KEMBAR78
Storage | PDF | Solid State Drive | File System
0% found this document useful (0 votes)
27 views265 pages

Storage

Uploaded by

Yahia Aissani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views265 pages

Storage

Uploaded by

Yahia Aissani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 265

MCT USE ONLY.

STUDENT USE PROHIBITED


9-2 Implementing Local Storage

Lesson 1
Overview of Storage
When you plan a server deployment, one of the key components that you require is storage. There are
various types of storage that you can utilize, such as locally-attached storage, storage that is remotely
accessed via Ethernet, or storage connected with optical fiber. You should be aware of each solution’s
benefits and limitations.

As you prepare to deploy storage for your environment, you need to make some important decisions. This
lesson addresses questions to consider, such as:
• Does the storage need to be fast?

• Does the storage need to be highly available?

• How much storage does your deployment actually require?


• How much resilience do you need to add to the initial storage requirement to ensure that your
investment remains secure in the future?

Lesson Objectives
After completing this lesson, you will be able to:

• Describe disk types and performance.


• Describe direct-attached storage.

• Describe network-attached storage.

• Describe a storage area network (SAN).


• Describe Redundant Array of Independent Disks (RAID).

• Describe RAID levels.

• Describe the new file and storage service features in Windows Server 2012 and Windows
Server 2012 R2.

Disk Types and Performance


There are various types of disks available that
you can use to provide storage to server and
client systems. The speed of disks is measured in
Input/Outputs Operations Per Second (IOPS).The
most common types of disks are:

• Enhanced Integrated Drive Electronics (EIDE).


EIDE is based on standards that were created
in 1986. The integrated drive electronics (IDE)
interface supports both the Advanced
Technology Attachment 2 (ATA-2) and
Advanced Technology Attachment Packet
Interface (ATAPI) standards. Enhanced refers
to the ATA-2 (Fast ATA) standard. Due to the addressing standards of this technology, there is a 128
gigabyte (GB) limitation on storage using EIDE. Also, the speed of an EIDE drive is limited to a
maximum of 133 megabytes (MB) per second. EIDE drives are almost never used on servers today.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-3

• Serial Advanced Technology Attachment (SATA). Introduced in 2003, SATA is a computer bus
interface, or channel, for connecting the motherboard or device adapters to mass storage devices
such as hard disk drives and optical drives. SATA was designed to replace EIDE. It is able to use the
same low-level commands as EIDE, but SATA host adapters and devices communicate via a high-
speed serial cable over two pairs of conductors. It can operate at speeds of 1.5, 3.0, and 6.0 GB per
second, depending on the SATA revision (1, 2 or 3 respectively). SATA disks are generally low-cost
disks that provide mass storage. Because SATA drives are less expensive than other drive options, but
also provide less performance, organizations might choose to deploy SATA drives when they require
large amounts of storage but not high performance. SATA disks are also less reliable compared to
serial attached SCSI (SAS) disks.
A variation on the SATA interface is eSATA, which is designed to enable high-speed access to
externally-attached SATA drives.
• Small computer system interface (SCSI). SCSI is a set of standards for physically connecting and
transferring data between computers and peripheral devices. SCSI was originally introduced in 1978
and became a standard in 1986. Similar to EIDE, SCSI was designed to run over parallel cables;
however, recently the usage has been expanded to run over other mediums. The 1986 parallel
specification of SCSI had initial speed transfers of 5 MB per second. The more recent 2003
implementation, Ultra 640 SCSI, also known as Ultra 5, can transfer data at speeds of 640 MB per
second. SCSI disks provide higher performance than SATA disks, but are also more expensive.
• SAS. SAS is a further implementation of the SCSI standard. SAS depends on a point-to-point serial
protocol that replaces the parallel SCSI bus technology, and uses the standard SCSI command set. SAS
offers backward-compatibility with second generation SATA drives. SAS drives are reliable and made
for 24 hours a day, seven days a week (24/7) operation in data centers. With up to 15,000 rotations
per minute, these disks are also the fastest traditional hard disks.
• Solid-state drives (SSDs). SSDs are data storage devices that use solid-state memory to store data
rather than using the spinning disks and movable read/write heads that are used in other disks. SSDs
use microchips to store the data and do not contain any moving parts. SSDs provide fast disk access,
use less power, and are less susceptible to failure from being dropped than traditional hard disks,
such as SAS drives, but also are much more expensive per GB of storage. SSDs typically use a SATA
interface, so you typically can replace hard disk drives with SSDs without any modifications.

Note: Fibre Channel, FireWire, or USB-attached disks are also available storage options.
They define either the transport bus or the disk type. For example, universal serial bus (USB)-
attached disks use mostly with SATA or SSD drives to store data.

What Is Direct Attached Storage?


Almost all servers provide some built-in storage.
This type of storage is referred to as direct
attached storage (DAS). DAS can include disks that
are physically located inside the server or connect
directly with an external array, or disks that
connect to the server with a USB cable or an
alternative method. Because DAS storage is
connected to the server physically, the storage
becomes unavailable if the server suffers a power
failure. DAS comes in various disk types such as
SATA, SAS or SSD, which affect the speed and the
performance of the storage, and has both
advantages and disadvantages.
MCT USE ONLY. STUDENT USE PROHIBITED
9-4 Implementing Local Storage

Advantages of Using DAS


A typical DAS system is made up of a data storage device that includes a number of hard disk drives that
connect directly to a computer through a host bus adapter (HBA). Between the DAS and the computer,
there are no network devices such as hubs, switches, or routers. Instead, the storage is connected directly
to the server that utilizes it, making DAS the easiest storage system to deploy and maintain.

DAS is also usually the least expensive storage available today, and is widely available in various speeds
and sizes to accommodate various installations. In addition to being inexpensive, DAS is very easy to
configure. In most instances, you would simply plug in the device, ensure that the running Windows®
operating system recognizes it, and then use the Disk Management feature to configure the disks.

Disadvantages of Using DAS


Storing data locally on DAS makes data centralization more difficult because the data is located on
multiple servers. This can make it more complex to back up the data and, for users, more difficult to locate
the data they want to find. Furthermore, if any one device that has DAS connected to it suffers a power
outage, the storage on that computer becomes unavailable.

DAS also has drawbacks in its access methodologies. Due to the way reads and writes are handled by the
server operating system, DAS can be slower than other storage technologies. Another drawback is that
DAS shares the processing power and server memory of the server to which it is connected. This means
that, on very busy servers, disk access might become slow when the operating system is overloaded.

What Is Network Attached Storage?


Network attached storage (NAS) is storage that is
connected to a dedicated storage device and then
accessed over the network. NAS is different from
DAS in that the storage is not directly attached to
each individual server, but rather is accessible
across the network to many servers. NAS has two
distinct solutions: a low-end appliance (NAS only),
and an enterprise-class NAS that integrates with
storage area network (SAN).

Each NAS device has a dedicated operating


system that solely controls the access to the
data on the device, which reduces the overhead
associated with sharing the storage device with other server services. An example of NAS software is
Windows Storage Server, a feature of Windows Server 2012.
NAS devices typically provide file-level access to the storage. This means that the data on the storage is
accessible only as files, and you must use protocols like Common Internet Files System (CIFS), Server
Message Block (SMB), or Network File System (NFS) to access the files.

To enable NAS storage, you need a storage device. Frequently, these devices do not have any server
interfaces such as keyboards, mice, and monitors. To configure the device, you need to provide a network
configuration and then access the device across the network. You can then create network shares on the
device by using the name of the NAS and the share created. These shares then are accessible to the
network’s users.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-5

Advantages of Using NAS


NAS is an ideal choice for organizations that are looking for a simple and cost-effective way to achieve
fast data access for multiple clients at the file level. Users of NAS benefit from performance and
productivity gains because the processing power of the NAS device is dedicated solely to the distribution
of the files.

NAS also fits nicely into the market as a mid-priced solution. It is not expensive, but it suits more needs
than DAS in the following ways:
• NAS storage is usually much larger than DAS.

• NAS offers a single location for all critical files, rather than dispersing them on various servers or
devices with DAS.

• NAS offers centralized storage at an affordable price.

• NAS units are accessible from any operating system. They often have multi-protocol support and can
serve up data via CIFS and NFS simultaneously. For example, Windows and Linux hosts can
simultaneously access a NAS unit.

NAS can also be considered a Plug and Play solution that is easy to install, deploy, and manage, with or
without IT staff onsite.

Disadvantages of Using NAS


NAS is slower than SAN technologies. NAS is frequently accessed via Ethernet protocols. Because of this, it
relies heavily on the network supporting the NAS solution. For this reason, NAS is commonly used as a file
sharing/storage solution and cannot (and should not) be used with data-intensive programs such as
Microsoft® Exchange Server and Microsoft SQL Server®.
NAS is affordable for small to mid-size businesses, but provides less performance and may be less reliable
than a SAN. For this reason, most large enterprises use SANs rather than NAS.

Additional Reading: For more information about Windows Storage Server 2012 R2, refer
to “Windows Server 2012 R2” at http://go.microsoft.com/fwlink/?LinkID=199647.

What Is a SAN?
The third type of storage is a SAN, which is a
high‐speed network that connects computer
systems or host servers to high-performance
storage subsystems. A SAN usually includes
various components such as HBAs, special
switches to help route traffic, and storage disk
arrays with logical unit numbers (LUNs) for
storage.
A SAN enables multiple servers to access a pool of
storage in which any server can potentially access
any storage unit. Because a SAN uses a network,
you can use a SAN to connect many different
devices and hosts and provide access to any connected device from anywhere.

SANs provide block level access. This means that, rather than accessing the content on the disks as files by
using a file access protocol, SANs write blocks of data directly to the disks using protocols such as Fibre
Channel over Ethernet or Internet Small Computer System Interface (iSCSI).
MCT USE ONLY. STUDENT USE PROHIBITED
9-6 Implementing Local Storage

Today, most SAN solutions offer SAN and NAS together. The backend head units, disks, and technologies
are identical; the access method is the only thing that changes. Enterprises often provision block storage
from the SAN to the servers using Fibre Channel over Ethernet or iSCSI, whereas NAS services are made
available via CIFS and NFS.

Advantages of Using SAN


SAN technologies read and write at block levels, making data access much faster. For example, with most
DAS and NAS solutions, if you write a file of 8 GB, the entire file has to be read/written and its checksum
calculated. With a SAN, the file is written to the disk based on the block size for which the SAN is set up.
This speed is accomplished by using fiber channel and block level writing, instead of having to read/write
an entire file by using a checksum.

SANs also provide:

• Centralization of storage into a single pool, which enables storage resources and server resources to
grow independently. They also enable storage to be dynamically assigned from the pool when it is
required. Storage on a given server can be increased or decreased as needed without complex
reconfiguring or re-cabling of devices.
• Common infrastructure for attaching storage, which enables a single common management model
for configuration and deployment.

• Storage devices that are inherently shared by multiple systems.


• Data transfer directly from device to device without server intervention.

• A high level of redundancy. Most SANs are deployed with multiple network devices and paths
through the network. As well, the storage device contains redundant components such as power
supplies and hard disks.

Disadvantages of Using SAN


The main drawback to SAN technology is that due to the complexities in the configuration, SAN often
requires management tools and expert skills. It is also considerably more expensive than DAS or NAS. An
entry-level SAN often costs as much as a fully loaded server with a DAS or an NAS device, and that is
without any SAN disks or configuration.
To manage a SAN, you often use command-line tools. You must have a firm understanding of the
underlying technology, including the LUN setup, the Fibre Channel network, the block sizing, and other
factors. Additionally, each storage vendor often implements SANs using different tools and features.
Because of this, organizations often have dedicated personnel whose only job is to manage the SAN
deployment.

Note: You can implement SANs by using a variety of technologies. The most common
options are Fibre Channel and iSCSI.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-7

What Is RAID?
RAID is a technology that you can use to
configure storage systems to provide high
reliability and (potentially) high performance.
RAID implements storage systems by combining
multiple disks into a single logical unit called a
RAID array. Depending on the configuration, a
RAID array can withstand the failure of one or
more of the physical hard disks contained in the
array, and/or provide higher performance than is
available by using a single disk.

RAID provides redundancy, which is an important


component that you can use when planning and
deploying Windows Server 2012 servers. In most organizations, it is important that the servers are
available all of the time. Most servers provide highly redundant components such as redundant power
supplies and redundant network adapters. The goal of this redundancy is to ensure that the server
remains available even when a single component on the server fails. By implementing RAID, you can
provide the same level of redundancy for the storage system.

How RAID Works


RAID enables fault tolerance by using additional disks to ensure that the disk subsystem can continue to
function even if one or more disks in the subsystem fail. RAID uses two options for enabling fault
tolerance:

• Disk mirroring. With disk mirroring, all of the information that is written to one disk is also written to
another disk. If one of the disks fails, the other disk is still available.

• Parity information. Parity information is used in the event of a disk failure to calculate the information
that was stored on a disk. If you use this option, the server or RAID controller calculates the parity
information for each block of data that is written to the disks, and then stores this information on
another disk or across multiple disks. If one of the disks in the RAID array fails, the server can use the
data that is still available on the functional disks along with the parity information to recreate the
data that was stored on the failed disk.
RAID subsystems can also provide potentially better performance than single disks by distributing disk
reads and writes across multiple disks. For example, when implementing disk striping, the server can read
information from all hard disks in the stripe set. When combined with multiple disk controllers, this can
provide significant improvements in disk performance.

Note: Although RAID can provide a greater level of tolerance for disk failure, you should
not use RAID to replace traditional backups. If a server has a power surge or catastrophic failure
and all of the disks fail, then you would need to rely on standard backups.

Hardware RAID vs. Software RAID


Implement hardware RAID by installing a RAID controller in the server, and then configure it by using the
RAID controller configuration tool. When you use this implementation, the RAID configuration is hidden
from the operating system. However, the RAID arrays are exposed to the operating system as single disks.
The only configuration that you need to perform in the operating system is to create volumes on the
disks.

You can implement software RAID by exposing all of the disks that are available on the server to the
operating system. You then configure RAID from within the operating system. Windows Server 2012
MCT USE ONLY. STUDENT USE PROHIBITED
9-8 Implementing Local Storage

supports the use of software RAID, and you can use Disk Management to configure several different levels
of RAID.

When choosing to implement hardware or software RAID, consider the following:


• Hardware RAID requires disk controllers that are RAID-capable. Most disk controllers shipped with
new servers have this functionality.

• To configure hardware RAID, you need to access the disk controller management program. Normally,
you can access this during the server boot process or by using a web page that runs management
software.

• Implementing disk mirroring for the disk containing the system and boot volume with software RAID
can require additional configuration when a disk fails. Because the RAID configuration is managed by
the operating system, you must configure one of the disks in the mirror as the boot disk. If that disk
fails, you may need to modify the boot configuration for the server to start the server. This is not an
issue with hardware RAID, because the disk controller accesses the available disk and exposes it to the
operating system.

• In older servers, you may get better performance with software RAID when using parity, because the
server processor can calculate parity more quickly than the disk controller can. This is not an issue
with newer servers, where you may get better performance on the server because you can offload the
parity calculations to the disk controller.

RAID Levels
When implementing RAID, you need to decide
what level of RAID to implement. The table below
lists the features for each different RAID level.

Space
Level Description Performance Redundancy Comments
utilization

RAID 0 Striped set High read and All space on A single disk Use only in
without parity or write the disks is failure results situations where
mirroring performance available in the loss of you require high
Data is written all data performance
sequentially to and can tolerate
each disk data loss

RAID 1 Mirrored set Good Can only use Can tolerate Frequently used
without parity or performance the amount a single disk for system and
striping of space failure boot volumes
Data is written to that is with hardware
both disks available on RAID
simultaneously the smallest
disk
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-9

Space
Level Description Performance Redundancy Comments
utilization

RAID 2 Data is written in Extremely high Uses one or Can tolerate Requires that all
bits to each disk performance more disks a single disk disks be
with parity written for parity failure synchronized
to separate disk or Not currently
disks used

RAID 3 Data is written in Very high Uses one Can tolerate Requires that all
bytes to each disk performance disk for a single disk disks be
with parity written parity failure synchronized
to separate disk or Rarely used
disks

RAID 4 Data is written in Good read Uses one Can tolerate Rarely used
blocks to each performance, disk for a single disk
disk with parity poor write parity failure
written to a performance
dedicated disk

RAID 5 Striped set with Good read Uses the Can tolerate Commonly used
distributed parity performance, equivalent a single disk for data storage
Data is written in poor write of one disk failure where
blocks to each performance for parity performance is
disk with parity not critical, but
spread across all maximizing disk
disks usage is
important

RAID 6 Striped set with Good read Uses the Can tolerate Commonly used
dual distributed performance, equivalent two disk for data storage
parity poor write of two disks failures where
Data is written in performance for parity performance is
blocks to each not critical but
disk with double maximizing disk
parity written usage and
across all disks availability are
important

RAID Striped sets in a Very good read Only half Can tolerate Not commonly
0+1 mirrored set and write the disk the failure of used
A set of drives is performance space is two or more
striped, and then available disks as long
the strip set is due to as all failed
mirrored mirroring disks are in
the same
striped set

RAID Mirrored set in a Very good read Only half Can tolerate Frequently used
1+0 stripe set and write the disk the failure of in scenarios
(or 10) Several drives are performance space is two or more where
mirrored to a available disks as long performance
second set of due to as both disks and redundancy
drives, and then mirroring in a mirror do are critical, and
one drive from not fail the cost of the
each mirror is required
striped additional disks
is acceptable
MCT USE ONLY. STUDENT USE PROHIBITED
9-10 Implementing Local Storage

Space
Level Description Performance Redundancy Comments
utilization

RAID Striped set with Good read The Provides This level is
5+0 distributed parity performance, equivalent better fault recommended
(or 50) in a stripe set better write of at least tolerance for programs
Drives are striped performance two disks is than a single that require high
with RAID 5, and than RAID 5 used for RAID level fault tolerance,
then striped parity capacity, and
without parity random
positioning
performance
Requires at least
six drives

Note: The most common RAID levels are RAID 1 (also known as mirroring), RAID 5 (also
known as striped set with distributed parity), and RAID 1+0 (also known as mirrored set in a
stripe set).

Question: Should you configure all disks with the same amount of fault tolerance?

Windows Server 2012 and Windows Server 2012 R2 Storage Features


Windows Server 2012 and Windows
Server 2012 R2 include some important
enhancements to the File and Storage
Services server role. The new features include:
• Storage Spaces. Storage Spaces is a storage
virtualization feature that you can use to add
multiple physical disks of any type and size to
a storage pool, and then create highly
available virtual disks from the storage pool.
With Storage Spaces, you can implement and
manage a storage infrastructure that provides
a high level of performance and redundancy
without implementing any special storage infrastructure.

• Data deduplication. Data deduplication optimizes volume storage by finding redundant data on a
volume, and then ensuring that the data is stored only once on the volume. It does this by storing the
data in a single location, and then providing a reference to this single location in place of other
redundant copies of the data. Data is segmented into 32 KB to 218 KB chunks, so data deduplication
can optimize not only redundant files, but also portions of files that are redundant on the volume.

• iSCSI Target Server. Windows Server 2012 includes the iSCSI Target Server role to provide block
storage to other servers and programs. iSCSI enables you to deploy a highly available SAN
infrastructure using a standard network infrastructure. Windows Server 2012 R2 provides
enhancements to the iSCSI Target Server role by supporting the creation of larger virtual disks that
use the .vhdx format, optimizing disk caching, and increasing the number of sessions per server.

• Management enhancements. Windows Server 2012 provides a single management console for the
File and Storage Services server role. You can use this console to manage all the file and storage
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-11

components on a local or a remote server. Windows Server 2012 also provides new Windows
PowerShell commands you can use to manage disks and storage.

• Work Folders. Work Folders enable users to access work files on computers and devices that are not
members of an Active Directory® Domain Services (AD DS) domain. You can synchronize the Work
Folder contents from corporate file servers to the devices, so that users can work with the files easily.
Administrators can maintain control over corporate data by setting permissions and device
management policies to manage how users can use Work Folders.

• Distributed File System (DFS) enhancements. Windows Server 2012 R2 provides several new features
for DFS, including the following:
o A Windows PowerShell module for managing DFS

o A database cloning feature for initial synchronization

o A database corruption recovery feature


o An option to disable cross-file remote differential compression (RDC)

If you disable cross-file RDC, the network bandwidth used for replication increases. However, this
decreases the processor load on file servers.

Note: Storage Spaces and storage pools are covered later in this module, and Work Folders
are covered in the next module. “Course 20411C: Administering Windows Server 2012” and
“Course 20412C: Configuring Advanced Windows Server 2012 Services” cover the other storage
enhancements.
MCT USE ONLY. STUDENT USE PROHIBITED
9-12 Implementing Local Storage

Lesson 2
Managing Disks and Volumes
Identifying which storage technology that you want to deploy is the first critical step in preparing your
environment for data-storage requirements. However, this is only the first step. You must take other steps
to prepare your environment for data-storage requirements.

For example, once you identify the best storage solution, or have chosen a combination of storage
solutions, you need to determine the best way to manage that storage, and should ask yourself the
following questions:
• What disks are you going to allocate to a storage pool?

• Are the type of file systems going to be the same for all disks?

This lesson addresses these and similar questions, including why it is important to manage disks and what
management tools you will require.

Lesson Objectives
After completing this lesson, you will be able to:
• Explain how to select a partition table format.

• Describe the difference between basic and dynamic disk types.


• Explain how to select a file system.
• Describe a resilient file system.

• Describe mount points and links.


• Explain how to create mount points and links.
• Describe the process of extending and shrinking volumes.

Selecting a Partition Table Format


A partition table format, or partition style, refers to
the method that an operating system such as
Windows Server 2012 uses to organize partitions
or volumes on a disk. For Windows operating
systems, you can decide between master boot
record (MBR) and globally unique identifier
(GUID) partition table (GPT).

MBR
The MBR partition table format is the standard
partitioning scheme that has been used on hard
disks since the inception of personal computers in
the 1980s. The MBR partition table format has the
following characteristics:

• A partition supports a maximum of four primary partitions per drive.

• A partition can have maximum of 2 terabytes (TB) (2.19 x 10^12 bytes).


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-13

• If you initialize a disk larger than 2 TB using MBR, the disks are only able to store volumes up to 2 TB
and the rest of the storage is not used. You must convert the disk to GPT if you want to use all of its
space.

Note: You can use the MBR partition table format for disk drives that never surpass 2 TB in
size. This provides you with a bit more space, because GPT requires more disk space than MBR.

GPT
The GPT was introduced with Windows Server 2003 and Windows XP 64-bit Edition to overcome the
limitations of MBR, and to address larger disks. GPT has the following characteristics:

• GPT is the successor of MBR partition table format.

• GPT supports a maximum of 128 partitions per drive.

• A partition can have up to 18 exabytes (EB).


• A hard disk can have up to 8 zettabytes (ZB), with 512 kilobytes (KB) logical block addressing (LBA).

• To boot from a GPT partition table, your BIOS must support GPT.

Note: If your hard disk is larger than 2 TB, you must use the GPT partition table format.

Additional Reading: For more information, refer to “Frequently asked questions about the
GUID Partitioning Table disk architecture” at http://go.microsoft.com/fwlink/?LinkID=266748.

Selecting a Disk Type


When selecting a type of disk for use in Windows
Server 2012, you can choose between basic and
dynamic disks.

Basic Disk
Basic storage uses normal partition tables that are
used by all versions of the Windows operating
system. A basic disk is initialized for basic storage,
and contains basic partitions, such as primary
partitions and extended partitions. You can
subdivide extended partitions into logical
volumes.

By default, when you initialize a disk in the Windows operating system, the disk is configured as a basic
disk. It is easy to convert basic disks to dynamic disks without any data loss. However, when you convert a
dynamic disk to basic disk, all data on the disk is lost.

There is no performance gain by converting basic disks to dynamic disks, and some programs cannot
address data that is stored on dynamic disks. For these reasons, most administrators do not convert basic
disks to dynamic disks, unless they need to use some of the additional volume-configuration options that
dynamic disks provide.
MCT USE ONLY. STUDENT USE PROHIBITED
9-14 Implementing Local Storage

Dynamic Disk
Dynamic storage was introduced in the Microsoft Windows 2000 Server operating system. Dynamic
storage enables you to perform disk and volume management without having to restart computers that
are running Windows operating systems. A dynamic disk is one that you initialize for dynamic storage, and
it contains dynamic volumes.

When you configure dynamic disks, you create volumes rather than partitions. A volume is a storage unit
that is made from free space on one or more disks. You can format the volume with a file system, and can
assign it a drive letter or configure it with a mount point.

The following is a list of the dynamic volumes that are available:

• Simple volumes. A simple volume uses free space from a single disk. It can be a single region on a
disk, or consist of multiple, concatenated regions. You can extend a simple volume within the same
disk or extended to additional disks. If you extend a simple volume across multiple disks, it becomes a
spanned volume.

• Spanned volumes. A spanned volume is created from free disk space from multiple disks that is linked
together. You can extend a spanned volume onto a maximum of 32 disks. You cannot mirror a
spanned volume, and they are not fault-tolerant. Therefore, if you lose one disk, you will lose the
entire spanned volume.

• Striped volumes. A striped volume has data that is spread across two or more physical disks. The data
on this type of volume is allocated alternately and evenly to each of the physical disks. A striped
volume cannot be mirrored or extended, and is not fault-tolerant. This means that the loss of one disk
causes the immediate loss of all the data. Striping also is known as RAID-0.
• Mirrored volumes. A mirrored volume is a fault-tolerant volume that has all data duplicated onto two
physical disks. All of the data on one volume is copied to another disk to provide data redundancy. If
one of the disks fails, you can access the data from the remaining disk. Additionally, you cannot
extend a mirrored volume. Mirroring also is known as RAID-1.

• RAID-5 volumes. A RAID-5 volume is a fault-tolerant volume that has data striped across a minimum
of three or more disks. Parity also is striped across the disk array. If a physical disk fails, you can
recreate the portion of the RAID-5 volume that was on that failed disk, by using the remaining data
and the parity. You cannot mirror or extend a RAID-5 volume.

Required Disk Volumes


Regardless of which type of disk you use, you must configure both a system volume and a boot volume
on one of the server’s hard disks:

• System volumes. The system volume contains the hardware-specific files that are needed to load the
Windows operating system, such as Bootmgr and BOOTSECT.bak. The system volume can be the
same as the boot volume, although this is not required.

• Boot volumes. The boot volume contains the Windows operating system files that are in the
%Systemroot% and %Systemroot%\System32 folders. The boot volume can be the same as the
system volume, although this is not required.

Note: When you install the Windows 8 operating system or the Windows Server 2012
operating system in a clean installation, a separate system volume is created to enable encrypting
the boot volume by using Windows BitLocker® drive encryption.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-15

Additional Reading:

• For more information, refer to “How Basic Disks and Volumes Work” at
http://go.microsoft.com/fwlink/?LinkID=199648.
• For more information, refer to “Dynamic disks and volumes” at
http://go.microsoft.com/fwlink/?LinkID=199649.

Selecting a File System


When you configure your disks in Windows Server
2012, you can choose between file allocation table
(FAT), the NTFS file system, and Resilient File
System (ReFS) file systems.

FAT
The FAT file system is the most simplistic of the
file systems that Windows operating systems
support. The FAT file system is characterized by a
table that resides at the very top of the volume.
To protect the volume, two copies of the FAT file
system are maintained in case one becomes
damaged. Additionally, the file allocation tables
and the root directory must be stored in a fixed location, so that the system’s boot files can be located.

A disk formatted with the FAT file system is allocated in clusters, and the size of the volume determines
the size of the clusters. When a file is created, an entry is created in the directory, and the first cluster
number containing data is established. This entry in the table indicates either that this is the last cluster of
the file, or points to the next cluster. There is no organization to the FAT directory structure, and files are
given the first open location on the drive.

Because of the size limitation with the file allocation table, the original release of FAT could only access
partitions that were less than 2 GB in size. To enable larger disks, Microsoft developed FAT32. FAT32
supports partitions of up to 2 TB.
FAT does not provide any security for files on the partition. You should never use FAT or FAT32 as the file
system for disks attached to Windows Server 2012 servers. You might consider using FAT or FAT32 to
format external media such as USB flash media.

The file system designed especially for flash drives is Extended FAT (exFAT). You can use it when FAT32 is
not suitable, such as when you need a disk format that works with a television, which requires a disk that
is larger than 2 TB. A number of media devices support exFAT, such as modern flat panel TVs, media
centers, and portable media players.

NTFS
NTFS is the standard file system for all Windows operating systems beginning with Windows NT® Server
3.1. Unlike FAT, there are no special objects on the disk, and there is no dependence on the underlying
hardware, such as 512-byte sectors. In addition, in NTFS there are no special locations on the disk, such as
the tables.
NTFS is an improvement over FAT in several ways, such as better support for metadata, and the use of
advanced data structures to improve performance, reliability, and disk space utilization. NTFS also has
additional extensions such as security access control lists (ACLs), which you can use for auditing, file-
system journaling, and encryption.
MCT USE ONLY. STUDENT USE PROHIBITED
9-16 Implementing Local Storage

NTFS is required for a number of Windows Server 2012 roles and features such as AD DS, Volume Shadow
Copy Service (VSS), Distributed File System (DFS) and file replication service (FRS). NTFS also provides a
significantly higher level of security than FAT or FAT 32.

Resilient File System (ReFS)


Windows Server 2012 introduced ReFS to enhance the capabilities of NTFS. ReFS improves upon NTFS by
offering larger maximum sizes for individual files, directories, disk volumes, and other items. Additionally,
ReFS offers greater resiliency, meaning better data verification, error correction, and scalability.

You should use ReFS with Windows Server 2012 for very large volumes and file shares, to overcome the
NTFS limitation of error checking and correction. However, you cannot use ReFS for the boot volume.

Additional Reading:

• For more information, refer to “How FAT Works” at http://go.microsoft.com/fwlink/?LinkID=199652.

• For more information, refer to “How NTFS Works” at http://go.microsoft.com/fwlink/?LinkID=199654.

Question: What file system do you use on your file server currently? Will you continue to use it?

What Is ReFS?
ReFS is a new feature in Windows Server 2012 that
is based on the NTFS file system. It provides the
following advantages:
• Metadata integrity with checksums.
• Expanded protection against data corruption.
• Maximizes reliability, especially during a loss
of power (while NTFS has been known to
experience corruption in similar
circumstances).
• Large volume, file, and directory sizes.
• Storage pooling and virtualization, which
makes creating and managing file systems easier.
• Redundancy for fault tolerance.
• Disk scrubbing for protection against latent disk errors.
• Resiliency to corruptions with recovery for maximum volume availability.
• Shared storage pools across machines for additional failure tolerance and load balancing.
ReFS inherits some features from NTFS, including the following:

• BitLocker drive encryption.


• ACLs for security.
• Update sequence number (USN) journal.
• Change notifications.
• Symbolic links, junction points, mount points and reparse points.
• Volume snapshots.
• File IDs.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-17

ReFS uses a subset of NTFS features, so it maintains backward compatibility with NTFS. Therefore,
programs that run on Windows Server 2012 can access files on ReFS, just as they would on NTFS.
However, a ReFS-formatted drive is not recognized when placed in computers that are running Windows
Server operating systems that were released previous to Windows Server 2012. You can use ReFS drives
with Windows 8.1, but not with Windows 8.

NTFS enables you to change the size of a cluster. However, with ReFS, each cluster has a fixed size of
64 KB, which you cannot change. ReFS does not support Encrypted File System (EFS) for files.
As its name implies, the new file system offers greater resiliency, meaning better data verification, error
correction, and scalability.

Beyond its greater resiliency, ReFS also surpasses NTFS by offering larger maximum sizes for individual
files, directories, disk volumes, and other items, which the following table lists.

Attribute Limit

Maximum size of a single file Approximately 16 EB


(18.446.744.073.709.551.616 bytes)

Maximum size of a single volume 2^78 bytes with 16 KB cluster size


(2^64 * 16 * 2^10)
Windows stack addressing allows 2^64 bytes

Maximum number of files in a directory 2^64

Maximum number of directories in a volume 2^64

Maximum file name length 32,000 Unicode characters

Maximum path length 32,000

Maximum size of any storage pool 4 petabytes (PB)

Maximum number of storage pools in a system No limit

Maximum number of spaces in a storage pool No limit

Additional Reading: For more information about ReFS, refer to “Building the next
generation file system for Windows: ReFS” at http://go.microsoft.com/fwlink/?linkID=270872.
MCT USE ONLY. STUDENT USE PROHIBITED
9-18 Implementing Local Storage

What Are Mount Points and Links?


NTFS and ReFS file systems enable you to create
mount points and links to refer to files, directories,
and volumes.

Mount Points
Windows operating systems use mount points to
make a portion of a disk or the entire disk useable
by the operating system. Most commonly, mount
points are associated with drive-letter mappings,
so that the operating system can access the disk
through the drive letter.

Since the introduction of Windows 2000 Server,


you have been able to enable volume mount points, which you then can use to mount a hard disk to an
empty folder on another drive. For example, if you add a new hard disk to a server, rather than mounting
the drive by using a drive letter, you can assign a folder name such as C:\datadrive to the drive. When you
do this, any time you access the C:\datadrive folder, you actually are accessing the new hard disk.

Volume mount points can be useful in the following scenarios:


• If you are running out of drive space on a server and you want to add disk space without modifying
the folder structure. You can add the hard disk, and configure a folder to point to the hard disk.

• If you are running out of available letters to assign to partitions or volumes. If you have several hard
disks that are attached to the server, you may run out of available letters in the alphabet to which you
can assign drive letters. By using a volume mount point, you can add additional partitions or volumes
without using more drive letters.

• If you need to separate disk input/output (I/O) within a folder structure. For example, if you are using
a program that requires a specific file structure, but which uses the hard disks extensively, you can
separate the disk I/O by creating a volume mount point within the folder structure.

Note: You can assign volume mount points only to empty folders on an NTFS partition.
This means that if you want to use an existing folder name, you must first rename the folder,
create and mount the hard disk using the required folder name, and then copy the data to the
mounted folder.

Links
A link is a special type of file that contains a reference to another file or directory in the form of an
absolute or relative path. Windows supports the following two types of links:

• A symbolic file link, or soft link

• A symbolic directory link, or directory junction

A link that is stored on a server share could refer back to a directory on a client that is not actually
accessible from the server where the link is stored. The link processing occurs on the client, so the link
would work correctly to access the client, even though the server cannot access the client.
Links operate transparently. Programs that read or write to files that are named by a link behave as if they
are operating directly on the target file. For example, you can use a symbolic link to link to a Hyper-V®
parent virtual hard disk file (.vhd) from another location. Hyper-V uses the link to work with the parent
virtual hard disk because it would the original file. The benefit of using symbolic links is that you do not
need to modify the properties of your differencing virtual hard disk.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-19

Links are sometimes easier to manage than mount points. Mount points force you to place the files on the
root of the volumes, whereas with links, you can be more flexible with where you save files.

You can create links by using the mklink.exe command-line tool.

Demonstration: Creating Mount Points and Links


In this demonstration, you will see how to:

• Create a mount point.


• Create a directory junction for a folder.

• Create a hard link for a file.

Demonstration Steps
Create a mount point
1. Sign in to LON-SVR1 with the username Adatum\Administrator and the password Pa$$w0rd.
2. Open Computer Management, and then expand Disk Management.

3. In Disk Management, initialize Disk2 with GPT (GUID Partition Table).

4. On Disk 2, create a Simple Volume with the following parameters:


o Size: 4000 MB

o Do not assign a drive letter or drive path

o File system: NTFS


o Volume label: MountPoint
5. Wait until the volume is created, right-click MountPoint, and then click Change Drive Letter and
Paths.

6. Change the drive letter as follows:


o Mount in the following empty NTFS folder

o Create new folder C:\MountPointFolder and use it as mount point.

7. On the taskbar, open a File Explorer window, and then click Local Disk (C:). You should now see the
MountPoint folder with a size of 4,095,996 KB assigned to it. Notice the icon that is assigned to the
mount point.

Create a directory junction for a folder


1. Open a Command Prompt window.

2. Create a folder in C:\ called CustomApp, and run the following: copy C:\windows\system32
\notepad.exe C:\CustomApp.
3. At the command prompt, type mklink /j AppLink CustomApp, and then press Enter.

4. In a File Explorer window, browse to C:\AppLink. Notice that because it is a link, the directory path in
the address bar is not updated to C:\CustomApp.
MCT USE ONLY. STUDENT USE PROHIBITED
9-20 Implementing Local Storage

Create a hard link for a file


1. At a command prompt, type mklink /h C:\AppLink\Notepad2.exe C:\AppLink\Notepad.exe.

2. In File Explorer, notice that Notepad2.exe appears exactly the same as Notepad.exe. Both file names
point to the same file.

Extending and Shrinking Volumes


In versions of Windows prior to Windows Server
2008 or Windows Vista®, you required additional
software to shrink or extend a volume on your
disk. Since Windows Server 2008 and Windows
Vista, this functionality is included in the Windows
operating system so you can use the Disk
Management snap-in to resize NTFS volumes.

When you want to resize a volume, you must be


aware of the following:
• You only have the ability to shrink or extend
NTFS volumes. FAT, FAT32 or exFAT volumes
cannot be resized.
• You can only extend ReFS volumes, not shrink them.
• You can extend a volume using free space on the same disk and on other disks. When you extend a
volume with other disks, you create a dynamic disk with a spanned volume. In a spanned volume, if
one disk fails, all data on the volume is lost. In addition, a spanned volume cannot contain boot or
system partitions, thus you cannot extend your boot partitions by using another disk.

• When you want to shrink a partition, immovable files such as page files are not relocated. This means
that you cannot reclaim space beyond the location where these files are on the volume. If you have
the requirement to shrink a partition further, you need to delete or move the immovable files. For
example, you can remove the page file, shrink the volume, and then add the page file back again.
• If bad clusters exist on the partition, you cannot shrink it.

Note: As a best practice for shrinking volumes, you should defragment the files on the
volume before you shrink it. This procedure returns the maximum amount of free disk space.
During the defragmenting process, you can identify any immoveable files.

To modify a volume, you can use Disk Management, the Diskpart.exe tool, or the Resize-Partition
cmdlet in Windows PowerShell®.

Additional Reading:

• For more information, refer to “Extend a Basic Volume” at


http://go.microsoft.com/fwlink/?LinkID=266749.
• For more information, refer to “Shrink a Basic Volume” at
http://go.microsoft.com/fwlink/?LinkID=266750.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-21

Managing Virtual Hard Disks


Starting with Windows 7 and Windows 2008 R2,
you can manage virtual hard disks within the
operating system in much the same way that you
can manage physical disks. For example, you can
create and attach a virtual hard disk and use it for
storing data. The virtual hard disk appears as
another drive letter in the disk or folder
management tools.

Virtual hard disks are files that represent a


traditional hard disk drive. Typically, you use
virtual hard disks with Hyper-V as the operating-
system disk and the storage disks for virtual
machines. In Windows 7 and Windows Server 2008 R2, you can access the same virtual hard disks from
within the operating system. The virtual hard disks have the following characteristics:
• In Windows 7 and Windows Server 2008 R2, you can only work with .vhd files.

• In Windows 8 or Windows Server 2012 or later, you also can create and manage .vhdx files, which
enable much larger disk sizes and provide other benefits.

Note: For details on the differences between .vhd and .vhdx files, see “Module 13:
Implementing Server Virtualization with Hyper-V,” which covers the use of virtual hard disks in
Hyper-V.

• You can create and attach virtual hard disks by using disk-management tools, such as Disk
Management and Diskpart.exe. After creating and attaching the virtual hard disk, you can create
volumes on the drive and format the partition. Additionally, in Windows 8 or newer versions, and
Windows Server 2012 or newer versions, you can mount virtual hard disks in File Explorer.

• You can configure Windows 7 or Windows Server 2008 R2 or later versions to start from a virtual hard
disks using the native virtual hard disk boot feature. This feature enables you to configure multiple
operating systems on a single computer and choose which operating system to use when you start
the computer.
• You can attach virtual hard disks that you create by using Hyper-V or that you create on another
computer. For example, if you create a virtual hard disk in Hyper-V, you can copy that virtual hard
disk to another computer, and then use the native virtual hard disk boot feature to start the computer
using the virtual disk that you created in Hyper-V.

• You can use virtual hard disks as a deployment technology. For example, you can use Hyper-V to
create a standard image for desktop or server computers, and then distribute the image to other
computers.
MCT USE ONLY. STUDENT USE PROHIBITED
9-22 Implementing Local Storage

Demonstration: Managing Virtual Hard Disks


In this demonstration, you will see how to:

• Create a virtual hard disk.


• Manage a virtual hard disk.

Demonstration Steps
Create a virtual hard disk
1. In Server Manager, open Disk Management.

2. Create a new .vhdx file named DiskF.vhdx in the Documents folder. Assign a size of 10 MB, and
configure the file as dynamically expanding.
3. Verify that the .vhdx file was created in the documents folder.

Manage a virtual hard disk


1. In Disk Management, initialize the disk.
2. Create and format a new volume by using all of the space on the disk, and then give it a volume label
of Data.

3. Verify that the new disk appears in File Manager.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-23

Lesson 3
Implementing Storage Spaces
Managing physical disks that are attached directly to a server has proven to be a tedious task for
administrators. To overcome this problem, many organizations use SANs that essentially group physical
disks together.

SANs require specialized configuration and sometimes specialized hardware, which makes them
expensive. To overcome these issues, you can use the Storage Spaces feature in Windows Server 2012. It
pools disks together, and presents them to the operating system as a single disk. This lesson explains how
to configure and implement the Storage Spaces feature.

Lesson Objectives
After completing this lesson, you will be able to:

• Describe the Storage Spaces feature.

• Describe various options for configuring virtual disks.

• Describe advanced management options for Storage Spaces.


• Describe how to configure Storage Spaces.

• Compare Storage Spaces with other storage methods.

What Is the Storage Spaces Feature?


Storage Spaces is a storage virtualization
capability that is built into the Windows Server
2012 and Windows 8 and newer systems. It is a
feature that is available for both NTFS and ReFS
volumes, providing redundancy and pooled
storage for numerous internal and external drives
of differing sizes and interfaces. You can use
Storage Spaces to add physical disks of any type
and size to a storage pool, and then create highly
available virtual disks from the storage pool. The
primary advantage of Storage Spaces is that you
do not manage single disks, but can manage
multiple disks as one unit.

To create a highly-available virtual disk, you need the following:


• Physical disk. Physical disks are disks such as SATA or SAS disks. If you want to add physical disks to a
storage pool, the disks need to satisfy the following requirements:

o One physical disk is required to create a storage pool; a minimum of two physical disks is
required to create a resilient mirror virtual disk.

o A minimum of three physical disks are required to create a virtual disk with resiliency through
parity.

o Three-way mirroring requires at least five physical disks.

o Disks must be blank and unformatted; no volume must exist on them.


MCT USE ONLY. STUDENT USE PROHIBITED
9-24 Implementing Local Storage

o Disks can be attached using a variety of bus interfaces including SAS, SATA, SCSI, and USB. If you
want to use failover clustering with storage pools, you cannot use SATA, USB or SCSI disks.

• Storage pool. A storage pool is a collection of one or more physical disks that you can use to create
virtual disks. You can add to a storage pool any available physical disk that is not formatted or
attached to another storage pool.

• Virtual disk (or storage space). This is similar to a physical disk from the perspective of users and
programs. However, virtual disks are more flexible because they include thin provisioning or just-in-
time (JIT) allocations, and they include resiliency to physical disk failures with built-in functionality
such as mirroring.

• Disk drive. This is a volume that you can access from your Windows operating system, for example, by
using a drive letter.

New Features of Windows Server2012 R2 Storage Spaces


Storage Spaces were first introduced in Windows 2012. Windows Server 2012 R2 provides the following
enhancements to Storage Spaces:

• Tiered Storage Spaces. Tiered Storage Spaces enable you to use a combination of disks in a Storage
Space: very fast, but small-capacity hard disks (such as SSDs) alongside slower, but large-capacity hard
disks. When you use this combination of disks, Storages Spaces automatically moves frequently-
accessed data to the faster hard disks and moves less frequently-accessed data to the slower disks. By
default, Storage Spaces moves data once day at 01:00 A.M. You can also configure where files will be
stored. The advantage to this is if you have files that are frequently accessed, you can pin them to the
faster disk. The goal of utilizing tiered storage is to balance capacity against performance. Windows
Server 2012 R2 only supports two levels of disk tiers.
• Write-back caching. The purpose of write-back caching is to optimize the process of writing data to
the disks in a Storage Space. Write-back caching typically works with tiered Storage Spaces. If the
server running the Storage Space detects a peak in disk-writing activity, it automatically starts writing
data to the faster disks. Write-back caching is enabled by default. Write-back caching is limited to
1 GB by default.

Virtual Disk Configuration Options


You can create virtual disks from storage pools.
If your storage pool contains more than one disk,
you can also create redundant virtual disks. To
configure virtual disks or Storage Spaces in Server
Manager or Windows PowerShell, you need to
consider the following features and their
redundancy functionalities.

Storage Layout
Configure this feature to define the number of
disks from the storage pool that are allocated.
Valid options include:

• Simple. A simple space has data striping but no redundancy. In data striping, logically sequential data
is segmented across all disks in a way that access to these sequential segments can be made to
different physical storage drives. Striping makes it possible to access multiple segments of data
concurrently. Do not host important data on a simple volume, because it provides no failover
capabilities when the disk that is storing the data fails.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-25

• Two-way and three-way mirrors. Mirror spaces maintain two or three copies of the data that they
host (two data copies for two-way mirrors and three data copies for three-way mirrors). Data
duplication happens with every write to ensure that all data copies are always current. Mirror spaces
also stripe the data across multiple physical drives. Mirror spaces provide the benefit of greater data
throughput and lower access latency. They also do not introduce a risk of corrupting at-rest data, and
do not require the extra journaling stage when writing data.

• Parity. A parity space is similar to RAID 5. Data, along with parity information, is striped across
multiple physical drives. Parity enables Storage Spaces to continue to service read and write requests
even when a drive has failed. Parity is always rotated across available disks to enable I/O optimization.
Storage spaces require a minimum of three physical drives for parity spaces. Parity spaces have
increased resiliency through journaling.

Note: One option for deploying storage pools is to use a disk enclosure that is directly
attached to the server. By using storage spaces, you can use all of the disks in the enclosure and
configure a variety of storage layouts depending on the levels of performance and redundancy
that a particular volume requires.

Disk Sector Size


A storage pool’s sector size is set when it is created. If the list of drives being used contains only 512
and/or 512e drives, then the pool is defaulted to 512e. A 512 disk uses 512 byte sectors. A 512e drive is a
hard disk with 4,096 byte sectors that emulates 512 byte sectors. If the list contains at least one 4 KB drive,
then the pool sector size is defaulted to 4 KB. Optionally, an administrator can explicitly define the sector
size that is inherited by all contained spaces in the pool. After an administrator defines this, the Windows
operating system only permits you to add drives that have a compliant sector size, that is: 512 or 512e for
a 512e storage pool, and 512, 512e, or 4 KB for a 4 KB pool.

Drive Allocation
This defines how the drive is allocated to the pool. Options are:

• Automatic. This is the default allocation when any drive is added to a pool. Storage Spaces can
automatically select available capacity on data-store drives for both storage space creation and JIT
allocation.

• Manual. Administrators can choose to specify Manual as the usage type for drives that are added to a
pool. A manual drive is not used automatically as part of a storage space unless it is specifically
selected at the creation of that storage space. This usage property makes it possible for administrators
to specify particular types of drives for use by only certain Storage Spaces.

• Hot Spare. Drives added as Hot Spares to a pool are reserve drives that are not used in the creation of
a storage space. If a failure occurs on a drive that is hosting columns of a storage space, a reserve
drive is called upon to replace the failed drive.

Provisioning Schemes
You can provision a virtual disk by using two different schemes:

• Thin provisioning space. Thin provisioning is a mechanism that enables you to allocate storage as it is
needed. Storage capacity in the pool is organized into provisioning slabs that are not allocated until
the point in time when datasets grow to require the storage. As opposed to the traditional fixed
storage allocation method, in which you may allocate large pools of storage capacity that remain
unused, thin provisioning optimizes utilization of available storage. Organizations also are able to
save on operating costs, such as electricity and floor space, which are associated with keeping unused
drives operating. The downside of using thin provisioning is lower disk performance.
MCT USE ONLY. STUDENT USE PROHIBITED
9-26 Implementing Local Storage

• Fixed provisioning space. With Storage Spaces, fixed provisioned spaces also employ the flexible
provisioning slabs. The difference between thin provisioning and a fixed provisioning space is that the
storage capacity in the fixed provisioning space is allocated at the same time that the space is
created.

Cluster Disk Requirement


Failover clustering prevents interruption to workloads or data in the event of a machine failure. For a pool
to support failover, clustering all assigned drives must support a multi-initiator protocol, such as SAS.

Note: You can use Storage Spaces to create both thin and fixed provisioning virtual disks
within the same storage pool. Having both provisioned types in the same storage pool is
convenient, particularly when they are related to the same workload. For example, you can
choose to have a thin provisioning space to host a database and a fixed provisioning space to
host its log.

Question: What is the name for a virtual disk that is larger than the amount of disk space
available on the physical disks portion of the storage pool?

Advanced Management Options for Storage Spaces


Server Manager provides you with basic
management of virtual disks and storage pools.
In Server Manager, you can create storage pools,
add and remove physical disks from pools, and
create, manage, and delete virtual disks. For
example, in Server Manager you can view the
physical disks that are attached to a virtual disk.
If any of these disks are unhealthy, you will see
an unhealthy disk icon next to the disk name.
To correct a failed disk in a virtual disk or storage
pool, you must remove the disk that is causing the
problem. Tools such as defragmenting, scan disk,
or chkdsk cannot repair a storage pool. To replace a failed disk, you add a new disk to the pool. The new
disk resynchronizes automatically when disk maintenance occurs during daily maintenance. Alternatively,
you can trigger disk maintenance manually.

Windows PowerShell provides advanced management options for virtual disks and storage pools. Some
examples of management cmdlets are listed in the following table.

Windows PowerShell cmdlet Description

Get-StoragePool Lists storage pools.

Get-VirtualDisk Lists virtual disks.

Repair-VirtualDisk Repairs a virtual disk.

Get-PhysicalDisk | Where{$_.HealthStatus -ne Lists unhealthy physical disks.


“Healthy”}

Reset-PhysicalDisk Removes a physical disk from a storage pool.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-27

Windows PowerShell cmdlet Description

Get-VirtualDisk | Get-PhysicalDisk Lists physical disks that are used for a virtual
disk.

Additional Reading: For more information, refer to “Storage Cmdlets in Windows


PowerShell” at http://go.microsoft.com/fwlink/?LinkID=266751.

Demonstration: Configuring Storage Spaces


In this demonstration, you will see how to:

• Create a storage pool.

• Create a virtual disk and a volume.

Demonstration Steps
Create a storage pool
1. Sign in as Adatum\Administrator with the password Pa$$w0rd.
2. On LON-SVR1, in Server Manager, access File and Storage Services and Storage Pools.

3. In the STORAGE POOLS pane, create a New Storage Pool named StoragePool1, and then add all of
the available disks.

Create a virtual disk and a volume


1. In the VIRTUAL DISKS pane, create a New Virtual Disk with the following settings:

o Storage pool: StoragePool1


o Disk name: Simple vDisk

o Storage layout: Simple

o Provisioning type: Thin


o Size: 2 GB

2. On the View results page, wait until the task completes, and then ensure that the Create a volume
when this wizard closes check box is selected.

3. In the New Volume Wizard, create a volume with these settings:


o Virtual disk: Simple vDisk

o File system: ReFS

o Volume label: Simple Volume

4. Wait until the task completes, and then click Close.


MCT USE ONLY. STUDENT USE PROHIBITED
9-28 Implementing Local Storage

Discussion: Comparing Storage Spaces with Other Storage Solutions


Storage Spaces in Windows Server 2012 provides
an alternative to using more traditional storage
solutions, such as SANs and NAS.

Discussion Questions
Consider the following questions to prepare for
the class discussion:

Question: Does your organization currently


use SANs or NAS?
Question: What are the advantages of using
Storage Spaces compared to using SANs or
NAS?

Question: What are the disadvantages of using Storage Spaces compared to using SANs or
NAS?

Question: In what scenarios would you recommend each option?


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-29

Lab: Implementing Local Storage


Scenario
Your manager has asked to add disk space to a file server. After creating volumes, your manager has also
asked you to resize those volumes based on updated information he has been given. Finally, you need to
make data storage redundant by creating a three-way mirrored virtual disk.

Objectives
After completing this lab, you should be able to:

• Install and configure a new disk.


• Resize volumes.

• Configure a redundant storage space.

Lab Setup
Estimated Time: 45 minutes

Virtual machines 20410D-LON-DC1


20410D-LON-SVR1

User name Adatum\Administrator

Password Pa$$w0rd

For this lab, you will use the available virtual machine environment. Before beginning the lab, you must
complete the following steps:
1. On the host computer, start Hyper-V Manager.

2. In Hyper-V® Manager, click 20410D-LON-DC1, and then in the Actions pane, click Start.

3. In the Actions pane, click Connect. Wait until the virtual machine starts.
4. Sign in by using the following credentials:

o User name: Administrator

o Password: Pa$$w0rd

o Domain: Adatum

5. Repeat steps 2 through 4 for 20410D-LON-SVR1.

Exercise 1: Installing and Configuring a New Disk


Scenario
The file server in your branch office is low on disk space. You need to add a new disk to the server and
create volumes based on specifications provided by your manager.
The main tasks for this exercise are as follows:

1. Initialize a new disk.

2. Create and format two simple volumes on the disk.


3. Verify the drive letter in a File Explorer window.
MCT USE ONLY. STUDENT USE PROHIBITED
9-30 Implementing Local Storage

 Task 1: Initialize a new disk


1. Sign in to LON-SVR1 with the username Adatum\Administrator and the password Pa$$w0rd.

2. In Server Manager, open Computer Management, and then access Disk Management.

3. Initialize Disk2, and then configure it to use GPT (GUID Partition Table).

 Task 2: Create and format two simple volumes on the disk


1. In the Computer Management console, on Disk 2, create a Simple Volume with the following
attributes:

o Volume size: 4000 MB


o Drive Letter: F

o File system: NTFS

o Volume label: Volume1


2. In the Computer Management console, on Disk 2, create a Simple Volume with the following
attributes:

o Volume size: 5000 MB

o Drive Letter: G
o File system: ReFS

o Volume label: Volume2

 Task 3: Verify the drive letter in a File Explorer window


1. Use File Explorer to make sure you can access the following volumes:
o Volume1 (F:)

o Volume2 (G:)
2. On Volume2 (G:), create a folder named Folder1.

Results: After completing this exercise, you should have initialized a new disk, created two simple
volumes, and then formatted them. Additionally, you should have verified that the drive letters you
assigned are available in File Explorer.

Exercise 2: Resizing Volumes


Scenario
After installing the new disk in your file server, your manager contacts you to indicate that the information
he gave you was incorrect. He now needs you to resize the volumes, without losing any data.

The main tasks for this exercise are as follows:


1. Shrink Volume1.

2. Extend Volume2.

 Task 1: Shrink Volume1


• Use Disk Management to shrink Volume1 (F:) to 3000 MB.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-31

 Task 2: Extend Volume2


1. Use Disk Management to extend Volume2 (G:) by 1000 MB.

2. Use File Explorer to verify that the folder Folder1 is still on drive G.

Results: After completing this exercise, you should have made one volume smaller and extended another.

Exercise 3: Configuring a Redundant Storage Space


Scenario
Your server does not have a hardware-based RAID card, but you have been asked to configure redundant
storage. To support this feature, you need to create a storage pool.

After creating the storage pool, you need to create a redundant virtual disk. Because the data is critical,
the request for redundant storage specifies that you must use a three-way mirrored volume. Shortly after
the volume is in use, a disk fails, and you have to replace it by adding another disk to the storage pool.

The main tasks for this exercise are as follows:

1. Create a storage pool from five disks that are attached to the server.
2. Create a three-way mirrored virtual disk.

3. Copy a file to the volume, and verify that it is visible in File Explorer.

4. Remove a physical drive.

5. Verify that the write.exe file is still accessible.

6. Add a new disk to the storage pool and remove a broken disk.

 Task 1: Create a storage pool from five disks that are attached to the server
1. On LON-SVR1, open Server Manager.
2. In the left pane, click File and Storage Services, and then in the Servers pane, click Storage Pools.

3. Create a storage pool with the following settings:

o Name: StoragePool1
o Physical disks:
 PhysicalDisk3
 PhysicalDisk4
 PhysicalDisk5
 PhysicalDisk6
 PhysicalDisk7

 Task 2: Create a three-way mirrored virtual disk


1. On LON-SVR1, in Server Manager, in the VIRTUAL DISKS pane, create a virtual disk with the following
settings:

o Storage pool: StoragePool1

o Name: Mirrored Disk

o Storage Layout: Mirror


MCT USE ONLY. STUDENT USE PROHIBITED
9-32 Implementing Local Storage

o Resiliency settings: Three-way mirror

o Provisioning type: Thin

o Virtual disk size: 10 GB

2. In the New Volume Wizard, create a volume with the following settings:

o Virtual disk: Mirrored Disk

o Drive letter: H

o File system: ReFS

o Volume label: Mirrored Volume

 Task 3: Copy a file to the volume, and verify that it is visible in File Explorer
1. Open a Command Prompt window.

