Mcse Notes

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 90

Erasoft IT College

What is Microsoft?
Microsoft is Company Name This Company Are Product Windows or Software
Product: Windows XP. 2000. 98. 2003. 2008.Windows 7. Windows Vista ETC
Also Product: Application Software M.S Office. ETC

What is Four Pillars of I.T?


Information Technology
1: Programs 2: Data Base 3: Web Page 4: Network
(Visual Basic) (SQL Server) (ASP.Net) (MCSE / Mcitp)
Java / oracle

Information about Version of Windows Server


Windows NT
Windows 2000 Advance
Windows 2003
Windows 2008
Windows 2012

MCSE Course Consist on 5 Papers

MCTS MCSE MCSE Upgrade


(Server Admin striation) (Server Enterprise)

Microsoft Certified Microsoft Certified Information Microsoft Certified Information


Technology Specialist Technology Professional Technology Professional

1) Windows 8 (70-680) 2) Active Directory Server 2008(70-640) 5) Windows Application


3) Network Infrastructure (70-642) Infrastructure (70-643)
4) Server Administrator 2008(70-646)

Upgrade
Server Advance Server Enterprise
MCITP  MCSE MCITP  MCSE
(70-648) (70-649)

History of Windows Server 2012


In 2007 Windows Vista Realsed in Market in Client Side Which Not Fulfill the Require Mends of
Market of market that is why Microsoft Release Windows 2012 Server to Fulfill all the Requirements
of Clients Side There Are Two Approaches With a System Administrator
1: Reactive Approach (Past Planning)
2: Proactive Approach (Preplanning)

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

How to Exam Procedure


 Online Registration
 www.registr.prometric.com Sign in Sign up
 Making Profile Fristname lastname F/name
 Select I .T  Microsoft
 Select Paper exp: Win 10 Server Administrator network Security
 Select Country / City jalalabad.Afghanistan
 Select Exam Center kabul.Afghanistan
 Select Data / Time 20/10/2022 10:00:00 AM create Account
 Reschedule 25/10/2022 10:00:00 AM
 Total No: 1000
 Passing No: 700
 Provisional Certificate
 Question Types
 MCQS Manning Multiple Choices Question
 Simulation
 Per Paper Question 45
 Exam Duration 4 Hours
 Dumps (All of Question available on Dumps out of Paper) (WWW.Examcollection.com)
 Pass 4 Sure
 Testing Side
 Per Paper Cost 120 $
 Original Certificate Will Be Pay (15) Days After

How Many Administrators in Network Environment

System Administrator Network Administrator Data Base Administrator

What is System administrator: A Person who must have Idea about LAN Following Courses
EXP: MCSE Microsoft Certified System Engineer (Windows Server 2003)
EXP: RHCE Read Hat Certified Engineer (Linux Windows)
EXP: MCITP Microsoft Certified Information Technology Professional (Windows Server 2008)

What is Network Administrator: A Person Who Must Have Idea about WAN Following Courses
EXP: CCNA Cisco Certified Network Administrator
EXP: CCNP Cisco Certified Network Professional
EXP: CCIE Cisco Certified Internet work Expert

What is Data Base Administrator: A Person Who Must Have Idea about Database Following
Courses
EXP: Microsoft Access
EXP: Oracle
EXP: Ms DBA (Microsoft Certified Data Best Administrator)

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is Network?
Groups of Devices which are interconnected to each other using Same Media
Which Share Information and May be Resources Every Network have a golly to Achieve

Computer Network History


The First Computer Network was Created in 1969 Under the American Military the Network was Named
{Arpanet}
Advance Research Project army {Arpanet} a resort agency was reestablished under the Military by john Kandy
this Research agency was a Re-action to USSRS Sputnik a Satellite Created by USSR
“Uintcerf” This is a Name of Person Create Ports

How Many Networks


LAN MAN WAN PAN

What is LAN: Local Area Network


A Group of Pc Are Connected with One Another by Cable which is Single Location That Is Called LAN
EXP: Room, LAB, Building, and Company
Years 1973 Create by Bob Meta Calf Invented

What is MAN: Metropolitan Area Network


Combine Different LAN with One Another With in City That Is Called MAN

What is WAN: Wide Area Network


Group OF Pc Are Connected with One Another By geographically or Internet that is Called WAN

What is Personal Area Networks


 What is PAN: Sending or Receiving Data by Mobile Bluetooth that is Called PAN

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is LAN Requirement?

Wired LAN Wireless LAN

Pc  Access Point


Connector  Wifi
LAN Card  Wireless USB
Cable  LAN Card Wifi
Switch /Hub /Bridge  PC Card Wifi
Crimping Tools
 Testing Meter

What is LAN Card?


Used to connect two Devices With one Another that is LAN card.

{Names of LAN Cards}


Network Adapter
Nic Card (Network Interface Card)
LAN Card

Types of LAN card

 Beltane  Non-Beltane
What is Beltane :>
What is Non Beltane :>
Attach in Mother Board I Means Fix with Mother Board manually insert in Expansion Slot

Lights of LANCARD
Red Yellow

When we Connecting Two Device When Two Device


Sending/Receiving
With one and Another in this Time With One and Another in This Time
Red Lights On Yellow On

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is Duplex?
Manning of Duplex (Communication WAY)

Types of Duplex

Simple Half Full


What is Simple Duplex:
Only Receive Information
Exp: TV Antenna

What is Half Duplex:


Only One Time Information Sending or Receiving
Exp: Hub

What is Full Duplex:


At one Time sending or Receiving
Exp: Internet, Mobil

What is HUB
{Mining of HUB {Hybrid Unit Board}
 Used In LAN
 Half Duplex
10 Mbps
 Have 8,16,24,32,120 ports
 Work On Physical Layer
 Work on Bit and Signal
 All Cables work on Bit
 Non-intelligent
 Collision / One Door
 Low Bandwidth 100
 Old Technology
 Broad Costing
 High Latency
 Also Called Multiport Repeater

Types of HUB

Passive Active Intelligent


Not Amplifier Send and Receive Amplifier Send and Receive Data
Data Monitoring Ports
Oldest Device 2 Ports Sending and Receive

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is Amplifier?
Convert Weak Signals into Strong Signals

What is Intelligent?

Normal Catalyst Multi layer

Used in LAN Side Used in LAN Side Used in WAN Side


Can’t Block Ports Block Ports Just Like Catalyst
Can’t Control Management Control Management Switch
Can’t Create. Change. Delete IOS Create. Change. Delete IOS Software Fast Communication
Software Take Backup of IOS
Not Take Backup of IOS Create VLAN

What is Bridge
LAN Device
 100 Mbps
 Have 2.4 ports
 Full Duplex
 Work on Hardware (Application Specific Integrated Circuit)
 Operating On Data Link Layer (IOS)
 Bit Become to Frame
 Intelligent Device
 Bread casting
 Low Latency
 New Technology
 Bridge / Switch Work Faster Then Router
 Mac Table
Is used to Store Mac address of LAN Card
Send / Receive LAN According MAC Address
Send / Receive WAN According IP Address

What is Switch
LAN Device
 10,100 Mbps
 Have 8, 16, 32.120 ports
 Half and Full Duplex
 Work on Hardware (Application Specific Integrated Circuit)
 Operating On Data Link Layer (OSI)
 Bit Become to Frame
 Intelligent Device
 Bread casting
 Low Latency
 New Technology
 Bridge / Switch Work Faster Then Router
 Mac Table
 Mac Table
Is used to Store Mac address of LAN Card
Send / Receive LAN According MAC Address
Send / Receive WAN According IP Address

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

Types of Switch

Normal Catalyst Multi Layers


Used in LAN Side Used in LAN Side Used in WAN Side
Can’t Block Ports Block Ports Just Like Catalyst
Can’t Control Management Control Management Switch
Can’t Create. Change. Delete IOS Create. Change. Delete IOS Software Fast Communication
Software and Ports and Ports Take Backup of IOS
Not Take Backup of IOS Create VLAN

Note: IOS Internet work Operation System This Software Installed in Switch

Connector
R J
Register Jack

Modem 11 LAN 45
R J 11 Is Use for Telephone and DSL Modem R J 45 is use for LAN Card and Switch or HUB

Crimping Tools
Or
Punching Tools
By This Machine we have Create Cable or Joining Connector with Cable

How Many Cables in Network Envermant


Coaxial Cable Fiber Optic Cable Twisted pair cable

Fiber Optic Cable


 Fiber Optic Cable use for High communication Speed
Fast Data Transfer
Mostly use in WAN side

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

Coaxial Cable
Coaxial Cable is use in TV cable is called Coaxial cable
This is used in Bus Topology

Twisted Pair cable

UTP STP
Unshielded Twisted Pair Shield Twisted pair
Use in LAN Used in LAN
Cheaper Then STP Expensive
Not Good Quality Good Quality
Then STP
Cat 4 80 meter
Cat 5 120 meter
Cat 6 180 meter
Cat 7 240 meter

Crease Cable
Used For Some Device
Combination Of Cress Cable
1 2 3 4 5 6 7 8
 Side (1) W+Orange == Orange == W+Green == Blue==W+Blue==Green == W+Brown==Brown

 Side (2) W+Green===Green===W+Orange===Blue===W+Blue==Orange ==W+Brown==Brown

Formula 12 36 send or Receiving


Formula 36 12 Send or Receiving
Step 2
SideA: W+Orange  OrangeW+GreenGreen
EXP:
HUB  Hub
Switch  Switch
Pc  Pc
Straight Cable
 When We Face Different Device for this Purpose we Use Straight Cable
We covet or Make Straight Cable

 Side (1) W+Orange==Orange==W+Green==Blue==W+Blue==Green== W+Brown==Brown

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
1 2 3 4 5 6 7 8
 Side (2) W+Orange==Orange==W+Green==Blue==W+Blue==Green==W+Brown==Brown

 Formal 12 36 Send or Receiving


 Formal 12 36 Send or Receiving

Exp:
 PC to Switch
 PC to HUB
 PC to Bridge
What is Roll Over Cable
Roll Over Cable is used to Open Setup of Cisco Router and Switch

Side A: W+Orange==Orange==W+Green==Blue==W+Blue==Green==W+Brown==Brown
Side B: Brown  W+Brown  Green  W+Blue  Blue  W+Green  Orange  W+Orange
What is IP ADDRESS?
The Meaning of IP is Internet Protocol Address
By which have two or More Device Communication with One and Another
This is Also Types of TCP

Kinds of IP Address

IP Version 4 IP Version 6
. . . . : : : : : : :

Octet Format Dotted Format Quartet Format Use Colon Format


Each Octet has 8BIT Each Quartet Has 16 BIT
Each 8 BIT has from 0 up to 255 IP

Used Network / Host Used Network / Host


Used Classes Concept Not Used Classes Concept
Used Broad Cast Used Multicast
Easily Configure Hard Configure
Short IP Address Long IP Address

Production of IP Address Company’s

IETF IANA ISP

IETF: Internet Engineer Task Farce


Design IPv4 and IPv6

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
This is an Organization
IPv4 Start on 1981 Set Come on the World

IANA: Internet Assign Number Austerity


This is an Organization
Buy IPv4 and IPv6 Frame IETF
Implement 50 me Rules Regulation in IPv4 and IPv6

ISP: Internet Service Provider


Buy IPv4 and IPv6 Address from IANA
Procedure on Customer

What is IPv4?
32 BIT
Use Dotted Format
Use Octet Concept
Consist 4 Octets
Each Octet has 8 BIT
Digital Value of Each octet Start From 0 Up to 255
Use Classes Concept
Use Network / Host
Less IP Address Then IPv6
32
Total IP Address {2} 4294967296

How Many Classes in IPv4

A B C E

What is Class A
Format of Class A

Network. Host. Host. Host English Language


8. 0. 0. 0 Numbers
||||||||. 00000000, 00000000 Binary

Rule: First Bit IS Off / Remaining Bit Are On


| | | | | | | |
128 64 32 16 8 4 2 1
64+32+16+8+4+2+1=127
0 127
Network Default Router

This Two IP Is Not Using One Is Network ID Another Is Router IP


Start = Run = 127.0.0.1 =ok

Valid Range of Class A network Acted


1 == 126
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Formula to Find Host Class A per Network
8+8+8=24
24
(2) 16777216 - 2 =16777214

Network ID 10.0.0.0
Host IP 10.0.0.1
Last IP 10.254.254.254

What is Class B
Format of Class B
Network, Network, Host, Host English
||||||||, ||||||||, 00000000, 00000000 Binary
8 8 0 0 Number

Formal First Bit On / Second Bit is OFF And Reaming Bit Are ON

128 32 16 8 4 2 1
| | | | | | |

128+32+16+8+4+2+1=191

Rang of class B Network Octet


128 191

Find Total Host in Class B

16
(2) 65536 – 2 = 65534
One is Server IP and Second Is Router IP

Start IP 128.16.0.1
End IP 128.31.255.255
Subnet Mask Class B 255.255.0.0

What is Class C
Format of Class C
Network. Network. Network. Host English
8 8 8 0 Number
|||||||| |||||||| |||||||| 00000000 Binary

Formal of Class C
First / Second Bit are ON and Third Bit is OFF / Reaming Bit Are ON
128 64 16 8 4 2 1
| | | | | | |

128+64+16+8+4+2+1=223

Range of Class C Network Octet


192 223

Find Total Host in Class C


8
(2) 256 – 2 = 254

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Start IP 192.168.100.1
End IP 192.168.100.254

Class D and E
Class D Class E
Range of Class D Range of Class E
224 239 240 255
Multi Costing Future Experiment

Rang of all Classes


A: 1 127
B: 128 191
C: 192 223
D: 224 239
E: 240 255

What Is Deference between Private and Public IP Address

Private IP Address Public IP Address

 Also Called LAN IP Address  also called WAN IP Address


 Not Routable In WAN  Routable In WAN
 Free Using  Not Free
Purchase from I S P
What Is I S P: Internet Service Provider

Types of Connection

Logical Physical

{Software or Protocol} {Hardware}


LAN Code 802.2
Wife Code 802.11
MTN Code 0333
Etisalat Code 078
What Is IPv6
Internet Protocol Vision 6
Also called net Generation address

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Developed by IETF (Internet Engineer Task Force)
Developed in Dec 1998
Consist on 128 BITS
Consist on 8 Group of Quartet
Used Hexadecimal Format
Used Colon Format
First Three Quartet Belong to network
One Quartet Belong to Subnet Mask
And Last 4 Quartet Belong to Interface or Host

IP Version 6
: : : : : : :

Quartet Format Use Colon Format

Each Quartet Has 16 BIT


Three Quartet Belong to Network 16+16+16=48
One is Belong to Subnet Mask 16 48+16=64
Last Four Quartet Belong to Host 16+16+16+16=64 64+64=128
Not Used Classes Concept
Used Network / Host
Used on Multicasting

IPV4
. . .

