NTFS Security
NTFS permissions can be used to secure files and folders on an NTFS Partition. Unlike share permissions, NTFS permissions can be assigned to individual files as well as folders. Permissions can be assigned to individual users or groups of users. … Take lesson
Compression and Encryption for File Systems
NTFS v5.0 allows files to be encrypted using the EFS utility (Encrypting File System). Only the person who has encrypted the file and the Recovery Agent can decrypt the file. Encrypted data can’t be moved from one machine to another … Take lesson
Printing Overview
One of the most important devices in any of today’s offices is a printer. A printer, just like files and folders, can be shared amongst other users on the network. A Windows Server or XP Professional machine can act as … Take lesson
Transmission Control Protocol/Internet Protocol (TCP/IP)
In order for communication to occur on a network all parties must use a common language. In IT networks this is known as a protocol. There are many different protocols available for computer networks. The most common and widely used … Take lesson
Binary Numbers
The thinking bits of a computer use “flip-flops” to show “up” or “down” or “ on” or “off”. It’s just as easy to think of these as on/off light bulbs. Arrays of these flip-flops are used for storing and manipulating … Take lesson
The IP Address
Every computer on a network and the internet needs an address. This address is known as an IP address. Two computers can never have the same address. An IP Address is a group of 4 eight bit binary numbers represented … Take lesson
Configuring TCP/IP
This free lesson will teach you how to configure TCP/IP in windows and how to use the ipconfig command. Use the buttons below to navigate through the lesson To configure TCP/IP click on Start. Right-click on My Network Places. Select … Take lesson
Internet Connection Firewall
Windows XP ships with a basic built-in firewall. The firewall helps protect the computer from outside attacks on the internet. A firewall controls which network traffic is allowed in and out of a computer. It does this by opening and … Take lesson
Troubleshooting TCP/IP
These are the two main utilities for troubleshooting TCP/IP: ping – used to test connectivity ipconfig – used to view IP address information. Use the buttons below to navigate through the lesson Before launching into detailed settings investigation, always check … Take lesson
TCP/IP Quiz
This quiz covers the the training module “TCP/IP”. This module contains six lessons. Here is a summary of the previous lessons. Transmission Control Protocol/Internet Protocol (TCP/IP) Binary Numbers The IP Address Configuring TCP/IP Internet Connection Firewall Troubleshooting TCP/IP [mtouchquiz 14]
Take lessonRouting Overview
IP routing at its most basic level allows a network packet to travel from its source address to its destination address. In a basic LAN there is normally only one network and traffic can be sent directly to the machine … Take lesson
Dynamic Routing
Where there are only a few networks and routers, it is easy to enter a few static routes. However, if a larger number of routes are required, manual entry can become quite time consuming. Dynamic routing, on the other hand, … Take lesson
Installing and Configuring RIP
Installation and maintenance of RIP is performed through the Routing and Remote Access MMC Snap-In: Use the buttons below to navigate through the lesson Right click on General and Click New Routing Protocol…. Select RIP Version 2 for Internet Protocol … Take lesson
Troubleshooting Routing
There are several tools built into Windows Server 2003 to troubleshoot routing problems. The first of these tools is ping. Ping allows you to check the connectivity of a remote host by sending four packets of data to the remote … Take lesson
Introduction to Name Resolution
Name resolution is a method of reconciling an IP address to a user friendly computer name. Originally networks used host files to resolve names to IP addresses. They came in the form of a text file that the computer accessed … Take lesson
DNS Overview
WINS worked well for internal networks as all machines are part of the same organisation. However, with the advent of the Internet where there are many networks connected, a method of structuring names became essential. A flat database, such as … Take lesson
DNS Servers and Zones
Primary DNS Servers A DNS Server contains zone files. If a DNS Server is authoritative over a zone file, it has full control over it. A Primary DNS Server can update, make additions to, modify and delete records in the … Take lesson
Installing and Configuring DNS in Windows Server 2008
Before installing DNS it is imperative that the server has a static IP address. DNS is installed using the Server Manager Utility. N.B. DNS is not available on Windows Server 2008 Web Edition or machines running Windows XP or Vista. … Take lesson
Install and Configure DNS Active Directory
To install Active Directory and DNS using the Server Manager. Use the buttons below to navigate through the lesson Select Server Manager. Or from the Quick Launch Taskbar. Select Roles. Then Add Roles. Before you continue verify that; You can … Take lesson
Install and Configure DNS Server Core
To install DNS on 2008 Server Core. Type start /w ocsetup DNS-Server-Core-Role. Note the syntax of the command and the capitalisation as server roles must be in this format.Once the installation has completed, you need to attach to the server … Take lesson
Configuring DNS Clients
Before the DNS server will be of any use, the clients on the network will need to be configured to use the server. To do this bring up the TCP/IP properties of your network adapter. In the Preferred DNS server … Take lesson
Troubleshooting DNS