2. Type the following command:

Copy C:\windows\system32\write.exe H:\

3. Open File Explorer from the taskbar, and then access Mirrored Volume (H:). You should see
write.exe in the file list.

 Task 4: Remove a physical drive


• On the host computer, in Hyper-V Manager, in the Virtual Machines pane, change the
20410D-LON-SVR1 settings to the following:

o Remove the hard drive that begins with 20410D-LON-SVR1-Disk5.

 Task 5: Verify that the write.exe file is still accessible


1. Switch to LON-SVR1.
2. Open File Explorer, and then browse to H:\write.exe to ensure access to the file is still available.

3. In Server Manager, in the STORAGE POOLS pane, on the menu bar, click the Refresh “Storage
Pools” button.
Notice the warning that is visible next to Mirrored Disk.

4. Open the Mirrored Disk Properties dialog box, and then access the Health pane.

Notice that the Health Status indicates a Warning. The Operational Status should indicate
Incomplete, Unknown, or Degraded.

 Task 6: Add a new disk to the storage pool and remove a broken disk
1. On LON-SVR1, in Server Manager, in the STORAGE POOLS pane, on the menu bar, click the Refresh
“Storage Pools” button.
2. In the STORAGE POOLS pane, right-click StoragePool1, click Add Physical Disk, and then click
PhysicalDisk8 (LON-SVR1).

3. Open Windows PowerShell, and then run the following commands to remove the disconnected disk:

a. Get-PhysicalDisk

Note the FriendlyName for the disk that shows an OperationalStatus of Lost Communication.

b. $Disk = Get-PhysicalDisk -FriendlyName diskname

Replace diskname with the name of the disk that you noted previously.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 9-33

c. Remove-PhysicalDisk -PhysicalDisks $disk -StoragePoolFriendlyName StoragePool1

4. If you get a warning that the disk cannot be removed, wait five minutes, and then run the last
command again. It can take some time for the mirrored disk to resynchronize after a disk is removed
and another is added. If you cannot remove the disk after five minutes, restart LON-SVR1, sign in as
Adatum\Administrator by using the password Pa$$w0rd, and then repeat step 3.

5. In Server Manager, refresh the storage pools view to see the warnings disappear.

Results: After completing this exercise, you should have created a storage pool and added five disks to it.
Additionally, you should have created a three-way mirrored, thinly provisioned virtual disk from the
storage pool; copied a file to the new volume; and then verified that it is accessible. Next, after removing a
physical drive, you should have verified that the virtual disk was still available and that you could access it.
Finally, you should have added another physical disk to the storage pool.

Lab Review Questions


Question: At a minimum, how many disks must you add to a storage pool to create a three-
way mirrored virtual disk?

Question: You have a USB-attached disk, four SAS disks, and one SATA disk that are
attached to a Windows Server 2012 server. You want to provide a single volume to your
users that they can use for file storage. What would you use?

 Prepare for the next module


After you finish the lab, revert the virtual machines to their initial state by completing the following steps:
1. On the host computer, start Hyper-V Manager.

2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.

3. In the Revert Virtual Machine dialog box, click Revert.


4. Repeat steps 2 and 3 for 20410D-LON-SVR1.
MCT USE ONLY. STUDENT USE PROHIBITED
9-34 Implementing Local Storage

Module Review and Takeaways


Review Questions
Question: Your current volume runs out of disk space. You have another disk available in the
same server. What actions in the Windows operating system can you perform to help you
add disk space?

Question: What are the two disk types in Disk Management?


Question: What are the most important implementations of RAID?

Question: You attach five 2 TB disks to your Windows Server 2012 computer. You want to
simplify the process of managing the disks, and if one disk fails, you want to make sure the
data is not lost. What feature can you implement to accomplish this?

Best Practices
The following are recommended best practices:
• If you want to shrink a volume, defragment the volume first so you can reclaim more space from the
volume.

• Use the GPT partition table format for disks larger than 2 TB.
• For very large volumes, use ReFS.

• Do not use FAT or FAT32 on Windows Server operating system disks.

• Use the Storage Spaces feature to have the Windows operating system manage your disks.

Tools
Tool Use Where to find it

Disk Management • Initialize disks In Server Manager on


the Tools menu (part
• Create and modify volumes
of Computer
Management)

Diskpart.exe • Initialize disks Command prompt


• Create and modify volumes from a command prompt

Mklink.exe • Create a symbolic link to a file or folder Command prompt

Chkdsk.exe • Check a disk for a NTFS-formatted volume Command prompt


• Cannot be used for ReFS or virtual disks

Defrag.exe • Disk defragmentation tool for NTFS-formatted Command prompt


volumes.
• Cannot be used for ReFS or virtual disks
MCT USE ONLY. STUDENT USE PROHIBITED
10-1

Module 10
Implementing File and Print Services
Contents:
Module Overview 10-1

Lesson 1: Securing Files and Folders 10-2

Lesson 2: Protecting Shared Files and Folders by Using Shadow Copies 10-15
Lesson 3: Configuring Work Folders 10-18

Lesson 4: Configuring Network Printing 10-26


Lab: Implementing File and Print Services 10-32
Module Review and Takeaways 10-39

Module Overview
Accessing files and printers on the network is one of the most common activities in the Windows Server®
environment. Reliable, secure access to files and folders and print resources is often the first requirement
of a Windows Server 2012-based network. To provide access to file and print resources on your network,
you must understand how to configure these resources within Windows Server 2012 server, and how to
configure appropriate access to the resources for users in your environment.
This module discusses how to provide these important file and print resources with Windows Server 2012.
It describes how to secure files and folders, how to protect previous versions of files and folders by using
shadow copies, and how to give workers remote access to corporate files by implementing the new Work
Folders role service. It also describes new network printing features that help manage the network
printing environment.

Objectives
After completing this module, you should be able to:
• Secure shared files and folders.

• Protect shared files and folders by using shadow copies.

• Configure the Work Folders role service.


• Configure network printing.
MCT USE ONLY. STUDENT USE PROHIBITED
10-2 Implementing File and Print Services

Lesson 1
Securing Files and Folders
The files and folders that your servers store typically contain your organization’s business and functional
data. Providing appropriate access to these files and folders, usually over the network, is an important part
of managing file and print services in Windows Server 2012. File and folder permissions historically have
been known as NTFS permissions. However, with the release of Windows Server 2012, we now call these
permissions file permissions, to reflect that you can use these permissions on Resilient File System (ReFS)
formatted volumes, as well.

This lesson gives you information necessary to secure files and folders on your Windows Server 2012
servers, so that you can make your organization’s data available while helping to protect it.

Lesson Objectives
After completing this lesson, you should be able to:

• Describe file and folder permissions.


• Describe a shared folder.

• Describe permissions inheritance.

• Explain how effective access and permissions work when you access shared folders.
• Describe access-based enumeration.

• Describe the Offline Files feature.

• Explain how to create and configure a shared folder.

What Are File Permissions?


You assign file permissions to files or folders on
a storage volume that you format with NTFS or
ReFS. The permissions that you assign to files and
folders govern user access to them.

There are several key points to remember, with


respect to file permissions, including that you can:

• Configure file permissions for an individual


file or folder, or sets of files or folders.

• Assign file permissions individually, to objects


that include users, groups, and computers.

• Control file permissions by granting or


denying specific types of file and folder access, such as Read or Write.

• Configure inheritance of file permissions from parent folders. By default, the file permissions that you
assign to a folder also are assigned to new folders or files within that parent folder.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-3

File Permission Types


There are two assignable file permissions types: standard and advanced.

Standard permissions
Standard permissions provide the most commonly used permission settings for files and folders. You
assign standard permissions in the Permissions for folder name dialog box.

The following table lists the standard permissions options for files and folders.

File permissions Description

Full Control Grants the user complete control of the file or folder, including control of
permissions.

Modify Grants the user permission to read, write, or delete a file or folder,
including creating a file or folder. It also grants permission to execute files.

Read and Execute Grants the user permission to read a file and start apps.

Read Grants the user permission to view file or folder content.

Write Grants the user permission to write to a file.

List folder contents Grants the user permission to view a list of the folder’s contents.
(folders only)

Note: Granting users Full Control permissions on a file or a folder gives them the ability to
perform any file system operation on the object, and the ability to change permissions on the
object. They also can remove permissions on the resource for any or all users, including you.

Advanced permissions
Advanced permissions can provide a much greater level of control over files and folders. Advanced
permissions are accessible by clicking the Advanced button from the Security tab of a file or folder’s
Properties dialog box.
The following table lists the Advanced permissions for files and folders.

File permissions Description

Traverse The Traverse Folder permission applies only to folders. This permission grants or
Folder/Execute denies users the right to browse through folders to reach other files or folders, even
File if the user has no permissions for the traversed folders. The Traverse Folder
permission takes effect only when you do not grant the Bypass Traverse Checking
user right to a group or user. By default, the Everyone group is given the Bypass
Traverse Checking user right.
The Execute File permission grants or denies access to run program files.
If you set the Traverse Folder permission on a folder, the Execute File permission is
not set on all files in that folder automatically.
MCT USE ONLY. STUDENT USE PROHIBITED
10-4 Implementing File and Print Services

File permissions Description

List The List Folder permission grants the user permission to view file names and
Folder/Read subfolder names. This permission applies only to folders and affects only the
Data contents of that folder—it does not affect whether the folder itself is listed. In
addition, this setting has no effect on viewing the file structure from a
command-line interface.
The Read Data permission grants or denies the user permission to view data in files.
The Read Data permission applies only to files.

Read Attributes The Read Attributes permission grants the user permission to view the basic
attributes of a file or a folder such as Read-only and Hidden attributes. Attributes
are defined by volume's file system.

Read Extended The Read Extended Attributes permission grants the user permission to view the
Attributes extended attributes of a file or folder. Extended attributes are defined by apps, and
can vary by app.

Create The Create Files permission applies only to folders, and grants the user permission to
Files/Write Data create files in the folder.
The Write Data permission grants the user permission to make changes to the files
and overwrite existing content. The Write Data permission applies only to files.

Create The Create Folders permission grants the user permission to create folders within
Folders/Append the folder. The Create Folders permission applies only to folders.
Data The Append Data permission grants the user permission to make changes to the
end of the file, but not to delete or overwrite existing data. The Append Data
permission applies only to files.

Write Attributes The Write Attributes permission grants the user permission to change the basic
attributes of a file or folder, such as Read-only or Hidden. The volume’s file system
defines the attributes.
The Write Attributes permission does not imply that you can create or delete files or
folders; it includes only the permission to make changes to the attributes of a file or
folder. To grant Create or Delete permissions, see the Create Files/Write Data, Create
Folders/Append Data, Delete Subfolders and Files, and Delete entries in this table.

Write Extended The Write Extended Attributes permission grants the user permission to change the
Attributes extended attributes of a file or folder. Programs and app define the extended
attributes, and they can vary.
The Write Extended Attributes permission does not imply that the user can create or
delete files or folders; it includes only the permission to make changes to the
attributes of a file or folder. To grant Create or Delete permissions, see the Create
Files/Write Data, Create Folders/Append Data, Delete Subfolders and Files, and
Delete entries in this table.

Delete The Delete Subfolders and Files permission grants the user permission to delete
Subfolders and subfolders and files, even if you do not grant the Delete permission on the subfolder
Files or file. The Delete Subfolders and Files permission applies only to folders.

Delete The Delete permission grants the user permission to delete the file or folder. If you
do not have Delete permission on a file or folder, you can still delete the file or
folder if you have Delete Subfolders and Files permissions on the parent folder.

Read Read Permissions grants the user permission to read permissions about the file or
Permissions folder, such as Full Control, Read, and Write.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-5

File permissions Description

Change Change Permissions grants the user permission to change permissions on the file or
Permissions folder, such as Full Control, Read, and Write.

Take Ownership The Take Ownership permission grants the user permission to take ownership of the
file or folder. The owner of a file or folder can change permissions on it, regardless
of any existing permissions that protect the file or folder.

Synchronize The Synchronize permission assigns different threads to wait on the handle for the
file or folder, and then synchronize with another thread that may signal it. This
permission applies only to multiple-threaded, multiple-process programs and apps.

Note: Standard permissions are combinations of several individual Advanced permissions


that are grouped into commonly used file and folder scenarios.

File Permissions Examples


The following are basic examples of assigning file permissions:

• For a folder called Marketing Pictures, an administrator has assigned Adam Carter Allow permissions
for the Read permission type. Under default file permissions behavior, Adam Carter will have Read
access to the files and folders in the Marketing Pictures folder.

• When applying file permissions, the results are cumulative. For example, in the previous example,
say that Adam Carter is also a part of the Marketing group, which has Write permissions on the
Marketing Pictures folder. When we combine the permissions assigned to Adam Carter’s user account
with the permissions assigned to the Marketing group, Adam will have both Read and Write
permissions for the Marketing Pictures folder.

Important Rules for File Permissions


There are two important groups of file permissions:
• Explicit versus Inherited.

Permissions that you explicitly assign take precedence over those that are inherited from a parent
folder.

• Deny vs. Allow.

Within a set of explicit permissions, Deny permissions override conflicting Allow permissions.
Likewise, within a set of implicit, inherited permissions, Deny permissions override conflicting Allow
permissions.

Therefore, taking these rules into account, file permissions are applied in the following order:

1. Explicit Deny

2. Explicit Allow
3. Inherited Deny

4. Inherited Allow
It is important to remember that file permissions are cumulative, and these rules apply only when two file
permission settings conflict with each other.
MCT USE ONLY. STUDENT USE PROHIBITED
10-6 Implementing File and Print Services

How to Configure File Permissions


You can view and configure file permissions by following this procedure:

1. Right-click the file or folder for which you want to assign permissions, and then click Properties.
2. In the Properties dialog box, click the Security tab.

3. On the Security tab, select the user or group that you want to view or for which you want to edit
specific permissions.

4. To modify existing permissions or add new users or groups, click the Edit button.
This opens the Permissions dialog box.

What Are Shared Folders?


Shared folders are a key component to granting
access to files on your server from the network.
When you share a folder, the folder and all of its
contents are available to multiple users
simultaneously over your network. Shared folders
have a separate set of permissions from the file
permissions, which apply to the folder’s contents.
These shared folder permissions provide an extra
level of security for files and folders that you make
available on your network.

Most organizations deploy dedicated file servers


to host shared folders. You can store files in
shared folders according to categories or functions. For example, you can put shared files for the Sales
department in one shared folder, and shared files for the Marketing department in another.

Note: The sharing process applies only to the folder level. You cannot share an individual
file or a group of files.

Accessing a Shared Folder


Users typically access a shared folder over the network by using its Universal Naming Convention (UNC)
address. The UNC address contains the name of the server that is hosting the folder, and the actual shared
folder name, separated by a backward slash (\) and preceded by two backward slashes (\\). For example,
the UNC path for the Sales shared folder on the LON-SVR1 server is \\LON-SVR1\Sales.

Sharing a Folder on the Network


Windows Server 2012 provides different ways to share a folder:

• Click the appropriate drive, and then in the Files and Storage Services section in Server Manager, click
the New Share task.
• Use the File Sharing Wizard, either from the folder’s shortcut menu, or by clicking the Share button
on the Sharing tab of the folder’s Properties dialog box.

• Use Advanced Sharing by clicking the Advanced Sharing button on the Sharing tab of the folder’s
Properties dialog box.

• Use the net share command-line tool from a command–line window.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-7

• Use the New-SMBShare cmdlet in Windows PowerShell®.

Note: When you are setting up a shared folder, you need to give it a name. This name does
not have to be the same as the actual folder name. It can be a descriptive name that better
describes the folder contents to network users.

Hidden Shares
If you have shared folders that need to be available from the network, but that you want to hide from
users who are browsing the network, you can create hidden shared folders. You can access a hidden
shared folder by typing in its UNC path, but you cannot access it if you browse the server by using File
Explorer. Hidden shared folders also typically have a more restrictive set of permissions to reflect the
administrative nature of the folder’s contents.

To hide a shared folder, append the dollar symbol ($) to the folder’s share name. For example, you can
change a shared folder on LON-SVR1 named Sales into a hidden shared folder by naming the folder
Sales$. The shared folder will be accessible over the network by using the UNC path \\LON-SVR1\Sales$.

Administrative Shares
Administrative shares are hidden network shares that exist on all Windows Servers. The root of every
volume is shared as a hidden share, and you name shares by appending a drive letter and a dollar sign.
For example, on LON-DC1 the root of the C:\ drive is shared as \\LON-DC1\C$. If there are multiple drives,
each drive letter is a separate share. The following table lists other administrative shares.

Share name Purpose

Admin$ This is the operating system folder, and typically is named Windows.

Print$ This deploys print drivers from servers to Windows® client systems.

FAX$ Clients use this to access cover pages and other fax files on a fax server.

IPC$ The InterProcess Communication (IPC) share enables applications to share


information.

Note: In the past, administrative shares were available on client operating systems.
However, beginning with Windows® 8, administrative shares were disabled by default on client
systems.

By default, only members of the Administrators group have permission to these shared folders.

Shared Folder Permissions


Just like file permissions, you can assign shared folder permissions to users, groups, or computers.
However, unlike file permissions, you cannot configure shared folder permissions for individual files or
folders in the shared folder. Shared folder permissions are set for the shared folder itself, and apply
universally to the entire contents of the shared folder for users who access the folder over the network.

When you create a shared folder, the default assigned shared permission for the Everyone group is set
to Read.
MCT USE ONLY. STUDENT USE PROHIBITED
10-8 Implementing File and Print Services

The following table lists the permissions that you can assign to a shared folder.

Shared folder
Description
permission

Read Users can view folder and file names, view file data and attributes, run program
files and scripts, and navigate the folder structure within the shared folder.

Change Users can create folders, add files to folders, change data in files, append data to
files, change file attributes, delete folders and files, and perform all tasks
permitted by the Read permission.

Full Control Users can change file permissions, take ownership of files, and perform all tasks
permitted by the Change permission.

Note: Shared folder permissions apply only to users who access the folder over the
network. They do not affect users who access the folder locally on the computer that stores the
folder.

Note: When you assign a user Full Control permissions on a shared folder, that user can
modify permissions on the shared folder. It’s important to understand that assigning a user Full
Control permissions on a shared folder means that he or she would have the ability to remove all
users, including administrators, from the shared folder’s permissions list. Therefore, in most cases,
you should assign Change Permission instead of Full Control permission.

Permissions Inheritance
By default, files and shared folders use inheritance
to propagate permissions throughout a folder
structure. When you create a file or a folder, it is
automatically assigned the permissions that are
set on any folders that exist above it (parent
folders) in the hierarchy of the folder structure.

How Inheritance Is Applied


Consider the following example. Adam Carter
is a member of the Marketing group and the
New York Editors group. The following table
summarizes the permissions for this example.

Assigned permissions for the


Folder or file Adam’s permissions
groups

Marketing (folder) Read – Marketing Read


….Marketing Pictures (folder) None set Read (inherited)
……..New York (folder) Write – New York Editors Read(i) + Write
…………Fall_Composite.jpg (file) None set Read(i) + Write(i)
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-9

In this example, Adam is a member of two groups that are assigned permissions for files or folders within
the folder structure. They are as follows:

• The top-level folder, Marketing, has an assigned permission for the Marketing Group giving them
Read access.
• In the next level, the Marketing Pictures folder has no explicit permissions set, but because of
permissions inheritance Adam has Read access to this folder and its contents from the permissions
that are set on the Marketing folder.

• In the third level, the New York folder has Write permissions assigned to one of Adam’s groups—
New York Editors. In addition to this explicit Write permission, the New York folder also inherits the
Read permission from the Marketing folder. These permissions pass down to file and folder objects,
cumulating with any explicit Read and Write permissions set on those files.

• The fourth and last level is the Fall_Composite.jpg file. Even though no explicit permissions are set for
this file, Adam has both Read and Write access to the file because of the inherited permissions from
both the Marketing folder and the New York folder.

Permission Conflicts
Sometimes, explicitly assigned permissions on a file or folder conflict with inherited permissions from a
parent folder. In these cases, the explicitly assigned permissions always override the inherited permissions.
In the given example, Adam Carter was denied Write access to the parent Marketing folder. However, he
was explicitly assigned Write access to the New York folder. Therefore, the explicitly assigned Write access
permission takes precedence over the inherited deny Write access permission.

Blocking Inheritance
You also can disable the inheritance behavior for a file or a folder (and its contents). You do this when you
want to explicitly define permissions for a set of objects without including any of the inherited permissions
from any parent folders. Windows Server 2012 provides an option for blocking inheritance on a file or a
folder. To block inheritance on a file or folder, complete the following procedure:
1. Right-click the file or folder for which you want to block inheritance, and then click Properties.

2. In the Properties dialog box, click the Security tab, and then click Advanced.
3. In the Advanced Security Settings dialog box, click Change Permissions.
4. In the next Advanced Security Settings dialog box, click Disable inheritance.

5. At this point, you are prompted to either convert the inherited permissions into explicit permissions
or remove all inherited permissions from the object to start with a blank permissions slate.

Resetting Default Inheritance Behavior


After you block inheritance, changes made to permissions on the parent folder structure no longer effect
the permissions for the child object (and its contents) that has blocked inheritance, unless you reset that
behavior from one of the parent folders. You can reset that behavior in one of the parent folders by
selecting the Replace All Child Objects With Inheritable Permissions From This Object option. When you
select this option, the existing set of permissions on the current folder are propagated down to all child
objects in the tree structure, and override all explicitly assigned permissions for those files and folders. This
check box is located directly under the Include Inheritable Permissions From This Object’s Parent check
box.
MCT USE ONLY. STUDENT USE PROHIBITED
10-10 Implementing File and Print Services

Effective Permissions
When a user attempts to access a file or folder in
Windows Server 2012, the permission that applies
is dependent on various factors, including:

• Explicitly assigned permissions and inherited


permissions that apply to the user

• Explicitly assigned permissions and inherited


permissions that apply to groups to which the
user belongs

• How the user is accessing the file or folders:


locally or over the network

Effective file permissions are the cumulative


permissions that are assigned to a user for a file of folder based on the factors listed above. The following
principles determine effective file permissions:
• Cumulative permissions are the combination of the highest file permissions assigned to the user and
to all the groups of which the user is a member. For example, if a user is a member of a group that
has Read permission and is a member of a group that has Modify permission, the user is assigned
cumulative Modify permissions.

• Deny permissions override equivalent Allow permissions. However, an explicit Allow permission can
override an inherited Deny permission. For example, if a user is denied Write access to a folder via an
inherited Deny permission, but is explicitly assigned Write access to a subfolder or a particular file, the
explicit Allow overrides the inherited Deny for that particular subfolder or file.

• You can apply permissions to a user or to a group. Assigning permissions to groups is preferable
because they are more efficient than managing permissions that are set for many individuals.
• File permissions take priority over folder permissions. For example, if a user has Read permission to a
folder, but has Modify permission to certain files in that folder, the effective permission for those files
is Modify.
• Every object on an NTFS or ReFS volume or in Active Directory® Domain Services (AD DS) is owned.
The owner controls how permissions are set on the object and to whom permissions are assigned. For
example, a user who creates a file in a folder in which they have Modify permissions can change the
permissions on the file to Full Control.

Effective Access Tool


Windows Server 2012 provides an Effective Access tool that shows the effective file permissions on a file
or folder for a user, based on permissions assigned to the user account and groups to which the user
account belongs. You can access the Effective Access tool by completing the following procedure:

1. Right-click the file or folder for which you want to analyze permissions, and then click Properties.

2. In the Properties dialog box, click the Advanced button.

3. In the Advanced Security Settings dialog box, click the Effective Access tab.

4. Choose a user or group to evaluate by using Select a user.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-11

Combining File Permissions and Shared Folder Permissions


File permissions and shared folder permissions work together to control access to file and folder resources
that users access from a network. When you configure access to network resources on an NTFS or ReFS
volume, use the most restrictive file permissions to control access to folders and files, and combine them
with the most restrictive shared folder permissions to control access to the network.

How Combining File and Shared Folder Permissions Works


When you apply both file and shared folder permissions, remember that the more restrictive of the two
permissions dictates what access a user has to a file or folder. The following two examples explain this
further:

• If you set the file permissions on a folder to Full Control, but you set the shared folder permissions to
Read, then that user has only Read permission when accessing the folder over the network. Access is
restricted at the shared folder level, and any greater access at the file permissions level does not
apply.
• Likewise, if you set the shared folder permission to Full Control, and you set the file permissions to
Write, then the user will have no restrictions at the shared folder level, but the file permissions on the
folder grants only Write permissions to that folder.

The user must have both file permissions and shared folder permissions. If no permissions exist for the
user (either as an individual or as the member of a group) on either resource, access is denied.

Considerations for Combined File and Shared Folder Permissions


The following guidelines make administering permissions more manageable:

• Assign permissions to groups instead of users. Groups can always have individuals added or deleted,
but individual permissions are difficult to track and cumbersome to manage.

• Use Deny permissions only when necessary. Because Deny permissions are inherited, assigning deny
permissions to a folder can result in users not being able to access files further down in the folder
structure tree. You should assign Deny permissions only in the following situations:

o To exclude a subset of a group that has Allow permissions

o To exclude one specific permission when you have granted Full Control permissions to a user or a
group
• Never deny the Everyone group access to an object. If you deny the Everyone group access to an
object, you deny Administrators access, including yourself. Instead, remove the Everyone group from
the permissions list, as long as you grant permissions for the object to other users, groups, or
computers.

• Assign permissions to an object that is as high in the folder structure as possible, so that the security
settings are propagated throughout the tree. For example, instead of bringing groups representing all
departments of the company together into a Read folder, assign Domain Users (which is a default
group for all user accounts on the domain) to the share. In this manner, you eliminate the need to
update department groups before new users receive the shared folder.

• Use file permissions instead of shared permissions for fine-grained access. Configuring both file and
shared folder permissions can be difficult. Consider assigning the most restrictive permissions for a
group that contains many users at the shared folder level, and then use file permissions to assign
permissions that are more specific.
MCT USE ONLY. STUDENT USE PROHIBITED
10-12 Implementing File and Print Services

What Is Access-Based Enumeration?


With access-based enumeration, users see only
the files and folders which they have permission
to access. Access-based enumeration provides a
better user experience because it displays a less
complex view of the contents of a shared folder,
making it easier for users to find the files that they
need. Windows Server 2012 allows access-based
enumeration of folders that a server shares over
the network.

Enabling Access-Based Enumeration


To enable access-based enumeration for a shared
folder, you must perform this procedure:

1. Open Server Manager.

2. In the navigation pane, click File and Storage Services.


3. In the navigation pane, click Shares.

4. In the Shares pane, right-click the shared folder for which you want to enable access-based
enumeration, and then click Properties.
5. In the Properties dialog box, click Settings, and then select Enable access-based enumeration.

When Enable access-based enumeration is selected, access-based enumeration is enabled on the


shared folder. This setting is unique to each shared folder on the server.

Note: The File and Storage Services console is the only place in the Windows Server 2012
interface where you can configure access-based enumeration for a shared folder. Access-based
enumeration is not available in any of the properties dialog boxes that are accessible by
right-clicking the shared folder in File Explorer.

What Is the Offline Files Feature?


An offline file is a copy of a network file that is
stored on a client computer. By using offline files,
users can access network-based files when their
client computer is disconnected from the network.

When the Offline Files feature is used, if a user


changes their offline files and folders, then the
changes are synchronized with the network copy
of the files and folders the next time the client
connects to the network. The synchronization
schedule and behavior of Offline Files is controlled
by the Windows client operating system.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-13

Offline Files is available with the following operating systems:


• Windows 8.1
• Windows 8
• Windows Server 2012 R2
• Windows Server 2012
• Windows 7
• Windows Server 2008 R2
• Windows Server 2008
• Windows Vista®
• Windows Server 2003

Note: The Offline Files feature is not available in home versions of Windows operating
systems.

Settings for Offline Files


With Windows Server 2012, you view the Offline Settings dialog box for a shared folder by clicking the
Caching button in the Advanced Sharing dialog box. The following options are available within the Offline
Settings dialog box:
• Only the files and programs that users specify are available offline. This is the default option when
you set up a shared folder. When you use this option, no files or programs are available offline by
default, and users control which files and programs they want to access when they are not connected
to the network. Alternatively, you can choose the Enable BranchCache option. This option enables
computers that are accessing the files to cache files downloaded from the folder by using Windows
BranchCache®. You must install and configure BranchCache on the Windows Server 2012 server to
select this option.
• No files or programs from the shared folder are available offline. This option blocks client computers
from making copies of the files and programs on the shared folder.

• All files and programs that users open from the shared folder are automatically available offline.
Whenever a user accesses the shared folder or drive, and opens a file or program in it, that file or
program automatically becomes available offline to that user. Files and programs that are made
automatically available offline remain in the Offline Files cache, and they synchronize with the version
on the server until the cache is full or the user deletes the files. Files and programs that users do not
open are not available offline.

• Optimized for performance. If you select this option, executable files (.exe, .dll) that a client computer
runs from the shared folder are cached on that client computer automatically. The next time the
client computer runs the executable files, it will access its local cache instead of the shared folder on
the server.

Note: The Offline Files feature must be enabled on the client computer for files and
programs to be cached automatically.
In addition, the Optimized For Performance option does not affect client computers that use
Windows Vista or older Windows operating systems, because these operating systems perform
the program-level caching automatically, as specified by this option.
MCT USE ONLY. STUDENT USE PROHIBITED
10-14 Implementing File and Print Services

The Always Offline Mode


You can configure Windows Server 2012 and Windows 8 computers to use the Always Available Offline
Mode when they are accessing shared folders. When you configure this option, client computers always
use the locally cached version of the files from a network share, even if they are connected to the file
server by a high-speed network connection.

This configuration typically results in faster access to files for client computers, especially when
connectivity or speed of a network connection is intermittent. Synchronization with the files on the
server occurs according to the offline files configuration of the client computer.

How to enable the always offline mode


To enable Always Offline mode, use Group Policy to enable the Configure slow-link mode setting, and set
the latency value to 1. The Configure slow-link mode setting is located in Group Policy under the
Computer Configuration\Administrative Policies\Network\Offline Files node.

Demonstration: Creating and Configuring a Shared Folder


You typically create and configure a shared folder by using File Explorer, from the file or folder’s
Properties dialog box on the Sharing tab. When creating a shared folder, always ensure that you set
permissions that are appropriate for all of the files and folders within the shared folder location.

In this demonstration, you will see how to:

• Create a shared folder.


• Assign permissions for the shared folder.

• Configure access-based enumeration.


• Configure offline files.

Demonstration Steps
Create a shared folder
1. Sign in to LON-SVR1 as Adatum\Administrator with the password Pa$$w0rd.
2. On drive E, create a folder named Data.

3. Share the Data folder.

Assign permissions for the shared folder


• Grant the Authenticated Users Change permissions for the Data folder.

Configure access-based enumeration


1. Open Server Manager.
2. Navigate to the Share pane in the File and Storage Services management console.

3. Open the Data Properties dialog box for \\LON-SVR1\Data, and then enable access-based
enumeration.

Configure offline files


1. Open the Data Properties dialog box for E:\Data.

2. Navigate to the Sharing tab, and then open the Advanced Sharing settings.
3. Open the Caching settings, and then disable offline files.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-15

Lesson 2
Protecting Shared Files and Folders by Using Shadow
Copies
You use shadow copies to restore previous versions of files and folders. It is much faster to restore a
previous version of a file from a shadow copy than from a traditional backup copy, because backup copies
often are stored offsite. Administrators and end users can recover files and folders when you use shadow
copies.

This lesson introduces you to shadow copies, and shows you how to configure a schedule of shadow
copies in Windows Server 2012.

Lesson Objectives
After completing this lesson, you should be able to:

• Describe shadow copies.


• Describe considerations for scheduling shadow copies.

• Identify methods for restoring data from shadow copies.

• Restore data from a shadow copy.

What Are Shadow Copies?


A shadow copy is a static image, or snapshot, of a
set of data, such as a file or folder. Shadow copies
provide the capability to recover files and folders
based on snapshots of storage drives. After a
snapshot is taken, you can view and potentially
restore previous versions of files and folders from
that snapshot.
A shadow copy does not make a complete copy
of all files for each snapshot. Instead, after a
snapshot is taken, Windows Server 2012 tracks
changes to the drive. A specific amount of disk
space is allocated for tracking the changed disk
blocks. When you access a previous version of a file, some of the content might be in the current version
of the file, and some might be in the snapshot.
By default, the changed disk blocks are stored on the same drive as the original file, but you can modify
where they are stored. You also can define how much disk space is allocated for shadow copies. Multiple
snapshots are retained until the allocated disk space is full, after which, older snapshots are removed to
make room for new snapshots. The amount of disk space that a snapshot uses is based on how much has
changed in the files since the previous snapshot.

Because a snapshot is not a complete copy of files, you cannot use shadow copies as a replacement for
traditional backups. If the disk containing a drive is lost or damaged, then the snapshots of that drive are
also lost.

Shadow copies are suitable for recovering data files, but not for more complex data (such as databases),
that need to be logically consistent before a backup is performed. A database that you restore from
previous versions is likely to be corrupt and require database repairs.
MCT USE ONLY. STUDENT USE PROHIBITED
10-16 Implementing File and Print Services

Considerations for Scheduling Shadow Copies


The default schedule for creating shadow copies is
Monday through Friday at 07:00 A.M., and again
at noon. You can modify the default schedule as
desired for your organization.

When scheduling shadow copies:

• Consider that increasing the frequency of


shadow copies increases the load on the
server. As a best practice, you should not
schedule drive shadow copies more than once
each hour.
• Increase the frequency of shadow copies for
frequently changing data. This increases the likelihood that a shadow copy will capture recent file
changes.

• Increase the frequency of shadow copies for important data. This increases the likelihood that a
shadow copy will capture important file changes.

Restoring Data from a Shadow Copy


Either users or administrators can restore previous
versions of files. However, most users are unaware
that they can do this, and they will need
instructions on how to restore a previous version
of a file.
Administrators can access and restore previous
versions of files directly on the server that stores
the files, while users can access and restore
previous versions of files over the network from a
file share. In both scenarios, administrators and
users access previous versions from the file or
folder’s Properties dialog box.
When viewing previous versions of a folder, you can browse the available files and select only the file that
you need. If multiple versions of files are available, you can review each version before deciding which one
to restore. Finally, you can copy a previous version of a file to an alternate location instead of restoring it
to its previous location. This prevents overwriting the current file version.

Windows Vista and Windows 7 operating system clients can access previous file versions without installing
any additional software. However, Windows operating systems before Windows Vista no longer support
accessing previous file versions.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-17

Demonstration: Restoring Data from a Shadow Copy


You can create shadow copies by using the default schedule, or you can take more frequent snapshots by
modifying the schedule. In either case, you will see only the versions of the file that have changed since
the previous snapshot was taken. Making a shadow copy of a file that has not changed has no actual
effect on the shadow copy. No additional versions are available, and the snapshot uses no space for that
particular file.

In this demonstration, you will see how to:

• Configure shadow copies.

• Create a new file.

• Create a shadow copy.

• Modify the file.

• Restore the previous version.

Demonstration Steps
Configure shadow copies
1. On LON-SVR1, open File Explorer.
2. Enable Shadow Copies for Local Disk (C:).

Create a new file


1. Open File Explorer.
2. Create a folder on drive C named Data.

3. Create a text file named TestFile.txt in the Data folder.


4. Change the contents of TestFile.txt by adding and saving the text Version 1.

Create a shadow copy


1. In File Explorer, right-click Local Disk (C:), and then click Configure Shadow Copies.
2. In the Shadow Copies dialog box, click Create Now.

3. When the shadow copy is complete, click OK.

Modify the file


1. Open TestFile.txt as a Notepad document.
2. In Notepad, type Version 2.

3. Save the changes.

Restore the previous version


1. In File Explorer, right-click TestFile.txt, and then click Restore previous versions.

2. Choose the most recent version.

3. In the Are you sure you want to restore message, click Restore.
4. Open TestFile.txt, and then verify that the previous version is restored.
MCT USE ONLY. STUDENT USE PROHIBITED
10-18 Implementing File and Print Services

Lesson 3
Configuring Work Folders
More and more, information workers want to use their own devices such as smart phones and tablets to
access corporate data files while out of the office. Work Folders allows users to store and access work files
from anywhere while complying with corporate policies. Work Folders use a new synchronization protocol
to synchronize corporate data to user devices from a centralized, on-premises server. The corporate
organization still maintains control of the data by implementing policies such as encryption.

Lesson Objectives
After completing the lesson, you should be able to:

• Describe Work Folders.


• Discuss the benefits and limitations of Work Folders.

• Describe Work Folders components.

• Configure Work Folders.

What Is the Work Folders Role Service?


Work Folders is a new role service of the File and
Storage Services role and is available only in
Windows Server 2012 R2. Work Folders allows
users to synchronize corporate data to all of their
devices. When a user creates or modifies a file in
a Work Folders folder on any device or PC, it is
replicated automatically to the corporate file
server’s sync share via Secure Sockets Layer (SSL)
connections on port 443. The changes in the sync
share are then replicated securely to that user’s
other devices if those devices also are configured
to use Work Folders. A sync share maps to a
physical location on the file server where files are stored. New folders or existing shared folders can be
mapped to sync shares.

You can configure client computers to connect to the sync share manually or automatically. Once the
client computer is configured, users will not see any difference between the work folder and other folders
in File Explorer. Users can create files and folders in the work folder just like they do in other network
shared folders. These files and folders will be synchronized to all other devices configured to use Work
Folders.
Other factors to keep in mind when working with Work Folders are:

• Corporate security polices can be applied to the data to enforce encryption, lock devices, and wipe
corporate data off devices.

• File management technologies such as quotas, file screens, reporting, and classification can be
applied to files and folders held in Work Folders.

• Client devices are limited to one synchronize partnership per user per device.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-19

How Files Stay In Synchronization


Once the synchronize partnership is established between the client and the server, a data directory is
created on the device's NTFS or ReFS volume. Additionally, a hidden version database is created and
stored in the user profile. This database tracks the metadata of the files and folders stored in the work
folders, and detects when changes occur. A hidden, download-staging directory accepts updated files
from the Work Folders server.

The first time a user synchronizes a device, a data directory and upload-staging directory is created on the
server for that user. One version database is created on the sync share for each user, and synchronization
occurs through change detection on the client or by polling. Polling occurs every 10 minutes, by default.
When polling detects a local change on a device, the client connects to the server and uploads the change
to the upload-staging directory. Then the change is applied to the user’s data directory on the server. The
client device always initiates synchronization.

Conflict Resolution
If a file is edited and saved on different devices at the same time, both copies are uploaded to the server
and the name of the device is appended to one of the file names. For example, a user opens, edits, and
saves a file named Doc1 on his office PC; he then edits the offline version on his tablet. When the tablet
version synchronizes, the file is saved as Doc1 name of tablet. There will be two versions of the file in the
sync share.

Backup and Recovery


You can restore file selectively, on the server or the client. Work Folders sees the restored file as just
another change, and the restored file becomes the authoritative version that is synchronized to the other
devices.
When you are backing up client systems, do not backup the version database; it rebuilds itself from the
server.
For server disaster scenarios, the Volume Shadow Copy Service (VSS) writer supports a full server restore.
The client initiates synchronizations, so the database becomes current automatically after receiving
updates from clients.

Comparing Work Folders to Cloud-Based Storage


For organizations that want to maintain data storage on-premise and already have established practices
around data management and storage, Work Folders provides a solution that users will find familiar.
Cloud-based technologies such as Microsoft® OneDrive™ for Business (formerly known as SkyDrive Pro)
are good solutions for organizations that use Microsoft SharePoint® and need the collaboration features
of Office 365®.
MCT USE ONLY. STUDENT USE PROHIBITED
10-20 Implementing File and Print Services

Benefits and Limitations of Work Folders


Work Folders provides several benefits that
existing technologies do not offer, but there are
limitations to what Work Folders can do.

Benefits
Work Folders provides several benefits, including
that it:

• Works with devices that are joined to the


domain and devices that are not joined to the
domain. Users need to provide credentials to
connect from devices that are not joined to
the domain.
• Provides a single point of access to work files on a user’s work and personal computers and devices.

• Provides users with access to work files while their computers are offline.

• Synchronizes files for the users when the computer or device next has Internet or network access.
• Can be deployed alongside existing technologies such as Folder Redirection and Offline Files.

• Enables data encryptions while data is in transit and when it is on the device itself.

• Enables administrators to configure security policies. These policies may include to instruct user
computers and devices to encrypt work folders and to use a lock-screen password.

• Can use existing file-server management technologies, such as file classification and folder quotas, to
manage user data.

• Enables the use of failover clustering to ensure high availability.

Limitations
Work Folders has limitations, including that it:
• Is supported currently only on Windows Server 2012 R2 and Windows 8.1.

• Does not permit users to share synchronized files or folders with other users.

• Does not permit you to synchronize files in work folders selectively. It synchronizes all files.
• Permits synchronization by users only to their own folder on the file server. They cannot synchronize
to other file shares.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-21

Components of Work Folders


If you want to implement Work Folders, there are
specific software requirements, and server and
client-side components, that you must configure.

Software Requirements
The Work Folders role service requires the
following software for file servers:

• A server that is running Windows


Server 2012 R2, on which to host sync shares
and user data.

• A volume formatted with NTFS or ReFS, on


which to store user files.

• A server certificate from a certification authority (CA) that your users trust. A public CA is best.

To enable users to synchronize across the Internet, Work Folders also requires that:
• The file server is accessible from the Internet.

• You have a publicly registered domain name and associated Domain Name System (DNS) records.

Work Folders has the following software requirements for client computers:

• Windows 8.1

• Windows RT 8.1

• A volume formatted with NTFS or ReFS on which to store user files

Note: A Windows Server 2012 R2 cannot be a client of the Work Folders role service.

Server Components
Work Folders is a role service of the File and Storage Services role, and you can install it on any edition of
Windows Server 2012 R2 and with any other roles or programs. For example, a domain controller or
Exchange server can also host Work Folders.
Installing the Work Folders role service also installs the following roles and role services:

• The File Server role service

• The Web Server (Internet Information Services (IIS)) role


• IIS Management Console role service

• IIS Hostable Web Core role service

Once the role service is installed, you must create the sync share. You can create multiple sync shares on a
file server. Each one maps to different file system locations to which different users and groups have
access. You can define different policies for each share.

Client Components
Windows 8.1 includes built-in support for connecting to, and managing, Work Folders files and folders.
Deployment can be manual or automatic.
MCT USE ONLY. STUDENT USE PROHIBITED
10-22 Implementing File and Print Services

Manual deployment
A built-in item in Control Panel named Work Folders is used to supply the user’s corporate email address.
This email address is used to construct the URL for the Work Folders server, and that URL is used to
connect to the Work Folders folder. If there is no corporate email address, you can enter the URL
manually.

Opt-in deployment
You can deliver Work Folders settings by using Group Policy, Microsoft System Center 2012 Configuration
Manager, or Windows Intune™. After the delivery of the settings, the user can decide if he or she wants to
use Work Folders on that device.

Mandatory deployment
You can deliver settings by using Group Policy, System Center 2012 Configuration Manager, or Windows
Intune. No user action is required, and Work Folders is configured automatically on the device.

Configuring Work Folders


There are a number of steps on both the server
and a client that you must complete to configure
Work Folders successfully.

Server Configuration
You configure the server by adding the Work
Folders role service and then configuring the sync
share as outlined in the following steps:
1. Use Server Manager or Windows PowerShell
to add the Work Folders role service and
dependent role services.

The following Windows PowerShell command


adds the Work Folders role service:

Add-WindowsFeature FS-SyncShareService

2. Use the New Sync Share Wizard or Windows PowerShell to create a sync share. You must provide the
following information:

o The name of the server that will host the sync share.

o The path to the sync share. This is a path to a local folder or an existing shared folder on the local
server. If you are using an existing shared folder, the work folders also can be accessed by the
UNC path.

o The format for folder naming. This is in the form of an email address or a user alias. The user alias
is compatible with technologies such as home folders. You also can specify that only a subfolder
of the sync share will be synchronized.

o The name of the sync share. This is the friendly name of the sync share.
o The names of the users or groups that will have access to the sync share. By default, inherited
permissions on the user folders is disabled and the user is granted exclusive access to the folder,
but you can change that.
o You can specify whether to encrypt the work folders and whether to lock the screen
automatically and require a password.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-23

If you are using Windows PowerShell, use the cmdlets New-SyncShare and Set-SyncShare to create and
modify the sync share. The following example creates a sync share named SalesShare at the local path of
C:\SalesShare, grants access to the Sales group, and sets the conflict resolution method to keep the latest
file saved:

New-SyncShare SalesShare -path C:\SalesShare -User Contoso\Sales -ConflictResolution


KeepLatest

You must install an SSL certificate in the computer’s Trusted Root Certification Authority. The common
name (CN) in the certificate must match the Work Folders URL name. For example, if the client is making a
request to https://syncsvr.contoso.com, then the CN must also be https://syncsvr.contoso.com.

Note: A single file server can host multiple sync shares. To do this, you need to use a
certificate with multiple hostnames, such as a subject alternative name (SAN) certificate.

Client Configuration
You can configure clients manually or you can establish automatic configuration. In either case, the
Work Folders connection uses SSL, so clients must trust the server certificate. Although it is possible to
use an internal CA, those certificates typically are not trusted by devices that are not joined to the domain
in question. Therefore, as a best practice, you should purchase the server certificate from a public CA.

Additional Reading: For more information about certificates for Work Folders, refer to
"Work Folders Certificate Management" at http://go.microsoft.com/fwlink/?LinkID=331094.

Manual Configuration
To configure the client manually, users launch the Work Folders item in Control Panel, and enter their
corporate email address. This address is used to build the URL (by default HTTPS://FQDN) of the file
server, which connects users to Work Folders. If the URL cannot be discovered by using the user’s email
address, you can enter it manually.

Automatic Configuration by using Group Policy


You use Group Policy to perform automatic configuration. The following Group Policy settings are used.

Setting Description

Force automatic This computer configuration setting specifies whether Work Folders will be set up
setup for all users automatically for all users on this computer. This prevents users from manually
specifying the local folder in which files are stored. Work Folders uses the settings
specified in the user Group Policy configuration for Work Folders.

Specify Work This user configuration setting specifies the Work Folders server, and whether
Folders settings users can change settings on domain-joined computers. When enabled, users
receive settings for the Work Folders URL and can be prevented from manually
specifying the local folder in which work folders are stored. The default location is
%userprofile%\Work Folders.

Note: Performing automatic configuration by using System Center 2012 Configuration


Manager or Windows Intune is beyond the scope of this course.
MCT USE ONLY. STUDENT USE PROHIBITED
10-24 Implementing File and Print Services

Demonstration: How to Configure Work Folders


In this demonstration, you will see how to:

• Install the Work Folders role service.


• Create a sync share for work folders on a file server.

• Configure Work Folder access on a Windows 8.1 client.

• Create a file in the work folder.


• Configure Work Folders to synchronize data on a second Windows 8.1 client.

Demonstration Steps
Install the Work Folders role service
• On LON-SVR1, install the Work Folders role service.

Create a sync share on a file server


• In Server Manager, in File and Storage Services, use the New Sync Share Wizard to create a new sync
share with the following parameters:

o Server Name: LON-SVR1

o Select by file share: Data


o Structure for user folders: User alias

o Sync share name: WorkFolders

o Grant synchronize access to groups: Domain Users


o Device policies: Automatically lock screen, and require a password

Configure Work Folder access on a Windows 8.1 client


1. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.
2. Navigate to C:\Labfiles\Mod10, and then run the WorkFolders.bat.

This batch file adds a registry entry that allows unsecured connections to work folders.

3. Open Control Panel, and then in System and Security, open the Work Folders item.
4. Setup Work Folders as follows:

o Click Enter a Work Folders URL instead.

o Work Folders URL: http://lon-svr1.adatum.com


Normally this requires a secure connection.

o Work Folders location: Accept default

o Policies: Accept the policies


5. Configure the Work Folders folder.

6. Open File Explorer, and notice that there is now a Work Folders folder under the This PC folder.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-25

Create a file in the work folder


• Open the Work Folders folder, and then create a new text document.

Synchronize data on a second client computer


1. Sign in to LON-CL2 as Adatum\Administrator with the password Pa$$w0rd.

2. Navigate to C:\Labfiles\Mod10, and then double-click SetIP.bat.

This configures the IP address of the client to be on the correct subnet.

3. Repeat steps 2 through 6 from the Configure Work Folder access on a Windows 8.1 Client task.

4. Open the Work Folders folder, and then notice the file that you created is available from this
computer.
5. Close all open windows.

6. Use Hyper-V® Manager on the host computer to revert 20410D-LON-CL2.


MCT USE ONLY. STUDENT USE PROHIBITED
10-26 Implementing File and Print Services

Lesson 4
Configuring Network Printing
By using the Print and Document Services role in Windows Server 2012, you can share printers on a
network, thereby centralizing management of print servers and network printers. You can use the Print
Management console to monitor print queues, and receive important notifications regarding print server
activity.

Windows Server 2012 introduces new features and important changes to the Print and Document Services
role, which you can use to manage your network’s printing environment better. This lesson explains the
important aspects of network printing, and introduces new network printing features that are available in
Windows Server 2012.

Lesson Objectives
After completing the lesson, you should be able to:

• Identify the benefits of network printing.


• Describe the Enhanced Point and Print feature.

• Identify security options for network printing.

• Create multiple configurations for a print device.


• Describe printer pooling.

• Describe Branch Office Direct Printing.

• Identify methods for deploying printers to clients.

Benefits of Network Printing


You can configure network printing by using
Windows Server 2012 as a print server for users.
In this configuration, client computers submit
print jobs to the print server, which then delivers
the job to a network printer.

Benefits of Network Printing


• Centralized management. The biggest benefit
of using Windows Server 2012 as a print
server is centralized management of printing.
Instead of managing client connections to
many individual devices, you manage their
connection to the server. You install printer
drivers centrally on the server, and then distribute them to workstations.

• Simplified troubleshooting. By installing printer drivers centrally on a server, you also simplify
troubleshooting. It is relatively easy to determine whether printing problems are caused by the
printer, server, or client computer.

• Lower costs. A network printer is more expensive than those typically used for local printing, but it
has significantly lower consumables costs and better quality printing. Therefore, you will save money
on printing, because the initial cost of the printer is spread over all the computers that connect to
that printer. For example, a single network printer could service 100 users or more.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-27

• Easier searching. You can publish network printers in AD DS, which allows users to search for printers
in their domain.

Enterprise Print Management


You can manage printing for the entire enterprise from the Windows Server 2012 Print Management
console. The Print Management console provides real-time information about the status of printers and
print servers on the network and can send notifications or run scripts when printers need attention. With
this console you can connect to and manage printers on print servers running Microsoft Windows 2000
and higher.

The Print Services tools are not installed by default. You can install the role by using Server Manager or
Windows PowerShell. Once installed, the Print Services tools can detect print devices that exist on the
same subnet as the print server, install the appropriate printer drivers, set up print queues, and share the
printers. You then can deploy printers to users or computers through existing or new Group Policies,
directly from the Print Management console.

Additional Reading: For more information about managing printers, refer to "Print
Management Step-by-Step Guide" at http://go.microsoft.com/fwlink/?LinkID=331093.

What Is Enhanced Point and Print?


Enhanced Point and Print is a new feature in
Windows Server 2012 that makes it easier to
install drivers for network printers. Enhanced Point
and Print uses the new version 4 (v4) driver type
that is introduced in Windows Server 2012 and
Windows 8.

Understanding V3 Drivers and V4


Drivers
The Windows printer driver standard that previous
versions of Windows Server used has existed in
relatively the same form since the introduction
of version 3 (v3) drivers in the Microsoft
Windows 2000 operating systems. With v3 drivers, printer manufacturers create customized print drivers
for each specific device that they produce, to ensure that Windows apps can use all of their printer’s
features. With the v3 model, printer infrastructure management requires administrators to maintain
drivers for each print device in the environment, and separate 32-bit and 64-bit drivers for a single print
device, to support both platforms.

Introducing the V4 Printer Driver


Windows Server 2012 and Windows 8 include support for v4 print drivers, which enable improved print
device driver management and installation. Under the v4 model, print device manufacturers can create
Print Class Drivers that support similar printing features and printing language that may be common to a
large set of devices. Common printing languages may include Printer Control Language (PCL), .ps, or XML
Paper Specification (XPS).
V4 drivers typically are delivered by using Windows Update or Windows Software Update Services. Unlike
v3 drivers, v4 drivers are not delivered from a printer store that is hosted on the print server.
MCT USE ONLY. STUDENT USE PROHIBITED
10-28 Implementing File and Print Services

The v4 driver model provides the following benefits:

• Sharing a printer does not require provisioning drivers that match the client architecture.

• Driver files are isolated on a per-driver basis, preventing driver file naming conflicts.

• A single driver can support multiple devices.

• Driver packages are smaller and more streamlined than v3 drivers, resulting in faster driver-
installation times.
• You can deploy the printer driver and the printer user interface independently.

Using Enhanced Point and Print for Driver Installation


Under the v4 model, printer sharing and driver installation operates automatically under Enhanced Point
and Print. When you install a network printer on a client computer, the server and client work together to
identify the print device. The driver then installs directly from the driver store on the client machine, or
from Windows Update or Windows Software Update Services.
When you use Enhanced Point and Print, you no longer need to maintain the print device drivers on the
print server. Driver installation for network print devices becomes faster because printer drivers no longer
need to be transferred over the network from server to client.
If the driver store on the client machine does not contain a driver for the network printer that is being
installed, and if an appropriate driver cannot be obtained from Windows Update or Windows Server
Update Services (WSUS), Windows uses a fallback mechanism to enable cross-platform printing by using
the print driver from the print server.

Security Options for Network Printing


When a printer is shared over a network, many
scenarios require no security. The printer is
considered open-access, which means that
everyone can print on it. This is the default
configuration for a printer that is shared on a
Windows server.
The permissions that are available for shared
printing include:

• Print. This permission allows users to print


documents on the printer. By default, this
permission is assigned to the Everyone group.

• Manage this printer. This permission allows users to modify printer settings, including updating
drivers. By default, this permission is given to Administrators, Server Operators, and Print Operators.
• Manage documents. This permission allows users to modify and delete print jobs in the queue. This
permission is assigned to CREATOR OWNER, which means that the user who creates a print job
manages that job. Administrators, Server Operators, and Print Operators also have this permission for
all print jobs.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-29

Demonstration: Creating Multiple Configurations for a Print Device


When you create multiple configurations for a print device, you can assign print queues to specific users
or groups. If you give different priorities to the print queues, documents sent to the high priority queues
will be printed before documents sent to low priority queues. Therefore, when a user who has a high
priority queue sends a job to the printer, the print server will process that job before any jobs coming
from lower priority queues.

In this demonstration, you will see how to:

• Create a shared printer.

• Create a second shared printer on the same port.

• Increase printing priority for a high priority print queue.

Demonstration Steps
Create a shared printer
1. On LON-SVR1, open the Devices and Printers window.

2. Add a printer that uses the LPT1 local port and the Brother Color Leg Type1 Class driver.
3. Name the printer AllUsers.

4. Share the printer by using the default settings.

Create a second shared printer on the same port


1. On LON-SVR1, open the Devices and Printers window.
2. Add a printer that uses the LPT1 local port and the Brother Color Leg Type1 Class driver.

3. Name the printer Executives.


4. Share the printer by using the default settings.

Increase printing priority for a high priority print queue


1. Open the Executives Printer properties window.
2. Increase the Priority to 10.

What Is Printer Pooling?


Printer pooling combines multiple physical
printers into a single logical unit. To client
computers, the printer pool appears to be a
single printer. When jobs are submitted to the
printer pool, any available printer in the printer
pool can process them.

Printer pooling increases the scalability and


availability of network printing. If one printer in
the pool is unavailable (for example, from a large
print job, a paper jam, or being offline), all jobs
are distributed to the remaining printers. If a
printer pool does not have sufficient capacity, you
can add another printer to the printer pool without performing any client configuration.
MCT USE ONLY. STUDENT USE PROHIBITED
10-30 Implementing File and Print Services

You create a printer pool on a server by specifying multiple ports for a printer. Each port is the location of
one physical printer. In most cases, the ports are an IP address on the network, instead of a local LPT or
USB connection.

The requirements for a printer pool are as follows:


• Printers must use the same driver. Clients use a single printer driver for generating print jobs. All
printers must accept print jobs in the same format. In many cases, this means that a single printer
model is used in a pool.

• Printers should be in the same location. The printers in a printer pool should be located physically
close together. When users retrieve their print jobs, they must check all printers in the printer pool to
find their document. There is no way for users to know which printer has printed their document.

What Is Branch Office Direct Printing?


Branch Office Direct Printing reduces network
costs for organizations that have centralized their
Windows Server roles. When you enable Branch
Office Direct Printing, Windows clients obtain
printer information from the print server, but
send the print jobs directly to the printer. The
print data does not travel to the central server
and then back to the branch office printer. This
arrangement reduces traffic between the client
computer, the print server, and the branch office
printer, and results in increased network efficiency.