Used Octet Format Used Dotted Format


8 BITS
255 IP Address

: Used Network / Host


: Used Classes Concept
: Broadcasting

Start IPv6
2001:0000:0000:0000:0000:0000:0000:0000 This is Called Network ID

2001:0000:0000:0000:0000:0000:0000:0001 This is Called Network IP

How to Shorted cat


2001::1

Start IPv6
2001:000:0000:7777:7777:9999:7777:0001

How to Shorted Cat


Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
2001:: 7777:7777:9999:7777:1

How to Assign IPv6 and IPv4 in Window 7 and Server 2008


Right Click on Network  Properties  Click on Change Adapter Settings  Double Click on Local
Area Connection  Click on Properties  Double Click on Internet Protocol Version 4 or 6 (
TCP/IP)  IF You do Communication With LAN  Check on Use The Following IP Address
IF you do Communication with WAN  Check on Obtain an IP Address Automatically
 Ok  Close  Close

How to See Our IP Address


Right Click on Network  Properties  Click on Change Adapter Settings  Double Click on Local
Area Connection  Click on Details  See your IP Address

What Is Ping
Packet Internet Network Groups

This is used For Connectivity Two Device

Types OF Ping Message


Reply Request Time out Destination Host Unreachable Hardware Error

HOW TO See Our LAN Card IP Address


Start  Run  CMD  OK
Administrator>IPCONFIG  Press Enter

How to See Our LAN Card All Information


Start  Run  CMD  Ok
Administrator>IPCONFIG/ALL  Press Enter

How to Check Our Computer Name


Start  Run  CMD OK
Administrator>Hostname  Ok

How to See Connect another Network Reply


Start  Run  CMD  OK
Administrator>Ping 10.0.0.2  Enter
Message Is Reply Coming

How to See another Computer Request Time Out


Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

Pc OFF  Cable Not In LAN Card  Error in Cable  NIC Is Wrong

Start  Run  CMD  Ok


Administrator>Ping 10.0.0.2  Enter
Message Is Request Time Out Coming

How to See another Computer Destination Host


Your IP Is 10.0.0.1 You Ping another IP Address 192.168.100.1

Start  Run  CMD  Ok


Administrator>Ping 192.168.100.1  Enter
Message Is Destination Host Coming

How to See another Computer Hardware Error


Some One Put out Your LAN Card from Our Pc This Message Is Coming

Start  Run  CMD  Ok


Administrator>Ping 10.0.0.2  Enter
Message Is Hardware Error Coming

What is User
A User Account is a Collection of information that tells windows which files and folders you can access. What
Changes you can make to the computer. And you’re Personal Preferences. Such as your Desktop background or
screen save. User accounts let you share a computer with several people. While having your own files and
settings each person access his or her user account with a user name and Password

There are three types of accounts each types gives users a different level of control over the Computer

1) Standard accounts are for Everyday Computing


2) Administrator accounts provide the most control over a computer and should only be used when
necessary
3) Guest Accounts are Intended Primarily for people who need temporary use of a Computer

Types of User

Built-in Non Built-in


This Types of User Automatically Created This Types of User System Administrator
During The Installation of Operating System Created After the Installation of Operating
Such as Administrator Guest etc System Such as Khan Jan Nasrat etc

How Many Types of User

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

Control Panel My Computer Manage Batch File Command Prompt

How to Create by Control Panel


Click on Start  Click on Control Panel  Double Click on User Accounts  Click on Manage
Another Accounts  Click on Create new Account  Writ Name: Iqbul Shah  Select Power Types
1) Standard User: This User Can’t do Add Delete Chinning Users Software ETC
2) Administrator: This User Can do Add Delete Chinning Users Software ETC

 Select One of These  Click on Create Account 

How to Changing Your Password by Control Panel


Click on Manage Another Accounts  Click on Iqbul shah User or Any User 

Change the Account Name: If you changing the name of Iqbul shah then give another name
Create A Password: If you Set the Password for Iqbul shah User
Change the Picture: If you Changing Picture Select Iqbul Shah Picture from any drive
Set Up Parental controls: If you want to give liter power from administrator
Change the account type: If you Want to Changing your Type User convert to Administrator
Delete the Account: If you want to Deleting this Account
Manage another accounts: If you Creating another User

How to changing Controlling Power


Open User Account  Change User Account Control Settings 
Set from there Control

How to Create User on Command Prompt


Start  Run  CMD  Ok
Administrator>Net User Khan /Add  Enter
Administrator>Net User Jan /Add  Enter

How to see User Create


Administrator>Net User  Enter

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

How to delete User


Administrator>Net User Jan /Delete  Enter

How to see Users by Command


Administrator> Net Users

How to Set Password For User by Command


Administrator> Net User Iqbul Shah *
Types a password for the User: jan@123 Enter
Retype the Password to confirm: jan@123 Enter

How to Create User in Batch File


Start  Run  Notepad  Ok
Net User Zarghon /Add Press Enter
Net User Khan /Add  Press Enter
Net User Jan /Add  Press Enter

Then Save On Desktop File Name: Add User. Bat Ok

How to Delete User on Batch File


Start  Run  Notepad  Ok
Net User Zarghon /Delete Press Enter
Net User Khan /Delete  Press Enter
Net User Jan /Delete  Press Enter

Then Save On Desktop File Name: Delete. Bat  new Double Click on this Batch File All User Deleting gain

How to Create User by Manage


Right Click on my Computer  Manage  Double Click on Local User and Groups 
Click on User Folder  Right Click on Users Folder  New User 
User name: Iqbul shah
Full Name: Rasooly
Description: This is my Soon
Password: jan@123
Confirm Password: jan@123
User Must Change Password at Next Logon: if this option on when user logining on pc old
Password can be changing
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
User Cannot Change Password: by this option when user logining on pc can’t
changing
Password Never Expires: bydefult user have 42 day password will be
Expires with this option can’t be Expiring
Account is disabled: If we want to disable this User

How to Changing Password


Right Click on User  Set Password  Click on Proceed 
New Password: Khan@123
Confirm Password: Khan@123
Ok

What is Groups
Group Is a Container in Which We Store User Account For the Purpose Membership or
Give on user Power
In windows there are two types of groups
1: Security Groups 2: Distributed

Types of Groups

Built-in Non Built-in

Built-in
This Types of Group Is Created Automatically During the Installation of O/S

Such As
Administrator: Administrator is Power Full User do Add/Delete/changing
Power User: Just Creating Users and Delete Users But No’t Mores
Network Configuration: Just do Changing on Our LAN card
Users: No’t any things Just Red Permission
Remote Desktop: Just do another computer Desktop
Backup: Just giving Backup of our Pc

How to take For User Power


Right Click on my Computer  Manage  Double Click on Local User and Groups 
Click on Users Folder  Right Click on Iqbul Shah  Properties  Click on Member of 
Click on Add  Advanced  Find Now  Select Power Exp: Network Configuration 
Ok  Ok  Apply  Ok

What is File System


Provides Storage Facilities
Basically Software’s

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

Types of File System

Fat16 Fat32 NTFS


Fat 16
File Allocation Table
First Time introduction windows Dos
1981
Maximum partition Size 2GB
Used in windows 95.Linux.Unix
No Local Security

Fat 32
File Allocation Table
First Time Introduction Windows 95
Maximum Partition Size 32 GB
50% Programmer Faster Open Then Fat16
Used in Windows 98.200.xp.server etc
No Local Security
1990

NTFS
New Technology file System
First Time Introduction Windows NT
1995
Maximum Partition Size 2TB
Support Local Security
Used in Windows 200.server.xp.vista.7 etc
NTFS Feature
Compression Encryption Disk Quota

Note :> The Above NTFS Feature is not available in Fat16 and FAT32

How to Convert FAT 32 into NTFS

Start  Run  Cmd  Ok


Administrator>Convert E:/Fs: NTFS  press Enter

Sometime This Message come (yes/No) You Press N Then enter

What is Disk Quota


A Technique that is used to Provide Limit Disk Quota

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Space to Specific User or All Users on Specific Drive that is Called

Types of Disk Quota

Local Quota Network Quota

Kinds of Disk Quota

Soft Quota Hard Quota


Soft Quota is already our Drives Limit Hard Quota we Implementing For User
When we do installation of Windows
In this time we have assigning Space
For Drives that is called Soft Quota

Configuration of Hard Quota

First Make User Then Configure Hard Quota


Double Click on My Computer Right click on any Drives  Properties Quota (/)
Enable Quota Management  (/) Deny Disk Space to User exceeding 
Quota Entries Click  Quota  New Quota Advanced Find Now  selects user  ok
 ok  Limit Disk space to (10) MB Set Warning Level to (8) MB OK Close (/) Log
Event When A User  (/) Log Event when user Warning Level ok  Apply ok  ok

Then See the Changes

What is Compression

A Technique That is used to increase Hard disk Space and Decrees File Size that is Called
Compression
Configuration of Compression

Open my computer  Right Click on any Drives Properties  (/) compress drive to save
disk Space  ok Apply Changes to D:/ Subfolder  ok  ok

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is Encryption
A Technique that is used to Secure files Data from unauthorized user that is called
Encryption
Configuration of Encryption

Make on File to any Drives  then Right click on That File  Properties  advanced 
Encrypt  ok  Apply  ok

Note: Then Login another User Open That File what is Happens are do

Backup of Windows 7 Full


Start  Control Panel  Click on Backup and Restore  Click on Create a System Image
On a Hard Disk: in where are you like to Save the Backup Select Location 
On one or more DVDs: if you want to Save Image of DVD
On a Network Location: If you Want to Save on another Pc

Next  Start Backup  Finish

How to Restore Backup of Windows 7


Start  Control Panel  Click on Backup and Restore  Click on Select another backup
to restore files from  Click on Refresh  Select the image Drives  Next  Next 
Finish

Backup of System file Backup


That file Which my System Work on we have 5 file system

How to show this file System


Bydefult This is File is Hide from Antivirus because Antivirus can Delete then your System
doesn’t Work

Open my Computer  Click on Organize  Folder option  Click on View  Uncheck on


Hide Protected Operating System Files  Yes  Apply  Ok Then Check on Show
Hides Files , Folders, Drives  Apply  Ok

See the System Files


Open C Drives 
Autoexec
Config.sys
Hiberfile.sys
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Pagefile.sys
Persi0.sys

Backup of Windows 7 System File


Start  Control Panel  Click on Backup and Restore  Click on Create a System Repair
Disc  Create Disc  Finish 

How to Restore of Windows 7 System Files


Put the C on Cd ram  Restart your Computer  Click on Boot Cd Ram

See the Changes


Protocol
Set of Rules That Govern on Data Communication or Language of Network is Called Protocol
Create Protocol by “Bob Kahn”
Exp: Sport
Hockey Football Cricket

Types of Protocol
TCP UDP
Transmission Control Protocol user Data gram protocol

Connection oriented Connectionless


Reliable Unreliable
Hello. Acknowledgement Hello

Types of TCP
IP Internet Protocol
FTP File Transfer protocol
SMTP Simple Mail Transfer Protocol
PoP3 Post Office Protocol
Http Hyper Text Transfer Protocol
Telnet Tele Communication Network
RDP Remote Desktop Protocol
HTTPS Hyper Text Transfer Protocol Service

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

Types of UDP
DHCP Dynamic Host Configuration Protocol
TFTP Trivial File Transfer Protocol

What is Port
Communication Channel
Each Protocol has its own Port Number
Range of Port Number 1 65535
Create by “Uintcerf”
Types of Ports
Physical Logical
Mouse Port FTP 20.21
Keyboard port HTTP 80
Printer Port HTTPS 443

Port and Protocol


Protocol Port
FTP 20.21
HTTP 80
HTTPS 443
SMTP 25
POP3 110
TELNET 23
DHCP 67.68
DNS 53

What is Local Security Police Setting?


We Have Do Security Policy to User also we have do Security Policy on Computer and Our Network ETC

Types of Local Security Police Setting


Account Policy Local Policy

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

Types of Account Policy


Password Policy Account Lockout Policy

Types of Local Policy


Audit Policy User Right Assignment Security Option

Password Have Tree Types


Weak Middle Strong

ABC or 123 ABC123 Jan@123

How to Open Local Security Policy setting


Start  Run  Secpol.msc  ok

Another Metric to Open Local Security


Start  Programs Administrative Tools Local Security Policy
Double click on Account Policy  Select Password Police
Enforce Password History 4 How many Time Computer give History of Password
Maximum Password age 999 last day of user password
Minimum Password age 997 Warning day of user password
Minimum password Length 7 user gives password 7 characters
Password must meet complexity requirements
If you give password now this only support String password but not supporting Middle and Weak Password
Store password Using Reversible Encryption :

What is Account Lockout Policy


Account Lockout Policy is used for when Some know about my User Password Who Just
Typing Password Wrong if Some one assign Wrong password Just Lock the Threshold

Account Lockout Threshold: 6 Times


Account Lockout Duration: 1 Mint
Reset Account Lockout Counter after: 1 Mints

What is User Rights Assignment

This Policy is Use on Users

Access This Computer From The Network:


Allow Log on Locally:
Backup of File and Directories:
Change the System Time:

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Change The Time Zone:
Deny Access to This Computer From The Network:
Deny Logon Locally:
Force Shutdown From a Remote System:
Shutdown the System:
Take Ownership of files or other objects:

What is Security Option


Account: Administrator Account Status
Account: Guest Account Status
Account: Rename Administrator Account
Account: Rename Guest Account
Devices Restrict CD Rom Access to Locally logged on user only
Devices Restrict Floppy Access to Locally logged on user only
Interactive Logon: Do Not Display Last Name
Interactive Logon: Do Not Require Ctrl + Alt + Del
Interactive Logon: Message Title For Users Attempting to log on
Interactive Logon: Message Text For Users Attempting to Log on

How to Block Specific Software


Start  Run  gpedit.msc  ok
Select Top on Computer Configuration  Windows Setting  Security Settings 
software Restriction policies  Right click on This Option Restriction 
Create New Policies  Right Click on Additional Rules  New Hash Rule  Browse
Select your Specific Programs etc "Notepad" open Apply  ok
Start  Run gpupdate ok

How to Block of Website without of Software


Double click on C:/drives  Double click on Windows Folder  Double click on system 32  Double click on
Drivers Folder Double Click on etc Folder 
Double click on Hosts file  select Notepad  ok
Find this option
127.0.0.1 Local host
127.0.0.2 www.google.com
127.0.0.3 www.yahoo.com
127.0.0.4 www.youtube.com

Workgroup
In Windows we have 2 Kinds of Models
1: Work Groups 2: Domain

A Workgroups is a group of computer in a Small Office or Home Office Network Use


For Sharing Resources all Pc Must has some Workgroup
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
To Join a Computer to a Workgroup every Machine must be configured with the some
Workgroup Name
Work group name is a logically Network Name assigned to Computer
Work group is also referred to as “Peer to Peer” Network
Peer Means a Totally In depended Computer a Peer is a Server when Providing Services
and Is a Client When Requesting Services
Also Called Peer To Peer
No scour it
No Server and Clint Concept
Administrator account must have password
User account boundary within its own pc
Workgroup Max name size 15 characters
All pc independence from each other
In Workgroup we have Local Security of User Database Using
To Create a Workgroup “Afghanistan” Computer to the Same Workgroup or Configure
Computer with the Same Workgroup Name

How to Assign Workgroup Name in pc


Right click on my computer properties  Change Setting change Button  Select
Workgroup Give name “Afghanistan” ok ok ok  restart compute

1: Enable File and Printers Sharing on all Workgroup Members


2: Enable Network Discovery: Network Discovery enables a Workgroup Computer to
Discover {Find} Workgroup Members Once Discover There Name to IP Mapping is Stored
Locally on Each Computer and We Will Have the Ability to Access Computers Not Only
Using IP but by Name to Network Discovery Uses a Protocol “LLMNR”
LLMNR {Link Local Multicast Name Resolution}

Sharing
A process of Transfer Same Resources From one Pc To another that is Called Sharing

What is Resources
Cd room. DVD room. Floppy. Printer. USB above Resources we can share from one pc to
another but we cant not share to Scanner

Sharing
These types of sharing system administrator manually shared the resources from one pc to
another pc
Note :> in which we can share folder. Drives

