MC108 Lecture 1103 - PowerPoint PPT Presentation

1 / 37
About This Presentation
Title:

MC108 Lecture 1103

Description:

Beyond basic object (file/print) services... Administering (enterprise) internal services ... Build a library/repertoire of skills. Scenarios... Practice HowTos ... – PowerPoint PPT presentation

Number of Views:37
Avg rating:3.0/5.0
Slides: 38
Provided by: phillip68
Category:
Tags: lecture | mc108

less

Transcript and Presenter's Notes

Title: MC108 Lecture 1103


1
MC108Lecture 11/03
  • Introduction
  • Installation

2
Relating to Business Issues
  • Standalone, Workgroup vs. Domain
  • Decentralized vs. Centralized management
  • Object vs. Policy Management
  • Startup Installation and Configuration
  • Object Management in Domain Organizations
  • Ongoing Administration and ManagementConfiguratio
    n, Performance, Auditing of objects in a
    namespace
  • Beyond File and Print services

3
Network Administration
  • Beyond basic object (file/print) services
  • Administering (enterprise) internal services
  • Directory services
  • Network Infrastructure
  • Administering external services
  • Internet services
  • RRAS and DUN
  • Other service features like Terminal Services,
    RIS
  • Specialized services like messaging, database,
    etc.

4
This Course
  • Course Objectives are to
  • demonstrate knowledge of terms and concepts and
    as well as competency in installation,
    configuration, and management of W2K server and
    its domain environment.
  • Course Scope
  • Terminology Concepts
  • Practical Skills Design and Deployment

5
Course plan
  • Lecture and reading
  • Describe and demonstrate HowTos
  • Build a library/repertoire of skills
  • Scenarios
  • Practice HowTos through design and deployment
  • Midterm and Final Assessments will cover BOTH
    concept and practice

6
Chapters
Topics
  • Introduction
  • Installation
  • Unattended Installation
  • File Systems
  • File Systems
  • Active Directory
  • Server Administration Object Management
  • Print Services
  • Network Services
  • RRAS
  • Security
  • Reliability Disaster Recovery
  • Monitoring
  • Other Application Services

7
  • Introduction
  • Installation
  • Unattended Installation
  • File Systems
  • File Systems
  • Active Directory
  • Server Administration Object Management
  • Print Services
  • Network Services
  • RRAS
  • Security
  • Reliability Disaster Recovery
  • Monitoring
  • Other Application Services

8
  • Introduction
  • Installation
  • Unattended Installation
  • File Systems
  • File Systems
  • Active Directory
  • Server Administration
  • Print Services
  • Network Services
  • RRAS
  • Security
  • Reliability Disaster Recovery
  • Monitoring
  • Other Application Services

Installation
File Organization
Maintenance
Infrastructure
Policy
Maintenance
Infrastructure
9
  • 01. Introduction
  • 02. Installation
  • 03. Unattended Installation
  • 04. File Systems
  • 05. File Systems
  • 06. Active Directory
  • 07. Server Administration
  • 08. Print Services
  • 12. Reliability
  • 13. Monitoring
  • 11. Security
  • 09. Network Services
  • 10. RRAS
  • 14. Other Application Services

Installation
File Organization
Maintenance
Maintenance
Policy
Infrastructure
Infrastructure
10
  • 01. Introduction
  • 02. Installation
  • 03. Unattended Installation
  • 04. File Systems
  • 05. File Systems
  • 06. Active Directory
  • 07. Server Administration
  • 08. Print Services
  • 12. Reliability
  • 13. Monitoring
  • 11. Security
  • 09. Network Services
  • 10. RRAS
  • 14. Other Application Services

11/5
11/7
11/10
11/12
11/14
Policy
Infrastructure
Infrastructure
11
Enterprise Management Plans
  • Phase 1 Installation and Configuration
  • Best Practices Design, Deploy, Test
  • Phase 2 Object management (People/Property)
  • Best Practices Design, Deploy, Test
  • Phase 3 Administration, Performance, and
    Security Policy management
  • Best Practices Design, Deploy, Test
  • Plans for Disaster Recovery, Security, etc.

12
Specific Management Functional Areas
  • Security Management - where?
  • Auditing Management - when?
  • Configuration Management - who?
  • Fault Management - what?
  • Performance Management - how?

13
Deployment Plan
  • Phase 1 Installation and Configuration
  • Best Practices Design
  • HowTo
  • Test / Assessment
  • Phase 2 People/Resource Management
  • Best Practices Design
  • HowTo
  • Test / Assessment
  • Phase 3 Ongoing Administration (Policy)
  • Best Practices Design
  • HowTo
  • Test / Assessment

14
Organizational Objectives / Scope
  • People and property as objects
  • Each has attributes (values) and specific data
  • Each needs to be authenticated
  • Each has a list of access rights or permissions
  • Process
  • Between local machines, process/services need
    to be authenticated too!
  • Each assumes the role of an object in a process
    or workflow
  • Policy
  • Local and Global (Domain, Enterprise)

15
Windows 2000 Workgroups
16
Legacy Single Domain Models
17
Windows 2000 Domains
18
Domain Trees
19
Generic Domain Relationships
Trusted Domain
User/Group Account
Trusting Domain
Token
Validation Request
ACL
ace ace ace ace
20
Two-Way Transitive Trusts
21
Namespace
22
Organizational Units
23
Objects
24
Object Authentication
Logon
Logon Dialog Box CtrlAltDelete
Security Subsystem
User Mode
Kernel Mode
ACL
SAM/AD
Access Token
25
Generic Microsoft NOS Architecture
26
W2K Architectural Overview
27
W2K Kernel-Mode Drivers
28
Introduction
  • Design
  • Operating System features
  • Operating System architecture
  • Workgroup vs. Domain
  • Directory Services
  • Deployment
  • Installation Methods

29
To be continued
30
Troubleshooting
  • Define the problem
  • Identify the context of the problem
  • Design and implement a solution
  • Replicate results to verify solution
  • Document problem and solution

31
Describe an Objective
  • Differences between
  • goals and objectives
  • unstructured and structured solutions
  • strategic and tactical plans
  • Objectives and Scope

32
Defining a Scope
  • Describe situation in terms of dimensions
  • who? Identify objects involved
  • where? Physical/Logical/Layer?
  • when? State a trigger, precedents
  • what? State a source, dependencies
  • how? State a mechanism
  • Use specific functional management areas to
    categorize the event. Use HowTos to
    identify/verify the above dimensions.

33
Building a HOWTO
  • Identify a single issue and an Immediate
    Solution to that specific issue.
  • Specify the procedure(s), in numbered steps, that
    will achieve the task/scope/objective.
  • Cite possible issues pertaining to any step in
    the HOWTO procedure
  • Summarize at least ONE Best Practices that
    pertains to this Immediate Solution

34
Installations
  • Basic Installation
  • Bootable CDROM
  • Non-bootable CDROM
  • Network Installation (simple share)
  • Network Installation (with answer file)
  • Simulated cloning with sysprep
  • Remote Installation with answer file

35
Tools
  • Identifying interfaces features and configuring a
    friendly environment
  • Reviewing Administrative Tools
  • Building and modifying an MMC
  • Reviewing ways to document System State

36
Hardware Requirements xlii
  • Pentium 133
  • RAM 128 MB
  • Storage 2 GB minimal
  • 12x CDROM drive
  • VGA with 800x600 resolution
  • Mouse/keyboard

37
MC 108 Objective
  • How do I keep you awake for 4 weeks?
  • Scope
  • 1. Cover material as efficiently as possible
  • 2. Generate labs????
Write a Comment
User Comments (0)
About PowerShow.com