Branch Office Direct Printing is transparent to the


user. In addition, the user can print even if the print server is unavailable for some reason, such as that the
wide area network (WAN) link to the data center is down. This is because the printer information is cached
on the client computer in the branch office.

Configuring Branch Office Direct Printing


You can configure Branch Office Direct Printing by using the Print Management console or a Windows
PowerShell command-line interface.
To configure Branch Office Direct Printing from the Print Management console, you use the following
procedure:

1. In Server Manager, open the Print Management console.

2. In the navigation pane, expand Print Servers, and then expand the print server that is hosting the
network printer for which you are enabling Branch Office Direct Printing.

3. Click the Printers node, right-click the desired printer, and then click Enable Branch Office Direct
Printing.
To configure Branch Office Direct Printing by using Windows PowerShell, type the following cmdlet at a
Windows PowerShell prompt:

Set-Printer -name "<Printer Name Here>" -ComputerName <Print Server Name Here>
-RenderingMode BranchOffice
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-31

Deploying Printers to Clients


Deploying printers to clients is a critical part of
managing printing services on the network. A
well-designed system for deploying printers is
scalable and can manage hundreds or thousands
of computers.

The options for deploying printers are:

• Group Policy preferences. You can use Group


Policy preferences to deploy shared printers
to Windows XP, Windows Vista, Windows 7,
Windows 8, and Windows 8.1 clients. You can
associate the printer with a user or computer
account, and can be targeted by group. For
Windows XP computers, you must install the Group Policy Preference Client Extension.
• Group Policy Object (GPO) created by Print Management. The Print Management administrative tool
can add printers to a GPO for distribution to client computers based on either a user account or a
computer account. You must configure Windows XP computers to run PushPrinterConnections.exe.

• Manual installation. Each user can add printers manually by either browsing the network or by using
the Add Printer Wizard. It is important to note that network printers that users install manually are
available only to the user that installed them. If multiple users share a computer, they must each
install the printer manually.

Easy Print
Easy Print is the ability for a client that is accessing a server remotely using the Remote Desktop
Connection program or RD Web Access to print to a local client printer from that remote server. It takes
the form of a driver installed on the server and is enabled by default once Remote Desktop Connections
are allowed or Remote Desktop Services role is installed on the server i.e. it requires no additional
configuration. Once installed it appears as a "redirected" server printer in the Print Management console
and can be accessed and administered as normal on the server. A client can then print locally using the
"redirected" printer.
MCT USE ONLY. STUDENT USE PROHIBITED
10-32 Implementing File and Print Services

Lab: Implementing File and Print Services


Scenario
Your manager has recently asked you to configure file and print services for the branch office. This
requires you to configure a new shared folder that will have subfolders for multiple departments,
configure shadow copies on the file servers, and configure a printer pool.

Additionally, many users want to be able to work on their data files while they are out of the office and
working on devices such as on Windows RT-based tablets. You must ensure that these users are able to
access their work-related data files from other locations when offline.

Objectives
After performing this lab you should be able to:

• Create and configure a file share.


• Configure shadow copies.

• Enable and configure Work Folders.

• Create and configure a printer pool.

Lab Setup
Estimated Time: 60 minutes

Virtual machines 20410D-LON-CL1


20410D-LON-DC1
20410D-LON-SVR1

User name Adatum\Administrator

Password Pa$$w0rd

For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:

1. On the host computer, start Hyper-V Manager.


2. In Hyper-V Manager, click 20410D-LON-DC1, and then in the Actions pane, click Start.

3. In the Actions pane, click Connect.

Wait until the virtual machine starts.

4. Sign in by using the following credentials:

o User name: Administrator

o Password: Pa$$w0rd
o Domain: Adatum

5. Repeat steps 2 through 4 for 20410D-LON-SVR1.


6. Repeat steps 2 and 3 for 20410D-LON-CL1. Do not sign in to LON-CL1 until directed to do so.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-33

Exercise 1: Creating and Configuring a File Share


Scenario
Your manager has asked you to create a new shared folder, which all departments will use. There will be a
single file share, with separate folders, for each department. To ensure that users see only the folders and
files to which they have access, you need to set the file permissions on the departmental folders and
enable access-based enumeration on the share.

There have been problems in other branch offices with multiple versions of files when offline files were
used for shared data structures. To avoid these conflicts, you need to disable Offline Files for this share.
The main tasks for this exercise are as follows:

1. Create the folder structure for the new share.

2. Configure file permissions on the folder structure.


3. Create the shared folder.

4. Test access to the shared folder.

5. Enable access-based enumeration.

6. Test access to the share.

7. Disable offline files for the share.

 Task 1: Create the folder structure for the new share


• On LON-SVR1, open File Explorer and create the following folders:
o E:\Data

o E:\Data\Development

o E:\Data\Marketing

 Task 2: Configure file permissions on the folder structure


1. In File Explorer, block the file permissions inheritance for E:\Data\Development and
E:\Data\Marketing, and when prompted, convert inherited permissions into explicit permissions.

2. In File Explorer, remove permissions for LON-SVR1\Users on E:\Data\Development and


E:\Data\Marketing.

3. In File Explorer, add the following file permissions for the folder structure.

Folder Permissions

E:\Data No change

E:\Data\Development Modify: Adatum\Development

E:\Data\Marketing Modify: Adatum\Marketing

 Task 3: Create the shared folder


1. In File Explorer, share the E:\Data folder.

2. Assign the following permissions to the shared folder:

o Change: Adatum\Authenticated Users


MCT USE ONLY. STUDENT USE PROHIBITED
10-34 Implementing File and Print Services

 Task 4: Test access to the shared folder


1. Sign in to LON-CL1 as Adatum\Bernard with the password Pa$$w0rd.

Notice that Bernard is a member of the Development group.

2. Open File Explorer.

3. Navigate to \\LON-SVR1\Data.

4. Attempt to open the Development and Marketing folders.

Bernard should have access to the Development folder. However, although Bernard can still see the
Marketing folder, he does not have access to its contents.

5. Sign out of LON-CL1.

 Task 5: Enable access-based enumeration


1. Switch to LON-SVR1.
2. Open Server Manager.

3. Click File and Storage Services.

4. Click Shares.
5. Open the Properties dialog box for the Data share, and then on the Settings page, enable
Access-based enumeration.

 Task 6: Test access to the share


1. Sign in to LON-CL1 as Adatum\Bernard with the password Pa$$w0rd.
2. Open File Explorer, and then navigate to \\LON-SVR1\Data.

Bernard can now view only the Development folder, the folder for which he has permissions.

3. Open the Development folder to confirm access.


4. Sign out of LON-CL1.

 Task 7: Disable offline files for the share


1. Switch to LON-SVR1.

2. Open File Explorer.


3. Navigate to drive E.

4. Open the Properties dialog box for the Data folder, and then disable offline file caching.

Results: After completing this exercise, you will have created a new shared folder for use by multiple
departments.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-35

Exercise 2: Configuring Shadow Copies


Scenario
A. Datum Corporation stores daily backups offsite for disaster recovery. Every morning, the backup from
the previous night is taken offsite. To recover a file from backup, the backup tapes need to be shipped
back onsite so the overall time to recover a file from backup can be a day or more.

Your manager has asked you to enable shadow copies on the file server so you can restore recently
modified or deleted files without using a backup tape. Because the data in this branch office changes
frequently, you are going to create a shadow copy once per hour.
The main tasks for this exercise are as follows:

1. Configure shadow copies for the file share.

2. Create multiple shadow copies of a file.


3. Recover a deleted file from a shadow copy.

 Task 1: Configure shadow copies for the file share


1. On LON-SVR1.

2. Open File Explorer.


3. Navigate to drive E, right-click Allfiles (E:), and then click Configure Shadow Copies.

4. Enable Shadow Copies for drive E.

5. Configure the settings to schedule hourly shadow copies for drive E.

 Task 2: Create multiple shadow copies of a file


1. On LON-SVR1, switch to File Explorer, and then navigate to E:\Data\Development.
2. Create a new text file named Report.txt.

3. Switch back to the Allfiles (E:) Properties dialog box. It should be opened on the Shadow Copies
tab. Click Create Now.

 Task 3: Recover a deleted file from a shadow copy


1. On LON-SVR1, switch back to File Explorer.

2. Delete the Report.txt file.


3. Open the Properties dialog box for E:\Data\Development, and then click the Previous Versions
tab.

4. Open the most recent version of the Development folder, and then copy the Report.txt file.
5. Paste the file back into the Development folder.

6. Close File Explorer and all open windows.

Results: After completing this exercise, you will have enabled shadow copies on the file server.
MCT USE ONLY. STUDENT USE PROHIBITED
10-36 Implementing File and Print Services

Exercise 3: Enabling and Configuring Work Folders


Scenario
You must enable and configure Work Folders to support the requirements of your users. Domain users
have their own Windows 8.1 and Windows RT 8.1 tablet devices and want access to their work data from
anywhere. When they return to work, they want to be able to synchronize these data files. You will use
Group Policy to force the Work Folders settings to users and test the settings.

The main tasks for this exercise are as follows:

1. Install the Work Folders role service.

2. Create a sync share on the file server.

3. Automate settings for users by using Group Policy.

4. Test synchronization.

 Task 1: Install the Work Folders role service


• On LON-SVR1, use Windows PowerShell to run the following command to install the Work Folders
role service:

Add-WindowsFeature FS-SyncShareService

Note that the name of the feature is case-sensitive.

 Task 2: Create a sync share on the file server


1. On LON-SVR1, use Windows PowerShell to run the following command to create the sync share
named Corp:
New-SyncShare Corp –path C:\CorpData –User “Adatum\Domain Users”

2. Open Server Manager, and then view the Work Folders to ensure the sync share was created.

 Task 3: Automate settings for users by using Group Policy


1. On LON-DC1, create a GPO named Work Folders, and then link it to the Adatum.com domain.
2. Edit the Work Folders GPO, as follows:

o Navigate to User Configuration\Policies\Administrative Templates\Windows Components


\Work Folders.
o Enable the Specify Work Folders settings policy, and then specify the Work Folders URL as
http://lon-svr1.Adatum.com.

o Select Force automatic setup to force automatic setup.

3. Close all open windows.

 Task 4: Test synchronization


1. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.

2. Use File Explorer to navigate to C:\Labfiles\Mod10, and then double-click WorkFolders.bat.

This adds a registry entry to allow unsecured connections to the work folders.
3. Sign out of LON-CL1.

4. Sign in to LON-CL1 as Adatum\Administrator.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-37

5. In File Explorer, open Work Folders, and then create a new text document named TestFile2.

6. Switch to LON-SVR1, and then use File Explorer to open C:\CorpData\Administrator.

Ensure the new text file you created exists.

Results: After completing this exercise, you will have installed the Work Folders role service, created a
sync share, and created a GPO to deliver the settings to the users automatically. Additionally, you will
have tested the settings.

Exercise 4: Creating and Configuring a Printer Pool


Scenario
Your manager has asked you to create a new shared printer for your branch office. However, instead of
creating the shared printer on the local server in the branch office, he has asked you to create the shared
printer in the head office and use Branch Office Direct Printing. This allows people in the head office to
manage the printer, but prevents print jobs from traversing WAN links.
To ensure high availability of this printer, you need to format it as a pooled printer. Two physical print
devices of the same model have been installed in the branch office for this purpose.
The main tasks for this exercise are as follows:

1. Install the Print and Document Services server role.

2. Install a printer.
3. Configure printer pooling.

4. Install a printer on a client computer.

 Task 1: Install the Print and Document Services server role


1. On LON-SVR1, open Server Manager.
2. Install the Print and Document Services role, and then accept the default settings.

 Task 2: Install a printer


1. On LON-SVR1, use the Print Management console to install a printer with following parameters:

o IP Address: 172.16.0.200
o Driver: Microsoft XPS Class Driver

o Name: Branch Office Printer

2. Share the printer.


3. List the printer in AD DS.

4. Enable Branch Office Direct Printing.


MCT USE ONLY. STUDENT USE PROHIBITED
10-38 Implementing File and Print Services

 Task 3: Configure printer pooling


1. On LON-SVR1, in the Print Management console, create a new port with the following configuration:

o Type: Standard TCP/IP port

o IP Address: 172.16.0.201

o Connection: Generic Network Card

2. Open the Branch Office Printer Properties dialog box, and then on the Ports tab, enable printer
pooling.
3. Select port 172.16.0.201 as the second port.

 Task 4: Install a printer on a client computer


• On LON-CL1, add a printer by selecting the Branch Office Printer on LON-SVR1 printer.

Results: After completing this exercise, you will have installed the Print and Document Services server role
and installed a printer with printer pooling.

Lab Review Questions


Question: How does implementing access-based enumeration benefit the users of the Data
shared folder in this lab?
Question: Is there another way you could recover the file in the shadow copy exercise? What
benefit do shadow copies provide in comparison?

Question: In Exercise 3, how could you configure Branch Office Direct Printing if you were in
a remote location and did not have access to the Windows Server 2012 GUI for the print
server?

 Prepare for the next module


After you finish the lab, revert the virtual machines to their initial state. To do this, complete the following
steps.

1. On the host computer, start Hyper-V Manager.

2. In the Virtual Machines list, right-click 20410D-LON-SVR1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.

4. Repeat steps 2 and 3 for 20410D-LON-CL1 and 20410D-LON-DC1.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 10-39

Module Review and Takeaways


Review Questions
Question: How does inheritance affect explicitly assigned permissions on a file?

Question: Why should you not use shadow copies as a means for data backup?

Question: In which scenarios could Branch Office Direct Printing be beneficial?

Tools
Tool Used for Where to find it

Effective Access Tool Assessing combined permissions Under Advanced, on the Security tab
for a file, folder, or shared folder of the Properties dialog box of a file,
folder or shared folder

net share Configuring Windows Server 2012 Command Prompt window


command-line tool networking components

Print Management Managing the print environment The Tools menu in Server Manager
console in Windows Server 2012
MCT USE ONLY. STUDENT USE PROHIBITED
MCT USE ONLY. STUDENT USE PROHIBITED
11-1

Module 11
Implementing Group Policy
Contents:
Module Overview 11-1

Lesson 1: Overview of Group Policy 11-2

Lesson 2: Group Policy Processing 11-9


Lesson 3: Implementing a Central Store for Administrative Templates 11-16

Lab: Implementing Group Policy 11-20


Module Review and Takeaways 11-24

Module Overview
Maintaining a consistent computing environment across an organization is challenging. Administrators
need a mechanism to configure and enforce user and computer settings and restrictions. Group Policy can
provide that consistency by enabling administrators to manage and apply configuration settings centrally.
This module provides an overview of Group Policy and provides details about how to implement Group
Policy.

Objectives
After completing this module, you should be able to:
• Create and manage Group Policy Objects (GPOs).

• Describe Group Policy processing.

• Implement a central store for administrative templates.


MCT USE ONLY. STUDENT USE PROHIBITED
11-2 Implementing Group Policy

Lesson 1
Overview of Group Policy
You can use Group Policy to control the settings of the computing environment. It is important to
understand how Group Policy functions, so you can apply Group Policy correctly. This lesson provides an
overview of Group Policy structure, and defines local and domain-based GPOs. It also describes the types
of settings available for users and groups.

Lesson Objectives
After completing this lesson, you should be able to:

• Describe the components of Group Policy.

• Describe multiple local GPOs.

• Describe storage options for domain GPOs.


• Describe GPO policies and preferences.

• Describe starter GPOs.

• Describe the process of delegating GPO management.


• Describe the process of creating and managing GPOs.

Components of Group Policy


Group Policy settings are configuration settings
that allow administrators to enforce settings by
modifying the computer-specific and user-specific
registry settings on domain-based computers. You
can group together Group Policy settings to make
GPOs, which you can then apply to users or
computers.

GPOs
A GPO is an object that contains one or more
policy settings that apply configuration setting for
users, computers, or both. GPO templates are
stored in SYSVOL, and GPO container objects are
stored in Active Directory® Domain Services (AD DS). You can manage GPOs by using the Group Policy
Management Console (GPMC). Within the GPMC, you can open and edit a GPO by using the Group Policy
Management Editor window. GPOs are linked to Active Directory containers, and apply settings to the
objects in those containers.

Group Policy Settings


A Group Policy setting is the most granular component of Group Policy. It defines a specific configuration
setting to apply to an object (a computer, a user, or both) within AD DS. Group Policy has thousands of
configurable settings. These settings can affect nearly every area of the computing environment.

However, you cannot apply all settings to all versions of Windows Server® and Windows® operating
systems. Each new version introduces new settings and capabilities that only apply to that specific version.
If a computer has a Group Policy setting applied that it cannot process, it simply ignores the setting.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-3

Most policy settings have three states:

• Not Configured. The GPO does not modify the existing configuration of the particular setting for the
user or computer.
• Enabled. The policy setting is applied.

• Disabled. The policy setting is reversed.

By default, most settings are set to Not Configured.

Note: Some settings are multivalued or have text string values, and you can use them to
provide specific configuration details to apps or operating-system components. For example, a
setting might provide the URL of the home page that Windows Internet Explorer® uses or the
path to blocked apps.

The effect of a configuration change depends on the policy setting. For example, if you enable the
Prohibit Access to Control Panel policy setting, users cannot open Control Panel. If you disable the policy
setting, you ensure that users can open Control Panel. Notice the double negative in this policy setting.
You disable a policy that prevents an action, thereby allowing the action.

Group Policy Settings Structure


There are two distinct areas of Group Policy settings:

• User settings. The settings that modify the HKey Current User hive of the registry.
• Computer settings. The settings that modify the HKEY Local Machine hive of the registry.

User and computer settings each have three areas of configuration, which the following table describes.

Section Description

Software settings Contain software settings that you can deploy to the user or the
computer. Software that you deploy to a user is specific to that user.
Software that you deploy to the computer is available to all users of that
computer.

Windows operating system Contain script settings and security settings for both user and computer,
settings and Internet Explorer maintenance settings for the user configuration.

Administrative templates Contain hundreds of settings that modify the registry to control various
aspects of the user and computer environment. Microsoft® or other
vendors may create new administrative templates, such as Microsoft
Office templates, which you can download from the Microsoft website,
and then add to the Group Policy Management Editor.

Group Policy Management Editor Window


The Group Policy Management Editor window displays the individual Group Policy settings that are
available in a GPO. The window displays the settings in an organized hierarchy that begins with the
division between computer and user settings, and then expands to show the Computer Configuration and
User Configuration nodes. The Group Policy Management Editor window is where you configure all Group
Policy settings and preferences.

Group Policy Preferences


A Preferences node is present under both the Computer Configuration and User Configuration nodes in
the Group Policy Management Editor window. The Preferences node provides even more capabilities with
which to configure the environment, and a later section in this module details them.
MCT USE ONLY. STUDENT USE PROHIBITED
11-4 Implementing Group Policy

Local Group Policy


All systems that are running Microsoft Windows client or server operating systems also have available
local GPOs. Local policy settings only apply to the local machine, but you can export and import them to
other computers.

New in Windows Server 2012 R2


Windows Server 2012 R2 offers several new or updated Group Policy settings and features for computers
that run Windows Server® 2012 R2 or Windows® 8.1. These settings and features include:

• Faster processing by using the Group Policy Caching settings. These new settings allow computers to
rely on a local cache of a GPO when running in synchronous mode, which is the default mode for
Group Policy processing.
• Increased support for IPv6. New Internet Protocol version 6 (IPv6) settings include the ability to push
IPv6 printers and IPv6 virtual private network (VPN) connections to computers. Additionally, item-
level targeting is available for IPv6.

• Extended logging for Group Policy operations. The Group Policy Operational event log contains more
details of operational events, including the length of processing time and the amount of time for
downloading policies, than previous versions. This log is available at Event Viewer\Applications and
Services\Microsoft\Windows\GroupPolicy\Operational.

• Many new settings for Windows 8.1 and Windows Server 2012 R2, including settings for managing
the Start screen layout, configuring charms, and customizing background colors.

Storage of Domain GPOs


A GPO is made up of two components: a Group Policy template and a Group Policy container.

Group Policy Template


Group Policy templates are the actual collection of settings that you can change. The Group Policy
template includes files that are stored in the SYSVOL of each domain controller. SYSVOL is in the
%SystemRoot% \SYSVOL\Domain\Policies\GPOGUID path, where GPOGUID is the globally unique
identifier (GUID) of the Group Policy container. When you create a GPO, a new Group Policy template is
created in the SYSVOL folder, and a new Group Policy container is created in AD DS.

Group Policy Container


The Group Policy container is an Active Directory object that is stored in the Active Directory database.
Each Group Policy container includes a GUID attribute that identifies the object uniquely within AD DS.
The Group Policy container defines basic attributes of the GPO, such as links and version numbers, but it
does not contain any of the settings.

By default, during a Group Policy refresh, the Group Policy client-side extensions only apply GPO settings
if the GPO has been updated.

The Group Policy client can identify an updated GPO by its version number. A GPO has a version number
that increments when a GPO settings change occurs. The GPO version number is stored as an attribute of
the Group Policy container. Additionally, it is stored in a text file named GPT.ini, in the Group Policy
Template folder. The Group Policy Client is aware of the version number of every GPO that it has applied
previously. If, during Group Policy refresh, the Group Policy client establishes that the version number of
the Group Policy container has changed, it notifies the client-side extensions that the GPO has been
updated.

When editing a GPO, the version that you are editing is the version on the domain controller that has the
primary domain controller (PDC) emulator flexible single master operations, or FSMO, role. It does not
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-5

matter what computer you are using to perform the editing, the GPMC focuses on the PDC emulator by
default. However, you can change the focus of the GPMC to edit a version on a different domain
controller.

What Are Group Policy Preferences?


Group Policy preferences are a Group Policy feature, which includes more than 20 Group Policy extensions
that expand a GPO’s range of configurable settings. Configuring these preferences helps reduce the need
for logon scripts.

Characteristics of Preferences
Group Policy preferences:

• Exist for both computers and users.

• Are not enforced, unlike Group Policy settings. Users can change the configurations that these
preferences establish.
• Can be managed through the Remote Server Administration Tools (RSAT).

• Can be applied only once at startup or during sign in, and can be refreshed at intervals.

• Are not removed when the GPO is no longer applied, unlike Group Policy settings. However, you can
change this behavior.

• Allow you to target certain users or computers by using a variety of methods, such as by the user’s
security group membership or by the operating-system version.

• Are not available for local GPOs.

• Does not have a disabled user interface, unlike a Group Policy setting.

Common Uses for Group Policy Preferences


You can configure many settings through Group Policy preferences. However, common uses for
configuring Group Policy preferences include to:
• Map network drives for users.
• Configure desktop shortcuts for users or computers.

• Set environment variables.


• Map printers.

• Set power options.

• Configure Start menus.

• Configure data sources.


• Configure Internet options.

• Schedule tasks.

What Are Starter GPOs?


Starter GPOs are templates that assist in the creation of GPOs. When creating new GPOs, you can choose
to use a starter GPO as the source. This makes it easier and faster to create multiple GPOs with the same
baseline configuration.
MCT USE ONLY. STUDENT USE PROHIBITED
11-6 Implementing Group Policy

Available Settings
Starter GPOs contain settings from only the Administrative Templates node of either the User
Configuration section or the Computer Configuration section. The Software Settings and Windows
Settings nodes of Group Policy are not available, because these nodes involve interaction of services, and
are more complex and domain-dependent.

Exporting Starter GPOs


You can export starter GPOs to a cabinet file (.cab), and then load that .cab file into another environment
that is completely independent of the source domain or forest. By exporting a starter GPO, you can send
the .cab file to other administrators, who can use it in other areas. For example, you might create a GPO
that defines Internet Explorer security settings. If you want all sites and domains to employ the same
settings, you could export the starter GPO to a .cab file, and then distribute it.

When to Use Starter GPOs


The most common situation in which you would use a starter GPO is when you want a group of settings
for a type of computer role. For example, you might want all corporate laptops to have the same desktop
restrictions, or you might want all file servers to have the same baseline Group Policy settings, but you
want to enable variations for different departments.

Included Starter GPOs


The GPMC includes a link to create a Starter GPO folder, which contains a number of predefined starter
GPOs. These policies provide preconfigured, security-oriented settings for Enterprise Clients (EC), in
addition to Specialized Security–Limited Functionality (SSLF) clients for both user and computer settings
on Windows Vista® and Windows XP with Service Pack 2 (SP2) operating systems. You can use these
policies as starting points when you design security policies.

Delegating Management of GPOs


Administrators can delegate some of the Group Policy administrative tasks to other users. These users do
not have to be domain administrators; they can be users that are granted certain rights to GPOs.

For example, a user who manages a particular organizational unit (OU) could be tasked with performing
reporting and analysis duties, while the help desk group is allowed to edit GPOs for that OU. A third
group made up of developers might oversee creation of the Windows Management Instrumentation
(WMI) filters.

The following Group Policy administrative tasks can be delegated independently:


• Creating GPOs, including creating Starter GPOs

• Editing GPOs

• Managing Group Policy links for a site, domain, or OU


• Performing Group Policy modeling analysis

• Reading Group Policy results data


• Creating WMI filters

Members of the Group Policy Creator Owners group can create new GPOs and edit or delete GPOs that
they have created.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-7

Group Policy Default Permissions


By default, the following users and groups have full access to manage Group Policy:

• Domain Admins
• Enterprise Admins

• Creator Owner

• Local System
The Authenticated User group has Read and Apply Group Policy permissions only.

Permissions for Creating GPOs


By default, only Domain Admins, Enterprise Admins, and Group Policy Creator Owners can create new
GPOs. You can use two methods to grant a group or user this right:

• Add the user to the Group Policy Creator Owners group

• Explicitly grant the group or user permission to create GPOs by using the GPMC

Permissions for Editing GPOs


To edit a GPO, the user must have both Read and Write access to the GPO. You can grant this permission
by using the GPMC.

Managing GPO Links


The ability to link GPOs to a container is a permission that is specific to that container. In the GPMC, you
can manage this permission by using the Delegation tab on the container. You can also delegate it
through the Delegation of Control Wizard in Active Directory Users and Computers.

Group Policy Modeling and Group Policy Results


You can delegate the ability to use the reporting tools either through the GPMC or through the
Delegation of Control Wizard in Active Directory Users and Computers.

Creating WMI Filters


You can delegate the ability to create and manage WMI filters either through the GPMC or through the
Delegation of Control Wizard in Active Directory Users and Computers.

Demonstration: Creating and Managing GPOs


In this demonstration, you will see how to:
• Create a GPO by using the GPMC.

• Edit a GPO in the Group Policy Management Editor window.

• Use Windows PowerShell® to create a GPO.

Demonstration Steps

Create a GPO by using the GPMC


• Sign in to LON-DC1 as Administrator with the password Pa$$w0rd, and create a policy named
Prohibit Windows Messenger.
MCT USE ONLY. STUDENT USE PROHIBITED
11-8 Implementing Group Policy

Edit a GPO in the Group Policy Management Editor window


1. Edit the policy to prohibit the use of Windows Messenger.

2. Link the Prohibit Windows Messenger GPO to the domain.

Use Windows PowerShell® to create a GPO named Desktop Lockdown


• In Windows PowerShell, import the grouppolicy module, and then use the following New-GPO
cmdlet:

New-GPO –Name "Desktop Lockdown"


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-9

Lesson 2
Group Policy Processing
Understanding how Group Policy is applied is the key to being able to develop a Group Policy strategy.
This lesson shows you how Group Policy is associated with Active Directory objects, how it is processed,
and how to control the application of Group Policy. After creating the GPOs and configuring the settings
that you want to apply, you must link them to containers. GPOs are applied in a specific order, and this
order can determine what settings are applied to objects. Two default policies are created automatically,
and you can use them to deliver password and security settings for the domain and for domain
controllers. You also can control policy application by using security filtering.

Lesson Objectives
After completing this lesson, you should be able to:

• Describe a GPO link.

• Explain how to apply GPOs to containers and objects.

• Describe the Group Policy processing order.


• Describe the default GPOs.

• Describe GPO security filtering.

GPO Links
Once you have created a GPO and defined all the settings that you want it to deliver, the next step is to
link the policy to an Active Directory container. A GPO link is the logical connection of the policy to a
container. You can link a single GPO to multiple containers by using the GPMC, including the following
container types:
• Sites

• Domains

• OUs

Once you link a GPO to a container, by default the policy is applied to all of the container’s objects and all
the child containers under that parent object. This is because the default permissions of the GPO are such
that Authenticated Users have Read and Apply Group Policy permission. You can modify this behavior by
managing permissions in the GPO.
You can disable links to containers, which removes the configuration settings. You also can delete links,
which does not delete the actual GPO, only the logical connection to the container.

You cannot link GPOs directly to users, groups, or computers. Furthermore, you cannot link GPOs to the
system containers in AD DS, including Builtin, Computers, Users, or Managed Service Accounts. The AD DS
system containers receive Group Policy settings from GPOs that are linked to the domain level only.
MCT USE ONLY. STUDENT USE PROHIBITED
11-10 Implementing Group Policy

Applying GPOs
Computer configuration settings are applied at
startup, and then are refreshed at regular
intervals. Any startup scripts run at computer
startup. The default interval is every 90 minutes,
but this is configurable. The exceptions to this
default interval are domain controllers, which
have their settings refreshed every five minutes.

User settings are applied at logon and are


refreshed at regular, configurable intervals. The
default for this is 90 minutes. Prior to Windows 8.1
and Windows Server 2012 R2, all logon scripts run
at sign-in. By default, in Windows 8.1 and
Windows Server 2012 R2, logon scripts run five minutes after sign-in. You can use Group Policy to remove
this delay by modifying the Computer Configuration\Policies\Administrative Templates\System
\Group Policy\Configure Logon Script Delay setting.

Note: A number of user settings require two sign-ins before the user sees the effect of the
GPO. This is because multiple users signing in to the same computer use cached credentials to
speed up sign-ins. This means that, although the policy settings are delivered to the computer,
the user is signed in already. Therefore, the settings do not take effect until the next time the user
signs in. The Folder Redirection setting is an example of this.

You can change the refresh interval by configuring a Group Policy setting. For computer settings, the
refresh interval setting is found in the Computer Configuration\Policies\Administrative Templates
\System\Group Policy node. For user settings, the refresh interval is found at the corresponding settings
under User Configuration. An exception to the refresh interval is the security settings. The security settings
section of the Group Policy is refreshed at least every 16 hours, regardless of the interval that you set for
the refresh interval.

You also can refresh Group Policy manually. The command-line tool, Gpupdate, refreshes and delivers
any new Group Policy configurations. The Gpupdate /force command refreshes all Group Policy settings.
There also is a new Windows PowerShell Invoke-Gpupdate cmdlet, which performs the same function.

A new feature in Windows Server 2012 and in Windows 8 is Remote Policy Refresh. This feature allows
administrators to use the GPMC to target an OU and force Group Policy refresh on all of its computers
and their currently signed-in users. To force a Group Policy refresh, right-click any OU, and then click
Group Policy Update. The update occurs within 10 minutes.

Group Policy Processing Order


GPOs are not applied simultaneously. Rather, they are applied in a logical order, and GPOs that are
applied later in the process overwrite any conflicting policy settings that were applied earlier.

GPOs are applied in the following order:


1. Local GPOs. Local GPOs are processed first. Computers that are running Windows operating systems
already have a configured local Group Policy.

2. Site GPOs. Policies that are linked to sites are processed next.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-11

3. Domain GPOs. Policies that are linked to the domain are processed next. There are often multiple
polices at the domain level. These policies are processed in order of preference.

4. OU GPOs. Policies linked to OUs are processed next. These policies contain settings that are unique to
the objects in that OU. For example, the Sales users might have special required settings. You can link
a policy to the Sales OU to deliver those settings.

5. Child OU policies. Any policies that are linked to child OUs are processed last.

Objects in the containers receive the cumulative effect of all polices in their processing order. In the case
of a conflict between settings, the last policy applied takes effect. For example, a domain-level policy
might restrict access to registry editing tools, but you could configure an OU-level policy and link it to the
IT OU to reverse that policy. Because the OU-level policy is applied later in the process, access to registry
tools would be available.

Note: Other methods such as Enforcement and Inheritance Blocking can change the effect
of policies on containers.

If multiple policies are applied at the same level, the administrator can assign a preference value to
control the order of processing. The default preference order is the order in which the policies were
linked.
The administrator also can disable the user or computer configuration of a particular GPO. If one section
of a policy is empty, you should disable it to speed up policy processing. For example, if there is a policy
that only delivers user desktop configuration, the administrator could disable the computer side of the
policy.

What Are Multiple Local GPOs?


In Windows operating systems prior to Windows Vista, there was only one available user configuration in
the local Group Policy. That configuration was applied to all users who logged on from that local
computer. This is still true, but Windows Vista and newer Windows client operating systems, and Windows
Server 2008 and newer Windows Server operating systems, have an added feature: multiple local GPOs.
Since Windows 8 and Windows Server 2012, you also can have different user settings for different local
users, but this is only available for users’ configurations that are in Group Policy. In fact, there is only one
set of computer configurations available that affects all users of the computer.

Since Windows 8 and Windows Server 2012, Computers that run Windows provide this ability with the
following three layers of local GPOs:

• Local Group Policy (contains the computer configuration settings)

• Administrators and Non-Administrators Local Group Policy

• User-specific Local Group Policy

Note: The exception to this feature is domain controllers. Due to the nature of their role,
domain controllers cannot have local GPOs.
MCT USE ONLY. STUDENT USE PROHIBITED
11-12 Implementing Group Policy

How the Layers Are Processed


The layers of local GPOs are processed in the following order:

1. Local Group Policy


2. Administrators and Non-Administrators Group Policy

3. User-specific Local Group Policy

With the exception of the Administrator or Non-Administrator categories, it is not possible to apply local
GPOs to groups, but only to individual local user accounts. Domain users are subject to the local Group
Policy, or to the Administrator or Non-Administrator settings, as appropriate.

Note: Domain administrators can disable processing local GPOs on clients that are running
Windows client operating systems and Windows Server operating systems by enabling the Turn
Off Local Group Policy Objects Processing policy setting.

What Are the Default GPOs?


During the installation of the AD DS role, two default GPOs are created: Default Domain Policy, and
Default Domain Controllers Policy.

Default Domain Policy


The Default Domain Policy is linked to the domain and affects all security principals in the domain. It
contains the default password policy settings, the account lockout settings, and the Kerberos protocol. As
a best practice, this policy should not have other settings configured. If you need to configure other
settings to apply to the entire domain, then you should create new policies to deliver the settings, and
then link those policies to the domain.

Note: Currently, fine-grained password policies are the typical enterprise method of
enforcing password policies and account lockout settings, although they are beyond the scope of
this module.

Default Domain Controllers Policy


The Default Domain Controllers Policy is linked to the Domain Controllers OU, and should only affect
domain controllers. This policy provides auditing settings and user rights, and you should not use it for
other purposes.

GPO Security Filtering


By nature, a GPO applies to all the security principals in the container, and all child containers below the
parent. However, you might want to change that behavior and have certain GPOs apply only to particular
security principals. For example, you might want to exempt certain users in an OU from a restrictive
desktop policy. You can accomplish this through security filtering.
Each GPO has an access control list (ACL) that defines permissions to that GPO. The default permission is
for Authenticated Users to have the Read and Apply Group Policy permissions applied.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-13

By adjusting the permissions in the ACL, you can control which security principals receive permission to
have the GPO settings applied. There are two approaches that you can take to do this:

• Deny access to the Group Policy.


• Limit permissions to Group Policy.

Note: The Authenticated Users group includes all user and computer accounts that have
authenticated to AD DS.

Deny Access to Group Policy


If most security principals in the container should receive the policy settings but some should not, then
you can exempt particular security principals by denying them access to the Group Policy. For example,
you might have a Group Policy that all the users in the Sales OU should receive except the Sales Managers
group. You can exempt that group (or user) by adding that group (or user) to the ACL of the GPO, and
then setting the permission to Deny.

Limit Permissions to Group Policy


Alternatively, if you have created a GPO that you want to apply only to a few security principals in a
container, you can remove the Authenticated Users group from the ACL, add the security principals that
should receive the GPO settings, and then grant the security principals the Read and Apply Group Policy
permissions. For example, you might have a GPO with computer configuration settings that should only
apply to laptop computers. You could remove the Authenticated Users group from the ACL, add the
computer accounts of the laptops, and then grant the security principals the Read and Apply Group Policy
permission.
The ACL of a GPO is accessed in the GPMC by selecting the GPO in the Group Policy Object folder, and
then clicking the Delegation>Advanced tab.

Note: As a best practice, you should never deny access to the Authenticated User group. If
you do, then security principals would never receive the GPO settings.
MCT USE ONLY. STUDENT USE PROHIBITED
11-14 Implementing Group Policy

Discussion: Identifying Group Policy Application


For this discussion, review the AD DS structure in the graphic, read the scenario, and then answer the
questions on the slide.

Scenario
The following illustration represents a portion of the A. Datum Corporation’s AD DS structure, which
contains the Sales OU with its child OUs and the Servers OU.

• GPO1 is linked to the Adatum domain container. The GPO configures power options that turn off the
monitors and disks after 30 minutes of inactivity, and restricts access to registry editing tools.

• GPO2 has settings to lock down the desktops of the Sales Users OU, and configure printers for Sales
Users.
• GPO3 configures power options for laptops in the Sales Laptops OU.

• GPO4 configures a different set of power options to ensure that the servers never go into power save
mode.

Some users in the Sales OU have administrative rights on their computers, and have created local policies
to grant access specifically to Control Panel.

Discussion Questions
Based on this scenario, answer the following questions:

Question: What power options will the servers in the Servers OU receive?

Question: What power options will the laptops in the Sales Laptops OU receive?
Question: What power options will all other computers in the domain receive?

Question: Will users in the Sales Users OU who have created local policies to grant access to
Control Panel be able to access Control Panel?
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-15

Question: If you needed to grant access to Control Panel to some users, how would you do
it?

Question: Can you apply GPO2 to other department OUs?

Demonstration: Using Group Policy Diagnostic Tools


In this demonstration, you will see how to:

• Use Gpupdate to refresh Group Policy.


• Use the Gpresult cmdlet to output the results to an HTML file.

• Use the Group Policy Modeling Wizard to test the policy.

Demonstration Steps
Use Gpupdate to refresh Group Policy
• On LON-DC1, use Gpupdate to refresh the GPOs.

Use the Gpresult cmdlet to output the results to an HTML file


1. Use Gpresult /H to create an HTML file that displays the current GPO settings.

2. Open the HTML report and review the results.

Use the Group Policy Modeling Wizard to test the policy


• Use the Group Policy Modeling Wizard to simulate a policy application for users in the Managers OU
who sign in to any computer.
MCT USE ONLY. STUDENT USE PROHIBITED
11-16 Implementing Group Policy

Lesson 3
Implementing a Central Store for Administrative
Templates
Larger organizations might have many GPOs with multiple administrators that manage them. When an
administrator edits a GPO, the template files are pulled from the local workstation. The central store
provides a single folder in SYSVOL that contains all of the templates required to create and edit GPOs.

This lesson discusses the files that make up the templates, and covers how to create a central store
location to provide consistency in the templates that administrators use.

Lesson Objectives
After completing this lesson, you should be able to:

• Describe the central store.

• Describe administrative templates.

• Describe how administrative templates work.


• Describe managed and unmanaged policy settings.

What Is the Central Store?


If your organization has multiple administration workstations, there could be potential issues when editing
GPOs. If you do not have a central store that contains the template files, then the workstation from which
you are editing will use the .admx (ADMX) and .adml (ADML) files that are stored in the local
PolicyDefinitons folder. If different administration workstations have different operating systems or are at
different service pack levels, there might be differences in the ADMX and ADML files. For example, the
ADMX and ADML files that are stored on a workstation running Windows 7 with no service pack installed
might not be the same as the files that are stored on a domain controller running Windows Server 2012.
This could lead to administrators not seeing the same settings in a GPO.
The central store addresses this issue. The central store provides a single point from which administration
workstations can download the same ADMX and ADML files when editing a GPO. The central store is
detected automatically by Windows operating systems (Windows Vista or newer or Windows Server 2008
or newer). Because of this automatic behavior, the local workstation that the administrator uses to
perform administration always checks to see if a central store exists before loading the local ADMX and
ADML files in the Group Policy Management Editor window. When the local workstation detects a central
store, it then downloads the template files from there. In this way, there is a consistent administration
experience among multiple workstations.

Creating and Provisioning the Central Store


You must create and provision the central store manually. First you must create a folder on a domain
controller, name the folder PolicyDefinitions, and store the folder at C:\Windows\SYSVOL\sysvol
\{Domain Name}\Policies\. This folder is now your central store. You must then copy all the contents of
the C:\Windows\PolicyDefinitions folder to the central store. The ADML files in this folder also are in a
language-specific folder, such as en-US.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-17

What Are Administrative Templates?


An administrative template is made up of two
XML files types:

• ADMX files that specify the registry setting to


change. AMDX files are language-neutral.
• ADML files that generate the user interface to
configure the Administrative Templates policy
settings in the Group Policy Management
Editor window. ADML files are
language-specific.

ADMX and ADML files are stored in the


%SystemRoot%\PolicyDefinitions folder or in the
central store. You can also create your own custom administrative templates in XML format.
Administrative templates that control Microsoft Office products (such as Office Word, Office Excel and
Office PowerPoint) are also available from the Microsoft website.

Administrative templates have the following characteristics:

• They are organized into subfolders that house configuration options for specific areas of the
environment, such as network, system, and Windows components.

• The settings in the Computer section edit the HKEY_LOCAL_MACHINE registry hive, and settings in
the User section edit the HKEY_CURRENT_USER registry hive.
• Some settings exist for both User and Computer. For example, there is a setting to prevent Windows
Messenger from running in both the User and the Computer templates. In case of conflicting settings,
the Computer setting prevails.

• Some settings are available only to certain versions of Windows operating systems. Double-clicking
the settings displays the supported versions for that setting. The system ignores any setting that an
older Windows operating system cannot process.

ADM Files
Prior to Windows Vista, administrative templates had an .adm file extension (ADM). ADM files were
language-specific, and were difficult to customize. ADM files are stored in SYSVOL as part of the Group
Policy template. If an ADM file is used in multiple GPOs, then the file is stored multiple times. This
increases the size of SYSVOL, and therefore increases the size of Active Directory replication traffic.

How Administrative Templates Work


Administrative Templates have settings for almost every aspect of the computing environment. Each
setting in the template corresponds to a registry setting that controls an aspect of the computing
environment. For example, when you enable the setting that prevents access to Control Panel, this
changes the value in the registry key that controls that.
MCT USE ONLY. STUDENT USE PROHIBITED
11-18 Implementing Group Policy

The following table details the organization of the Administrative Templates node.

Section Nodes

Computer settings • Control Panel


• Network
• Printers
• System
• Windows Components
• All Settings

User settings • Control Panel


• Desktop
• Network
• Shared Folders
• Start Menu and Taskbar
• System
• Windows Components
• All Settings

Most of the nodes contain multiple subfolders that enable you to organize settings even further into
logical groupings. Even with this organization, finding the setting that you need might be a daunting task.

To help you locate settings in the All Settings folder you can filter the entire list of settings in either the
computer or the user section. The following filter options are available:

• Managed or unmanaged

• Configured or not configured


• Commented

• By keyword

• By platform
You can also combine multiple criteria. For example, you could filter to find all the configured settings
that apply to Internet Explorer 10 by using the keyword ActiveX.

Managed and Unmanaged Policy Settings


There are two types of policy settings: managed and unmanaged. All policy settings in a GPO’s
Administrative Templates are managed policies. The Group Policy service controls the managed policy
settings and removes a policy setting when it is no longer within scope of the user or computer. The
Group Policy service does not control unmanaged policy settings. These policy settings are persistent. The
Group Policy service does not remove unmanaged policy settings.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-19

Managed Policy Settings


A managed policy setting has the following characteristics:

• The user interface (UI) is locked, so that a user cannot change the setting. Managed policy settings
result in disabling of the appropriate UI. For example, if you configure the desktop wallpaper through
a Group Policy setting, then those settings are grayed out in the user’s local UI.

• Changes are made in the restricted areas of the registry to which only administrators have access.
These reserved registry keys are:

o HKLM\Software\Policies (computer settings)

o HKCU\Software\Policies (user settings)


o HKLM\Software\Microsoft\Windows\Current Version\Policies (computer settings)

o HKCU\Software\Microsoft\Windows\Current Version\Policies (user settings)

• Changes made by a Group Policy setting and the UI lockout are released if the user or computer falls
out of scope of the GPO. For example, if you delete a GPO, managed policy settings that had been
applied to a user are released. Typically, the setting then resets to its previous state. Also, the UI
interface for the setting is enabled.

Unmanaged Policy Settings


In contrast, an unmanaged policy setting makes a change that is persistent in the registry. If the GPO no
longer applies, the setting remains. This is often called tattooing the registry—in other words, making a
permanent change. To reverse the effect of the policy setting, you must deploy a change that reverts the
configuration to the desired state. Additionally, an unmanaged policy setting does not lock the UI for that
setting.
By default, the Group Policy Management Editor window does not show unmanaged policy settings to
discourage administrators from implementing a configuration that is difficult to revert. Many of the
settings that are available in Group Policy preferences are unmanaged settings.
MCT USE ONLY. STUDENT USE PROHIBITED
11-20 Implementing Group Policy

Lab: Implementing Group Policy


Scenario
A. Datum Corporation is a global engineering and manufacturing company with a head office based in
London, England. An IT office and a data center are located in London to support the London location
and other locations. A. Datum has recently deployed a Windows Server 2012 infrastructure with
Windows 8 clients.

In your role as a member of the server support team, you help to deploy and configure new servers and
services into the existing infrastructure based on the instructions given to you by your IT manager.
Your manager has asked you to create a central store for ADMX files to ensure that everyone can edit
GPOs that have been created with customized ADMX files. You also need to create a starter GPO that
includes Internet Explorer settings, and then configure a GPO that applies GPO settings for the Marketing
department and the IT department.

Objectives
After completing this lab, you should be able to:
• Configure a central store.

• Create GPOs.

Lab Setup
Estimated Time: 45 minutes

Virtual machines 20410D-LON-DC1


20410D-LON-CL1

User name Adatum\Administrator

Password Pa$$w0rd

Lab Setup Instructions


For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:
1. On the host computer, start Hyper-V Manager.

2. In Hyper-V® Manager, click 20410D-LON-DC1. In the Actions pane, click Start.


3. In the Actions pane, click Connect. Wait until the virtual machine starts.

4. Sign in by using the following credentials:

o User name: Adatum\Administrator

o Password: Pa$$w0rd

5. Repeat steps 2 and 3 for 20410D-LON-CL1. Do not sign in until directed to do so.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-21

Exercise 1: Configuring a central store


Scenario
A. Datum recently implemented a customized ADMX template to configure a program. A colleague
obtained the ADMX files from the vendor before creating the GPO with the configurations settings. The
settings were applied to the program as expected.

After implementation, you noticed that you are unable to modify the program’s settings in the GPO from
any location other than the workstation that was used originally by your colleague. To resolve this issue,
your manager has asked you to create a central store for administrative templates. After you create the
central store, your colleague will copy the vendor ADMX template from the workstation into the central
store.

The main tasks for this exercise are as follows:

1. View the location of administrative templates in a GPO.

2. Create a central store.

3. Copy administrative templates to the central store.

4. Verify the administrative template location in GPMC.

 Task 1: View the location of administrative templates in a GPO


1. Sign in to LON-DC1 as Administrator with the password Pa$$w0rd.

2. Start the Group Policy Management Console.


3. In the Group Policy Object folder, open the Default Domain Policy, and then view the location of
the administrative templates.

 Task 2: Create a central store


1. Open File Explorer, and then browse to C:\Windows\SYSVOL\sysvol\Adatum.com\Policies.
2. Create a folder to use for the central store, with the name PolicyDefinitions.

 Task 3: Copy administrative templates to the central store


• Copy the contents of the default PolicyDefinitions folder located at C:\Windows\PolicyDefinitions
to the new PolicyDefinitions folder located at C:\Windows\SYSVOL\sysvol\Adatum.com\Policies.

 Task 4: Verify the administrative template location in GPMC


1. In the Group Policy Management Editor window, verify that the ADMX files in the Administrative
Templates folder have been retrieved from the central store.

2. Close the Group Policy Management Editor window.

Results: After completing this exercise, you should have configured a central store.
MCT USE ONLY. STUDENT USE PROHIBITED
11-22 Implementing Group Policy

Exercise 2: Creating GPOs


Scenario
After a recent meeting of the IT Policy committee, management has decided that A. Datum will use Group
Policy to restrict user access to the General page of Internet Explorer.

Your manager has asked you to create a starter GPO that can be used for all departments, with default
restriction settings for Internet Explorer. You then need to create the GPOs that will deliver the settings for
members of all departments except for the IT department.

The main tasks for this exercise are as follows:

1. Create a Windows Internet Explorer Restriction default starter GPO.

2. Configure the Internet Explorer Restriction starter GPO.

3. Create an Internet Explorer Restrictions GPO from the Internet Explorer Restrictions starter GPO.

4. Test the GPO for Domain Users.

5. Use security filtering to exempt the IT Department from the Internet Explorer Restrictions policy.

6. Test the GPO app for IT department users.

7. Test the Application of the GPO for other domain users.

 Task 1: Create a Windows Internet Explorer Restriction default starter GPO


1. Open the GPMC, and then create a starter GPO named Internet Explorer Restrictions.

2. Type a comment that states This GPO disables the General page in Internet Options.

 Task 2: Configure the Internet Explorer Restriction starter GPO


1. Configure the starter GPO to disable the General page of Internet Options, and then name it
Internet Explorer Restrictions.

Hint: To select all the content, click in the details pane, and then press CTRL+A.

2. Close the Group Policy Management Editor window.

 Task 3: Create an Internet Explorer Restrictions GPO from the Internet Explorer
Restrictions starter GPO
• Create a new GPO named IE Restrictions that is based on the Internet Explorer Restrictions starter
GPO, and then link it to the Adatum.com domain.

 Task 4: Test the GPO for Domain Users


1. Sign in to LON-CL1 as Adatum\Brad with the password Pa$$w0rd.
2. Open Control Panel.

3. Attempt to change your home page.

4. Open Internet Options to verify that the General tab has been restricted.
5. Sign out from LON-CL1.

 Task 5: Use security filtering to exempt the IT Department from the Internet Explorer
Restrictions policy
1. On LON-DC1, open the GPMC.

2. Configure security filtering on the Internet Explorer Restrictions policy to deny access to the IT
department.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-23

 Task 6: Test the GPO app for IT department users


1. Switch to LON-CL1.

2. Sign in to LON-CL1 as Brad with the password Pa$$w0rd.

3. Open Control Panel.

4. Attempt to change your home page. Verify that the Internet Properties dialog box opens to the
General tab, and all settings are available.

5. Sign out from LON-CL1.

 Task 7: Test the Application of the GPO for other domain users
1. Sign in to LON-CL1 as Boris with the password Pa$$w0rd.

2. Open Control Panel.

3. Attempt to change your home page.

4. Open Internet Options to verify that the General tab has been restricted.
5. Sign out from LON-CL1.

Results: After completing this lab, you should have created a GPO.

Lab Review Questions


Question: What is the difference between ADMX and ADML files?
Question: The Sales Managers group should be exempted from the desktop lockdown
policy that is being applied to the entire Sales OU. All sales user accounts and sales groups
reside in the Sales OU. How would you exempt the Sales Managers group?

Question: What Windows command can you use to force the immediate refresh of all GPOs
on a client computer?

 Prepare for the next module


After you finish the lab, revert the virtual machines to their initial state by completing the following steps:
1. On the host computer, start Hyper-V Manager.

2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.

3. In the Revert Virtual Machine dialog box, click Revert.


4. Repeat steps 2 and 3 for 20410D-LON-CL1.
MCT USE ONLY. STUDENT USE PROHIBITED
11-24 Implementing Group Policy

Module Review and Takeaways


Review Questions
Question: What are some of the advantages and disadvantages of using site-level GPOs?

Question: You have a number of logon scripts that map network drives for users. Not all
users need these drive mappings, so you must ensure that only the desired users receive the
mappings. You want to move away from using scripts. What is the best way to map network
drives for selected users without using scripts?

Best Practices
The following are recommended best practices:

• Do not use the Default Domain and Default Domain Controllers policies for uses other than their
default uses. Instead, create new policies.
• Limit the use of security filtering and other mechanisms that make diagnostics more complex.

• If they have no settings configured, disable the User or Computer sections of policies.

• If you have multiple administration workstations, create a central store.

• Add comments to your GPOs to explain what the policies are doing.
• Design your OU structure to support Group Policy application.

Common Issues and Troubleshooting Tips


Common Issue Troubleshooting Tip

A user is experiencing abnormal


behavior on their workstation.

All users in a particular OU are


having issues, and the OU has
multiple GPOs applied.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 11-25

Tools
Tool Use Where to find it

Group Policy Management Controls all aspects of Group In Server Manager, on the Tools
Console (GPMC) Policy menu

Group Policy Management Configure settings in GPOs Accessed by editing any GPO
Editor snap-in

Resultant Set of Policy (RSoP) Determine what settings are In the GPMC
applying to a user or
computer

Group Policy Modeling Wizard Test what would occur if In the GPMC
settings were applied to users
or computers, prior to actually
applying the settings

Local Group Policy Editor Configure Group Policy Accessed by creating a new
settings that apply only to the Microsoft Management Console
local computer (MMC) on the local computer,
and adding the Group Policy
Management Editor snap-in
MCT USE ONLY. STUDENT USE PROHIBITED
MCT USE ONLY. STUDENT USE PROHIBITED
12-1

Module 12
Securing Windows Servers by Using Group Policy Objects
Contents:
Module Overview 12-1

Lesson 1: Security Overview for Windows Operating Systems 12-2

Lesson 2: Configuring Security Settings 12-6


Lab A: Increasing Security for Server Resources 12-18

Lesson 3: Restricting Software 12-25


Lesson 4: Configuring Windows Firewall with Advanced Security 12-29
Lab B: Configuring AppLocker and Windows Firewall 12-34

Module Review and Takeaways 12-40

Module Overview
Protecting IT infrastructure has always been a priority for organizations. Many security risks threaten
companies and their critical data. When companies do not have adequate security policies, they can lose
data, experience server unavailability, and lose credibility.

To help protect against security threats, companies must have well-designed security policies that include
many organizational and IT-related components. Organizations must evaluate security policies on a
regular basis, because as security threats evolve, so too must IT evolve.

Before you begin designing security policies to help protect your organization’s data, services, and IT
infrastructure, you must learn how to identify security threats, plan your strategy to mitigate security
threats, and secure your Windows Server® 2012 infrastructure.

Objectives
After completing this module, you should be able to:
• Describe Windows Server operating system security.

• Configure security settings by using Group Policy.

• Increase security for server resources.


• Restrict unauthorized software from running on servers and clients.

• Configure Windows® Firewall with Advanced Security.


MCT USE ONLY. STUDENT USE PROHIBITED
12-2 Securing Windows Servers by Using Group Policy Objects

Lesson 1
Security Overview for Windows Operating Systems
As organizations expand their availability of network data, applications, programs, and systems, ensuring
the security of network infrastructures becomes more challenging. Security technologies in Windows
Server 2012 enable organizations to provide better protection for their network resources and
organizational assets in increasingly complex environments and business scenarios. This lesson reviews
the tools and concepts that are available for implementing security within a Windows® 8 and Windows
Server 2012 infrastructure.

Windows Server 2012 includes numerous features that provide different methods for implementing
security. These features combine to form the core of the Windows Server 2012 security functionality.
Understanding these features and their associated concepts, and being familiar with their basic
implementation, are critical to maintaining a secure environment.

Lesson Objectives
After completing this lesson, you should be able to:
• Identify security risks for Windows Server 2012 and their associated costs.

• Apply the defense-in-depth model to increase security.


• Describe best practices for increasing Windows Server 2012 security.

Discussion: Identifying Security Risks and Costs


The first step in defending your systems is
identifying potential security risks and their
associated costs. You then can begin to make
accurate decisions about how to allocate
resources to mitigate those risks.

Review the question on the slide, and discuss


how to identify some security risks in Windows-
based networks, and their associated costs.

Applying Defense-In-Depth to
Increase Security
You can mitigate risks to your organization’s
computer network by providing security at various
infrastructure layers. The term defense-in-depth
often is used to describe the use of multiple
security technologies at different points
throughout your organization.

Defense-in-depth technologies include layers


of security that extend from user policies, to the
application, and then to the data itself.

Policies, Procedures, and Awareness


Security-policy measures need to operate within
the context of organizational policies regarding security best practices. For example, enforcing a strong
user-password policy is not helpful if users write down their passwords and place them next to their
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-3

computer screens. Organizations must educate users about how to protect their passwords. Another
example of a security best practice is ensuring that users do not leave their desktop computer without first
locking the desktop or signing off the computer. When you are establishing a security foundation for your
organization’s network, it is a good idea to start by establishing appropriate policies and procedures, and
then educating your users about those policies and procedures. You then can progress to the other
aspects of the defense-in-depth model.

Physical Security
If any unauthorized person can gain physical access to a computer on your network, then he or she
typically can bypass most other security measures more easily. You must ensure that computers
containing the most sensitive data, such as servers, are physically secure, and that you grant physical
access only to authorized personnel.

