Friday, November 27, 2009

MANAGING AND MAINTAINING WINDOWS SERVER 2003 ENVIRONMENT. Thanks: K M JHA




My title


page contents


MCSE EXAM CODE: 70-290 3
Introduction of server environment: - 3
Editions of 2003 server: - 3
Different types of server: - 3
BENEFITS OF ACTIVE DIRECTORY: - 4
MINIMUM REQUIREMENTS TO INSTALL ACTIVE DIRECTORY: - 4
TYPES OF SERVERS: - 4
STEPS TO CREATE A DOMAIN CONTROLLER: - 5
TO SEE THE STATUS OF DOMAIN CONTROLLER: - 5
Active directory domains and trusts 5
TO CONFIGURE DOMAIN CLIENT: - 5
TO SEE CLIENT COMPUTERS: - 5
TO CONFIGURE LOOPBACK ADAPTER ON WINDOWS SERVER 2003: - 5
USER ACCOUNT TEMPLATE: - 5
SEARCHING IN ACTIVE DIRECTORY: - 5
SAVED QUERIES: - 6
USER ACCOUNTS: - 6
TYPES OF LOG ON: - 6
DSADD user “CN=Name of 6
TO DELETE DOMAIN USER: - 6
TO CHANGE PASSWORD: - 7
DSMOD user “Path of DN” –PWD * 7
TO DISABLE DOMAIN USER: - 7
DSMOD user “CN=username(ABC),CN=users,DC=jha,DC=com” –disabled yes 7
TO ENABLE DOMAIN USER: - 7
DSMOD user “CN=username(ABC),CN=users,DC=jha,DC=com” –disabled No 7
TO SEE INFORMATION ABOUT ALL USERS: - 7
DSQUERY USER 7
REMOTE DESKTOP: - 7
ORGANIZATIONAL UNIT: - 7
Create sub OU or child OU by GUI: - 7
TO WORK ON D.C. MACHINE: - 7
* GPMC tool – Group policy management console 8
STEPS OF INHERITANCE POLICY: - 8
STEPS OF BLOCK POLICY INHERITANCE: - 9
RSOP (RESULTANT SET OF POLICIES): - 9
* CREATE O.U. BY CSVDE (COMMA SEPRATED VALUE DIRECTORY EXCHANGE) COMMAND: - 9
CREATE OU BY LDIFDE (LDAP DATA INTERCHANGE FORMAT DIRECTORY EXCHANGE) COMMAND: - 9
CREATE A USER BY LDIFDE (LDAP DATA INTERCHANGE FORMAT DIRECTORY EXCHANGE) COMMAND: - 9
CREATE OU BY USING BATCH FILE: - 10
SECURITY IDENTIFIER: - 10
TO SEE SID: - 10
Start- Run- Cmd-Ok 10
WHAT IS SHARED FOLDER: - 10
UNC (Universal Naming Convention) path 10
METHODS TO SHARE THE FOLDER: - 10
By command line: - 10
SECURITY TYPE IN NTFS: - 11
PERMISSIONS: - 11
NTFS PERMISSIONS ON FOLDER: - 11
BENEFITS OF NTFS PERMISSIONS: - 11
TO SEE FOLDER SECURITY PERMISSIONS: - 11
TO TAKE OWNERSHIPS: - 12
SHARING/ NTFS PERMISSIONS: - 12
DOMAIN SECURITY POLICY: - 13
TO UNCHECK ACCOUNT IS LOCKEDOUT: - 14
GPMC (GROUP POLICY MANAGEMENT CONSOLE) TOOL: - 14
BLOCK POLICY: - 14
* AUDITING: - 14
CATEGORIES OF AUDITING: - 14
FOR REFRESHING: - 15
STEPS FOR OBJECT ACCESS: - 15
System group 15
Custom group 15
Default group/Built-in group: - 15
System group: - 16
Groups are characterized by scope and type – 16
Group types – 16
Scope – 16
Global 16
Domain functional level: - 16
To create global security group by command line: - 17
DSADD group “cn=hclcdc,cn=users,dc=sprite,dc=com” 17
To create domain local security group: - 17
DSADD group “cn=hclcdc12,cn=users,dc=sprite,dc=com” –scope U 17
To create domain local distribution group: - 17
DSADD group “cn=hclcdc123,cn=users,dc=sprite,dc=com” –scope L –secgrp no 17
To See all groups: - 17
Dsquery group 17
To see system configuration: - 17
DISASTER RECOVERY IN SERVER 2003: - 17
Backup 17
Backup software 17
WHAT YOU WANT TO BACKUP: - 18
TYPES OF BACKUP: - 18
Boot Disk – 18
When we start system then following task is preformed: - 19
MBR checks for active partition c:\ 19
To see these files: - 19
To see hidden files by command line: - 19
Compression and encryption: - 21
Compact /C DNS (Folder name) - To compress folder 21
1. GUI 21
MONITORING OF WINDOW SERVER 2003: - 22
Network 22
MONITORING TOOL: - 22
HOW TO INSTALL RECOVERY CONSOLE: - 23
To remove Recover Console: - 23


MCSE EXAM CODE: 70-290
Introduction of server environment: -
a. NT 4.0 server
b. 2000 server
c. 2003 server
d. 2008 serve or Longhorn
Editions of 2003 server: -
A. Web edition: - Only for web server purpose. We can’t make it domain server. We use it for website creation. It supports two CPUs.
B. Standard edition: - We use it small to medium organization. Clustering is not available with standard edition. It supports 4 (Four) CPUs.
C. Enterprise edition: - We use it for medium to large organization. Clustering is available only this edition. It supports 8 (Eight) CPUs and 4 (Four) GB RAM.
D. SBS (Small Business Server) edition: - It supports 1-100 clients and 3 (Three) CPUs.
E. Data center edition: - This server use to big companies. In this server 64 GB RAM is available. It supports 32 CPUs.
Different types of server: -
· SERVER: - Server offers the networking services and client accept the networking services.
· SERVER ROLES: -
a. Domain controller: - The server on which active directory is installed, that server is called Domain controller.
b. DHCP (Dynamic Host Configuration Protocol): - DHCP server provides IP configuration data automatically.
c. WINS (Window Internet Naming Services) server: - WINS serve is use to resolve NETBIOS name into IP address. It is also called NBNS (Net Bios Name Server).
d. Print server: - The server on which printer is install, that is called print server.
e. Firewall server: - Firewall server is use to protect your private network from (LAN) from your public network or Internet.
f. Backup server: - Backup is use for backup purpose, on which backup medias are installed.
g. Proxy server: - Proxy server is a server that provides secure Internet connection to all users in your network from a single location.
h. DNS server: - DNS stands for Domain Name System or Domain Name Service. DNS provides name resolution on TCP/IP network. DNS resolves host name into IP and IP into host name. DNS is an application layer protocol. Its port number is 53.
i. VPN (Virtual Private Network) server:- VPN means connecting two LANs with the help of internet by using secure connection. So that data transmission is secure and encrypted. In this, two protocols are work PPTP (Point to Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol).
j. FTP server: - FTP hosts FTP websites.
k. Web server: - The purpose of web server is to host a website for intranet purpose as well as for Internet purpose. In this, IIS (Internet Information Services) are used.
l. RADIUS (Remote Authentication Dial in User Service):- The purpose of RADIUS server is centralized authentication and remote access policies. RADIUS server is also called IAS (Internet Authentication Service).
m. RAS (Remote Access Server): - RAS is also called RRAS (Routing and Remote Access Service). This service is inbuilt in 2000 server as well as 2003 server.
· WORK OF RRAS: -
a. We can configure VPN server.
b. We can configure DHCP server.
c. Routing.
d. Filtering.
e. LAN-to-LAN connectivity.
· STEPS: - Start – programs – Administrative tools – RRAS.
· ACTIVE DIRECTORY: - Active Directory was first introduced with win 2000 server. It carries on in 2003 server as well as in 2008 server with some modifications. Active directory stores the information in a centralized database. Active directory provides single point of management.
BENEFITS OF ACTIVE DIRECTORY: -
Centralize management
Delegated administration or Control: - Some responsibility or authority, we can distribute in other users, means divide work to different users.
Scalability: - You can create millions of object (users or Computers). We can expand it. In this, 2 TB database is available and 2048 GB space.
In the NT server 40 MB database and 40000 object.
DNS integration: - DNS works with active directory for name resolution purpose.
MINIMUM REQUIREMENTS TO INSTALL ACTIVE DIRECTORY: -
a. 2000 server or 2003 server or 2008 server.
b. Minimum hard disk space 250 MB, Recommend 1.5 GB
c. Partition should be NTFS.
d. Processor speed 233 MHz
e. Minimum RAM 128 MB.
· DCPROMO (Domain Controller Promotion) COMMAND: - This command is use to promote as well as demote your server as domain controller.
· DOMAIN: - Domain is a logical collection of users and computers that share the database of active directory. Domain is just like an umbrella.
· We can configure client to web edition server 2003.
TYPES OF SERVERS: -
1. Stand-alone server: - Server, which is the member of workgroup that is called, stand alone server.
2. D.C.: - Server on which active directory is installed, that server is called Domain Controller.
3. Member server: - Server, which is member of domains, is called member server.

