October 25th, 2012 Windows Server 2012 Richard Oertle Subject

41 Slides1.45 MB

October 25th, 2012 Windows Server 2012 Richard Oertle Subject Matter Expert / Instructor www.NetComLearning.com

Windows Server 2012 New Features and Certifications Certification Changes Microsoft Certified Solution Expert in Windows Server 2012 Microsoft Certified Solution Administrator in Windows Server 2012 Administration Changes Screen and Navigation changes PowerShell changes Version 3.0 with 2400 cmdlets

Starting from the beginning: Become an MCSA Pass the following 3 tests to gain the equivalent of passing the 70-417 test 70-410 Installing and Configuring Windows Server 2012 70-411 Administering Windows Server 2012 70-412 Configuring Advanced Windows Server 2012 Services Then consider continuing on for an MCSE in the 3 previous categories of Desktop, Private cloud or Server Administration

Upgrading from MCITP to MCSE Must renew MCSE status every three years! MCITP upgrade test is 70-417 (course 20417) MCITP accepted certifications includes: Lync Administrator SharePoint Administrator Desktop Administrator Enterprise Messaging Administrator Windows Server 2008 Administrator

Pass the 70-417 upgrade test THEN: Take and pass the specialist area tests shown below Determine which of 3 MCSE specialist areas to focus on: MCSE in Server Infrastructure 70-413 Designing and Implementing a Server Infrastructure 70-414 Implementing an Advanced Server Infrastructure MCSE in Desktop Infrastructure 70-415 Implementing a Desktop Infrastructure 70-416 Implementing Desktop Application Environments

MCSE Information continued MCSE in Private Cloud Infrastructure 70-246 Monitoring and Operating a Private Cloud with System Center 2012, Course 10751 (5 days) 70-247 Configuring and Deploying a Private Cloud with System Center 2017, Course 10750 (5 days)

Some of the New Administration features of Windows Server 2012

Active Directory Administrative Center, is a task-oriented tool based on Windows PowerShell

Password Settings Objects You can use fine-grained password policies to specify multiple password policies within a single domain Fine-grained password policies: Apply only to user objects (or inetOrgPerson objects) and global security groups Cannot be applied to an OU directly Do not interfere with custom password filters that you might use in the same domain

Configuring Password Settings Objects Windows Server 2012 provides two tools for configuring PSOs Windows PowerShell cmdlets New-ADFineGrainedPasswordPolicy Add-FineGrainedPasswordPolicySubject Active Directory Administrative Center Is a graphical user interface Uses Windows PowerShell cmdlets to create and manage PSOs

Managed Service Account Use to automate password and SPN management for service accounts used by services and applications Requires a Windows Server 2008 R2 or Windows Server 2012 server installed with: .NET Framework 3.5.x Active Directory module for Windows PowerShell Recommended to run with AD DS configured at the Windows Server 2008 R2 functional level or higher Can be used in a Windows Server 2003 or 2008 AD DS environment: With Windows Server 2008 R2 schema updates With Active Directory Management Gateway Service

Group Managed Service Accounts Group managed service accounts extend the capability of standard managed service accounts by: Enabling an MSA to be used on more than one computer in the domain Storing MSA authentication information on domain controllers Group MSA requirements: Must have at least one Windows Server 2012 domain controller Must have a KDS root key created for the domain

The Central Store The Central Store: Is a central repository for ADMX and ADML files Is stored in SYSVOL Must be created manually Is detected automatically by Windows Vista or Windows Server 2008 ADMX files Windows Vista or Windows Server 2008 workstation Domain controller with SYSVOL Domain controller with SYSVOL

Group Policy Preferences Group Policy preferences expand the range of configurable settings within a GPO Group Policy preferences: Enable IT professionals to configure, deploy, and manage settings that were not manageable by using Group Policy Are natively supported on Windows Server 2008 and Vista SP2 or newer Can be created, deleted, replaced, or updated

Comparing Group Policy Preferences and GPO Settings Group Policy Settings Group Policy Preferences Strictly enforce policy settings by writing the settings to areas of the registry that standard users cannot modify Are written to the normal locations in the registry that the application or operating system feature uses to store the setting Typically disable the user interface for settings that Group Policy is managing Do not cause the application or operating system feature to disable the user interface for the settings they configure Refresh policy settings at a regular interval Refresh preferences by using the same interval as Group Policy settings by default

Group policy Management Editor Allows editing of the ADMX file Extends the functionality of GPMC

Features of Group Policy Preferences Common Tab Is used to configure additional options that control the behavior of a Group Policy preference item Targeting Features Determines to which users and computers a preference item applies

Deploying a Cloned Virtualized Domain Controller You can safely clone an existing virtual domain controller by: 1. Creating a DcCloneConfig.xml file and storing it in the AD DS database location 2. Taking the VDC offline and exporting it 3. Creating a new virtual machine by importing the exported VDC DcCloneConfig.xml to AD DS database location Export the VDC Import the VDC