Perimeter
These days, no organization is an isolated enterprise. Organizations operate on the Internet, and many
organizational network resources are available on the Internet. This could include a website that describes
your organization’s services, or internal services that you make available externally, such as web
conferencing and email, so that users can work from home or from branch offices.
Perimeter networks mark the boundary between public and private networks. Providing reverse proxy
servers in the perimeter network enables you to provide more secure corporate services across the public
network. A reverse proxy server enables you to publish services such as email or web services, from the
corporate intranet without placing the email or web servers in the perimeter or exposing them to external
users. Some reverse proxy solutions act as both reverse proxy and as a firewall solution.
Many organizations design their network access plan so that computers that connect to the corporate
network are checked for different security criteria, such as whether the computer has the latest security
updates, antivirus updates, and other company-recommended security settings. If these criteria are met,
the computer is allowed to connect to corporate network. If not, the computer is placed in an isolated
network, called a quarantine, with no access to corporate resources. Once the computer’s security settings
have been corrected, it is removed from the quarantine network, and is allowed to connect to corporate
resources. One way to implement this type of network access plan is by using Network Access Protection
(NAP), a policy-enforcement platform.

Networks
Once you connect your computers to a network (either internal or public), they are susceptible to a
number of threats including eavesdropping, spoofing, denial of service, and replay attacks. By
implementing Internet Protocol Security (IPsec), you can encrypt network traffic and protect data while
it is in transit between computers.
When communication takes place over public networks, for example, when employees are working from
home or from remote offices, as a best practice they should connect to a solution, such as a DirectAccess
server, to guard against different types of network threats.

Host Computer Security Hardening


The next layer of defense is on the host computer. Together, the following steps form a process called
host computer security hardening. On your host computer, you must:
• Keep computers secure with the latest security updates.

• Configure security policies, such as password complexity.

• Configure the host firewall.


• Install antivirus software.
MCT USE ONLY. STUDENT USE PROHIBITED
12-4 Securing Windows Servers by Using Group Policy Objects

Application Security Hardening


Applications are only as secure as your latest security update. Together, the following steps form a process
that is called application security hardening:

• Use the Windows Update feature or application vendor’s update web sites consistently to keep your
applications up-to-date.

• Test applications to determine if they have any security vulnerabilities that might allow an external
attacker to compromise them or other network components.

Data Security
The final layer of security is data security. To help ensure the protection of your network, you should:

• Ensure the proper use of file user permissions by using access control lists (ACLs).
• Implement the encryption of confidential data with Encrypting File System (EFS).

• Perform regular data backups.

Additional Reading:

• For the latest Microsoft security bulletin and advisory information, refer to “Security for IT Pros” at
http://go.microsoft.com/fwlink/?LinkID=266741.
• For more information about common types of network attacks, refer to
http://go.microsoft.com/fwlink/?LinkID=266742.

Question: How many layers of the defense-in-depth model should you implement in your
organization?

Best Practices for Increasing Security


With respect to increasing security in your
organization, you should consider the following
best practices:

• Apply all available security updates as quickly


as possible following their release. You
should implement security updates as soon
as possible to ensure that your systems are
protected from known vulnerabilities.
Microsoft® releases the details of any known
vulnerabilities publicly after it releases an
update, which can lead to an increased
volume of malware attempting to exploit the
vulnerabilities. However, you must still ensure that you test updates adequately before you or your
end users apply them widely within your organization.

• Follow the principle of least privilege. Provide users and service accounts with the lowest permission
levels required to complete their necessary tasks. This will limit the impact of any malware that uses
those credentials. It also ensures that users are limited in their ability to delete data accidentally or
modify critical operating system settings.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-5

• Mandate that administrators use separate administrative accounts for administration and
configuration changes. This ensures that administrators, while browsing the Internet or reading
email, are not exposing a user account that has virtually unlimited access to the IT environment.

• Restrict administrator console sign in. Signing in locally at a console is a greater risk to a server than
accessing data remotely. This is because some malware can infect a computer only by using a user
session at the desktop. If you allow administrators to use Remote Desktop Connection for server
administration, ensure that enhanced security features such as User Account Control (UAC) are
enabled.

• Restrict physical access. If someone has physical access to your servers, that person has virtually
unlimited access to the data on that server. An unauthorized person could use a wide variety of tools
to reset the password on local administrator accounts quickly and allow local access, or use a USB
drive to introduce malware. BitLocker can be effective at limiting or reducing the effectiveness of
some physical attacks.

Additional Reading: For more information about best practices for enterprise security,
refer to the articles about Windows Server Security at
http://go.microsoft.com/fwlink/?LinkID=392100.
MCT USE ONLY. STUDENT USE PROHIBITED
12-6 Securing Windows Servers by Using Group Policy Objects

Lesson 2
Configuring Security Settings
Once you have learned about security threats, risks, and best practices for increasing security, you can
start configuring security for your Windows 8 and Windows Server 2012 environment. This lesson explains
how to configure security settings.

You can apply security settings to multiple users and computers in your organization by using Group
Policy. For example, you can configure password policy settings by using Group Policy, and then deploy
them to multiple users.
Group Policy has a large security component that you can use to configure security for both users and
computers. You can apply security consistently across the organization in Active Directory® Domain
Services (AD DS) by defining security settings in a Group Policy Object (GPO) that is associated with a site,
domain, or organizational unit (OU).

Additional Reading: For a detailed list of Group Policy settings, refer to "Group Policy
Settings Reference for Windows and Windows Server" at
http://go.microsoft.com/fwlink/?LinkID=266744.

Lesson Objectives
After completing this lesson, you should be able to:
• Describe how to configure security templates.

• Describe user rights and how to configure them.


• Describe how to configure security options.
• Describe how to configure the UAC feature.

• Describe how to configure security auditing.


• Describe how to configure the Restricted Groups policy.
• Describe how to configure account policy settings.

• Describe the Security Compliance Manager feature.


• Install and use Security Compliance Manager.

Configuring Security Templates


Security templates are files that you use to
manage and configure security settings on
Windows-based computers. Depending on the
various categories of security settings, security
templates are divided into logical sections. You
can configure each of the following sections
according to a company’s needs and requests:

• Account policies. This includes password,


account-lockout, and Kerberos version 5
policies.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-7

• Local policies. This includes audit policies, user-right assignment, and security options.

• Event log. This includes application, system, and security event log settings.

• Restricted groups. This includes membership of groups that have special rights and permissions.

• System services. This includes startup and permissions for system services.

• Registry. This includes permissions for registry keys.

• File system. This includes permissions for folders and files.

When you configure a security template, you can use it to configure a single computer or to configure
multiple computers on a network. You can configure and distribute security templates in several ways,
including by using the:

• Secedit command-line tool. You can use secedit to compare the current configuration of a computer
that is running Windows Server 2012 to specific security templates.

• Security Templates snap-in. You can use this snap-in to create a security policy by using security
templates.
• Security Configuration and Analysis Wizard. You can use this wizard to analyze and configure
computer security.
• Group Policy. You can use Group Policy to analyze and configure computer settings and to distribute
specific security settings.

• Security Compliance Manager. You can use Security Compliance Manager to view security settings,
compare settings to security baselines (which are groups of settings designed on the basis of
Microsoft security guides and best practices), customize settings, and import or export GPO backups.
A later topic in this module provides more detail about Security Compliance Manager.

Configuring User Rights


User rights assignment refers to the ability to
perform actions in the operating system. Each
computer has its own set of user rights, such as
the right to change the system time. By default,
most rights are granted either to the Local System
or to the Administrator.

Privileges and Logon rights are two types of user


rights:

• Privileges define access to computer and


domain resources, such as the right to back
up files and directories.

• Logon rights define who is authorized to sign in to a computer, and how they can sign in. For
example, logon rights may define the right to sign in to a system locally.

You can configure rights through Group Policy. Initially, the default domain policy does not have defined
user rights.

You can configure settings for User Rights by accessing the following location from the Group Policy
Management Console (GPMC):

• Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies


\User Rights Assignment
MCT USE ONLY. STUDENT USE PROHIBITED
12-8 Securing Windows Servers by Using Group Policy Objects

Some examples of commonly used user rights, and the policies that they configure, are:

• Add workstations to domain. Determines which users or groups can add workstations to the domain.

• Allow log on locally. Determines which users can sign in to the computer.

• Allow log on through Remote Desktop Services. Determines which users or groups have permission to
sign in by using Remote Desktop Services Client.

• Back up files and directories. Determines which users have permissions to back up files and folders on
a computer.
• Change the system time. Determines which users or groups have the rights to change the time and
date on the internal clock of the computer.

• Force shutdown from a remote system. Determines which users are allowed to shut down a computer
from a remote location on the network.

• Shut down the system. Determines which of the users who are signed in to a computer locally are
allowed to shut down the computer.

Configuring Security Options


You also can use Group Policy to access and
configure security options. The computer security
settings that you can configure in Security Options
include:
• Administrator and Guest account names

• Access to CD/DVD drives


• Digital data signatures
• Driver installation behavior

• Logon prompts
• UAC
You can configure settings for Security Options by accessing the following location from the GPMC:

• Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies


\Security Options
Commonly used Security Options include:

• Prompt user to change password before expiration. Determines how many days before a user’s
password will expire that the operating system provides a warning.

• Interactive logon: Do not display last user name. Determines whether the name of the last user to sign
in to the computer is displayed in the Windows logon window.

• Interactive logon: Specify a message that will be displayed when users are logging on. A common
message is a warning that the system is for private and authorized use only and that all attempts to
use the system are monitored.

• Accounts: Rename administrator account. Determines whether a different account name is associated
with the security identifier (SID) for the administrator account.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-9

Configuring User Account Control


Administrative accounts carry with them a higher
degree of security risk. When an administrative
account is signed in, its privileges allow access to
the entire Windows operating system, including
the registry, system files, and configuration
settings. As long as an administrative account is
signed in, the system is vulnerable to attack and
can be compromised.

UAC is a security feature that helps prevent


unauthorized changes to a computer. It does
this by asking the user for permission or for
administrator credentials before performing
actions that could affect the computer’s operation or that could change settings that affect multiple users.

By default, both standard users and administrators run applications and access resources in the security
context of a standard user. The UAC prompt provides a way for a user to elevate his or her status from a
standard user account to an administrator account without signing out, switching users, or running an
application by using different credentials. Therefore, UAC creates a more secure environment in which to
run and install applications.

When an application requires administrator level permission, UAC notifies the user as follows:
• If the user is an administrator, the user confirms this to elevate his or her permission level and
continue. This process of requesting approval is known as Admin Approval Mode.

Note: Since Windows Server 2008, the built-in Administrator account does not run in
Admin Approval Mode. The result is that no UAC prompts are displayed when using the local
Administrator account.

• If the user is not an administrator, then the user needs to enter a username and password for an
account that has administrative permissions. Providing administrative credentials gives the user
administrative privileges temporarily, but only to complete the current task. After the task is
complete, permissions revert to those of a standard user.

When you are using this process of notification and elevation to administrator account privileges, you
cannot make changes to the computer without the user knowing. This is because a prompt asks the user
for permission or for administrator credentials. This can help prevent malware and spyware from being
installed on or making changes to a computer.
UAC allows system-level changes to occur without prompting, even when a user is signed in as a local
user, including the:

• Installation of updates from Windows Update.

• Installation of drivers from Windows Update or those that are packaged with the operating system.

• Viewing of Windows operating-system settings.

• Pairing of Bluetooth devices with the computer.

• Resetting of the network adapter, and performance of other network diagnostic and repair tasks.
MCT USE ONLY. STUDENT USE PROHIBITED
12-10 Securing Windows Servers by Using Group Policy Objects

Modifying UAC Behavior


You can modify the UAC notification experience to adjust the frequency and behavior of UAC prompts. To
modify UAC behavior on a single computer, access the Windows Server 2012 control panel in System and
Security.

You can configure settings for UAC by accessing the following location from the GPMC:

• Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies


\Security Options

The following are examples of some GPO settings that you can configure for UAC:

• User Account Control: Run all administrators in Admin Approval Mode. Controls the behavior of all
UAC policy settings for the computer. If this setting is disabled, UAC will not run on this computer.

• User Account Control: Administrator Approval Mode for the built-in Administrator account. When
you enable this setting, the built-in Administrator account uses Admin Approval Mode.

• User Account Control: Detect application installations and prompt for elevation. This setting controls
the behavior of application installation detection for the computer.

• User Account Control: Elevate only executables that are signed and validated. When you enable this
setting, a Public Key Infrastructure (PKI) check is performed on the executable file to verify that it
originates from a trusted source. If the file is verified, then the file is permitted to run.

Note: By default, UAC is not configured or enabled in Server Core installations of Windows
Server 2012.

Configuring Security Auditing


Typically, one of the components of an
organization’s security strategy is recording
user activities. The activities may include
successful or unsuccessful attempts to access
business-critical data that is stored in different
folders, or successful or unsuccessful sign-in
attempts on different servers. Recording these
security-related events is called security auditing.
Security auditing adds entries to the Security
Event Log that you can then view in the Event
Viewer.
Information in security event logs can help your
organization audit their compliance with important business-related and security-related goals by
tracking precisely defined activities. These activities include:

• An administrator who modified settings or data on servers that contain highly confidential
information.

• An employee within a defined group that has accessed an important folder containing data from
different departments.

• A user who is trying to sign in to his or her account repeatedly without success from an internal
company computer. You might find that the employee who owns that user account was on a vacation
that week, which means some other employee was trying to sign in with a different user account.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-11

You can configure settings for Security Auditing by accessing the following location from the GPMC:

• Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy

GPO settings that you can configure for auditing include:

• Audit account logon events. Determines whether the operating system audits each time the
computer validates an account’s credentials.

• Audit accounting management. Determines whether to audit each event of account management,
such as creating, changing, renaming, or deleting a user account, changing a password, or enabling
or disabling a user account.

• Audit object access. Determines whether operating system audits have access to objects outside
of AD DS, such as folders or files. Before configuring audit settings with Group Policy, you must
configure system access control lists (SACLs) on folders or files. This enables auditing for a specific
type of action, such as write, read, or modify.

• Audit system events. Determines whether the operating system audits system-related events, such as
attempting to change the system time, attempting a system startup or shutdown, or the security log
size exceeding a configurable threshold warning.

When working with security auditing, be aware of the following concerns:


• Configuring Windows Server 2012 to audit activities generates a large amount of data that is difficult
to analyze.
• A large amount of data might cause servers or domain controllers to run out of disk space because
the Security Event Log can become very large. Recording a large amount of data also can cause poor
performance on legacy servers.
Since the release of Windows 7 and Windows Server 2008 R2, Group Policy includes advanced audit-
policy configuration options. Advanced auditing policies provide very detailed auditing options, which
provide administrators with more control over the specific tasks that are audited. For more details on
advanced auditing, refer to “Course 20411C: Administering Windows Server 2012”.

Additional Reading: For more information about security auditing, refer to "What’s New in
Security Auditing" at http://go.microsoft.com/fwlink/?LinkID=266747.

Configuring Restricted Groups


In some cases, you may want to control the
membership of certain groups in a domain, such
as the local administrators group, to prevent other
user accounts from being added to those groups.

You can use the Restricted Groups policy to


control group membership by using either of
the following methods:

• You can specify which members are added to


a group.

If you choose this option, then when you


define a Restricted Groups policy, and refresh
Group Policy, all current members remain and the members that the policy defines are added to the
existing membership.
MCT USE ONLY. STUDENT USE PROHIBITED
12-12 Securing Windows Servers by Using Group Policy Objects

• You can specify which members make up the total membership of a group.

If you choose this option, then when you define a Restricted Groups policy, and refresh Group Policy,
any current member of a group that is not on the Restricted Groups policy members list is removed.
This includes default members, such as the Domain Admins group.
Although you can control domain groups by assigning Restricted Groups policies to domain controllers,
you should use this setting to configure membership of critical groups only, such as for Enterprise Admins
and Schema Admins.

Be aware that using Restricted Groups policies for domain-based groups is not supported officially, and
there are important considerations to think about before doing so.

Additional Reading: For more information about Restricted Groups policies, refer to
"Description of Group Policy Restricted Groups" at
http://go.microsoft.com/fwlink/?LinkID=392101.

You also can use Restricted Groups policies to control the membership of built-in local groups on
workstations and member servers. For example, you can place the Helpdesk group into the local
Administrators group on all workstations.

You cannot specify local users in a domain GPO. Local users who are currently in the local group that the
Restricted Groups policy controls will be removed, depending on the Restricted Groups policy option that
you choose. The only exception to this is that the local Administrators account is always in the local
Administrators group.
You can configure settings for Restricted Groups by accessing the following location from the GPMC:

• Computer Configuration\Policies\Windows Settings\Security Settings\Restricted Groups

Configuring Account Policy Settings


You can help protect your organization’s accounts
and data by implementing account policies that
reduce the threat of brute force attacks, which
are attacks by malicious users who try to guess
usernames and passwords. You can implement
account password policies that control the
complexity and lifetime of user passwords to
ensure that users use strong passwords.
Additionally, you can implement account lockout
policies that block automated brute force attacks
by controlling the number and frequency of failed
logon attempts.

Account Policies
Account policy components include password policies, account lockout policies, and Kerberos policies.
The policy settings under Account policies are implemented at the domain level. A Windows Server 2012
domain can have multiple password and account lockout policies, which are called fine-grained password
policies. You can apply these multiple policies to a user or to a global security group in a domain, but not
to an OU.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-13

Note: If you need to apply a fine-grained password policy to users of an OU, you can use a
shadow group. This is a global security group that maps logically to an OU.

You can configure settings for Account policies by accessing the following location from the GPMC:

• Computer Configuration\Policies\Windows Settings\Security Settings\Account Policies

Password Policy
The following table lists password policies that you can configure.

Policy Function Best practice

Password must meet Requires passwords to: Enable this setting. These complexity
complexity requirements can help ensure a strong
• Be at least as long as specified by
requirements password. Strong passwords are more
the Minimum Password Length,
difficult to decrypt than those
with a minimum of three
containing simple letters or numbers.
characters if the Minimum
Password Length is set to 0. Instruct users to use pass phrases to
create long passwords that are easy to
• Contain a combination of at least remember.
three of the following types of
characters: uppercase letters,
lowercase letters, numbers, and
symbols (punctuation marks).
• Must not contain the user’s user
name or screen name.

Enforce password Prevents users from creating a new Remembering more passwords
history password that is the same as their ensures better security. The default
current password or a recently used value is 24. Enforcing password history
password. ensures that passwords that are
If the number of remembered compromised are not used repeatedly.
passwords is set to 1, then only the
last password is remembered. If the
number is set to 5, then the last five
are remembered.

Maximum password Sets the maximum number of days The default value is 42 days. Setting
age that a password is valid. After this the number of days too high provides
number of days, the user must hackers with an extended window of
change the password. opportunity to crack or brute force the
password. Setting the number of days
too low frustrates users who have to
change their passwords too frequently,
and could result in more frequent calls
to the IT help desk.
MCT USE ONLY. STUDENT USE PROHIBITED
12-14 Securing Windows Servers by Using Group Policy Objects

Policy Function Best practice

Minimum password Sets the minimum number of days Set the minimum password age to at
age that must pass before a password least one day. By doing so, you require
can be changed. that the user can change their
password only once a day. This helps
enforce other settings.
For example, if the past five passwords
are remembered, this ensures that at
least five days must pass before the
user can reuse the original password. If
the minimum password age is set to 0,
the user can change their password six
times on the same day and begin
reusing the original password on the
same day.

Minimum password Specifies the fewest number of Set the length to between eight and
length characters that a password can have. 12 characters, provided that they also
meet complexity requirements. A
longer password is more difficult to
crack than a shorter password,
assuming the password is not a
common word.

Store passwords by Provides support for applications Do not use this setting unless you use
using reversible that need to know a user password an application that requires it.
encryption for authentication purposes. Enabling this setting decreases the
security of stored passwords.

Account Lockout Policy


The following table lists the account lockout policies that you can configure.

Policy Function Best practice

Account lockout Specifies the number of failed A setting of 5 allows for reasonable user error,
threshold login attempts that are allowed and limits malicious login attempts. Note that a
before the account is locked. low threshold can make it easier for a denial of
For example, if the threshold is service attack on user objects to occur,
set to 3, the account is locked especially from the Internet. Because of this,
out after a user enters some organizations are beginning to use a
incorrect login information higher threshold.
three times.

Account lockout Allows you to specify a After the threshold is reached and the account
duration timeframe, in minutes, after is locked out, the account should remain locked
which the account unlocks long enough to block or deter any potential
automatically and resumes attacks, but short enough not to interfere with
normal operation. If you productivity for legitimate users. A duration of
specify 0, then the account is 30 to 90 minutes works well in most situations.
locked indefinitely until an
administrator unlocks it
manually.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-15

Policy Function Best practice

Reset account Defines a timeframe for Using a timeframe between 30 and 60 minutes
lockout counter counting the incorrect login is usually sufficient to deter automated attacks
after attempts. If the policy is set for and manual attempts by an attacker to guess a
one hour, and the account password.
lockout threshold is set for
three attempts, a user can
enter the incorrect login
information three times within
one hour. If they enter
incorrect information twice,
but get it correct the third
time, the counter resets after
one hour has elapsed (from
the first incorrect entry) so that
future failed attempts will
again start counting at one.

Kerberos Policy
This policy is for domain user accounts, and determines Kerberos-related settings, such as ticket lifetimes
and enforcement. Kerberos policies do not exist in Local Computer Policy.

What Is Security Compliance Manager?

Overview
Security Compliance Manager is a free tool from
Microsoft that helps administrators secure
computers whether the computers reside locally,
remotely, or in the cloud. Security Compliance
Manager is a Microsoft Solution Accelerator,
currently in version 3.0, which automates some of
the administrative tasks of helping to secure
computers. Security Compliance Manager works
as a stand-alone tool, or you can enhance it by
combining it with System Center 2012 R2
Configuration Manager.

What does Security Compliance Manager do?


The main features of Security Compliance Manager include:

• Baselines. Baselines are based on Microsoft security guides and best practices, and provide a
foundation from which to deploy new settings. The baseline settings are specific to an operating
system version, a specific product version, or a specific component, and they can be downloaded or
imported into Security Compliance Manager in the form of .cab files as new ones become available.
You can use the Security Compliance Manager interface to view the settings, to compare the
imported baselines to your existing settings, or to compare the imported baselines to default settings.
You can customize the baseline settings and then export them as a GPO backup.
MCT USE ONLY. STUDENT USE PROHIBITED
12-16 Securing Windows Servers by Using Group Policy Objects

• Security guides. The security guides are Microsoft guides for the major operating system versions and
product versions. They contain instructions and recommendations to help secure your environment.
Security Compliance Manager includes guides for Windows 7® Service Pack 1 (SP1), Internet
Explorer® 10, Microsoft Exchange Server, and Windows Server 2012.

• Support for deploying policies to stand-alone computers. In addition to automating the deployment
of settings for domain-joined computers by using Group Policy, Security Compliance Manager helps
reduce the administrative overhead of securing computers that are not domain members.
• Support for importing backups of existing GPOs. You can import existing backed-up GPOs into
Security Compliance Manager for comparison with the baselines, and then customize the settings
before exporting the new settings to a GPO backup.

Using Security Compliance Manager


The main uses of Security Compliance Manager include:

• Maintaining and reporting on compliance. Many organizations adhere to specific industry or


government regulations, and must submit to periodic compliance tests. You can use Security
Compliance Manager to validate that computers are configured for compliance, especially when you
use it in combination with the desired configuration management feature that is part of System
Center 2012 R2 Configuration Manager. You use the desired configuration management feature to
gather compliance information, and then you export a baseline from Security Compliance Manager,
and use it in System Center 2012 R2 Configuration Manager.
• Configuring computers for compliance or security policies. You can use Security Compliance Manager
to reduce the work that you perform when configuring computers for compliance or security policies.
You can export a GPO from Security Compliance Manager, and then link it to the appropriate
containers in AD DS.

• Maintaining settings across two independent environments. You can import multiple GPOs into
Security Compliance Manager, and then use them for comparing and/or merging settings across
environments. This is useful when your organization has a production environment and a
development environment, or multiple iterations of each environment.
• Learning about Microsoft recommended security settings. The built-in security guides are in-depth
and product-specific. They contain pertinent information and recommendations that will help an
organization understand risks and mitigation. You can use these guides to formulate or update
security policies and ensure that IT teams have the security knowledge to deploy and maintain the
environments successfully.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-17

Requirements for Security Compliance Manager 3.0


You can install Security Compliance Manager on a Windows client operating system or on a Windows
server operating system. Security Compliance Manager 3.0 has several installation prerequisites, including
that you have:

• Microsoft Visual C++ 2010 x86. The installer comes prepackaged with Security Compliance
Manager 3.0. If it is not installed on the destination computer, the Security Compliance Manager
installer prompts to install it.
• Microsoft SQL Server 2008 (including Express edition) or newer installed on the destination computer.
If you do not have SQL installed, the Security Compliance Manager installer installs Microsoft SQL
Server 2008 Express.

• Microsoft Word and Microsoft Excel®. Some supporting materials and guides require that you have
Word and Excel installed, although Security Compliance Manager does not specifically require either.
In the case of text documents, WordPad, which installs with the Windows operating system, can
suffice. However, users can save all of the documents elsewhere, and then open them from another
computer that has Word and Excel installed.
MCT USE ONLY. STUDENT USE PROHIBITED
12-18 Securing Windows Servers by Using Group Policy Objects

Lab A: Increasing Security for Server Resources


Scenario
Your manager has given you some security-related settings that need to be implemented on all
member servers. You also need to implement file system auditing for a file share used by the
Marketing department. Finally, you need to implement auditing for domain logons.

Objectives
After completing this lab, you should be able to:

• Use Group Policy to secure member servers.


• Audit who is accessing specific files.

• Audit domain logons.

Lab Setup
Estimated Time: 50 minutes

Virtual machines 20410D-LON-DC1


20410D-LON-SVR1
20410D-LON-SVR2
20410D-LON-CL1

User name Adatum\Administrator

Password Pa$$w0rd

For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:
1. On the host computer, start Hyper-V Manager.

2. In Hyper-V® Manager, click 20410D-LON-DC1, and then in the Actions pane, click Start.
3. In the Actions pane, click Connect.

Wait until the virtual machine starts.

4. Sign in by using the following credentials:

o User name: Adatum\Administrator

o Password: Pa$$w0rd

5. Repeat steps 2 through 4 for 20410D-LON-SVR1 and 20410D-LON-SVR2.

6. Repeat steps 2 and 3 for 20410D-LON-CL1. Do not sign in to LON-CL1 until directed to do so.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-19

Exercise 1: Using Group Policy to Secure Member Servers


Scenario
A. Datum Corporation uses the Computer Administrators group to provide administrators with
permissions to administer member servers. As part of the installation process for a new server, the
Computer Administrators group from the domain is added to the local Administrators group on the
new server. Recently, this important step was missed when configuring several new member servers.

To ensure that the Computer Administrators group is always given permission to manage member servers,
your manager has asked you to create a GPO that sets the membership of the local Administrators group
on member servers to include Computer Server Administrators. This GPO also needs to enable Admin
Approval Mode for UAC.

The main tasks for this exercise are as follows:

1. Create a Member Servers organizational unit (OU) and move servers into it.

2. Create a Server Administrators group.

3. Create a Member Server Security Settings Group Policy Object (GPO) and link it to the Member
Servers OU.

4. Configure group membership for local administrators to include Server Administrators and Domain
Admins.
5. Verify that Computer Administrators has been added to the local Administrators group.
6. Modify the Member Server Security Settings GPO to remove Users from Allow Log On Locally.

7. Modify the Member Server Security Settings GPO to enable User Account Control: Admin Approval
Mode for the Built-in Administrator account.

8. Verify that a nonadministrative user cannot sign in to a member server.

 Task 1: Create a Member Servers organizational unit (OU) and move servers into it
1. On LON-DC1, open Active Directory Users and Computers.
2. Create a new OU named Member Servers OU.

3. Move servers LON-SVR1 and LON-SVR2 to Member Servers OU.

 Task 2: Create a Server Administrators group


• On LON-DC1, in Member Servers OU, create a new global security group called Server
Administrators.

 Task 3: Create a Member Server Security Settings Group Policy Object (GPO) and link
it to the Member Servers OU
1. On LON-DC1, open the Group Policy Management Console.

2. In the Group Policy Management Console, in the Group Policy Objects container, create a new GPO
with a name Member Server Security Settings.
3. In the Group Policy Management Console, link the Member Server Security Settings to Member
Servers OU.
MCT USE ONLY. STUDENT USE PROHIBITED
12-20 Securing Windows Servers by Using Group Policy Objects

 Task 4: Configure group membership for local administrators to include Server


Administrators and Domain Admins
1. On LON-DC1, for the Default Domain Policy, open the Group Policy Management Editor window.

2. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Restricted Groups.
3. Add the Server Administrators and Domain Admins groups to the Administrators group.

4. Close the Group Policy Management Editor window.

 Task 5: Verify that Computer Administrators has been added to the local
Administrators group
1. Switch to LON-SVR1.

2. Open Windows PowerShell®, and at the Windows PowerShell prompt, type following command:

Gpupdate /force

3. Open Server Manager, open the Computer Management console, and then expand Local Users and
Groups.
4. Confirm that the Administrators group contains both ADATUM\Domain Admins and
ADATUM\Server Administrators as members.

5. Close the Computer Management console.

 Task 6: Modify the Member Server Security Settings GPO to remove Users from
Allow Log On Locally
1. On LON-DC1, in the Group Policy Management Console, edit the Member Server Security Settings
GPO.

2. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Local Policies\User Rights Assignment.
3. Configure Allow log on locally for Domain Admins and Administrators security groups.

 Task 7: Modify the Member Server Security Settings GPO to enable User Account
Control: Admin Approval Mode for the Built-in Administrator account
1. On LON-DC1, in the Group Policy Management Editor window, go to Computer Configuration
\Policies\Windows Settings\Security Settings\Local Policies\Security Options.
2. Enable User Account Control: Admin Approval Mode for the Built-in Administrator account.

3. Close the Group Policy Management Editor window.

 Task 8: Verify that a nonadministrative user cannot sign in to a member server


1. Switch to LON-SVR1.
2. Open a Windows PowerShell window, and at the Windows PowerShell prompt, type following
command:

Gpupdate /force

3. Sign out from LON-SVR1.


4. Try to sign in to LON-SVR1 as Adatum\Adam with the password Pa$$w0rd.

Verify that you cannot sign in to LON-SVR1.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-21

5. To prepare for the next exercise, sign out of LON-SVR1, and then sign back in to LON-SVR1 as
Adatum\Administrator with the password Pa$$w0rd.

Results: After completing this exercise, you will have used Group Policy to secure member servers.

Exercise 2: Auditing File System Access


Scenario
The manager of the Marketing department has concerns that there is no way to track who is accessing
files that are on the departmental file share. Your manager has explained that only users with permissions
are allowed to access the files. However, the manager of the Marketing department wants to try recording
who is accessing specific files.

Your manager has asked you to enable auditing for the file system that is on the Marketing department
file share, and to review the results with the manager of the Marketing department.
The main tasks for this exercise are as follows:

1. Modify the Member Server Security Settings GPO to enable object access auditing.

2. Create and share a folder.


3. Enable auditing on the Marketing folder for Domain Users.

4. Create a new file in the file share from LON-CL1.

5. View the results in the security log on the domain controller.

 Task 1: Modify the Member Server Security Settings GPO to enable object access
auditing
1. Switch to LON-DC1.
2. In the Group Policy Management Console, edit the Member Server Security Settings GPO.

3. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Local Policies\Audit Policy.
4. Enable Audit object access with both Success and Failure settings.

5. Sign out of LON-DC1.

 Task 2: Create and share a folder


1. Switch to LON-SVR1.
2. On LON-SVR1, on drive C, create a new folder with the name Marketing.

3. Configure the Marketing folder with Read/Write sharing permissions for user Adam.

 Task 3: Enable auditing on the Marketing folder for Domain Users


1. On LON-SVR1, in the Local Disk (C:) window, configure auditing on the Marketing folder, with the
following settings:

o Select a principal: Domain Users

o Type: All
o Permission: Read & execute, List folder content, Read, Write

o Leave other settings with their default values


MCT USE ONLY. STUDENT USE PROHIBITED
12-22 Securing Windows Servers by Using Group Policy Objects

2. Refresh Group Policy by typing the following command at the Windows PowerShell prompt:

gpupdate /force

 Task 4: Create a new file in the file share from LON-CL1


1. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.

2. Open the Command Prompt window, and then type the following command:

gpupdate /force

3. Close the Command Prompt window.

4. Sign out from LON-CL1, and then sign in again as Adatum\Adam with the password Pa$$w0rd.

5. Open the Marketing folder on LON-SVR1, by using the following Universal Naming Convention
(UNC) path: \\LON-SVR1\Marketing.

6. Create a text document with a name Employees.

7. Sign out from LON-CL1.

 Task 5: View the results in the security log on the domain controller
1. Switch to LON-SVR1, and then start Event Viewer.
2. In the Event Viewer window, expand Windows Logs, and then open Security.

3. Verify that following event and information is displayed:


o Source: Microsoft Windows Security Auditing
o Event ID: 4663

o Task category: File System


o An attempt was made to access an object

Results: After completing this exercise, you will have enabled file system access auditing.

Exercise 3: Auditing Domain Logons


Scenario
After a security review, the IT policy committee has decided to begin tracking all user logons to the
domain. Your manager has asked you to enable auditing of domain logons and verify that they are
working.

The main tasks for this exercise are as follows:

1. Modify the Default Domain Policy GPO.

2. Run gpupdate.

3. Sign in to LON-CL1 with an incorrect password.

4. Review event logs on LON-DC1.

5. Sign in to LON-CL1 with the correct password.

6. Review event logs on LON-DC1.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-23

 Task 1: Modify the Default Domain Policy GPO


1. Sign in to LON-DC1 as Adatum\Administrator with the password Pa$$w0rd.

2. On LON-DC1, start Server Manager, and then from Server Manager, start GPMC.

3. On LON-DC1, in the Group Policy Management Console, edit the Default Domain Policy GPO.

4. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Local Policies\Audit Policy.

5. Enable Audit account logon events with both Success and Failure settings.
6. Update Group Policy by using the gpupdate /force command.

 Task 2: Run gpupdate


1. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.

2. Open the Command Prompt window, and then type the following command:

gpupdate /force

3. Close the Command Prompt window, and then sign out from LON-CL1.

 Task 3: Sign in to LON-CL1 with an incorrect password


• Sign in to LON-CL1 as Adatum\Adam with the password password.

This password is intentionally incorrect to generate a security-log entry that shows that an
unsuccessful sign-in attempt has been made.

 Task 4: Review event logs on LON-DC1


1. On LON-DC1, start Event Viewer.

2. In the Event Viewer window, expand Windows Logs, and then click Security.
3. Review the event logs for the following message: "Event ID 4771 Kerberos pre-authentication failed.
Account Information: Security ID: ADATUM\Adam”.

 Task 5: Sign in to LON-CL1 with the correct password


1. Sign in to LON-CL1 as Adatum\Adam with the password Pa$$w0rd.

This password is correct, and you should be able to sign in successfully as Adam.

2. Sign out of LON-CL1.

 Task 6: Review event logs on LON-DC1


1. On LON-DC1, start Event Viewer.

2. In the Event Viewer window, expand Windows Logs, and then click Security.
3. Review the event logs for the following message: “Event ID 4624 An account was successfully logged
on. New Logon: Security ID: ADATUM\Adam”.

Results: After completing this exercise, you will have enabled domain logon auditing.
MCT USE ONLY. STUDENT USE PROHIBITED
12-24 Securing Windows Servers by Using Group Policy Objects

Lab Review Questions


Question: What happens if you configure the Computer Administrators group, but not the
Domain Admins group, to be a member of the Local Administrators group on all of a
domain’s computers?

Question: Why do you need to restrict local logon to some computers?

Question: What happens when an unauthorized user tries to access a folder that has
auditing enabled for both successful and unsuccessful access attempts?

Question: What happens when you configure auditing for domain logons for both
successful and unsuccessful logon attempts?

 Prepare for the next lab


• To prepare for the next lab, leave the virtual machines running.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-25

Lesson 3
Restricting Software
Users need to have access to the applications that help them do their jobs. However, unnecessary or
unwanted applications often get installed on client computers, whether unintentionally or for malicious
or nonbusiness purposes. Unsupported or unused software is not maintained or secured by the
administrators, and could be used as an entry point for attackers to gain unauthorized access or spread
computer viruses. Consequently, it is of the utmost importance for you to ensure that only necessary
software is installed on all the computers in your organization. It is also vital that you prevent software
that is not allowed or is no longer used or supported from running on any computers in your
organization.

Lesson Objectives
After completing this lesson, you should be able to:

• Explain how to use software restriction policies (SRPs) to restrict unauthorized software from running
on servers and clients.

• Describe the purpose of AppLocker®.

• Describe AppLocker rules and how to use them to restrict unauthorized software from running on
servers and clients.

• Describe how to create AppLocker rules.

What Are Software Restriction Policies?


Introduced in the Windows XP operating system
and the Windows Server 2003 operating system,
SRPs give administrators tools that they can use
to identify and specify which applications can run
on client computers. You configure and deploy
SRP settings to clients by using Group Policy.

Windows Server 2012 uses SRPs to provide


Windows Vista® compatibility. An SRP set is
made up of rules and security levels.

Rules
Rules govern how SRP responds to an application
that is being run or installed. Rules are the key constructs within an SRP, and a group of rules together
determines how an SRP responds to applications that are being run. Rules can be based on one of the
following criteria that apply to the primary executable file for the application in question:

• Hash. A cryptographic fingerprint of the file.


• Certificate. A software publisher certificate that is used to sign a file digitally.

• Path. The local or Universal Naming Convention (UNC) path to where the file is stored.

• Zone. The Internet zone.


MCT USE ONLY. STUDENT USE PROHIBITED
12-26 Securing Windows Servers by Using Group Policy Objects

Security Levels
Each applied SRP is assigned a security level that governs the way that the operating system reacts when
the application that is specified in the rule is run. The three available security levels include:

• Disallowed. The software identified in the rule will not run, regardless of the access rights of the user.
• Basic User. Allows the software identified in the rule to run as a standard, nonadministrative user.

• Unrestricted. Allows the software identified in the rule to run unrestricted by SRP.

Using these three settings, there are two primary ways to use SRPs:
• If an administrator has a comprehensive list of all the software that is allowed to run on clients, the
Default Security Level can be set to Disallowed. All applications that are allowed to run can be
identified in SRP rules that apply either the Basic User or Unrestricted security level to each individual
application, depending on the security requirements.

• If an administrator does not have a comprehensive list of the software that is allowed to run on
clients, the Default Security Level can be set to Unrestricted or Basic User, depending on security
requirements. All applications that are not allowed to run can then be identified in SRP rules, which
would use a security level setting of Disallowed.

You can configure settings for SRPs by accessing the following location from the GPMC:
• Computer Configuration\Policies\Windows Settings\Security Settings\Software Restriction Policies

What Is AppLocker?
AppLocker, which was introduced in the
Windows 7 operating system and Windows
Server 2008 R2, is a security setting feature
that controls which applications users are
allowed to run.
AppLocker provides administrators several
methods with which they can quickly and
concisely determine the identity of applications
that they may want to restrict, or to which they
may want to permit access. You apply AppLocker
through Group Policy to computer objects within
an OU. You also can apply Individual AppLocker
rules to individual AD DS users or groups.

AppLocker also contains options for monitoring or auditing the application of rules. AppLocker can help
organizations prevent unlicensed or malicious software from running, and can selectively restrict ActiveX®
controls from being installed. It also can reduce the total cost of ownership by ensuring that workstations
are standardized across the enterprise, and that users are running only the software and applications that
are approved by the enterprise.
By using AppLocker technology, companies can reduce administrative overhead and help administrators
control how users can access and use files, such as .exe files, scripts, Windows Installer files (.msi and .msp
files), dynamic-link libraries (DLLs), and packaged applications, such as Windows Store apps.

You can use AppLocker to restrict software that:

• Is not allowed to be used in the company. For example, software that can disrupt employees’ business
productivity, such as social networking software, or software that streams video files or pictures that
can use large amounts of network bandwidth and disk space.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-27

• Is no longer used or it has been replaced with a newer version. For example, software that is no
longer maintained, or for which licenses have expired.

• Is no longer supported in the company. Software that is not updated with security updates might
pose a security risk.
• Should be used only by specific departments.

You can configure settings for AppLocker by accessing the following location from the GPMC:

• Computer Configuration\Policies\Windows Settings\Security Settings\Application Control Policies

Note: AppLocker uses the Application Identity service to verify a file’s attributes. You
should configure this service to start automatically on each computer where AppLocker will be
applied. If the Application Identity service is not running, then AppLocker policies are not
enforced.

Additional Reading: For more information about AppLocker, refer to "AppLocker


overview" at http://go.microsoft.com/fwlink/?LinkID=266745.

AppLocker Rules
AppLocker defines rules based on file attributes
that are derived from the digital signature of the
file. File attributes in the digital signature include:
• Publisher name

• Product name

• File name
• File version

Default Configuration
By default, no AppLocker policies are defined. This
means that no applications are blocked. However,
you can configure default rules for each rule collection to ensure that applications in the Program Files
and Windows directories are allowed to run, and all applications are allowed to run for the Administrators
group. You should enable the default rules if you are going to implement AppLocker policies, because
these applications are necessary for Windows operating systems to run and operate normally.

Allow and Deny Rule Actions


Allow and Deny are rule actions that allow or deny execution of applications based on a list of
applications that you configure. The Allow action on rules limits execution of applications to an allowed
list of applications, and blocks everything else. The Deny action on rules takes the opposite approach and
allows the execution of any application except those on a list of denied applications. These actions also
provide a means to identify exceptions to those actions.
MCT USE ONLY. STUDENT USE PROHIBITED
12-28 Securing Windows Servers by Using Group Policy Objects

Enforce or Audit Only


When AppLocker policy is set to Enforce, rules are enforced and all events are audited. When AppLocker
policy is set to Audit Only, rules are evaluated and events are written to the AppLocker Log, but no
enforcement takes place. By using the Audit Only setting, administrators can gather information about
applications that are being run, understand which applications will not run when enforcement is used,
and see the ramifications of AppLocker enforcement on the end users.

Demonstration: Creating AppLocker Rules


In this demonstration, you will see how to:

• Create a GPO to enforce the default AppLocker Executable rules.


• Apply the GPO to the domain.

• Test the AppLocker rule.

Demonstration Steps
Create a GPO to enforce the default AppLocker Executable rules
1. On LON-DC1, open the Group Policy Management Console.
2. Create a new GPO named WordPad Restriction Policy.

3. Edit the WordPad Restriction Policy’s Security Settings by using AppLocker to create a new
Executable Rule.
4. Set the permission of the new rule to Deny, the condition to Publisher, and then select
wordpad.exe. If prompted, click OK to create default rules.

5. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Application Control Policies\AppLocker.
6. In AppLocker, configure enforcement with Enforce rules.

7. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\System Services.

8. Configure Application Identity Properties with Define this policy setting, and Select service
startup mode with Automatic.

Apply the GPO to the domain


1. In the Group Policy Management Console, apply the WordPad Restriction Policy GPO to the
Adatum.com domain.

2. Open the Command Prompt window, type gpupdate /force, and then press Enter.

Test the AppLocker rule


1. Sign in to LON-CL1 as Adatum\Alan with the password Pa$$w0rd.

2. In the Command Prompt window, type gpupdate /force, and then press Enter.
Wait for the policy to update.

3. Attempt to start WordPad, and verify that WordPad does not start.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-29

Lesson 4
Configuring Windows Firewall with Advanced Security
Windows Firewall with Advanced Security is an important tool for enhancing the security of Windows
Server 2012. This snap-in helps to prevent several different security issues such as port scanning or
malware. Windows Firewall with Advanced Security has multiple firewall profiles, each of which applies
unique settings to different types of networks. You can configure Windows Firewall rules on each server
manually, or use Group Policy to configure the rules centrally.

Lesson Objectives
After completing this lesson, you should be able to:

• Describe the features of Windows Firewall with Advanced Security.


• Explain why a host-based firewall is important.

• Describe Firewall Profiles.

• Describe connection security rules.


• Explain how to deploy Windows Firewall rules.

• Secure network traffic by using Windows Firewall.

What Is Windows Firewall with Advanced Security?


Windows Firewall is a host-based firewall that is
included in Windows Server 2012. This snap-in
runs on the local computer and restricts network
access to and from that computer.

Unlike a perimeter firewall, which provides


protection only from threats on the Internet, a
host-based firewall provides protection from
threats wherever they originate. For example,
Windows Firewall protects a host from a threat
within the local area network (LAN).

Inbound and Outbound Rules


Inbound rules control communication that another device or computer on the network initiates with the
host computer. By default, all inbound communication is blocked, except the traffic that is allowed
explicitly by an inbound rule.

Outbound rules control communication that is initiated by the host computer, and is destined for a device
or computer on the network. By default, all outbound communication is allowed except the traffic that is
explicitly blocked by an outbound rule. If you choose to block all outbound communication except the
traffic that is explicitly allowed, you must carefully catalog the software that is allowed to run on that
computer and the network communication required by that software.

You can create inbound and outbound rules based on User Datagram Protocol (UDP) and TCP ports, as
well as other protocols. You also can create inbound and outbound rules that allow a specific executable
network access, regardless of the port number that is being used.
MCT USE ONLY. STUDENT USE PROHIBITED
12-30 Securing Windows Servers by Using Group Policy Objects

Connection Security Rules


You use Connection Security Rules to configure IPsec for Windows Server 2012. When you configure these
rules, you can authenticate communication between computers, and then use that information to create
firewall rules based on specific user and computer accounts.

Additional Configuration Options


Windows Firewall with Advanced Security is a Microsoft Management Consoles (MMC) snap-in that allows
you to perform advanced configuration of Windows Firewall.

Windows Firewall in Windows 8 and Windows Server 2012 provides the following features:

• Supports filtering for both incoming and outgoing traffic

• Integrates firewall filtering and IPsec protection settings

• Enables you to configure rules to control network traffic

• Provides network location-aware profiles

• Enables you to import or export policies


You can configure settings for Windows Firewall on each computer individually, or by accessing the
following location from the GPMC:
• Computer Configuration\Policies\Windows Settings\Security Settings
\Windows Firewall with Advanced Security

Note: Windows Server 2012 introduces the additional option for administering Windows
Firewall by using the Windows PowerShell command-line interface.

Discussion: Why Is a Host-Based Firewall Important?


Review the discussion question and participate in
a discussion to identify the benefits of using a
host-based firewall, such as Windows Firewall with
Advanced Security.
Question: Why is it important to use a host-
based firewall, such as Windows Firewall with
Advanced Security?
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-31

Firewall Profiles
Windows Firewall with Advanced Security
uses firewall profiles to provide a consistent
configuration for networks of a specific type, and
allows you to define a network as either a domain
network, a public network, or a private network.

You can define a configuration set for each type


of network when you use Windows Firewall with
Advanced Security. Each configuration set is a
firewall profile. Firewall rules are activated only
for specific firewall profiles.

The following table lists the Windows Firewall with


Advanced security profiles.

Profile Description

Public Use when you are connected to an untrusted public network.


Other than domain networks, all networks are categorized as Public. By default,
Windows Vista, Windows 7, and Windows 8 use the Public profile, which is the most
restrictive.

Private Use when you are connected behind a firewall.


A network is categorized as private only if an administrator or a program identifies the
network as private. Networks marked as Home or Work in Windows Vista, Windows 7,
and Windows 8 are added to the Private profile.

Domain Use when your computer is part of a Windows operating system domain.
Windows operating systems automatically identify networks on which it can authenticate
access to the domain controller. The Domain profile is assigned to these networks, and
this setting cannot be changed. No other networks can be placed in this category.

Windows Server 2012 allows multiple firewall profiles to be active on a server simultaneously. This means
that a multi-homed server that is connected to both the internal network and the perimeter network can
apply the domain firewall profile to the internal network, and the public or private firewall profile to the
perimeter network.

Connection Security Rules


A connection security rule forces authentication
between two peer computers before they can
establish a connection and transmit secure
information. They also secure that traffic by
encrypting the data that is transmitted between
computers. Windows Firewall with Advanced
Security uses IPsec to enforce these rules.
MCT USE ONLY. STUDENT USE PROHIBITED
12-32 Securing Windows Servers by Using Group Policy Objects

The configurable connection security rules are:

• Isolation. An isolation rule isolates computers by restricting connections that are based on credentials
such as domain membership or health status. Isolation rules allow you to implement an isolation
strategy for servers or domains.
• Authentication Exemption. You can use an authentication exemption to designate connections that
do not require authentication. You can designate computers by a specific IP address, an IP address
range, a subnet, or a predefined group such as a gateway.

• Server-to-Server. A server-to-server rule protects connections between specific computers. This type
of rule usually protects connections between servers. When creating the rule, specify the network
endpoints between which communications are protected. Then designate requirements and the
authentication that you want to use.

• Tunnel. With a tunnel rule, you can protect connections between gateway computers. Typically, you
use a tunnel rule when connecting across the Internet between two security gateways.
• Custom. Use a custom rule to authenticate connections between two endpoints when you cannot set
up authentication rules that you need by using the other rules available in the new Connection
Security Rule Wizard.

How Firewall Rules and Connection Security Rules Work Together


Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec,
you can create connection security rules. However, connection security rules do not allow traffic through a
firewall. You must create a firewall rule to do this. Connection security rules are not applied to programs
and services. Instead, they are applied between the computers that make up the two endpoints.

Deploying Firewall Rules


How you deploy Windows Firewall rules is
an important consideration. Choosing the
appropriate method ensures that rules are
deployed accurately and with minimum effort.
You can deploy Windows Firewall rules:

• Manually. You can configure firewall rules


individually on each server. However, in an
environment with more than a few servers,
this is labor intensive and prone to error.
Typically, you use this method only during
testing and troubleshooting.

• By using Group Policy. This is the preferred


way to distribute firewall rules. By using Group Policy, you can create and test a GPO with the
required firewall rules, and then deploy the firewall rules quickly and accurately to a large number
of computers.

• By exporting and importing firewall rules. You have the option to import and export firewall rules
when you use Windows Firewall with Advanced Security. For example when you are troubleshooting,
you can export firewall rules to create a backup before you configure them manually.

Note: When you import firewall rules, they are treated as a complete set, and replace all
currently-configured firewall rules.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-33

Demonstration: Implementing secured network traffic with Windows


Firewall
In this demonstration, you will see how to:

• Check to see if Internet Control Message Protocol (ICMP) v4 is blocked.


• Enable ICMP v4 from LON-CL2 to LON-SVR2.

• Create a connection security rule that authenticates traffic to the destination host.

• Validate ICMP v4 after the connection security rule is in place.

Demonstration Steps
Check to see if ICMP v4 is blocked
1. Sign in to LON-CL2 as Adatum\Administrator with the password Pa$$w0rd.

2. On LON-CL2, ping 10.10.0.11, and then notice that the ping times out.

Enable ICMP v4 from LON-CL2 to LON-SVR2


1. Sign in to LON-SVR2 as Adatum\Administrator with the password Pa$$w0rd.
2. On LON-SVR2, create a firewall rule to allow ICMPv4 from LON-CL2.

3. On LON-CL2, ping 10.10.0.11.

Notice that the ping goes through successfully.

Create a connection security rule


• On LON-SVR2, create an isolation-based connection security rule to authentication inbound traffic
and request authentication for outbound traffic.

Validate ICMP v4
• On LON-CL2, ping 10.10.0.11.

Notice that the ping goes through successfully.


MCT USE ONLY. STUDENT USE PROHIBITED
12-34 Securing Windows Servers by Using Group Policy Objects

Lab B: Configuring AppLocker and Windows Firewall


Scenario
Your manager has asked you to implement AppLocker to restrict nonstandard applications from running.
He also has asked you to create new Windows Firewall rules for any member servers running web-based
applications.

Objectives
After completing this lab, you should be able to:

• Configure AppLocker Policies.


• Configure Windows Firewall.

Lab Setup
Estimated Time: 60 minutes

Virtual machines 20410D-LON-DC1


20410D-LON-SVR1
20410D-LON-CL1

User name Adatum\Administrator

Password Pa$$w0rd

For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:
1. On the host computer, start Hyper-V Manager.

2. In Hyper-V Manager, click 20410D-LON-DC1, and then in the Actions pane, click Connect.
Wait until the virtual machine starts.
3. If needed, sign in by using the following credentials:

o User name: Adatum\Administrator

o Password: Pa$$w0rd
4. Repeat steps 2 and 3 for 20410D-LON-SVR1 and 20410D-LON-CL1.

Exercise 1: Configuring AppLocker Policies


Scenario
Your manager has asked you to configure new AppLocker policies to control the use of applications on
user desktops. The new configuration should allow applications to be run only from approved locations.
All users must be able to run applications from C:\Windows and C:\Program Files.

You also need to add an exception to run a custom-developed application that resides in a nonstandard
location.

The first stage of the implementation records from which locations applications are being run now. The
second stage of implementation prevents unauthorized applications from running.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-35

The main tasks for this exercise are as follows:

1. Create an OU for client computers.

2. Move LON-CL1 to the Client Computers OU.

3. Create a Software Control GPO and link it to the Client Computers OU.

4. Run gpupdate.

5. Run app1.bat in the C:\CustomApp folder.

6. View AppLocker events in an event log.

7. Create a rule that allows software to run from a specific location.

8. Modify the Software Control GPO to enforce rules.

9. Verify that an application can still be run.

10. Verify that an application cannot be run.

 Task 1: Create an OU for client computers


1. Switch to LON-DC1.
2. Open Active Directory Users and Computers.

3. Create new OU called Client Computers.

 Task 2: Move LON-CL1 to the Client Computers OU


• On LON-DC1, in Active Directory Users and Computers, move LON-CL1 to the Client
Computers OU.

 Task 3: Create a Software Control GPO and link it to the Client Computers OU
1. On LON-DC1, open the Group Policy Management Console.

2. In the Group Policy Management Console, in the Group Policy Objects container, create a new GPO
named Software Control.

3. For the Software Control GPO, open the Group Policy Management Editor window.

4. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Application Control Policies\AppLocker.

5. Create default rules for the following:

o Executable Rules
o Windows Installer Rules

o Script Rules

o Packaged app Rules

6. Configure rule enforcement with the Audit only option for the following:
o Executable Rules

o Windows Installer Rules

o Script Rules

o Packaged app Rules

7. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings.
MCT USE ONLY. STUDENT USE PROHIBITED
12-36 Securing Windows Servers by Using Group Policy Objects

8. Click System Services, and then double-click Application Identity.

9. In the Application Identity Properties dialog box, click Define this policy setting.

10. Under Select service startup mode, click Automatic, and then click OK.

11. Close the Group Policy Management Editor window.


12. In the Group Policy Management Console, link the Software Control GPO to the Client Computers
OU.

 Task 4: Run gpupdate


1. Switch to LON-CL1.

2. Open the Command Prompt window, and then type the following command:

gpupdate /force

3. Close the Command Prompt window, and then restart LON-CL1.

 Task 5: Run app1.bat in the C:\CustomApp folder


1. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.
2. At the command prompt, type the following command, and then press Enter:

gpresult /R

Review the result of the command, and ensure that Software Control is displayed under Computer
Settings, Applied Group Policy Objects.
3. If Software Control is not displayed, restart LON-CL1, and then repeat steps 1 and 2.

4. At the command prompt, type the following command, and then press Enter:

C:\CustomApp\app1.bat

 Task 6: View AppLocker events in an event log


1. On LON-CL1, start Event Viewer.
2. In the Event Viewer window, browse to Application and Services Logs\Microsoft\Windows
\AppLocker, and then review the events.

3. Click MSI and Scripts, and then review event log 8005 that contains the following text:
%OSDRIVE%\CUSTOMAPP\APP1.BAT was allowed to run.

If no events are displayed, ensure that the Application Identity service has started, and then try again.

 Task 7: Create a rule that allows software to run from a specific location
1. On LON-DC1, edit the Software Control GPO.
2. In the Group Policy Management Editor window, go to Computer Configuration\Policies
\Windows Settings\Security Settings\Application Control Policies\AppLocker.

3. Create a new script rule with the following configuration:


o Permissions: Allow

o Conditions: Path

o Path: %OSDRIVE%\CustomApp\app1.bat
o Name and Description: Custom Application Rule
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-37

 Task 8: Modify the Software Control GPO to enforce rules


1. Use the Enforce rules option to configure rule enforcement for the following:

o Executable Rules

o Windows Installer Rules

o Script Rules

o Packaged app Rules

2. Close the Group Policy Management Editor window.

 Task 9: Verify that an application can still be run


1. Switch to LON-CL1.

2. Open the Command Prompt window, and then type the following command:

gpupdate /force

3. Close the Command Prompt window, and then restart LON-CL1.


4. Sign in to LON-CL1 as Adatum\Tony with the password Pa$$w0rd.

5. Open the Command Prompt window, and then verify that you can run the app1.bat application,
which is located in the C:\CustomApp folder.