What is Hidden Sharing


This Type of sharing operating system shared automatically after the installation of
windows
Note :> operating system shared only drives

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Shared Manual Automatically
Access by Name show to user Access by dollar sigh ($) show to user

Which company will reduce Expensive because in which we share resources to another pc
and not install another resources
To problem no 1
Let suppose we have to pc and wont to provide Facility of printing for this purpose we will
purchased to printers for to pc

Solution
Above expansive we can reduce due to sharing if a implement sharing in network
environment so we can reduce 90% expensive

Provides Monitoring Facilities


Monitoring folder and drives
Show about Session
Show information about IP address of remote pc
Show open folder and file information

How to see Hidden Sharing


Right click on my computer  Manage Double click on Share Folder  Click on Share
Folder

How to Share Folder


Right Click on folder or Drives  Share With  Select People  Everyone  Add 
Click on Done

How to Assign Share Folder of Other Pc

Start  Run  \\10.0.0.1 Ok

How to enable Sharing Option


This is already Enable in Server Pc advanced
My computer  File Manu Tools Folder option View used simple file sharing in chick this option

How to Share by another Mater


Right Click on folder or Drives  Click on Advance Sharing  Advance sharing 
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Check on Share This Folder  Right Name of Folder  Ok

How to Share Folder by Hidden


Right Click on folder or Drives  Click on Advance Sharing  Advance sharing 
Check on Share This Folder  Right Name of Folder {khan$}  Ok

How to Assign Share Folder of Other Pc by Hidden

Start  Run  \\10.0.0.1\Folder Name With $ Ok

Remote Desktop
Remote Desktop is a Features of Windows Operating System by which We Remotely access
the desktop of another computer remote Desktop user Remote desktop protocol that is used
to bring desktop of another pc this protocol used 3389 ports number

Note: as 4 know that we share resources but by this feature we can also share the user
account
Workgroup environment

Requirement
 Administrator or User Must Have Password

Bydefualt Remote Desktop is Disable

How to Enable Remote Desktop


Client 1
10.0.0.1
Right Click on My computer Properties Remote setting  Check on Allow
Connections from computer logon running any verison Ok  Apply Ok

How to Access Another Computer Desktop


Start  All Programs  Click on Accessories  Click on Remote Desktop Connection 
Assign IP Address of another Computer 10.0.0.1  click on Connect
Click on Option:

1{General}
Computer name: 10.0.0.1
User Name: khan another computer user name
Check Allow me to save: all Setting Save for me don’t ask from me aging

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Save Save as Open

Save all Setting Save by other name when you need aging open

2{Display}
Small Large Which one are you Need

Check on Display the Connection bar when I use the Full Screen
Note: When I am give other computer Screen Show me on my Tops Side

3{Local Resources}
Click on Setting

1{Remote Audio Playback}

Play on this Computer


Do not Play
Play on Remote computer

2{Remote Audio Recording}

Record From this Computer


Do not Record

Check on Printer Check on Clipboard

If printer Attach with another


Computer Show me on my Computer

{Click on More}

{Experience}

Desktop Background if someone set on our Background Photos Show Me

What is Remote Assistance?


Remote Assistance is also Features of Windows operating system that is used to remotely
solve your Computer Problem.

Features
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Solve only Problem of our pc
Remotely Install Software and Handle another Pc
Provide Chatting Facility
Voice Communication

Rule for Remote Assistance


Workgroup / Domain Name Must Be Same LAN Must be Used Same Network ID

How to Enable Remote Assistance

Right Click on my Computer  Properties  Click on Chang Setting  Click on


Remote Check on Allow Remote Assistance Connections to this Computer  Ok
Apply  Ok

How to Configuration of Remote Assistance


Click on Start  Windows Remote Assistance 

How is Loop back Adapter


This LAN Card is A Logical
This is Only Use For Installation of Active Director
This LAN Card is Not Use For Connectivity With Another PC

How to Install Loop back Adapter


Click on Start Menu  Click on Control Panel  Click on Device Manager  Right Click
on Computer Name  Click on Add Legacy Hardware  Click on Next  Click on Install
the Hardware I Manually Select  Select Network Adapter  Click on Next  Select
Microsoft  On Right Side Click on Loop Back Adapter  Click on Next  Click on
Finish

Server O/S VS Client O/S


What is Server
Server is a pc that controlled the all client pc if you want to create server that control your
all client pc so for this purpose must installed server side o/s following are the sever side o/s

Windows NT
Windows 2000 advance server
Windows 2003 server
Windows 2008 server
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Windows 2012 Server
Windows 2016 Server
Windows 2019 Server

Family of Windows Server 2019


Stander Edition
Enterprise Edition
Data center Edition
Web Edition

What is Stander Edition


This Types of Edition is used to play role as Server but this types of edition cont connect
with another server and provides some little functionality to create following Server

Active Directory
DNS. DHCP. DFS .ETC

What is Enterprise Edition


These types of edition are used to play role as server but this type of edition can connect
with another server and provides functionality large database.
EXP: One and More Company’s

What is Data Center Edition


This Type of Edition is used to play role as server but this type of edition can connect with
another server and provides large database for example: You tube
EXP: YouTube

What is Web Edition


This types of edition is used to provide web facilities
EXP: Google

What is Client Side O/S


These types of o/s only installed in client pc and this type of o/s controlled by server

Windows 95
Windows 98
Windows me
Windows 2000
Windows XP
Windows vista
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Windows 7
Windows 8
Windows 10
Windows 11
Note: Client Side O/S mostly used professional edition

What Is Active Directory


Active Directory is a database that is used to store information about user account. Group.
Organizational Unit. Domain Member (client) etc
When we installed active directory in server side o/s then our server become domain control

What Workgroup
Users only login in local pc
No security
No Centralize Management
Local Security policy
No server and Client Concept

What is Domain
Domain is a Client Server Network Model Where we have centralized Security and Users
database
>The Centralized Security data base is Stored on a Central Server computer is called
domain Controller
>Every domain must have at least 4 domain Controllers
>In Domain we have Centralize Authentication of Authorization these Services are
provided the Domain Controllers
> Domain is a Security Boundary

IDA Infrastructure

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Meaning of IDA {Identity of Access}
1) ADDS (Active Directory Domain Services)
2) ADCS (Active Directory Certification Services)
3) ADRMS (Active Directory right management Services)
4) ADLDS (Active Directory Light Weight directory Services)
5) ADFS (Active Directory Federation Services)

Responsibilities of IDA Infrastructure


1> Stores and manage Identities Such as a User , Group , Computer Centrally in a
Network Security database
2> Authentication identities
3> Authorize
4> Provide controlled access to domain Resources

What is ADDS
Meaning of ADDS (Active Directory Domain Services)

What is Directory
 A Directory is a database / Store Which Stores Information about Object Which
have Common Attributes Example (Telephone Directory)
 A directory Enabled Database which uses LDAP Protocol for Data Management
and Retrieval Inside the Directory (Meaning of LDAP “Light Weight Directory Access
Protocol”)

What is Directory Protocol


 Allows us to Interact with the Directory
 It Allows Administrators to manage the Directory
 It Allows user to create new object Update or Remove Existing Object
 Active Directory is Microsoft Implementation of Directory as Will as Directory
Service
 Active Directory is a Centralized Security Distributed database Management
System Which Stores Information about Identities Such as Users , Groups ,
Computer ETC

Creating Domain
For creating domain we Shod Install Following Things
 Installing Active Directory Domain Service Role
 Installing of Active Directory

How to Installing ADDS Roles


”Step”
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Start  Administrative Tools  Server Manager 
 Right Click on Roles  Click on Add Roles  Next
 Check on Active Directory Domain Services  Next  Next  Install

How we can Install Active Directory


“Steps”

 Start Menu  Click on Run  Write Ðcpromo  Ok 


 Next  Next  Select Create a New Domain in a New Forest 
 Next  Give Name like ”Kabul.com  Next
 Next  Select Windows Server 2003  Next  Yes 

1> Forest: A Forest is a Collection of Domain Name Space


2> Domain Name Spaces: is a Collection of One Parent Domain and one or More Child
Domain

How to Add Client / Workstations to Domain


“Steps”

 Right Click on my computer  Click on Properties  Click on Change Setting


 Select Domain “Types the Domain Name”  Ok  User name and Password 
 Ok  Yes

Note: If Come Error Then Assign IP Address on Client Pc Server IP on DNS


If can’t do again do this Steps

Pre_Staging Computer Accounts


1> Create a Computer Account in Active directory as a User / Help desk Administrator
Join the Client Computer to the Domain

Create a Computer Account in Active Directory


“Steps”

 Start Menu  Administrative Tools  Active Directory User / Computer 


 Expend Domain Name  Right Click on Computer  New computer 
 Types then computer name (Windows 7)  click on Change  Advance 
 Find new  Select user or Groups  Ok  Oks

How to login to the client Computer as a local Administrator


”Steps”

 Right Click on my Computer  Properties  Click on Change Setting 


 Click on Change Button  Click more button  Type the domain Name
“Kabul.com”  Ok  Types User name and Password of Server  Ok  Yes

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is Domain User


 A Domain Users are Identities which can login to the domain and who have the
rights to access resurces inside the domain. Provided that they have been authorized
to user / access these resources

How to login a domain User to Client Computer


“Steps”

 Login to the domain computer as Administrator on Server Pc


 Start Menu  administrator Tools  Active Directory User and Computer
 Expend domain name  Right Click on users Folder  Click on New User 
 Then give User name and Password “iqbul shah”  Next  Finish

How to login a domain user to Client Computer


“Steps”
 Login to the Client Computer  Press Alt+Ctrol+Delete  Click on Switch User
 Click on other User  then right User name and Password “khan”  Ok

Restricting User logon from Specific Computer


 This User only logon to Specific Computer but can’t login to another Pc

“Steps”
 Login to domain Computer as Administrator  Start Menu  Administrative tools
 Active Director Users and Computers or Dsa.msc  Right Click on account “iqbul
shah” User  Properties  Click on login to button  Check on only the Following
Computers  then give Computer name “Windows7”  Add  Ok
Time Restricting on User login on Specific Time
 Time Restrictions we have implementing if some user working for long time we have
stopping don’t working

“Steps”
 Login to domain Computer as Administrator  Start Menu  Administrative tools
Active Director Users and Computers or Dsa.msc  Right Click on account “iqbul
Shah” User  Properties  Click on Time Hours  does Channing on Table  then
Ok
 Ok  Start Menu  Run  Gpupdate  ok

What is DNS Server


 Domain Name Server is Client Server Application Protocol Which Translates
Computer names to Ip Address
 DNS is a Centralized Distributed data base Management System

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 DNS Uses UDP on The transport Layer it Uses UDP
 Port Number Use 53
 Create DNS Server (Paul Mockapitris)

What is Zone
 A Zone or Zone of Authority is Created For Each Domain on the Internet
 It Combine Computer / Server Records on that domain Zone to Support Active
Directory

We have Two Types of Zones


1> Forward Loop Zone: It Translate host name into IP Address
2> Reverse Loop Zone: It Stores Pointer (PTR) record which Translate IP Address into
Name

An Internet Domain or Domain Name Space


 Is a Collection of Publically Accessible Servers Under a name Space

Note: Name Space is that Place which we have Register the website

DNS Server Implementation for Active Directory


 When Microsoft Created Windows NT it Used Windows For Name Resolution
Windows NT have No DNS Support
 In Windows 2000 Microsoft Started it’s Support for DNS
 In Windows 2003 Microsoft Include more to Words DNS. DNS Started as the
Mainstream name Resolution Back word Compatibility
 In Windows 2008 Microsoft Stopped Windows support as a Server is Available only
as a Feature a port From DNS New name Resolution Strategies evolved Such as
LLMNR. PNRP (Peer Name Resolution Protocol)
WINS :> Windows Internet Name Server
LLMNR: Link Local Multicast Name Resolution

Types of DNS Server


1> Primary DNS Server
2> Secondary DNS Server
3> Master DNS Server
4> Forward DNS Server
5> Stave DNS Server
6> Cache DNS Server

Primary DNS Server

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Primary DNS Stores the Primary Copy of the Zone data base the Primary Copy is
Writable Which Means we Can Create New Records in The Primary Zone
 We Can Delete Rename and Update the Existing Record on The Primary Zone
 A DNS Server is Primary For a Zone When the Zone Type is Selected as a Primary

Secondary DNS Server


 Stores the Red-only Copy of a Zone Database in Which we Can not Create Modified
Delete a Record
 A DNS Server is Secondary for a Zone When the Zone Type is Selected as a
Secondary DNS

Master DNS Server


 A DNS Server Which Transfer it’s Zone Database to Other DNS Server (Secondary
DNS
 The Master DNS Server Controls the Zone transfer

Cache DNS Server


 Stores the Records Which is Recently Resolved by this DNS Using the Cache the
Record is not go out From our DNS it Exist in Cache

How to Install DNS Server


“Steps”
 Start menu  Administrative tools  Server Manager  Right Click on Roles
 Click on Add Roles  Next  Select DNS Server  Next
 Next Install  Finish

How to Configure DNS Server


“Steps”

 Start Menu  Administrative tools  DNS  Expend DC


 Right Click on Forward Lookup Zone  New Zone  Next
 Select Primary Zone and Also Check one of These Option  Next
 Ok  Next  Give Zone or domain name (Kabul.com)  Next  Finish

Note: If we have not configure DNS we have do Security on User from Active Directory
these Police Can’t Implementing on User

DNS Server Record Types


1> Address Record: ”A”
 Is Stored in Forward Zone

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Is Used to Translate name into IP Address
 To Create on Address Record we Need two Information about any Computer

1> Computer Name


2> Computer IP Address

 An Address record must be Created for Every Computer in the Domain

How to Create on Address Record


“Steps”

 Start Menu  Administrative tools  DNS  Expend DC


 Double Click on Forward Lookup Zone  Right Click on “Kabul.com”  New
Host  then write “Windows 7” and IP Address “10.0.0.3”  Click on Add host
Button
What is Name Server Record (NS)
 Is Stored in Forward Zone and also in Revers Zone
 Is Created for DNS Server
 The NS Record Points to DNS Server
 Primary DNS Server Create this Record Automatically for Seconday DNS Server
we have to Create this Record Manually
 No Record Must be Present in both Forward / Revers Zone

Reveres Lookup Zone


 In Reveres lookup Zone we have 3 kinds of Zone

1> SOA: Start of Authority Controls Zone Trams for primary DNS Server to
Secondary DNS Server
2> NS: DNS Server in the domain
3> PTR: For every Computer in the Domain

Note: These 3 Types is also in Forward lookup Zone in that

How to Configure Revers Lookup Zone


“Steps”

 Start Menu  Administrative tools  DNS  Expend DC  Right Click on


Reverse lookup Zone
 New Zone  Next  Next  Next  Select IPv4  Next  Next  give your
Network ID (10.0.0)  Next  Next  Finish

How to Add Client Pc Record on Revers lookup Zone


“Steps”

 Start Menu  Administrative tools  DNS  Expend Forward lookup Zone


Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Right Click on Zone Name (Kabul.com)
 Click on New host  give Computer name and IP Address (Windows 7)
 Check on Create Associated Pointer Record  Click on Add Host Button  Ok

Note: We must Create an Address Record (A) And PTR Record For Every Computer
Inside the Domain

How to Assign DNS Server IP Address to all Client Pc


“Steps”