Overview of the Active Directory Module for Windows PowerShell The Active Directory module for Windows PowerShell provides full administrative functionality in these areas: User management Computer management Group management OU management Password policy management Searching and modifying objects Forest and domain management Domain controller and operations masters management Managed service account management Site replication management Central access and claims management

Windows PowerShell Web Access Allows remote management of computers by running Windows PowerShell sessions in a web browser. Powershell replaces tab completion with Visual Studio style drop down options Many former scripts are now compiled into cmdlets

Polls

What Is NTDSUtil? With NTDSUtil you can: Manage and control single master operations Perform AD DS database maintenance Perform offline defragmentation Create and mount snapshots Move database files Maintain domain controller metadata Reset Directory Services Restore Mode password

Creating AD DS Snapshots Create a snapshot of Active Directory NTDSUtil Mount the snapshot to a unique port NTDSUtil Expose the snapshot Right-click the root node of Active Directory Users and Computers, and choose Connect to Domain Controller Enter serverFQDN:port View (read-only) snapshot Cannot directly restore data from the snapshot Recover data Connect to the mounted snapshot, and export/reimport objects with LDIFDE Restore a backup from the same date as the snapshot Manually reenter data www.netcomlearning.com

Configuring the Active Directory Recycle Bin? Active Directory Recycle Bin provides a way to restore deleted objects without AD DS downtime Uses Windows PowerShell with Active Directory Module or the Active Directory Administrative Center to restore objects

Dynamic Access Control Dynamic Access Control provides: A safety net over all file server-based resources Data identification Access control to files File access auditing Optional RMS protection integration

What Is FSRM? FSRM Enables the following functionality: Storage quota management File screening management Storage reports management Classification management File management tasks

Using FSRM to Manage Quotas, File Screens, and Storage Reports What Is Quota Management? What Are Quota Templates? Monitoring Quota Usage What Is File Screening Management? What Are File Groups? What Are a File Screen Templates and File Screen Exceptions? What Are Storage Reports? What Is a Report Task? Demonstration: How to Use FSRM to Manage Quotas, File Screens, and Generate On-Demand Storage Reports

Monitoring Quota Usage You can monitor quota usage by: Viewing quota information in the FSRM console Generating a quota usage report Creating soft quotas Using the Get-FSRMQuota Windows PowerShell cmdlet

File Screening Management File screen management provides a method for controlling the types of files that can be saved on file servers File screen management consists of: Creating file screens Defining file screen templates Creating file screen exceptions Creating file groups

Storage Reports Storage reports provide information about file usage on a file server Types of storage reports include: Duplicate Files File Screening Audit Files by File Group, Owner, or Property Folders by Property Large Files Quota Usage Least and most recently accessed files

Classification Management Classification management enables you to create and assign classification properties to files using an automated mechanism Classification Rule File Management Task Classification Property Payroll.rpt IsConfidential

Classification Properties A Classification Properties is a configurable value that can be assigned to a file Classification properties can be any of the following: Yes/No Date/Time Number Multiple choice list Ordered list String Multi-String

Options for Storage Optimization in Windows Server 2012 Storage optimization features include: File access auditing Features on Demand Data deduplication NFS data stores

Implementing IPAM What Is IPAM? IPAM Architecture Requirements for IPAM Implementation Managing IP Addressing Using IPAM IPAM Management and Monitoring Considerations for Implementing IPAM

What Is IPAM? IPAM facilitates IP management in organizations with complex networks by enabling administration and monitoring of DHCP and DNS

Managing IP Addressing Using IPAM You can view and manage the IP address space using the following views: IP address blocks IP address ranges IP addresses IP inventory IP address range groups You can monitor the IP address space using the following views: DNS and DHCP servers DHCP scopes DNS zone monitoring Server groups

IPAM Management and Monitoring With IPAM, you can: Monitor IP address space utilization Monitor DNS and DHCP health Configure many DHCP properties and values from the IPAM console Use the event catalog to view a centralized repository for all configuration changes

What Is iSCSI? TCP/IP protocol iSCSI transmits SCSI commands over IP networks iSCSI client that runs the iSCSI Initiator Storage Array iSCSI Target Server

iSCSI Target Server and iSCSI Initiator

Considerations for Implementing iSCSI Storage Consider the following when designing your iSCSI storage solution: Deploy the solution on fast networks Design a highly available network infrastructure for your iSCSI storage solution. Design an appropriate security strategy for the iSCSI storage solution Follow the vendor-specific best practices for different types of deployments The iSCSI storage solution team must contain IT administrators from different areas of specialization Design application-specific iSCSI storage solutions together with application specific administrators, such as Exchange Server and SQL Server administrators

Thank You! Back to Rinchen Stick around for Raffle and Q&As www.NetComLearning.com

Back to top button