 Task 10: Verify that an application cannot be run


1. On LON-CL1, from the CustomApp folder, copy app1.bat to the Documents folder.
2. Verify that application cannot be run from the Documents folder, and that the following message
appears: “This program is blocked by Group Policy. For more information, contact your system
administrator.”

Results: After completing this exercise, you will have configured AppLocker policies for all users whose
computer accounts are located in the Client Computers OU. The policies you configured should allow
these users to run applications that are located in the folders C:\Windows and C:\Program Files, and run
the custom-developed application app1.bat in the C:\CustomApp folder.

Exercise 2: Configuring Windows Firewall


Scenario
Your manager has asked you to configure Windows Firewall rules for a set of new application servers.
These application servers have a web-based program that is listening on a nonstandard port. You need to
configure Windows Firewall to allow network communication through this port. You will use security
filtering to ensure that the new Windows Firewall rules apply only to the application servers.

The main tasks for this exercise are as follows:


1. Create a group named Application Servers.

2. Add LON-SVR1 as a group member.

3. Create a new Application Servers GPO.


4. Link the Application Servers GPO to the Member Servers OU.

5. Use security filtering to limit the Application Server GPO to members of Application Server group.
MCT USE ONLY. STUDENT USE PROHIBITED
12-38 Securing Windows Servers by Using Group Policy Objects

6. Run gpupdate on LON-SVR1.

7. View the firewall rules on LON-SVR1.

 Task 1: Create a group named Application Servers


• On LON-DC1, in Active Directory Users and Computers, in the Member Servers OU, create a new
global security group named Application Servers.

 Task 2: Add LON-SVR1 as a group member


• In Active Directory Users and Computers, in the Member Servers OU, open Application Servers
Properties, and then add LON-SVR1 as a group member.

 Task 3: Create a new Application Servers GPO


1. On LON-DC1, open the Group Policy Management Console.

2. In the Group Policy Management Console, in the Group Policy Objects container, create a new GPO
named Application Servers GPO.
3. In the Group Policy Management Editor window, go to Computer Configuration\Policies
\Windows Settings\Security Settings\Windows Firewall with Advanced Security
\Windows Firewall with Advanced Security - LDAP://CN={GUID}.
4. Configure an inbound rule with the following settings:

o Rule Type: Custom

o Protocol type: TCP

o Local port: Specific Ports - 8080

o Scope: Any IP address

o Action: Allow the connection

o Profile: Domain (clear both the Private and Public check boxes)
o Name: Application Server Department Firewall Rule

5. Close the Group Policy Management Editor window.

 Task 4: Link the Application Servers GPO to the Member Servers OU


• In the Group Policy Management Console, link the Application Servers GPO to the Member
Servers OU.

 Task 5: Use security filtering to limit the Application Server GPO to members of
Application Server group
1. On LON-DC1, open the Group Policy Management Console.

2. Expand the Member Servers OU, and then click Application Servers GPO.
3. In the right-hand pane, under Security Filtering, remove Authenticated Users, and then configure
Application Servers GPO to apply only to the Application Servers security group.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-39

 Task 6: Run gpupdate on LON-SVR1


1. Switch to LON-SVR1.

2. Open the Command Prompt window, and then type the following command:

gpupdate /force

3. Close the Command Prompt window.

4. Restart LON-SVR1, and then sign back in as Adatum\Administrator with the password Pa$$w0rd.

 Task 7: View the firewall rules on LON-SVR1


1. Switch to LON-SVR1.

2. Start Windows Firewall with Advanced Security.


3. In the Windows Firewall with Advanced Security window, in Inbound rules, verify that the
Application Server Department Firewall Rule that you created earlier by using Group Policy is
configured.

4. Verify that you cannot edit the Application Server Department Firewall Rule, because it is
configured through Group Policy.

Results: After completing this exercise, you will have used Group Policy to configure Windows Firewall
with Advanced Security to create rules for application servers.

Lab Review Questions


Question: You configured an AppLocker rule that prevents users from running software in
a specified file path. How can you prevent users from moving the folder containing the
software so that they can circumvent the rule and still run it?

Question: You want to introduce a new application that needs to use specific ports. What
information do you need to configure Windows Firewall with Advanced Security, and from
what source can you get it?

 Prepare for the next module


When you finish the lab, revert the virtual machines to their initial state by performing the following steps:

1. On the host computer, start Hyper-V Manager.


2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.

3. In the Revert Virtual Machine dialog box, click Revert.

4. Repeat steps 2 and 3 for 20410D-LON-SVR1 and 20410D-LON-CL1.


MCT USE ONLY. STUDENT USE PROHIBITED
12-40 Securing Windows Servers by Using Group Policy Objects

Module Review and Takeaways


Review Questions
Question: Does the defense-in-depth model prescribe specific technologies that you should
use to protect Windows Server operating system servers?

Question: What setting must you configure to ensure that users are allowed only three
invalid sign-in attempts?
Question: You are creating a GPO with standardized firewall rules for the servers in your
organization. You tested the rules on a stand-alone server in your test lab. The rules appear
on the servers after the GPO is applied, but they are not taking effect. What is the most likely
cause of this problem?

Question: Last year, your organization developed a security strategy that included all aspects
of a defense-in-depth model. Based on that strategy, your organization implemented
security settings and policies on the entire IT infrastructure environment. Yesterday, you read
in an article that new security threats were detected on the Internet, but now you realize that
your company strategy does not include a risk analysis and mitigation plan for those new
threats. What should you do?

Best Practices
The following are best practices:
• Always make a detailed security risk assessment before planning which security features your
organization should deploy.

• Create a separate GPO for security settings that apply to different type of users in your organization,
because each department might have different security needs.

• Ensure that the security settings that you configure are reasonably easy to use so that employees
accept them. Frequently, very strong security policies are too complex or difficult for employees to
adopt.

• Always test security configurations that you plan to implement with a GPO in an isolated,
nonproduction environment. Only deploy policies in your production environment after you
complete this testing successfully.

Common Issues and Troubleshooting Tips


Common Issue Troubleshooting Tip

The user cannot sign in locally to a


server.

After configuring auditing, there are


too many events logged in the
Security Event Log in Event Viewer.

Some users complain that their


business applications can no longer
access resources on the server.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 12-41

Tools
Tool Used for Where to find it

Group Policy A graphical tool that you use Server Manager\Tools


Management to create, edit, and apply
Console GPOs

AppLocker Applies security settings that Group Policy Management Editor snap-in
control which applications
users are allowed to run

Windows A host-based firewall that is Server Manager\Tools if configured individually,


Firewall with included as a feature in or Group Policy Management Editor snap-in for
Advanced Windows Server 2008 and deploying with Group Policy
Security newer versions

Security Deploying security policies Download from the Microsoft website at


Compliance based on Microsoft Security http://go.microsoft.com/fwlink/?LinkID=266746
Manager Guide recommendations
and industry best practices
MCT USE ONLY. STUDENT USE PROHIBITED
MCT USE ONLY. STUDENT USE PROHIBITED
13-1

Module 13
Implementing Server Virtualization with Hyper-V
Contents:
Module Overview 13-1

Lesson 1: Overview of Virtualization Technologies 13-2

Lesson 2: Implementing Hyper-V 13-8


Lesson 3: Managing Virtual Machine Storage 13-19

Lesson 4: Managing Virtual Networks 13-27


Lab: Implementing Server Virtualization with Hyper-V 13-33
Module Review and Takeaways 13-39

Module Overview
Server virtualization has been a part of the Windows Server® operating system since the release of
Windows Server 2008 and the introduction of the Hyper-V® role. By using server virtualization, your
organization can save money through server consolidation. However, to use server virtualization more
efficiently, server administrators need to be able to decide which server workloads will run effectively in
virtual machines, and which server workloads must remain deployed in a more traditional server
environment.

This module introduces you to the Hyper-V role in Windows Server 2012 and Windows Server 2012 R2,
the components of the role, how best to deploy the role, and the new features of the Hyper-V role that
Windows Server 2012 and Windows Server 2012 R2 introduce.

Objectives
After completing this module, you should be able to:

• Describe virtualization technologies.

• Implement Hyper-V.

• Manage virtual machine storage.

• Manage virtual networks.


MCT USE ONLY. STUDENT USE PROHIBITED
13-2 Implementing Server Virtualization with Hyper-V

Lesson 1
Overview of Virtualization Technologies
You can deploy many different types of virtualization technologies on networks where Windows®
operating systems are deployed. The types of virtualization technologies that you select depend on what
your organization needs to accomplish. Although this module focuses primarily on server virtualization, in
this lesson, you will learn about other types of virtualization technologies, and the situations in which it is
appropriate to deploy them.

Lesson Objectives
After completing this lesson, you should be able to:

• Describe server virtualization using Hyper-V.


• Describe Windows Azure™.
• Explain when you would use desktop virtualization.

• Determine the components required to implement presentation virtualization.

• Explain the advantages of using Microsoft application virtualization rather than traditional methods
to deploy apps.

Server Virtualization
With server virtualization, you can create separate
virtual machines and run them concurrently on a
single server that is running Hyper-V. These virtual
machines are guests, while the computer that is
running Hyper-V is the virtualization server or the
management operating system.

Virtual machine guests function as normal


computers. When users sign into a guest virtual
machine remotely by using Remote Desktop
Connection (RDC) or a Windows PowerShell®
remote session, you would have to examine
closely the properties of the computer on which
the user is working to determine whether it is a virtual machine or a traditionally deployed physical
machine. Virtual machines that are hosted on the same virtualization server are independent of one
another. You can run multiple virtual machines that are using different operating systems on a
virtualization server simultaneously, provided the virtualization server has enough resources.

Implementing Virtual Machines to Maximize Hardware Usage


You use hardware more efficiently when you implement virtual machines. In most cases, a service or
program does not consume more than a fraction of the virtualization server’s resources. This means that
you can install multiple services and programs on the same virtualization server and then deploy them to
multiple virtual machines. This ensures more effective use of that virtualization server’s resources. For
example, assume that you have four separate services and programs, each of which consumes from 10 to
15 percent of a virtualization server’s hardware resources. You can install these services and programs in
virtual machines, and then place them on the same hardware where, on average, they consume 40 to 60
percent of the virtualization server’s hardware.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-3

This is a simplified example. In real-world environments, you must make adequate preparations before co-
locating virtual machines. You have to ensure that the hardware-resource needs of all the virtual machines
that the virtualization server is hosting do not exceed the server’s hardware resources.

Isolating Services and Programs


Keeping one particular service or program functioning reliably can be challenging and it becomes even
more complicated when you deploy multiple services and programs on the same server. For example, you
might need to deploy two separate operating systems at a branch office, but these operating systems
conflict when running on the same computer. If you can afford only one server then you can solve this
problem by running these programs within virtual machines on the same server.

Consolidating Servers
With server virtualization, you can consolidate servers that would otherwise need to run on separate
hardware onto a single virtualization server. Because each virtual machine on a virtualization server is
isolated from the other virtual machines on the same server, it is possible to deploy services and programs
that are incompatible with one another on the same physical computer, provided that you host them
within virtual machines. Examples of such services and programs include Microsoft® Exchange Server
2013, SQL Server® 2012, and Active Directory® Domain Services (AD DS). This means that an organization
only needs to deploy one physical server in place of the three servers that they would have needed in the
past.

Best Practice: We recommend that you do not deploy a Microsoft Exchange mailbox
server or a SQL Server 2012 database engine instance on a computer that hosts the domain
controller role. Microsoft does support deploying each of these workloads on separate virtual
machines that are running on the same virtual machine host.

Simplifying Server Deployment


Virtualization also enables you to simplify server deployment, because:
• Virtual machine templates for common server configurations are included with products such as
Microsoft System Center 2012 - Virtual Machine Manager (VMM). These templates include
parameters that are preconfigured with common settings, so you do not have to configure the setting
of every parameter manually.

• You can create virtual machine self-service portals that enable end users to provision approved
servers and programs automatically. This lessens the workload of the systems administration team.
You create these virtual machine self-service portals with VMM and Microsoft System Center 2012 -
Service Manager.
MCT USE ONLY. STUDENT USE PROHIBITED
13-4 Implementing Server Virtualization with Hyper-V

What Is Windows Azure?


Windows Azure is a cloud-based platform on
which you can purchase capacity for virtual
machines, for applications, or for services such as
SQL Server databases on SQL Azure™. One of the
advantages of using Windows Azure is that you
pay only for the capacity that you use, rather than
paying a fixed rate. For example, you may pay a
monthly flat rate to rent a server on a rack at a
hosting provider. However, you likely will pay less
when the server is less busy and you pay more
when the server gets busier.

Cloud-based capacity is elastic, meaning it can


grow or shrink quickly as required. For example, in a traditionally hosted solution, you might choose a
specific server chassis, but then if your need for capacity or performance grows you have to switch to a
bigger class of server hardware. All of this takes time and planning. Similarly, if your need for capacity or
performance decreases, you need to decide whether migrating to a lower class of hardware is worth the
cost, or if your organization should continue to pay for a class of hardware that you do not need right
now, and may or may not need in the future. By using a hosting provider, capacity is scaled automatically
and you do not have to spend the time or money that it takes to switch from one server to another.
Cloud-based virtual machines, programs, and services can be useful when you have to provide proof-of-
concept solutions for proposed projects. Rather than purchase test hardware and deploy a proof-of-
concept solution to it, you can deploy a cloud-based virtual machine quickly, and then deploy the proof-
of-concept solution to that. Then, once you validate the proof-of-concept solution, you can discard the
virtual machine, or keep it, depending on operational concerns. This solution is not only faster, it is less
expensive than buying the hardware for the proof-of-concept solution, which you may opt to discard if
the project is not approved.

Hosting Websites or Production Programs


On cloud-based platforms, such as Windows Azure, you can deploy programs without having to deploy
the underlying server infrastructure. For example, say you require a database. Rather than deploying
Windows Server 2012 and SQL Server 2012, and then deploying the specific database, you can rent the
cloud-based database server, and then host the database there.

For a successful cloud-based strategy, you must determine which services and programs are more
economical to deploy on a cloud-based platform, and which services and programs are more economical
to host in a more traditional server environment on your own premises. Many factors that are unique to
your organization are involved in making this determination, and a strategy that is best for one
organization may not be appropriate for another.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-5

Desktop Virtualization

Client Hyper-V
You can install the Hyper-V role on computers
that are running the Windows 8 Pro, Windows 8
Enterprise Windows 8.1 Pro and Windows 8.1
Enterprise operating systems. This allows you to
run virtual machine guests on client computers.
Client Hyper-V, the Hyper-V feature in Windows 8
and Windows 8.1 operating systems, has slightly
different processor requirements than Hyper-V on
Windows Server 2012 or Windows Server 2012 R2.
Specifically, with the Windows 8 and Windows 8.1
client operating systems, the computer must have an x64 platform that supports Second Level Address
Translation (SLAT), and have a minimum of 4 gigabytes (GB) of random access memory (RAM). This differs
from Hyper-V on Windows Server 2012 and Windows Server 2012 R2, which does not require SLAT.

Client Hyper-V on Windows 8 and Windows 8.1


The Client Hyper-V role on Windows 8 and Windows 8.1 supports many of the features that are available
with Hyper-V on Windows Server 2012. However, it does not support Windows Server 2012 features such
as virtual machine migration. Additionally, Client Hyper-V does not support publishing apps installed on
the virtual machine guest to the management operating system’s Start menu. This was a feature of
Windows XP Mode on Windows 7, which uses Windows Virtual PC. Windows Virtual PC is the client
virtualization feature available to some computers running specific editions of Windows 7.

Client Hyper-V in Enterprise Environments


In enterprise environments, Client Hyper-V is often used for development purposes, or to allow specific
users to run previous versions of the Windows operating system, thereby allowing them to access apps
that are incompatible with Windows 8 or Windows 8.1

Virtual Desktop Infrastructure


In Virtual Desktop Infrastructure (VDI), client operating systems are hosted centrally as virtual machines,
and clients connect to these virtual machines by using client software, such as RDC. You can configure a
server to support VDI by selecting a Remote Desktop Services installation in the Add Roles and Features
Wizard. When you configure a virtualization server to function as a VDI server, you can install the Remote
Desktop Virtualization Host role feature in addition to the Hyper-V role.
VDI can simplify the management of client operating systems by:

• Ensuring regular backups occur for all client computers that are hosted on a single server.

• Hosting the client virtual machines on a highly available virtualization server.


• Ensuring that users can still access their virtual machine by using other RDC methods when a client
computer fails.

You can use VDI to implement a Bring Your Own Device (BYOD) policy. In this scenario, workers bring
their own computer to the office and use RDC software to connect to their assigned virtual machine.
MCT USE ONLY. STUDENT USE PROHIBITED
13-6 Implementing Server Virtualization with Hyper-V

RemoteFX
RemoteFX® is a technology that benefits VDI deployments by providing a set of enhancements to remote
desktop connections. RemoteFX enables virtual machines to display rich graphics and video capabilities,
including media streaming. It also provides support for multi-touch. To use RemoteFX, the Hyper-V host
must have at least one graphics processing unit (GPU) that supports DirectX® 9.0c or newer, and a central
processing unit (CPU) that supports SLAT. If you install multiple GPUs on the Hyper-V host, they must be
identical.

Presentation Virtualization
Presentation virtualization differs from desktop
virtualization in the following ways:

• In desktop virtualization, each user is assigned


their own virtual machine that is running a
client operating system. In presentation
virtualization, users sign in and run separate
sessions on a server or servers. For example,
users Adam and Gavin might be signed in
simultaneously to the same remote desktop
server, yet be running different sessions using
RDC.

• With desktop virtualization, the apps run


within virtual machines. With presentation virtualization, the desktop and the apps run on the
virtualization server.

On networks that use Windows Server 2012, the Remote Desktop Services server role provides
presentation virtualization. Clients can access presentation virtualization in the following ways:
• Full Desktop. Clients can use a remote desktop client, such as RDC, to access a full desktop session
and run programs on the Windows Server 2012 virtualization server.
• RemoteApp programs. Rather than use a full desktop client, such as RDC, the Windows Server feature
RemoteApp makes it possible for programs that run on the Windows Server 2012 server to display on
the client computer.

• Remote Desktop Web Access. Using Remote Desktop Web Access (RD Web Access), clients can access
a website on a specially configured server, and then launch RemoteApp programs and Remote
Desktop sessions from their browser.

Remote Desktop Gateway


Remote Desktop Gateway (RD Gateway) makes it possible for external clients to access Remote Desktop
and RemoteApp without using a virtual private network (VPN) or DirectAccess, a feature of the Windows 7
and Windows 8 operating systems. RD Gateway is a role service that you can install on a computer that is
running Windows Server 2012. You deploy RD Gateway servers on perimeter networks, and then
configure the RDC client with the address of RD Gateway servers. This ensures that the client checks to see
if the target remote desktop server is on the organizational network. If it is, the client makes a direct
connection to it. If the remote desktop server is not on the network, the client routes the connection
through the RD Gateway server.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-7

What Is Microsoft Application Virtualization?


With application virtualization, you do not install
apps permanently on client computers. Instead,
when users want to use apps, apps are deployed
from a server to clients. Microsoft Application
Virtualization (App-V) uses the Microsoft
Application Virtualization Desktop Client, which is
installed on the client. App-V is available as part
of the Microsoft Desktop Optimization Pack, and
is not a native Windows Server 2012 role or
feature.

App-V Features and Benefits


There are three main benefits of App-V:

• App Isolation. App-V isolates the app from the operating system, and runs it in a separate virtual
environment. This means that you can run apps that might be incompatible when run together on
the same computer. For example, you can use App-V to deploy and run different versions of
Microsoft Office Word simultaneously.
• App Streaming. When an app is streamed, only those parts of the app that are being used are
transmitted to the client computer. This speeds up app deployment, because only part of the app
must be transmitted across the network to the client computer.
• App Portability. When you deploy App-V with Microsoft System Center 2012 Configuration Manager,
users can use the same apps on multiple client computers, without requiring a traditional installation
on those client computers. For example, a user can sign in to a colleague’s computer and then have
App-V stream an app to them so that they can use it on that computer. The app is not installed
locally, and when the user signs out, the app is no longer available to other users on that computer.

User Experience Virtualization


Just as App-V allows users to access their apps from different client computers, Microsoft User Experience
Virtualization (UE-V) allows users to have the same operating system and app settings on multiple devices
that are running Windows 7 and Windows 8. For example, say a user configures a setting for an app
delivered through App-V on one computer, such as configuring a custom tab on a ribbon in a Microsoft
Office product. That setting is available automatically when that app is delivered through App-V to
another computer.
MCT USE ONLY. STUDENT USE PROHIBITED
13-8 Implementing Server Virtualization with Hyper-V

Lesson 2
Implementing Hyper-V
Understanding how Hyper-V works and how virtual machines function is critical to deploying server
virtualization effectively in a Windows Server 2012 network environment. This lesson discusses Hyper-V,
and the hardware requirements for deploying Hyper-V on a computer that is running Windows
Server 2012. This lesson also discusses the components of a virtual machine, with an emphasis on the
Dynamic Memory feature, and the benefits of virtual machine integration services. Finally, it discusses how
to measure virtual machine resource use with Windows PowerShell cmdlets.

Lesson Objectives
After completing this lesson, you should be able to:

• Install the Hyper-V role onto a server.


• Describe the appropriate hardware for Hyper-V deployment.

• Describe virtual machine hardware components.


• Configure Dynamic Memory.

• Configure virtual machine integration services.

• Configure virtual machine start and stop actions.


• Perform Hyper-V resource metering tasks.
• Describe the new features of Hyper-V in Windows Server 2012 R2.

What Is Hyper-V?
Hyper-V is the hardware virtualization role that is
available in Windows Server 2012. Hardware
virtualization provides a hypervisor layer that has
direct access to the host server’s hardware. The
host operating system and all virtual machines
that are running on the host access the hardware
through the hypervisor layer. This is in contrast to
software-virtualization products, such as Microsoft
Virtual Server 2005 R2, that use the virtualization
server’s operating system to provide indirect
access to the server’s hardware.

You can deploy Hyper-V to a computer that is


running Windows Server 2012 by using the Add Roles and Features Wizard, and you can configure
Windows Server 2012 as a virtualization server by using the Hyper-V role. Windows Server 2012 then can
host virtual machine guests that are running supported operating systems. You can manage virtual
machine administration locally through Windows PowerShell, or you can manage it remotely through the
Hyper-V Manager console.

You can install the Hyper-V role on the Server Core installation of Windows Server 2012 and in a
nonserver core configuration in Windows Server 2012. There also is a Microsoft Hyper-V Server 2012
edition, which includes only the components necessary to host virtual machines.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-9

Note: In some documentation, a virtualization server is called the parent partition, and a
virtual machine that is running on the server is called the child partition. An example of a
virtualization server is the Windows Server 2012 computer that is running Hyper-V.

Hardware Requirements for Hyper-V


The server on which you plan to install the
Hyper-V role must meet the following hardware
requirements:

• The server must have an x64 platform that


supports hardware-assisted virtualization and
Data Execution Prevention (DEP).

• The server must have enough CPU capacity to


meet the requirements of the guest virtual
machines.
A virtual machine hosted on Hyper-V in Windows
Server 2012 can support up to 64 virtual
processors.

• The server must have enough memory to support all of the virtual machines that must run
concurrently, plus enough memory to run the host Windows Server 2012 operating system:

o The server must have at least 4 GB of RAM.

o A virtual machine hosted on Hyper-V in Windows Server 2012 can support a maximum of
1 terabyte (TB) of RAM.

• The storage subsystem performance must meet the input/output (I/O) needs of the guest virtual
machines. Whether deployed locally or on storage area networks (SANs), you may have to place
different virtual machines on separate physical disks, or you may have to deploy a high performance
redundant array of independent disks (RAID), solid-state drives (SSD), hybrid-SSD, or a combination of
all three.

• The virtualization server’s network adapters must be able to support the network throughput needs
of the guest virtual machines. You can improve network performance by installing multiple network
adapters and using multiple network interface cards.
MCT USE ONLY. STUDENT USE PROHIBITED
13-10 Implementing Server Virtualization with Hyper-V

Virtual Machine Hardware


Virtual machines use virtual, or simulated,
hardware. The management operating system,
Windows Server 2012 with Hyper-V, uses the
virtual hardware to mediate access to actual
hardware. For example, you can map a virtual
network adapter to a virtual network that you
map to an actual network interface.

Virtual machines have the following simulated


hardware, by default, including the:

• BIOS. Simulates the computer’s BIOS. On a


stand-alone computer you can configure
various BIOS-related parameters, and
similarly, on a virtual machine, you can configure some of the same parameters, including:

o The boot order for the virtual machine’s virtual hardware.


o From which device the virtual machine boots, such as from a DVD drive, Integrated Drive
Electronics (IDE), a legacy network adapter, or a floppy disk.
o Whether Num Lock is enabled at boot.

• Memory. You can allocate up 1 TB of memory resources to an individual virtual machine.

• Processor. You can allocate up to 64 virtual processors to a single virtual machine.

• IDE controller 0. A virtual machine can support only two IDE controllers and, by default, two are
allocated to each virtual machine. Each IDE controller can support two devices.

You can connect virtual hard drives or virtual DVD drives to an IDE controller. You can use IDE controllers
to connect virtual hard disks and DVD drives to virtual machines that use any operating system that does
not support integration services.

• IDE controller 1. Enables deployment of additional virtual hard drives and DVD drives to the virtual
machine.

• SCSI controller. You can use a small computer system interface (SCSI) controller only on virtual
machines that have operating systems that support integration services.

• Synthetic network adapter. Synthetic network adapters represent computer network adapters. You
can only use synthetic network adapters with supported virtual machine guest operating systems.

• COM 1. Enables you to configure a connection through a named pipe.


• COM 2. Enables you to configure an additional connection through a named pipe.

• Disk drive. Enables you to map a virtual floppy disk image to a virtual disk drive.

You can add the following hardware to a virtual machine by editing the virtual machine’s properties, and
then clicking Add Hardware:

• SCSI controller. You can add up to four virtual SCSI devices. Each controller supports up to 64 disks.

• Network adapter. A single virtual machine can have a maximum of eight synthetic network adapters.
• Legacy network adapter. You can use legacy network adapters with any operating systems that do
not support integration services. You can also use legacy network adapters to deploy operating
system images throughout the network. A single virtual machine can have up to four legacy network
adapters.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-11

• Fibre Channel adapter. If you add a Fibre Channel adapter to a virtual machine, the virtual machine
can then connect directly to a Fibre Channel SAN. You can only add a Fibre Channel adapter to a
virtual machine if the virtualization server has a Fibre Channel host bus adapter (HBA) that also has a
Windows Server 2012 driver that supports virtual Fibre Channel.

• RemoteFX 3D video adapter. If you add a RemoteFX 3D video adapter to a virtual machine, the virtual
machine can then display high performance graphics by leveraging Microsoft DirectX® and graphics
processing power on the host Windows Server 2012 server.

Additional Reading: For more information about virtual Fibre channel adapters, refer to
“Hyper-V Virtual Fibre Channel Overview” at http://go.microsoft.com/fwlink/?LinkId=269712.

Generation 2 Virtual Machines


Virtual machines work the same way that physical
computers do. Most operating systems and
programs that run in virtual machines are not
aware that they are virtualized. Using emulated
hardware enables operating systems that are not
virtualization-aware to run in virtual machines. In
machines that can run enlightened operating
systems, Integration Services allow the virtual
machines to access synthetic devices, which
perform better. With the broad adoption of
virtualization, many modern operating systems
now include Integration Services.

Windows Server 2012 R2 changes all of this. It fully supports the existing type of virtual machines, and
names them collectively generation 1 virtual machines. It provides support for the new type of virtual
machines, named generation 2 virtual machines. Generation 2 virtual machines function as if the operating
systems installed on them are virtualization-aware. Because of this, generation 2 virtual machines do not
have the legacy and emulated virtual-hardware devices found on generation 1 virtual machines, and use
only synthetic devices. BIOS-based firmware is replaced by advanced Unified Extensible Firmware
Interface (UEFI) firmware, which supports Secure Boot. Generation 2 virtual machines start from a SCSI
controller or by using the Pre-boot Execution Environment (PXE) on a network adapter. All remaining
virtual devices use virtual machine bus (VMBus) to communicate with parent partitions.

Generation 1 and generation 2 virtual machines have similar performance, except during startup and
when you install an operating system. The primary advantage of generation 2 virtual machines is that
startup and deployment are considerably faster. You can run generation 1 and generation 2 virtual
machines side-by-side on the same Hyper-V host.

You select the virtual machine generation at the time you create the virtual machine. You cannot change
the generation later.

Generation 2 virtual machines currently support only Windows Server 2012, Windows 8 (64-bit), and
newer 64-bit Windows operating systems. Therefore, generation 1 virtual machines, which support almost
any operating system, will continue to be used for the foreseeable future. Generation 2 virtual machines
do not currently support RemoteFX.

Additional Reading: For more information about generation 2 virtual machines, refer to
“Generation 2 Virtual Machine Overview” at http://go.microsoft.com/fwlink/?LinkID=392187.
MCT USE ONLY. STUDENT USE PROHIBITED
13-12 Implementing Server Virtualization with Hyper-V

What Is Dynamic Memory?


In the first release of Hyper-V with Windows
Server 2008, you could only assign a static amount
of memory to virtual machines. Unless you took
special precautions to measure the precise
amount of memory that a virtual machine
required, you were likely to either under-allocate
or over-allocate memory.

The Dynamic Memory feature was introduced


with Windows Server 2008 R2 SP1, and it enables
you to:
• Allocate a minimum amount of memory to a
virtual machine.

• Allow the virtual machine to request additional memory as necessary.


• Configure a maximum amount of memory to a virtual machine.
Therefore, by using Dynamic Memory, you no longer have to guess how much memory a virtual machine
requires. Instead, you can configure Hyper-V so that the virtual machine is allocated as much memory as
it needs.

With Windows Server 2012, you can modify some of the Dynamic Memory minimum and maximum
memory values while the virtual machine is running. This was not possible with Windows Server 2008 R2
SP1. You can perform this task from a virtual machine’s Settings dialog box.

Note: Virtual machines must support Hyper-V integration services to use Dynamic Memory.

Smart Paging
Virtual machines may need more memory during startup than they need during normal operation. Smart
Paging, which is a new feature in Windows Server 2012, assigns additional temporary memory to a virtual
machine when you restart it. This means that you can allocate memory based on what the virtual machine
needs when it is operating normally, rather than the amount that it needs during startup. Smart Paging
uses disk paging to assign additional temporary memory to a virtual machine while it is restarting.
However, using Smart Paging may result in lower performance, because it uses disk resources that the
host server and other virtual machines would otherwise use.

Note: You can configure virtual machine memory by using the Set-VMMemory Windows
PowerShell cmdlet.

Additional Reading: For more information about Hyper-V Dynamic Memory, refer to
“Hyper-V Dynamic Memory Overview” at http://go.microsoft.com/fwlink/?LinkId=269713.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-13

Configuring Virtual Machine Integration Services


You must install Virtual Machine Integration
Services if you want to use features such as
operating system shutdown, time synchronization,
and if you want to install virtual hardware
components, such as SCSI adapters and synthetic
network adapters, onto the virtual machines.

Virtual machine guest operating systems that are


supported by Hyper-V and that can use
Integration Services include:

• Windows Server 2012


• Windows Server 2008 R2 with SP1

• Windows Server 2008 with Service Pack 2 (SP2)

• Windows Server 2003 R2 with SP2


• Windows Home Server 2011

• MultiPoint® Server 2012

• Windows Small Business Server 2011


• Windows Server 2003 with SP2

• CentOS 6.0-6.2

• CentOS 5.5-5.7
• Red Hat Enterprise Linux 6.0-6.2

• Red Hat Enterprise Linux 5.5-5.7

• SUSE Linux Enterprise Server 11 with SP1or SP2


• SUSE Linux Enterprise Server 10 with Service Pack 4 (SP4)

• Windows 7 with SP1

• Windows Vista® with SP2


• Windows XP with Service Pack 3 (SP3)

Note: Support for the Windows XP operating system expires in April 2014. Support for
Windows Server 2003 and Windows Server 2003 R2 expires in July 2015.

You can install the Hyper-V integration services components on an operating system by accessing the
Virtual Machine Connection window, and then in the Action menu, clicking the Insert Integration Services
Setup Disk item. You then can install the relevant operating-system drivers, either manually or
automatically, and can enable the following virtual machine integration components:

• Operating system shutdown. Allows the server running Hyper-V to initiate a graceful shutdown of the
guest virtual machine.

• Time synchronization. Allows the virtual machine to use the virtualization server’s processor for the
purpose of time synchronization.
• Data exchange. Allows the server running Hyper-V to write data to the registry of the virtual machine.
MCT USE ONLY. STUDENT USE PROHIBITED
13-14 Implementing Server Virtualization with Hyper-V

• Heartbeat. Allows Hyper-V to determine if the virtual machine has become unresponsive.

• Backup (volume checkpoint). Allows the Volume Shadow Copy Service (VSS) provider to create
checkpoints of the virtual machine for the purposes of backup operation, without interrupting the
virtual machine’s normal operations.

Enhanced Session Mode service


Hyper-V uses the Virtual Machine Connection program to connect to virtual machines by using Remote
Desktop Protocol (RDP). Until Windows Server 2012 R2, Virtual Machine Connection provided only basic
redirection of the virtual machine screen, keyboard, and mouse, similar to how a Keyboard Video Mouse
switch over IP does. Versions of Virtual Machine Connection prior to Windows Server 2012 R2 provided
limited copy-and-paste functionality, supporting copying and pasting text only and no other content,
such as graphics or files. You could configure and use Remote Desktop on a virtual machine, which would
allow you to have a richer experience. However, this required that the virtual machine have network
connectivity and use an available Remote Desktop connection on the virtual machine. Additionally, the
Windows client operating system supports only one Remote Desktop connection.

Windows Server 2012 R2 includes an improved version of Virtual Machine Connection, and provides
support for Enhanced Session Mode. This functionality has specific requirements. For example, the Hyper-
V host policy must allow Enhanced Session Mode, and you can use an enhanced session only with virtual
machines that are running supported operating systems. When using enhanced session mode, you get a
considerably better experience and the same features as Remote Desktop Services (RDS), but without
requiring the virtual machine to have network connectivity or to use the Remote Desktop functionality of
the guest operating system. With enhanced session mode, you can redirect local drives, printers, USB, and
other devices to the virtual machine, and you can use a shared Clipboard, redirected folders, rich copy
and paste for copying files or graphics, and redirected sound from virtual machines.

Because enhanced session mode depends on the presence of RDS in the virtual machine, it is available
only when the virtual machine is running a supported operating system. Currently, the only supported
operating systems are Windows 8.1 and Windows Server 2012 R2.

Enhanced session mode establishes a special Remote Desktop session over VMBus. This special Remote
Desktop session is available to you even when the virtual machine is not connected to the virtual switch,
and when you connect to virtual machines that are running on a local or remote Hyper-V host.

When you use enhanced session mode for connecting to virtual machines, you have access to the entire
Remote Desktop experience. This includes configuring the parameters of a session that you can save for
future connections to the same virtual machine. You can also sign in to the virtual machine in enhanced
session mode, while when you use simple mode, you can connect to the virtual machine without having
to sign in. If the virtual machine is running, you can use enhanced session mode or simple mode to
connect to it. However, if the virtual machine is not on, you can connect to it only by using simple mode.

You configure enhanced session mode at three different levels:

• Hyper-V host level. On the Hyper-V host level, you configure Enhanced Session Mode Policy, which
controls if the Hyper-V host allows enhanced session mode connections to virtual machines that are
running on this server. It is configured in Hyper-V settings.
• User settings level. At the user settings level, you configure enhanced session mode, which controls
whether the Virtual Machine Connection attempts to use enhanced session mode when establishing
connections with virtual machines. It is configured in Hyper-V settings.
• Machine level. On the virtual machine level, you can control whether to enable Guest Services
Integration Service. In other words, you control whether to allow the virtual machine to offer
enhanced session mode. Furthermore, the operating system in a virtual machine must support
enhanced session mode, which means that it must be either Windows 8.1 or Windows Server 2012 R2.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-15

In addition, all users who connect using enhanced session mode must have Remote Desktop
connection permissions. You enable this by editing virtual machine properties.

Configuring Virtual Machine Start and Stop Actions

You can use virtual machine start and stop actions


to ensure that critical virtual machines always start
automatically whenever a server that is running
Hyper-V restarts, and that they are shut down
gracefully if the server receives a shutdown
command. When you configure the virtual
machine start and stop actions, you select the
steps that the server running Hyper-V will perform
on specific virtual machines when the physical
server starts or shuts down. You configure startup
and shutdown settings for each virtual machine by
editing the properties of the virtual machine.

Automatic Start Options


You can configure the following options in the Automatic Start Actions window:
• Nothing. The virtual machine does not start automatically when the server that is running Hyper-V
starts, even if the virtual machine was in a running state when the server shut down.

• Automatically start if it was running when the service stopped. The virtual machine restarts if it was
running when the server that is running Hyper-V received the command to shut down, or if the
virtual machine was running when the server suffered a failure that caused it to power off.
• Always start this virtual machine automatically. The virtual machine always starts when the server that
is running Hyper-V starts. You can configure a startup delay to ensure that multiple virtual machines
do not attempt to start up at once.

Automatic Stop Options


You can configure the following options in the Automatic Stop Actions window:

• Save the virtual machine state. This option saves the active state of the virtual machine to disk,
including memory, when the server receives a shutdown command. This makes it possible for the
virtual machine to restart when the server that is running Hyper-V restarts.

• Turn off the virtual machine. The virtual machine is turned off when the server receives a shutdown
command. Data may be lost when this happens.

• Shut down the guest operating system. The virtual machine is shut down in a graceful manner when
the server receives a shutdown command. This option is available only if integration services
components are installed on the virtual machine.

Note: You can configure virtual machine automatic start and stop actions by using the
Windows PowerShell cmdlet Set-VM with the AutomaticStartAction and
AutomaticStopAction parameters.
MCT USE ONLY. STUDENT USE PROHIBITED
13-16 Implementing Server Virtualization with Hyper-V

Hyper-V Resource Metering


Resource metering allows you to track the
resource use of virtual machines that are hosted
on Windows Server 2012 servers that have the
Hyper-V role installed.

Resource metering provides you with a way to


measure the following parameters on individual
Hyper-V virtual machines:
• Average CPU use.

• Average physical memory use, including:

o Minimum memory use.


o Maximum memory use.

• Maximum disk space allocation.

• Incoming network traffic for a network adapter.


• Outgoing network traffic for a network adapter.

By measuring how much of these resources each virtual machine uses, an organization can bill
departments or customers based on how much resources their virtual machines use, rather than charging
a flat fee per virtual machine. An organization with only internal customers can also use these
measurements to see patterns of use and plan future expansions. You perform resource metering tasks
from a Windows PowerShell command-line interface by using the following cmdlets:
• Enable-VMResourceMetering. Starts collecting data on a per virtual machine basis.

• Disable-VMResourceMetering. Disables resource metering on a per virtual machine basis.

• Reset-VMResourceMetering. Resets virtual machine resource metering counters.


• Measure-VM. Displays resource metering statistics for a specific virtual machine.

Note: There is no graphical user interface (GUI) tool that you can use to perform resource
metering.

Additional Reading: For more information about resource metering for Hyper-V, refer to
“Hyper-V Resource Metering Overview” at http://go.microsoft.com/fwlink/?LinkId=269714.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-17

What’s New with Hyper-V in Windows Server 2012 R2


The Hyper-V role in Windows Server 2012 R2
includes a large number of improvements and
new features that were not available in Windows
Server 2012.

New Features in Windows


Server 2012 R2 Hyper-V
The Hyper-V role in Windows Server 2012 R2
includes a large number of improvements and
new features that were not available in Windows
Server 2012. The following table lists new features
in Windows Server 2012 R2 Hyper-V.

Feature Description

Shared virtual hard disk You can use this feature to cluster virtual machines by using shared
virtual hard disk (.vhdx format) files.

Automatic virtual machine You can configure this feature to activate virtual machines
activation automatically on computers that are running the Datacenter edition
of Windows Server 2012 R2.

Enhanced session mode You can use this feature to provide support for redirection of an
increased number of local resources including audio, printers,
clipboard, display configuration, smart cards, USB devices and
supported Plug and Play devices.

Storage quality of service You can use this feature to specify maximum and minimum I/O loads
in terms of I/O operations per second on a per virtual hard disk basis.

Virtual machine generation You can use this feature to provide support for generation 1 and
generation 2 virtual machines.

Improved features in Windows Server 2012 R2 Hyper-V


The following table lists improved features in Windows Server 2012 R2 Hyper-V.

Feature Improvement

Resize virtual hard disk This feature allows you to resize virtual hard disks while the virtual
machine is running.

Live migration This feature provides improved performance, including compression


of virtual machine RAM and cross-version live migration between
Windows Server 2012 and Windows Server 2012 R2 Hyper-V.

Failover Clustering This feature provides virtual network adapter protection and virtual
machine storage protection.

Integration Services This feature provides the ability to copy files to a virtual machine
without using a network connection or having to shut down the
virtual machine.

Export This feature allows you to export a virtual machine with all
checkpoints or a single virtual machine checkpoint while the virtual
MCT USE ONLY. STUDENT USE PROHIBITED
13-18 Implementing Server Virtualization with Hyper-V

Feature Improvement
machine is running.

Replica This feature supports extended replication and configurable


replication frequency.

Linux support This feature provides support for Linux virtual machine backup and for
VMs running Linux to support dynamic memory.

Management This feature provides support for managing Hyper-V on Windows


Server 2012 R2 from computers running Windows® 8 or Windows
Server 2012.

Additional Reading: For more information, refer to “What’s New in Hyper-V in Windows
Server 2012 R2” at http://go.microsoft.com/fwlink/?LinkID=331078.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-19

Lesson 3
Managing Virtual Machine Storage
Hyper-V provides many different virtual machine storage options. By knowing which option is appropriate
for a given situation, you can help ensure that a virtual machine performs well. However, if you do not
understand the different virtual machine storage options, you may end up deploying virtual hard disks
that consume unnecessary space, or that place an unnecessary performance burden on the virtualization
server.

In this lesson, you will learn about different virtual hard disk types, different virtual hard disk formats, and
the benefits and limitations of using virtual machine checkpoints.

Lesson Objectives
After completing this lesson, you should be able to:

• Describe the purpose of virtual hard disk.

• Explain how to create a virtual hard disk type.

• Explain how to manage virtual hard disks.


• Explain how to deploy differencing virtual hard disks to reduce storage needs.

• Explain how to use virtual machine checkpoints.

What Is a Virtual Hard Disk?


A virtual hard disk is a file that represents a
traditional hard disk drive that you can configure
as a virtual hard disk with partitions and an
operating system. You can use virtual hard disks
on virtual machines, and you can mount virtual
hard disks as local volumes using the Windows
Server 2008 R2, Windows Server 2012, and
Windows 8, and Windows 7 operating systems.
Windows Server 2012 supports boot from virtual
hard disk. This enables you to configure a
computer to boot into a Windows Server 2012
operating system that is deployed on a virtual
hard disk, or into certain editions of the Windows 8 operating system that are deployed on a virtual hard
disk. You can create a virtual hard disk by using:

• The Hyper-V Manager console.

• The Disk Management console.

• The DiskPart (diskpart.exe) command-line tool.


• The Windows PowerShell cmdlet New-VHD.

Note: Some editions of Windows 7 and Windows Server 2008 R2 also support booting
from virtual hard disk.
MCT USE ONLY. STUDENT USE PROHIBITED
13-20 Implementing Server Virtualization with Hyper-V

Virtual Hard Disks in .vhd Format vs. Virtual Hard Disks in .vhdx Format
Virtual hard disks traditionally use the .vhd extension. Windows Server 2012 introduces a new type of
virtual hard disk which uses the .vhdx extension. Virtual hard disks with the .vhdx format have the
following benefits over virtual hard disks that were used in Hyper-V on Windows Server 2008 and
Windows Server 2008 R2:

• Virtual hard disks with the .vhdx format can be as large as 64 TB, whereas virtual hard disks with the
.vhd format are limited to 2 TB.
• Virtual hard disks with the .vhdx format are less likely to become corrupt if the virtualization server
suffers an unexpected power outage.

• The .vhdx format supports better alignment when deployed to a large sector disk.

• Virtual hard disks with the .vhdx format can hold larger dynamic and differencing virtual hard disks.
This provides for better performance from the dynamic and differencing virtual hard disks.

You can convert a virtual hard disk with the .vhd format to the .vhdx format by using the Edit Virtual Hard
Disk Wizard; you may want to do this if you have upgraded a Windows Server 2008 or Windows Server
2008 R2 virtualization server to Windows Server 2012 or Windows Server 2012 R2. You can also convert a
virtual hard disk with the .vhdx format to the .vhd format.

SMB Share Support


Windows Server 2012 supports storing all virtual machine files, including virtual hard disks on Server
Message Block (SMB) 3.0 file shares. This is an alternative to storing these files on Internet SCSI (iSCSI) or
Fibre Channel SAN devices. When creating a virtual machine in Hyper-V on Windows Server 2012, you can
specify a network share when you choose the virtual hard disk location or when you attach an existing
virtual hard disk. The file share must support SMB 3.0. This means that you must place virtual hard disks
on file shares that are hosted on file servers with Windows Server 2012. Older versions of Windows Server
do not support SMB 3.0.

Additional Reading: For more information about virtual hard disk formats, refer to
“Hyper-V Virtual Hard Disk Format Overview” at http://go.microsoft.com/fwlink/?LinkId=269715.

IDE vs. SCSI Adapters

You can connect virtual hard disks to virtual machines by using two different virtual storage-controller
types: IDE or SCSI. When you connect a virtual machine to an IDE controller, the virtual disk is accessed as
an Advanced Technology Attachment (ATA) device. When you connect it to a SCSI controller, the virtual
disk is accessed as a SCSI device. The following table describes the difference between the two options.

IDE controllers SCSI controllers

• Available only in generation 1 virtual machines. • Available in both generation 1 and generation
2 virtual machines.
• A virtual machine can have two IDE controllers.
• A virtual machine can have up to 4 SCSI
• Each IDE controller supports a maximum of two
controllers.
connected IDE devices (disks or virtual DVD
drives). • Each SCSI controller supports up to 64 attached
devices.
• You cannot add or remove devices from an IDE
controller when a virtual machine is running. • Can add or remove SCSI devices while a virtual
machine is running.
• Generation 1 virtual machines can boot locally
only off a device that is connected to an IDE • Generation 2 virtual machines can boot only off
controller. a device that is attached to a SCSI controller.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-21

Although there are differences in performance when you use an IDE or SCSI controller in a host virtual
machine, these differences are not apparent when you use virtualized IDE or SCSI controllers.

Shared Virtual Hard Disks with Windows Server 2012 R2


Windows Server 2012 R2 allows you to configure shared virtual hard disks. A shared virtual hard disk is a
virtual hard disk that connects to multiple virtual machines. You can use shared virtual hard disks only for
hard disks that are in .vhdx format and that connect to virtual SCSI controllers. Shared virtual hard disk
files are stored on failover clusters, either on a Cluster Shared Volume (CSV) on block storage or on an
SMB 3.0 scale-out file server.

QoS Management
Virtual hard disks in Windows Server 2012 R2 support the configuration of quality of service (QoS)
parameters. When you configure the QoS parameters, you can specify the maximum number of
input/output operations (IOPS) for the virtual disk, which minimizes the chance that a single virtual hard
disk will consume the majority of the IOPS capacity of the underlying storage. You also can configure a
virtual hard disk to trigger an alert if the number of IOPS falls below a threshold value. IOPS are measured
in 8-kilobyte (KB) increments. You cannot configure storage QoS when you are using shared virtual hard
disks.
Additional Reading:

• For more information about virtual hard disk sharing, refer to


http://go.microsoft.com/fwlink/?LinkID=331079.

• For more information about the storage quality of service for Hyper-V, see refer to
http://go.microsoft.com/fwlink/?LinkID=331080.

Creating Virtual Disk Types


When you configure a virtual hard disk, you can
choose between several different disk types,
including fixed, dynamic, and direct-attached
storage.

Creating Fixed Virtual Hard Disks


When you create fixed virtual hard disks, all of the
hard disk space that you specify is allocated
during the creation process. This minimizes
fragmentation, which improves virtual hard disk
performance if the disk is on a traditional storage
device, such as a nonsolid-state device. Allocating
all of the specified hard disk space during the
creation process does have a disadvantage. In many situations, you do not know precisely how much disk
space a virtual machine needs, and you might allocate space that is not required.

Note: Disk fragmentation is less of an issue when you host virtual hard disks on RAID
volumes or on SSDs. Hyper-V improvements since its introduction in Windows Server 2008 also
minimize the performance differences between dynamic and fixed virtual hard disks.
MCT USE ONLY. STUDENT USE PROHIBITED
13-22 Implementing Server Virtualization with Hyper-V

To create a fixed virtual hard disk, perform the following procedure:

1. Open the Hyper-V Manager console.

2. On the Actions pane, click New, and then click Hard Disk.

3. On the Before You Begin page of the New Virtual Hard Disk Wizard, click Next.

4. In the New Virtual Hard Disk Wizard, on the Choose Disk Format page, click either VHD or VHDX,
and then click Next.
5. On the Choose Disk Type page, click Fixed size, and then click Next.

6. On the Specify Name and Location page, enter a name for the virtual hard disk, and then specify a
folder in which to host the virtual hard disk file.

7. On the Configure Disk page, choose one of the following options:


o Create a new blank virtual hard disk of the specified size.

o Copy the contents of a specified physical disk. Use this option to replicate an existing physical
disk on the server as a virtual hard disk. The fixed virtual hard disk will be the same size as the
physical disk. Replicating an existing physical hard disk does not change the data on that disk.

o Copy the contents of a specified virtual hard disk. With this option, you can create a new
fixed hard disk based on the contents of an existing virtual hard disk.

Note: You can create a new fixed hard disk by using the New-VHD Windows PowerShell
cmdlet, with the -Fixed parameter.

Dynamically Expanding Virtual Hard Disks


When you create a dynamically expanding virtual hard disks, you specify a maximum size, but the disk
uses only the space that it needs and grows as necessary. You can create a dynamically expanding virtual
hard disk with the .vhd format or the .vhdx format. A new dynamically expanding virtual hard disk with
the .vhd format is allocated approximately 260 KB. A new dynamically expanding virtual hard disk with
the .vhdx format is allocated approximately 4,096 KB.

As you save files to a dynamically expanding virtual hard disk, it grows. However, if you delete files from a
dynamically expanding virtual hard disk, it does not shrink. The only method you can use to shrink a
dynamically expanding virtual hard disk file is to perform a compact operation.

To create a dynamically expanding virtual hard disk, you follow the steps for creating a fixed virtual hard
disk shown above, with the exception that, on the Choose Disk Type page (in step 5), you click
Dynamically Expanding instead of Fixed Size.

Note: You can create a new dynamic hard disk using the New-VHD Windows PowerShell
cmdlet with the -Dynamic parameter.

Direct-attached Storage
Virtual machines can access a physical disk drive by using direct-attached storage, also termed pass-
through disks. You can use direct-attached storage to connect a virtual machine directly to an iSCSI logical
unit number (LUN). When you use direct-attached storage, the virtual machine must have exclusive access
to the target disk. To ensure this, you must take the disk offline.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-23

You can attach direct-attached storage by performing the following procedure:

1. Ensure that the target hard disk is offline. If it is not, then use the Disk Management console on the
virtualization server to take it offline.
2. Use the Hyper-V Manager console to edit the existing virtual machine’s properties.

3. Click an IDE or SCSI controller, click Add, and then click Hard Drive.

4. In the Hard Drive dialog box, click Physical Hard Disk. From the drop-down menu, select the disk
that you want to use as direct-attached storage.

Note: If you connect direct-attached storage to a virtual machine’s SCSI controller, then
you do not have to shut down the virtual machine. If you want to connect to a virtual machine’s
IDE controller, then you must first shut down the virtual machine.

Question: Why might you consider using fixed virtual hard disks instead of dynamically
expanding virtual hard disks?
Question: In what situations might you encounter difficulties if you use dynamically
expanding disks?

Managing Virtual Hard Disks


From time to time, you need to perform
maintenance operations on virtual hard disks. For
example, you might want to convert a virtual hard
disk to another format as your needs change, or
you might want to compact a virtual hard disk to
free up space. You can perform the following
maintenance operations on virtual hard disks:

• Convert the disk from fixed to dynamic

• Convert the disk from dynamic to fixed


• Convert a virtual hard disk in .vhd format to
.vhdx format

• Convert a virtual hard disk in .vhdx format to .vhd format

• Compact a dynamically expanding virtual hard disk

• Expand a dynamically expanding virtual hard disk

• Expand a fixed virtual hard disk

Converting a Disk
When you convert a virtual hard disk, the contents of the existing virtual hard disk are copied to a newly-
created virtual hard disk. For example, when you convert a fixed virtual hard disk to a dynamically
expanding virtual hard disk, this creates a new dynamic disk, the contents of the fixed disk are copied to
the new dynamic disk, and then the fixed disk is deleted.
MCT USE ONLY. STUDENT USE PROHIBITED
13-24 Implementing Server Virtualization with Hyper-V

To convert a virtual hard disk from fixed to dynamic or from dynamic to fixed, perform the following
procedure:

1. In the Hyper-V Manager console, from the Actions pane, click Edit Disk.
2. In the Edit Virtual Hard Disk Wizard, on the Before You Begin page, click Next.

3. On the Local Virtual Hard Disk page, click Browse, and then select the virtual hard disk that you
want to convert.

4. On the Choose Action page, click Convert, and then click Next.
5. On the Convert Virtual Hard Disk page, choose between the VHD and the VHDX formats.

6. On the Convert Virtual Hard Disk page, choose between Fixed Size and Dynamically Expanding.
Additionally, if you want to convert the hard disk type, choose the appropriate type, and then click
Next.

7. On the Configure Disk page, choose the destination location for the disk.

Changing the Size of a Disk


You can compact a dynamically expanding virtual hard disk that is not using all of its allocated space.
However, you cannot compact a fixed virtual hard disk without first converting it to a dynamically
expanding virtual hard disk. You can expand both dynamically expanding virtual hard disks and fixed
virtual hard disks.

You can use one of two methods to change the size of a virtual hard disk. They are:
• Use the Windows PowerShell cmdlets resize-partition and resize-vhd.

• In the Edit Virtual Hard Disk Wizard, select either the Compact or the Expand option.

Windows Server 2012 R2 is the first version in which you can resize a virtual hard disk while the virtual
machine is still active.

Reducing Storage Needs with Differencing Virtual Hard Disks


Differencing virtual hard disks are separate virtual
hard disks that record the changes made to a
parent disk. You can use differencing virtual hard
disks to reduce the amount of hard disk space
that virtual hard disks consume. This increases disk
performance by reducing the space that the
virtual hard disks use. Differencing virtual hard
disks work well with SSDs. They also work well
where the available space on the parent volume is
limited and the disk performance compensates for
the performance drawbacks of using a
differencing virtual hard disk.

You can link multiple differencing virtual hard disks to a single parent disk. However, if you modify the
parent disk, the links to all of the differencing virtual hard disks fail.

You can reconnect a differencing virtual hard disk to the parent using the Inspect Disk tool, which is
available in the Actions pane of the Hyper-V Manager console. You can also use the Inspect Disk tool to
locate the parent disk of a differencing virtual hard disk.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-25

You can create a differencing virtual hard disk by using the Hyper-V Manager console or by using the
New-VHD Windows PowerShell cmdlet.

To create a differencing virtual hard disk using the Hyper-V Manager console, perform the following
procedure:
1. Open the Hyper-V Manager console.

2. In the Actions pane, click New, and then click Hard Disk.

3. In the New Virtual Hard Disk Wizard, on the Before You Begin page, click Next.
4. On the Choose Disk Format page, click VHD, and then click Next.

5. On the Choose Disk Type page, click Differencing, and then click Next.
6. On the Specify Name and Location page, provide the location of the parent hard disk.

To create a differencing virtual hard disk by using the New-VHD Windows PowerShell cmdlet, follow the
pattern of the following example. To create a new differencing virtual hard disk named c:\diff-disk.vhd,
which uses the virtual hard disk c:\parent.vhd, use the following Windows PowerShell command:

New-VHD c:\diff-disk.vhd -ParentPath C:\parent.vhd

Using Checkpoints
A checkpoint is a static image of the data on a
virtual machine at a given moment. Checkpoints
are stored in either .avhd or .avhdx format,
depending on the virtual hard disk format. You
can create a checkpoint of a virtual machine from
the Action menu of the Virtual Machine
Connection window or from the Hyper-V
Manager console. Each virtual machine can have a
maximum of 50 checkpoints. Prior to Windows
Server 2012 R2, checkpoints were known as
snapshots.

You can create checkpoints at any time, even


when a virtual machine is off. When you create a checkpoint of a running virtual machine, the checkpoint
includes the contents of the virtual machine’s memory.

When creating checkpoints of multiple virtual machines that are part of the same group, for example a
virtual domain controller and virtual member server, you should create these checkpoints simultaneously.
This ensures that items such as computer account passwords are the same on all of the checkpoints.

