal Server of the past, you can configure the scope of the
license server. You have the following two options:
1. Domain: This limits the licensing to only servers in the domain.
2. Forest: This allows any Terminal Server in the forest to attain a
license.
Figure 7
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Step 7: Assigning the SSL certificate for Remote Desktop Gateway (see
Figure 8)
The Remote Desktop Gateway uses Secure Sockets Layer (SSL) to tunnel
and encrypt traffic from the client. This functionality requires a certificate.
There are two options for certificates:
1. Specify a certificate from the certificate store.
2. Produce a self-signed certificate.
In either case, the client must trust the certificate.
Figure 8
Step 8: Configure network access protection (optional)
These next few screens go beyond the scope of RDS but are related, so I will
just cover the basics.
Create authorization policies (see Figure 9)
I skipped this part because it is beyond this article's scope. This is where
you would configure a policy that states who is allowed to use the Remote
Desktop Gateway.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Figure 9
Install and configure network access and protection policies (see Figure
10 and Figure 11)
This is used to configure and enforce network access polices such as IPsec
and network access protection from the client. This feature can also be used
to define different policies based on users' connectivity (dial-up or virtual
private network).
Figure 10
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Figure 11
Step 9: Install IIS and Remote Desktop Web Access
Remote Desktop Web Access requires Internet Information Services (IIS), so
the next two screens are for installing and configuring IIS. Figure 12 is an
overview screen, while Figure 13 is the configuration screen.
Figure 12
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Figure 13
Step 10: The final steps
At this point, you're done. The last two screens just let you know what
you're installing (see Figure 14), and a final screen (see Figure 15) lets you
know whether any additional steps like rebooting are required.
Figure 14
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Figure 15
Now that you have installed and configured RDS, you can start using
Terminal Services and Remote Desktop Gateway Manager.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Information Sheet 3.2-2
INSTALLING AND CONFIGURING FILE SERVER
Open "Server Manager" and click "Add Role". Select "File Services" from the
Server role list.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Now create a Folder and share it with below permissions.
Share name: UserData$ (You can hide the share using the dollar sign ($) at
the end of the share name)
Administrators : Full Control
System : Full Control
Authenticated Users : Full Control
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Security settings
Group : Authenticated Users
Type : Allow
Applies to : This folder only
Permissions:
Traverse folder / execute file
List folder / read data
Read attributes
Read extended attributes
Read permissions
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Create a Quota Template.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Attach to a User's profile.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Information Sheet 3.2-3
INSTALLING THE PRINT SERVER
The first step in setting up a Windows Server 2008 print server is to install
the Print Server role. This is achieved by launching the Server Manager,
selecting Roles item from the tree in the left pane and clicking on Add Roles.
In the Add Roles Wizard click next on the Welcome screen if one appears
and then select the Print Services option. Click Next and read the
information displayed before clicking Next once again to proceed to
the Select Role Services screen. On this screen a number of different service
options are available for selection and installation as outlined in the
following table:
Option Description
Print Installs the print server and Print Management console. This is a
Server prerequisite for configuring print services on Windows Server
2008.
LDP Installs the TCP/IP Line Printer Daemon Service (LPDSV) allowing
Service UNIX, Linux and other Line Printer Remote (LPR0) based
computers to print via the print server. This setting also opens
port in the Windows Firewall.
Internet Creates an Internet Information Service (IIS) hosted web site
Printing where users can manage printers and connect and print to
shared printers hosted in the server using the Internet Printing
Protocol (IPP). The default URL for the web site is
http://servername/Printers, where servername is the name of the
server running the print services.
With the required options selected, click Next. Note that if Internet
Printing was selected and the IIS role is not currently installed in the server,
the wizard will prompt to add additional roles. If prompted, click on the Add
Required Role Services button to proceed. Click Next on any information
pages that may be displayed until the Confirmation screen appears. After
reviewing the summary information provided, click Install to initiate the
installation process.
Print Services Management Tools
Once print services are installed a number of print management tools are
now available on the system. First and foremost is the Print Management
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
snap-in which may be accessed via Start -> All Programs -> Administrative
Tools -> Print Management. A useful command-line tool is also available in
the form of the Print Backup Recovery Migration tool. The executable is
named Printbrm.exeand is located
in %SystemRoot%\System32\Spool\Tools.
