Server Configuration Guide
Server Configuration Guide
Level-III
Nov, 2023
Addis Ababa, Ethiopia
Contents
Acknowledgment....................................................................................................................................................................iii
Acronym................................................................................................................................................................................. iv
Introduction to the Module......................................................................................................................................................v
Unit one: Confirm server specification...................................................................................................................................1
1.1. Overview of Server Operating System....................................................................................................................2
1.2. Confirming network operating system.....................................................................................................................3
1.3. Identifying product, vendor architecture and equipment.........................................................................................4
1.4. Identifying technology and resource........................................................................................................................5
Self-check test-1.......................................................................................................................................................................7
Unit Two: Verify server compatibility and inter-operability..................................................................................................8
2.1. Reviewing Hardware and software to ensure compatibility.........................................................................................9
2.3. Installing required operating system and software.....................................................................................................12
2.4. Installing additional tools or third-party software.......................................................................................................13
2.5. Patching operating system and applications...............................................................................................................14
Self-check 2............................................................................................................................................................................15
Operation sheet 2.1. Install Server Operating system........................................................................................................16
3.1. Configuring server......................................................................................................................................................33
3.2. Defining scope and applicability of testing.................................................................................................................40
3.3. Developing test plan....................................................................................................................................................41
3.4. Running system test....................................................................................................................................................41
3.5. Analyzing error report and making changes...............................................................................................................41
3.6. Validating changes......................................................................................................................................................42
Self-Test 3.............................................................................................................................................................................. 43
Operation sheet 3: Install DNS Server..................................................................................................................................44
Operation sheet 3.1 Install Active Directory.........................................................................................................................46
Operation sheet 3.3. Configure DHCP server........................................................................................................................56
Operation sheet 3.4: Create users using server 2012............................................................................................................60
Operation sheet 3.5: Create a GPO in domain server 2012...................................................................................................63
LAB Test 3.1 Install Operating System.................................................................................................................................67
Reference............................................................................................................................................................................... 68
Participants of this Module preparation.................................................................................................................................69
Acknowledgment
Ministry of Labor and Skills wish to extend thanks and appreciation to the many representatives of TVET
instructors and respective industry experts who donated their time and expertise to the development of this
Teaching, Training and Learning Materials (TTLM).
Acronym
AA Active Directory
DS Directory Service
DNS Domain Name System
TVET Technical and Vocational Education and Training
TTLM Teaching and Training Learning Material
DHCP: Dynamic Host Configuration Protocol
OS: Operating System
LAN : Local Area Network
WAN Wide Area Network
VPN Virtual Private Network
PSTN Public Switched Telephone Network
UTP Unshielded Twisted Pair
STP Shielded Twisted Pair
VLAN Virtual Local Area Network
CLI Command Line Interface
GUI Graphical User Interface
HDD Hard Disk Drive
SSD Solid State Drive
CHKDSK Check Disk
PDA Personal Digital Assistant
IIS Internet Information Services (Microsoft's web server)
CRM Customer Relationship Management
NOS Network Operating System
UNIX A multiuser and multitasking operating system
TCP/IP Transmission Control Protocol/Internet Protocol
GB Gigabyte
RAM Random Access Memory
DVD Digital Versatile Disc
ROM Read-Only Memory
VGA Video Graphics Array
IEEE Institute of Electrical and Electronics Engineers
ISO International Organization for Standardization
VM Virtual Machine
PKI Public Key Infrastructure
CA Certificate Authority
HTTP Hypertext Transfer Protocol
Introduction to the Module
This module provides you to acquire knowledge of administer and configure server that allow
user interface and networking systems, how to connect network devices and computer hardware
peripherals in general.
This module covers the units:
• Confirm server specification
• Verify server compatibility and inter-operability
• Configure and test server
Learning Objective of the Module
• Know server specification
• Check and Verify server compatibility and inter-operability
• Know how to Configure and test server
Module Instruction
For effective use this modules trainees are expected to follow the following module
instruction:
• Read the specific objectives of this Learning Guide.
• Read the information that this module contains.