 Right Click on Network  Properties  Click on Adapter Setting  Double Click


on Local Area Connection  Click on Properties  Double Click on Internet
Protocol Version 4  Check on Use the Following DNS Server 
 Types The IP of DNS Server “10.0.0.1” Server IP Address  Ok  to all Client PCs

How to See Testing / Tribal shooting of DNS Server


“Steps”

 Start Menu  Run  CMD  Ok  NSLookup  Press Enter

How to See Forward lookup Zone Testing


“Steps”

 Start Menu  Run  CMD  Ok  Set Q=A  Press Enter

How to See Revers lookup Zone Testing


“Steps”

 Start Menu  Run  CMD  Ok  Set Q=PTR  Press Enter

What is DHCP (Dynamic Host Configuration Protocol)


 DHCP assigns Temporary IP Addresses to Client Computer on the Same Network
And Subnet Mask
 Is a Client Server Application Layer Protocol which uses UDP at the Transport
Layer
 Use Port Number 67.68

DHCP Message
 DHCP Broadcast Message: This Message Sends by DHCP Client Computer to Find
A DHCP Server (255.255.255.255)

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

DHCP Offer Message


 DHCP Offer Message: This Message Sends by DHCP Server in Response to A
DHCP Broadcast Message
 In This Message DHCP Server Provide IP Address and Subnet Mask to Clients

DHCP Request Message


 DHCP Request Message: The Client Send this Message to Reques for Following
1> Default Gateway
2> Preferred DNS
3> Alternate DNS

DHCP Acknowledge Message


 In this Message the DHCP Server Provide All the Request things to Client
Computer
 DHCP Server assign IP Address to Client Computers Fram it’s Scope

DHCP Scope
 There are Three Types of Scope in DHCP
1> Simple Unicast Scope
2> Super Scope
3> Multicast Scope

What is Scope
 A Scope is a Collection of IP Address Which is Used by a DHCP Server Fram the
Same Network as Will as Scope Options When a Client Sends Request for Ip
Configuration they Provide by DHCP From the Scope

Note: The Servers Must be Configured with Static IP Clients With Dynamic

How to Installation and Configuration of DHCP


“Steps”
 Start Menu Administrative tools  Server Manager  Right Click on Roles
 Click on add Roles  Next  Select DHCP Server  Next  Next  Select Your
LANCard IP  Next  Next  Next  Add Scopes
 Scope Name: Kabul  Start IP : 10.0.0.1 End IP: 10.0.0.100 
Note: Uncheck this Options Active this Scope Because it will give the IP of domain 10.0.0.1
to first Client
Subnet Mask (255.0.0.0)
Default Gateway: (10.0.0.1)
 Ok  Next  Next  Select this Two Option Next  Next  Install  Finish

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

How to Create Excluded Range


“Steps”
 Start Menu  Administrative tools  Open DHCP  Expend Server name
(Kabul.com)  expend IPv4 Expend Scope  Right Click on Address Pool
Folder  Click on New Exclusion Range  Give Start IP (10.0.0.1 and End IP
10.0.10)  ok

How to Authorized DHCP and Active Directory


“Steps”
 Start Menu  Administrative tools  DHCP  right click on DHCP 
 Click on Manage Authorized  Click on Authorize  Then give your Server name
(Kabul.com) and IP (10.0.0.1)  Ok  Close

How to Active Scope


“Steps”
 Start Menu  Administrator tools  DHCP  Expend DHCP Server
name(Kabul.com)  Right Click on Scope  Click on Active

How to Configure DHCP On Client PC


“Steps”
 Login to a Client Computer  Start Menu  Control Panel  Open network and
sharing Center  Click on Change Adapter Setting  Open Local Area network
 Open IPv4  Select Obtain on Ip Address Automatically and Check on Obtain
DNS Server Automatically  Ok  Ok

Note: Start Menu  Run  CMD  Ok


Administrator> IPConfig/release  Press Enter
Administrator> IPConfig/renew  Press Enter

IP Address Reservation
 IP Address Can be Reserved for a Special MAC Address Computer
 IP Address Reservation is Necessary for these Computer who Obtain IP Address
from DHCP Server But Whose IP Address Should be Resaved Once Reserved the
IP Address Will Only be Offered to that Computer

How to Reserve an IP Address for a MAC Address Computer


Note: A MAC Address of a Computer (Windows 7)

“Steps”

 Start Menu  Run  CMD  Ok


 Administrator Mode> Arp –a  press Enter
IP Address MAC Address
10.0.0.1 00-FF-D7-75-A4-A2 (Server MCA)
10.0.0.2 00-df-cd-43-g4-a3 (Windows 7)
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Note: Copy MAC Address of Windows 7

 Start Menu  Administrative Tools  DHCP Server  Expend Server Name 


Expend IPv4  Expend Scope  Right Click on Reservation Folder  clock on
New Reservation  Vive Reservation Name IP Address (10.0.0.2) and MAC
Address of Windows 7  Ok

Note: Go to Client Pc
 Start Menu  Run  CMD  Ok
 Administrator Mode> IPConfig/release  Press Enter
 Administrator Mode> IPConfig/renew  Press Enter

How to Create Super Scope


 Before Creating a Super Scope one Scope Must be Present

How to Crate Simple Scope First


“Step1”
 Start Menu  administrative tools  Open DHCP  Expend DHCP  Expend
Domain(Kabul.com)  Expend IPv4  Right Click on IPv4  Click on New Scope
 Next  give Name “Iqbul shah”  Start IP Address (10.0.0.1) End
IP(10.0.0.255)  Length (8Bit)  Subnet Mask (255.0.0.0)  Next  Add
Exclusions IP Start (10.0.0.1 End: 10.0.0.10)  Add  Next  Lease Duration
(0.0.1) Next  Next  Check on “Yes”  Next  Give Router IP (10.0.1) Add 
Next  Give DNS Server IP (10.0.0.1)  Add  Next  WINS Server IP (10.0.0.1)
 Add  Next  Next  Finish

“Steps2”
 Start Menu  Administrative Tools  Open DHCP  Expend DHCP  Expend
Domain Name (Kabul.com)  Right Click On IPv4 Folder  Click on Super Scope
 Give Name “Arman Shah”  Next  Select That Simple Scope  Next  Next
 Finish

How to Create Multiple Scope On DHCP


 IF We have Two Deportment One is Use Class C and Another Use Class A Create for
both Deportment Scope

How to Assign LAN Card IP Address


“Steps”
 Right Click on Network  Properties  Click on Change Adapter Settings  Double Click
on Local Area Connection  Click on Properties  Double Click on Internet Protocol
Version 4 or 6 ( TCP/IP)  IF You do Communication With LAN  Check on Use The
Following IP Address:
 IP Address: 10.0.0.1 Subnet Mask: 255.0.0.0 DNS Server IP: 10.0.0.1  Ok  Ok  Close

How to Assign For Another LAN Card IP Address


“Steps 2”

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Right Click on Network  Properties  Click on Change Adapter Settings  Double Click
on Local Area Connection 2  Click on Properties  Double Click on Internet Protocol
Version 4 or 6 ( TCP/IP)  IF You do Communication With LAN  Check on Use The
Following IP Address:
 IP Address: 192.168.1.1 Subnet Mask: 255.255.255.0 DNS Server IP: 192.168.1.1  Ok 
Ok  Close

“Step1”
 Start Menu  administrative tools  Open DHCP  Expend DHCP  Expend
Domain(Kabul.com)  Expend IPv4  Right Click on IPv4  Click on New Scope
 Next  give Name “Iqbul shah”  Start IP Address (10.0.0.1) End
IP(10.0.0.255)  Length (8Bit)  Subnet Mask (255.0.0.0)  Next  Add
Exclusions IP Start (10.0.0.1 End: 10.0.0.10)  Add  Next  Lease Duration
(0.0.1) Next  Next  Check on “Yes”  Next  Give Router IP (10.0.1) Add 
Next  Give DNS Server IP (10.0.0.1)  Add  Next  WINS Server IP (10.0.0.1)
 Add  Next  Next  Finish

“Step 2”
 Start Menu  administrative tools  Open DHCP  Expend DHCP  Expend
Domain(Kabul.com)  Expend IPv4  Right Click on IPv4  Click on New Scope
 Next  give Name “Iqbul shah”  Start IP Address (192.168.1.1) End
IP(192.168.1.200)  Length (24Bit)  Subnet Mask (255.255.255.0)  Next  Add
Exclusions IP Start (192.168.1.1 End: 192.168.1.10)  Add  Next  Lease
Duration (0.0.1) Next  Next  Check on “Yes”  Next  Give Router IP
(192.168.1.1) Add  Next  Give DNS Server IP (192.168.1.1)  Add  Next 
WINS Server IP (192.168.1.1)  Add  Next  Next  Finish

How to go on Client PC LAN Card Obtain


“Steps”
 Start  RUN  CMD  Ok
 Administrator> IPConfig \Release Press Enter
 Administrator> IPConfig \Renew Press Enter

How to Give DHCP Backup


“Steps”
 Open DHCP Server  Right Click on Server Name (Server PC)  Click on Backup
 Select on Location for your Backup to Saving  Then Save

How to Restore Backup of DHCP


“Steps”
 Open DHCP Server  Right Click on Server Name (Server PC)  Click on Restore
 Then Select That Location Which are you save the Backup  Select Backup 
Open

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is ADC (Additional Domain Controllers)


 Additional Domain is Also Called Backup of Main Domain
 If we Create some user on Main Domain this User Saving on also Additional
Domain
 If our Main Server not do Working then Client Pc Frist Request to Main Server
Then Requesting to Additional Domain

How to Install Additional Domain on Server 2


“Step1” Install ADDS Roles
 Start Menu  Administrative Tools  Server Manager  Right Click on Roles 
 Click on Add Roles  Next  Select on Active Directory Domain Services  Next
 Next  Install  Finish

“Step2”
 Start Menu  Run  Dcpromo  Ok  Next  Select Executing Forest Add 1
one Option  2Next  Select the Domain in for Which you Want this Machete to
Function as an (ADC)  Next  2Next  Check on (DNS Server Global Catalog )
Yes  Next  Give Restore Mode Password  2Next  Finish  Restart Now

How to Install Child Domain % Sub Domain

 When we Create a Child Domain we expends the Domain Name Space


 Child Domain is Used on Connecting another Branch Server With one and another

How to Install Child Domain % Sub Domain


“Step”
 Start Menu  Run  Dcpromo  Ok
 Check on Use Advance Mode install ions  2 Next  Select then Create a new
Domain in an Existing Forest and also 1 check  Next  then write a domain name
in which you want to create Child Domain in like (Kabul.com) Next  Click on
Browse and Select domain and 2 Place Write child Domain Name: (Jalalabad.com)
 4Next  Select DNS  2Next  Select on Nearest Domain  3 Next  Give
Restore Mode Password  2 Next  Click on Install  Restart Your computer

How to Activate Windows Server 2008


 Start Menu  Click on Search  Wirt “Component Services”  Click on Services
 Software Licensing  Select Disable Button  Then Restart Computer 
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Then Open Windows Server 2008 Crack  Copy Crack go to open  C drives 
Double Click on Service Profile Folder  Double Click on Network Services Folder
 Double Click on App Data Folder  Double Click on Roaming Folder  Double
Click on Microsoft Folder  Double Click on Software Protection Folder  Delete
the Old Crack from there  Past New Crack

 Start Menu  Click on Search  Wirt “Component Services”  Click on Services


 Software Licensing  Select Automatic Button  Restart Computer

 Product Key: 6F2D7—2PCG6—YQQTB—FWK9V—932CC  Next

How Set Time Restriction


“Steps”
 Start Menu  Run DSA.MSC  Ok
 Right Click on “Khan User”  Properties  Click on Account  Click on Time
Log on 
 Permit is Meaning Allow Time
 Deny is Meaning Not Allow Time
 Select and Set Duration of Time  Then Ok  Apply  Ok 
 Start Menu  Run  gpupdate  Ok

How to Set PC Restriction


“Steps”
 Start Menu  Run DSA.MSC  Ok
 Right Click on “Khan User”  Properties  Click on Account  Click on Log on
To 
 Check on Following Computer: Windows 7
 Don’t Assign IP Address Just Assign Computer Name
 Click on Add  Apply  Ok  Ok
 Start Menu  Run  gpupdate  Ok

What Is O U (Organization Unit)


By the help of O U You have do Security on User Implementing

“Steps”
 Start Menu  Run  Dsa.msc  Ok
 Right Click on Domain  New  Organization Unit  Name: “Accounting”  Ok
 Then Right Click on “Accounting” O U  New  Organization Unit  Name:
“Khan”  Ok  Then Right Click on “Khan” O U  New  User: Khan user 
Ok

How to Implement Security On User


“Steps”
 Start Menu  All Programs  Administrator Tools  Groups Police Management
Double Click on Force ”Kabul.Com” Double Click n Domain  Double Click
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
on Domain Name: Kabul.Com  Double Click on Accounting O U  Then Right
Click on Khan O U New  Create GPO In This Domain and Link it Here 
Then Write Name For Police  Then Right Click on This Police  Edit 
 What you Want to do

How to Create Logon and Logoff Scripts


“Steps”
 Open Server “C” Drives  Create New Folder  Then Share This Folder 
 Start Menu  Run  CMD  Ok
 Administrator> Net use F: \\ Server Name or IP \ Share Folder Name  Press Enter
 Then Copy The Code on the CMD 
 Start Menu  Run  Notepad  Past The Code on the Notepad
 Save As This File On the Desktop  By Name Of “Scripts.BAT”
 Open Groups Police Management  Double Click on Force ”Kabul.Com”
Double Click n Domain  Double Click on Domain Name: Kabul.Com  Double
Click on Accounting O U  Double Click on “Khan O U”  Then Right Click on
Police  Edit 
 Double Click on First Police  Double Click on Windows Setting  Double Click
on Scripts Folder  Double Click on Startup 
 Click on Show File  Copy That File Which on The Desktops  Then Past That
File on There  Click on Add  Click on Browse  Select on File “Script” 
Open  Ok  Apply  Ok
 Start Menu  Run  CMD  Ok
 Administrator> Gpupdate /Force  Press Enter

How to See Script on Client PC


“Steps”
 User Name: Khan
 Password: Jan@123  Ok
 Open My Computer  See the Changes Make Drives

What Is Home Folders


Also Called Private Folder
This Folder Appear As Drive for specific User
When Client Pc Hard Disk Full And Want to Store Data on Server Drive in This Situation
Server Create Home Folder for Specific User

How to Create Folder on Server


Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
“Steps”
Server Pc
 Make One folder To Any drive E:/Drive  Create Folder Khan 
 Then Right Click On This Folder Share Share and Security  Click on Share
This Folder  Advanced  Find Now 
 Select On Khan User  Ok  Ok Give Permission {Read} and {Change}
Apply Ok Apply Ok
 Start  Run Dsa.msc Ok
 Right Click on Khan User Properties Click On Profile Click On Connect (z)
To \\10.0.0.1\zarghonshahs\Kabul.Com  Apply  Ok Ok
 Khan is folder Name Kabul Is Domain Name
 Start Run  gpupdate  Ok
How to Create Map Network Drive
“Steps”
 Right Click on My Computer  Map Network Drives  Wright \\Server IP \
Folder Name  Ok

Configuration of Network Disk Quota


“Steps”
Server Pc
 Right Click on That E:/Drive Properties Click On Quota  Check on Enable
Quota Management 
 Check On Deny Disk Space to User Exceeding Quota Limit 
 Click On Quota Entries  Click On Manu Quota New Quota Entries 
Advanced  Find Now  Select On Khan  Ok  Ok  Limit Disk Space To 10
MB Set Warning Level To 8 MB Ok Close  Apply Ok  Ok