A number of useful VBscript tools are also available
in %SystemRoot%\System32\Printing_Admin_Scripts\en-US (note that if you
use a language other than en-US the path will need to be change
accordingly). Scripts are available for configuring printer settings
(prncfg.vbs), listing and managing printer drivers (prndrvr.vbs), managing
print jobs (prnjobs.vbs), managing print queues (prnQctl.vbs), publishing
printers to active directory (pubprn.vbs), installing and managing printers
(prnmngr.vbs) and for managing TCP/IP printer ports (prnport.vbs).
The scripts are executed using the cscript.exe command and when run
without any command-line options will display a list of supported options.
For example:
cscript prnjobs.vbs
Microsoft (R) Windows Script Host Version 5.7
Copyright (C) Microsoft Corporation. All rights reserved.
Usage: prnjobs [-zmxl?] [-s server][-p printer][-j jobid][-u user name][-w
password]
Arguments:
-j - job id
-l - list all jobs
-m - resume the job
-p - printer name
-s - server name
-u - user name
-w - password
-x - cancel the job
-z - pause the job
-? - display command usage
Examples:
prnjobs -z -p printer -j jobid
prnjobs -l -p printer
prnjobs -l
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Adding Network Printers to the Print Server using Auto-detect
Obviously, a print server without any printers isn't going to be of much use.
Not surprisingly, therefore, the next step after installing Print Services is to
add printers. Printers may either be network based, or locally connected to
the server. In the case of network printers, these may be added either
manually or using auto-detection. Under auto-detection, Print Management
scans the subnet on which the server resides and searches for any devices it
can identify as being printers. As printers are detected on the network they
are displayed in a list here they may be selected and added to the print
server.
To add network printers using auto-detection, open the Print Management
tool via Start -> All Programs -> Administrative Tools -> Print Management,
unfold the Print Servers from the list in the left pane, right click the local or
remote print server to which the new printer is to be added and select Add
Printer.... This will display the Network Printer Installation Wizard as
illustrated below:
In order to have the wizard search for printers on the network, ensure that
the Search for network printers is selected and click on Next. At this point
the wizard will begin the process of scanning the network for printers. As
each printer is detected it will be listed. In the following example, the wizard
has detected an HP Deskjet 5800 printer on the network with an IP address
of 192.168.2.10:
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
If no printers are detected, ensure that the printers are connected to the
network and powered on and are on the same subnet as the print server.
Once the scan is complete, select the required printer from the list and
click Next to proceed to the Printer Driver screen. If a driver for the printer is
already installed, select it from the drop down list. Alternatively select
the Install a new driver option and click Next to proceed to the Printer
Installation screen where a list of printer manufacturers and models is
presented. Select the make and model of the printer from the list:
If the make and model of printer are not listed, check to see if the printer
was supplied with a driver disk, or whether a driver can be obtained from
the manufacturer's web site. Assuming this to be the case, use the Have
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Disk button to browse for and select the appropriate manufacturer driver.
With either a printer selected from the list, or a suitable driver specified,
click on Next to configure thePrinter Name and Share Settings. On this
screen, enter the name by which the new printer will be shared to clients
over the network. If the printer is not to be shared, ensure that the Share
this printeris not selected. Also, enter a location description (for example,
"Printer in Accounts") and comment if desired. Click Next to display the
printer summary screen as illustrated below where the selected settings are
presented for review:
Assuming the configuration summary is correct, click Next to install the new
printer. At this point the wizard will report that the driver has been
successfully installed and that a test page is ready to be printed. If another
printer is to be added to the print server, select the Add Another
Printer option to instruct the wizard to loop back to the start of the
installation process.
Manually Adding Network Printers to a Print Server
The preceding section discussed the use of auto-detection to locate and
install and network attached printer. This section will cover the manual
installation of a network printer. As with auto-detection, begin by invoking
the Print Management tool (Start -> All Programs -> Administrative Tools ->
Print Management), unfold the Print Servers category from the list in the left
pane, right click the local or remote print server to which the new printer is
to be added and select Add Printer.... This will launch the Network Printer
Installation Wizard. On the initial page of the wizard select the option
labeledAdd a TCP/IP or Web Services Printer by IP address or hostname and
click Next to proceed to the Printer Address screen. If the type of printer is
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
known (TCP/IP device or Web Services Printer) make the appropriate
selection. Alternatively, leave the setting as Auto Detect to have the wizard
identify the printer type. Enter the IP address or hostname of the printer to
be added to the print server. The wizard will automatically generate a unique
port name to accompany the IP address or hostname. The option is also
provided to have the wizard attempt to identify the appropriate driver for the
new printer. The following figure illustrates the screen as described:
Click Next to install a printer driver. If a driver for the printer is already
installed on the print server, select it from the drop down list. Alternatively
select the Install a new driver option and click Next to proceed to the Printer
Installation screen where a list of printer manufacturers and models is
presented. Select the make and model of the printer from the list, or use
the Have Disk to install the manufacturer supplied driver.