Remember that when you revert to a checkpoint, you are reverting to a computer’s state at that point in
time. If you revert a virtual machine back to a point before it had performed a computer password change
with a domain controller, you need to rejoin that computer to the domain or run the netdom resetpwd
command.

Checkpoints vs. Backups


Checkpoints are not a replacement for backups. Checkpoints are stored on the same volume as the virtual
hard disks. If that volume fails, both the checkpoints and the virtual hard disk file are lost.
MCT USE ONLY. STUDENT USE PROHIBITED
13-26 Implementing Server Virtualization with Hyper-V

Exporting Checkpoints
You can perform a virtual machine export of a checkpoint. When you do this, Hyper-V creates full virtual
hard disks that represent the virtual machine’s state at the point in time that the checkpoint was
instantiated. If you choose to export an entire virtual machine, all checkpoints associated with the virtual
machine are exported.

Differencing Virtual Hard Disk Files


When you create a checkpoint, Hyper-V writes differencing virtual hard disk (.avhd, or .avhdx) files, which
store the data that differentiates the checkpoint from the previous checkpoint, or from the parent virtual
hard disk. When you delete checkpoints, Hyper-V discards this data or merges it back into the previous
checkpoint or parent virtual hard disk. For example:

• If you delete the most recent checkpoint, Hyper-V discards the data. Hyper-V in Windows Server 2012
reclaims this space immediately rather than when the virtual machine shuts down.
• If you delete the second-most recent checkpoint, Hyper-V merges the data so that the earlier and
latter checkpoint states of the virtual machine retain their integrity.

Managing Checkpoints
When you apply a checkpoint, the virtual machine reverts to the configuration it had when the checkpoint
was created. Reverting to a checkpoint does not delete any existing checkpoints. When you apply a
checkpoint after you make a configuration change in a different checkpoint, you are prompted to create
another checkpoint. However, it is only necessary to create a new checkpoint if you want to return to that
current configuration.

It is possible to create checkpoint trees that have different branches. For example, consider this scenario:
You create a checkpoint of a virtual machine on Monday, on Tuesday, and on Wednesday. On Thursday,
you apply the checkpoint you created on Tuesday, and then you make changes to the virtual machine’s
configuration.
In this scenario, the original branch is the series of checkpoints created on Monday, Tuesday, and
Wednesday. You create a new branch by applying the Tuesday checkpoint and then make changes to the
virtual machine. Note that you can have multiple branches, as long as you do not exceed the limit of 50
checkpoints per virtual machine.

Checkpoint Support
Many programs, such as Exchange Server and Microsoft SharePoint® Server, are not supported when you
run them in virtual machines used with checkpoints. These programs have interdependencies with roles
and services that are outside the virtual machine, such as AD DS. If you roll back the virtual machine that
is hosting the program to an earlier point in time, and the data in AD DS has been updated since that
point, corruption can occur. You should check with the program vendor to determine whether the vendor
supports programs with virtual machine checkpoints.

Checkpoints are supported for domain controllers that are running Windows Server 2012 or
Windows Server 2012 R2, as long as the virtualization host is running Windows Server 2012,
Windows Server 2012 R2, or a hypervisor that supports VM-Generation ID.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-27

Lesson 4
Managing Virtual Networks
Hyper-V provides several different options for network communication between virtual machines. You can
configure virtual machines that communicate with an external network in a manner that is similar to how
traditionally deployed physical hosts communicate. Additionally, you can configure virtual machines to
communicate only with a limited number of other virtual machines that are hosted on the same server.
Knowing the options available for Hyper-V virtual networks ensures that you can use those options to
meet your organization’s needs.

Lesson Objectives
After completing this lesson, you should be able to:

• Describe virtual switches.


• Describe virtual local area networks (VLANs).

• Describe virtual switch extensions.


• Explain how to manage a virtual machine media access control (MAC) address pool.

• Explain how to configure virtual network adapters.

• Describe advanced features of virtual network adapters.


• Describe NIC Teaming.

What Is a Virtual Switch?


A virtual switch is a virtual version of a network
switch, and is new in Windows Server 2012. The
term virtual switch replaces the term virtual
network, which was used in Windows Server 2008.
Virtual switches control how network traffic flows
between multiple virtual machines that are hosted
on the virtualization server, and between virtual
machines and the rest of the organizational
network. You can manage virtual switches
through the Virtual Switch Manager, which is
accessible through the Actions pane of the
Hyper-V Manager console.

Hyper-V on Windows Server 2012 supports the following three different types of virtual switches:

• External. This type of switch maps a network to a specific network adapter or network adapter team.
Windows Server 2012 supports mapping an external network to a wireless network adapter if you
have installed the wireless local area network (LAN) service on the virtualization server, and if the
virtualization server has a compatible adapter.

• Internal. Internal virtual switches communicate between multiple virtual machines on the
virtualization server, and between the virtual machines and the virtualization server.

• Private. Private switches communicate only between multiple virtual machines on the virtualization
server. You cannot use private switches to communicate between the virtual machines and the
virtualization server.
MCT USE ONLY. STUDENT USE PROHIBITED
13-28 Implementing Server Virtualization with Hyper-V

Additional Reading: For more information about virtual switches, refer to “Hyper-V Virtual
Switch Overview” at http://go.microsoft.com/fwlink/?LinkId=269716.

What Are Virtual Local Area Networks?


VLANs enable you to logically segment network
traffic that is running on the same physical
network. VLANs function as separate broadcast
domains. This means that hosts on another VLAN
do not intercept and process a VLAN’s broadcast
traffic. This holds true even when those hosts are
connected to the same hardware switch. Each
VLAN has an identification (ID) that is
encapsulated within an Ethernet frame.
You can assign VLAN IDs to Hyper-V virtual
switches and network adapters. To use VLANs
with Hyper-V virtual switches and network
adapters, the host’s physical network adapters must support VLAN tagging. This feature must be enabled
on the network adapter. When you configure VLAN IDs for Hyper-V, you need to configure the VLAN ID
on the virtual switch or on each individual virtual machine’s network adapter. You do not need to
configure the VLAN ID on the host’s physical network adapter.
Hyper-V supports the 802.1q specification for VLAN trunking. VLAN IDs that you use with virtual switches
and virtual network adapters also can be used with networking equipment that supports these standards.
This means that you can have the same VLAN span multiple Hyper-V hosts when connected to
compatible network equipment.

You might implement VLANs with Hyper-V switches and virtual network adapters to support the
following scenarios:

• Isolate network storage traffic. You can isolate network storage traffic such as iSCSI traffic from other
traffic. Using VLANs means that a separate storage network might not be required.

• Isolate cluster traffic. You can isolate intra-node cluster traffic from other traffic.

• Security isolation. You can isolate hosts from each other for security reasons. For example, you can
make some virtual hosts available to Network Access Protection (NAP) clients that have been placed
on an isolated VLAN. This ensures that they can remediate their configuration to a healthy state.

Configuring VLAN IDs


When configuring a virtual network, you can configure a VLAN ID that is associated with the network. This
enables you to extend existing VLANs on the external network to VLANs within the virtualization server’s
network switch. VLANs enable you to partition network traffic, and they function as separate logical
networks. Note that traffic can only pass from one VLAN to another if it passes through a router.

You can configure the following extensions for each virtual switch type:

• Microsoft NDIS Capture. This extension allows the capture of data that is traversing across the virtual
switch.

• Microsoft Windows Filtering Platform. This extension allows the filtering of data that is traversing
across the virtual switch.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-29

Virtual Switch Extensions


Virtual switch extensions enable third-party
vendors to create virtual switches that you can
add to Hyper-V that add monitoring, filtering, and
forwarding functionality. Some vendors have
created virtual editions of their hardware switches.
You can manage these virtual switches by using
the same management suite that you use to
manage the physical switches. This enables an
organization’s networking team to extend switch
management across both the virtual and the
physical infrastructure.

The following table lists the available virtual switch


extensions.

Extension Purpose

Network packet inspection Examine network packets while they traverse the virtual switch.

Network packet filter Create, filter, and modify packets that traverse the virtual switch.

Network forwarding Create a forwarding extension for each virtual switch.

Intrusion detection or firewall Filter and modify TCP/IP packets, monitor or authorize
connections, filter IPsec traffic, and filter remote procedure calls.

Consult third-party vendor catalogs to determine which virtual switches are available to run on the Hyper-
V platform.

Additional Reading: For more information about virtual switch extensions, refer to
“Hyper-V Virtual Switch Overview” at http://go.microsoft.com/fwlink/?LinkID=331084.

Managing Virtual Machine MAC Addresses


Unless you specify a static MAC address, Hyper-V
dynamically allocates an address to each virtual
machine network adapter from a pool of MAC
addresses. You can configure the address range of
this pool from the MAC Address Range setting of
the Virtual Switch Manager console. By default, a
server that is running Hyper-V has a pool of 255
MAC addresses.

When virtual machines use private or internal


networks, the MAC address that you allocate to
network adapters is not likely to be of concern,
because the server that is running Hyper-V
ensures that duplicate MAC addresses are not assigned to different virtual machines. However, when you
have multiple servers that are running Hyper-V and are hosting virtual machines that use adapters
connected to external networks, you should ensure that each server uses a different pool of MAC
MCT USE ONLY. STUDENT USE PROHIBITED
13-30 Implementing Server Virtualization with Hyper-V

addresses. This ensures that separate servers that connect to the same network do not assign the same
MAC addresses to the virtual machines that they host.

When virtual machines are allocated IP addresses through a Dynamic Host Configuration Protocol (DHCP)
reservation, you should consider using static MAC addresses. A DHCP reservation ensures that a particular
IP address always is allocated to a specific MAC address.

You can configure the MAC address range by performing the following procedure:

1. Open the Hyper-V Manager console.

2. Select the Hyper-V host that you wish to configure.

3. On the Actions pane, click Virtual Switch Manager.

4. Under Global Network Settings, click MAC Address Range.

5. Specify a minimum and a maximum range for the MAC address.

MAC addresses are in hexadecimal format. When configuring ranges for multiple Hyper-V hosts, you
should consider changing the values of the second from the last pair of digits. The following table displays
examples of ranges for multiple Hyper-V hosts.

Hyper-V host MAC address range

Host 1 Minimum: 00-15-5D-0F-AB-00


Maximum: 00-15-5D-0F-AB-FF

Host 2 Minimum: 00-15-5D-0F-AC-00


Maximum: 00-15-5D-0F-AC-FF

Host 3 Minimum: 00-15-5D-0F-AD-00


Maximum: 00-15-5D-0F-AD-FF

Configuring Virtual Network Adapters


Virtual network adapters allow the virtual machine
to communicate using the virtual switches that
you configure in the Virtual Switch Manager
console. You can edit the properties of a virtual
machine to modify the properties of a network
adapter. From the Network Adapter pane on the
virtual machine’s Settings dialog box, you can
configure the following:
• Virtual Switch. You configure to which virtual
switch the network adapter connects.

• VLAN ID. You specify a VLAN ID that the


virtual machine uses for communication that
passes through this adapter.
• Bandwidth Management. You allocate a minimum and a maximum bandwidth for the adapter.
Hyper-V reserves the minimum bandwidth allocation for the network adapter, even when virtual
network adapters on other virtual machines are working at capacity.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-31

Both synthetic network adapters and legacy network adapters support the following advanced features:

• MAC address allocation. You can configure a MAC address to be assigned from the MAC address
pool, or you can configure the network adapter to use a fixed MAC address. You can also configure
MAC address spoofing. This is useful when the virtual machine needs to provide specific network
access, such as when the virtual machine is running a mobile device emulator that requires network
access.
• DHCP Guard. This feature drops DHCP messages from virtual machines that are functioning as
unauthorized DHCP servers. This may be necessary in scenarios where you are managing a server
running Hyper-V that hosts virtual machines for others, but does not have direct control over the
configuration of those virtual machines.

• Router Guard. This feature drops router advertisement and redirection messages from virtual
machines that are configured as unauthorized routers. This may be necessary in scenarios where you
do not have direct control over the configuration of virtual machines.

• Port Mirroring. This feature allows you to copy incoming and outgoing packets from a network
adapter to another virtual machine that you have configured for monitoring.
• NIC Teaming. This feature allows you to add the virtual network adapter to an existing team on the
server running Hyper-V.

Legacy network adapters emulate common network adapter hardware. You use legacy network adapters
in the following situations:

• You want to support a network boot-installation scenarios for virtual machines. For example, you
want to deploy an operating system image from a Windows Deployment Services (Windows DS)
server or through Configuration Manager.

• You need to support operating systems that do not support integration services and do not have a
driver for the synthetic network adapter.
Legacy network adapters do not support the hardware acceleration features that synthetic network
adapters support. You cannot configure a virtual machine queue, IPsec task offloading, or single root I/O
virtualization (SR-IOV) for legacy network adapters. The next topic covers these advanced features.

Network Adapter Advanced Features


In addition to the features described earlier,
synthetic network adapters support the following
advanced features:

• Virtual Machine Queue. This feature uses


hardware packet filtering to deliver network
traffic directly to the guest. This improves
performance because the packet does not
need to be copied from the management
operating system to the virtual machine.
Virtual Machine Queue requires that the host
computer has a network adapter that
supports this feature.

• IPsec task offloading. This feature enables the host’s network adapter to perform calculation-intensive
security association tasks. In the event that sufficient hardware resources are not available, the guest
operating system performs these tasks. You can configure a maximum number of offloaded security
MCT USE ONLY. STUDENT USE PROHIBITED
13-32 Implementing Server Virtualization with Hyper-V

associations between 1 and 4,096. IP security (IPsec) task offloading requires guest operating system
support and network adapter support.

• SR-IOV. Single-root I/O virtualization (SR-IOV) enables multiple virtual machines to share the same
Peripheral Component Interconnect (PCI) Express physical hardware resources. If sufficient resources
are not available, then network connectivity falls back, and the virtual switch provides connectivity.
SR-IOV requires that you install specific hardware and special drivers on the guest operating system,
and you may need to enable it in the computer BIOS.
• Virtual Receive Side Scaling (vRSS). vRSS enables network adapters to balance network processing
load across the processor cores assigned to a virtual machine. vRSS enables a virtual machine to
process higher amounts of network traffic than it could process if only a single CPU core was
responsible for processing traffic. You can implement vRSS by allocating a virtual machine multiple
cores through the advanced network. To use vRSS, the host’s processor must support Receive Side
Scaling (RSS) and the host’s network adapters must support Virtual Machine Queue (VMQ).

What Is NIC Teaming?


NIC Teaming allows you to combine up to 32
network adapters and then use them as a single
network interface. NIC Teaming provides
redundancy, allowing network communication to
occur over the combined network interface even
when one or more of the network adapters fail.
The combination of network adapters also
increases the bandwidth available to the
combined network interface. NIC Teaming is a
feature available in the Windows Server 2012
operating system that both the Hyper-V host and
Hyper-V virtual machines can use.
When used with virtual machines, NIC Teaming allows virtual machines to team virtual network adapters
that connect to separate virtual switches.

To get the benefit of NIC Teaming, the host must have at least two external virtual switches. When you
have multiple virtual network adapters attached to the same switch, if the physical network adapter that
the virtual switch is connected to fails, those virtual network adapters will lose connectivity. When
configuring NIC Teaming for virtual machines, network adapters connected to virtual switches can use SR-
IOV.

Enable virtual machine NIC Teaming for virtual machines on the Advanced Features page of the virtual
network adapter in Hyper-V manager. You can also enable NIC Teaming for virtual machines by using the
Set-VMNetworkAdapter Windows PowerShell cmdlet. To enable NIC Teaming within the virtual
machine operating system, you must enable NIC Teaming on the virtual network adapter or configure the
virtual network adapter to allow MAC address spoofing. Once you enable virtual NIC Teaming on the
virtual network adapter or enable MAC address spoofing, you can configure NIC Teaming within the
virtual machine.

A new feature of Windows Server 2012 R2 is dynamic NIC Teaming. In Windows Server 2012, new traffic is
assigned to a particular NIC, and the traffic flow remains with that NIC throughout the session. Dynamic
NIC Teaming balances traffic flow across all available NICs in a team.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-33

Lab: Implementing Server Virtualization with Hyper-V


Scenario
Your assignment is to configure the infrastructure service for a new branch office.

To use the server hardware that is available currently at branch offices more effectively, your manager has
decided that all branch office servers will run as virtual machines. You must now configure a virtual
network and a new virtual machine for these branch offices.

Objectives
After performing this lab, you should be able to:

• Install the Hyper-V role onto a server.


• Configure virtual networking.

• Create and configure a virtual machine.


• Use virtual machine checkpoints.

Lab Setup
Estimated Time: 70 minutes

Virtual machine 20410D-LON-HOST1

User name Administrator

Password Pa$$w0rd

Before beginning the lab, you must complete the following steps:

1. Reboot the classroom computer and from the Windows Boot Manager, select 20410D-LON-HOST1.
2. Sign in to LON-HOST1 with the Administrator account and the password Pa$$w0rd.

Exercise 1: Installing the Hyper-V Role onto a Server


Scenario
The first step in migrating to a virtualized environment for the branch office is installing the Hyper-V role
on a new Windows Server 2012 server.

The main tasks for this exercise are as follows:


1. Install the Hyper-V role onto a server.

2. Complete the Hyper-V role installation, and verify the settings.

 Task 1: Install the Hyper-V role onto a server


1. In Server Manager, click Local Server, and then configure the following network settings:

o IP Address: 172.16.0.31

o Subnet mask: 255.255.0.0

o Default gateway: 172.16.0.1

o Preferred DNS server: 172.16.0.10


MCT USE ONLY. STUDENT USE PROHIBITED
13-34 Implementing Server Virtualization with Hyper-V

2. Use the Add Roles and Features Wizard to add the Hyper-V role to LON-HOST1 with the following
options:

o Do not create a virtual switch.


o Use the Default stores locations.

o Allow the server to restart automatically if required.

3. After a few minutes, the server restarts automatically. Ensure that you restart the machine from the
boot menu as 20410D-LON-HOST1. The computer will restart several times.

 Task 2: Complete the Hyper-V role installation, and verify the settings
1. Sign in to LON-HOST1 by using the account Administrator with the password Pa$$word.

2. When the installation of the Hyper-V tools completes, click Close.


3. Open the Hyper-V Manager console, and then click LON-HOST1.

4. Edit the Hyper-V settings of LON-HOST1, and then configure the following settings:

o Keyboard: Use on the virtual machine


o Virtual Hard Disks: C:\Users\Public\Documents\Hyper-V\Virtual Hard Disks

Results: After completing this exercise, you should have installed the Hyper-V role onto a physical server.

Exercise 2: Configuring Virtual Networking


Scenario
After installing the Hyper-V role on the new server, you need to configure the virtual network. You need
to create a network that connects to the physical network and a private network that you can use only for
communication between virtual machines. You will use the private network when you configure the virtual
machines for high availability. You also need to configure a specific range of media access control (MAC)
addresses for the virtual machines.

The main tasks for this exercise are as follows:

1. Configure the external network.

2. Create a private network.


3. Create an internal network.

4. Configure the MAC address range.

 Task 1: Configure the external network


1. Open the Hyper-V Manager console, and then click LON-HOST1.
2. Use the Virtual Switch Manager to create a new External virtual network switch with the following
properties:

o Name: Switch for External Adapter


o External Network: Mapped to the host computer’s physical network adapter. (This varies
depending on the host computer.)
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-35

 Task 2: Create a private network


• In the Hyper-V Manager console use the Virtual Switch Manager to create a new virtual switch with
the following properties:

o Name: Private Network


o Connection type: Private network

 Task 3: Create an internal network


• Use the Virtual Switch Manager to create a new virtual switch with the following properties:

o Name: Internal Network


o Connection type: Internal network

 Task 4: Configure the MAC address range


• Use the Virtual Switch Manager to configure the following MAC Address Range settings:

o Minimum: 00-15-5D-0F-AB-A0
o Maximum: 00-15-5D-0F-AB-EF

Results: After completing this exercise, you should have configured virtual switch options on a physically
deployed Windows Server 2012 server that is running the Hyper-V role.

Exercise 3: Creating and Configuring a Virtual Machine


Scenario
You have been asked to deploy two virtual machines to LON-HOST1. You have copied a sysprepped
virtual hard disk file that hosts a Windows Server 2012 installation.

To minimize disk space use at the cost of performance, you are going to create two differencing virtual
hard disk files based on the sysprepped virtual hard disk. You then will use these differencing virtual hard
disk files as the virtual hard disk files for the new virtual machines.

The main tasks for this exercise are as follows:

1. Create differencing virtual hard disks.


2. Create virtual machines.

3. Enable resource metering.

 Task 1: Create differencing virtual hard disks


1. Use File Explorer to create the following two folders:
o E:\Program Files\Microsoft Learning\Base\LON-GUEST1

o E:\Program Files\Microsoft Learning\Base\LON-GUEST2

Note: The drive letter may depend upon the number of drives on the physical host
computer.

2. In the Hyper-V Manager console, create a virtual hard disk with the following properties:
o Disk Format: VHD
o Disk Type: Differencing
MCT USE ONLY. STUDENT USE PROHIBITED
13-36 Implementing Server Virtualization with Hyper-V

o Name: LON-GUEST1.vhd
o Location: E:\Program Files\Microsoft Learning\Base\LON-GUEST1\
o Parent Location: E:\Program Files\Microsoft Learning\Base\ Base14A-WS12R2.vhd
3. Open Windows PowerShell, and then execute the following command:

New-VHD "E:\Program Files\Microsoft Learning\Base\LON-GUEST2\LON-GUEST2.vhd"


-ParentPath "E:\Program Files\Microsoft Learning\Base\ Base14A-WS12R2.vhd"

4. Inspect the disk at E:\Program Files\Microsoft Learning\Base\LON-GUEST2\LON-GUEST2.vhd.

5. Verify that LON-GUEST2.vhd is configured as a differencing virtual hard disk with


E:\Program Files\Microsoft Learning\Base\ Base14A-WS12R2.vhd as a parent.

 Task 2: Create virtual machines


1. On LON-HOST1, in the Hyper-V Manager console, in the Actions pane, click New, and then click
Virtual Machine.
2. Create a virtual machine with the following properties:

o Name: LON-GUEST1
o Location: E:\Program Files\Microsoft Learning\Base\LON-GUEST1\
o Generation: Generation 1

o Memory: 1024 MB

o Use Dynamic Memory: Yes


o Networking: Private Network

o Connect Virtual Hard Disk: E:\Program Files\Microsoft Learning\Base\LON-GUEST1


\lon-guest1.vhd

3. Open Windows PowerShell, and then execute the following command:

New-VM -Name LON-GUEST2 -MemoryStartupBytes 1024MB -VHDPath "E:\Program


Files\Microsoft Learning\Base\LON-GUEST2\LON-GUEST2.vhd" -SwitchName "Private
Network"

4. Use the Hyper-V Manager console to edit the settings of LON-GUEST2 by configuring the following:

o Automatic Start Action: Nothing


o Automatic Stop Action: Shut down the guest operating system

 Task 3: Enable resource metering


• At the Windows PowerShell prompt, enter the following commands:

Enable-VMResourceMetering LON-GUEST1

Enable-VMResourceMetering LON-GUEST2

Results: After completing this exercise, you should have deployed two separate virtual machines by using
a sysprepped virtual hard disk file as a parent disk for two differencing virtual hard disks.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-37

Exercise 4: Using Virtual Machine Checkpoints


Scenario
You are in the process of developing a strategy to mitigate the impact of incorrectly applied change
requests. As a part of this strategy development, you are testing the speed and functionality of virtual
machine checkpoints to roll back to a previously existing stable configuration.

In this exercise, you will deploy Windows Server 2012 in a virtual machine. You then will create a stable
configuration for that virtual machine, and create a virtual machine checkpoint. Finally, you will modify
the configuration, and roll back to the checkpoint.
The main tasks for this exercise are as follows:

1. Deploy Windows Server 2012 in a virtual machine.

2. Create a virtual machine checkpoint.


3. Modify the virtual machine.

4. Revert to the existing virtual machine checkpoint.

5. View resource metering data.

 Task 1: Deploy Windows Server 2012 in a virtual machine


1. Use the Hyper-V Manager console to start LON-GUEST1.
2. Open the Virtual Machine Connection Window, and perform the following steps to deploy Windows
Server 2012 on the virtual machine:

o On the Settings page, click Next to accept the Region and Language settings.
o On the Settings page, click I accept.

o On the Settings page, enter the password Pa$$w0rd twice, and then click Finish.

3. Sign in to the virtual machine by using the account Administrator and the password Pa$$w0rd.
4. Reset the name of the virtual machine to LON-GUEST1, and then restart the virtual machine.

 Task 2: Create a virtual machine checkpoint


1. Sign in to the LON-GUEST1 virtual machine, and then verify that the name of the computer is set to
LON-GUEST1.

2. Create a checkpoint of LON-GUEST1, and name the checkpoint Before Change.

 Task 3: Modify the virtual machine


1. Sign in to the LON-GUEST1 virtual machine, and use the Server Manager console to change the
computer’s name to LON-Computer1.
2. Reboot the virtual machine.

3. Sign in to the LON-GUEST1 virtual machine, and then verify that the server name is set to
LON-Computer1.

 Task 4: Revert to the existing virtual machine checkpoint


1. Use the Virtual Machine Connection window to revert the virtual machine.

2. Verify that the Computer Name of the virtual machine now is set to LON-GUEST1.
MCT USE ONLY. STUDENT USE PROHIBITED
13-38 Implementing Server Virtualization with Hyper-V

 Task 5: View resource metering data


1. On LON-HOST1, issue the following command:

Measure-VM LON-GUEST1

2. Note the average central processing unit (CPU), average random access memory (RAM), and total disk
use figures, and then close Windows PowerShell.

Results: After completing this exercise, you should have used virtual machine checkpoints to recover from
a virtual machine misconfiguration.

 Revert the virtual machines


After you finish the lab, restart the computer in Windows Server 2012 by performing the following steps:

1. On the taskbar, click the Windows PowerShell icon.


2. In the Windows PowerShell window, enter the following command, and then press Enter:

Shutdown /r /t 5

3. From the Windows Boot Manager, select Windows Server 2012.

Lab Review Questions


Question: What type of virtual network switch would you create if you want to allow the
virtual machine to communicate with the LAN that is connected to the Hyper-V virtualization
server?
Question: How can you ensure that no single virtual machine uses all of the available
bandwidth that the Hyper-V virtualization server provides?
Question: What Dynamic Memory configuration task was not possible on previous versions
of Hyper-V, but which you can now perform on a virtual machine that is hosted on the
Hyper-V role on a Windows Server 2012 server?
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 13-39

Module Review and Takeaways


Review Questions
Question: In which situations should you use a fixed memory allocation instead of Dynamic
Memory?

Question: In which situations must you use virtual hard disks with the new .vhdx format,
instead of virtual hard disks with the old .vhd format?
Question: You want to deploy a Windows Server 2012 Hyper-V virtual machine’s virtual hard
disk on a file share. What operating system must the file server be running to support this
configuration?

Best Practices
When implementing server virtualization with Hyper-V, use the following best practices:

• Ensure that the processor on the computer that will run Hyper-V supports hardware assisted
virtualization.

• Ensure that you provision a virtualization server with adequate RAM. Having multiple virtual machines
paging the hard disk drive because they have inadequate memory decreases performance for all
virtual machines on the server.

• Monitor virtual machine performance carefully. A virtual machine that uses a disproportionate
amount of server resources can reduce the performance of all other virtual machines that the same
virtualization server is hosting.

Common Issues and Troubleshooting Tips


Common Issue Troubleshooting Tip

Cannot deploy Hyper-V


on an x64 platform.

Virtual machine does not


use Dynamic Memory.

Tools
You can use the following tools with Hyper-V to deploy and manage virtual machines.

Name of tool Used for Where to find it

Sysinternals Use to convert physical hard Microsoft TechNet


disk2vhd tool disks to virtual hard disk format. website.
MCT USE ONLY. STUDENT USE PROHIBITED
13-40 Implementing Server Virtualization with Hyper-V

Course Evaluation
Your evaluation of this course will help Microsoft
understand the quality of your learning experience.

Please work with your training provider to access


the course evaluation form.
Microsoft will keep your answers to this survey
private and confidential and will use your responses
to improve your future learning experience. Your
open and honest feedback is valuable and
appreciated.
MCT USE ONLY. STUDENT USE PROHIBITED
L1-1

Module 1: Deploying and Managing Windows Server 2012


Lab: Deploying and Managing Windows
Server 2012
Exercise 1: Deploying Windows Server 2012
 Task 1: Install the Windows Server 2012 R2 server
1. Open the Hyper-V Manager console.

2. Click 20410D-LON-SVR3.

3. In the Actions pane, click Settings.

4. Under Hardware, click DVD Drive.


5. Click Image file, and then click Browse.

6. Browse to D:\Program Files\Microsoft Learning\20410\Drives, and then click


Windows2012R2RTM.iso.
7. Click Open, and then click OK.

8. In the Hyper-V Manager console, double-click 20410D-LON-SVR3.


9. In the Virtual Machine Connection Window, in the Action menu, click Start.

10. In the Windows Setup Wizard, on the Windows Server 2012 R2 page, verify the following settings,
and then click Next:
o Language to install: English (United States)
o Time and currency format: English (United States)

o Keyboard or input method: US


11. On the Windows Server 2012 R2 page, click Install now.
12. On the Select the operating system you want to install page, select Windows Server 2012 R2
Datacenter Evaluation (Server with a GUI), and then click Next.

13. On the License terms page, review the operating system license terms, select the I accept the
license terms check box, and then click Next.

14. On the Which type of installation do you want? page, click Custom: Install Windows only
(advanced).

15. On the Where do you want to install Windows? page, verify that Drive 0 Unallocated Space has
enough space for the Windows Server 2012 R2 operating system, and then click Next.

Note: Depending on the speed of the equipment, the installation takes approximately 20
minutes. The virtual machine will restart several times during this process.

16. On the Settings page, in both the Password and Reenter password boxes, enter the password
Pa$$w0rd, and then click Finish.
MCT USE ONLY. STUDENT USE PROHIBITED
L1-2 Deploying and Managing Windows Server 2012

 Task 2: Change the server name


1. Sign in to LON-SVR3 as Administrator with the password Pa$$w0rd.

2. In Server Manager, click Local Server.

3. Click the randomly generated name next to Computer name.

4. In the System Properties dialog box, on the Computer Name tab, click Change.

5. In the Computer Name/Domain Changes dialog box, in the Computer name text box, enter the
name LON-SVR3, and then click OK.
6. In the Computer Name/Domain Changes dialog box, click OK.

7. Close the System Properties dialog box.

8. In the Microsoft Windows dialog box, click Restart Now.

 Task 3: Change the date and time


1. Sign in to server LON-SVR3 as Administrator with the password Pa$$w0rd.
2. On the taskbar, click the time display. A pop-up window with a calendar and a clock appears.

3. In the pop-up window, click Change date and time settings.


4. In the Date and Time dialog box, click Change Time Zone.
5. In the Time Zone Settings dialog box, set the time zone to your current time zone, and then
click OK.

6. In the Date and Time dialog box, click Change Date and Time.
7. Verify that the date and time that display in the Date and Time Settings dialog box match those in
your classroom, and then click OK.

8. To close the Date and Time dialog box, click OK.

 Task 4: Configure the network


1. On LON-SVR3, in the Server Manager console, click Local Server.

2. In the Server Manager console, next to Ethernet, click IPv4 address assigned by DHCP, IPv6
Enabled.

3. In the Network Connections dialog box, right-click Ethernet, and then click Properties.

4. In the Ethernet Properties dialog box, click Internet Protocol Version 4 (TCP/IPv4), and then click
Properties.

5. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, click Use the following IP
address, enter the following IP address information, and then click OK:
o IP address: 172.16.0.101

o Subnet Mask: 255.255.0.0

o Default Gateway: 172.16.0.1


o Preferred DNS server: 172.16.0.10

6. Click Close to close the Ethernet Properties dialog box.

7. Close the Network Connections dialog box.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L1-3

 Task 5: Add the server to the domain


1. On LON-SVR3, in the Server Manager console, click Local Server.

2. Next to Workgroup, click WORKGROUP.

3. In the System Properties dialog box, on the Computer Name tab, click Change.

4. In the Computer Name/Domain Changes dialog box, in the Member Of area, click the Domain
option.

5. In the Domain box, type adatum.com, and then click OK.


6. In the Windows Security dialog box, enter the following details, and then click OK:

o Username: Administrator

o Password: Pa$$w0rd
7. In the Computer Name/Domain Changes dialog box, click OK.

8. When informed that you must restart the computer to apply the changes, click OK.

9. In the System Properties dialog box, click Close.

10. In the Microsoft Windows dialog box, click Restart Now.

11. After LON-SVR3 restarts, sign in as Adatum\Administrator with the password Pa$$w0rd.

Results: After completing this exercise, you should have deployed Windows Server 2012 on LON-SVR3.
You also should have configured LON-SVR3, including name change, date and time, and networking.

Exercise 2: Configuring Windows Server 2012 Server Core


 Task 1: Set computer name
1. Sign in to LON-CORE as Administrator with the password Pa$$w0rd.
2. At the command prompt, type sconfig.cmd and press Enter.

3. To select Computer Name, type 2, and then press Enter.

4. Enter the computer name LON-CORE, and then press Enter.


5. In the Restart dialog box, click Yes.

6. Sign in to server LON-CORE using the Administrator account with the password Pa$$w0rd.

7. At the command prompt, type hostname, and then press Enter to verify the computer’s name.

 Task 2: Change the computer’s date and time


1. Ensure you are signed in to server LON-CORE as Administrator with the password Pa$$w0rd.

2. At the command prompt, type sconfig.cmd, and then press Enter.

3. To select Date and Time, type 9, and then press Enter.


4. In the Date and Time dialog box, click Change time zone. Set the time zone to the same time zone
that your classroom uses, and then click OK.

5. In the Date and Time dialog box, click Change Date and Time, and verify that the date and time
match those in your location. To dismiss the dialog boxes, click OK two times.

6. In the Command Prompt window, type 15, and then press Enter to exit Server Configuration.
MCT USE ONLY. STUDENT USE PROHIBITED
L1-4 Deploying and Managing Windows Server 2012

 Task 3: Configure the network


1. Ensure that you are signed in to server LON-CORE using the account Administrator and the
password Pa$$w0rd.

2. At the command prompt, type sconfig.cmd, and then press Enter.


3. To configure Network Settings, type 8, and then press Enter.

4. Type the index number of the network adapter that you want to configure, and then press Enter.

5. On the Network Adapter Settings page, type 1, and then press Enter. This sets the Network Adapter
Address.
6. To select static IP address configuration, type S, and then press Enter.

7. At the Enter static IP address: prompt, type 172.16.0.111, and then press Enter.

8. At the Enter subnet mask prompt, type 255.255.0.0, and then press Enter.
9. At the Enter default gateway prompt, type 172.16.0.1, and then press Enter.

10. On the Network Adapter Settings page, type 2, and then press Enter.

This configures the DNS server address.


11. At the Enter new preferred DNS server prompt, type 172.16.0.10, and then press Enter.

12. In the Network Settings dialog box, click OK.


13. To choose not to configure an alternate DNS server address, press Enter.
14. Type 4, and then press Enter to return to the main menu.

15. Type 15, and then press Enter to exit sconfig.cmd.

16. At the command prompt, type ping lon-dc1.adatum.com to verify connectivity to the domain
controller from LON-CORE.

 Task 4: Add the server to the domain


1. Ensure that you are signed in to server LON-CORE using the account Administrator with the
password Pa$$w0rd.
2. At the command prompt, type sconfig.cmd, and then press Enter.

3. To switch to configure Domain/Workgroup, type 1, and then press Enter.


4. To join a domain, type D, and then press Enter.
5. At the Name of domain to join prompt, type adatum.com, and press Enter.

6. At the Specify an authorized domain\user prompt, type Adatum\Administrator, and then press
Enter.

7. At the Type the password associated with the domain user prompt, type Pa$$w0rd, and then
press Enter.

8. At the Change Computer Name prompt, click No.


9. In the Restart dialog box, click Yes.

10. Sign in to server LON-CORE with the Adatum\Administrator account and the password Pa$$w0rd.

Results: After you complete this exercise, you should have configured a Windows Server 2012 Server Core
deployment and verified the server’s name.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L1-5

Exercise 3: Managing Servers


 Task 1: Create a server group
1. Sign in to LON-DC1 with the Administrator account and the password Pa$$w0rd.

2. In the Server Manager console, click Dashboard, and then click Create a server group.
3. In the Create Server Group dialog box, click the Active Directory tab, and then click Find Now.

4. In the Server group name box, type LAB-1.

5. Use the arrow to add LON-CORE and LON-SVR3 to the server group. Click OK to close the Create
Server Group dialog box.

6. In the Server Manager console, click LAB-1. Press and hold the Ctrl key, and then select both
LON-CORE and LON-SVR3.

7. Scroll down, and under the Performance section, select both LON-CORE and LON-SVR3.

8. Right-click LON-CORE, and then click Start Performance Counters.

 Task 2: Deploy features and roles to both servers


1. In Server Manager on LON-DC1, click LAB-1.
2. Scroll to the top of the pane, right-click LON-CORE, and then click Add Roles and Features.

3. In the Add Roles and Features Wizard, click Next.


4. On the Select installation type page, click Role-based or feature-based installation, and then
click Next.

5. On the Select destination server page, verify that LON-CORE.Adatum.com is selected, and then
click Next.

6. On the Select server roles page, select Web Server (IIS), and then click Next.

7. On the Features page, select Windows Server Backup, and then click Next.

8. On the Web Server Role (IIS) page, click Next.


9. On the Select role services page, add the Windows Authentication role service, and then click
Next.

10. On the Confirm installation selections page, select the Restart the destination server
automatically if required check box, and then click Install.

11. Click Close to close the Add Roles and Features Wizard.

12. In Server Manager, right-click LON-SVR3, and then click Add Roles and Features.
13. In the Add Roles and Features Wizard, on the Before you begin page, Click Next.

14. On the Select installation type page, click Role-based or feature-based installation. Click Next.
15. On the Select destination server page, verify that LON-SVR3.Adatum.com is selected, and then
click Next.

16. On the Server Roles page, click Next.


17. On the Select features page, click Windows Server Backup, and then click Next.

18. On the Confirm installation selections page, select the Restart the destination server
automatically if required check box, and then click Install.
MCT USE ONLY. STUDENT USE PROHIBITED
L1-6 Deploying and Managing Windows Server 2012

19. Once the install commences, click Close.

20. In Server Manager, refresh the view, click the IIS node, and then verify that LON-CORE is listed.

 Task 3: Review services and change a service setting


1. Sign in to LON-CORE with the Adatum\Administrator account and the password Pa$$w0rd.

2. In the Command Prompt window, type the following two commands, and press Enter after each one:

netsh.exe advfirewall firewall set rule group="remote desktop" new enable=yes


netsh.exe advfirewall firewall set rule group="remote event log management" new
enable=yes

3. Sign in to LON-DC1 with the Adatum\Administrator account and the password Pa$$w0rd.

4. In Server Manager, click LAB-1.

5. Right-click LON-CORE, and then click Computer Management.

6. In the Computer Management console, expand Services and Applications, and then click Services.
7. Right-click the World Wide Web Publishing service, and then click Properties. Verify that the
Startup type is set to Automatic.

8. In the World Wide Web Publishing Service dialog box, on the Log On tab, verify that the service is
configured to use the Local System account.

9. On the Recovery tab, configure the following settings, and then click the Restart Computer Options
button:

o First failure: Restart the Service

o Second failure: Restart the Service

o Subsequent failures: Restart the Computer


o Reset fail count after: 1 days

o Restart service after: 1 minute


10. In the Restart Computer Options dialog box, in the Restart Computer After box, type 2, and then
click OK.

11. Click OK to close the World Wide Web Publishing Services Properties dialog box.
12. Close the Computer Management console.

Results: After you complete this exercise, you should have created a server group, deployed roles and
features, and configured the properties of a service.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L1-7

Exercise 4: Using Windows PowerShell to Manage Servers


 Task 1: Use Windows PowerShell to connect remotely to servers and view
information
1. Sign in to LON-DC1 with the Adatum\Administrator account and the password Pa$$w0rd.

2. In the Server Manager console, click LAB-1.


3. Right-click LON-CORE, and then click Windows PowerShell.

4. At the command prompt, type the following, and then press Enter:

Import-Module ServerManager

5. To review the roles and features installed on LON-CORE, at the command prompt, type the following,
and then press Enter:

Get-WindowsFeature

6. To review the running services on LON-CORE, at the command prompt, type the following, and then
press Enter:

Get-service | where-object {$_.status -eq "Running"}

7. To view a list of processes on LON-CORE, at the command prompt, type the following, and then press
Enter:

Get-process

8. To review the IP addresses assigned to the server, at the command prompt, type the following, and
then press Enter:

Get-NetIPAddress | Format-table

9. To review the most recent 10 items in the security log, at the command prompt, type the following,
and then press Enter:

Get-EventLog Security -Newest 10

10. Close Windows PowerShell.

 Task 2: Use Windows PowerShell to remotely install new features


1. On LON-DC1, on the taskbar, click the Windows PowerShell icon.

2. To verify that the XPS Viewer feature has not been installed on LON-SVR3, type the following
command, and then press Enter:

Get-WindowsFeature -ComputerName LON-SVR3

3. To deploy the XPS Viewer feature on LON-SVR3, type the following command, and then press Enter:

Install-WindowsFeature XPS-Viewer -ComputerName LON-SVR3

4. To verify that the XPS Viewer feature has now been deployed on LON-SVR3, type the following
command, and then press Enter:

Get-WindowsFeature -ComputerName LON-SVR3


MCT USE ONLY. STUDENT USE PROHIBITED
L1-8 Deploying and Managing Windows Server 2012

5. In the Server Manager console, from the Tools drop-down menu, click Windows PowerShell ISE.

6. In the Windows PowerShell ISE window, in the Untitled1.ps1 script pane, type the following, pressing
Enter after each line:

Import-Module ServerManager

Install-WindowsFeature WINS -ComputerName LON-SVR3


Install-WindowsFeature WINS -ComputerName LON-CORE

7. Click the Save icon.

8. Select the root of Local Disk (C:).


9. Create a new folder named Scripts, and then save the script in that folder as InstallWins.ps1.

10. To run the script, press the F5 key.

Results: After you complete this exercise, you should have used Windows PowerShell to perform a remote
installation of features on multiple servers.

 Prepare for the next module


After you finish the lab, revert the virtual machines to their initial state by completing the following steps:
1. On the host computer, switch to the Hyper-V Manager console.

2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.

3. In the Revert Virtual Machine dialog box, click Revert.


4. Repeat steps 2 and 3 for 20410D-LON-CORE and 20410D-LON-SVR3.
MCT USE ONLY. STUDENT USE PROHIBITED
L2-9

Module 2: Introduction to Active Directory Domain Services


Lab: Installing Domain Controllers
Exercise 1: Installing a Domain Controller
 Task 1: Add an Active Directory Domain Services (AD DS) role to a member server
1. On LON-DC1, in Server Manager, in the left column, click All Servers.

2. Right-click All Servers, and then click Add Servers.

3. In the Add Servers dialog box, in the Name (CN) box, type LON-SVR1, and then click Find Now.

4. Under Name, click LON-SVR1, and then click the arrow to add the server to the Selected column.

5. Click OK to close the Add Servers dialog box.

6. In Server Manager, in the Servers pane, right-click LON-SVR1, and then select Add Roles and
Features.
7. In the Add Roles and Features Wizard, click Next.

8. On the Select installation type page, ensure that Role-based or feature-based installation is
selected, and then click Next.
9. On the Select destination server page, ensure that Select a server from the server pool is
selected.

10. Under Server Pool, verify that LON-SVR1.Adatum.com is highlighted, and then click Next.
11. On the Select server roles page, select the Active Directory Domain Services check box, click Add
Features, and then click Next.

12. On the Select features page, click Next.


13. On the Active Directory Domain Services page, click Next.

14. On the Confirm installation selections page, select the Restart the destination server
automatically if required check box, and then click Install.
Installation will take several minutes.

15. When the installation completes, click Close to close the Add Roles and Features Wizard.

 Task 2: Configure a server as a domain controller


1. On LON-DC1, in Server Manager, on the command bar, click the Notifications icon (it looks like a
flag).

2. Under Post-deployment Configuration, click Promote this server to a domain controller.


The Active Directory Domain Services Configuration Wizard opens.
3. In the Active Directory Domain Services Configuration Wizard, on the Deployment Configuration
page, ensure that Add a domain controller to an existing domain is selected, and then, beside the
Domain line, click Select.

4. In the Windows Security dialog box, in the Username box, type Administrator, in the Password
box, type Pa$$w0rd, and then click OK.

5. In the Select a domain from the forest dialog box, click adatum.com, and then click OK.
6. Beside the Supply the credentials to perform this operation line, click Change.
MCT USE ONLY. STUDENT USE PROHIBITED
L2-10 Introduction to Active Directory Domain Services

7. In the Windows Security dialog box, in the Username box, type Adatum\Administrator, and in the
Password box, type Pa$$w0rd, and then click OK.

8. On the Deployment Configuration page, click Next.


9. On the Domain Controller Options page, ensure that Domain Name System (DNS) server is
selected, and then deselect Global Catalog (GC).

Note that usually, you also want to enable the global catalog, but for the purpose of this lab, this is
done in the next lab task.

10. In the Type the Directory Services Restore Mode (DSRM) password section, type Pa$$w0rd in
both text boxes, and then click Next.
11. On the DNS Options page, click Next.

12. On the Additional Options page, click Next.

13. On the Paths page, accept the default folders, and then click Next.

14. On the Review Options page, click View Script, and examine the Windows PowerShell script that
the wizard generates.

15. Close the Notepad window.


16. On the Review Options page, click Next.
17. On the Prerequisites Check page, read any warning messages, and then click Install.

18. When the task completes successfully, click Close.

19. Wait for LON-SVR1 to restart.

 Task 3: Configure a server as a global catalog server


1. Sign in to LON-SVR1 as Adatum\Administrator with the password Pa$$w0rd.

2. In Server Manager, click Tools, and then click Active Directory Sites and Services.
3. When Active Directory Sites and Services opens, expand Sites, expand Default-First-Site-Name,
expand Servers, and then expand LON-SVR1.

4. In the left column, right-click NTDS Settings, and then click Properties.
5. In the NTDS Settings Properties dialog box, select Global Catalog (GC), and then click OK.

6. Close Active Directory Sites and Services.

Results: After completing this exercise, you will have explored Server Manager and promoted a member
server to be a domain controller.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L2-11

Exercise 2: Installing a Domain Controller by Using IFM


 Task 1: Use the ntdsutil tool to generate IFM
1. On LON-DC1, in the lower-left corner of the screen, click the Start button.

2. On the Start screen, type CMD, right click Command Prompt and then click Run as administrator.
3. At a command prompt, type the following, and press Enter after each line:

Ntdsutil
Activate instance ntds
Ifm
Create sysvol full c:\ifm

4. Wait for the IFM command to complete, and then close the command prompt.

 Task 2: Add the AD DS role to the member server


1. Switch to LON-SVR2, and then, if required, sign in as Adatum\Administrator with the password
Pa$$w0rd.

2. In the lower-left corner of the screen, click the Start button.

3. On the Start screen, type CMD, and then press Enter.


4. Type the following command, and then press Enter:

Net use k: \\LON-DC1\c$\IFM

5. Switch to Server Manager.


6. From the list on the left, click Local Server.

7. In the toolbar, click Manage, and then click Add Roles and Features.

8. On the Before you begin page, click Next.


9. On the Select installation type page, ensure that Role-based or feature-based installation is
selected, and then click Next.

10. On the Select destination server page, verify that LON-SVR2.Adatum.com is highlighted, and then
click Next.

11. On the Select server roles page, click Active Directory Domain Services.

12. In the Add Roles and Features Wizard, click Add Features, and then click Next.

13. On the Select Features page, click Next.

14. On the Active Directory Domain Services page, click Next.

15. On the Confirm installation selections page, click Restart the destination server automatically if
required. Click Yes at the message box.

16. Click Install.

17. After the installation completes, click Close.

If you see a message stating that a delegation for the DNS server cannot be created, click OK.
MCT USE ONLY. STUDENT USE PROHIBITED
L2-12 Introduction to Active Directory Domain Services

 Task 3: Use IFM to configure a member server as a new domain controller


1. On LON-SVR2, at the command prompt, type the following command, and then press Enter:

Robocopy k: c:\ifm /copyall /s

2. Close the Command Prompt window.

3. In Server Manager, on the command bar, click the Notifications icon.


4. Under Post-deployment Configuration, click Promote this server to a domain controller.
The Active Directory Domain Services Configuration Wizard will open.

5. On the Deployment Configuration page, ensure that Add a domain controller to an existing
domain is selected, and then confirm that adatum.com is the target domain. Click Next.

6. On the Domain Controller Options page, ensure that both Domain Name System (DNS) server
and Global Catalog (GC) are selected. For the DSRM password, type Pa$$w0rd in both boxes, and
then click Next.

7. On the DNS Options page, click Next.

8. On the Additional Options page, select Install from media, in the Install from media path box,
type C:\ifm, and then click verify.
9. When the path has been verified, click Next.

10. On the Paths page, click Next.

11. On the Review Options page, click Next, and then observe the Active Directory Domain Services
Configuration Wizard as it performs a check for prerequisites.

12. Click Install, and then wait while AD DS is configured.


While this task is running, read the information messages that display on the screen.

13. Wait for the server to restart.

Results: After completing this exercise, you will have installed an additional domain controller for the
branch office by using IFM.

 Prepare for the next module


When you have completed the lab, revert the virtual machines to their initial state. To do this, complete
the following steps:

1. On the host computer, start Hyper-V® Manager.


2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.

3. In the Revert Virtual Machine dialog box, click Revert.

4. Repeat steps 2 and 3 for 20410D-LON-SVR1, 20410D-LON-RTR, and 20410D-LON-SVR2.


MCT USE ONLY. STUDENT USE PROHIBITED
L3-13

Module 3: Managing Active Directory Domain Services


Objects
Lab: Managing Active Directory Domain
Services Objects
Exercise 1: Delegating Administration for a Branch Office
 Task 1: Delegate administration for Branch Administrators
1. Switch to LON-DC1.

2. In Server Manager, click Tools, and then click Active Directory Users and Computers.
3. In Active Directory Users and Computers, click Adatum.com.

4. Right-click Adatum.com, point to New, and then click Organizational Unit.

5. In the New Object – Organizational Unit dialog box, in Name, type Branch Office 1, and then
click OK.

6. Right-click Branch Office 1, point to New, and then click Group.

7. In the New Object – Group dialog box, in Group name, type Branch 1 Help Desk, and then
click OK.
8. Repeat steps 6 and 7 using Branch 1 Administrators as the new group name.

9. Repeat steps 6 and 7 using Branch 1 Users as the new group name.

10. In the navigation pane, click IT.

11. In the details pane, right-click Holly Dickson, and then click Move.

12. In the Move dialog box, click Branch Office 1, and then click OK.

13. Repeat steps 10 through 12 for the following OUs and users:
o Development and the user Bart Duncan

o Managers and the user Ed Meadows

o Marketing and the user Connie Vrettos

o Research and the user Barbara Zighetti

o Sales and the user Arlene Huff

14. In the navigation pane, click Computers.


15. In the details pane, right-click LON-CL1, and then click Move.

16. In the Move dialog box, click Branch Office 1, and then click OK.

17. Switch to LON-CL1.


18. Point the mouse at the lower-right corner of the screen, and then click Settings.

19. Click Power, and then click Restart.


20. When the computer has restarted, sign in as Adatum\Administrator with the password Pa$$w0rd.

21. Switch to LON-DC1.

22. If necessary, switch to Active Directory Users and Computers.


MCT USE ONLY. STUDENT USE PROHIBITED
L3-14 Managing Active Directory Domain Services Objects

23. In the navigation pane, right-click Branch Office 1, click Delegate Control, and then click Next.

24. On the Users or Groups page, click Add.

25. In the Select Users, Computers, or Groups dialog box, in Enter the object names to select
(examples), type Branch 1 Administrators, and then click OK.

26. On the Users or Groups page, click Next.

27. On the Tasks to Delegate page, in the Delegate the following common tasks list, select the
following check boxes, and then click Next:
o Create, delete, and manage user accounts

o Reset user passwords and force password change at next logon

o Read all user information


o Create, delete and manage groups

o Modify the membership of a group

o Manage Group Policy links


28. On the Completing the Delegation of Control Wizard page, click Finish.

29. In the navigation pane, right-click Branch Office 1, click Delegate Control, and then click Next.
30. On the Users or Groups page, click Add.
31. In the Select Users, Computers, or Groups dialog box, in Enter the object names to select
(examples), type Branch 1 Administrators, and then click OK.
32. On the Users or Groups page, click Next.
33. On the Tasks to Delegate page, click Create a custom task to delegate, and then click Next.

34. On the Active Directory Object Type page, select Only the following objects in the folder, select
the following check boxes, and then click Next:
o Computer objects

o Create selected objects in this folder

o Delete selected objects in this folder


35. On the Permissions page, select both General and Full Control, and then click Next.

36. On the Completing the Delegation of Control Wizard page, click Finish.

 Task 2: Delegate a user administrator for the Branch Office Help Desk
1. On LON-DC1, in the navigation pane, right-click Branch Office 1, click Delegate Control, and then
click Next.

2. On the Users or Groups page, click Add.

3. In the Select Users, Computers, or Groups dialog box, in Enter the object names to select
(examples), type Branch 1 Help Desk, and then click OK.

4. On the Users or Groups page, click Next.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L3-15

5. On the Tasks to Delegate page, in the Delegate the following common tasks list, select the
following check boxes, and then click Next:

o Reset user passwords and force password change at next logon


o Read all user information

o Modify the membership of a group

6. On the Completing the Delegation of Control Wizard page, click Finish.

 Task 3: Add a member to the Branch Administrators


1. On LON-DC1, in the navigation pane, click Branch Office 1.

2. In the details pane, right-click Holly Dickson, and then click Add to a group.

3. In the Select Groups dialog box, in Enter the object names to select (examples), type Branch 1
Administrators, and then click OK.

4. In the Active Directory Domain Services dialog box, click OK.

5. In the details pane, right-click Branch 1 Administrators, and then click Add to a group.

6. In the Select Groups dialog box, in Enter the object names to select (examples), type Server
Operators, and then click OK.

7. In the Active Directory Domain Services dialog box, click OK.

8. On your host computer, in the 20410D-LON-DC1 window, on the Action menu, click
Ctrl+Alt+Delete.

9. On LON-DC1, click Sign out.


10. Sign in to LON-DC1 as Adatum\Holly with the password Pa$$w0rd.
You can sign in locally at a domain controller because Holly belongs indirectly to the Server
Operators domain local group.
11. On the taskbar, click the Server Manager icon.

12. In the User Account Control dialog box, in User name, type Holly. In Password, type Pa$$w0rd,
and then click Yes.

13. In Server Manager, click Tools, and then click Active Directory Users and Computers.
14. In Active Directory Users and Computers, expand Adatum.com.

15. In the navigation pane, click Sales.


16. In the details pane, right-click Aaren Ekelund, and then click Delete.

17. Click Yes to confirm.

18. Click OK to acknowledge that you do not have permissions to perform this task.
19. In the navigation pane, click Branch Office 1.

20. In the details pane, right-click Ed Meadows, and then click Delete.

21. Click Yes to confirm.

You are successful because you have the required permissions.


MCT USE ONLY. STUDENT USE PROHIBITED
L3-16 Managing Active Directory Domain Services Objects

 Task 4: Add a member to the Branch Help Desk group


1. On LON-DC1, in the details pane, right-click Bart Duncan, and then click Add to a group.

2. In the Select Groups dialog box, in Enter the object names to select (examples), type Branch 1
Help Desk, and then click OK.
3. In the Active Directory Domain Services dialog box, click OK.

4. Close Active Directory Users and Computers.

5. Close Server Manager.


6. On the desktop, click Server Manager. In the User Account Control dialog box, in User name, type
Adatum\Administrator.

7. In Password, type Pa$$w0rd, and then click Yes.

To modify the Server Operators membership list, you must have permissions beyond those available
to the Branch 1 Administrators group.

8. In Server Manager, click Tools.


9. In the Tools list, click Active Directory Users and Computers.
10. In Active Directory Users and Computers, expand Adatum.com.

11. In the navigation pane, click Branch Office 1.


12. In the details pane, right-click Branch 1 Help Desk, and then click Add to a group.

13. In the Select Groups dialog box, in Enter the object names to select (examples), type Server
Operators, and then click OK.

14. In the Active Directory Domain Services dialog box, click OK.
15. On your host computer, in the 20410D-LON-DC1 window, on the Action menu, click
Ctrl+Alt+Delete.

16. On LON-DC1, click Sign out.


17. Sign in as Adatum\Bart with the password Pa$$w0rd.

You can sign in locally at a domain controller because Bart belongs indirectly to the Server Operators
domain local group.

18. On the desktop, click Server Manager.

19. In the User Account Control dialog box, in User name, type Bart. In Password, type Pa$$w0rd,
and then click Yes.

20. In Server Manager, click Tools.

21. Click Active Directory Users and Computers.


22. In Active Directory Users and Computers, expand Adatum.com.

23. In the navigation pane, click Branch Office 1.

24. In the details pane, right-click Connie Vrettos, and then click Delete.

25. Click Yes to confirm.

You are unsuccessful because Bart lacks the required permissions.