What Is Local Profile


This Types of Profile Stored In Local Pc and Type of Profile We Can Create In Workgroup

What Is Roaming Profile


This Types of Profile Stored Server Pc and Also Called Read / Write Profile

What Is Mandatory Profile


This Types of Profile Also Stored In Server Pc and Also Called Read / only Profile

Local Profile Configuration


“Steps”
 Start  Run Dsa.msc Ok
 Create User  Then Login into Server
 This Is Local User Profile

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

How to Check Local Profile


Server Pc
“Steps” Administrator User
 Right Click on My Computer  Properties Click On Advanced User Profile
Click on setting Click On Chang Type “Local Profile”

How to Create Roaming Profile


Server Pc
“Steps” Administrator User
 First Create Folder Two Any Drive Give the Name: Khan
 Right Click On This Khan Folder  Share  Click on Share and Security  Click
On Share This Folder  Click On Add Advanced Find Now  Select On
Khan User  Ok Ok Give Permissions Full Control Apply  Ok Apply
Ok
 Start  Run Dsa.msc Ok
 Right Click on Khan User Properties Click On Profile  Click on Profile
Path:\\10.0.0.1\Khan this is Folder Name
 Apply  Ok
 Start Run  gpupdate Ok
 Then Logoff This User
 Then Logon This User

How to See The Changes


“Steps”
Open That Folder Which on The Server PC  Double Click on E Drives  Open Khan
Folder  See the Changes

How to Check Local Profile


Server Pc
“Steps” Administrator User
 Right Click on My Computer  Properties Click On Advanced User Profile
Click on setting Click On Chang Type “Local Profile”

How to Create Mandatory Profile


“Steps”
 Open That Khan Folder  Show All File  Find This Option “NTUSER.DAT
Rename This File  Writ This NTUSER.MAN Yes

Note: Roaming Profile Is Automatically Converted On Mandatory Profile

How to Check Local Profile


Server Pc
“Steps” Administrator User
 Right Click on My Computer  Properties Click On Advanced User Profile
Click on setting Click On Chang Type “Local Profile”

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is Secondary DNS Server


 This DNS Server Stores a Read Only Copy of The Secondary Zone Database Which is
Called Already Stored on a Primary DNS Server
 The Server Should be Available 24 Hours 7 Days a Week 365 Days a Year
 Create an NS Record for the Secondary DNS Server on the Primary DNS Server
 Remember: The NS Record Must be Created in Both Forword and Reverse look up
Zone
 Secondary DNS Server Stores Copy or Replica of a Primary Zone Database Which is
Create on a Primary/Master DNS Server Secondary DNS Server Has Read Only Copy of
Zone Database in which We Cant Bring Changes
How to Installation of Secondary DNS
“Steps”
 Right Click on My Computer Click on Manage  Double Click on Rules  Click on
Add Rules  Next  Check on DNS Server  Click on Next  Click on Install 
Click on Close
How to Transport Forward Look up Zone from Primary
DNS to Secondary DNS
“Steps”
 Start Menu  All Program  Administrator Tools  Click on DNS Server 
Double Click on Forward Look up zone  Double Click on Domain (Kabul.Com)
 Then Right Click on Domain  Click on Properties  Click on Zone Transport
 Check on Allow Zone Transfer  Check on Only to the Following Server 
Click on Edit  Then Click on Link  Then Assign IP Address of Another Server
(10.0.0.100)  Ok  Click on Notify  Click on The Link  Then Assign IP
Address of Another Server (10.0.0.100)  ok  Apply  Ok

How to Transport Reverse Look up Zone from Primary


DNS to Secondary DNS
“Steps 2”
 Start Menu  All Program  Administrator Tools  Click on DNS Server 
Double Click on Reverse Look up zone  Double Click on Network IP (0.0.10 Sub
Net)  Then Right Click on (0.0.10 Sub Net)  Click on Properties  Click on
Zone Transport  Check on Allow Zone Transfer  Check on Only to the
Following Server  Click on Edit  Then Click on Link  Then Assign IP
Address of Another Server (10.0.0.100)  Ok  Click on Notify  Click on The
Link  Then Assign IP Address of Another Server (10.0.0.100)  ok  Apply 
Ok

How to Configure Forward Look up Zone on Secondary DNS


“Steps 1”
 Start Menu  Run  DNSmgmt.Mse Double Click on Server Name  Double
Click on Forward Look up Zone  Then Right Click on Forward Look up Zone 
New Zone  Click on Next  Check on Secondary Zone Click on Next  Types
The Primary Zone DNS Name (Kabul.Com)  Click on Next  Assign Master
DNS Server IP Click on Link: (10.0.0.1)  Click on Next  Finish

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

How to Configure Reverse Look up Zone on Secondary DNS


“Steps”
 Start Menu  Run  DNSmgmt.Mse Double Click on Server Name  Double
Click on Reverse Look up Zone  Then Right Click on Reverse Look up Zone 
New Zone  Click on Next  Check on Secondary Zone Click on Next  Check
on IPV4 Click on Next  Types the Network ID (10.0.0)  Click on Next
Assign Master DNS Server IP Click on Link: (10.0.0.1)  Click on Next  Finish

How to Assign Secondary DNS IP Address to All Client PC


“Steps”
Right Click on Network  Click on Properties  Click on Local Area Connection 
Click on Properties  Double Click on Internet Protocol Version 4  Assign IP
Address on Alternate DNS: 10.0.0.100  Ok  Ok  Close

What is Zone Transfer Ways


1> XFR (Full Zone Transfer)
 The Transfer of Type Happens For The First Time When is Zone is Copied From
the Primary DNS Server to Secondary DNS
2> IXFR (Incremental Zone Transfer)
 In This Method Once Database has Been Replicated to Secondary Server But Just
Only New Records Added Existing Record Deleted or Modified Will Transfer to the
Secondary DNS Server

What Is Terminal Server


 Remote Desktop Services
 Terminal Server has Two Model
 Remote Desktop for Administration Mode
 Application Mode

Remote Desktop for Administration Mode


 It is Used to connect to a Remote Server erform Administrator
 This Mode is For Administrator
 It is Installed by Default on all Version Windows XP. 2003. Vista. Win 8. 2008.
 This Mode is Disabled by Default If You Want to Allows Users Add them to Remote
Desktop Users Groups
 Remote Desktop Uses a Protocol Called RDP (Remote Desktop Protocol)

How to Enable Remote Desktop Protocol


“Steps”

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Right Click on My Computer  Click on Properties  Click on Remote Setting
Tub  Check on Allow connection 3rd  Select User Tub  Click on Add User 
Select Users  Ok  Apply  Ok

How to Install Terminal Server


“Steps”
 Right click on My Computer  Click on Manage  Double Click on Rules  Click on
Add Rules  Click Next  Check on Terminal Services  Click on 2 Next 
 Check on Terminal Server
 TS Web Access  Click on Add Required Role Services Click on 2 Next 
 Check on Require Network Level  Click on Next  Check on Configure Later
 Click on Next  Click on Add  Select “User Groups”  Click on 3th Next 
 Click on Install  Click on Close  Click on Yes  Click on Close

How to give Permission to logon User on Terminal Server


“Steps”
 Start Menu  Click on All Program  Click on Administrator Tools  Click on
Groups Police Management 
 Double Click on Force (Kabul.Com)  Double Click on Domain Name
 Double Click on Domain Controller  Click on Default Police
 Then Right Click on Default Police  Click on Edit  Double Click on First Police
 Double Click on Windows Setting  Double Security Setting  Double Click on
Local Police  Double Click on User Right Assignments  Double Click on Allow
Logon Through Terminal Services  Check on Define These Police Setting 
 Click on Add User and Groups  Ok  Click on Ok  Click on Apply  Click on
Ok

 Start Menu  Run  CMD  Ok


 Administrator> Gpupdate  Ok

How to Assess Server Pc from Client PC by RDP


“Steps”
 Start Menu  All Programs  Click on Accessories  Click on Remote Desktop
Connection  Assign Server pc IP Address 10.0.0.1 Click On Connect
 User Name: Administrator
 Password: Jan@123  Ok

How to Create Startup Environment For users


 If Some one Open Remote Desktop give Remote Server Open Software

“Steps”
 Open (C) Drives  Double Click on Windows Folder  Double Click on System 32
Folder  Click on Tops Side “Copy” 
 Start Menu  Run  Dsa.msc  Ok

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Double Click on Khan User  Click on Environment Tub  Check on Startup
Following Groups on Logon  Then “Past”  C:\Windows\System32\Notepad 
 Click on Apply  Ok

How to Test Startup on client open Remote Desktop


“Steps”
 Start Menu  All Programs  Click on Accessories  Click on Remote Desktop
Connection  Assign Server pc IP Address 10.0.0.1 Click On Connect
 User Name: Administrator
 Password: Jan@123  Ok

What is WDS Server (Windows Deployment Server)


 By The Help of WDS we have do Installation Windows to all of Client PC

 Requirement of WDS Server


 Must be a Member Of an ADDS Domain or be a Domain Controller
 DHCP WDS Use PXE Booting Which Requires DHCP Capability
 DNS Server Must be Configure
 NTFS Volume For the Image Store
 One of Operating System Must be Install to Client PC 7.XP ETC

 Client PC Support
 A High-Speed Persistent Connection B/W the WDS Servers and the Target
Computer
 The Network Adapter on Computer Must be PXE Boot Computable

 PXE: is a Technology That Takes Advantage of Dynamic Host Configuration


Protocol DHCP to Locate a WDS Server During a Computer Boot Phase

Installation of WDS Server


“Steps”
 Right Click on Computer  Click on Mange  Double Click on Add Rules 
Click on Rules  Click on 2Next  Check on Windows Deployment Services 
Click on Next  Check on Deployment Services and Transport Service Click on
Next  Click on Install  Click on Close

How to Configure WDS Server


“Steps”
 Click on Start Menu  Click on Administrator Tools  Click on Windows
Deployment Service  Double Click on Server  Double Click on Domain Name 
Then Right Click on Domain Name  Configure Server  Click on Next  Select
The Drive (Image Place)  Click on Next  Click on Yes  Check on Do Not no
Port 67 and Check on Configure DHCP Option to PXE Client  Click on Next 
Check on Respond to all Know and Unknown Client Computer  Click on Finish
 Uncheck on Add Image to the Windows Deployment Service  Click on Finish

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

How to Create Boot Image CD


“Steps 1”
 Put Windows 7 CD on CD Ram  Double Click on Boot Image Folder  Then
Right Click on Boot Image Folder  Click on Add Boot Image  Click on Browse
 Open DVD Ram  Double Click on Source Folder  Select Boot.WIF File 
Click on Open  Click on 3 Next  Click on Finish

How to Create Install Image CD


“Steps2”
 Double Click on Install Image Folder  Then Right Click on Install Image Folder
 Click on Add Install Image  Next  Click on Browse  Now Select
Install.WIF File  Click on Open  Click on Next  Click on Just Second One
Windows Seven Ultimate  Click on 2 Next  Click on Finish

Now How to Run Windows on Client PC


“Steps”
 Restart Computer  Press F12  again Press F12 
 User Name: Administrator > Password: Jan@123 This is Server Password

What is ICS Server


Meaning of ICS (Internet Connection Sharing)
 By The Help of ICS We have do Share our Internet From Server to All Client PC

 Requirement of ICS
 Must have Two LAN Card on Server
 Must have Internet Connection

Configuration of ICS Server


“Steps”
 Right Click on Network  Click on Properties  Click on Change Adapter Setting
 Double Click on Local Area Connection  Click on Properties  Click on
Internet Protocol Version 4  Check on Obtain IP Address and Check on Obtain
DNS Server  Click on Ok  Click on Ok  Click on Close 
 Double Click on Local Area Connection 2  Click on Properties  Click on
Internet Protocol Version 4  Check on Obtain IP Address and Check on Obtain
DNS Server  Click on Ok  Click on Ok  Click on Close

Note: See which one Your LAN Card is Give From Internet IP Address
“Steps 2”
 Double Click on Internet LAN Card  Click on Properties  Click on Sharing 
Check on “Allow Other Network Users to Connect Through This Computer
Internet Connection”  Click on Ok  Then Double Click on Another LAN Card
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Which one Connect With Switch  Click on Properties  Double Click on Internet
Protocol Version 4  Check on Use the Following IP Address:
 IP Address:10.0.0.1 Subnet Mask: 255.0.0.0  Check on Use the DNS Server IP
 DNS Server IP: 10.0.0.1  Click on Ok  Click on Ok  Click on Close

How to Access Internet on Client PC


“Steps”
 Right Click on Network  Click on Properties  Click on Change Adapter Setting
 Double Click on Local Area Connection  Click on Properties  Click on
Internet Protocol Version 4  Check on Use The Following IP Address
 IP Address: 10.0.0.2 Subnet Mask: 255.0.0.0 Default Gateway: 10.0.0.1 DNS Server
IP: 10.0.0.1  Click on Ok  Click on Ok  Click on Close

What is VPN Server


 VPN is Virtual Private Network Which Can be Created on Unsecure Network Such
as Internet or Internet In VPN Server we Must have Two LAN Card On Server PC

How to Install VPN Server


 Right Click on Computer  Click on Manage  Double Click on Add Rules 
Click on Add Rules  Click on Next  Check on Network Police and Access
Services  Click on 2 Next  Check on Routing and Remote Access Services 
Uncheck on Network Policy Service  Click on Next  Click on Install  Click on
Close

How to Configuration of Routing and Remote Access


“Steps”
 Click on Start Menu  Click on All Program  Click on Administrator Tools 
Click on Routing and Remote Access  Double Click on Server Name (Local)
Then Right Click on Server Name (Local)  Click on Configure and Enable
Routing and Remote Access  Click on Next  Check on Remote access (Dial Up
or VPN)  Click on Next  Check on VPN   Click on Next  Select Internet
Connection With Internet Connect LAN Card  Check on From a Specified of
Address  Click on New  Start IP: 10.0.0.1 END IP: 10.0.0.100  Click on Ok 
Click on Next  Check on No  Click on Next  Click on Finish  Click on Ok

How to Create Dial up Connection on Client PC


“Steps”
 Right Click on network  Click on Properties  Click on Set up a New
Connection or Network  Click on Connect to a Work Place  Click on Use my
Internet Connection (VPN)  Click on I Set up an Internet Connection Later 
Put the IP Address of Server: 192.168.1.1 Which Connect with Internet  Check on
Allow Other People to This Connection  Next  Click on Create Shortcut
Click on Close
 Double Click on that Shortcut Which on the Desktop  User Name: Nasrat
Password: Jan@123  Click on Connect
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

How to Remove Error of VPN Server


“Steps”
 Start Menu  Click on Run  DSA.MSC  Ok
 Double Click on Nasrat User  Properties  Click on Dial In Tub  Check on
Allow Access  Click on Apply  Click on Ok

How to Connect Client to Server by VPN


”Steps”
 Double Click on That Shortcut on VPN  User Name: Nasrat > Password:
Jan@123  Click on Connect

What is Shadow Copies


By the Help of Shadow Copies we have you do if a Some one Client Pc Home Folder
Delete Same Files we have Require That Delete Files Restore Again

How to Enable Shadow Copies


Open Computer  Right Click on That Drive Which have Home Folder of All User 
Click on Properties  Click on Shadow Copies  Click on Create Now  Then Click
on Enable  Click on Yes or Ok  Click on Apply  Ok