With either a printer selected, click on Next to configure the Printer Name
and Share Settings. On this screen, enter the name by which the new printer
will be shared to clients over the network. If the printer is not to be shared,
ensure that the Share this printer is not selected. Also, enter a location
description (for example, "Color Printer in Sales") and comment if desired.
Click Next to perform the installation and print an optional test page.
Adding a Locally Connected Printer
Since servers are generally sequestered in climate controlled server room
and printers are located in proximity to the users it always seems a little odd
to talk about installing printers with are locally connected to servers. That
said, it is a topic which needs to covered, and cover it we will.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Local printers will be connected to the server using a serial (COM) port, a
parallel (LPT) port or a Universal Serial Bus (USB) port. Often, Windows will
automatically detect a new printer as soon as it is connected and powered
up. In this situation an icon will appear in the task bar indicating that the
new device has been detected. Clicking on this icon presents the option to
view details about the installation process, resulting in the appearance of a
dialog similar to the one illustrated below, where a Brother MFC-420CN
printer has been detected and is being installed:
Once the printer has been installed, it will likely need to be configured for
network sharing. To achieve this, launch the Print Management tool, select
the print server to which the printer is physically connected and click
on Printers. The center pane of the tool will display a list of printers installed
on the current print server. Identify the required printer in the list, double
click on it to display the properties dialog and select the Sharing tab:
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
If the printer is to be shared with network client, set the Share this
printer check box and enter a suitable share name for the printer. This page
also allows Client-side Rendering(CSR) to be configured. When selected, all
rendering of print jobs is performed on the client and just the RAW print
data sent to the server for printing. This offloads the rendering overhead to
the client computers, thereby reducing the load, and increasing the
scalability of the print server.
If Windows fails to auto-detect the printer it may be added manually from
Print Management by right clicking on the print server to which the device is
attached and selecting Add Printer.... On the initial screen select the Add
new printer using an existing port and choose the port to which the printer is
connected from the drop down list. Once selected, click Next to install a
printer driver. If one is already installed, select it from the drop down next to
the use an existing printer driver on the computer. Alternatively, select Install
a new printer driver and either select the printer make and model from the
list, or use the Have Disk to install the manufacturer supplied driver.
Click Next to proceed to the Printer Name and Sharing screen. Choose
whether the printer is to be shared and, if so, by what name. Proceed to the
summary screen, review the information and complete the installation.
With a printer server configured and printers added the next step is to cover
the management of printer servers on Windows Server 2008.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Information Sheet 3.2-4
INSTALL PRINTER SERVER USING DEDICATED PRINTER SERVER
We are using TP-link TL-PS110UPrinter server the default IP is 192.168.0.10
Setup the Printer Server
Edit the Printer Server Name
Setup the TCP/IP Address to your desired IP
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
HERE ARE THE STEPS FOR THE RESETTING THE PRINTER SERVER.
1. Unplug the power adapter of print server;
2. Press the Reset key on the print server and hold;
3. Plug-in the power adapter with the Reset key pressing for no less than
7 seconds;
4. Release the Reset key.
For TL-WPS510U, when the Wireless LED light flashes regularly, the TL-
WPS510U has finished the resetting and you can see the WLAN-PS Ad-Hoc
network in your wireless network list.
HOW TO INSTALL PRINTER USING TCP/IP PORT.
The following steps illustrate how to install a network printer using TCP/IP
in Windows 7. In order to complete the steps you will need to know details
such as the printer model and IP address. Click the Start button, type print
in the Search programs and files box and click Add a printer
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
1. Choose Add a local printer
2. Click the bullet which says Create a new port and use the drop down
menu to choose Standard TCP/IP Port
3. Click Next
4. In the Hostname or IP Address field enter the IP Address for the
printer you are adding Instuctions for looking up your IP Address
(authentication required)
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
5. Click Next
6. Choose the driver that corresponds to your printer model (or click the
Have Disk button to search for downloaded drivers)
7. Click Next
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
8. Click the bullet beside Use the driver that is currently installed
(recommended)
9. Click Next
10. Take note of the name given to the printer
11. Click Next
12. Make sure the bullet is selected beside Do not share this
printer
13. Click Next
14. Click to put a check mark beside of Set as the default printer
(if you do wish to make it your default printer)
15. Click the Print a test page button (if you wish to do so)
16. Click Finish. Your printer should now be set up and ready to
use.