NSLOOKUP is an important utility that performs query testing and troubleshooting of DNS servers at the command prompt window. NSLOOKUP can be accessed by going to the command prompt window and typing in NSLOOKUP and pressing Enter. Use the buttons … Take lesson
Introduction to DHCP
In large networks the task of assigning TCP/IP addresses can be troublesome. The administrator will have to manually give every machine an IP address and subnet mask, as well as additional information such as DNS and WINS server addresses. A … Take lesson
Installing DHCP
To install DHCP using the Server Manager click on Start. Select Server Manager. Or from the Quick Launch Taskbar. Select Roles. Then Add Roles. Click Next to continue. Select DHCP Server. Click Next to continue. Then Click Next. Select Network … Take lesson
Setting up a DHCP Scope
Access DHCP server click Start>Administrative Tools>DHCP. The green arrow next to the server indicates that the DHCP service is running. To create a new scope right-click on the server. Select New Scope. Click Next. Fill in Scope name and description, Click Next to continue. Next, specify … Take lesson
Configuring a DHCP Server
To access the DHCP server click Administrative Tools> DHCP. To view DHCP server statistics, right-click on the server. Then select Display Statistics. The Server Statistics box shows general information about the DHCP server such as the number of Acknowledgements and … Take lesson
DHCP on a Routed Network
Since DHCP uses broadcasts, and routers block broadcasts, clients on remote subnets may be unable to receive TCP/IP information from a DHCP Server. Clients will use Automatic Private IP Addressing (APIPA) if they are unable to locate a DHCP server. … Take lesson
Overview of IPSec
Security is a key part of any network. Companies need to protect their network from eavesdropping and tampering. Windows provides ACLs (Access Control Lists) which can be used to prevent access to data over the network. However, ACLs don’t protect … Take lesson
IPSec Security Policies
IPSec Security Policies are rules and filters that provide a specified level of security. You can create your own policies, but Windows provides three built-in ones: Client (Respond Only). The client will use IPSec if requested but won’t initiate an … Take lesson
IPSec and Remote Access
Security is a major concern when using Remote Access since company data has be transferred over the internet. Using the tunnelling protocol L2TP (Layer 2 tunnelling protocol) a tunnel can be created through another network. Any data inside the tunnel … Take lesson
Network Address Translation
Before a Windows Server 2008 computer can function as a router, the Routing and Remote Access service must be enabled. This is done through the Server Manager console. Use the buttons below to navigate through the lesson Select Roles, then … Take lesson
Wireless Networks
Wireless Networking Concepts Wireless networks have changed the way people use their computers. Organizations can instantly network an entire building—including meeting rooms, common areas, and courtyards. This can increase productivity and provide more flexible work spaces. For some buildings, including … Take lesson
Remote Access Overview
Many people work away from their offices, so Windows Server 2008 provides the Routing and Remote Access Service, which lets users connect to their office machines. The Routing and Remote Access Service (RRAS) allows a client to connect to the … Take lesson
Authentication Protocols
A first step in establishing a remote access connection is authenticating the user to the server. An authentication protocol is used here. Windows Server 2008 ships with five different authentication protocols all with varying compatibility and security levels. Use the … Take lesson
RADIUS Server
You can use a Windows Server 2008 computer to authenticate wireless users by configuring the Windows Server 2008 computer as a RADIUS server and configuring your wireless access points to send authentication requests to the RADIUS server. Use the buttons … Take lesson
Connect To Wireless Network in Windows XP or Vista
Users can manually connect to a wireless network, or you can use Group Policy settings to configure client computers to automatically connect to your wireless networks. Use the buttons below to navigate through the lesson Manual Connections To create a … Take lesson
Installing Server 2008
To use Windows Server 2008 you need to meet the following minimum hardware requirements; Use the buttons below to navigate through the lesson When prompted for an installation language and other regional options, make your selection and press Next. When … Take lesson
The Active Directory Database
Networks are collections of users, computers, printers and resources. In pre-Windows 2000 domains information was scattered throughout the network, and finding an object would have needed several searches. Windows 2000 introduced the Active Directory Service. Active Directory is designed to … Take lesson
Installing Active Directory 2008
Before installing Active Directory you should ensure that your computer has: A meaningful name. i.e. DC1, Server1, Es-netDC A static IPv4 address. At least one NTFS partition. A Network connection, for testing a loopback connection can be used. Use the … Take lesson
Installing Active Directory On Server Core
Server Core Setup The following list of commands will enable your server core machine to join a domain and prepare it to host Active Directory. Use the buttons below to navigate through the lesson Give the computer a sensible name. … Take lesson
Installing Server 2008 Quiz
This quiz covers the the training module “Installations”. This module contains four lessons. Here is a summary of the previous lessons. Installing Server 2008 The Active Directory Database Installing Active Directory Installing Active Directory On Server Core [mtouchquiz 16]