26. Click OK.

27. Right-click Connie Vrettos, and then click Reset Password.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L3-17

28. In the Reset Password dialog box, in New password and Confirm password, type Pa$$w0rd, and
then click OK.

29. Click OK to confirm the successful password reset.


30. On your host computer, in the 20410D-LON-DC1 window, on the Action menu, click
Ctrl+Alt+Delete.

31. On LON-DC1, click Sign out.

32. Sign in to LON-DC1 as Adatum\Administrator with the password Pa$$w0rd.

Results: After completing this exercise, you will have successfully created an OU, and delegated
administration of it to the appropriate group.

Exercise 2: Creating and Configuring User Accounts in AD DS


 Task 1: Create a user template for the branch office
1. On LON-DC1, on the taskbar, click the File Explorer icon.
2. Double-click Local Disk (C:).

3. On the menu, click Home, and then click New folder.

4. Type branch1-userdata, and then press Enter.


5. Right-click branch1-userdata, and then click Properties.

6. In the branch1-userdata Properties dialog box, on the Sharing tab, click Advanced Sharing.

7. Select Share this folder, and then click Permissions.


8. In the Permissions for branch1-userdata dialog box, for the Full Control permission select the
Allow check box, and then click OK.

9. In the Advanced Sharing dialog box, click OK, and then in the branch1-userdata Properties dialog
box, click Close.

10. In Server Manager, click Tools, and then click Active Directory Users and Computers, and then
expand Adatum.com.

11. Right-click Branch Office1, point to New, and then click User.
12. In the New Object – User dialog box, in Full name, type _Branch_template.

13. In User logon name, type _Branch_template, and then click Next.

14. In Password and Confirm password, type Pa$$w0rd.


15. Select the Account is disabled check box, and then click Next.

16. Click Finish.

 Task 2: Configure the template settings


1. On LON-DC1, from within the Branch Office 1 OU, right-click _Branch_template, and then click
Properties.

2. In the _Branch_template Properties dialog box, on the Address tab, in City, type Slough.

3. Click the Member Of tab, and then click Add.


MCT USE ONLY. STUDENT USE PROHIBITED
L3-18 Managing Active Directory Domain Services Objects

4. In the Select Groups dialog box, in Enter the object names to select (examples), type Branch 1
Users, and then click OK.

5. Click the Profile tab.


6. Under Home folder, click Connect, and then in the To box, type
\\lon-dc1\branch1-userdata\%username%.

7. Click Apply, and then click OK.

 Task 3: Create a new user for the branch office, based on the template
1. On LON-DC1, right-click _Branch_template, and then click Copy.

2. In the Copy Object – User dialog box, in First name, type Ed.

3. In Last name, type Meadows.

4. In User logon name, type Ed, and then click Next.


5. In Password and Confirm password, type Pa$$w0rd.

6. Clear the User must change password at next logon check box.

7. Clear the Account is disabled check box, and then click Next.
8. Click Finish.

9. Right-click Ed Meadows, and then click Properties.

10. In the Ed Meadows Properties dialog box, on the Address tab, notice that the City is configured
already.

11. Click the Profile tab.


Notice that the home folder location is configured already.
12. Click the Member Of tab.

Notice that Ed belongs to the Branch 1 Users group. Click OK.

13. On your host computer, in the 20410D-LON-DC1 window, on the Action menu, click
Ctrl+Alt+Delete.

14. On LON-DC1, click Sign out.

 Task 4: Sign in as a user to test account settings


1. Switch to LON-CL1.
2. On your host computer, in the 20410D-LON-CL1 window, on the menu, click Ctrl+Alt+Delete.

3. On LON-CL1, click Switch User.

4. Sign in to LON-CL1 as Adatum\Ed with the password Pa$$w0rd.


5. On the Start screen, type File Explorer, and then press Enter.

6. Verify that drive Z is present.


7. Double-click Ed (\\lon-dc1\branch1-userdata) (Z:).

8. If you receive no errors, you have been successful.

9. On your host computer, in the 20410D-LON-CL1 window, on the Action menu, click
Ctrl+Alt+Delete.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L3-19

10. On LON-CL1, click Sign out.

Results: After completing this exercise, you will have successfully created and tested a user account
created from a template.

Exercise 3: Managing Computer Objects in AD DS


 Task 1: Reset a computer account
1. On LON-DC1, sign in as Adatum\Holly with the password Pa$$w0rd.

2. On the taskbar, click the Server Manager icon.


3. In the User Account Control dialog box, in User name, type Holly.

4. In Password, type Pa$$w0rd, and then click Yes.


5. In Server Manager, click Tools, and then click Active Directory Users and Computers.

6. In Active Directory Users and Computers, expand Adatum.com.

7. In the navigation pane, click Branch Office 1.


8. In the details pane, right-click LON-CL1, and then click Reset Account.
9. In the Active Directory Domain Services dialog box, click Yes, and then click OK.

 Task 2: Observe the behavior when a client logs on


1. Switch to LON-CL1.
2. Sign in as Adatum\Ed with the password Pa$$w0rd.

A message appears stating that The trust relationship between this workstation and the primary
domain failed.
3. Click OK.

 Task 3: Rejoin the domain to reconnect the computer account


1. On LON-CL1, click the back arrow, and then switch to Adatum\Administrator with the password
Pa$$w0rd.
2. On the Start screen, right-click the display, click All apps, and in the Apps list, click Control Panel.

3. In Control Panel, in the View by list, click Large icons, and then click System.

4. In the navigation list, click Advanced system settings.


5. In System Properties, click the Computer Name tab, and then click Network ID.

6. On the Select the option that describes your network page, click Next.

7. On the Is your company network on a domain? page, click Next.

8. On the You will need the following information page, click Next.
9. On the Type your user name, password, and domain name for your domain account page, in
Password, type Pa$$w0rd. Leave the other boxes completed, and then click Next.

10. In the User Account and Domain Information dialog box, click Yes.

11. On the Do you want to enable a domain user account on this computer? page, click Do not add
a domain user account, and then click Next.
MCT USE ONLY. STUDENT USE PROHIBITED
L3-20 Managing Active Directory Domain Services Objects

12. Click Finish, and then click OK.

13. In the Microsoft Windows dialog box, click Restart Now.

14. Sign in as Adatum\Ed with the password Pa$$w0rd.

You are successful because the computer had been successfully rejoined.

Results: After completing this exercise, you will have successfully reset a trust relationship.

 Prepare for the next module


When you have completed the lab, revert the virtual machines to their initial state. To do this, complete
the following steps:

1. On the host computer, start Hyper-V® Manager.

2. In the Virtual Machines list, right-click 20410D-LON-CL1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.

4. Repeat steps 2 and 3 for 20410D-LON-DC1.


MCT USE ONLY. STUDENT USE PROHIBITED
L4-21

Module 4: Automating Active Directory Domain Services


Administration
Lab: Automating AD DS Administration by
Using Windows PowerShell
Exercise 1: Creating User Accounts and Groups by Using Windows
PowerShell
 Task 1: Create a user account by using Windows PowerShell
1. On LON-DC1, on the taskbar, click the Windows PowerShell icon.

2. At the Windows PowerShell prompt, type the following command, and then press Enter:

New-ADOrganizationalUnit LondonBranch

3. Type the following command, and then press Enter:

New-ADUser -Name Ty -DisplayName "Ty Carlson" -GivenName Ty -Surname


Carlson -Path "ou=LondonBranch,dc=adatum,dc=com"

4. Type the following command, and then press Enter:

Set-ADAccountPassword Ty

5. When prompted for the current password, press Enter.


6. When prompted for the desired password, type Pa$$w0rd, and then press Enter.

7. When prompted to repeat the password, type Pa$$w0rd, and then press Enter.

8. At the Windows PowerShell prompt, type Enable-ADAccount Ty, and then press Enter.
9. On LON-CL1, sign in as Ty with the password Pa$$w0rd.

10. Verify that the sign-in is successful, and then sign out of LON-CL1.

 Task 2: Create a group by using Windows PowerShell


1. To create a new global security group for users in the London branch office, on LON-DC1, at the
Windows PowerShell prompt, type the following command, and then press Enter:

New-ADGroup LondonBranchUsers -Path


"ou=LondonBranch,dc=adatum,dc=com" -GroupScope Global -GroupCategory Security

2. To add Ty as a member of LondonBranchUsers, type the following command, and then press Enter:

Add-ADGroupMember LondonBranchUsers -Members Ty


MCT USE ONLY. STUDENT USE PROHIBITED
L4-22 Automating Active Directory Domain Services Administration

3. To confirm that Ty is now a member of LondonBranchUsers, type the following command, and then
press Enter:

Get-ADGroupMember LondonBranchUsers

Results: After completing this exercise, you will have created user accounts and groups by using Windows
PowerShell.

Exercise 2: Using Windows PowerShell to Create User Accounts in Bulk


 Task 1: Prepare the .csv file
1. On LON-DC1, on the taskbar, click the File Explorer icon.

2. In File Explorer, expand drive E:, expand Labfiles, and then click Mod04.

3. Right-click LabUsers.ps1, and then click Edit.

4. In Windows PowerShell Integrated Scripting Environment (ISE), read the comments at the top of the
script, and then identify the requirements for the header in the .csv file.

5. Close Windows PowerShell ISE.

6. In File Explorer, double-click LabUsers.csv.


7. In the How do you want to open this type of file (.csv)? message, click Notepad.

8. In Notepad, type the following line at the top of the file:


FirstName,LastName,Department,DefaultPassword
9. Click File, and then click Save.

10. Close Notepad.

 Task 2: Prepare the script


1. On LON-DC1, in File Explorer, right-click LabUsers.ps1, and then click Edit.
2. In Windows PowerShell ISE, under Variables, replace C:\path\file.csv with
E:\Labfiles\Mod04\LabUsers.csv.

3. Under Variables, replace "ou=orgunit,dc=domain,dc=com" with


"ou=LondonBranch,dc=adatum,dc=com".

4. Click File, and then click Save.

5. Scroll down, and then review the contents of the script.

6. Close Windows PowerShell ISE.

 Task 3: Run the script


1. On LON-DC1, on the taskbar, click the Windows PowerShell icon.

2. At the Windows PowerShell prompt, type cd E:\Labfiles\Mod04, and then press Enter.
3. Type .\LabUsers.ps1, and then press Enter.

4. Type the following command, and then press Enter:

Get-ADUser -Filter * -SearchBase "ou=LondonBranch,dc=adatum,dc=com"


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L4-23

5. Close Windows PowerShell.

6. On LON-CL1, sign in as Luka with the password Pa$$w0rd.

Results: After completing this exercise, you will have used Windows PowerShell to create user accounts in
bulk.

Exercise 3: Using Windows PowerShell to Modify User Accounts in Bulk


 Task 1: Force all user accounts in LondonBranch to change their passwords at next
sign in
1. On LON-DC1, on the taskbar, click the Windows PowerShell icon.

2. To create a query for user accounts in the LondonBranch OU, at the Windows PowerShell Prompt,
type the following command, and then press Enter:

Get-ADUser -Filter * -SearchBase "ou=LondonBranch,dc=adatum,dc=com" | Format-Wide


DistinguishedName

3. Verify that only users from the LondonBranch OU are listed.

4. To modify the previous command to force all user to change their password the next time they sign
in, at the Windows PowerShell prompt, type the following command, and then press Enter:

Get-ADUser -Filter * -SearchBase "ou=LondonBranch,dc=adatum,dc=com" |


Set-ADUser -ChangePasswordAtLogon $true

5. Close Windows PowerShell.

 Task 2: Configure the address for user accounts in LondonBranch


1. On LON-DC1, in Server Manager, click Tools, and then click Active Directory Administrative
Center.

2. In the Active Directory Administrative Center, in the navigation pane, expand Adatum (local), and
then double-click LondonBranch.

3. Click the Type column header to sort based on the object type.

4. Select all user accounts, right-click the user accounts, and then click Properties.

5. In the Multiple Users pane, under Organization, select the Address check box.

6. In the Street box, type Branch Office.

7. In the City box, type London.

8. In the Country/Region box, click United Kingdom, and then click OK.

9. Close the Active Directory Administrative Center.

Results: After completing this exercise, you will have modified user accounts in bulk.
MCT USE ONLY. STUDENT USE PROHIBITED
L4-24 Automating Active Directory Domain Services Administration

 Prepare for the next module


When you finish the lab, revert all virtual machines to their initial state by performing the following steps:

1. On the host computer, start Hyper-V® Manager.

2. In the Virtual Machines list, right-click 20410D-LON-CL1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.

4. Repeat steps 2 and 3 for 20410D-LON-DC1.


MCT USE ONLY. STUDENT USE PROHIBITED
L5-25

Module 5: Implementing IPv4


Lab: Implementing IPv4
Exercise 1: Identifying Appropriate Subnets
 Task 1: Calculate the bits required to support the hosts on each subnet
1. How many bits are required to support 100 hosts on the client subnet?

Answer: Seven bits are required to support 100 hosts on the client subnet (27-2=126, 26-2=62).

2. How many bits are required to support 10 hosts on the server subnet?
Answer: Four bits are required to support 10 hosts on the server subnet (24-2=14, 23-2=6).
3. How many bits are required to support 40 hosts on the future expansion subnet?

Answer: Six bits are required to support 40 hosts on the future expansion subnet (26-2=62, 25-2=30).
4. If all subnets are the same size, can they be accommodated?

Answer: No. If all subnets are the same size, then all subnets must use 7 bits to support 126 hosts.
Only a single class C–sized address with 254 hosts has been allocated. Three subnets of 126 hosts
would not fit.
5. Which feature allows a single network to be divided into subnets of varying sizes?

Answer: Variable length subnet masking allows you to define different subnet masks when
subnetting. Therefore, variable length subnet masking allows you to have subnets of varying sizes.
6. How many host bits will you use for each subnet? Use the simplest allocation possible, which is one
large subnet and two equal-sized, smaller subnets.

Answer: The client subnet is 7 host bits. This allocation can accommodate up to 126 hosts and uses
half of the allocated address pool.

The server and future expansion subnets are 6-host bits. This can accommodate up to 62 hosts on
each subnet and uses the other half of the address pool.

 Task 2: Calculate subnet masks and network IDs


1. Given the number of host bits allocated, what is the subnet mask that you will use for the client
subnet? Calculate the subnet mask in binary and decimal.
o The client subnet is using 7 bits for the host ID. Therefore, you can use 25 bits for the subnet
mask.

Binary Decimal

11111111.11111111.11111111.10000000 255.255.255.128
MCT USE ONLY. STUDENT USE PROHIBITED
L5-26 Implementing IPv4

2. Given the number of host bits allocated, what is the subnet mask that you can use for the server
subnet? Calculate the subnet mask in binary and decimal.

o The server subnet is using 6 bits for the host ID. Therefore, you can use 26 bits for the subnet
mask.

Binary Decimal

11111111.11111111.11111111.11000000 255.255.255.192

3. Given the number of host bits allocated, what is the subnet mask that you can use for the future
expansion subnet? Calculate the subnet mask in binary and decimal.

o The future expansion subnet is using 6 bits for the host ID. Therefore, you can use 26 bits for the
subnet mask.

Binary Decimal

11111111.11111111.11111111.11000000 255.255.255.192

4. For the client subnet, define the network ID, first available host, last available host, and broadcast
address. Assume that the client subnet is the first subnet allocated from the available address pool.
Calculate the binary and decimal versions of each address.

In the following table, the bits in bold are part of the network ID.

Description Binary Decimal

Network ID 11000000.10101000.01100010.00000000 192.168.98.0

First host 11000000.10101000.01100010.00000001 192.168.98.1

Last host 11000000.10101000.01100010.01111110 192.168.98.126

Broadcast 11000000.10101000.01100010.01111111 192.168.98.127

5. For the server subnet, define the network ID, first available host, last available host, and broadcast
address. Assume that the server subnet is the second subnet allocated from the available address
pool. Calculate the binary and decimal versions of each address.
In the following table, the bits in bold are part of the network ID.

Description Binary Decimal

Network ID 11000000.10101000.1100010.10000000 192.168.98.128

First host 11000000.10101000.1100010.10000001 192.168.98.129

Last host 11000000.10101000.1100010.10111110 192.168.98.190

Broadcast 11000000.10101000.1100010.10111111 192.168.98.191


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L5-27

6. For the future allocation subnet, define the network ID, first available host, last available host, and
broadcast address. Assume that the future allocation subnet is the third subnet allocated from the
available address pool. Calculate the binary and decimal versions of each address.

In the following table, the bits in bold are part of the network ID.

Description Binary Decimal

Network ID 11000000.10101000.1100010.11000000 192.168.98.192

First host 11000000.10101000.1100010.11000001 192.168.98.193

Last host 11000000.10101000.1100010.11111110 192.168.98.254

Broadcast 11000000.10101000.1100010.11111111 192.168.98.255

Results: After completing this exercise, you should have identified a configuration of subnet that will
meet the requirements of the lab scenario.

Exercise 2: Troubleshooting IPv4


 Task 1: Prepare for troubleshooting
1. On LON-SVR2, on the taskbar, click the Windows PowerShell icon.
2. At the Windows PowerShell® prompt, type the following cmdlet, and then press Enter:

Test-NetConnection LON-DC1

3. Verify that you receive a reply that contains PingSucceded:True from LON-DC1.

4. Open a File Explorer window, and then browse to \\LON-DC1\E$\Labfiles\Mod05.


5. Right-click Break2.ps1, and then click Run with PowerShell.

This script creates the problem that you will troubleshoot and repair in the next task.

6. Close File Explorer.

 Task 2: Troubleshoot IPv4 connectivity between LON-SVR2 and LON-DC1


1. On LON-SVR2, at the Windows PowerShell prompt, type the following, and then press Enter:

Test-NetConnection LON-DC1

2. Verify that you receive a reply that contains PingSucceded:False from LON-DC1.

3. At the Windows PowerShell prompt, type the following, and then press Enter:

Test-NetConnection –TraceRoute LON-DC1

Notice that the host is unable to find the default gateway, and that the following warning message
appears: “Name resolution of lon-dc1 failed – Status: HostNotFound.”
MCT USE ONLY. STUDENT USE PROHIBITED
L5-28 Implementing IPv4

4. At the Windows PowerShell prompt, type the following, and then press Enter:

Get-NetRoute

Notice that the default route and the default gateway information is missing in the routing table.
You should not be able to locate DestinationPrefix 0.0.0.0/0 and NextHop 10.10.0.1.

5. At the Windows PowerShell prompt, type the following, and then press Enter:

Test-NetConnection 10.10.0.1

6. Notice that the default gateway is responding by verifying that you receive a reply that contains
PingSucceded:True from 10.10.0.1.

7. At the Windows PowerShell prompt, type the following, and then press Enter:

New-NetRoute –InterfaceAlias “Ethernet” –DestinationPrefix 0.0.0.0/0 –NextHop


10.10.0.1

The New-NetRoute cmdlet will create the default route and the default gateway information that
was missing.
8. At the Windows PowerShell prompt, type the following, and then press Enter:

Get-NetRoute

9. Notice that the default route and the default gateway information is present in the routing table by
locating DestinationPrefix 0.0.0.0/0 and NextHop 10.10.0.1.
10. At the Windows PowerShell prompt, type the following, and then press Enter:

Test-NetConnection LON-DC1

11. Verify that you receive a reply that contains PingSucceded:True from LON-DC1.

Results: After completing this lab, you should have resolved an IPv4 connectivity problem.

 Prepare for the next module


After you finish the lab, revert the virtual machines back to their initial state by completing the following
steps:

1. On the host computer, start Hyper-V Manager.


2. In Microsoft® Hyper-V® Manager, in the Virtual Machines list, right-click 20410D-LON-DC1, and
then click Revert.

3. In the Revert Virtual Machine dialog box, click Revert.


4. Repeat steps 2 and 3 for 20410D-LON-RTR and 20410D-LON-SVR2.
MCT USE ONLY. STUDENT USE PROHIBITED
L6-29

Module 6: Implementing Dynamic Host Configuration


Protocol
Lab: Implementing DHCP
Exercise 1: Implementing DHCP
 Task 1: Install the Dynamic Host Configuration Protocol (DHCP) server role
1. Sign in to LON-SVR1 as Adatum\Administrator with the password Pa$$w0rd.

2. In Server Manager, click Add roles and features.


3. In the Add Roles and Features Wizard, click Next.

4. On the Select installation type page, click Next.

5. On the Select destination server page, click Next.


6. On the Select server roles page, select the DHCP Server check box.

7. In the Add Roles and Features Wizard, click Add Features, and then click Next.

8. On the Select features page, click Next.


9. On the DHCP Server page, click Next.

10. On the Confirm installation selections page, click Install.

11. On the Installation progress page, wait until the “Installation succeeded on
LON-SVR1.Adatum.com” message appears, and then click Close.

 Task 2: Configure the DHCP scope and options


1. In the Server Manager Dashboard, click Tools, and then click DHCP.

2. In the DHCP console, expand and then right-click lon-svr1.adatum.com, and then click Authorize.
3. In the DHCP console, right-click lon-svr1.adatum.com, and then click Refresh.

Notice that the icons next to IPv4 IPv6 changes color from red to green, which means that the DHCP
server has been authorized in Active Directory® Domain Services (AD DS).
4. In the DHCP console, in the navigation pane, click lon-svr1.adatum.com, expand and right-click
IPv4, and then click New Scope.

5. In the New Scope Wizard, click Next.

6. On the Scope Name page, in the Name box, type Branch Office, and then click Next.
7. On the IP Address Range page, complete the page using the following information, and then click
Next:

o Start IP address: 172.16.0.100

o End IP address: 172.16.0.200

o Length: 16

o Subnet mask: 255.255.0.0

8. On the Add Exclusions and Delay page, complete the page using the following information:

o Start IP address: 172.16.0.190


o End IP address: 172.16.0.200
MCT USE ONLY. STUDENT USE PROHIBITED
L6-30 Implementing Dynamic Host Configuration Protocol

9. Click Add, and then click Next.

10. On the Lease Duration page, click Next.

11. On the Configure DHCP Options page, click Next.

12. On the Router (Default Gateway) page, in the IP address box, type 172.16.0.1, click Add, and then
click Next.

13. On the Domain Name and DNS Servers page, click Next.
14. On the WINS Servers page, click Next.

15. On the Activate Scope page, click Next.

16. On the Completing the New Scope Wizard page, click Finish.

 Task 3: Configure the client to use DHCP, and then test the configuration
1. Sign in to 20410D-LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.
2. On the Start page, type Control Panel, and then press Enter.

3. In Control Panel, under Network and Internet, click View Network Status and Tasks.

4. In the Network and Sharing Center window, click Change adapter settings.
5. In the Network Connections window, right-click Ethernet, and then click Properties.

6. In the Ethernet Properties window, click Internet Protocol Version 4 (TCP/IPv4), and then click
Properties.
7. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, select the Obtain an IP
address automatically radio button, select the Obtain DNS server address automatically radio
button, click OK, and then click Close.

8. Right-click the Start button, and then click Command Prompt.

9. In the Command Prompt window, at the command prompt, type the following, and then press Enter:

ipconfig /renew

10. To test the configuration and verify that LON-CL1 has received an IP address from the DHCP scope, at
a command prompt, type the following, and then press Enter:

ipconfig /all

This command returns information such as IP address, subnet mask, and DHCP enabled status, which
should be Yes.

 Task 4: Configure a lease as a reservation


1. In the Command Prompt window, at a command prompt, type the following, and then press Enter:

ipconfig /all

2. Write down the Physical Address of LON-CL1 network adapter.

3. Switch to LON-SVR1.
4. In the Server Manager dashboard, click Tools, and then click DHCP.

5. In the DHCP console, expand lon-svr1.adatum.com, expand IPv4, expand Scope [172.16.0.0]
Branch Office, select and then right-click Reservations, and then click New Reservation.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L6-31

6. In the New Reservation window:

o In the Reservation Name field, type LON-CL1.

o In the IP address field, type 172.16.0.155.

o In the MAC address field, type the physical address you wrote down in step 2.

o Click Add, and then click Close.

7. Switch to LON-CL1.

8. In the Command Prompt window, at a command prompt, type the following, and then press Enter:

ipconfig /release

This causes LON-CL1 to release any currently leased IP addresses.

9. At a command prompt, type the following, and then press Enter:

ipconfig /renew

This causes LON-CL1 to lease any reserved IP addresses.


10. Verify that the IP address of LON-CL1 is now 172.16.0.155.

Results: After completing this exercise, you should have implemented DHCP, configured DHCP scope and
options, and configured a DHCP reservation.

 Prepare for the optional exercise


If you are going to complete the optional lab, revert the 20410D-LON-CL1 and 20410D-LON-SVR1 virtual
machines by performing the following steps:
1. On the host computer, start Hyper-V Manager.

2. In the Virtual Machines list, right-click 20410D-LON-CL1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.
4. Repeat steps 1 through 3 for 20410D-LON-SVR1.

5. Start 20410D-LON-SVR1.

Exercise 2: Implementing a DHCP Relay Agent (Optional Exercise)


 Task 1: Install a DHCP relay agent
1. Sign in to LON-RTR as Adatum\Administrator with the password Pa$$w0rd.

2. In Server Manager, click Tools, and then click Routing and Remote Access.
3. Add the DHCP relay agent to the router on LON-RTR by performing the following steps:

a. In the navigation pane, expand LON-RTR (local), expand IPv4, right-click General, and then
click New Routing Protocol.
b. In the Routing protocols list, click DHCP Relay Agent, and then click OK.
MCT USE ONLY. STUDENT USE PROHIBITED
L6-32 Implementing Dynamic Host Configuration Protocol

 Task 2: Configure a DHCP relay agent


1. In the navigation pane, right-click DHCP Relay Agent, and then click New Interface.

2. In the New Interface for DHCP Relay Agent dialog box, click Ethernet 2, and then click OK.

3. In the DHCP Relay Agent Properties – Ethernet 2 Properties dialog box, click OK.

4. Right-click DHCP Relay Agent, and then click Properties.

5. In the DHCP Relay Agent Properties dialog box, in the Server address box, type 172.16.0.11, click
Add, and then click OK.
6. Close Routing and Remote Access.

 Task 3: Test the DHCP relay agent with a client


To test how a client receives an IP address from the DHCP relay agent in another subnet, you need to
create another DHCP scope.
1. Sign in to LON-SVR1 as Adatum\Administrator with the password Pa$$w0rd.

2. From the desktop, right-click the PowerShell icon and select Run as administrator.

3. At a Windows PowerShell command prompt, type the following, pressing Enter after each line:

Add-WindowsFeature -IncludeManagementTools dhcp

netsh dhcp add securitygroups


Restart-service dhcpserver
Add-DhcpServerInDC LON-SVR1 172.16.0.11
Add-DhcpServerv4Scope –Name "Branch Office 2" –StartRange 10.10.0.100 –EndRange
10.10.0.200 –SubnetMask 255.255.0.0
Add-Dhcpserverv4ExclusionRange –ScopeID 10.10.0.0 –StartRange 10.10.0.190 –EndRange
10.10.0.200
Set-DhcpServerv4OptionValue –Router 10.10.0.1
Set-DhcpServerv4Scope –ScopeID 10.10.0.0 –State Active

4. To test the client, switch to LON-CL2.


5. On the Start screen, type Control Panel, and then press Enter.

6. Under Network and Internet, click View network status and tasks.

7. In the Network and Sharing Center window, click Change Adapter Settings, right-click Ethernet,
and then click Properties.

8. In the Ethernet Properties window, click Internet Protocol Version 4 (TCP/IPv4) and then click
Properties.

9. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, click Obtain an IP address
automatically, click Obtain DNS server address automatically, click OK, and then click Close.

10. Right-click the Start button and then click Command Prompt.
11. In the Command Prompt window, at a command prompt, type the following, and then press Enter:

ipconfig /renew
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L6-33

12. Verify that IP address and DNS server settings on LON-CL2 are obtained from DHCP Server scope
Branch Office 2, installed on LON-SVR1.

The IP address should be in the following range: 10.10.0.100/16 to 10.10.0.200/16.

Results: After completing this exercise, you should have implemented a DHCP relay agent.

 Prepare for the next module


After you finish the lab, revert the virtual machines to their initial state by completing the following steps:

1. On the host computer, start Hyper-V Manager.


2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.

3. In the Revert Virtual Machine dialog box, click Revert.


4. Repeat steps 2 and 3 for 20410D-LON-SVR1, 20410D-LON-RTR, and 20410D-LON-CL2.
MCT USE ONLY. STUDENT USE PROHIBITED
MCT USE ONLY. STUDENT USE PROHIBITED
L7-35

Module 7: Implementing DNS


Lab: Implementing DNS
Exercise 1: Installing and Configuring DNS
 Task 1: Configure LON-SVR1 as a domain controller without installing the Domain
Name System (DNS) server role
1. On LON-SVR1, in the Server Manager console, click Add roles and features.

2. On the Before you begin page, click Next.

3. On the Select installation type page, click Next.

4. On the Select destination server page, ensure that LON-SVR1.Adatum.com is selected, and then
click Next.

5. On the Select server roles page, select Active Directory Domain Services.

6. When Add Roles and Features Wizard appears, click Add Features, and then click Next.
7. On the Select features page, click Next.

8. On the Active Directory Domain Services page, click Next.


9. On the Confirm installation selections page, click Install.

10. On the Installation progress page, when the Installation succeeded message appears, click Close.

11. In the Server Manager console, on the navigation page, click AD DS.

12. On the title bar where Configuration required for Active Directory Domain Services at
LON-SVR1 is visible, click More.

13. On the All Server Task Details and Notifications page, click Promote this server to a domain
controller.
14. In the Active Directory Domain Services Configuration Wizard, on the Deployment Configuration
page, ensure that Add a domain controller to an existing domain is selected, and then click Next.
15. On the Domain Controller Options page, clear the Domain Name System (DNS) server check box,
and leave the Global Catalog (GC) check box selected.

16. Type Pa$$w0rd in both text fields, and then click Next.

17. On the Additional Options page, click Next.

18. On the Paths page, click Next.

19. On the Review Options page, click Next.

20. On the Prerequisites Check page, click Install.

21. On the You’re about to be signed out app bar, click Close.

The LON-SVR1 server automatically restarts as part of the procedure.

22. After LON-SVR1 restarts, sign in as Adatum\Administrator with the password Pa$$w0rd.
MCT USE ONLY. STUDENT USE PROHIBITED
L7-36 Implementing DNS

 Task 2: Review configuration settings on the existing DNS server to confirm root
hints
1. On LON-DC1, in the DNS Manager console, click and then right-click LON-DC1, and then click
Properties.

2. In the LON-DC1 Properties dialog box, click the Root hints tab. Ensure that root hints servers
display.
3. Click the Forwarders tab. Ensure that the list displays no entries, and that the Use root hints if no
forwarders are available option is selected.

4. Click Cancel.

5. Close the DNS Manager console.

6. In the taskbar, click the Windows PowerShell icon.

7. In Windows PowerShell, type the following cmdlets, press Enter after each, and observe the output
returned:

Get-DnsServerRootHint
Get-DnsServerForwarder

Note that both cmdlets are the respective Windows PowerShell equivalents of the DNS Console
actions performed in steps 2 and 3 above.

 Task 3: Add the DNS server role for the branch office on the domain controller
1. On LON-SVR1, in the Server Manager console, click Add roles and features.
2. On the Before you begin page, click Next.

3. On the Select installation type page, click Next.

4. On the Select destination server page, ensure that LON-SVR1.Adatum.com is selected, and then
click Next.
5. On the Select server roles page, select DNS Server.

6. When the Add Roles and Features Wizard appears, click Add Features, and then click Next.

7. On the Select Features page, click Next.


8. On the DNS Server page, click Next.

9. On the Confirm installation selections page, click Install.

10. On the Installation progress page, when the “Installation succeeded” message appears, click Close.

 Task 4: Verify replication of the Adatum.com Active Directory–integrated zone


1. On LON-SVR1, in the Server Manager console, click Tools.

2. On the list of tools, click DNS.

3. In the DNS Manager console, expand LON-SVR1, and then expand Forward Lookup Zones.
This container is probably empty.

4. Switch back to Server Manager, click Tools, and then click Active Directory Sites and Services.

5. In the Active Directory Sites and Services console, expand Sites, expand Default-First-Site-Name,
expand Servers, expand LON-DC1, and then click NTDS Settings.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L7-37

6. In the right pane, right-click the LON-SVR1 replication connection, and select Replicate Now.

Note: If you receive an error message, proceed to the next step, and then retry this step
after three to four minutes. If this retry fails, wait a few more minutes, and then try again.

7. In the navigation pane, expand LON-SVR1, and then click NTDS Settings.

8. In the right pane, right-click the LON-DC1 replication connection, click Replicate Now, and then
click OK.
9. Switch back to the DNS Manager console, right-click Forward Lookup Zones, and then click
Refresh.

10. Ensure that both the _msdcs.Adatum.com and Adatum.com containers display.
11. Close DNS Manager.

 Task 5: Create and configure Contoso.com zone on LON-DC1


1. On the LON-DC1 virtual machine, in the Server Manager console, click Tools, and then click DNS.

2. Expand LON-DC1, right-click Forward Lookup Zones, and then select New Zone.

3. In the New Zone Wizard, on the Welcome to the New Zone Wizard page, click Next.
4. On the Zone Type page, clear the Store the zone in Active Directory check box, and then click
Next.
5. On the Zone Name page, type Contoso.com, and then click Next.

6. On the Zone File page, click Next.

7. On the Dynamic Update page, click Next.


8. On the Completing the New Zone Wizard page, click Finish.

9. Expand Forward Lookup Zones, and then select and right-click contoso.com zone, and click New
Host (A or AAAA).
10. In the New Host window, in the Name textbox type www.

11. In the IP address box, type 172.16.0.100.

12. Click Add Host.


13. Click OK, and then click Done.

14. Leave the DNS Manager console open.

 Task 6: Use Windows PowerShell commands to test non-local resolution


1. On LON-SVR1, on the taskbar, click the Windows PowerShell icon.
2. In Windows PowerShell, type the following cmdlet, and then press Enter:

Get-DnsClient

3. Note the entries labeled Ethernet in the InterfaceAlias column. In the Interface Index column, note
the Interface Index number that is in the same row as Ethernet and IPv4. Write this number here:

4. In Windows PowerShell, type the following cmdlet, where X is the specific Interface Index number you
wrote down in the last step, and then press Enter:

Set-DnsClientServerAddress –InterfaceIndex X –ServerAddress 127.0.0.1


MCT USE ONLY. STUDENT USE PROHIBITED
L7-38 Implementing DNS

5. In Windows PowerShell, type the following, and then press Enter:

Resolve-DNSName www.contoso.com

You should receive an error message in red text. This is expected.

6. In Windows PowerShell, type the following, and then press Enter:

nslookup

7. At the nslookup > prompt, type the following, and then press Enter:

www.contoso.com

You should see the following reply:


“Server: localhost
Address: 127.0.0.1
DNS request timed out.
timeout was 2 seconds.
DNS request timed out.
timeout was 2 seconds.
*** Request to localhost timed-out.”
8. Type the following, and then press Enter:

Exit

9. Leave the Windows PowerShell window open.

 Task 7: Configure Internet name resolution to forward to the head office


1. At the Windows PowerShell prompt, type the following cmdlet, and then press Enter:

Set-DnsServerForwarder –IPAddress '172.16.0.10' –PassThru

2. At the Windows PowerShell prompt, type the following two cmdlets, and press Enter after each one:

Stop-Service DNS
Start-Service DNS

 Task 8: Use Windows PowerShell to confirm name resolution


1. Sign in to LON-SVR1 as Adatum\Administrator with the password Pa$$w0rd.

2. On LON-SVR1, switch to a Windows PowerShell window.


3. Type the following cmdlet, and then press Enter:

nslookup www.contoso.com

Ensure that you receive an IP address for this host as a non-authoritative answer.

4. Close Windows PowerShell.

Results: After completing this exercise, you should have installed and configured DNS on 20410D-
LON-SVR1.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L7-39

Exercise 2: Creating Host Records in DNS


 Task 1: Configure a client to use LON-SVR1 as a DNS server
1. On LON-CL1, sign in as Adatum\Administrator with the password Pa$$w0rd.

2. On the Start screen, type Control Panel, and then press Enter.
3. In Control Panel, click View network status and tasks.

4. Click Change adapter settings.

5. Right-click Ethernet, and then click Properties.


6. In the Ethernet Properties dialog box, click Internet Protocol Version 4 (TCP/Ipv4), and then click
Properties.

7. In the preferred DNS server box, overwrite the IP address for preferred DNS server with
172.16.0.11, click OK, and then click Close.

 Task 2: Create several host records for web apps in the Adatum.com domain
1. On LON-DC1, in the Server Manager console, click Tools, and then click DNS.
2. In the DNS Manager console, expand LON-DC1, expand Forward Lookup Zones, and then click
Adatum.com.

3. Right-click Adatum.com, and then click New Host (A or AAAA).


4. In the New Host window, configure the following settings:
o Name: www

o IP address: 172.16.0.200

5. Click Add Host, and then click OK.


6. In the New Host window, configure the following settings:

o Name: ftp

o IP address: 172.16.0.201
7. Click Add Host, click OK, and then click Done.

 Task 3: Verify replication of new records to LON-SVR1


1. On LON-SVR1, in the Server Manager console, click Tools, and then click DNS.

2. In the DNS Manager console, expand LON-SVR1, expand Forward Lookup Zones, and then click
Adatum.com.

3. Ensure that both www and ftp resource records display. It might take several minutes for the records
to display.

Note: If the www and ftp resource records do not display within several minutes,
right-click Adatum.com, and then click Refresh.
MCT USE ONLY. STUDENT USE PROHIBITED
L7-40 Implementing DNS

 Task 4: Use the ping command to locate new records from LON-CL1
1. On LON-CL1, on the taskbar, right-click the Windows icon, and then click Run.

2. In the Run pop-up window, in the Open text box, type cmd, and then press Enter.

3. In the Command Prompt window, at a command prompt, type the following, and then press Enter:

ping www.adatum.com

4. Ensure that the name resolves to 172.16.0.200.

You will not receive replies.

5. At a command prompt, type the following, and then press Enter:

ping ftp.adatum.com

6. Ensure that name resolves to 172.16.0.201.


You will not receive replies.

7. Leave the Command Prompt window open.

Results: After completing this exercise, you should have configured DNS records.

Exercise 3: Managing the DNS Server Cache


 Task 1: Use the ping command to locate an Internet record from LON-CL1
1. On LON-CL1, in the Command Prompt window, at a command prompt, type the following, and then
press Enter:

ping www.contoso.com

2. Ping does not work. Ensure that the name resolves to the IP address 172.16.0.100.
3. Leave the Command Prompt window open.

 Task 2: Update an Internet record to point to the LON-DC1 IP address


1. On LON-DC1, open DNS Manager.

2. In the DNS Manager console, expand LON-DC1, expand Forward Lookup Zones, and then click
contoso.com.
3. In the right pane, right-click www, and then click Properties.

4. Change the IP address to 172.16.0.10, and then click OK.

5. Switch back to LON-CL1.


6. In the Command Prompt window, at a command prompt, type the following, and then press Enter:

ping www.contoso.com

Note that ping does not work, and that the old IP address (which is 172.16.0.100) is still displayed.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L7-41

 Task 3: Examine the content of the DNS cache


1. Switch to LON-SVR1.

2. In the Server Manager console, click Tools, and then click DNS.

3. Click LON-SVR1, click the View menu, and then click Advanced.

4. Expand LON-SVR1, expand the Cached Lookups node, expand .(root), expand com, and then click
contoso.

5. In the right pane, examine the cached content and note that the www record has the IP address:
172.16.0.100.
6. Switch to LON-CL1.

7. In the Command Prompt window, at a command prompt, type the following, and then press Enter:

ipconfig /displaydns

8. Look for cached entries, and notice that www.contoso.com is resolving to 172.16.0.100.

 Task 4: Clear the cache, and retry the ping command


1. On LON-SVR1, on the taskbar, click the Windows PowerShell icon.

2. At the Windows PowerShell prompt, type Clear-DNSServerCache, and then press Enter.
3. Type y, and then press Enter.

4. Switch to LON-CL1.

5. In a Command Prompt window, at a command prompt, type the following, and then press Enter:

ping www.contoso.com

The result still returns the old IP address.


6. In the Command Prompt window, at a command prompt, type the following, and then press Enter:

ipconfig /flushdns

7. In the Command Prompt window, type the following, and then press Enter:

ping www.contoso.com

Ping now should work on address 172.16.0.10.

Results: After completing this exercise, you should have examined the DNS server cache.

 Prepare for the next module


After you finish the lab, revert the virtual machines to their initial state.

1. On the host computer, start Hyper-V Manager.


2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.

3. In the Revert Virtual Machine dialog box, click Revert.


4. Repeat steps 2 and 3 for 20410D-LON-SVR1 and 20410D-LON-CL1.
MCT USE ONLY. STUDENT USE PROHIBITED
MCT USE ONLY. STUDENT USE PROHIBITED
L8-43

Module 8: Implementing IPv6


Lab: Implementing IPv6
Exercise 1: Configuring an IPv6 Network
 Task 1: Verify IPv4 routing
1. On LON-SVR2, on the taskbar, click the Windows PowerShell icon.

2. At the Windows PowerShell prompt, type ping lon-dc1, and then press Enter.

Notice that there are four replies from 172.16.0.10.

3. Type ipconfig, and then press Enter.

Verify that the only IPv6 address listed is a link-local address that cannot be routed.

4. Type Get-NetIPAddress, and then press Enter.

Notice that Get-NetIPAddress cmdlet returns a link-local IPv6 address.

 Task 2: Disable IPv6 on LON-DC1


1. On LON-DC1, in Server Manager, click Local Server.

2. In the local server's Properties pane, next to Ethernet, click 172.16.0.10, IPv6 enabled.
3. In the Network Connections dialog box, right-click Ethernet, and then click Properties.

4. In the Ethernet Properties dialog box, clear the Internet Protocol Version 6 (TCP/IPv6) check box,
and then click OK.
5. Close the Network Connections dialog box.

6. In Server Manager, verify that Ethernet lists only 172.16.0.10. You may need to refresh the view.

LON-DC1 is now an IPv4-only host.

 Task 3: Disable IPv4 on LON-SVR2


1. On LON-SVR2, in Server Manager, click Local Server.
2. In the local server's Properties pane, next to Ethernet, click 10.10.0.11, IPv6 enabled.

3. In the Network Connections dialog box, right-click Ethernet, and then click Properties.

4. In the Ethernet Properties dialog box, clear the Internet Protocol Version 4 (TCP/IPv4) check box,
and then click OK.

5. Close the Network Connections dialog box.

6. In Server Manager, verify that Ethernet now lists only IPv6 enabled. You may need to refresh the
view.

LON-SVR2 is now an IPv6-only host.


MCT USE ONLY. STUDENT USE PROHIBITED
L8-44 Implementing IPv6

 Task 4: Configure an IPv6 network on LON-RTR


1. On LON-RTR, on the taskbar, click the Windows PowerShell icon.

2. Configure a network address that will be used on the IPv6 network. At the Windows PowerShell
prompt, type the following cmdlet, and then press Enter:

New-NetRoute -InterfaceAlias " Ethernet 2" -DestinationPrefix


2001:db8:0:1::/64 -Publish Yes

3. Allow clients to obtain the IPv6 network address automatically from LON-RTR. At the Windows
PowerShell prompt, type the following cmdlet, and then press Enter:

Set-NetIPInterface -InterfaceAlias "Ethernet 2" -AddressFamily IPv6 -Advertising


Enabled

4. Type ipconfig, and then press Enter.

Notice that Ethernet 2 now has an IPv6 address on the 2001:db8:0:1::/64 network. This address is used
for communication on the IPv6-only network.

 Task 5: Verify IPv6 on LON-SVR2


1. On LON-SVR2, on the taskbar, click the Windows PowerShell icon.

2. At the Windows PowerShell prompt, type ipconfig, and then press Enter.
Notice that the Ethernet now has an IPv6 address on the 2001:db8:0:1::/64 network. The network
address was obtained from the router through stateless configuration.

Results: After completing the exercise, you will have configured an IPv6-only network.

Exercise 2: Configuring an ISATAP Router


 Task 1: Add an ISATAP host record to DNS
1. On LON-DC1, in Server Manager, click Tools, and then click DNS.

2. In DNS Manager, expand LON-DC1, expand Forward Lookup Zones, and then click Adatum.com.

3. Right-click Adatum.com, and then click New Host (A or AAAA).

4. In the New Host window, in the Name box, type ISATAP.

5. In the IP address box, type 172.16.0.1, and then click Add Host. ISATAP clients resolve this host
name to find the ISATAP router.

6. Click OK to clear the success message.

7. Click Done to close the New Host window.


8. Close DNS Manager.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L8-45

 Task 2: Enable the ISATAP router on LON-RTR


1. On LON-RTR, configure the IP address of the Ethernet adapter as the ISATAP router. At the Windows
PowerShell prompt, type the following cmdlet, and then press Enter:

Set-NetIsatapConfiguration -Router 172.16.0.1

2. Type the following command, and then press Enter:

Get-NetIPAddress | Format-Table InterfaceAlias,InterfaceIndex,IPv6Address

3. Record the InterfaceIndex of the ISATAP interface that has an IPv6 address that includes 172.16.0.1.

Interface index:

4. Type the following command, and then press Enter:

Get-NetIPInterface -InterfaceIndex IndexYouRecorded -PolicyStore ActiveStore |


Format-List

5. Verify that Forwarding is enabled for the interface and that Advertising is disabled.

6. The ISATAP interface for an ISATAP router must have forwarding enabled and advertising enabled.
Type the following command, and then press Enter:

Set-NetIPInterface -InterfaceIndex IndexYouRecorded -Advertising Enabled

7. Create a new IPv6 network that will be used for the ISATAP network. Type the following command,
and then press Enter:

New-NetRoute -InterfaceIndex IndexYouRecorded -DestinationPrefix


2001:db8:0:2::/64 -Publish Yes

8. View the IP address configuration for the ISATAP interface. Type the following command, and then
press Enter:

Get-NetIPAddress -InterfaceIndex IndexYouRecorded

9. Verify that an IPv6 address is listed on the 2001:db8:0:2::/64 network.

 Task 3: Remove ISATAP from the Global Query Block List


1. On LON-DC1, at the Windows PowerShell prompt, type the following command, and then press
Enter:

dnscmd /config /globalqueryblocklist wpad

2. At the Windows PowerShell prompt, type Restart-Service DNS -Verbose, and then press Enter.

3. Type ping isatap, and then press Enter.

The name should resolve, and you should receive four replies from 172.16.0.1.

 Task 4: Enable LON-DC1 as an ISATAP client


1. On LON-DC1, at the Windows PowerShell prompt, type the following command, and then press
Enter:

Set-NetIsatapConfiguration -State Enabled


MCT USE ONLY. STUDENT USE PROHIBITED
L8-46 Implementing IPv6

2. Type ipconfig, and then press Enter.

3. Verify that the Tunnel adapter for ISATAP has an IPv6 address on the 2001:db8:0:2/64 network.

Notice that this address includes the IPv4 address of LON-DC1.

 Task 5: Test connectivity


1. On LON-SVR2, at the Windows PowerShell prompt, type the following command, and then press
Enter:

ping 2001:db8:0:2:0:5efe:172.16.0.10

2. In Server Manager, if necessary, click Local Server.

3. In the local server's Properties pane, next to Ethernet, click IPv6 enabled.
4. In the Network Connections dialog box, right-click Ethernet, and then click Properties.

5. In the Ethernet Properties dialog box, click Internet Protocol Version 6 (TCP/IPv6), and then click
Properties.
6. In the Internet Protocol Version 6 (TCP/IPv6) Properties dialog box, click Use the following DNS
server addresses.
7. In the Preferred DNS server box, type 2001:db8:0:2:0:5efe:172.16.0.10, and then click OK.

8. In the Ethernet Properties dialog box, click Close.

9. Close the Network Connections dialog box.


10. At the Windows PowerShell prompt, type ping LON-DC1, and then press Enter.

Notice that four replies are received from LON-DC1.

A ping from LON-DC1 to LON-SVR2 does not respond, because the firewall configuration on
LON-SVR2 blocks ping requests.

Results: After completing this exercise, you will have configured an ISATAP router on LON-RTR to allow
communication between an IPv6-only network and an IPv4-only network.

 Prepare for the next module


After you finish the lab, revert the virtual machines to their initial state. To do this, complete the following
steps.

1. On the host computer, start Hyper-V® Manager.


2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.

4. Repeat steps 2 and 3 for 20410D-LON-RTR and 20410D-LON-SVR2.


MCT USE ONLY. STUDENT USE PROHIBITED
L9-47

Module 9: Implementing Local Storage


Lab: Implementing Local Storage
Exercise 1: Installing and Configuring a New Disk
 Task 1: Initialize a new disk
1. Sign in to LON-SVR1 with the username Adatum\Administrator and the password Pa$$w0rd.

2. In Server Manager, click the Tools menu, and then click Computer Management.

3. In the Computer Management console, under the Storage node, click Disk Management.

4. In the Disks pane, right-click Disk2, and then click Online.

5. Right-click Disk2, and then click Initialize Disk.

6. In the Initialize Disk dialog box, select the Disk 2 check box, click GPT (GUID Partition Table), and
then click OK.

 Task 2: Create and format two simple volumes on the disk


1. In the Computer Management console, in Disk Management, right-click the black marked box right
of Disk 2, and then click New Simple Volume.
2. In the New Simple Volume Wizard, on the Welcome to the New Simple Volume Wizard page, click
Next.

3. On the Specify Volume Size page, in the Simple volume size MB field, type 4000, and then click
Next.

4. On the Assign Drive Letter or Path page, ensure that the Assign the following drive letter check
box is selected, and that F is selected from the drop-down menu, and then click Next.
5. On the Format Partition page, from the File system drop-down menu, click NTFS, and in the
Volume label text box, type Volume1, and then click Next.

6. On the Completing the New Simple Volume Wizard page, click Finish.

7. In the Disk Management window, right-click the black box right of Disk 2, and then click New Simple
Volume.

8. In the New Simple Volume Wizard, on the Welcome to the New Simple Volume Wizard page, click
Next.
9. On the Specify Volume Size page, in the Simple volume size in MB field, type 5000, and then click
Next.

10. On the Assign Drive Letter or Path page, ensure that the Assign the following drive letter check
box is selected, verify that G is listed as the drive letter, and then click Next.

11. On the Format Partition page, from the File system drop-down menu, click ReFS, and in the
Volume label text box, type Volume2, and then click Next.
12. On the Completing the New Simple Volume Wizard page, click Finish.
MCT USE ONLY. STUDENT USE PROHIBITED
L9-48 Implementing Local Storage

 Task 3: Verify the drive letter in a File Explorer window


1. On the taskbar, open a File Explorer window, expand This PC, and then click Volume1 (F:).

2. In File Explorer, click Volume2 (G:), right-click Volume2 (G:), point to New, and then click Folder.

3. In the New folder field, type Folder1, and then press Enter.

Results: After completing this exercise, you should have initialized a new disk, created two simple
volumes, and then formatted them. Additionally, you should have verified that the drive letters you
assigned are available in File Explorer.

Exercise 2: Resizing Volumes


 Task 1: Shrink Volume1
1. On LON-SVR1, switch to the Computer Management console.
2. In the Computer Management console, in Disk Management, in the middle-pane, right-click
Volume1 (F:), and then click Shrink Volume.

3. In the Shrink F: window, in the Enter the amount of space to shrink in MB field, type 1000, and
then click Shrink.

 Task 2: Extend Volume2


1. On LON-SVR1, in Disk Management, in the middle-pane, right-click Volume2 (G:), and then click
Extend Volume.
2. In Extend Volume Wizard, on the Welcome to the Extended Volume Wizard page, click Next.

3. On the Select Disks page, in the Select the amount of space in MB field, type 1000, and then click
Next.

4. On the Completing the Extended Volume Wizard page, click Finish.


5. In a File Explorer window, click Volume2 (G:), and then verify that Folder1 is available on the
volume.

Results: After completing this exercise, you should have made one volume smaller and extended another.

Exercise 3: Configuring a Redundant Storage Space


 Task 1: Create a storage pool from five disks that are attached to the server
1. On LON-SVR1, on the taskbar, click the Server Manager icon.
2. In Server Manager, in the left pane, click File and Storage Services, and then in the Servers pane,
click Storage Pools.

3. In the STORAGE POOLS pane, click TASKS, and then in the TASKS drop-down menu, click New
Storage Pool.

4. In the New Storage Pool Wizard window, on the Before you begin page, click Next.

5. On the Specify a storage pool name and subsystem page, in the Name box, type StoragePool1,
and then click Next.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L9-49

6. On the Select physical disks for the storage pool page, click the following physical disks, and then
click Next:
• PhysicalDisk3
• PhysicalDisk4
• PhysicalDisk5
• PhysicalDisk6
• PhysicalDisk7
7. On the Confirm selections page, click Create.

8. On the View results page, wait until the task completes, and then click Close.

 Task 2: Create a three-way mirrored virtual disk


1. On LON-SVR1, in Server Manager, in the Storage Spaces pane, click StoragePool1.

2. In the VIRTUAL DISKS pane, click TASKS, and then from the TASKS drop-down menu, click New
Virtual Disk.

3. In the New Virtual Disk Wizard window, on the Before you begin page, click Next.

4. On the Select the storage pool page, click StoragePool1, and then click Next.
5. On the Specify the virtual disk name page, in the Name box, type Mirrored Disk, and then click
Next.

6. On the Select the storage layout page, in the Layout list, click Mirror, and then click Next.
7. On the Configure the resiliency settings page, click Three-way mirror, and then click Next.

8. On the Specify the provisioning type page, click Thin, and then click Next.

9. On the Specify the size of the virtual disk page, in the Specify Size box, type 10, and then click
Next.
10. On the Confirm selections page, click Create.

11. On the View results page, wait until the task completes.
12. Ensure that the Create a volume when this wizard closes check box is selected, and then click
Close.

13. In the New Volume Wizard window, on the Before you begin page, click Next.
14. On the Select the server and disk page, in the Disk pane, click the Mirrored Disk virtual disk, and
then click Next.

15. On the Specify the size of the volume page, click Next to confirm the default selection.

16. On the Assign to a drive letter or folder page, in the Drive letter drop-down menu, ensure that H
is selected, and then click Next.

17. On the Select file system settings page, in the File system drop-down menu, click ReFS, in the
Volume label box, type Mirrored Volume, and then click Next.

18. On the Confirm selections page, click Create.

19. On the Completion page, wait until the creation completes, and then click Close.
MCT USE ONLY. STUDENT USE PROHIBITED
L9-50 Implementing Local Storage

 Task 3: Copy a file to the volume, and verify that it is visible in File Explorer
1. On the Start screen, type command prompt, and then press Enter.

2. At the command prompt, type the following command, and then press Enter:

Copy C:\windows\system32\write.exe H:\

3. Close the Command Prompt window.

4. On the taskbar, click the File Explorer icon.


5. In the File Explorer window, click Mirrored Volume (H:).

6. Verify that write.exe is visible in the file list.

7. Close File Explorer.

 Task 4: Remove a physical drive


1. On the host computer, start Hyper-V Manager.

2. In the Virtual Machines pane, right-click 20410D-LON-SVR1, and then click Settings.
3. In Settings for 20410D-LON-SVR1, in the Hardware pane, click the hard drive that begins with
20410D-LON-SVR1-Disk5.

4. In the Hard Drive pane, click Remove, click OK, and then click Continue.

 Task 5: Verify that the write.exe file is still accessible


1. Switch to LON-SVR1.
2. On the taskbar, click the File Explorer icon.

3. In the File Explorer window, click Mirrored Volume (H:).


4. In the file list pane, verify that write.exe is still available.
5. Close File Explorer.

6. In Server Manager, in the STORAGE POOLS pane, on the menu bar, click the Refresh “Storage
Pools” button.
Notice the warning that is visible next to Mirrored Disk.

7. In the VIRTUAL DISK pane, right-click Mirrored Disk, and then click Properties.

8. In the Mirrored Disk Properties dialog box, in the left pane, click Health.
Notice that the Health Status indicates a Warning. The Operational Status should indicate
Incomplete, Unknown, or Degraded.

9. Click OK to close the Mirrored Disk Properties dialog box.

 Task 6: Add a new disk to the storage pool and remove a broken disk
1. On LON-SVR1, in Server Manager, in the STORAGE POOLS pane, on the menu bar, click the Refresh
“Storage Pools” button.

2. In the STORAGE POOLS pane, right-click StoragePool1, and then click Add Physical Disk.
3. In the Add Physical Disk window, click PhysicalDisk8 (LON-SVR1), and then click OK.

4. Click Windows Powershell on the Task Bar.

5. Type Get-PhysicalDisk, and then press Enter.


MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L9-51

6. Note the FriendlyName for the disk that shows an OperationalStatus of Lost Communication.

7. Type $Disk = Get-PhysicalDisk -FriendlyName diskname, and then press Enter.

Replace diskname with the name of the disk that you noted in Step 6.

8. Type Remove-PhysicalDisk -PhysicalDisks $disk -StoragePoolFriendlyName StoragePool1, and


then press Enter.