Managing Remote Print Servers
In the previous chapter it was stated that the Print Management tool
provides a central location from which the print services for an entire
network may be managed. So far we have only looked and managing the
print server running on the local computer. In this section we will look at
adding remote servers to the local Print Management configuration. For the
purposes of this example a theoretical configuration consisting of two
Windows Server 2008 systems named winserver-1 and winserver-2 is
assumed. Both systems have the print services role installed and Print
Management on winserver-1will be configured to also manage print services
on winserver-2. This is achieved by first launching Print Management on the
local winserver-1 system (Start -> Administration Tools -> Print Management),
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
right clicking on the Print Servers node of the tree hierarchy in the left hand
pane and selecting the Add/Remove Servers option.
From the resulting menu, select the Add/Remove Servers option. The
resulting dialog box displays the currently configured print servers under
the management of local Print Management. If no remote print servers have
been added previously the only server listed will be the local system. To add
additional print servers either enter a comma separated list of server names,
or use the Browse button to locate servers on the network. When one or
more servers have been selected, click on the Add to list button to add the
servers to the list. The following figure illustrates the Add/Remove
Servers dialog box configured with both the local and remote servers:
Once all the required remote print servers have been added to the list, click
on Apply then close the dialog to return to the main Print Management
window. The new print servers will now appear alongside the local server
under Print Servers in the left hand pane of the Print Management screen as
illustrated below:
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Migrating Printers and Queues Between Servers
Windows Server 2008 also provides the ability to migrate both printers and
print queues from one print server to another. This makes it easy, for
example, to take a print server off-line for maintenance or to permanently
re-assign a printer from one print server to another. The steps outlined
below assume that print Management has been configured to manage both
the source and target print servers as outlined in the preceding section of
this chapter. If this is not the case, the printer export file will need to be
copied onto the destination server or made available via file sharing and
imported using Print Management on that server.
This form of migration is performed using the Printer Migration Wizard
which, along with most other tasks, is accessed from the Print Management
interface. Once Print Management is up and running, right click on the
server in the left pane from which the printer is to be migrated (the source
server) and select Export Printers To a File from the menu. Print Management
will subsequently display a dialog listing the printer drivers, port and
queues currently configured on the selected print server as illustrated below:
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
After reviewing the listed information click Next and select a suitable
location to save the printer export file and click Next once again to perform
the export process. Depending on the number of printers being exported and
the size of the drivers the export process may take a few minutes to
complete. If the export was successful a message will appear beneath the
progress bar stating this fact. If the export was unsuccessful, click on
the Open Event Viewer button provided to learn more about the cause of the
problem so that remedial action may be taken. Assuming a successful
export click Finishto dismiss the Printer Migration dialog.
The next step is to import the printers into the target server. Begin by right
clicking on the destination server in the Print Management window and
selecting Import printers from a file.... In the resulting dialog, use the browse
button to navigate to the export file, select it and click on Next to proceed.
Once the file has been read a screen will appear identical to the one
displayed prior to exporting the printer objects in the preceding step. Review
this information and click Next to display the Select import options screen as
illustrated in the following figure:
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
These options require a little explanation:
Keep existing printers; import copies - It is possible that a printer
being imported is already also installed on the destination server. With
this option selected, the original printer on the destination server will be
left unchanged and the new printer imported as a copy.
Overwrite existing printers - If the printer being imported is already
installed on the target server it is overwritten by the imported copy when
this option is selected.
List printers that were previously listed - When selected, only
printers that were already listed in Active Directory will still be listed after
the import process is completed.
List all printers - All printers are listed in Active Directory
Don't list any printers - No printers are listed in Active Directory
Once the required settings are configured, click Next to initiate the printer
import process. The printer configurations, drivers and queues will be
subsequently be imported onto the target print server. If errors are reported
click on the Open Event Viewer button to obtain additional information. In
particular, be mindful of printers that were physically connected to the
source print server. Since they are not physically connected to the target
server an error will likely occur during the migration. Even if the printer was
physically moved to the target system prior to migration it is also possible
that it is connected to a different physical port to that used on the source
server. Such problems can be resolved by right clicking on the imported
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
printer in Print Management, selecting Properties and making the necessary
configuration changes.