• Do the LAP test in page (if you are ready) and show your output to your teacher.
Unit one: Confirm server specification
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
• Overview of Server Operating System
Software
Network connections.
There are different types of server designs that need to be considered when
identifying equipment.
here are multiple server architectures to choose from, including
Mainframe architecture
File sharing architecture
Client/server architecture
Web based architecture
Thin client architecture
Blade architecture.
Product architecture
Product architecture is the organization of a product’s functional elements and the ways these
elements interact.
It plays a significant role in how to design, make, sell, use, and repair a new product offering .
There are two fundamental types of product architecture: Modular and Integral.
Modular
Organize a product into a number of modules to develop and complete a specific function.
The interaction of these modules carries out the product’s overall purpose.
The advantages of modular include task allocation and outsourcing. As well as, economies of
scale, reuse/standardization for developing new products, maintenance, and mass
customization.
Integral
This Unit is developed to provide you the necessary information regarding the following
content coverage and topics
This guide will also assist you to attain the learning outcome stated in the cover page.
Firstly, confirm that the chosen central processing unit (CPU) aligns with the motherboard
Verify that Random Access Memory (RAM) modules are supported by both the
motherboard and CPU, taking into account factors like RAM type, capacity, and
Additionally, check the compatibility of storage drives, RAID controllers, and networking
Ensure that the power supply unit (PSU) matches the server chassis and motherboard,
providing sufficient power output and appropriate connectors. For graphics processing units
(GPUs), if applicable, confirm compatibility with the motherboard's PCIe slots and check
Matching the server chassis and motherboard form factors is crucial, as well as ensuring
cooling solutions are compatible with both the CPU and chassis.
Lastly, confirm that the chosen operating system is supported, considering driver
availability and compatibility with the server's hardware. Regularly consult manufacturer
Read all the documentation about the products involved. Your hardware or software might
have a recurring problem or might conflict with another product. Frequently, the
manufacturer will document these conflicts and provide a fix. If you do not find the solution
in the supplied documentation, you might contact the manufacturer of the product and ask
for undocumented conflicts.
When you install a new computer or network operating system, your computer will usually
attempt to detect the hardware in the system during the installation process and load the
appropriate drivers for it.
Check the list of detected hardware and ensure that it matches what is already in the
machine.
If you are installing Novell's Intranet Ware, for example, the install utility will automatically
scan your computer for hardware such as hard disks, CD-ROM drives, and NICs. If the
devices are recognized, the appropriate drivers will then be loaded for the recognized devices
Checking Minimum Requirements
As a first step before you install, make sure that you exceed the minimum requirements for
the resources in the computer.
These resources include processor speed, memory, and disk space.
Table lists some minimum hardware requirements for server 2008
Table 1. Minimum Hardware Requirements for window server 2008 operating system
Network Hardware
Network hardware is not as susceptible as software to conflicts and compatibility problems.
Connectivity Devices, covers the basics of how these devices (repeaters, bridges, routers,
routers, and gateways) work.
Since these devices are common to many different types of networks and work mainly with
data packets, they are less likely to present conflicts.
The manufacturers of these products maintain strict adherence to the IEEE 802.x standards.
Therefore, any device that meets an IEEE standard can communicate with another device
that meets the same standard.
Obtaining all hardware required
The first step in obtaining a networking device is to put suppliers of that device. Then,
there are factors you need to consider about the supplier and the devices on offer, such as
support provided and purchase price.
This will help you to compare and choose the most appropriate supplier and the exact
model of the device according to client requirements.
Finally, you are ready to place an order for your organization or client to purchase the
device.
2.3. Installing required operating system and software
A server operating system is an advanced operating system designed to run on servers. It has
the necessary features and subsystems to operate in a client-server architecture and serve
clients’ requests. A server OS is designed from the ground up to provide features suitable for
multi-user, business-critical applications. It provides the central interface for managing users,
implementing security, and other administrative processes.
Server operating systems are designed for platforms that act as web servers, application
servers, database servers, email servers, or other platforms running on a dedicated server.