9. Type Y, and then press Enter.


10. If you get a warning that the disk cannot be removed, wait five minutes, and then run the last
command again. It can take some time for the mirrored disk to resynchronize after a disk is removed
and another is added. If you cannot remove the disk after five minutes, restart LON-SVR1, sign in as
Adatum\Administrator by using the password Pa$$w0rd, and then repeat steps 4 through 10.
11. In Server Manager, in the STORAGE POOLS pane, on the menu bar, click the Refresh “Storage
Pools” button to see the warnings disappear.

Results: After completing this exercise, you should have created a storage pool and added five disks to it.
Additionally, you should have created a three-way mirrored, thinly provisioned virtual disk from the
storage pool; copied a file to the new volume; and then verified that it is accessible. Next, after removing a
physical drive, you should have verified that the virtual disk was still available and that you could access it.
Finally, you should have added another physical disk to the storage pool.

 Prepare for the next module


After you finish the lab, revert the virtual machines to their initial state by completing the following steps:
1. On the host computer, start Hyper-V Manager.

2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.
4. Repeat steps 2 and 3 for 20410D-LON-SVR1.
MCT USE ONLY. STUDENT USE PROHIBITED
MCT USE ONLY. STUDENT USE PROHIBITED
L10-53

Module 10: Implementing File and Print Services


Lab: Implementing File and Print Services
Exercise 1: Creating and Configuring a File Share
 Task 1: Create the folder structure for the new share
1. On LON-SVR1, on the taskbar, click the File Explorer icon.

2. In File Explorer, in the navigation pane, expand This PC, and then click Allfiles (E:).

3. On the menu toolbar, click Home, click New folder, type Data, and then press Enter.

4. Double-click the Data folder.

5. On the menu toolbar, click Home, click New folder, type Development, and then press Enter.

6. Repeat step 5 to create a new folder named Marketing.

 Task 2: Configure file permissions on the folder structure


To restrict access to the departmental folders, you must prevent inherited file permissions from the Data
folder from being applied to each department folder. To do this, perform the following steps.

1. In File Explorer, double-click the E:\Data folder.

2. Right-click the Development folder, and then click Properties.


3. In the Development Properties dialog box, click Security, and then click Advanced.

4. In the Advanced Security Settings for Development dialog box, click Disable Inheritance.

5. In the Block Inheritance dialog box, click Convert inherited permissions into explicit permissions
on this object.

6. Remove the two permissions entries for Users (LON-SVR1\Users), and then click OK.

7. On the Security tab, click Edit.


8. In the Permissions for Development dialog box, click Add.

9. Type Development, click Check names, and then click OK.

10. In the Permissions for Development dialog box, under Allow, select Modify permission.

11. Click OK to close the Permissions for Development dialog box.

12. Click OK to close the Development Properties dialog box.

13. Repeat steps 2 through 12 for the Marketing folder, assigning Modify permissions to the Marketing
group for their folder.

 Task 3: Create the shared folder


1. In File Explorer, navigate to drive E, right-click the Data folder, and then click Properties.

2. In the Data Properties dialog box, click the Sharing tab, and then click Advanced Sharing.
3. In the Advanced Sharing dialog box, select Share this folder, and then click Permissions.

4. In the Permissions for Data dialog box, click Add.


5. Type Authenticated Users, click Check names, and then click OK.

6. In the Permissions for Data dialog box, click Authenticated Users, and then under Allow, select
Change permission.
MCT USE ONLY. STUDENT USE PROHIBITED
L10-54 Implementing File and Print Services

7. Click OK to close the Permissions for Data dialog box.

8. Click OK to close the Advanced Sharing dialog box.

9. Click Close to close the Data Properties dialog box.

 Task 4: Test access to the shared folder


1. Sign in to LON-CL1 as Adatum\Bernard with the password Pa$$w0rd.

Notice that Bernard is a member of the Development group.

2. On the Start screen, click Desktop.

3. On the taskbar, click the File Explorer icon.

4. In File Explorer, in the address bar, type \\LON-SVR1\Data, and then press Enter.

5. Double-click the Development folder.

Bernard should have access to the Development folder.


6. Attempt to access the Marketing folder.

File permissions on this folder prevents you from doing this.


Bernard can still see the Marketing folder, even though he does not have access to its contents.
7. Sign out of LON-CL1.

 Task 5: Enable access-based enumeration


1. Switch to LON-SVR1.
2. On the taskbar, click the Server Manager icon.

3. In Server Manager, in the navigation pane, click File and Storage Services.

4. In the File and Storage Services window, in the navigation pane, click Shares.
5. In the Shares pane, right-click Data, and then click Properties.

6. In the Data Properties dialog box, click Settings, and then select Enable access-based
enumeration.
7. Click OK to close the Data Properties dialog box.

8. Close Server Manager.

 Task 6: Test access to the share


1. Sign in to LON-CL1 as Adatum\Bernard with the password Pa$$w0rd.

2. Click the Desktop tile.


3. On the taskbar, click the File Explorer icon.

4. In File Explorer, in the address bar, type \\LON-SVR1\Data, and then press Enter.

Bernard can now view only the Development folder, the folder for which he has permissions.
5. Double-click the Development folder.

Bernard should have access to the Development folder.


6. Sign out of LON-CL1.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L10-55

 Task 7: Disable offline files for the share


1. Switch to LON-SVR1.

2. On the taskbar, click the File Explorer icon.

3. In File Explorer, navigate to drive E, right-click the Data folder, and then click Properties.

4. In the Data Properties dialog box, click the Sharing tab, click Advanced Sharing, and then click
Caching.

5. In the Offline Settings dialog box, click No files or programs from the shared folder are
available offline, and then click OK.
6. Click OK to close the Advanced Sharing dialog box.

7. Click Close to close the Data Properties dialog box.

Results: After completing this exercise, you will have created a new shared folder for use by multiple
departments.

Exercise 2: Configuring Shadow Copies


 Task 1: Configure shadow copies for the file share
1. On LON-SVR1, open File Explorer.

2. Navigate to drive E, right-click Allfiles (E:), and then click Configure Shadow Copies.
3. In the Shadow Copies dialog box, click drive E, and then click Enable.

4. In the Enable Shadow Copies dialog box, click Yes.

5. In the drive Shadow Copies dialog box, click Settings.


6. In the Settings dialog box, click Schedule.

This opens the drive E:\ dialog box.

7. In drive E:\ dialog box, change Schedule Task to Daily, change Start time to 12:00 AM, and then
click Advanced.

8. In the Advanced Schedule Options dialog box, select Repeat task, and then set the frequency to
every 1 hours.

9. Select Time, and then change the time value to 11:59 PM.

10. Click OK twice, and then click OK to close the Settings dialog box.

11. Leave the drive Shadow Copies dialog box open.

 Task 2: Create multiple shadow copies of a file


1. On LON-SVR1, open File Explorer.
2. Navigate to E:\Data\Development.

3. On the menu toolbar, click Home, click New item, and then click Text Document.

4. Type Report, and then press Enter.


5. Switch back to the Shadow Copies dialog box. It should be opened on the Shadow Copies tab.

6. Click Create Now.


MCT USE ONLY. STUDENT USE PROHIBITED
L10-56 Implementing File and Print Services

 Task 3: Recover a deleted file from a shadow copy


1. On LON-SVR1, switch back to File Explorer.

2. Right-click Report.txt, and then click Delete.

3. In File Explorer, right-click the Development folder, and then click Properties.

4. In the Development Properties dialog box, click the Previous Versions tab.

5. Click the most recent folder version for Development, and then click Open.

6. Confirm that Report.txt is in the folder, right-click Report.txt, and then click Copy.

7. Close the File Explorer window that just opened.

8. In the other File Explorer window, right-click the Development folder, and then click Paste.

9. Close File Explorer.

10. Click OK, and then close all open windows.

Results: After completing this exercise, you will have enabled shadow copies on the file server.

Exercise 3: Enabling and Configuring Work Folders


 Task 1: Install the Work Folders role service
1. On LON-SVR1, on the taskbar, click the Windows PowerShell icon.

2. At the command prompt, type the following command, and then press Enter:
Add-WindowsFeature FS-SyncShareService

Note that the name of the feature is case-sensitive.

 Task 2: Create a sync share on the file server


1. On LON-SVR1, at the Windows PowerShell command prompt, type the following command, and then
press Enter:

New-SyncShare Corp –path C:\CorpData –User “Adatum\Domain Users”

2. If required, on the taskbar, click the Server Manager icon to open Server Manager.

3. Click File and Storage Services.

4. Click Work Folders, and then ensure the Corp sync share exists.

 Task 3: Automate settings for users by using Group Policy


1. On LON-DC1, in Server Manager, click Tools, and then click Group Policy Management.

2. In the Group Policy Management Console, go to Forest:Adatum.com\Domains\Adatum.com.

3. Right-click Adatum.com, and then click Create a GPO in this domain, and Link it here.
4. In the New GPO dialog box, in Name, type Work Folders, and then click OK.

5. Right-click the Work Folders GPO, and then click Edit.

6. In the Group Policy Management Editor window, go to User Configuration\Policies


\Administrative Templates\Windows Components\Work Folders.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L10-57

7. In the details pane, double-click Specify Work Folders settings.

8. Click Enabled, and then in Work Folders URL, type http://lon-svr1.Adatum.com.

9. Select Force automatic setup, and then click OK.

10. Close all open windows.

 Task 4: Test synchronization


1. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.

2. On the Start screen, click Desktop.


3. On the taskbar, click the File Explorer icon.

4. Navigate to C:\Labfiles\Mod10, and then double-click WorkFolders.bat.

This adds a registry entry to allow unsecured connections to the work folders.
5. In the lower-left corner of the screen, click the Start button.

6. Sign out of LON-CL1.

7. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.


8. Click the Desktop tile, and then click File Explorer.

9. Double-click the Work Folders folder.

10. In the Work Folders folder, right-click an empty space, point to New, and then click Text
Document.
11. Name the new text document TestFile2, and then press Enter.

12. Switch to LON-SVR1, and then click File Explorer.


13. Navigate to C:\CorpData\Administrator. Ensure the new text file named TestFile2 exists.
14. Close all open windows.

Results: After completing this exercise, you will have installed the Work Folders role service, created a
sync share, and created a GPO to deliver the settings to the users automatically. Additionally, you will
have tested the settings.

Exercise 4: Creating and Configuring a Printer Pool


 Task 1: Install the Print and Document Services server role
1. On LON-SVR1, on the taskbar, click the Server Manager icon.

2. In Server Manager, on the menu toolbar, click Manage.

3. Click Add Roles and Features, click Next.


4. Click Role-based or feature-based Installation, click Next.

5. On the Select destination server page, click the server on which you want to install the Print and
Document Services, and then click Next.
The default server is the local server.

6. On the Select Server Roles page, select Print and Document Services.

7. In the Add Roles and Features Wizard, click Add Features.


MCT USE ONLY. STUDENT USE PROHIBITED
L10-58 Implementing File and Print Services

8. On the Select server roles page, click Next.


9. On the Select Features page, click Next.

10. On the Print and Document Services page, review the Notes for the administrator, and then click
Next.
11. On the Select role services page, click Next until the Confirm Installation Selections page appears.

12. Click Install to install the required role services.


13. Click Close.

 Task 2: Install a printer


1. On LON-SVR1, in the Server Manager, click Tools, and then click Print Management.

2. Expand Printer Servers, expand LON-SVR1 (local), right-click Printers, and then click Add Printer.
The Network Printer Installation Wizard starts.

3. On the Network Printer Installation Wizard page, click Add a TCP/IP or Web Services Printer by
IP address or hostname, and then click Next.
4. Change the Type of Device to TCP/IP Device.
5. In Host name or IP address, type 172.16.0.200, clear Auto detect the printer driver to use, and
then click Next.

6. Under Device Type, click Generic Network Card, and then click Next.
7. Click Install a new driver, and then click Next.

8. Click Microsoft as the Manufacturer, under Printers, click Microsoft XPS Class Driver, and then
click Next.

9. Change the Printer Name to Branch Office Printer, and then click Next.

10. Click Next two times to accept the default printer name and share name, and to install the printer.
11. Click Finish to close the Network Printer Installation Wizard.

12. In the Print Management console, right-click the Branch Office Printer, and then click Enable
Branch Office Direct Printing.
13. In the Print Management console, right-click the Branch Office Printer, and then select Properties.

14. Click the Sharing tab, select List in the directory, and then click OK.

 Task 3: Configure printer pooling


1. In the Print Management console, under LON-SVR1, right-click Ports, and then click Add Port.

2. In the Printer Ports dialog box, click Standard TCP/IP Port, and then click New Port.
3. In the Add Standard TCP/IP Printer Port Wizard, click Next.

4. In Printer Name or IP Address, type 172.16.0.201, and then click Next.

5. In the Additional port information required dialog box, click Next.


6. Click Finish to close the Add Standard TCP/IP Printer Port Wizard.

7. Click Close to close the Printer Ports dialog box.


8. In the Print Management console, click Printers, right-click Branch Office Printer, and then click
Properties.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L10-59

9. In the Branch Office Printer Properties dialog box, click the Ports tab, select Enable printer
pooling, and then click the 172.16.0.201 port to select it as the second port.

10. Click OK to close the Branch Office Printer Properties dialog box.
11. Close the Print Management Console.

 Task 4: Install a printer on a client computer


1. On LON-CL1, in the lower-left corner of the screen, right-click the Start button, and then click
Control Panel.

2. In Control Panel, under Hardware and Sound, click Add a device.


3. In the Add a device dialog box, click Branch Office Printer on LON-SVR1, and then click Next.

The device installs automatically.

Results: After completing this exercise, you will have installed the Print and Document Services server role
and installed a printer with printer pooling.

 Prepare for the next module


After you finish the lab, revert the virtual machines to their initial state. To do this, complete the following
steps.
1. On the host computer, start Hyper-V® Manager.

2. In the Virtual Machines list, right-click 20410D-LON-SVR1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.

4. Repeat steps 2 and 3 for 20410D-LON-CL1 and 20410D-LON-DC1.


MCT USE ONLY. STUDENT USE PROHIBITED
MCT USE ONLY. STUDENT USE PROHIBITED
L11-61

Module 11: Implementing Group Policy


Lab: Implementing Group Policy
Exercise 1: Configuring a central store
 Task 1: View the location of administrative templates in a GPO
1. Sign in to LON-DC1 as Administrator with the password Pa$$w0rd.

2. In Server Manager, click Tools, and then click Group Policy Management.

3. In the Group Policy Management Console, expand Forest: Adatum.com, expand Domains, expand
Adatum.com, and then expand the Group Policy Objects folder.

4. Right-click the Default Domain Policy, and then click Edit. This opens the Group Policy
Management Editor window.
5. In the Group Policy Management Editor window, expand the Default Domain Policy, under User
Configuration, expand Policies, and then click Administrative Templates.

6. Point to the Administrative Templates folder, and then note that the location is Administrative
Templates: Policy definitions (.admx files) retrieved from the local computer.

7. Close the Group Policy Management Editor window.

 Task 2: Create a central store


1. On the taskbar, click the File Explorer icon.
2. In the File Explorer window, expand Local Disk (C:), expand Windows, expand SYSVOL, expand
sysvol, expand Adatum.com, and then double-click Policies.

3. In the details pane, right-click a blank area, click New, and then click Folder.
4. Name the folder PolicyDefinitions.

 Task 3: Copy administrative templates to the central store


1. In File Explorer, go to C:\Windows, and open the PolicyDefinitions folder.

2. Select the entire contents of the PolicyDefinitions folder.


Hint: To select all content, click in the details pane, and then press Ctrl+A.

3. Right-click the selection, and then click Copy.

4. Expand Local Disk (C:), expand Windows, expand SYSVOL, expand sysvol, expand Adatum.com,
expand Policies, and then open the PolicyDefinitions folder.

5. Right-click in the empty folder area, and then click Paste.

 Task 4: Verify the administrative template location in GPMC


1. In the GPMC, right-click the Default Domain Policy, and then click Edit.

2. In the Group Policy Management Editor window, expand Polices, point to the Administrative
Templates folder and read the local information text, which reads: “Administrative Templates: Policy
definitions (ADMX files) retrieved from the central store.”

3. Close the Group Policy Management Editor window.

Results: After completing this exercise, you should have configured a central store.
MCT USE ONLY. STUDENT USE PROHIBITED
L11-62 Implementing Group Policy

Exercise 2: Creating GPOs


 Task 1: Create a Windows Internet Explorer Restriction default starter GPO
1. In the GPMC, right-click the Starter GPOs folder, and then click New.

2. In the New Starter GPO dialog box, in the Name field, type Internet Explorer Restrictions, in the
Comment field, type This GPO disables the General page in Internet Options, and then click OK.

 Task 2: Configure the Internet Explorer Restriction starter GPO


1. In the GPMC, under the Starter GPOs folder, right-click the Internet Explorer Restrictions GPO, and
then click Edit.

2. In the Group Policy Management Editor window, expand User Configuration, Administrative
Templates, and then click All Settings.
3. Right-click All Settings, and then click Filter Options.

4. In the Filter Options dialog box, select the Enable Keyword Filters check box.

5. In the Filter for word(s) field, type General page.


6. Beside Within, clear the Help Text and the Comment check boxes.

7. Beside the Filter for word(s) field, click the drop-down list box, click Exact, and then click OK.

8. Double-click the Disable the General page setting, click Enabled, and then click OK.
9. Close the Group Policy Starter GPO Editor window.

 Task 3: Create an Internet Explorer Restrictions GPO from the Internet Explorer
Restrictions starter GPO
1. In the GPMC, right-click the Adatum.com domain, and then click Create a GPO in this domain, and
Link it here.
2. In the New GPO dialog box, in the Name field, type IE Restrictions.

3. Under Source Starter GPO, click the drop-down box, select Internet Explorer Restrictions, and
then click OK.

 Task 4: Test the GPO for Domain Users


1. Sign in to LON-CL1 as Adatum\Brad with the password Pa$$w0rd.
2. Point the mouse at the lower-right edge of the screen, and then click the Search charm when it
appears.

3. In the Everywhere search box, type Control Panel.


4. In the search results, click Control Panel.

5. In Control Panel, click Network and Internet.

6. In the Network and Internet dialog box, click Change your homepage.
7. Read the message box that appears informing you that this feature has been disabled, and then
click OK.
8. In the Control Panel, click Internet Options. Notice that in the Internet Properties dialog box the
General tab does not display.

9. Close all open windows, and then sign out from LON-CL1.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L11-63

 Task 5: Use security filtering to exempt the IT Department from the Internet Explorer
Restrictions policy
1. Switch to LON-DC1.

2. In the GPMC, expand the Group Policy Objects folder, and then in the left pane, click the IE
Restrictions policy.
3. In the details pane, click the Delegation tab.

4. On the Delegation tab, click the Advanced button.

5. In the IE Restrictions Security Settings dialog box, click Add.


6. In the Select Users, Computers, Service Accounts, or Groups window, in the Enter the object names
to select (examples) box, type IT, and then click OK.

7. In the IE Restrictions Security Settings dialog box, click the IT (Adatum\IT) group, next to the
Apply group policy permission, select the Deny check box, and then click OK.

8. Click Yes to acknowledge the Windows Security dialog box.

 Task 6: Test the GPO app for IT department users


1. Switch to LON-CL1.
2. Sign in to LON-CL1 as Brad with the password Pa$$w0rd.

3. Point the mouse at the lower-right edge of the screen, and then click the Search charm when it
appears.
4. In the Everywhere search box, type Control Panel.
5. In the search results window, click Control Panel.

6. In Control Panel, click Network and Internet.

7. In the Network and Internet dialog box, click Change your homepage. The Internet Properties
dialog box opens to the General tab, and all settings are available.

8. Close all open windows, and sign out from LON-CL1.

 Task 7: Test the Application of the GPO for other domain users
1. Sign in to LON-CL1 as Boris with the password Pa$$w0rd.
2. Point the mouse at the lower-right edge of the screen, and then click the Search charm when it
appears.

3. In the Everywhere search box, type Control Panel.


4. In the search results window, click Control Panel.

5. In Control Panel, click Network and Internet.

6. In the Network and Internet dialog box, click Change your homepage. A message box appears
informing you that this feature has been disabled.

7. Click OK to acknowledge the message.

8. Click Internet Options. In the Internet Properties dialog box, notice that the General tab does not
display.

9. Close all open windows, and sign out from LON-CL1.

Results: After completing this lab, you should have created a GPO.
MCT USE ONLY. STUDENT USE PROHIBITED
L11-64 Implementing Group Policy

 Prepare for the next module


After you finish the lab, revert the virtual machines to their initial state by completing the following steps:

1. On the host computer, start Hyper-V Manager.

2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.

3. In the Revert Virtual Machine dialog box, click Revert.

4. Repeat steps 2 and 3 for 20410D-LON-CL1.


MCT USE ONLY. STUDENT USE PROHIBITED
L12-65

Module 12: Securing Windows Servers by Using Group


Policy Objects
Lab A: Increasing Security for Server
Resources
Exercise 1: Using Group Policy to Secure Member Servers
 Task 1: Create a Member Servers organizational unit (OU) and move servers into it
1. On LON-DC1, in Server Manager, click Tools, and then click Active Directory Users and Computers.

2. In Active Directory Users and Computers, in the navigation pane, right-click Adatum.com, click New,
and then click Organizational Unit.
3. In the New Object - Organizational Unit window, in the Name box, type Member Servers OU, and
then click OK.

4. In Active Directory Users and Computers, in the navigation pane, click Computers container.
5. Press and hold the Ctrl key. In the details pane, click both LON-SVR1 and LON-SVR2, right-click the
selection, and then click Move.
6. In the Move window, click Member Servers OU, and then click OK.

 Task 2: Create a Server Administrators group


1. On LON-DC1, in Active Directory Users and Computers, in the navigation pane, right-click the
Member Servers OU, click New, and then click Group.
2. In the New Object – Group window, in Group Name, type Server Administrators, and then click OK.

 Task 3: Create a Member Server Security Settings Group Policy Object (GPO) and link
it to the Member Servers OU
1. On LON-DC1, in the Server Manager window, click Tools, and then click Group Policy
Management.
2. In the Group Policy Management Console, expand Forests: Adatum.com, expand Domains, expand
Adatum.com, right-click Group Policy Objects, and then click New.

3. In the New GPO window, in Name, type Member Server Security Settings, and then click OK.

4. In the Group Policy Management Console, right-click Member Servers OU, and then click Link an
Existing GPO.

5. In the Select GPO window, in the Group Policy Objects window, click Member Server Security
Settings, and then click OK.

 Task 4: Configure group membership for local administrators to include Server


Administrators and Domain Admins
1. In the Group Policy Management Console, if necessary, expand the Group Policy Objects container.
Right-click Default Domain Policy, and then click Edit.

2. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Restricted Groups.

3. Right-click Restricted Groups, and then click Add Group.


MCT USE ONLY. STUDENT USE PROHIBITED
L12-66 Securing Windows Servers by Using Group Policy Objects

4. In the Add Group dialog box, in Group name, type Administrators, and then click OK.

5. In the Administrators Properties dialog box, next to Members of this group, click Add.

6. In the Add Member dialog box type Adatum\Server Administrators, and then click OK.

7. Next to Members of this group, click Add.

8. In the Add Member dialog box type Adatum\Domain Admins, and then click OK twice.

9. Close the Group Policy Management Editor window.

 Task 5: Verify that Computer Administrators has been added to the local
Administrators group
1. Switch to LON-SVR1.

2. On the taskbar, click the Windows PowerShell® icon.

3. At the Windows PowerShell prompt, type the following command, and then press Enter:

Gpupdate /force

4. In the Server Manager window, click Tools, and then click Computer Management.
5. In the Computer Management console, expand Local Users and Groups, click Groups, and then in
the right-hand pane, double-click Administrators.

6. Confirm that the Administrators group contains both ADATUM\Domain Admins and
ADATUM\Server Administrators as members. Click Cancel.

7. Close the Computer Management console.

 Task 6: Modify the Member Server Security Settings GPO to remove Users from
Allow Log On Locally
1. On LON-DC1, in the Group Policy Management Console, click Group Policy Objects.
2. In the right-hand pane, right-click Member Server Security Settings, and then click Edit.

3. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Local Policies\User Rights Assignment.
4. In the right-hand pane, right-click Allow log on locally, and then click Properties.

5. In the Allow log on locally Properties dialog box, select the Define these policy settings check
box, and then click Add User or Group.

6. In the Add User or Group window, type Domain Admins, and then click OK.

7. Click Add User or Group.

8. In the Add User or Group window, type Administrators, and then click OK twice.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L12-67

 Task 7: Modify the Member Server Security Settings GPO to enable User Account
Control: Admin Approval Mode for the Built-in Administrator account
1. On LON-DC1, in the Group Policy Management Editor window, go to Computer Configuration
\Policies\Windows Settings\Security Settings\Local Policies\Security Options.

2. In the right-hand pane, right-click User Account Control: Admin Approval Mode for the Built-in
Administrator account, and then click Properties.
3. In the User Account Control: Admin Approval Mode for the Built-in Administrator account
Properties dialog box, select the Define this policy settings check box, ensure that Enabled is
selected, and then click OK.

4. Close the Group Policy Management Editor window.

 Task 8: Verify that a nonadministrative user cannot sign in to a member server


1. Switch to LON-SVR1.
2. On the taskbar, click the Windows PowerShell icon.

3. At the Windows PowerShell prompt, type the following command, and then press Enter:

Gpupdate /force

4. Sign out of LON-SVR1.


5. Try to sign in to LON-SVR1 as Adatum\Adam with the password Pa$$w0rd.

Verify that you cannot sign in to LON-SVR1, and that a logon error message is displayed.

6. To prepare for the next exercise, sign out of LON-SVR1, and then sign back in to LON-SVR1 as
Adatum\Administrator with the password Pa$$w0rd.

Results: After completing this exercise, you will have used Group Policy to secure member servers.

Exercise 2: Auditing File System Access


 Task 1: Modify the Member Server Security Settings GPO to enable object access
auditing
1. Switch to LON-DC1.

2. In the Group Policy Management Console, go to Forest: Adatum.com\Domains\Adatum.com.

3. Click Group Policy Objects.


4. In the right-hand pane, right-click Member Server Security Settings, and then click Edit.

5. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Local Policies.

6. Click Audit Policy.

7. In the right-hand pane, right-click Audit object access, and then click Properties.

8. In the Audit object access Properties dialog box, select the Define these policy settings check
box, select both the Success and Failure check boxes, and then click OK.

9. Sign out from LON-DC1.


MCT USE ONLY. STUDENT USE PROHIBITED
L12-68 Securing Windows Servers by Using Group Policy Objects

 Task 2: Create and share a folder


1. Switch to LON-SVR1.

2. On LON-SVR1, on the taskbar, click the File Explorer icon.

3. In File Explorer, in the navigation pane, double-click Local Disk (C), and then click Home.

4. Click New folder, type Marketing, and then press Enter.

5. In the Computer window, right-click the Marketing folder, click Share with, and then click Specific
people.
6. In the File Sharing window, type Adam, and then click Add.

7. Change the Permission Level to Read/Write, click Share, and then click Done.

 Task 3: Enable auditing on the Marketing folder for Domain Users


1. On LON-SVR1, in the Local Disk (C:) window, right-click the Marketing folder, and then click
Properties.
2. In the Marketing Properties window, click the Security tab, and then click Advanced.

3. In the Advanced Security Settings for Marketing window, click the Auditing tab, click Continue, and
then click Add.
4. In the Auditing Entry for Marketing window, click Select a principal.

5. In the Select User, Computer, Service Account or Group window, in Enter the object name to select,
type Domain Users, and then click OK.
6. In the Auditing Entry for Marketing window, from the Type drop-down menu, select All.

7. In the Auditing Entry for Marketing window, under the Permission list, select the Write check box,
and then click OK three times.

8. On the taskbar, click the Windows PowerShell icon.

9. At the Windows PowerShell prompt, type the following command, and then press Enter:

gpupdate /force

10. Close the Windows PowerShell window.

 Task 4: Create a new file in the file share from LON-CL1


1. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.

2. Point to the lower-right corner of the screen, and then click the Search charm when it appears.

3. In the Search box type cmd, and then press Enter.


4. Open the Command Prompt window, and at the command prompt, type the following command,
and then press Enter:

gpupdate /force

5. Close the Command Prompt window.


6. Sign out from LON-CL1, and then sign in again as Adatum\Adam with the password Pa$$w0rd.

7. Point to the lower-right corner of the screen, and then click the Search charm when it appears.
8. In the Search box, type \\LON-SVR1\Marketing, and then press Enter.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L12-69

9. In the Marketing window, click Home, click New item, click Text Document, in File name, type
Employees, and then press Enter.

10. Sign out from LON-CL1.

 Task 5: View the results in the security log on the domain controller
1. Switch to LON-SVR1.

2. In the Server Manager window, click Tools, and then click Event Viewer.

3. In the Event Viewer window, expand Windows Logs, and then click Security.

4. Verify that the following event and information is displayed:

o Source: Microsoft Windows Security Auditing

o Event ID: 4663

o Task category: File System


o An attempt was made to access an object

Results: After completing this exercise, you will have enabled file system access auditing.

Exercise 3: Auditing Domain Logons


 Task 1: Modify the Default Domain Policy GPO
1. Sign in to LON-DC1 as Adatum\Administrator with the password Pa$$w0rd.
2. On LON-DC1, on the taskbar, click the Server Manager icon.

3. In the Server Manager window, click Tools, and then click Group Policy Management.

4. On LON-DC1, in the Group Policy Management Console, go to Forest: Adatum.com\Domains


\Adatum.com.
5. Click Group Policy Objects.

6. In the right-hand pane, right-click Default Domain Policy, and then click Edit.

7. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Local Policies.

8. Click Audit Policy.

9. In the right-hand pane, right-click Audit account logon events, and then click Properties.

10. In the Audit account logon events Properties dialog box, select the Define these policy settings
check box, select both the Success and Failure check boxes, and then click OK.
11. Point to the lower-right corner of the screen, and then click the Search charm when it appears.

12. In the Search box, type cmd, and then press Enter.

13. At the command prompt, type the following command, and then press Enter:

gpupdate /force
MCT USE ONLY. STUDENT USE PROHIBITED
L12-70 Securing Windows Servers by Using Group Policy Objects

 Task 2: Run gpupdate


1. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.

2. Point to the lower-right corner of the screen, and then click the Search charm when it appears.

3. In the Search box, type cmd, and then press Enter.

4. At the command prompt, type the following command, and then press Enter:

gpupdate /force

5. Close the Command Prompt window, and then sign out from LON-CL1.

 Task 3: Sign in to LON-CL1 with an incorrect password


• Sign in to LON-CL1 as Adatum\Adam with the password password.

This password is intentionally incorrect to generate a security log entry that shows that an
unsuccessful sign-in attempt has been made.

 Task 4: Review event logs on LON-DC1


1. On LON-DC1, in Server Manager, click Tools, and then click Event Viewer.
2. In the Event Viewer window, expand Windows Logs, and then click Security.

3. Review the event logs for following message: “Event ID 4771 Kerberos pre-authentication failed.
Account Information: Security ID: ADATUM\Adam”.

 Task 5: Sign in to LON-CL1 with the correct password


1. Sign in to LON-CL1 as Adatum\Adam with the password Pa$$w0rd.
This password is correct, and you should be able to sign in successfully as Adam.

2. Sign out of LON-CL1.

 Task 6: Review event logs on LON-DC1


1. Switch to LON-DC1.
2. In the Server Manager window, click Tools, and then click Event Viewer.

3. In the Event Viewer window, expand Windows Logs, and then click Security.

4. Review the event logs for the following message: “Event ID 4624 An account was successfully logged
on. New Logon: Security ID: ADATUM\Adam”.

 Task 7: Prepare for the next lab


• To prepare for the next lab, leave the virtual machines running.

Results: After completing this exercise, you will have enabled domain logon auditing.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L12-71

Lab B: Configuring AppLocker and Windows


Firewall
Exercise 1: Configuring AppLocker Policies
 Task 1: Create an OU for client computers
1. Switch to LON-DC1.

2. In Server Manager, click Tools, and then click Active Directory Users and Computers.
3. In Active Directory Users and Computers, in the navigation pane, right-click Adatum.com, click New,
and then click Organizational Unit.

4. In the New Object - Organizational Unit window, type Client Computers, and then click OK.

 Task 2: Move LON-CL1 to the Client Computers OU


1. On LON-DC1, in Active Directory Users and Computers, in the navigation pane, click Computers
container.
2. In the details pane, right-click LON-CL1, and then click Move.

3. In the Move window, click Client Computers, and then click OK.

 Task 3: Create a Software Control GPO and link it to the Client Computers OU
1. On LON-DC1, in Server Manager, click Tools, and then click Group Policy Management.

2. In the Group Policy Management Console, go to Forests: Adatum.com\Domains\Adatum.com.


3. Right-click Group Policy Objects, and then click New.

4. In New GPO window, in the Name text box, type Software Control, and then click OK.
5. In the right-hand pane, right-click Software Control, and then click Edit.

6. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Application Control Policies\AppLocker.
7. Under AppLocker, right-click Executable Rules, and then click Create Default Rules.
8. Repeat the previous step for Windows Installer Rules, Script Rules, and Packaged app Rules.

9. In the navigation pane, click AppLocker, and then in the right-hand pane, click Configure rule
enforcement.

10. In the AppLocker Properties dialog box, under Executable rules, select the Configured check box,
and then from the drop-down menu, select Audit only.
11. Repeat the previous step for Windows Installer Rules, Script Rules, and Packaged app Rules, and
then click OK.

12. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings.

13. Click System Services, and then double-click Application Identity.

14. In the Application Identity Properties dialog box, click Define this policy setting.

15. Under Select service startup mode, click Automatic, and then click OK.

16. Close the Group Policy Management Editor window.


MCT USE ONLY. STUDENT USE PROHIBITED
L12-72 Securing Windows Servers by Using Group Policy Objects

17. In the Group Policy Management Console, right-click Client Computers, and then click Link an
Existing GPO.

18. In the Select GPO window, in the Group Policy Objects list, click Software Control, and then
click OK.

 Task 4: Run gpupdate


1. Switch to LON-CL1.

2. Point to the lower-right corner of the screen, and then click the Search charm when it appears.
3. In the Search box, type cmd, and then press Enter.

4. In the Command Prompt window, type following command, and then press Enter:

gpupdate /force

5. Close the Command Prompt window.


6. Point to the lower-right corner of the screen, and then click the Settings charm when it appears.

7. Click Power, and then click Restart.

 Task 5: Run app1.bat in the C:\CustomApp folder


1. Sign in to LON-CL1 as Adatum\Administrator with the password Pa$$w0rd.
2. Point to the lower-right corner of the screen, and then click the Search charm when it appears.

3. In the Search box, type cmd, and then press Enter.

4. At the command prompt, type following command, and then press Enter:

gpresult /R

Review the result of the command, and ensure that Software Control is displayed under Computer
Settings, Applied Group Policy Objects.

5. If Software Control is not displayed, restart LON-CL1, and then repeat steps 1 through 4.

6. Point to the lower-right corner of the screen, and then click the Search charm when it appears.
7. In the Search box, type cmd, and then press Enter.

8. At the command prompt, type the following command, and then press Enter:

C:\CustomApp\app1.bat

 Task 6: View AppLocker events in an event log


1. On LON-CL1, point to the lower-right corner of the screen, and then click the Search charm when it
appears.

2. In the Search box type eventvwr.msc, and then press Enter.

3. In the Event Viewer window, expand Application and Services Logs, expand Microsoft, expand
Windows, and then expand AppLocker.

4. Click MSI and Scripts, and then review event log 8005 that contains the following text:
%OSDRIVE%\CUSTOMAPP\APP1.BAT was allowed to run.

If no events are displayed, ensure that the Application Identity service has started, and then try again.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L12-73

 Task 7: Create a rule that allows software to run from a specific location
1. On LON-DC1, in Server Manager, click Tools, and then click Group Policy Management.

2. In the Group Policy Management Console, expand the Group Policy Objects node, right-click
Software Control, and then click Edit.
3. In the Group Policy Management Editor window, go to Computer Configuration\Policies
\Windows Settings\Security Settings\Application Control Policies\AppLocker.

4. Right-click Script rules, and then click Create New Rule.

5. On the Before You Begin page, click Next.


6. On the Permissions page, click Allow, and then click Next.

7. On the Conditions page, click Path, and then click Next.


8. On the Path page, in Path, type the path %OSDRIVE%\CustomApp\app1.bat, and then click Next.

9. On the Exception page, click Next.

10. On the Name and Description page, in Name, type Custom Application Rule, and then
click Create.

 Task 8: Modify the Software Control GPO to enforce rules


1. In the Group Policy Management Editor window, in the navigation pane, click AppLocker, and then
in the right-hand pane, click Configure rule enforcement.
2. In AppLocker Properties dialog box, under Executable rules, select the Configured check box, and
then from drop-down menu, click Enforce rules.

3. Repeat the previous step for Windows Installer Rules, Script Rules, and Packaged app Rules, and
then click OK.

4. Close the Group Policy Management Editor window.

 Task 9: Verify that an application can still be run


1. Switch to LON-CL1.
2. Point to the lower-right corner of the screen, and then click the Search charm when it appears.

3. In the Search box type cmd, and then press Enter.

4. In the Command Prompt window, type the following command, and then press Enter:

gpupdate /force

5. Close the Command Prompt window.


6. Point to the lower-right corner of the screen, and then click the Settings charm when it appears.

7. Click Power, and then click Restart.

8. Sign in to LON-CL1 as Adatum\Tony with the password Pa$$w0rd.


9. Point to the lower-right corner of the screen, and then click the Search charm when it appears.

10. In the Search box, type cmd, and then press Enter.
11. In the Command Prompt window, type following command, and then press Enter:

C:\customapp\app1.bat
MCT USE ONLY. STUDENT USE PROHIBITED
L12-74 Securing Windows Servers by Using Group Policy Objects

 Task 10: Verify that an application cannot be run


1. On LON-CL1, on the taskbar, click the File Explorer icon.

2. In File Explorer, in the navigation pane, click Computer.

3. In the Computer window, double-click Local Disk (C:), double-click the CustomApp folder, right-
click app1.bat, and then click Copy.

4. In the CustomApp window, on the navigation pane, right-click the Documents folder, and then
click Paste.

5. In the Command Prompt window, type C:\Users\Tony\Documents\app1.bat, and then press Enter.
6. Verify that applications cannot be run from the Documents folder, and that the following message is
displayed: “This program is blocked by Group Policy. For more information, contact your system
administrator.”
7. Close all open windows, and then sign out from LON-CL1.

Results: After completing this exercise, you will have configured AppLocker policies for all users whose
computer accounts are located in the Client Computers OU. The policies you configured should allow
these users to run applications that are located in the folders C:\Windows and C:\Program Files, and run
the custom-developed application app1.bat in the C:\CustomApp folder.

Exercise 2: Configuring Windows Firewall


 Task 1: Create a group named Application Servers
1. Switch to LON-DC1.
2. In the Server Manager window, click Tools, and then click Active Directory Users and Computers.

3. In Active Directory Users and Computers, in the navigation pane, right-click the Member Servers OU,
click New, and then click Group.
4. In the New Object – Group window, in Group Name, type Application Servers, and then click OK.

 Task 2: Add LON-SVR1 as a group member


1. In Active Directory Users and Computers, in the navigation pane, click the Member Servers OU, and
in the details pane, right-click Application Servers group, and then click Properties.

2. In the Application Server Properties dialog box, click the Members tab, and then click Add.
3. In Select Users, Computers, Service Accounts or Groups, click Object Types, click Computers, and
then click OK.

4. In the Enter the object names to select box, type LON-SVR1, and then click OK.

5. In the Application Server Properties dialog box, click OK.

 Task 3: Create a new Application Servers GPO


1. On LON-DC1, in Server Manager, click Tools, and then click Group Policy Management.

2. In the Group Policy Management Console, expand Forests: Adatum.com, expand Domains, expand
Adatum.com, right-click Group Policy Objects, and then click New.

3. In the New GPO window, in Name, type Application Servers GPO, and then click OK.

4. In the Group Policy Management Console, right-click Application Servers GPO, and then click Edit.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L12-75

5. In the Group Policy Management Editor window, go to Computer Configuration\Policies


\Windows Settings\Security Settings\Windows Firewall with Advanced Security.

6. Click Windows Firewall with Advanced Security - LDAP://CN={GUID}.


7. In the Group Policy Management Editor window, click Inbound Rules.

8. Right-click Inbound Rules, and then click New Rule.

9. In the New Inbound Rule Wizard, on the Rule Type page, click Custom, and then click Next.
10. On the Program page, click Next.

11. On the Protocol and Ports page, in the Protocol type list, click TCP.

12. In the Local port list, click Specific Ports, in the text box type 8080, and then click Next.
13. On the Scope page, click Next.

14. On the Action page, click Allow the connection, and then click Next.

15. On the Profile page, clear both the Private and Public check boxes, and then click Next.

16. On the Name page, in the Name box, type Application Server Department Firewall Rule, and then
click Finish.

17. Close the Group Policy Management Editor window.

 Task 4: Link the Application Servers GPO to the Member Servers OU


1. On LON-DC1, in the Group Policy Management Console, right-click Member Servers OU, and then
click Link an Existing GPO.

2. In the Select GPO window, in the Group Policy objects list, click Application Servers GPO, and then
click OK.

 Task 5: Use security filtering to limit the Application Server GPO to members of
Application Server group
1. On LON-DC1, in the Group Policy Management Console, click Member Servers OU.

2. Expand the Member Servers OU, and then click the Application Servers GPO link.
3. In the Group Policy Management Console message box, click OK.

4. In the right-hand pane, under Security Filtering, click Authenticated Users, and then click Remove.

5. In the Confirmation dialog box, click OK.


6. In the details pane, under Security Filtering, click Add.

7. In the Select User, Computer, or Group dialog box, type Application Servers, and then click OK.

 Task 6: Run gpupdate on LON-SVR1


1. Switch to LON-SVR1, and then sign in as Adatum\Administrator with the password Pa$$w0rd.

2. Point to the lower-right corner of the screen, and then click the Search charm when it appears.
3. In the Search box, type cmd, and then press Enter.

4. In the Command Prompt window, type the following command, and then press Enter:

gpupdate /force

5. Close the Command Prompt window.


6. Restart LON-SVR1, and then sign back in as Adatum\Administrator with the password Pa$$w0rd.
MCT USE ONLY. STUDENT USE PROHIBITED
L12-76 Securing Windows Servers by Using Group Policy Objects

 Task 7: View the firewall rules on LON-SVR1


1. Switch to LON-SVR1.

2. In Server Manager, click Tools, and then click Windows Firewall with Advanced Security.

3. In the Windows Firewall with Advanced Security window, click Inbound rules.

4. In the right-hand pane, verify that the Application Server Department Firewall Rule that you
created earlier by using Group Policy is configured.

5. Verify that you cannot edit the Application Server Department Firewall Rule, because it is
configured through Group Policy.

Results: After completing this exercise, you will have used Group Policy to configure Windows Firewall
with Advanced Security to create rules for application servers.

 Prepare for the next module


When you finish the lab, revert the virtual machines to their initial state by performing the following steps:
1. On the host computer, start Hyper-V® Manager.

2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.
3. In the Revert Virtual Machine dialog box, click Revert.

4. Repeat steps 2 and 3 for 20410D-LON-SVR1 and 20410D-LON-CL1.


MCT USE ONLY. STUDENT USE PROHIBITED
L13-77

Module 13: Implementing Server Virtualization with


Hyper-V
Lab: Implementing Server Virtualization
with Hyper-V
Exercise 1: Installing the Hyper-V Role onto a Server
 Task 1: Install the Hyper-V role onto a server
1. On LON-HOST1, in Server Manager, click Local Server.

2. In the Properties pane, click the IPv4 address assigned by DHCP, IPv6 enabled link.
3. In the Network Connections dialog box, right-click the network object, and then click Properties.

4. In the Properties dialog box, click Internet Protocol Version 4 (TCP/IPv4), and then click
Properties.
5. In the Properties dialog box, on the General tab, click Use the following IP address, and then
configure the following:

o IP Address: 172.16.0.31
o Subnet mask: 255.255.0.0

o Default gateway: 172.16.0.1

6. On the General tab, click Use the following DNS server addresses, and then configure the
following:
o Preferred DNS server: 172.16.0.10

7. Click OK to close the Properties dialog box.


8. In the Properties dialog box of the network object, click Close.
9. Close the Network Connections dialog box.

10. In the Server Manager console, from the Manage menu, click Add Roles and Features.
11. In the Add Roles and Features Wizard, on the Before you begin page, click Next.

12. On the Select installation type page, click Role-based or feature-based installation, and then
click Next.
13. On the Select destination server page, ensure that LON-HOST1 is selected, and then click Next.

14. On the Select server roles page, select Hyper-V.

15. In the Add Roles and Features Wizard, click Add Features.

16. On the Select server roles page, click Next.


17. On the Select features page, click Next.

18. On the Hyper-V page, click Next.

19. On the Virtual Switches page, verify that no selections have been made, and then click Next.

20. On the Virtual Machine Migration page, click Next.

21. On the Default Stores page, review the location of the Default Stores, and then click Next.
MCT USE ONLY. STUDENT USE PROHIBITED
L13-78 Implementing Server Virtualization with Hyper-V

22. On the Confirm installation selections page, click Restart the destination server automatically if
required.

23. In the Add Roles and Features Wizard, review the message regarding automatic restarts, and then
click Yes.
24. On the Confirm Installation Selections page, click Install.

After a few minutes, the server restarts automatically. Ensure that you restart the machine from the
boot menu as 20410D-LON-HOST1. The computer will restart several times.

 Task 2: Complete the Hyper-V role installation, and verify the settings
1. Sign in to LON-HOST1 by using the account Administrator with the password Pa$$word.

2. When the installation of the Hyper-V tools is complete, click Close to close the Add Roles and
Features Wizard.
3. In the Server Manager console, click the Tools menu, and then click Hyper-V Manager.

4. In the Hyper-V Manager console, click LON-HOST1.


5. In the Hyper-V Manager console, in the Actions pane, with LON-HOST1 selected, click Hyper-V
Settings.

6. In the Hyper-V Settings for LON-HOST1 dialog box, click the Keyboard item. Verify that the
Keyboard is set to the Use on the virtual machine option.

7. In the Hyper-V Settings for LON-HOST1 dialog box, click the Virtual Hard Disks item.

8. Verify that the location of the default folder to store Virtual Hard Disk files is
C:\Users\Public\Documents\Hyper-V\Virtual Hard Disks, and then click OK.

Results: After completing this exercise, you should have installed the Hyper-V role onto a physical server.

Exercise 2: Configuring Virtual Networking


 Task 1: Configure the external network
1. In the Hyper-V Manager console, click LON-HOST1.

2. From the Actions menu, click Virtual Switch Manager.


3. In the Virtual Switch Manager for LON-HOST1 dialog box, click New virtual network switch.
Ensure that External is selected, and then click Create Virtual Switch.

4. In the Virtual Switch Properties area, enter the following information, and then click OK:
o Name: Switch for External Adapter

o External Network: Mapped to the host computer’s physical network adapter. (This varies
depending on the host computer.)

5. In the Apply Networking Changes dialog box, review the warning, and then click Yes.

 Task 2: Create a private network


1. In Hyper-V Manager click LON-HOST1 and from the Actions menu, click Virtual Switch Manager.

2. Under Virtual Switches, click New virtual network switch.

3. Under Create virtual switch, click Private, and then click Create Virtual Switch.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L13-79

4. In the Virtual Switch Manager dialog box, in the Virtual Switch Properties section, configure the
following settings, and then click OK:

o Name: Private Network


o Connection type: Private network

 Task 3: Create an internal network


1. In Hyper-V Manager click LON-HOST1, and from the Actions menu, click Virtual Switch Manager.

2. Under Virtual Switches, click New virtual network switch.


3. Under Create virtual switch, click Internal and then click Create Virtual Switch.

4. In the Virtual Switch Manager dialog box, in the Virtual Switch Properties section, configure the
following settings, and then click OK:

o Name: Internal Network


o Connection type: Internal network

 Task 4: Configure the MAC address range


1. In Hyper-V Manager, click LON-HOST1 and from the Actions menu, click Virtual Switch Manager.
2. Under Global Network Settings, click MAC Address Range.

3. On MAC Address Range settings, configure the following values, and then click OK:

o Minimum: 00-15-5D-0F-AB-A0
o Maximum: 00-15-5D-0F-AB-EF

4. Close the Hyper-V Manager console.

Results: After completing this exercise, you should have configured virtual switch options on a physically
deployed Windows Server 2012 server that is running the Hyper-V role.

Exercise 3: Creating and Configuring a Virtual Machine


 Task 1: Create differencing virtual hard disks
1. On the taskbar, click the File Explorer icon.
2. Expand This PC, expand drive E, expand Program Files, expand Microsoft Learning, and then
expand Base.

Note: The drive letter may depend upon the number of drives on the physical host
computer.

3. In the Base folder, verify that the Base14A-WS12R2.vhd hard disk image file is present.

4. Click the Home tab, and then click the New Folder icon twice to create two new folders. Right-click
each folder, and then rename the folders as follows:

o LON-GUEST1

o LON-GUEST2
5. Close File Explorer.
MCT USE ONLY. STUDENT USE PROHIBITED
L13-80 Implementing Server Virtualization with Hyper-V

6. In the Server Manager console, click Tools, and then click Hyper-V Manager.

7. In the Hyper-V Manager console, in the Actions pane, click New, and then click Hard Disk.

8. In the New Virtual Hard Disk Wizard, on the Before You Begin page, click Next.

9. On the Choose Disk Format page, click VHD, and then click Next.

10. On the Choose Disk Type page, click Differencing, and then click Next.

11. On the Specify Name and Location page, specify the following details, and then click Next:

o Name: LON-GUEST1.vhd

o Location: E:\Program Files\Microsoft Learning\Base\LON-GUEST1\

Note: The drive letter may depend upon the number of drives on the physical host
computer.

12. On the Configure Disk page, type the location: E:\Program Files\Microsoft Learning\Base\
Base14A-WS12R2.vhd, and then click Finish.
13. On the desktop, on the taskbar, click the Windows PowerShell® icon.
14. At the Windows PowerShell prompt, type the following command to create a new differencing virtual
hard disk to be used with LON-GUEST2, and then press Enter:

New-VHD "E:\Program Files\Microsoft Learning\Base\LON-GUEST2\LON-GUEST2.vhd"


-ParentPath "E:\Program Files\Microsoft Learning\Base\ Base14A-WS12R2.vhd"

15. Close Windows PowerShell.

16. In the Hyper-V Manager console, in the Actions pane, click Inspect Disk.

17. In the Open dialog box, browse to E:\Program Files\Microsoft Learning\Base\LON-GUEST2\, click
LON-GUEST2.vhd, and then click Open.

18. In the Virtual Hard Disk Properties dialog box, verify that LON-GUEST2.vhd is configured as a
differencing virtual hard disk with E:\Program Files\Microsoft Learning\Base\
Base14A-WS12R2.vhd as a parent, and then click Close.

 Task 2: Create virtual machines


1. In Hyper-V Manager click LON-HOST1 and from the Actions pane, click New, and then click Virtual
Machine.

2. In the New Virtual Machine Wizard, on the Before You Begin page, click Next.

3. On the Specify Name and Location page, click Store the virtual machine in a different location,
enter the following values, and then click Next:

o Name: LON-GUEST1

o Location: E:\Program Files\Microsoft Learning\Base\LON-GUEST1\

Note: The drive letter may depend upon the number of drives on the physical host
computer.

4. On the Specify Generation page, select Generation 1, and then click Next.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L13-81

5. On the Assign Memory page, enter a value of 1024 MB, select the Use Dynamic Memory for this
virtual machine option, and then click Next.

6. On the Configure Networking page, for the connection, click Private Network, and then click
Next.
7. On the Connect Virtual Hard Disk page, click Use an existing virtual hard disk. Click Browse,
browse to E:\Program Files\Microsoft Learning\Base\LON-GUEST1\LON-GUEST1.vhd, click
Open, and then click Finish.

8. On the desktop, on the taskbar, click the Windows PowerShell icon.

9. At the Windows PowerShell prompt, type the following command to create a new virtual machine
named LON-GUEST2, and then press Enter:

New-VM -Name LON-GUEST2 -MemoryStartupBytes 1024MB -VHDPath "E:\Program


Files\Microsoft Learning\Base\LON-GUEST2\LON-GUEST2.vhd" -SwitchName "Private
Network"

10. Close Windows PowerShell.


11. In the Hyper-V Manager console, click LON-GUEST2.

12. In the Actions pane, under LON-GUEST2, click Settings.


13. In the Settings for LON-GUEST2 on LON-HOST1 dialog box, click Automatic Start Action, and set
the Automatic Start Action to Nothing.

14. In the Settings for LON-GUEST2 on LON-HOST1 dialog box, click Automatic Stop Action, and set
the Automatic Stop Action to Shut down the guest operating system.

15. Click OK to close the Settings for LON-GUEST2 on LON-HOST1 dialog box.

 Task 3: Enable resource metering


1. On the taskbar, click the Windows PowerShell icon.
2. At the Windows PowerShell prompt, enter the following commands to enable resource metering on
the virtual machines, pressing Enter at the end of each line:

Enable-VMResourceMetering LON-GUEST1
Enable-VMResourceMetering LON-GUEST2

Results: After completing this exercise, you should have deployed two separate virtual machines by using
a sysprepped virtual hard disk file as a parent disk for two differencing virtual hard disks.

Exercise 4: Using Virtual Machine Checkpoints


 Task 1: Deploy Windows Server 2012 in a virtual machine
1. In the Hyper-V Manager console, click LON-GUEST1.

2. In the Actions pane, click Start.

3. Double-click LON-GUEST1 to open the Virtual Machine Connection Window.


MCT USE ONLY. STUDENT USE PROHIBITED
L13-82 Implementing Server Virtualization with Hyper-V

4. In the LON-GUEST1 on LON-HOST1 - Virtual Machine Connection window, perform the following
steps:

o On the Settings page, click Next to accept the Region and Language settings.
o On the Settings page, click I accept.

o On the Settings page, type the password Pa$$w0rd twice, and then click Finish.

5. In the LON-GUEST1 on LON-HOST1 - Virtual Machine Connection window, from the Action menu,
click CTRL+Alt+Delete.
6. Sign in to the virtual machine by using the account Administrator and the password Pa$$w0rd.

7. On the virtual machine, in the Server Manager console, click Local Server, and then click the
randomly assigned name next to the computer name.

8. In the System Properties dialog box, on the Computer Name tab, click Change.

9. In the Computer Name field, type LON-GUEST1, and then click OK.

10. In the Computer Name/Domain Changes dialog box, click OK.


11. Click Close to close the System Properties dialog box.

12. In the Microsoft Windows dialog box, click Restart Now.

 Task 2: Create a virtual machine checkpoint


1. Sign in to the LON-GUEST1 virtual machine by using the Administrator account and the password
Pa$$w0rd

2. In the Server Manager console, click the Local Server node, and verify that the name of the computer
is set to LON-GUEST1.

3. In the Virtual Machine Connection window, from the Action menu, click Checkpoint.

4. In the Checkpoint Name dialog box, type the name Before Change, and then click Yes.

 Task 3: Modify the virtual machine


1. In the Server Manager console, click Local Server, and then next to Computer name, click
LON-GUEST1.

2. In the System Properties dialog box, on the Computer Name tab, click Change.

3. In the Computer Name field, type LON-Computer1, and then click OK.
4. In the Computer Name/Domain Changes dialog box, click OK.

5. Close the System Properties dialog box.

6. In the Microsoft Windows dialog box, click Restart Now.


7. Sign back in to the LON-GUEST1 virtual machine by using the Administrator account and the
password Pa$$w0rd.

8. In the Server Manager console, click Local Server, and then verify that the server name is set to
LON-Computer1.
MCT USE ONLY. STUDENT USE PROHIBITED
Installing and Configuring Windows Server® 2012 L13-83

 Task 4: Revert to the existing virtual machine checkpoint


1. In the Virtual Machine Connection window, from the Action menu, click Revert.

2. In the Revert Virtual Machine dialog box, click Revert.

3. In the Server Manager console, in the Local Server node, in the Virtual Machines list, verify that the
Computer Name now is set to LON-GUEST1.

 Task 5: View resource metering data


1. On LON-HOST1, on the taskbar, click the Windows PowerShell icon.

2. To retrieve resource metering information, at the Windows PowerShell prompt, enter the following
command, and then press Enter:

Measure-VM LON-GUEST1

Note the average central processing unit (CPU), average random access memory (RAM), and total disk
usage figures.
3. Close the Windows PowerShell window.

Results: After completing this exercise, you should have used virtual machine checkpoints to recover from
a virtual machine misconfiguration.

 Revert the virtual machines


After you finish the lab, restart the computer in Windows Server 2012 by performing the following steps:

1. On the taskbar, click the Windows PowerShell icon.


2. At the Windows PowerShell command prompt, type the following command, and then press Enter:

Shutdown /r /t 5

3. From the Windows Boot Manager, select Windows Server 2012.


MCT USE ONLY. STUDENT USE PROHIBITED

You might also like