Configuring Printer Permissions
Access to printers is controlled through the configuration of printer
permissions. By default, a printer is accessible to all users on the local
system, and if shared, all users elsewhere on the network. Printer
permissions are divided into two categories, special permissions and
standard permissions. Before describing how to change the permissions on
a printer it is first important to understand the meaning of each permission
option.
The standard printer permissions are outlined in the following table:
Permission Description
Allows users and groups to send documents to the printer
and to manage their own print jobs. Also includes
Print
the Read special permission allowing viewing, but not
alteration, of printer permissions
Allows full management of the printer, including changing
shared status, changing of permissions and properties, taking
Manage
ownership of printers and print jobs and starting and
Printers
stopping print jobs. Includes the Read, Change and Take
Ownership special permissions.
Allows user and groups to manage print jobs but does not
provide the ability to print. Permissions consist of pausing,
Manage
restarting, resuming and reordering and canceling print jobs.
Documents
Includes the Read, Change and Take Ownership special
permissions
The special permissions are as follows:
Permission Description
User or Group may view the permissions on the
Read Permissions
printer.
Change User or Group may change the permissions of a
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Permissions printer.
User or Group may take ownership of printer and/or
Take Ownership
print jobs.
The current permissions for a printer may be viewed and changed by right
clicking on that printer in the Print Management tool (Start -> Administrative
Tools -> Print Management), selecting Propertiesand clicking on
the Security tab:
To change the permissions for a currently listed user or group, select the
user or group and change the Allow and Deny permissions to the required
settings. When the settings are configured, click on apply to commit the
changes. If the user or group is not currently listed in the properties dialog,
click on the Add... button to invoke the Select Users or Groups dialog.
Change the Location setting if necessary and then enter the names of the
users or groups, separated by semi-colons into the bottom text box. Click
the Check Names button to verify the selected users or groups exist within
the current location scope:
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Assuming the names are correct click on OK to return to the properties
dialog where the selected users and/or groups will now be included in
the Group or user names list. To configure permissions, select a user or
group and set the permissions in the Permissions for section of the dialog.
Click Apply to commit the changes and repeat the task for any other users
or groups added to the list.
To configure the special permissions click on the Advanced button in the
Security page of the properties panel to display the Advanced Security
Settings dialog as illustrated below:
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
To modify the permissions for a user or group select that object from the list
and click Edit... to display the Permission Entry for dialog. In this dialog both
the standard and special permissions for the selected user or group are
displayed and may be changed as required. As noted previously, certain
special permissions are implicit in standard permission settings. For
example, setting the Manage Printers standard permission also enables
the Read, Change and Take Ownership special permissions. Once the
desired permission changes have been made click on OK to dismiss
the Permission Entry for dialog, followed by Apply, then OK in the Advanced
Security Settings dialog. Finally, click on OK to dismiss the properties dialog
and return to Print Management.
Changing Printer Ownership
After a printer has been installed the owner, by default, is SYSTEM.
Ownership may be taken either by an administrator or by a user or group
which has been assigned Take ownership permission for the printer.
To assign ownership to another user or group, open the properties dialog for
the printer, select the Security tab and then click on Advanced. In the
advanced settings screen, select the Owner tab. This screen will list the
current owner, together with a list of users and group to which ownership
may be changed. If the intended new owner is not listed in the Change
owner to: list, click on the Other users or groups... button to access the Select
User or Group dialog box. Enter the name of a user or group and click on
the Check Names button. With the correct name selected, click on OK to
return to the list of owners. Select the desired owner from the list and click
on Apply to commit the change of ownership.
Printer Pooling Configuration
Printer Pooling refers to the process of allocating multiple physical print
devices to a single logical printer. In such a configuration print jobs to the
logical printer are assigned by the print server to the first available physical
printer in the pool. A key requirement is that the physical printers that
make up a pool must all use the same print driver and have the same
amount of memory.
To configure printer pooling, install a printer such that it uses a particular
port (such as a local port or IP address). Attach the other printers that are to
make up the pool, but do not install them via Print Management. Once the
first printer is installed, open the properties dialog for that printer by right
clicking on it in Print Management and select the Ports tab. In the Ports
page select the Enable printer pooling option. If the ports to which the
additional printers are connected are listed make sure they are all selected.