Server operating systems offer various benefits compared to standard operating systems,
including unlimited user connections, more memory, and advanced network optimizations
Figure 2.1 on operation sheet 1.1 is the first screen you’ll see. It allows you to customize
the installation language and the regional and keyboard settings of the server. You’ll need
to change some settings here if the defaults do not match your language, region, and
keyboard.
For example, if you are in Ireland using an Irish-based keyboard, then these defaults won’t
suit you at all! The time zone won’t work correctly, currency symbols will be wrong, and the
keyboard layout will be totally wrong. For example, you will struggle to find the backslash
(\), which is kind of important in the Windows world.
1. Hardware and software compatibility is important to ensure smooth and efficient operation of
computer systems.
2. Drivers are a type of software that play a crucial role in facilitating communication between
hardware and the operating system.
3. Upgrading hardware components, such as a graphics card, may require updating corresponding
software drivers to maintain compatibility.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_________
________________________________________________________________________________
________________________________________________________________________________
__________________________________________________________
Operation sheet 2.1. Install Server Operating system
How to Install Windows Server 2008 Step by Step
1. Insert the appropriate Windows Server 2008 installation media into your DVD drive. If you don't have an
installation DVD for Windows Server 2008
3. When prompted for an installation language and other regional options, make your selection and press Next.
4. Next, press Install
Now to begin the installation process.
5. Product activation is now also identical with that found in Windows Vista. Enter your Product ID in the next
window, and if you want to automatically activate Windows the moment the installation finishes, click Next.
If you do not have the Product ID available right now, you can leave the box empty, and click Next. You will need to
provide the Product ID later, after the server installation is over. Press No.
Because you did not provide the correct ID, the installation process cannot determine what kind of
Windows Server 2008 license you own, and therefore you will be prompted to select your correct
version in the next screen, assuming you are telling the truth and will provide the correct ID to prove your
selection later on.
7. If you did provide the right Product ID, select the Full version of the right Windows version you're prompted, and
click Next.
8. Read and accept the license terms by clicking to select the checkbox and pressing Next.
9. In the "Which type of installation do you want?" window, click the only available option –Custom (Advanced).
10. In the "Where do you want to install Windows?", if you're installing the server on a regular IDE hard disk, click to
select the first disk, usually Disk 0, and click Next.
If you must, you can also click Drive Options and manually create a partition on the destination hard disk.
11. The installation now begins, and you can go and have lunch. Copying the setup files from the DVD to the hard
drive only takes about one minute.
12.Then the server reboots you'll be prompted with the new Windows Server 2008 type of login screen.
Press CTRL+ALT+DEL to log in.
13. Click on Other User.
14. The default Administrator is blank, so just type Administrator and press Enter.
15. You will be prompted to change the user's password. You have no choice but to press Ok.
16. In the password changing dialog box, leave the default password blank (duh, read step #15…), and enter a new,
complex, at-least-7-characters-long new password twice. A password like "top secret" is not valid (it's not complex),
but one like "T0pSecreT!" sure is. Make sure you remember it.
17. Finally, the desktop appears and that's it, you're logged on and can begin working.
Operation sheet 2.2: Installation of Windows Server 2012
Step 1: We can download the evaluation ISO of Windows Server 2012 R2 from the following link:
Step 2: After downloading the ISO of Microsoft, create a boot USB driver which can be created with the
Microsoft tool called Windows USB/DVD Download Tool and can be downloaded from the following link:
Step 3: After completing the above given steps, plug-in the USB to the server and wait for a while till
it loads the files. This will continue for about a couple of minutes as shown in the following screenshot.
Step 4: After the files are loaded, you will see the screen of language settings of installation, keyboard, time
and currency format. Generally, all the default ones are also good enough to start with. Click Next.
Step 5: Click “Install now”.
Step 6: Once you have clicked on Install Now, the setup will start and it will load all the files and the screen
will look as shown in the following screenshot.
Step 7: Wait until the files are loaded and then you will see the following screen. Let’s select
Windows Server 2012 Data Center Evaluation (Server with GUI) and click Next.
Step 8: Click “I accept the license terms” and then click on the Next button as shown in the following
screenshot.