STEPS TO CREATE A DOMAIN CONTROLLER: -
Start – run – dcpromo – ok.
Now, wizard comes – next – next – (.) Select domain controller for a new domain – Select domain for a new forest- Give the full DNS name (jha.com) – next – next – next – select last option (.) Permissions compatible only with windows 2000 or windows 2003 server operating systems – next – give the restore mode password………..
And confirm password………..
(It is not essential for active directory installation) – next – next – finish – Restart now.
TO SEE THE STATUS OF DOMAIN CONTROLLER: -
Start – programs – administrative tools – Here, you can see three options: -
Active directory domains and trusts
Active directory sites and services
Active directory users and computers
My computer (R.C.) – manage
(Note- If here local user and groups option is not available than we can understand the system is in the domain controller.)
When log on screen comes than we click on options if domain controller is working properly than domain name comes in log on tab.
TO CONFIGURE DOMAIN CLIENT: -
My network places (R.C.) – properties – Local area connection (R.C.) – properties – Internet protocol TCP/IP – properties give the IP and subnet mask of same class (Domain controller class or range)- Give the IP of preferred DNS (IP of domain controller, if you have configured D.C. as a DNS server) – ok – close.
Now, R.C. on my computer – properties – computer name – change – (.) Domain and give the name of domain controller (jha.com) – ok.
TO SEE CLIENT COMPUTERS: -
Start – run – dsa.msc – ok.
Now, click on computers for client and click on domain for domain controller.
· TO CREATE A NEW USER: - Click on users – click new –user.
· By computer management we can find that system is presently working or not as a domain controller because here local users and groups options doesn’t comes.
TO CONFIGURE LOOPBACK ADAPTER ON WINDOWS SERVER 2003: -
Start – settings – control panel – Add hardware wizard – next – (.) yes I have already connected the hardware – select add a new hardware device – next – select network adapters – Microsoft loop back adapters – finish.
USER ACCOUNT TEMPLATE: -
Through this option we can find the information about a user and also we can copy the information for another user that is common in both users.
STEPS: - Start – programs – administrative tools – Active directory users and computers – click on user – R.C. on username – properties –fill all descriptions one by one about user – Again R.C. on same user select copy and create a new user.
After doing this steps system copy the all-common description to another user. Mean to say that only address telephone and title are not copied.
SEARCHING IN ACTIVE DIRECTORY: -
We can search the information about department and users.
STEPS: - Start – programs – administrative tools – Active directory users and computers – R.C. on domain name (jha.com) – Find – find and select custom search – field, select user – select any department – in value, name of the department – add – find now – show all users in same departments.
SAVED QUERIES: -
Through this option we can search the users query. Mean to say that if any user is added in same department the system automatically save it into the saved queries.
STEPS: - In Active directory users and computers console – Saved queries – new – query – define query – find and select custom search –field, select user for department – In value, name of department (Sales, for example)- add – ok – new query – give the name (anything)- ok.
USER ACCOUNTS: -
1. Local user accounts
· Domain user accounts
TYPES OF LOG ON: -
Local log on: - When we log on by own computer.
Domains log on: - When we log on by domain controller name.
Secondary log on: - Secondary log on is also called Run-As process. It is more secure and time saving process. By using this option we can create, add or remove, manage the programs, meanwhile we log on to a simple user.
RUN AS: - To use some application by using some kind of privileges.
STEPS: - Start – settings – control panel – Add/Remove program –press SHIFT and R.C. on Add/Remove programs – Run as – (.) The following user
Username…administrator\jha.com…….
Password………………….
Ok.
Smart card logs on: Smart card is a device, which is attached to system. Example- ATM card.
DOMAIN USER: - You can also create user by command line.
DSADD user “CN=Name of
user (ABC),CN=users,DC=jha,DC,com” –PWD *
NOTE: - Path of user is called DN (Distinguished Name).
DN represents the exact location of the object.
During configure the DN a protocol is work, that protocol is called LDAP (Lightweight Directory Access Protocol).
LDAP creates DN of object.
TO DELETE DOMAIN USER: -
DSRM “CN=username(ABC),CN=users,DC=jha,DC=com”
OR,
DSRM “Path of DN”
TO CHANGE PASSWORD: -
DSMOD user “Path of DN” –PWD *
TO DISABLE DOMAIN USER: -
DSMOD user “CN=username(ABC),CN=users,DC=jha,DC=com” –disabled yes
TO ENABLE DOMAIN USER: -
DSMOD user “CN=username(ABC),CN=users,DC=jha,DC=com” –disabled No
TO SEE INFORMATION ABOUT ALL USERS: -
DSQUERY USER
REMOTE DESKTOP: -
Through this option we can access the desktop of another system.
STEPS: - My computer (R.C.) – properties – Remote – Allow remote desktop – ok.
TO ACCESS ANOTHER COMPUTER BY REMOTE DESKTOP: -
Start – run – mstsc – and type the IP address of system – connect.

NOTE- To run DSA.MSC command on windows xp at first install the program ADMINPAK.MSI, which is in the windows 2003 cd in i386 folder.
ORGANIZATIONAL UNIT: -
This is a special container that is used to organize the objects in a domain. Symbol of O.U. is book.
PURPOSE OF O.U.: -
Delegation
Group policy
Inheritance

Create O.U. by command line: -
DSADD OU “OU=hcl,DC=jha,DC=com”

Create sub O.U. or child O.U. by command line: -
DSADD OU “OU=noida,OU=hcl,DC=jha,DC=com”

NOTE: - In an O.U., there are many objects as for example User, Computer, Group, Shared folder, Printers are available.

DELEGATION: - Group of representative. You can delegate your task to different users and groups.

Create O.U. by GUI: -
Start – programs – administrative tools – Active directory users and computers – R.C. on domain name (jha.com)- New – Organizational unit – name of OU (sales)- ok.

Create sub OU or child OU by GUI: -
R.C. on OU – New – OU – name (tech) – ok.
This feature is called hierarchical structure of OU.
To see information about number of O.U.: -
Start – run – cmd – ok.
Write- dsquery ou on command prompt.
TO WORK ON D.C. MACHINE: -
D.C. policies – Local policies – user rights assignment – allow – log on locally – add user or group – name (everyone) – apply – ok.

Refresh Command: -
Gpupdate / force

By default it refresh on 5 minutes.
To move user in O.U: -
Right Click on username – move – name of the object where you want to move it. – Ok

* To give the delegate permissions: -
R.c on user – Delegate control – next – add – advanced – Find now – select user name –ok – ok – next – give the permission – next – finish

* To remove the delegate permission: -
R.c on ou – properties – security – select user – Remove - apply – ok.

(2) Group policy: - Group policy is registry-based settings that apply on user as well as on computer.
*Registry – database of the operating system.
-> Group policy stores on sysvol folder:
-> To see it – open A.D directory drive (where A.D is saved) – windows –sysvol – sysvol domain name - policies –
-> We can apply group policy on users and computer also.
-> GPO is also called GUID (Globally unique identifier)
-> IT is a 128 bit hexadecimal number.
-> First introduced with windows 2000 server.
* Steps of Group policy: -
Create a new O. U and give the name (RAJ) – ok – move a user into
Raj OU – r.c on o.u (raj) –properties - group policy – new and give the name of GPO (ABC) – Edit – administrative templates – start menu taskbar and set the policy –R.c on policy – properties – setting Enable – Apply – ok
*TO Remove group Policy: - R.C. on O.U – properties – group policy – Edit – administrative template – start menu task and select place where we applied policy – R.C on policy – properties – Disable – Apply – ok
(3) IN heritance – If we apply any policy on ou then this policy automatically applies on child o.u or o.u
(4) Block policy Inheritance – when we apply this option on sub o.u or child o.u then the policy of o.u cannot be applied on child o.u or sub o.u
(5) NO –override or Enforce – We can apply this option on o.u, after applying this policy, which policy applied on o.u and sub o.u has block policy, in spite-of that o.u’s policy will apply on sub o.u or child o.u.
* GPMC tool – Group policy management console
-> GPMC introduced with 2003 server.
-> Gpmc tool is use to backup and restoring process for GPO.
-> BY using Gpmc tool we can do centralized management of all Gpo’s across forest.
* Refers: -
(1) When user log on or log off then applied policy will refresh.
(2) When computer restart.
(3) By commands line gpupdate / force
(IN 2003 and 2003 server)

IN 2000 server the command is – secedidt / refresh /policy

Refresh time by default is – 5 min automatically
Refresh time maximum is -45 days = 64, 800minutes
Refresh time minimum is – 0 min = 7 seconds

STEPS OF INHERITANCE POLICY: -
Create an o.u. (Name parents) – create two-sub o.u. (Child1) & (child2) – Move a user (anil) into parent’s o.u. And move a user (lav) into child1 and also move a user (amit) into child2 – R.C. click on parents - properties – Group policy – New – Edit – Administrative templates – click option where you want to apply policy – R.C. on policy – properties – enabled – apply – ok.

STEPS OF BLOCK POLICY INHERITANCE: -
Open active directory console – R.C. on (child1)- properties – Group policy - Block policy inheritance – apply – ok.

STEPS OF NO-OVERRIDE OR ENFORCE: -
Open active directory console – R.C. on (parents) – Properties – Group policy – Options No override- apply – ok.

RSOP (RESULTANT SET OF POLICIES): -
In built in active directory.
Introduced with 2003 server.
GPMC tool is similar function to RSOP.
There is RSOP difference between 2000 and 2003 server.
We can install GPMC tool in windows xp and 2003 server only.