How to Delete on Client Pc From Home Folder


Open Computer  Open Home Folder of User Delete Files or Folder 

How to Restore Deletes Files


Start Menu  Click on Run  Assign \\ Server IP  Click on Ok 
Then Right Click on That User Home Folder Name “khan”  Click on Previous
Version  Click on Restore  Click on Ok  Then See the Changes

What is Remote Administration Tools


By The Help of Remote Administration Tools we have do Control Server Pc From one
of Client Pc
This is Software Download from Internet

How to Download Remote Administration Tools

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Open Internet Explorer  Open Google  Wirth “Download Microsoft Remote Server
Administration Tools For Windows 7  Click on Download Details Remote Server
Administration Tools for Windows 7  Click on First Download Option  Click on
Save Location 

How to Install on Windows 7 Remote Administration


Then Double Click on Software Remote Administration Tools  Click on Install 
Click on Yes  Click on A Accept the Installation  Click on Close

How to Setting Remote Administration on Client


Click on Start Menu  Click on Control Panel  Click on Programs  Click on Turan
Windows Features on or Off  Check on Remote Administration Tools  Check on
There if You Want to Do  Click on ok 
Start Menu  Click on Administrator Tools  Click on DNS or DHCP ETC

What is Network Monitor


By The Help of Network Monitor We have Seeing How Many Packet Sending or
Receiving in our Network LAN
This is Software Which have Download From Internet

How to Download Network Monitor


Open Internet Explorer  Open Google  Writ Download Network Monitor  Click
on Download Details Microsoft Network Monitor 3 4  Click on Last Download 
Click on Save Location  Desktop

How to Install Network Monitor


Double Click on Network Monitor Software  Click on Run  Click on Next  Check
on I Accept the Installation  Click on Next  Check on I do not Want to Use
Microsoft Update  Click Check on Next  Click on Complete  Click on Install 
Click on Finish

How to See Traffic of Packet


Double Click on Microsoft Network Monitor Icon on the Desktop  Click on New
Capture  Click on Start

What is WINS Server

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Windows Internet Name Server
Wins Server Is Used To Whenever We Want To See That Which Client Computer Is Active
And Working In The Network and Which Client Computer Is In Active and not In The
Network

How to Install WINS Server


Right Click on Computer  Click on Manage  Double Click on Feature  Click on Add
Feature  Check on WINS  Click on Install  Click on Close

How to Assign WINS Server IP Address on Server


Right Click on Network  Click on Mange Network Connection  Double Click on Local
Area Network  Click on Properties  Double Click on Internet Protocol Version 4 
Click on Advanced  Click on WINS  Click on Add  Assign Server IP (10.0.0.1) 
Click on Add  Click on Ok  Click on Ok  Click on Close

How to Configure WINS Server


Click on Start Menu  Click on Administrator Tools  Click on WINS  Double Click on
Server Name  Double Click on Active Registration  Then Right Click on Active
Registration  Click on Display Record  Click on Record Owner  Click on Find Now
 See Which one Computer ON or Which one Off

What is File Server


Is Used for Share Folders and Monitoring our Share Folders

How to Install File Server


“Steps”
Right Click on Computer  Click on Manage  Double Click on Roles  Click on Add
Roles  Click on Next  Check on File Services  Click on Next  click on Next 
Check on File Server  Click on Next  Click on Install Click on Close

How to See File Server


“Steps”
Right Click on Computer  Click on Manage  Double Click on Roles  Double Click on
File Services  Double Click on Share and Storage Management

How to Share Folder by File Server


“Steps”

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Open File Server  Click on Right Side Provision Share  Click on Browse  Open
Drives  Select Folder our like Ali  Click on Next  Check Yes, Change NTFS
Permissions  Click on Ok  Click on Next  Click on Next  Click on Advanced 
Give Access Users  Click one up Them  Click on Next  Click on Next  Click on
Create  Clock on Close

How to Create Mapping Drives on Client PC


Right Click on Computer  Click on Map Network Drives 
Assign IP Address: \\Server IP\Folder Name: Ali  Check on Reconnect at Logon  Click
on Finish
Now Open Computer  Then See one Drives  Open Then Put Folder  Then Go to on
Server  Open That Folder: Ali  See The Changes

How to Share Folder by Command


”Steps”
Click on Start  Click on Run  Writhe CMD  Click on Ok
Administrator> CD \  Enter
C :\> Mkdir Folder name: khan  Enter
C :\> dir  Enter
C :\> Net Share Folder name=C:\Folder name /Grant:Everyone,Change  Enter

How to Delete Share Folder by Command


“Steps”
Click on Start  Click on Run  Writhe CMD  Click on Ok
Administrator> CD \  Enter
C :\> Net Share Folder Name /delete  Enter

How to Creating Mapping Drives by Command


“Steps:
Click on Start  Click on Run  Writhe CMD  Click on Ok
Administrator> Net Use Z: \\ServerIP \ Folder Name /Persistent:Yes  Enter

How to Creating Mapping Drives by Command


“Steps:
Click on Start  Click on Run  Writhe CMD  Click on Ok
Administrator> Net Use Z: /Delete  Enter

How to Install DFS Server


“Steps”

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Right Click on Computer  Click on Manage  Double Click on Roles  Double Click on
File Server  Then Right Click on  Add Roles Services  Check on Distributed File
System 
1) check on DFS Name Spaces
2) Check on DFS Replication

 Click on Next  Check on Create a Name Space Now  Assign Name: Manager
 Click on Next  Check on Domain-based Name Space  Click
On Next  Click on Add Click on Brows  click on Show Shared Folders 
Select one by one  Click on Ok  Click on Ok
Now Click on Add  Click on Brows  Click on Advanced  Click on Find Now  Select
another Computer  Click on ok  Click on Ok  Select One by One This Compute
Share Folder  Click on Ok  Click on Ok  Click on Next  Click on Install  Click
on Close

How to Access DFS Name Space From Client PC


“Steps”
Click on Start  Click on Run  Wirth \\Server IP \ DFS Name: Manager  Click on Ok

How to Add Another Share Folder on DFS Server


“Steps”
Right Click on Computer  Click on Manage  Double Click on Roles  Double Click on
File Server  Double Click on DFS Manager  Double Click on Name Spaces  Double
Click on Domain Name \ Manager  Then Right Click on  Click on New Folder 
1) Name: My Documents
2) Click on Add  Click on Brows  Select Folder Share  Click on Ok

Click on Ok  Click on Ok

How to Add Mapping on Client PC


“Steps”
Right Click on Computer  Click on MAP Network Drives  Wirth \\Domain Name \ DFS
Name  Click on Finish

How to Enable Quota on Share Folder


“Steps”
Right Click on That Drive Which Can Share Folder on Server PC  Click properties 
Click on Quota 
1) Check on Enable Quota Management
2) Check on Deny Disk Space to User Exceeding Quota Limit
3) Check on Limit Disk Space to: 10 KB
4) Set Warning Lever: 5 KB
5) Check on Log Event When a User Exceed Their Quota Limit
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
6) Check on Log Event When a User Exceeds Their Warning Level
7) Click on Apply  Click on ok

How to access Share Folder and Changing on Client PC


“Steps”
Click on Start  Click on Run  writhe \\Server IP - Ok
Open One Share Folders  then Put same Files then See the Changes

How to Install FSRM


“Steps”
Right Click on Computer  Click on Manage  Double Click on Roles  Double Click on
File Server  Then Right Click on  Add Roles  Check on File Server Resource
Manager  Click on Next  Click on Install  Click on Close

How to Create Quota Template FSRM


“Steps”
Click on Start  Click on Administrative Tools  Click on File Server Resource Manager
 Double Click on Quota Management  Click on Quota Templates  Then Right Click
on  Crate Quota Templates 
1> Select Limit  Then Click on Copy 
2> Template Name: My Templates
3> Limit: 10 kb
4> Check on Hard Quota
5> Click on Ok

How to Open Share Folder of Server on Client PC


“Steps”
Click on Start  Click on Run  Writhe \\Server IP  Ok
Open Share Folder : Ali  Do Change in This Time You Can Do Any Things

How to Create Quota


“Steps”
Click on Start  Click on Administrative Tools  Click on File Server Resource
Double Click on Quota Management  Click on Quota  Then Right Click on 
Crate Quota  Click on Browse  Open Drive Which Share Folders  Select one Share
Folders : Ali  Click on Click on Ok  Select That Temples: My Temples  Click on
Create

How to Open Share Folder of Server on Client Pc


“Steps”
Click on Start  Click on Run  Writhe \\Server IP  Ok
Open That Share Folder Which We Can Selected: Ali
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Then Put Same Files See The Changes

How to Creating File Screening Template


“Steps”
Click on Start  Click on Administrative Tools  Click on File Server Resource
Double Click on File Screen Templates  Click on File groups  Then right Click on
Crate File groups 
1> File groups Name: My Groups
2> Files to Include: (*.doc)(*.bmp) Click on Add
3> Click on Ok

How to Creating Template


“Steps”
1) Click on File Screen Templates
2) Then Fright Click on
3) Create File Screen Template
1> Template Name: Screen Temp
2> Check on Active Screening
4) Then Select on my Group
5) Click on Ok

How to Implementing File Screen on User


“Steps”
Double Click on File Screening Management 
Click on File Screen  Then Right Click on  Create File Screen
Click on Browse  Double Click on Drive 
1> Then Select on one Share Folder: Ali
2> Derive Properties ……….
3> Select Your templates: Screen temp
4> Click on Create

How to Testing on Client PC


“Steps”
Click on Start Click on Run  Writhe \\Server IP  Click on Ok
Double Click on That Share Folder: Ali
Then Put Word Documents  See The Changes

What is Print Server


A Print Server Provides Printing Services to Network Users
A Print Server Receives Print Job From Network Users
Printer server, is a computer or device that is connected to one or more printers and
to client computers over a network, and can accept print jobs from the computers
and send the jobs to the appropriate printers. Print servers have an Ethernet port
for network connection
Print Server is a server on a Network, which receive print jobs from Network user,
manage and schedule these jobs and uses one or more print device to print a request
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
job.

How to Install a Printer Device


1: Sharing Tab:
List in the Directory: The Printer Will be Published in Active Directory Then it is Easier to
Find The Printer
Right Click on Printer  Click on Share  Check on Share  Wirth Share Name  Click
on Ok 

2: Additional Drivers:


Enable Us to Support Print Jobs From Machines Other then 2003 and Xp for Example Win
98 Win Me ETC
To Support Such Operating Systems we need to Install Additional Drivers For Each
Operating System on Print Server

Note: In This Operating System Can’t Using First Install Drivers then Can be do Printing

How to Install Additional Drivers


Right Click on Printer  Click on Properties  Click on Sharing Tab  Click on
Additional Drivers Button  Check on Required Version of the Windows  Click on Ok
 Insert The Printer Drivers CD  Ok

Print Job Redirection


In Print Job Redirection a Printer Redirects A Print Job to Available Print Server in Case
of its Local Print Devices Busy or is Experiencing Technique Problems

Note: Both Print Devices Must be of Same Company and one Model

How to Print Job Redirection


Install The Same Printer on Two Computers
Make Sure That Both of the Printers have been Shared
Right Click on Printer  Click on Properties  Click on Ports Tab  Click on Add Port
Button  Select Local Port  Click on New Port
Enter a Port Name: \\10.0.0.2\Printer Share Name
 Click on Ok  Click on Close  Click on Apply  Click on ok

Advanced Tab
Printer Availability:
Printer Availability determines the Hours in Which the Printer Will be Available to Server
Print Jobs

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

How to Increase Print Job Priority


Right Click on a Printer  Click on Open  Right Click on a Requires Print Job  Click
on Properties  Click on General Tab  Click on Now Increase the Priority  Click on
Apply  Click on Ok

What is Backup and Restore Server


Backup Server is Used to give our Computer and Folder Backup
When We Used Backup Then our Folder Deleted Then we have Restore Back

How to Install Backup Server


 Right Click on Computer  Click on Manage  Double Click on Features
 Click on Add Features  Check on Windows Server Backup Features
 Click on Next  Click on Install

How to Get Backup of Windows


 Click on Start  Click on Administration Tools  Click on Windows Backup
 On Right Side Click on Backup once  Click on Next  Check on Custom  Click
on Next  Check on Local Disk (C)
 Check on Enable System Recovery (File System Backup)
 Click on Next
 Check on Local Drives  Click on Next
 Select (D) Drives  Click on Next 
 Check on (VSS) Copy Backup
 Note: IF We Check Before This Backup is Running This Backup Also Running
 Check on (VSS) Full Backup
 Note: Before of This Running Another Backup That Backup Stopping This Backup
Running
 Click on Next  Click on Backup

How Get Backup by Remote PC


 “Step 1”
 Open One of Another PC Drives (D)
 Create Folder (Iqbulshah)  Then Right Click on Sharing  Click on Advance
Sharing
 Check on Share This Folder  Click on Permission  Check on Full Control 
 Click on Apply  Click on Ok
 Click on Apply  Click on Ok

 “Step 2”

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Click on Start  Click on Administration Tools  Click on Windows Backup
 On Right Side Click on Backup once  Click on Next  Check on Custom  Click
on Next  Check on Local Disk (C)
 Click on Next
 Check on Remote Shared Folder  Click on Next 
 \\10.0.0.2\Folder Name
 Click on Next  Check on VSS Full Backup  Click on Next  Click on Backup
 Click on Finish

How to Get Backup by Command

 Click on Start  Click on Run  CMD  Click on Ok


 Administrator> Wbadmin Get Versions Press Enter

 Administrator> Wbadmin Start Backup –BackupTarget:E: -Include:C: Press Enter

How to Get Backup By Scheduling


 Click on Start  Click on Administration Tools  Click on Windows Backup
 On Right Side Click on Backup Scheduling  Click on Next  Check on Custom
 Click on Next  Check on Local Disk (C)
 Click on Next
 Check on once A days  (4:00 Pm)  Click On Next  Click on Show All
Available Disk  Check on (E) Drives  Click on Ok  Click on Next 
 Click on “Yes”  Click on Next  Click on Finish

What is Web Server


 A Server That is used to Provide Web Publishing and Hosting Facilities That is
Called Web Server
 Linux web Server: The Name of Linux Web Server is Apache Web Server That is
Used 71% Currently Used in The World
 Microsoft Web Server
 The Name of Microsoft Web Server is IIS (Internet Information Services) That is
Used 21% Currently Used in The World

What is Internet Information Services


 Formerly Called Internet Information Services
 Web Server Application and Set of Feature Extension Modules
 Create by Microsoft For Use With Microsoft Windows

Version of (IIS) Server


 IIS 1.0 Was Initially Released as Free Add-on For Windows NT 3.51
 IIS 2.0 Was Included With Windows NT 4.0

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 IIS 3.0 Which Was Included With Service Pack 3 Of Windows NT 4
 IIS 4.0 Was Released as Port of and Option Pack For Windows NT 4.0
 IIS 5.0 Shipped With Windows 2000
 IIS 5.1 Was Shipped With Windows XP Professional
 IIS 6.0 Included With Windows Server 2003 and Windows XP Professional X64
Edition Added Support For IPV6
 IIS 7.0 Was a Complete Redesign and Rewrite of IIS and Was Shipped With
Windows Vista and Windows Server 2008
 IIS 7.5 Included in Windows 7 and Windows Server 2008 R2 IIS 7.5

How to Installation IIS Server


 Right Click on Computer  Click on Add Rules  Click on Next  Check on Web
Server (IIS)  Click on Next  Click on Add Required Features  Click on Next
 Click on Next  Click on Install