Step 9: The following screen will appear. In “Driver Options” you can create a new partition, delete or
format the Hard disk. After you have done this process then you can select the partition where the Windows
server 2012 R2 will be installed in our case we have one partition. Once all this is done, then click on Next.
Step 10: Let’s wait until this process finishes during this time and
then the server will reboot.
Step 11: Once the reboot is done the following screen will appear. Set the password for the server and then
click on “Finish”.
Step
12: It
will
take
some
This unit is developed to provide you the necessary information regarding the following content
coverage and topics
• Configuring server
Specifically, upon completion of this Learning Guide, you will be able to:
• Configure server
Recursive and Iterative Queries: DNS queries can be recursive or iterative. In a recursive
query, the DNS server provides the complete answer to the client. In an iterative query, the
server provides a referral to another DNS server, and the client continues the query process.
Authoritative and Non-Authoritative Servers: An authoritative DNS server is responsible
for storing and providing information about a specific domain. Non-authoritative servers may
cache information obtained from authoritative servers.
DNS Records: DNS servers store information in records such as A (address) records for
mapping domain names to IPv4 addresses, AAAA records for IPv6 addresses, MX (Mail
Exchange) records for email routing, CNAME (Canonical Name) records for aliasing one
domain to another, and more.
Forwarders: DNS servers can be configured with forwarders, which are other DNS servers
that handle queries on behalf of the local server. This helps in reducing the time taken to
resolve queries by leveraging the caching capabilities of the forwarder.
Root DNS Servers: The DNS system begins with root DNS servers that maintain
information about top-level domains (TLDs). They direct queries to the authoritative servers
for specific TLDs.
DNS Caching: DNS servers cache query results to reduce the time taken to resolve
subsequent queries for the same domain name. This helps in improving the performance of
the DNS system.
DHCP server
DHCP is a protocol that automates the assignment of IP addresses and other
configuration parameters to devices on a network.
A DHCP server is responsible for managing and distributing IP addresses and related
information to devices on the network.
IP addresses assigned by DHCP servers are leased for a specific duration and must be
renewed before expiration.
DHCP servers have several benefits, such as
preventing IP address conflicts, simplifying network administration, and supporting both
IPv4 and IPv6 protocols.
DHCP Scope
A DHCP scope is a range of IP addresses and configuration settings that a DHCP server is
configured to provide.
This means that a DHCP scope is a set of possible IP addresses that a server can assign
to devices on a network. For example, a DHCP scope might be 192.168.1.1 to
192.168.1.100, meaning that the server can give any of these addresses to a device that
requests one.
A DHCP scope also includes some other settings that affect how the devices communicate on
the network, such as the subnet mask, the default gateway, and the DNS servers.
Each scope is associated with a specific subnet and includes settings such as lease duration
and default gateway.
This means that a DHCP scope is linked to a subset of a larger network, called a subnet.
A subnet is a group of devices that share a common prefix in their IP addresses. For
example, all the devices in the scope 192.168.1.1 to 192.168.1.100 belong to the subnet
192.168.1.0/24, where /24 indicates the length of the prefix. A DHCP scope also includes
settings that determine how long a device can keep an IP address (lease duration) and
how to reach other networks (default gateway).
Reservations are optionally used to ensure that a DHCP client always receives the same IP
address.
This means that a DHCP scope can have some exceptions, called reservations, that assign
a specific IP address to a specific device. For example, a reservation might be
192.168.1.10 for a printer, meaning that the server will always give this address to the
printer and not to any other device. Reservations are useful for devices that need a fixed
IP address for identification or access purposes.
Hyper-V
Hypervisor Technology: Hyper-V is a Type 1
hypervisor, which means it runs directly on the hardware without a host operating system. This
improves the efficiency and performance of virtualization.
Host Operating System: Hyper-V is available as a feature on Windows Server editions and
Windows 10 Pro, Enterprise, and Education editions. Users can enable Hyper-V on their
Windows-based systems for server or desktop virtualization.