STEPS OF RSOP: -
R.C. on o.u. Or user – All task – RSOP planning – Window comes, now check this option Skip to the final page of this wizard – Next – Next – Finish.
-> RSOP is useful to see the policies.
-> Through RSOP we can find the list of policy, which applied on users or computers.
* CREATE O.U. BY CSVDE (COMMA SEPRATED VALUE DIRECTORY EXCHANGE) COMMAND: -
Steps: - At first write on notepad –
dn,objectclass
“ou=abc,dc=jha,dc=com”,organizational unit
“ou=123,dc=jha,dc=com”,organizational unit
And so on ……………..
Now save as file name ou.cvd in c: (C drive)
Now, start- run- cmd- ok.
Now run following command on c:\>
Csvde -i –k –f ou.cvd
CREATE OU BY LDIFDE (LDAP DATA INTERCHANGE FORMAT DIRECTORY EXCHANGE) COMMAND: -
Open notepad and write-
dn:ou=y1,dc=jha,dc=com
changetype:add
objectclass:organizationalunit
Now save as file name ou.txt in c: (C drive)
Now, start- run- cmd- ok.
Now run the following command on c:\>
ldifde –i –k –f ou.txt
CREATE A USER BY LDIFDE (LDAP DATA INTERCHANGE FORMAT DIRECTORY EXCHANGE) COMMAND: -
Open notepad and write-
dn:cn=abc,dc=jha,dc=com
changetype:add
objectclass:user
Now save as file name user.txt in c: (C drive)
Now, start- run- cmd- ok.
Now run the following command on c:\>
ldifde –i –k –f user.txt


K- Ignore errors
F- File name
I- Import
CREATE OU BY USING BATCH FILE: -
At first open notepad and type-
dsadd ou “ou=raj,dc=jha,dc=com”
dsadd ou “ou=ram,dc=jha,dc=com”
Now, save as filename ou.bat on desktop.
Now, double click on ou.bat file then ou will create.
· MANAGING PERMISSIONS: - We can apply permissions on user and group also.
· Permissions means maximum allowed.
· Permissions applied on resources as for example- file, folder, printer etc.
SECURITY IDENTIFIER: -
Security identifier is a data structure of variable length that identifies user, group and computers. SID is a alphanumeric number. Its length depends on user’s name length.

TO SEE SID: -
Start- Run- Cmd-Ok
Now, on c:\> run the following command: -
whoami /all
WHAT IS SHARED FOLDER: -
Shared folder is a folder, which is access by another computers on the network.
ACCESS METHODS: -
My network places
UNC (Universal Naming Convention) path
Example- \\pc3\xyz (Share name of folder)

THERE ARE THREE TYPES OF SHARING: -
Normal share/ Simple share: - Everyone can access the normal share folder.

Hidden share: - Everyone can’t access the folder. To share it give the share name hcl$ ($- Hidden share). We can access it through UNC path- \\pc3\hcl$

Special share: - According to special share all drives are shared by default. Every can’t access these drives only administrator or it’s member can access. For access by a general user administrator password is required.
On the domain controller machine only (1) Administrator Group (2) Server operators can share the folder.
On the local machine member of power users group can share the folder.

METHODS TO SHARE THE FOLDER: -
My computer- R.C. on My computer- manage- shared folders- shares- R.C. on blank space- new share- next- give the folder path- next- (.) All users have read-only access- Finish- Close.
R.C. on start- Explore- R.C. on file or folder- (.) share this folder – Allow the number of users – apply ok.
R.C. on folder- sharing and security- (.) share this folder- Give the share name- Allowed maximum users- Apply- Ok.
By command line: -
net share hcl=d:hcl
(Where, hcl- Share name and d:hcl- path of folder)

FILE SYSTEM: - To arrange data on the hard disk we use file system.

THERE ARE TWO TYPES OF FILE SYSTEM: -
FAT (File Allocation Table)-
FAT 16- it supports 4 GB partition.
FAT 32- it supports 32 GB partition.
NTFS (NTFS Version 5) - It supports 2 TB partition.
FAT supports Windows 95, 98 and ME etc.
NTFS supports windows 2000, XP, NT, 2003 etc.
NTFS file system provides additional security.

SECURITY TYPE IN NTFS: -
Compression
Encryption
Disk quota
NTFS permissions

PERMISSIONS: -
Sharing permissions- Apply on networks only.
NTFS permissions- it applies on locally and networks also.


Sharing permissions: -
Read (2) Change (3) Full control
For special permissions go to advanced tab.

NTFS PERMISSIONS ON FOLDER: -
Inheritance- Means if we apply the security permissions on c:\ (C drive) and we create a folder into it then this policy is automatically inherited on that folder.
We can also block the policy of inheritance to change the permissions, means if any security already applied on drives then through this option we can change the security options.
Example- C:\ Data (folder)
-A (Reduce one permissions per folder)
-B
-C
* TYPES OF NTFS PERMISSIONS: -
(1) Standard- Full control, Modify, Read & Execute, list folder contents, Read, Write, Special permissions.
Special permission- to apply it goes to advanced tab- Edit.

BENEFITS OF NTFS PERMISSIONS: -
Object owner can always change the permissions.
NTFS permissions are cumulative (combined).
NTFS permissions are applied only on the NTFS partitions.
You can view the effective permissions on a file or a folder.
NTFS permissions are cumulative means, suppose Amit is a user which is member of sales and account both groups and the permission already applied on both groups is read, write and then Amit has read and write both of permissions.
READ on sales and WRITE on Accounts
Amit-[ XYZ folder (R+W)

INHERITANCE STEPS: - Open MY computer- R.C. on c:\- properties- security- give the permission- ok- create a new folder in c:\ then the permissions will automatically apply on this folder.

TO SEE FOLDER SECURITY PERMISSIONS: -
R.C. on folder- properties- security- sees permissions.

* BLOCK POLICY (PERMISSIONS) INHERITANCE: -
Create a folder in any drive- R.C. on that folder- properties- security-Advanced- uncheck allow inheritable permissions……………- copy- apply-ok- and then we can apply new permissions on that folder- apply- ok.
TO TAKE OWNERSHIPS: -
Create a user name (hcl)- log on to hcl- create a folder in any drive name xyz- R.C. on folder – properties- security- select user administrator- deny (Check boxes)- apply- yes- ok.
NOW, log on to administrator- open that folder then message comes Access is denied.
Now, R.C. on that folder- properties- security- ok- advanced- owner- select user administrator- Check replace owner on sub containers and objects- apply- yes- ok- ok.
SHARING/ NTFS PERMISSIONS: -
· Sharing – Read, Change, Full control
· NTFS permissions – Full control, Modify, Read


Everyone (User) Sharing: - READ XYZ folder
NTFS: - FULL CONTROL
· When we access that folder (XYZ) on which sharing and NTFS permissions is applied then least permissions is apply.

· NTFS PERMISSIONS: -
3. Standard
· Advanced
· Sharing permissions always apply on the network.
· There are only three sharing permissions Read, Change and Full control.
· NTFS permissions apply on local as well as on network.
· There are two types of NTFS permissions Standard and Special permissions.
· If there is conflict between sharing and NTFS permissions on the network the least permission should always apply.
· In case of NTFS, permissions are cumulative (combined).
· EXAMPLE: -

NTFS – READ (Sales group)

Backup (Folder) XYZ (user)
Sharing permission
Everyone Full control NTFS – MODIFY (Accounts group)
· At first according to NTFS permission READ+MODIFY=MODIFY. Means, Modify is apply. Now, in MODIFY and FULL CONTROL, MODIFY is least permission so it is applied.
· EXAMPLE: -

NTFS- Full control (Sales group)
Backup (Folder) XYZ (user)
Sharing
Everyone READ NTFS –READ (Accounts group)
· Here, At first Full control+Read=Full control
But, in Full control and Read, Read permission is the least permission so it will apply.
· On the locally machine NTFS permissions is applied and on network machine sharing permission is applied.

DOMAIN SECURITY POLICY: -
2. Account policies
· Local security policies
· Account policies: -
a. Account lockout policy
b. Password policy
2. Local security policies: -
a. User rights-Assignments
b. Audit policy
c. Security option
a. Account lockout policy: -
B. Account lockout duration- Maximum 99,999 minutes = Approx. 70 days.
b. Account lockout threshold- Maximum 999 attempts.
c. Reset account counter after- Maximum 99,999 minutes.
· By default these policies are not defined.
b. Password policy: -
B. Enforce password history- 24 password
B. Maximum password age- 999 days
C. Minimum password age
D. Minimum password length- max. 127 character
E. Complexity password requirements
F. Store password using reversible encryption for all users in the domain.
· STEPS: - Start- Programs- Administrative tools- Domain security policy- Account policies- Password policy.

TO UNCHECK ACCOUNT IS LOCKEDOUT: -
R.C. on user- Properties-Account- Uncheck Account lockout policy.
-> TO SEE USER’S PASSWORD POLICY: -
Start- Run- cmd- ok.
Now, on c:\> net accounts
· Windows 98 and NT supports minimum 14 characters password.

GPMC (GROUP POLICY MANAGEMENT CONSOLE) TOOL: -
It is tool through which we can work on Active Directory. It is introduced with 2003 server. GPMC.MSI is Microsoft installer file. Through GPMC tool we can take the backup of GPO’s and we can also restore it. By using GPMC tool we can do centralized management of all GPO’s across forest. GPMC.MSI takes 5.5 MB space.

TO APPLY POLICY AND TAKE BACKUP BY USING GPMC TOOL: -
At first install GPMC.MSI
Start- programs- administrative tools- group policy management- domain- domain name (jha.com)- R.C. on domain name- new ou- name of ou (krish)- R.C. on ou (krish)- create and link a GPO here- name of new GPO (aaa)- ok- R.C. on GPO (aaa)- edit- administrative templates-now set the policy settings.
Now, R.C. on group policy objects- Now R.C. on GPO (aaa)-Backup- give location- Backup- ok- now delete GPO (aaa).

TO RESTORE: -
R.C. on group policy objects- manage backups- select whatever you want to restore- restore- ok- close.
-> TO MOVE A GPO IN O.U.: -
R.C. on o.u. (krish) - click on existing GPO- select GPO- select GPO (aaa) - ok
-> TO SEE POLICY SETTINGS: -
Double click on GPO- settings- show all policy settings.