Take lessonThe Microsoft Management Console (MMC) 2008
In the following presentation we will create an MMC containing all the necessary snap-ins for administering Active Directory. Active Directory Users and Groups. Active Directory Domains and Trusts. Active Directory Sites and Services. Active Directory Schema. Server Management. Use the … Take lesson
Creating Objects in Active Directory
Active Directory is the Windows directory service, and its role is to maintain information about enterprise resources, including users, groups, and computers. Resources can be divided into Organizational Units (OUs) to facilitate manageability and visibility—that is, they can make it … Take lesson
Finding Objects in Active Directory
You have learned how to create objects in Active Directory, but what good is information in a directory service if you can’t get it out of the directory as well? Use the buttons below to navigate through the lesson You … Take lesson
Delegation of Control
In previous lessons, you’ve learned how to create users, groups, computers, and OUs. Your ability to perform those actions was dependent on your membership in the Administrators group of the domain. Use the buttons below to navigate through the lesson … Take lesson
Server Administration Quiz
This quiz covers the the training module “Administration”. This module contains four lessons. Here is a summary of the previous lessons. The Microsoft Management Console (MMC) 2008 Creating Objects in Active Directory Finding Objects in Active Directory Delegation of Control … Take lesson
Certificates Overview
Public Key Infrastructure (PKI) is implemented in Windows in the form of certificate services. Certificates can be used to provide both authentication and encryption for a Windows network. Use the buttons below to navigate through the lesson A certificate contains … Take lesson
Introduction to SUS
In order to maintain a secure network, it is critical to keep systems up to date with security patches. Since 1998, Microsoft has provided Windows Update as a Web-based source of information and downloads. With Windows XP and Windows 2000 … Take lesson
Windows Firewall
Windows Firewall filters incoming traffic to help block unwanted network traffic. Optionally, Windows Firewall can also filter outgoing traffic to help limit the risk of malware. Although Windows Firewall’s default settings will work well with components built into Windows, they … Take lesson
Creating Inbound Filters
By default, Windows Firewall (as well as most other firewalls) blocks any inbound traffic that hasn’t been specifically allowed. By default, the Public profile allows absolutely no incoming connections—this provides excellent security when connecting to public hotspots or other non … Take lesson
Creating an Outbound Filter
By default, Windows Firewall allows all outbound traffic. Allowing outbound traffic is far less risky than allowing inbound traffic. However, outbound traffic still carries some risk: Use the buttons below to navigate through the lesson If malware infects a computer, … Take lesson
Logging for Windows Firewall
If you are ever unsure about whether Windows Firewall is blocking or allowing traffic, you should enable logging, re-create the problem you’re having, and then examine the log files. Use the buttons below to navigate through the lesson Right click … Take lesson
Install and Configure WSUS
Right click Roles. Then select Add Roles. Click Next. Select Windows Server Update Services. Select Add Required Role Services. Click Next. Click Next. Select any further IIS components. Click Next. Click Next. Click Install. The Server must be connected to … Take lesson
Configure Client-side Targeting
You use Group Policy objects (GPOs) to add computers to computer groups when you enable client-side targeting. First, configure the WSUS server for client-side targeting. Use the buttons below to navigate through the lesson Select Options and then Computers. Select … Take lesson
Reports
You can view detailed information about updates, computers, and synchronization using the Reports node in the Update Services console. Use the buttons below to navigate through the lesson Update Status Summary this report displays detailed information about every update that … Take lesson
Monitoring Event Logs
Windows has always stored a great deal of important information in the event logs. Unfortunately, with versions of Windows released prior to Windows Vista, that information could be very hard to access. Event logs were always stored on the local … Take lesson
Creating an Event Subscription
Expand Event Viewer. right click Subscriptions. Select Create Subscription. Enter Subscription Name. Use the buttons below to navigate through the lesson You can create two types of subscriptions: Collector initiated – The collecting computer co ntacts the source computers to … Take lesson
Monitoring Performance and Reliability
Performance and reliability monitoring is useful in several scenarios: Improving the performance of servers by identifying the performance bottleneck and then upgrading the bottlenecked resource. Identifying the source of critical performance problems that make services unusable or completely unavailable. Correlating … Take lesson
Network Monitor 2008
Troubleshooting complex problems requires gaining insight into the inner workings of an application. When you are troubleshooting network problems, one of the best ways to gain insight is to capture and analyze the network communications using a protocol analyzer. Microsoft … Take lesson
Group Types and Scopes
There are three types of groups in Active Directory: Universal, Global, and Domain Local. Use the buttons below to navigate through the lesson There are two main functions of groups in Active Directory: Gathering together objects for ease of administration. … Take lesson