Note that a pool can be made up of printers connected in any combination of
ways (network, serial, parallel, USB etc). In the case of network printers,
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
click on Add Port... and enter the IP address of the additional printer,
click New Port... and allow the wizard to create the new port. Once all the
new ports are added and selected, click Apply to create the printer pool. The
following figure illustrates a printer pool comprising three HP Deskjet
network printers:
Configuring Printer Availability and Priority
Rather than working with the actual physical printers, users are in fact
working with logical printers which map onto a physical print device.
Windows allows a single physical print device to be assigned to multiple
logical printers. This approach brings considerable flexibility in terms of
controlling the availability of a printer to different groups of users and the
priority of their print jobs.
This concept is best described by example. Suppose that a printer is to be
made available to members of an engineering group only during the office
hours. That same printer, however, is to always be available to the
management group. Similarly, any print jobs belonging to the management
group must be given a higher priority than those of the engineering group.
To achieve this objective, two logical printers assigned to the same physical
print device will be created, one for engineering and one for management.
The availability of the engineering logical printer will be restricted to office
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
hours and given a low priority. The management logical printer will always
be available and will be given a high priority. Permissions on the logical
printers will then be configured such that the engineering team is denied
access to the management printer.
Availability and priority is configured from the printer property panel. To
access these settings, launch Print Management and navigate to the
required printer in the left pane. Right click on the printer,
select Properties and then choose the Advanced tab. Once selected, the
property panel will appear as follows:
For the management logical printer the Always available option will be
selected and a high priority assigned (for example 95). Once these values are
set, click on the Security tab of the properties dialog and deny access to the
printer for the engineering group. Repeat these steps for the engineering
logical printer, this time selecting the Available from option and specifying
the hours that the printer is available.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Information Sheet 3.2-5
INSTALL, SETUP AND MANAGE LINUX A FILE SERVER, DHCP
SERVER AND PRINTER SERVER
Configure File Server:
GO to Startup menu Select COMPUTER tab and Click YaST
The screen will prompt with the ―root‖ Password ―Css2015‖
Search SAMBA SERVER
Click Samba Server
Samba Server is equivalent to Domain controller in Windows.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Use WORKGROUP as default workgroup name.
Select primary domain controller.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
In SAMBA configuration select service start during boot.
Use again ―Css2015‖ as your Samba password.
Next Step is search the NETWORK to edit your network card to setup a
STATIC IP Address.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
In Setting Network if this error appear change network setup method from
NETWORK MANAGE SERVICE to WICKED SERVICE
Click your NIC Device and Click edit
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Choose STATICALLY ASSIGN IP ADDRESS and put our own IP address
(don’t forget your IP) Click save and restart your server.
After reboot open the YaST and search for firewall and Choose disable
firewall.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
and Click Next
in your windows 7 computer make your network static IP address and
related in same subnet of your Linux Server. Now ping the IP address of
your Linux.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Information Sheet 3.2-6
SETUP DHCP SERVER
Select again the YaST and search for DHCP server
Click DHCP Server.
Select the NIC and IP address and click next
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
put your IP Range e.g. (192.168.3.20-192.168.3.50) same to SCOPE in
windows 2008 server. Click OK.
In your computer windows 7 change your ip to dynamic setting (obtained)
and check in IPCONFIG if the linux server assign an IP addres to your
desktop PC.
Check for the shared folder using RUN command
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Use ―root‖ as user and ―Css2015‖ as Password
To add more share folder go to SAMBA setting in SHARE tab and add share
folder with security authentication.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
you can also add shared printer in this area.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
LEARNING OUTCOME NO. 3
Perform Testing, Documentation and Pre-Deployment
Procedures
ASSESSMENT CRITERIA:
1. Pre-deployment procedures is undertaken based on enterprise
policies and procedures
2. Operation and security check are undertaken based on end-user
requirements
3. Reports are prepared/completed according to enterprise policies
and procedures.
Contents:
1. Testing procedures
2. Pre-deployment procedures and practices
3. Enterprise policies and procedures
4. End user requirements
5. Enterprise policies and procedures
6. Documentation and making reports
Conditions
The students/trainees must be provided with the following:
1. Computer system:
- Servers
- Workstations
- Printers
2. Policies and procedures:
- Procedures for testing
3. Network Devices
- Modem
- Router
- Access Point
- Repeater
- Network Cables
4. Testing devices:
- Network cable tester
- Hubs
5. Others:
6. Papers (for report generation)
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Set-up Computer ICGI Trainer Revision #
iConnect Global Servers
Institute, Inc.