BLOCK POLICY: -
R.C. on child O.U. - Block Inheritance
* AUDITING: -
Auditing is the process that tracks user and operating system activities by recording selected type of events in the security log of a server or a workstation. Auditing is crosscheck policy. There are two types of auditing- Success and Failure. To see Auditing go to Event viewer- Security logs.

CATEGORIES OF AUDITING: -
Audit account management- User account creates or deletes entry.

Audit account log-on Events- When any wrong or unauthorized user try to logon then its information shows in failure audit and when any user succeed then this information shows in success audit.

Audit logon Events- This policy applies on client machine. We enable this policy for success or failure logon events.

Audit object access- When any user access a file, folder or printer and Administrator want to see that, which one user or group access the file and resources then he can configure object access audit policy.

Audit system events- by using this policy we can find a user when, restarted or shuts- down the computer or an events occurred.

Audit directory service access- to find which user accessed Active directory services we enable this policy.

Audit privilege use- to see entry related to user rights, we enable this policy. As for example changing the system time or taking ownership of a file.

Audit policy change- if any policy changed such as password options or accounts logon settings, user rights or Audit policies then the information shows in this policy.

Audit process tracking- this information is generally useful only for programmers, who want to track details about application execution.

FOR REFRESHING: -
Start- Run- gpupdate /force- ok.

[NOTE: - Event ID 538- Logon/ logoff, Event ID 673- account logon, Event ID 642- Account management.]

STEPS FOR OBJECT ACCESS: -
Create a new folder- R.C. on folder- Properties- Auditing- Select user- Give success and failure control (Check mark all)- logoff and then logon by that user.
Now, open folder- create new folder or file inside that folder- now logoff that user.
Now, login to Administrator- See success or failure audit policy.
GROUPS: - Group is a collation of user’s computers. The purpose of group is, assign permission on resources.
File folder and printer – These are resources.
These are here types of groups
Default group
System group
Custom group
Default group/Built-in group: -
Administrator group – the member of this group can change the whole setting of computer.

Account operators – Member of this group can create user and groups in active directory and can also manage users and group created by the administrator.

Backup operator – the members of this group can take backup on domain controller, but only by using backup wizard. Even this group has not permission on files and folders. He can still take the backup by using backup wizard.

Server operators – the members of this group can shutdown the domain controller, manage he printer, share the folders and can log-on on domain controller.

Print operators – the members of this group can only manage the printer on domain controller. The members of this group have their permission on printer 1. Print permission 2. Manage printer’s permissions 3. Manage documents permissions.

Network configuration operation – The member of this group can change the network setting (As-IP address subnet mask, Preferred DNS or Alternate DNS, Default getaways etc.)

Guests – The members of this group contain guest user. For example guest user account

Power users group – The member of this group can perform the following tasks: -
He can manage the printers.
He can share the folders.
He can create local users and groups but cannot manage local users and groups created by the administrator.
He can change the system time.

System group: -

Everyone – The members of this group contains all users and groups.

Creator owner – Creator owner group is a special system group that contains only one account that is administrator. It means that only the administrator is a member of creator owner group.
Administrator is a can member of creator owner group that’s why he can take the ownerships of files and folders.

Interactive group – If you are using any local resources on your computer then you will automatically becomes the member of Interactive group.

Networks – While you accessing any network resources, In this case you will become the member of network group.

System group: - System group is those types of group that created automatically according to the situation. You cannot change the memberships of system group but you can modify the permission of system groups. Its icon is red arrow ( )

Authenticated user group: - The user who log on to your machine with valid username and password they become the member of authenticated users group.

Custom group: - Custom group is a type of group, which is created by users manually.

Groups are characterized by scope and type –
Group types –
Security – Used to assign user rights and permissions and can be use as used as an e-mail distribution list.

Distribution – can be used only with e-mail application and cannot be used to assign permissions.

Scope –
Global
Domain local
Universal
Domain functional level: -
Windows 2000 mixed – You can create only 40,000 objects. In this, three operating systems come – NT, win 2000 and win 2003 server.

Windows 2000 native – You can create millions of objects. In this, two operating systems will consider – win 2000 and win 2003 server.

Windows 2003 – Only for 2003 server operating system.

We cannot create universal-security into windows 2000 mixed.
To raise domain functional Level: - R.C on domain name – Rise domain functional level – select the raise options – raise
To create global security group by command line: -
DSADD group “cn=hclcdc,cn=users,dc=sprite,dc=com”
To create domain local security group: -
DSADD group “cn=hclcdc12,cn=users,dc=sprite,dc=com” –scope U
To create domain local distribution group: -
DSADD group “cn=hclcdc123,cn=users,dc=sprite,dc=com” –scope L –secgrp no
To See all groups: -
Dsquery group
To see system configuration: -
Start- Run- msinfo32-ok.
DISASTER RECOVERY IN SERVER 2003: -
Disaster recovery is the process that allows normal business operations to resume as quickly as possible after a disaster.
MINEOPLIS is a place in the united state of America, and there is an institute name ONTRACT RESEARCH INSTITUTE. According to this institute, in the many companies reason of disaster is following: -
42% = Hardware failure
32% = Human error
13% = Software problem
7% = Virus problem
3% = Natural disaster
3% = Others

DISASTER RECOVERY TOOL: -
Backup

Emergency phone numbers

Boot disk

ERD (Emergency Repair Disk)

Recovery console

Safe mode

Event viewer

Dr. Watson

ASR (Automated System Recovery)

Shadow copy

Backup software

All installation CD’s (Software/O.S.)

RAID (Redundant Array Of Independent Disk)

IRT: - Incident Response Team is a recovery team. When any incidents occur then this team give us responses and when its member doesn’t present then Alternate Response Team manage the whole things.

BACKUP: - By using ‘ntbackup’ wizard, we can take the backup on which machine there is a backup Medias are installed.
We can’t take backup in CD’s or DVD’s. But in windows 2008 server, we can take backup in CD’s or DVD’s.
Tape drives, pen drives these are the backup Medias.
Member of Administrator or Backup operators can take the backup.
You can also take the backup of file and folder, if you have at least read permissions on that file or folder. The owner of files and folders can always take the backup.

We can do copy both of sites- ONSITE and OFFSITE.
For accidentally cases, we use this option to restore.

WHAT YOU WANT TO BACKUP: -
Backup selected files and folders- whatever you want to backups then you can select.
Backup system state data- (1) Active Directory (2) Boot files (3) sysvol (4) IIS (5) Certificates (6) Registry.
Backup entire computer- we can take backup the whole systems.

TYPES OF BACKUP: -
Normal/ Full backup

Incremental backup

Differential backup

Copy backup

Daily backup

ARCHIVE BIT: - It is a checkmark that denotes us we have to take backup files and folders. In companies N+I or N+D backup is used.
DAY INC. BACKUP DIFF. BACKUP
MON M M
TUE T M, T
WED W M, T, W
THU TH M, T, W, TH
FRI FR M, T,W,TH,FR
SAT SAT M,T,W,TH,FR,SAT

Restore for N+I: - Restore normal backup and also every incremental backup.
Restore for N+D: - Restore normal backup and last day’s differential backup.

DAILY BACKUP: - Daily take backup, means to say that if we created a file on 21st June and we want to take its backup then we would take backup on same date. If we will take backup on 22nd June then backup will completed but when we want to restore it then its contents won’t come.

COPY BACKUP: - Same as full backup, but I don’t clear the archive bit.
STEPS: - start – Programs – Accessories – System tools – Backup
Boot Disk –

1. NTLDR 2. Boot.ini 3. NTDETECT.com 4. NTOSKRL.exe 5. NTBOOTT.sys 6. Bootsect.com

NTLDR, Boot.ini, NTDETECT.com and NTOSKRNl.exe are mandatory files and NTbootdd.sys, Bootsect.dos are options.

NTLDR, Boot.ini, NTDETECT.com, NTbootdd.sys Bootsect.dos files create on C:\ (System partition)
These files are hidden.
NTOSKRNL.exe create in windows\system32

NTLDR – NTLDR is a pre-boot sequence file. This file is also called parent file. This is always executed in c partition
When we start system then following task is preformed: -

POST

BIOS check for MBR (Master Boot Record)

MBR checks for active partition c:\

NTLDR executed in c partition

Boot.ini – It contains the list of the operating system, installed in your computer.
By default operating system selection time is 30 seconds, but we can increase or decrease the time setting.

To see these files: -
1. By using GUI interface
2. By using attrib command

NTOSKRNL.EXE – This file is use to execute or boot your operating system.

NTDETECT.com – This file detects all the hardware in your computer and enters the hardware key in the registry.

Key – Information in registry.

NTBOOTDD.SYS – When we use SCSI hard disk then this file create. Then its entry shows in c partition.

Boot.DOS – If you are use dual booting XP and 2000 then this create. This file divides operating system into sector.

To see hidden files by command line: -
Start – run – cmd – c:\Attrib
NTLDR – SHR (System Hidden Red only)
· Recovery console – Recovery console is a disaster recovery tool that is use to enabling and disabling the services, recovering the missing files and you do troubleshooting by using limited command line troubleshooting tool. You can use recovery console by two ways –
2. By using CD
· You can also install recovery console from CD.
· The minimum space required to install recovery console is 7 MB.
· Recovery console is a security enable tool that means you can’t copy any files from your hard disk to another media but VICE-versa is possible.