How to Check By default Web Server


 Click on Start  Click on Administrator Tools  Click on Internet
Information Services (IIS)  Double Click on Server Name
 Double Click on Site Folder
 Click on Default Web Site
 Then Right Click on  Click on Brows

What is IIS Web Server Standards and Protocol


 HTTP (Hyper Test Transfer Protocol )
 Primary Protocol that Communication With Web Services
 Designed to Provide a Request-Response Model For Communicating
 HTTP Traffic is Accessed by Using Transmission Control Protocol / Internet
Protocol (TCP/IP)-Based Network Connections
 Used TCP Port 80
 Due to the Importance of Web-based Traffic Most Organization Allow Their
Users to Access the Internet by Using TCP Port 80 The Default HTTP Port
 By Default HTTP Traffic is Transmitted Using a Plaintext Stream That Can
be Decoded Easily
 HTTPS (Hyper Test Transfer Service)
 Many Web Sites and Applications Need to Transmit Information Securely
Between Clients and Servers
 The Most Common Example is That of a Payment-Processing Site That
Accepts
 Designed to Provide Support For Encryption of HTTP-Based Traffic
 HTTPS Connections Use TCP Port 443
 Encryption Mechanisms
 Secure Sockets Layers (SSL)
 Transport Layers Security (TLS)
 HTML (Hyper Text Markup Language)
 Primary Specification For Web Pages
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Content is Accessible by Different Web Browsers
 Text Editors Such as Microsoft Windows Notepad
 Microsoft Visual Studio Platform

What is Web Sites and Site Bindings


 Web Sites are the Top-Level Containers That Provide Access To Web
Content
 Every Web Site Must Map to a Physical Path on the Server
 Generally This Path Will Contain That Root Folder for All Content That
Will be Available to Users Tho Access the Site

What is Site Bindings


 Types
 IP Address
 Port
 Host Name

What is Site Binding Types


 Specifies That Protocol Used to Connect to the Web Server
 The Two Types Default Options
 HTTP
 HTTPS

What Is Site Bindings-IP Address


 That List of IPV4 and IPV6 Address (As) on Which the Server Will Respond
 If The Server is Configured With More Then one IP Address Different Web
Site Can be Configured to Respond to Each
 Administrators Can Also Choose the (all Unassigned) Option
 Allow The Web Site to respond to a request on any interface That Doesn’t
Have an Exploit Port and Protocol Binding

Site Bindings-Port
 Speaifies The TCP Port on Which That Server Will Listen and Respond
 The Default Port For HTTP Connections is Port 80
 Users Who Need to
Access Web Sites on Alternative Ports Must Specify The Port Number in Their
URL
 Range For TCP Ports is Between 1 and 65535

Site Bindings-Host Name


 This Setting Allows Multiple Web Sites to Share the Same
 Protocol Type
 IP Address

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Port Number
 While Still Allowing Users to Connect to Different Web Sites
 The Method Works by Interpreting the Host Header Information Stored in an
HTTP Request
 Site Administrator Can Configured Their DNS Settings to Allow Multiple Domain
Names to Point to the Same IP Address
 The Domain Name Information is then Used by the Web Server to Determine to
Which Web Site the User is Attempting to Connect and to Generate the Reponses
From the Appropriate Site

How to Managing the Default Web Site and Site Bindings


 Click on Start
 Click on Administrative Tools
 Double Click on Server Name
 Double Click on Site Folder
 Right Click on Default Web Site
 Click on Edit Binding
 Select HTTP
 Then Click on Edit
 Types: IP Address: Port: Host Name:
HTTP 10.0.0.1 80 WWW.Farman.Com
 Click on Ok
 Click on Close

How to Open Web Site by Name


 Open Internet Explorer
 HTTP://www.Farman.com

Creating and Publishing Web Site


 Three Simple Steps
 Web Content
 Placing Content in Folder
 %System Drive%InetPub%WWWRoot
 Bindings and Settings

How to Create Web Site


 Open Notepad
 <HTML>
 <body bgcolor=green>
 <Marquee>
 <H1> Welcome To Farman IT College
 </H1>
 </Marquee>
 </Body>
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 </HTML>
 Then Click on Save
 Double Click on C Drives
 Double Click on InetPub Folder
 Double Click on wwwroot Folder
 Click on Save
How to Publish Our Web Site
 Open Internet Information Services
 Double Click on Server Name
 Double Click on Site Folder
 Then Right Click on
 Click on Add Web Site
 Name: Farman Physical Path: Select That Web Site Folder  Ok
 Types: IP Address: Port:
HTTP 10.0.0.1 80
Click on Ok

How to Open Web


 Open Internet Explorer
 HTTP://10.0.1 Press Enter

How to Remove Error From Web Server


 Open Internet Information Services
 Double Click on Server Name
 Double Click on Site Folder
 Then Web Server Farman Site
 Double Click on Default Documents
 Click on Add
 Writhe Man Page of Web Server: Index.htmal

How to Open Web Site


 Open Internet Explorer
 HTTP://10.0.0.1

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is Exchange Server 2010


1> What is E-mail System
 All Animal Species have Perfected a System of Communication
 Humans are the Only Species Capable of Spoken Language

EXP:
 Gestures
 Cave Drawings
 Hand Written Book
 Letter and Postman
 Telegraph
 Telephone
 Cell Phones
 Social Media and Blogging

We have to Kind of Models


 Instant Messaging  Store and Forward
Messaging

 What is Instant Message: Sender and The Receiver Both be Online at


The Same Time

 What is Store and Forward Messaging: E-mail Servers accept


Forward, Deliver , and Store Messages

 Neither the Users Nor their Computer are Required to be Online


Simultaneously

 Connect Only Briefly Typically to an E-mail Server For As Long as it


Takes to Send or Receive Messages

EXP: Popular E-mail System: (Gmail) (Yahoo) (MSN) ETC


What is Exchange Server 2010
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
1> An E-mail System
2> Calendaring System
3> And Address Book System
4> Runs on a Windows Server 2008 Server System

Exchange Server Holds


 Mail Messages
 Calendar Appointments
 Contacts and Other User Information
 Exchange Server Environment Provides a Server-based Storage of
Information

Evolution of Exchange Server


1> Exchange Server 4.0
2> Exchange Server 5.0
3> Exchange Server 5.5
4> Exchange Server 2000
5> Exchange Server 2003
6> Exchange Server 2007
7> Exchange Server 2010

Exchange Server 4.0


 The First Rollouts in 1996 Were on Windows NT Server 3.51
 Exchange Server 4.0 Was a Major Break Through
 In 1996 The Internet Was Just Opening Up to the Public
 One of the real Applications that Took Advantage of the Internet was
Microsoft Exchange Server 4.0
 Organizations Were able to Connect Their Exchange 4.0 Server to the
Internet

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Easily and Simply Send and Receive E-mails to Anyone else with an Internet
Connected E-mail System
 MS-Mail 3.0 at the Time Had a (SMTP) Gateway it Worked more on a
Scheduled Dial-up Basis
 Exchange Server 4.0 Had a Persistent Connection to Typically (ISDN) or 56-
KB Frame Connections to the Internet

Exchange Server 5.0


 Come Out in 1997
 Built to Run on Windows NT 4.0
 Supported the First Version of Outlook
 In Exchange Server 5.0 the Calendaring Product Schedule Was Introduced
 Server 5.0 Tied E-mail Calendaring and Address Book All Together
 Microsoft also Released the First Version of Out Look Web Access (Owa)

Exchange Server 5.5


 Microsoft Worked out the Bugs and Quirks of Their First Two Revision of
the Exchange Server Product
 Significantly Better Integration Occurred Between E-mail Calendar
Contacts and Task
 Enterprise Edition of Exchange Server 5.5 That Provided More the 16 GB of
Data Storage
 OWA Was Improved to Provide a Faster and Easier to us Web Client

Exchange Server 2000


 Used Active Directory for the Global Address List
 Instead of Windows NT Having its List of Network Logon Users
 And Exchange Server 5.5 having it OWA directory of Email Users
 Run on Top of Windows Server 2000 Server
 Exchange 2000 also went to an Active Version of the OWA Client

Exchange Server 2003

 Major Update to the Exchange Server Messaging System

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Exchange Server 2003 on Top of Active Directory 2003 Provided a
More
Reliable Experience Better Performance and Integration Support
Between Exchange Server and AD
 Added Mobility for Users to Synchronize their Pocket Pc mobile
Devices to Exchange Server

 Exchange Server 2003 Service Pack 1


 Introduced Cyclic Redundancy Check (CRC) Error Checking of The
Exchange Server Database

 Exchange Server 2003 Service Pack 2


 Added in Direct Push for Mobile Devices
 Exchange Server 2003 SP2 Pushes Message to Mobile Devices
Preventing Constant Polling by the Mobile Device

Exchange Server 2007


 Eliminated the Concept of Routing Groups being Separate From Active
Directory Site
 Used Active Directory’s Site and Services to Identify the Subnets of Version
Site and Used the t Routing Topology Specified in Active Directory to Move
Email Along the Same Path and Route as Active Directory Replication
 Outlook Web Access in Exchange Server 2007 was Dramatically Improved
 Introduction of Continuous Replication (CR)
 A Major Enhance mention Mail System Redundancy
 Prior to Exchange Server 2007 A Users Mailbox Was on only one Server if
That Server Failed or if the Database was Corrupt a Third-Party Solution
Needed
 Exchange Server Cluster Continuous Replication (CCR) Provided
Organization with a Primary and Secondary Copy of the Exchange Server
database
 If the Primary Database Failed the Secondary Copy of the Database
Automatically Come Online Within 20-30 Seconds the Users Outlook 2007
Reconnected to the New Server automatically and the User Never Know that
the Primary Exchange Server Had Failed
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

Exchange Server 2010


 Simplified Administration
 New Exchange Server Administrator Tools
 Role-based Administrator and User Self-Service Web-based Management

Admin Tools Improvements and Exchange Power shell


Scripting
 Exchange Server 2010 improves upon Power shell Capabilities and Adds
Additional Power Shell Applets and Functions
 Indeed the Graphical User Interface (GUI) Itself Site on Top of the Scripting
Engine and Simply Fires Scripts Based on the Task that an Administrator
Chooses in the GUI
 DAGS Database Availability Groups New Continuous Backup and
Replication Technology that effectively allows Exchange Server to Now Hold
up to 16 Copies of Users Mailbox Information

Transport and access Improvements


 All Client access is Now Funneled through the Client Access Server (CAS)
Roles in an Organization
 Allows for Improvernte in Client Access and Limited End-User Disraption
during Mailbox Moves and Maintenance
 Exchange Server 2010 Guard Against lost Emails Due to Hardware Failures
by Keeping “Shadow Copies” of Mail Data on Hub and Edge Transport
Servers That Can be resent in the Event of Loss

Exchange Server 2013 Requirements

 Hardware
 Operating System
 Active Directory
 Miscellaneous

Hardware Requirements Processor


Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

 X64 Architecture-based Processor That Supports the Intel X64 Architecture


or the AMD64 Architecture

Hardware Requirements RAM


 Minimum of 4 GB of RAM if one Role is Deployed
 If the Hub Transport Client-Access and Mailbox Server Roles are all
Deployed on the Same Server a Minimum of 10 GB of RAM is the Minimum
Supported Hardware Configuration
 An Additional 3 to 30 MB of RAM Should be Provides for Each Moilbox
Hosted on the Server

Hardware Requirements HDD


 1.2 GB on the Volume on Which
 200 MB on the system volume of the host server
 500 MB on the volume the hosts the Message queue database on an Edge
Transport or Hub Transport Hub Server.
 Appropriate Space For the Number of Mailboxes Hosted by a Mailbox
Server
 Volumes that hast Exchange binaries’ or data Must be Formatted With the
NTFS Files System

Operating System Requirements


 Windows Server 2012 (Service Pack 2 or Later )
 Windows Server 2012 R2

The Role of The AD in an Exchange Server 2010


Environment

 Exchange Server 2012 Relies on an Active Directory Infrastructure to do its


Job
 AD Site and Services , DNS Server , Global Catalog Servers , Domain
Controllers All Must be Configured Properly For Exchange Server to
Function Well
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

MISC Requirements For Exchange Server 2012


 Microsoft Net Framework 3.5
 Windows Remote Management 2.0
 Windows Power Shell V2
 Microsoft Management Console 3.0
 Internet Information Services (IIS) 7.0
2007 or 2010 Office System Converter Microsoft
Filter
Packed
 The Microsoft Filter Pack is a Single Point-of-Distribution For Office Ifilters
 IFilters are Components That Allow Search Services to Index Content of
Specific File Types Letting You Search For Content in Those Files They are
Intended For Use With Microsoft Search Services (SharePoint , SQL ,
Exchange Windows Search

Net TCP Port Sharing Service


 Net TCP Port Sharing Service Should be Set to Auto Mode

Our Environment LAB


 O S Windows Server 2012 R2
 Server Name: Rasooly
 Active Directory With DNS Server
 Domain Name: erasoft.com
 IP Address: 10.0.0.1

Exchange server 2012 Installer


 2010 Office System converter Microsoft
 Drivers C D

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is the Different B/W Mail Enable


and Mailbox User
 Mail Enable User: Mail Enable User only Sending Mail to Another User But
Can’t Have Inbox Facility
 Mailbox User: Mailbox User Sending / Receiving Mail to another User and
Have Inbox Facility

Exchange Server 2012 Server Roles


 EDGE Transport Server Role
 HUB Transport Server Role
 Client Access Server Role
 Mailbox Server Role
 Unified Messaging Server Role

What is Mailbox Server


 Holds Users Mailbox Information
 Has the Exchange Server EDB Database
 For High Availability for Exchange Server data the Mailbox Server Role
System Would Likely be Clustered

What is Client Access Server Role


 Performs Many of the Tasks That Were Formerly Performed by the
Exchange Server Front-end Server
 CAS dose Intelligent Assessment of Where Users Mailbox Resides
 Then Provides the Appropriate Access and Connectivity
 By allowing the CAS Server to Redirect the User to the Appropriate
Destination There is More Flexibility in Providing Redundancy and
Recoverability of Mailbox access in the Event of a System Failure

What is HUB Transport Server Role


 HUB Transport Server Role replaces What was Formerly Known as the
Bridgehead Server
 Intelligently Route Message Within an Exchange server 2010 Environment
 It also acts as the Policy Compliance Management Server

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

Unified Message Server Role


 Capability For Exchange Server 2010 to be the Voice Mail Server For an
Organization
 Unified Messaging Server can be Integrated into the Phone System
 Able to Take Messages on Incoming Calls and The Message are Store in the
Users Exchange Server Mailboxes for Playback From the Phone or by
Accessing the Message From Within Outlook
 OWA or Windows Mobile

EDGE Transport Server Role


 Dedicated Server Function That Performs Spam and Virus Filtering the
First Point of Entry of Message into an Exchange Server Environment
 Filtering Thousands of Messages For Recipients Who do not Exist in the
Environment
 Then EDGE Transport Server Accesses and Stores a Copy of Certain Active
Directory Data Such as All Valid Exchange server 2010 Email Recipient Mail
Addresses
 In Coming Message Can Be Checked against this Active Directory
Application Mode (ADAM ) Directory and Messages for Recipients Who do
Not Exist in the Organization Are Immediately Deleted
 After a First at Deleting Messages For Nonexistent Recipients
 A Spam and Virus Scan Can Then be Run on the Remaining Messages
 After being Determined to be Clean the Message Can be Forwarded on a
HUB Transport