· Commands in Recovery Tool –
1.Copy 2. Format 3. CD_. 4. LISTSVC – For driver and services 5. CHKDSK 6. DISKPART 7. HELP 8. MORE 9. Enable 10. Disable 11. RMDIR 12. MKDIR 13. EIXMBR – To FIXMBR 14. Expend for uncompress 15. FIXBOOT – To FIX BOOT sector.
· DR.Watson – It is a tool that use for application errors means software errors. (To see errors)
· Start – run – DRWTSN32 (To see application errors)
· Safe mode
· Safe mode with networking
· Safe mode with command prompt
a. Safe mode – In safe mode, system is boot with GUI interface with minimum set of drivers and services. The purpose of safe mode is to troubleshoot devices and services.
b. Safe mode with networking – We can copy file through network and also load the LAN drivers.

c. Safe mode with command prompt – Troubleshoot by command line interface.
All installation CD’S
1. CD’S XP\2003
2. Latest service packs
3. Software = MS Office, TALLY, ADDBE etc.
4. Antivirus software

Shadow copies – A shadow copy is a feature of the windows server 2003 family that provides point-in-time, read-only copies of files on network shares. By using shadow copies of shared folders, you can view the contents of network folders as they exited or created at various point in time.

NTFS partition is required for shadow copies.
It applies on driver or volumes.
It works on only share files o folders.
Minimum amount of storage space for shadow copy is 100 MB.
It creates 64 shadow copies of 1 file.
By default time of shadow copies creation is 7:00 AM and 12:00 PM.
We can change the time settings.
Bu using this, we can recover files and we can also see previous version of file.
Previous version is software where whole snap-shot is applied.
To see it-
Start- Run- \\5.0.0.0.1-ok. Now. R.C. on share folder- Properties- Previous version.
In windows XP with Service pack-2 and in windows VISTA this option is already installed.

STEPS: - R.C. on any drive- Properties- Shadow copies- Enable- Settings- (.) Use limit space (100 MB)- Schedule- Once (Schedule task)- Start time (10:35 AM)- Advanced- Repeat task (Every 5 minutes)- ok- ok- ok- ok.
Now, create a new folder in same drive name hcl- R.C. on hcl- Sharing and Security- Share this folder- Permissions- Everyone full control- Ok- Apply- Ok.
Now, Start- Run- \\5.0.0.1 (IP address of own computer)- Ok. - R.C. on hcl folder- Properties- Previous version.
ERD (Emergency Repair Disk): - When we run ntbackup wizard then in windows 2000 professional there are three options shows- Backup, restore and ERD. But in Windows XP professional there are three options come- Backup, Restore and ASR (Automated System Recovery). When we click on ERD and insert floppy then it copies IO.SYS, MSDOS.SYS, COMMAND.COM (System files), Registry and Partitions also.

ASR: - Automated System Recovery is a backup utility, which helps us to recover a system that doesn’t start. It contains two parts- Backup and Recovery. ASR also creates a floppy disk that is used to store disk configurations during the ASR recovery procedure.
We can restore operating system, software’s and system state data.
Suppose that c:\ is corrupt and in the d:\ Backups are available then insert the floppy now, it copies all files or folders into floppy. After that we insert the floppy and press F2 and through doing this process we can restore the O.S. and other software’s.

EVENT VIEWER: - A component you can use to view and mange event logs, gather information about hardware and software problems, and monitor security events. Event viewer maintains logs about, program, security, and system events.
(Logs – Information)
Application – Application error or software error
(As – c, c++, MS office etc.)
System – operating system events (As – DHCP, DNS, etc.)
Security – Audit policies

RAID – Redundant array of independent/Inexpensive disk
A method used to standardize and categorize fault tolerant disk system.
There are three types of RAID levels–0(Striping level – 1 (marring) and level 5 (RAID-5)

Compression and encryption: -

Compression – To increase space in drives or removable storage we apply this attribute because compressing files and folders decreases their size.
For compression NTFS partition is required.
Compressed files and folder shows in blue color.
We should not compress to the system files and windows folders because this affects the server performance.
In Microsoft windows server 2003 supports two types of compression –
NTFS compression and 2. Compressed (Zipped) folders feature.
Compact command: - This is another toot for compressing files and folders.
Compact – Displays the states of files and folders in current directory.
Compact /C DNS (Folder name) - To compress folder
Compact /U DNs (Folder name) – To uncompress folders
Compact

By GUI – R.c on file or folder – properties – advanced - Compress files and folder.

Encryption – By applying this option we can hide the contents of message.

DRA – It is a Microsoft certificates services.
DRA stands for data recovery agent.
By default DRA is not available in windows XP when it is the workgroup.
Domain administrator is defaulting DRA when XP is in the domain.

Plaintexts – Data that is not encryption. It is also called clear text.

Cipher – After encrypt the file or folder. Everyone can’t read these files.
We should not encrypt the system and windows files.
We can encrypt files using two method –

1. GUI
2. Command line.
R.c on file and folder – Properties – advanced - Encrypt files and folders.

cipher command – (Displays the states of the files and folders in the current directory.

cipher /e xyz (folder name)- This command is use to encrypt the folder.

cipher /d xyz (folder name)- This command is use to decrypt the folder.

cipher /e /a xyz\a.txt (a.txt- file name)- This command is use to encrypt specific files in the folder.

cipher /e /s:xyz- to encrypt folders inside the folder.

MONITORING OF WINDOW SERVER 2003: -
We can monitor this things-
RAM

Hard disk

Processor

Network

PROACTIVE: - Already active to face some problems or accidents.

REACTIVE: - Immediately active.

Proactive is better than reactive because it gives us more time to think about how to resolve the problems.

MONITORING TOOL: -

TASK MANAGER- it is also called real time monitoring tool. Windows task manager provides information about computer performance and displays details about programs and processes running on your computer.

ALERT- Alerts related to server and resource use. Alert notify users about problems in areas such as security and accesses, server shutdown due to powerless, directory replication and printing. For this, messenger service should be started. When a computer generates an administrative alert a message is sent to a predefined list of users and computers.

STEPS: - First install a printer- After that- Programs- Administrative Tools- Services- R.C. on messenger- Properties- Select startup type- Automatic- Apply- Ok- Now R.C. on messenger- Start.
Now, Start- Programs- Administrative Tools- Performance- Performance logs and alerts- R.C. on alerts- new alert setting- Name – Printer- Ok- Add- Performance object- Printer queue- Add- Close- Limit 2- Send a network message to \\krishna- Apply- Ok.
Now, Open word pad – Type anything- save.

COUNTER: - It is a log-monitoring tool.

ROAMING PROFILE: - When we create any user in Active directory and log on that user and create some files or folders on user’s desktop and we want to log on that user on client machine then the environment of Active directory comes on client machine and user can work freely with network in anywhere. So Roaming profile is more useful for client computers.

STEPS: - Create a folder in any drive and share the folder- and give full control- (Give folder name – Ram)- Apply ok.
Now, Open Active directory- Users- Create two new user name (Any name)
Now, Create a new folder in Ramesh and also Raj
Now, on first user name- Properties- Ram- Path of ram folder- \\computername\Ram (folder name)\Ramesh (folder)- Ok
Now, Log on to first user- Open My computer- Properties- Advanced- User profile- Settings- See roaming profile.
(NOTE- Same process for 2nd user)

MANDATORY PROFILE: - A mandatory user profile is a roaming profile that can be used to specify particular settings for individuals or an entire group of users. Only system Administrator can make changes to mandatory user profile.

STEPS: - Where we create a Ram folder during Roaming profile practical- Open – Ramesh- NTUSR.DAT- Rename this file into NTUSR.MAN
Now, R.C. on MY computer- Properties- Advanced- Settings- Here all mandatory profile shows.

RECOVERY CONSOLE: - The recovery console is a minimal version of the windows server 2003 operating system that you can use to start windows server 2003, when severe startup problems prevent the server from booting. It provides a command-line interface and a set of commands that you can use to repair damaged system components, such as a damaged boot sector, that prevent you from starting the computer any other way.

To install the Recovery Console locally, Run-
D:\i386\winnt32.exe/cmdcons, Where D: is a CD ROM drive.

STEPS: - C:\- Tools- Folder options- View- Show hide file and folders –Apply –Ok.
C:\- ntldr (Shift+del) Means, delete ntldr file
Then restart the system, now comment shows-
NTLDR is missing
Now, Restart the system and boot from CD- Press R- now, press 1 (Where is boot partition)- Type password
Now, go to CD drive-
D:\i386 > copy ntldr C:\
D:\>cd\
D:\>exit
To hidden the NTLDR file:-
C:\>attrib +s +h +r ntldr
Now, in folder options- View- (.) Hide protected operating system file
C:\>attrib –s –h –r ntldr
To see system file ATTRIB command is used.
HOW TO INSTALL RECOVERY CONSOLE: -
Type-
D:\>i386\winnt32.exe /cmdcons
To view all command related to Recovery Console type: -
C:\>HELP
To remove Recover Console: -
Tools- Folder options- View- Show hide protected in C:\ cmdcons- Delete the folder- Delete cmldr file
Now, C:\>attrib –s –h –r boot.ini (Remove Recovery Console)

Monday, November 23, 2009

Managing and Maintaining Windows XP professional

MCSE, EXAM CODE: -70-270

EDITION TYPES OF WINDOWS XP: -. 2

XP PROFESSIONAL AND XP HOME EDITION DIFFERENCE BETWEEN: -. 2

OPERATING SYSTEM: -. 2

EXAMPLES OF NETWORKING SERVICES: -. 2

CLIENT OPERATING SYSTEM: -. 3

* MINIMUM REQUIREMENT TO INSTALL WINDOWS XP PROFESSIONAL: -. 3

* TYPES OF INSTALLATION (2000, 2003 and Xp windows): -. 3

UNATTENDED INSTALLATION OF WINDOWS XP PROFESSIONAL: -. 3

WHAT IS WELCOME SCREEN AND SWITCHING USERS IN WINDOWS XP PROFESSIONAL? 4

TO ENABLE WELCOME SCREEN AND SWITCHING USERS: -. 4

TO CREATE THE LOCAL USERS AND GROUPS: -. 4

BUILT-IN GROUPS: -. 4

TO CREATE NEW USER BY COMMAND LINE: -. 4

PASSWORD AND ACCOUNT POLICIES IN WINDOWS XP PROFESSIONAL: -. 5

NEXT. 5

SHUTDOWN COMMAND IN WINDOWS XP PROFESSIONAL AND ALSO 2003 SERVER: - 5

TO VIEW PASSWORD AND ACCOUNT LOCKOUT POLICY BY COMMAND LINE: -. 6

Users variable in windows xp professional: -. 6

APPLYING LOG-ON AND LOG-OFF SCRIPTS IN WINDOWS XP PROFESSIONAL: -. 6

HARDWARE PROFILE: -. 7

DISK QUOTA – It applies on windows 2000 professional, xp professional, 2000 server, 2003 server, Vista or longhorn server (2008 Server). 7

THERE ARE TWO TYPES OF DISK QUOTA: -. 7

What is driver roll back in windows xp professional?. 7

* FAST (files and setting transfer wizard): -. 8

* Backup and recovery: -. 8

* Types of backup: -. 8

* FOR BACKUP WIZARD: -. 9

* What is share folder in windows xp professional?. 9

Types of sharing: -. 9

SHARE FOLDER BY COMPUTER MANAGEMENT: -. 10

OFFLINE FILES: -. 10

SYNCHRONIZATION: -. 10

CREATE USER BY USING COMMANDLINE ON NOTEPAD: -. 11

Settings for power schemes: -. 11

DEVICE MANAGER: -. 11

COMPUTER MANAGEMENT AND DISK MANAGEMENT: -. 11

BY COMMANDLINE: -. 11

MICROSOFT MANAGEMENT CONSOLE (MMC) IN WINDOWS XP PROFESSIONAL: - 12

SECONDARY LOG ON (RUN –AS FEATURE) OR, BY USING A USER CREATES A NEW USER: - 12

TROUBLESHOOTING (NETWORKING) IN WINDOWS XP PROFESSIONAL: -. 12

PRINTER: -. 13

TERMS OF PRINTER: -. 13

INSTALLATION OF PRINTER: -. 14

RIS (REMOTE INSTALLATION SERVICES): -. 14

EDITION TYPES OF WINDOWS XP: - INDEX

Windows xp professional

Windows xp home

Windows xp tablet pc

Windows xp media center

Windows xp 64 bit

XP PROFESSIONAL AND XP HOME EDITION DIFFERENCE BETWEEN: -

We can make domain’s client to windows XP professional but we cannot make domain’s client to windows xp home edition.

XP professional used for office purpose while XP home used for personal homework purpose.

The following features are not present in windows Xp home edition: -

  1. Remote desktop
  2. Multi-processor support
  3. Automated System Recovery (ASR)
  4. Dynamic disk support.
  5. Fax
  6. Internet Information Services/Personal Web Server.
  7. Encrypting File System
  8. Group Policy
  9. Roaming Profile
  10. Multi-language support
  11. RIS support
  12. Sysprep support

The following Networking features are not included in home edition: -

1.The user interface for Ipsecurity (Ipsec)

2. SNMP

3. Simple TCP/IP services

4. SAP agent

5. Client service for Netware

6. Network Monitor

7. Multiple Roaming Feature

OPERATING SYSTEM: - BACK DOWN

Operating system is system software or an interface, which works between man and machine.

There are three types of operating system-

(a) Single-User-Single Tasking (Example-DOS)

(b) Single-User Multitasking (Example- Client operating systems)

(c) Multi-User Multitasking (Exam

EXAMPLES OF NETWORKING SERVICES: - BACK

1. DHCP

2. DNS

3. MAIL SERVER

4. WINS

5. RRAS (ROUTING AND REMOTE ACCESS SYSTEM)

6. VPN

7. FIREWALL SERVER

8. PROXY SERVER

SERVER: - Server is a leader of networks that offers the direction to the client computers.

* SERVER OPERATING SYSTEMS: -

1. NT 4.0

2. 2000 SERVER

3.2000 ADVANCE SERVER

4.2003 SERVER

5. 2008 SERVER OR LONGHORN SERVER

(10 GB Space required for 2008 server installation)

CLIENT OPERATING SYSTEM: - Back Down

Client operating system avails the services, which are provided by the server operating systems.

1. WINDOWS 3.1

2. WINDOWS 3.11

3. WINDOWS 95

4. WINDOWS 98

5. WINDOWS ME

6. WINDOWS NT WORKSTATION

7. WINDOWS 2000 PROFESSIONAL

8. WINDOWS XP

9. WINDOWS VISTA

10.WINDOWS 7

* MINIMUM REQUIREMENT TO INSTALL WINDOWS XP PROFESSIONAL: -

1. 64 MB RAM minimum, 128 recommended.

2. 1.5 GB minimum hard disk space and 3 to 4 GB recommended.

3. 233 MHz processor minimum.

4. Partition should be FAT and NTFS (NTFS version – 5).

* TYPES OF INSTALLATION (2000, 2003 and XP windows): -

(a) Normal installation of windows XP professional.

(b) Unattended installation of windows XP professional.

(c) By using RIS (Remote Installation Services)

(d) By using SYS-prep (System preparation)

(e) By using floppy drive.

UNATTENDED INSTALLATION OF WINDOWS XP PROFESSIONAL: -

*Methods: -

Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.

Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.

Your browser may not support display of this image.Your browser may not support display of this image. X-Machine Y-Machine

IP Address: - 10.0.0.1 IP Address: - 10.0.0.2

On X – machine: -

[A] Insert windows XP professional cd in cd-rom.

[B] Create a blank folder name XP on C:

[C] Browse cd and extract files from support- tools- deploy.cab to xp folder.

[D] Open the XP folder and start setupmgr.exe.

[NOTE: - Name of answer file is unattend.txt. Windist share folder contains the file unattend.txt. When we copy these files in floppy drive then it’s name known as WINNT.SIF.]

On Y-machine: -

START- RUN- \\10.0.0.1\WINDIST\I386\WINNT32.EXE /UNATTEND :\\10.0.0.1\WINDIST\UNATTEND.TXT.

WHAT IS WELCOME SCREEN AND SWITCHING USERS IN WINDOWS XP PROFESSIONAL? Down BACK

Welcome screen and switching users both are the part of windows xp professional. You can only use this option when your machine is in workgroup. Switching users can affect your RAM and CPU utilization so you use this option when required.

TO ENABLE WELCOME SCREEN AND SWITCHING USERS: -

Start – Control panel – User accounts – Change the logon or log off way

Your browser may not support display of this image.

Your browser may not support display of this image.Check both boxes – Apply options.

Your browser may not support display of this image.GROUP: - Group is a collection of users that is used to assign the permissions.

TO CREATE THE LOCAL USERS AND GROUPS: -

Method-1 Start –Programs – Administrative tools – Computer management.

Method-2 My computer (R. C.) – Manage – Computer management.

Method-3 Start – Run – Compmgmt.msc- Click Ok.

BUILT-IN GROUPS: -

Power users group: -

The member of power users group performs the following functions –

The member of this group can change the system time.

The member of this group can manage the printer.

The member of this group can also create local users and groups. The member of this group can manage the local users and groups created by him.

The member of this group can share and unshared the folders.

Network configuration operators: -

The member of this group can manage the network settings.

Administrators: -

The member of this group can manage the whole settings.

Backup operators: -

The member of this group can perform backup by using backup wizard.

[NET- This command is use to manage users and groups.]

TO CREATE NEW USER BY COMMAND LINE: - BACK

net user Krishna /add *

TO DELETE USER BY COMMAND LINE: -

net user Krishna /delete

TO CREATE MEMBER OF GROUPS BY COMMNDLINE: -

net localgroup “power users” Krishna /add

TO CREATE LOCALGROUP BY COMMAND LINE: -

net localgroup sales /add

TO DELETE LOCALGROUP BY COMMAND LINE: -

net localgroup sales /delete

TO CHANGE USERS PASSWORD :-

net user Krishna *

TO SEE NUMBER OF USERS: -

net user

TO SHOW NUMBER OF GROUPS: -

net localgroup

TO SHOW INFORMATION ABOUT USERS: -

net user Krishna

PASSWORD AND ACCOUNT POLICIES IN WINDOWS XP PROFESSIONAL: -

START – PROGRAMS – ADMINISTRATIVE TOOLS – LOCAL SECURITY POLICY

ACCOUNT LOCKOUT POLICY: -

Account lockout duration – maximum 99999 minutes.

Account lockout threshold – maximum 999 logon attempts.

Reset account lockout counter after – maximum 99999 minutes.

PASSWORD POLICY: -

Enforce password history – maximum 24 passwords remember.

Maximum password age – 999 days.

Minimum password age.

Password must meet complexity requirements- this should enable for the security purpose.

Store password using reversible encryption for all users in the domain.

NEXT BACK

SHUTDOWN COMMAND IN WINDOWS XP PROFESSIONAL AND ALSO 2003 SERVER: -

shutdown –s (For shutdown the system, By default 30 seconds.)

shutdown –a (For abort shutdown the system.)

shutdown – l (For logoff the machine.)

shutdown – i (Shutdown number of system together.)

shutdown –s –t 100 (After 100 sec machine will be shutdown.)

shutdown –r (For shutdown and restart the system.)

shutdown –m \\computername (Remote computer to shutdown/restart/abort.)

shutdown –t xx (Set timeout for shutdown to xx seconds.)

shutdown –c “comment” (Shutdown, comment max. of 127 characters.)

shutdown –f (Forces running application to close without warning.)

shutdown –d [w][p] :xx:yy (The reason code for the shutdown.)

u- is the user code.