Exchange server Requirements


 Hardware
 Operating System
 Active Directory
 Miscellaneous

How to Installing Prerequisites


 Microsoft Net Framework 3.5
 Windows Remote Managements 2.0

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Windows Power Shell V2
 Microsoft Management Console 3.0
 Internet Information Services (IIS) 7.0

How to Install Prerequisites


 Click on Start  Right Click on Command  Run as Administrator
 Administrator> E:
 E:> CD Exchange Server Folder Name
 E:\Jan> CD Scripts
 E:\Jan\Scripts> Dir /S
 E:\Jan\Scripts> Servermanagercmd –IP Exchange-typical.xml
 E:\Jan\Scripts> Shutdown –r –t 0

How to Install 2007 or 2010 Office System


Converter Microsoft
 Double Click on Office System Converter  Click on Install  Click on
Finish

How to Start Net Tcp Port Sharing Service


 Click on Start  Click on Administrator Tools  Click on Services 
Double Click on Net TCP Port Sharing Service  Select Automatic  Click
on Start  Apply  Ok

How to Preparing a New Environment For


Exchange
 Prepare the Active Directory Schema
 Prepare Active Directory
 Prepare Domains That Will Host Exchange Server 2010

How to Prepare Schema


 Click on Start  Right Click on Command  Run as Administrator
 Administrator> E:
 E:> CD Jan
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 E:\Jan> Setup /PrepareAD /Organizationname:Framanorg

How to Checking
 Click on Start  Administrator Tools  Click on Active Directory Domain
Users and Computer
 Double Click on Domain Name
 Double Click on Microsoft Exchange Security

How to Preparing Individual Domains For the


Introduction of Exchange Server

 Click on Start  Right Click on Command  Run as Administrator


 Administrator> E:
 E:> CD Jan
 E:\Jan> Setup /Preparedomain:Farman.com

How to Start Setup of Exchange Server


 You Can Specify Role Using the Following Terms
 HUB Transport, HT or H
 Mailbox, MB or M
 Client Access, CA or C
 EDGETransport, ET or E
 UnifiedMessaging, UM or U

How to Install on One Time


 Click on Start  Right Click on Command  Run as Administrator
 Administrator> E:
 E:> CD Jan
 E:\Jan> Dir
 E:\Jan> Setup /Mode:Install /R:H,M,C
 E:\Jan> Shutdown –R –T 0

How to See Exchange Server


 Click on Start  Click on Exchange Management Consol
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

How to Install Exchange Server by GUI Mode


 Open Computer  Open E Drives  Double Click on Jan Folder  Double
Click on Setup.exe 
1> Click on Step3> Choose Exchange Languages
 Install only Languages From DVD
2> Click on Steps 4> Install Microsoft Exchange
 Click on Next  Check on I Accept the Team  Click on Next  Click on
No  Click on Next  Select Custom Exchange Server Installation  Click
on Next  Click on Back
 Now Select Typical Exchange server Installation Click on Next  Give
Name: Farman  Click on Next  Check on No  Then Click on Next 
Click on Next  Check on Don’t the Wash to Join The Program  Click on
Next  Click on Install  Click on Finish  Restart the Server

How to Exchange Server 2010 Post Installation Tasks


 Enter the Product Key For Exchange Server 2010
 Install a Product to Protect Exchange Server 2010 From Malware
1> Firewall Configuration
 Setup Process Configures Windows Firewall
 With Advanced Security
 All necessary Ports required to Support the Roles that you deploy are Open
for Server and Client Communication

What s Exchange Server 2010 Edition


 Standard Edition
 Supports 5 Database on Each Server

 Enterprise Edition

 Supports 100 Database on Each Server

What is Client Access License


 Each User or Device that Accesses Exchange Requires a Standard Client
Access License

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

1> Standard CAL


 Give Access to the Majority of Features Such as Outlook Web Application
Federated Calendar Sharing and Standard Email Functionality ETC

2> Enterprise CAL


 Advanced Functionality Such as Custom Retention Police Voicemail Unified
Messaging ETC
 Note: If the User Can like to Give Enterprise First give Standard CAL then
give Enterprise
 The Enterprise CAL is a License that is obtained in Addition to the Standard
CAL and is Not a Replacement For the Standard CAL

Configuration Mailbox Server


 Deploying Exchange Database
 Address List Configuration
 Mailbox Configuration
 Resources and Shared Mailboxes
 Managing Recipients and Distribution Groups
 Setting up Public Folder

What is Exchange Server Database


 A Mailbox Database is on Exchange Database For Storing Mailbox
 It Manages the Data in Mailboxes
 Tracks Deleted Message and Mailbox Sizes
 Assists in Message Transfer

How to See Exchange Server Database


 Click on Start  Click on Computer  Double Click on C Drives  Double
Click on programs Files  Double Click on Microsoft Folder  Double
Click on Exchange Server Folder  Double Click on V14 Folder  Double
Click on Mailbox Database 1279 Folder

Exchange Server Database


 Create Mailbox Database
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Removing Mailbox Database
 Mount Mailbox Database
 Configuring the Database Size Limit
 Changing the Path to the Mailbox Database
 Configuring Mailbox Database Properties

How to Create Mailbox Database


 Click on Start  Click on Exchange Server Management Consol
 Double Click on Microsoft Exchange Server
 Double click on Organization Configuration
 Click on Mailbox
 On Right Side Click on New Mailbox Database
 Name: Database 1
 Select on Server Name: Rasooly  Click on Next
 E:\Mailbox\Database1\Database1.EDB
 Check on Mount This Database
 Click on Next  Click on New
 Click on Finish

How to Check on Database


 Click on Start  Click on Computer
 Double Click on E drives  Double Click on Mailbox Folder
 Double click on Databas1 Folder

How to do Mount / Unmount Mailbox Database

 Click on Start  Click on Exchange Management Consol  Double Click


on Microsoft Exchange Server Folder
 Double Click on Organization Configuration Click on Database 1File 
Then Right Click on Dismount  Again Click on Mount

How to Removing Mailbox Database by Command

 Click on Exchange Management Shell 


 > Get-Mailboxdatabase
 > Remove-Mailboxdatabase – Identity Database1

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Press Enter

How to do Mount / Unmount Mailbox Database by Command


“Step 1”
 Click on Exchange Management Shell 
 > Dismount-database –Identity Iqbulshah  Press Enter
 Press “Y”

“Step 2”
 >Mount-database –Identity Iqbulshah  Press Enter
 Press “Y”

How to Changing The Path to the Mailbox Database


 Click on Start  Click on Microsoft Exchange Management Consol 
Double Click on Microsoft Exchange  Double Click on Organization
Configuration  Click on Mailbox  Select on Database “Iqbulshah” 
Then Right Click on  Click on Move Database Path
 D:\Mailbox\Armanshah\

 D:\MailboxLog\Armanshah
 Click on Move  Click on “Yes”  Click on Finish

How to Check on Database


 Open D Drives  Double Click on Mailbox Folder

How to Configuring The Mailbox Size Limit Using Database

 Open Exchange Management Consol


 Double Click on Microsoft Exchange Folder
 Double Click on Organization Configuration
 Click on Mailbox
 Right Click on Arman shah Database  Click on Properties  Click on
Limit
Issue Warring At (KB) 800

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

Prohibit Send At (KB) 200
Prohibit Send or Recving (KB)
 Keep Delete See to (Days)
 Keep Delete Mailbox For (Days)
 Don’t Delete Been Backup Up

What is Address List


 An Address List is a Collection of Recipient And Other ADDS Objects
 Can Contain one or More Types of Objects
 Such as (Users, Contacts, Groups, Public Folder, Conferencing and Other
Resources)

Configuration of Address List


 Open Exchange Server Management Consol
 Double Click on Organzation Configuration
 Click on Mailbox
 On Right Side Click on Address List

 Rasooly
 Rasooly
 Click on Next  Click on Browse
 Select on OU Exp: IT  Click on Ok
 Check on All Repent Types  Click on Next
 Check on Repaint is Department
 Click on Specified Link
 Sales  Click on Add
 Click on Ok  Click on Next
 Check on Imminently  Click on Next 
 Click on New  Click on Finish

What is Global Address Lists


 A Global Address List (GAL) is a Directory that Contains Entries For Every
 Such as (users, Groups, Contact)

Configuration of Global Address Lists


Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Open Exchange Management Shell
 >New-GlobalAddressList –Name “Farman Global” IncludedRecipients
MailboxUsers  Enter

How to Remove Global Address Lists


 Open Exchange Management Shell
 >Remove-GlobalAddressList Identity “Farman Global”  Press Enter

What is Offline Address Books (OAB)


 Copy of a Collection of Address Lists Generated on an Exchange Server
 Downloaded to Client Computer
 Microsoft Outlook User Can Access the Information it Contains While
Disconnected From the Exchange Organization
 Exchange Server 2010 Generates OAB Files Compresses the Files and Then
Places then on a Local Share

Configuration of Exchange Server Offline Address Book

 Click on Start  Click on Exchange Server Managements  Double Click


on Microsoft Exchange Server  Double Click on Organization
Configuration  Click on Mailbox
 On Right Side Click on New Offline Address Books
 Name: New Offline
 Click on Browse  Select on Mailbox Server  Click on Ok
 Check on Include the Default Global Address List
 Check on Include The Following Address
 Click on Add  Select One of List (IT)  Click on Ok
 Click on Next 
 Check on Enable Web-based Distribution
 Click on Add
 Select on OAB  Click on Ok
 Click on Next
 Click on New
 Click on Finish

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

What is User Mailbox


 Message Storage Containers Associated With User Accounts in the Forest in
Which you Have Deployed Exchange Server 2010
 How to Configure New and Existing Users with Mailbox
 Modify the Quotas Applied to Those Mailbox
 Configure Mailbox so That Other Users are Able to Send Messages on the
Original Mailbox Owners Behalf and Other Uses are Granted Access to the
Content of Those Mailbox

How to Configure For New User Mailbox

 Open Exchange Management Consol


 Click on Recipient Configuration
 Click on Mailbox
 On Right Side Click on New Mailbox
 Check on User Mailbox  Click on Next
 Check on New User  Click on Next  Check on Specify The Organization
 Click on Browse  Click on IT OU  Click on Ok
 User Name: Khan Last Name: Jan User Login Name: Khan
 Check on First Specify……
 Click on Browse  Select Mailbox Iqbul Shah  Click on Next  Check on
Create ….
 Click on Next  Click on New  Click on Finish

How to Create Mailbox For Existing User


 Open Exchange Management Consol  Double Click on Exchange Server
 Double Click on Recipient Configuration
 Click on Mailbox
 Then Right Click on New Mailbox
 Check on User Mailbox  Click on Next
 Check on Exiting User
 Click on Add  Select Users Which You Like  Click on Ok  Click on
Next
 Name: Jan  Click on Browse  Select Iqbulshah Database  Click on
Next  Click on New  Click on Finish

How to Create Link Mailbox


Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 Connected to Accounts Hosted in Forests Other Then One in Which You
Have Deployed Exchange Server

Configuration of Link
 Open Exchange Management Consol  Double Click on Exchange Server
 Double Click on Recipient Configuration
 Click on Mailbox
 On Right Side Of Windows  Click on New Mailbox  Check on Link and
Mailbox
 Click on Next  Check on New User  Click on Next  Check on Specify
the Organization  Click on Brows  Select OU IT  Click on Ok
 Fist Name: Zabi Last Name: Rasooly user Login Name: Zabi
Password: Jan@123 Confirm Password: Jan@123  Click on Next 
Click on Next

What is quotas Implementation on Mailbox

 Mailbox Inherit quotas and Deleted Item Retention Settings From the
Mailbox Database That Hosts Them
 Setting Applied at the Mailbox Level Override Settings Applied at the
Mailbox Database Level

Configuration of Quotas
 Open Exchange Management Consol  Double Click on Exchange Server
 Double Click on Recipient Configuration
 Click on Mailbox
 Right Click on Khan Users  Properties
 Click on Mailbox Setting  Double Click on Storage Quotes
 Uncheck on Use Mailbox Database Default

What is Archive Mailbox


 New Feature in Exchange Server 2010
 Allows Users to Store Message in an Archive Mailbox
 Users Store Massage our Old Messages on Secondary Mailbox
 Accessible to Outlook 2010 and OWA
 Available Only with Exchange Enterprise Edition
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College

How to Enable / Disable Archive


 Click on Start  Click on Microsoft Exchange Management Consol 
 Double Click on Microsoft Exchange  Double Click on recipient
Configuration  Click on Mailbox  Right Click on Zabi User 
 Disable Archive  Click on Yes
How to Enable Archive
 Click on Start  Click on Microsoft Exchange Management Consol 
 Double Click on Microsoft Exchange  Double Click on recipient
Configuration 
 Click on Mailbox
 Right Click on Zabi User  Enable Archive  Click on Yes

How to Brows User on Outlook Web Access


 Open Internet Explorer
 HTTPS:\\Server IP \OWA
 User Name: Zabi
 Password: Jan@123
 Click on Sing In
 Note: There is Create One Folder Put Your Files on That

What is Resource Mailbox


 Allow Users in Your Organization to Book Resource Such As
 Conference Rooms. Equipment ETC
 Use Exchange Calendaring Functionality
 Acceptance Policies
 Allow These Booking to be Processed Automatically
 Room Mailboxes:
 Meeting Locations Such as Conference Room Hall or Lecture Theaters ETC
 Equipment Mailbox:
 Projectors. Scanners. Company Card. ETC

How to Create Room Mailbox Resource


 Open Exchange Management Consol  Double Click on Exchange Server
 Double Click on Recipient Configuration
 Click on Mailbox

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
 On Right Side Of Windows  Click on New Mailbox  Check on Room
Mailbox
 Click on Next  Check on New User  Click on Next  Check on Specify
the Organization  Click on Brows  Select OU IT  Click on Ok
 Fist Name: Con Hall Last Name: Rasooly user Login Name: Con Hall
Password: Jan@123 Confirm Password: Jan@123  Click on Next 
Click on Next

 Ails Name: Con Hall


 Check on Specify Pre Mailbox  Click on Brows
 Select Iqbul shah Database
 Click on Ok  Click on Next  Click on Next  Click on New  Click on Finish

How to Create and Configure Resource Mailbox


 Open Exchange Management Consol  Double Click on Exchange Server
 Double Click on Recipient Configuration
 Click on Mailbox
 On Right Side Of Windows  Click on New Mailbox  Check on
Equipment Mailbox
 Click on Next  Check on New User  Click on Next  Check on Specify
the Organization  Click on Brows  Select OU IT  Click on Ok
 Fist Name: Projector Last Name: Rasooly user Login Name: Projector
Password: Jan@123 Confirm Password: Jan@123  Click on Next 
Click on Next

 Ails Name: Projector


 Check on Specify Pre Mailbox  Click on Brows
 Select Iqbul shah Database
 Click on Ok  Click on Next  Click on Next  Click on New  Click on Finish

How to Used Resource Mailbox


 Open Internet Explorer
 HTTPS:\\ Server IP \ OWA
 User Name: Zabi
 Password: Jan@123
 Click on Sing in

Click on New  Click on Message Request 


To: Con
Option: Armanshah
Recourse: Projector
Subject: Booking
Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP
CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC
Erasoft IT College
Click on Send
 Open Another Internet Explorer
 Login Armanshah User
 Click on Sign in

Prepared by: Zarghon Shah Rasooly Certification: MCSE MCITP.CCNA.CCNP


CWNA.CWNP.PIX Firewall .ASA Router. Security Camera ETC

You might also like