P –is the planned shutdown code.

xx – is the major reason code. (Positive integer less than 256.)

yy is the minor reason code. (Positive integer less than 65536.)

USER PROFILE: - User’s setting available in documents and settings.

TO VIEW USER PROFILE SETTINGS: -

START (R.C.) – EXPLORE – CLICK USERNAME

TO VIEW PASSWORD AND ACCOUNT LOCKOUT POLICY BY COMMAND LINE: -

START- RUN – CMD – NET ACCOUNTS

TO DISABLE OR ENABLE USER ACCOUNTS: -

NET USER USERNAME /ACTIVE:NO

NET USER USERNAME /ACTIVE:YES

TO UNCHEK THE ACCOUNT IS LOCKED OUT: -

MY COMPUTER (R.C.) – MANAGE – LOCAL USERS AND GROUPS –USERS – R.C. ON USERNAME – PROPERTIES - UNCHEK THE ACCOUNT IS LOCKED OUT

CUSTOMIZING THE STARTUP FOLDER: -

Start (R.C.) – open – programs – startup – Make a new folder and create a text document.

(Now it will come on that desktop through which we are logged in currently.)

SEND MESSAGES TO USERS: -

Create a notepad file and write MSGBOX “HI HOW ARE YOU” and then copy it and paste into the startup folder and give the file name A.vbs. (HERE, A is filename and .vbs is file extension.)

Users variable in windows XP professional: -

It is implement on windows xp, 2000,and 2003 server.

VARIABLE: - Point out to a certain location in system.

THERE ARE THREE TYPES OF VARIABLE: -

User variable – Manually defined.

System variable – Automatic defined.

Auto executable variable – In this system32 files are available.

STEPS: - Create a new folder in E: name hcl/data/hcl1/raj. After that my computer (R.C.) – Properties – Advanced – Environmental variables – New – Give the variable name and path of the folder. (Value- Path, Variable- Name)

NOW, Start – Run - %folder name% - Ok (%winder% - for windows folder.)

APPLYING LOG-ON AND LOG-OFF SCRIPTS IN WINDOWS XP PROFESSIONAL: -

Start – Run – gpedit.msc

THERE ARE TWO TYPES OF SCRIPT: -

Log on/Log off – For users.

Startup/shutdown – For computers.

STEPS: - Create a new folder in C: (C drive) and create a file on notepad and save in that folder, after that on notepad write – MSGBOX “hello” – save as raj.vbs. Again create a file on notepad write 0MSGBOX “bye” – save as ram.vbs]

NOW, Start – Run –gpedit.msc – Windows settings –Scripts –Log on and log off – Double click on log on – give the path – ok. Again double click on log off – Give the path – ok.

Now, logoff the system and log on again then script will run.

HARDWARE PROFILE: - BACK Down

Hardware profile concept is basically useful for mobile users or laptop users.

We create hardware profile to minimize the usage of battery in laptop computers.

Docking station device – For profile switching without restarting.

TO CREATE HARDWARE PROFILE: -

Steps: - My computer (R.C) – properties – Hardware – Hardware profiles – copy – name of profile – ok - ok.

Customizing my documents folder: - change the location of my documents and settings file and save it to another drive.

DISK QUOTA It applies on windows 2000 professional, xp professional, 2000 server, 2003 server, Vista or longhorn server (2008 Server).

It supports NTFS partition.

THERE ARE TWO TYPES OF DISK QUOTA: -

* Default disk quota – For all users, we apply it.

*Individual disk quota – For specific user, we can apply it.

Disk quota - Applying limit to the users.

It applies by the administrator.

Your browser may not support display of this image.*Steps: - My computer – c:(R.C) – properties – disk quota -Enable quota (check both box) – quota entries – quota -ok.

What is driver roll back in windows xp professional? BACK

ANS – driver roll back is the feature of windows xp and windows server 2003.

Driver is a software programs that enables your device to communicate within operating system.

* There are two types of driver: -

(1) Plug and play- Already driver installed or automatically finds driver.

(2) Non –plug and play- lately driver have to install

*Update - Modification

*Upgrade – New installation

EXAMPLE: -

Suppose LAN driver version-1 is installed and after that we updated version-2 and then if version-2 doesn’t work properly, we can roll back the version-1.

Printer’s driver cannot be roll back because it does not show in device manager.

Printer’s driver is managing software.

*Steps: - My computer (R.C) – properties – hardware – device manager – LAN driver (R.C) – properties – driver – rollback driver.

* FAST (files and setting transfer wizard): -

-This is the feature of windows xp and 98, 95, Me, NT operating systems.

-Through fast we can change the users desktop and settings.

*Steps: - change desktop wall paper (background) and then create two users a and b

Your browser may not support display of this image.Log in user a - start – programs – accessories – system tool – files and transfer setting wizard – next – choose old computer – next –select a transfer method … choose, other (for example, removable drive or network drive)- browse –my computer – c: - make a new folder –ok –next –what do you want to transfer – next – finish

Your browser may not support display of this image.Your browser may not support display of this image.Now, log in user b –start – programs –accessories – system tools – files and transfer settings wizard – next – choose new computer –next – do you have a windows xp cd , select last option I don’t need the wizard disk – next – where are the files and setting select other -browse give the folder path – next –finish -log off the user and again log-in to same user.

* Backup and recovery: - BACK DOWN

The backup utility helps you create a copy of the information on your hard disk. If the original data of hard disk is accidentally erased then we find it using restore program.

*Steps: -

1.start –programs – accessories – system tools –backup

2. Start – run –NTBACKUP

* Types of backup: -

(1) Normal backup / full backup

(2) Incremental backup

(3) Differential backup

(4) Copy backup

(5) Daily backup

- In many companies Normal+Incremental or Normala+Differential backup are used.

-Backup are using from windows 2000 to till now

-For security purpose we use Normal+Differential backup.

-Normal+Differential backup used more space.

-Normal+Incremental backup uses less space.

Archive bit: - The backup software filters the files, using a special file attribute called the archive bit. It is a check mark.

(1) Normal backup/Full backup: - It copies the entire contents of a computer’s either to tape or to another medium. We can Performa full backup every day.

(2) Incremental backup: - Incremental backup only backing up the files that have changed since the lost backup, whether it was a full backup or an Incremental backup. Its restore process is lengthens. If you should have to restore on entire computer you must first perform a restore from the last full backup tape, and must then restore each of the incremental jobs performed since the last full backup. Incremental backup reset the archive bits.

(3) Differential backup: - Differential backup, backups all of the files that have changed since the last full backup. It uses more tape, because some of the same files are backed up each day. Its restore process is very simply. It doesn’t reset the archive bits.

(4) Daily backup: - It doesn’t clear the archive bit. If any user creates a folder and text document name a.txt on 6th march and another user, wants to backup up of that folder. Then user will be backup on same date mean to say that only 6th march. If after 6th user will want to take backup then, can’t perform backup of that documents.

(5) Copy backup: -When we don’t take differential+Incremental backup then we use it. It doesn’t clear the archive bit. It seems as normal backup.

Steps 1: - Create a new folder in E: (Name Data/Create two files)- Select a file (R.C.) – Properties – Advanced – See archive bit check mark.

* FOR BACKUP WIZARD: -

1. Start – Run – ntbackup

2. Start – Programs – Accessories – system tools – Select backup

Steps 2: - Start – run – ntbackup – click advanced mode – click backup wizard – next – what to backup:

Your browser may not support display of this image.Backup selected files, drives or network data ->next -> choose a place to save your backup browse (click) and give the path and backup name – save – next – advanced – select the type of backup – next –(.) select 1-st and last options – next – (.) select first option – next – (.) Now

(.) Later –Next-finish-Close

After that backing up, delete folders, files and start the restore program.

Steps for Restore Program: - For Start – run – ntbackup – click advanced mode

-Restore wizard – next – select the item, which have to restore – next – finish – close.

* What is share folder in windows XP professional? BACK DOWN

Ans: - share folder is accessible folder, which is access by another computer on the network.

Share Method: -

* By using net share command

(It is use to also see the share folder.)

* By using computer management

* By using windows explorer

(It is use to access the share folder)

Method to access the share folder: -

* My network places

* By using UNC Path (Universal Naming convention)

Start-run-\\ip address name of pc\folder name

* In Internet explorer bar- \\ip address or name of pc\folder name.

It is a network path.

Who can share the folder?

Ans: - The member of administrators and power users group can share the folder.

Types of sharing: -

(a) Normal share - \\pc1\123 (folder name) - using two ways, we can perform normal share.

(b) Hidden share - \\pc1\123 $ (folder name $) – using one-way, we can perform hidden share. ($ - Hidden shine for folder)

(c) Special share or Default share - \\pc1\c $ - special share is useful for drives sharing.

Steps: - My computer- R.C. on folder (which have to share) – Sharing and security – share name – maximum allowed – permissions – apply - ok.

BY COMMAND LINE: -

Start – run – cmd – ok – now type on c:\

netshare sharename (abc) =E:\xyz (folder name and path)

SHARE FOLDER BY COMPUTER MANAGEMENT: -

My computer (R.C.) – manage – shared folder – shares – R.C. on blank space – new file share wizard – next – select path and share name – next – next – refresh.

NOTE: - In windows xp professional maximum allowed is 10 for share folder. But in server 2003 there are unlimited user allowed.

OFFLINE FILES: -

When remote desktop and switch user are disabled then offline files work.

Offline files concept is useful feature for mobile users (laptop). By default the option of offline files are disabled. When you make your file as offline file it comes under the local cache of your computer.

STEPS: - Tools – folder options – offline files – apply – ok.

NOTE: - It applies on windows server 2000 and advanced (Later) version.

TO OPEN REMOTE DESKTOP: -

My computer (R.C.) – properties – Remote desktop.

SYNCHRONIZATION: - BACK

There are two types of synchronization in offline files: -

(a) Manual synchronization

(b) Automatic synchronization

YOU CAN PERFORM AUTOMATIC SYNCHRONIZATION IN TWO WAYS: -

Log on and log off

On scheduling

Manual

Steps: - On 1-st machine (server) - create a new folder in c:\ abc and create a text document and write something. After that share the folder and give the full control.

Now on second machine (Laptop):-

Start – run - \\IP address of 1-st machine (server) - ok- select folder abc and open the file. Now, Tools – folder option – offline files –

[.] Enable offline files

[ ] Synchronize all offline files when logging on

[.] Synchronize all offline files before logging off

[.] Display a reminder every […………….] minute

[.] Create an offline files shortcut on the desktop

[ ] Encrypt offline files to secure data – apply - ok

Now, R.C. on file – makes available offline and after that disables the LAN.

Now again, open the file with notepad – ok – open and write something whatever you want – save.

Now, enable the LAN again R.C. on file – synchronize.

Now on 1-st machine: -

Open that folder and right click –refresh.

After that all written words and letters are comes on that file.

BATCH FILE: -For fast work we create a batch file.

STEPS: - START – Programs – accessories – notepad (Write whatever you want to open) – Calc.exe

Regedit.exe

Notepad.exe

– Save on desktop and give the name hcl.bat – save.

Now open that file.

Or, Start – run – gpedit.msc – windows settings – log on/log off – give the path of file - ok.

CREATE USER BY USING COMMANDLINE ON NOTEPAD: -

net user abc /add

net user abc1 /add

net user abc2 /add

net user abc3 /add

net user abc4 /add

net user abc5 /add

After that – save this file on desktop, give the file name ram.bat – save – close the notepad.

Now, open ram.bat

TO CHECK NEW USER ENTRY: - My computer (R.C.) – manage – local users and groups – select users.

POWER SCHEMES: -Power scheme defines most appropriate settings on your computer.

THERE ARE TWO TYPES OF POWER SCHEMES: -

(1) Default power schemes

(2) Customize power schemes

YOU CAN SET TWO TYPES OF OPTIONS IN POWER SCHEMES: -

(a) Turn off monitor

(b) Turn off hard disk

NOTE: - You can choose your power scheme according to the situation, for example if you are giving presentation or seminar then in this case you can choose presentation power scheme.

STEPS: -R.C. on desktop – properties – screen saver – power – power schemes – select options according to requirement – apply – ok.

To create new power schemes – click save as – and give the power schemes name – ok.

Settings for power schemes: -

Turn on monitor…According to situation… (In minutes)

Turn off hard disk…Never… (In minutes) – Apply – ok.

DEVICE MANAGER: - BACK DOWN

By using device manager you can install, modify, update and remove your hardware devices.

Driver is a software program that enables your device to communicate within operating system.

COMPUTER MANAGEMENT AND DISK MANAGEMENT: -

My computer (R.C.) – manages – system tools – device manager – change the settings in computer (according to need).

We can install and uninstall the devices by using computer management.

We can also update the driver.

For any settings whatever we want right click on device – properties – advanced settings – ok.

BY COMMANDLINE: -

Start – run – compmgmt.msc

DISK MANAGEMENT: -

My computer (R.C.) – manage – storage – disk management – create a new partition and also we can delete, change drive letter, format; delete logical drive, properties also.

MICROSOFT MANAGEMENT CONSOLE (MMC) IN WINDOWS XP PROFESSIONAL: -

By using MMC command we can create shortcut of any programs on desktop (As a batch file), whatever we want to open.

STEPS: - Start – run – mmc – ok – click on file tab – Add/Remove snap-in – add – select the programs, whatever we want to open – add – (.) local computer – finish – close – ok

Again click on file, file save as – desktop (Where you want to save) – give the file name – save close console root.

Now, open that file.

Extension of MMC file is .msc.

SECONDARY LOG ON (RUN –AS FEATURE) OR, BY USING A USER CREATES A NEW USER: -

Steps: - Start – programs – administrative tools – computer management – run as – (.) The following user

User name …Administrator……

Password……hcl@123…. – ok – Click local users and groups – users – R.C. on blank space – Make a new folder.

DOWN BACK

TROUBLESHOOTING (NETWORKING) IN WINDOWS XP PROFESSIONAL: -

STEPS: - Start – run – cmd –ok.

Ipconfig /all- Details about windows IP configuration.

Ipconfig – Show windows IP address.

Ping (Packet Internet Groper)

Ping is used to check the network connectivity to other systems.

Ping is the king in networking.

We can ping the by using IP address and systems name.

By using ping 10.0.0.1 –t

It means ping the specified host until stopped. To see statistics and continue press control+ Break; to stop- press control+C.

Ping 10.0.0.1 –a: - Resolve address to hostnames.

Ping 10.0.0.1 –n: - number of echo requests to send.

Ping 10.0.0.1 –l: - Send buffer size.

Ping 10.0.0.1 –f: - Set doesn’t fragment flag in packet.

Ping 10.0.0.1 –I TTL: - Time To Live

Ping 10.0.0.1 –v TOS: - Type of service.

Ping 10.0.0.1 –r count: - Record route for count hops.

Ping 10.0.0.1 –s count: - Timestamp for count hops.

Ping 10.0.0.1 –j host-list: - Loose source route along host-list.

Ping 10.0.0.1 –k host-list: - Strict source route along host-list.

Ping 10.0.0.1 –w timeout: - Timeout in milliseconds to wait for each reply.

Ping –n 10 10.0.0.1 (10= number of reply)

ERROR DURING PING COMMAND: -

Request time out: - cable fault, wrong IP and if machine is shutdown then it comes.

Destination host unreachable: - when default gateway is blank then it comes.

Unknown host: - If we types wrong systems name then it comes.

Hardware error: - cause of switch fluctuation problem, LAN card problem and also cable problems.

NETSH: - by using this command you can change the IP address and subnet masks.

CHANGE IP ADDRESS BY COMMANDLINE: -

netsh interface ip set address name=”LAN” source=static addr=10.0.0.1 mask=255.0.0.0

PRINTER: -

THERE ARE TWO TYPES OF PRINTER: -

(a) Local printer: - Where printer is installed on one machine.

(b) Network printer: - One printer installed on one machine but for other computers that printer is called network printer.

The server on which printer is installed or defined is called print server.

In windows xp professional we can install only 10 clients but in windows 2003 server and 2000 server, there are no limits of clients.

TERMS OF PRINTER: -

(a) Spooler

(b) Printer pooling

(c) Print priority

Your browser may not support display of this image.Your browser may not support display of this image. Network

Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.ppp

Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.

Your browser may not support display of this image.Your browser may not support display of this image.

(Printer) (Pc-1) (Pc-2)

For Pc-1 this printer is local printer and for Pc-2, this printer is network printer.

Spooler: -Spooler is a directory or folder that keeps print job until they are printed.

Location of spooler: - E:\windows\system32\spool\printers.

After that printing, the list of print command is deleted.

It stores all commands in row (queue).

Its location may be change.

STEPS: - Click on printer – file – server properties – advanced – spool folder………………………..Give the new location.

COMMAND FOR PRINTER: - Start – programs – accessories – WordPad – write anything, whatever you want – give the print command – after that all command are stored in spool folder.

Printer pooling: -

Your browser may not support display of this image.

Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image. HP 3000 (Printer-1)

Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.Your browser may not support display of this image.

Your browser may not support display of this image. HP 3000 (Printer-2)

Your browser may not support display of this image. Pc-1 (Xp machine)

Your browser may not support display of this image. HP 3000 (Printer-3)

Your browser may not support display of this image.Your browser may not support display of this image.

Your browser may not support display of this image. (Client Pc)

Printer pooling is redirection of the job to the available printer.

When any client give the print command and that time one printer is busy then it automatically forward print command to the next printer, which are not working on that time.

Printer priority: -When two users send the print command together then it works on the basis of maximum priority.

Minimum priority is 1 and maximum is 99.

STEPS: - At first install one printer name printer-1 and one logical printer of printer-1 and create two new users – R.C. on printer-1 – properties – security – add – advanced – find now – select user – apply – ok.

Now, on second printer (Logical printer) – properties – advanced – available from (Give the time) …12AM to 2 PM…

Your browser may not support display of this image.Priority (Select priority=3, For example) - apply – ok.

PERMISSIONS:

(a) Print: - For users.

(b) Manage printers: - For power users and administrator group members.

(c) Manage documents: - For administrators.

INSTALLATION OF PRINTER: - BACK

Start – settings – printer and faxes – add a printer – next – local or network printer (Select one whatever you want to install) – next – (.) use the following ports (LPT1) OR, Create a new port – next – select manufacturer and printers – (.) Existing same driver

( ) Replace driver - Default printer

( ) Yes

(.) No - Next – (.) Do not share this printer OR, ( ) share name – do you want to print a test page ( ) yes

( ) No - Next – Finish.

RIS (REMOTE INSTALLATION SERVICES): -

PXE- BOOT RAM is required for RIS.

PXE (Pre- Executable Bootable)

Press shift+F10 to enable PXE-boot RAM.

RBFG (Remote Boot Floppy Generator) for floppy drive.

ON SERVER MACHINE (PC1) INSTALL THESE SERVICES: -

DHCP SERVER

DOMAIN CONTROLLER

DNS SERVER

RIS SERVER

In windows 2003 sp-2, we can also deploy vista and 2008 operating system.

In windows 2003 sp-2, RIS known as WDS (Windows Deployment Service)

Now, on client machine (pc2) boot from LAN card and press F12.

BACK