Virtual Machines: Hyper-V allows users to create and run multiple virtual machines (VMs) on a
single physical server. Each VM has its own operating system, applications, and settings, and is
isolated from other VMs.
Supported Guest Operating Systems: Hyper-V supports a wide range of guest operating systems,
including various versions of Windows, Linux, and other compatible operating systems. Users
can choose the operating system that suits their needs and preferences for each VM.
Integration Services: Hyper-V provides Integration Services, which are drivers and services that
enhance the interaction between the host and guest operating systems.
They include features such as improved performance, mouse integration, time synchronization,
and more.
Dynamic Memory: Hyper-V includes Dynamic Memory, which allows the memory allocation to
VMs to be adjusted dynamically based on workload demands. This optimizes the memory usage
on the host and prevents wastage or shortage of memory resources.
Live Migration: Hyper-V supports Live Migration, which enables the movement of running VMs
from one host to another with minimal downtime. This feature is useful for load balancing and
maintaining high availability of VMs.
Snapshot and Checkpoints: Hyper-V allows users to take snapshots or checkpoints of VMs at
specific points in time. This feature allows users to save the state of a VM and restore it later if
needed. It can be helpful for testing, troubleshooting, or backup purposes.
Active directory certificate services
AD CS: A Windows Server role that provides a PKI solution for securing communication within
an organization. It issues and manages digital certificates for various security scenarios.
PKI: A system that uses asymmetric cryptography to bind public keys to identities of entities
(such as users, computers, or devices). It enables secure communication, authentication, and data
integrity.
CA: A component of AD CS that validates the identity of
entities and issues digital certificates to them. It can be either Enterprise or Standalone, depending
on the integration with Active Directory.
Certificate Templates: Definitions of the properties and purpose of digital certificates. AD CS
provides predefined and custom templates for different scenarios.
File services
File Sharing: This is the ability to store and access files and directories across a network,
enabling collaboration and data accessibility among users and applications.
NFS and SMB: These are two common protocols for network file sharing, each suitable for
different operating system environments (Unix/Linux and Windows, respectively).
File Servers: These are servers that host shared files and provide access to clients over a network,
with configuration options for permissions, access control, and file storage.
File Permissions and Access Control: These are mechanisms for setting and enforcing rules on
who can read, write, or execute specific files and directories on the network.
Distributed File Systems: These are systems that organize and manage files across multiple
servers or storage devices, providing a unified namespace and a centralized view of the files.
File Replication: This is the process of duplicating files across multiple servers for redundancy
and fault tolerance, enhancing data availability and resilience.
File Caching: This is the technique of storing frequently accessed files locally, reducing the need
to retrieve them from the server every time they are requested, and improving file access speed.
File Locking: This is the technique of preventing multiple users from simultaneously modifying
the same file, avoiding data inconsistency and corruption.
Pint services
Print server, which is a device or software that manages and coordinates print jobs on a network.
The text explains the main function of a print server, which is to provide a centralized point for
controlling and directing print requests from client devices to one or more printers.
A print server simplifies the administration and configuration of printers and print jobs within a
network.
Users do not need to install or update printer drivers on their devices, as they can send print jobs
to the print server, which then handles the distribution of print tasks to the appropriate printers.
A print server can enforce security and access policies
for printers and print jobs, such as authentication, authorization, encryption, quotas,
watermarking, etc. A print server can also monitor and audit the print activity and usage in the
network, and generate reports and statistics.
A print server can improve the performance and reliability of printing by balancing the network
workload and avoiding printer congestion. A print server can also reduce the cost of printing by
optimizing the use of printer resources and eliminating duplicate or unnecessary print jobs It
covers the following points:
Print Server: A role service that manages and coordinates printing tasks for multiple printers on
a network.
Printer Sharing: A feature that enables users from different devices to send print jobs to a
central printer.
Print Queues: A mechanism that organizes print jobs in the order they are received by the print
server.
Printer Drivers: Software components that enable communication between the client and the
printer, ensuring that print jobs are formatted correctly.
Network Printing Protocols: Standards that facilitate communication between client devices
and the print server, such as IPP, LPD, and SMB.
Print Management: A tool for administrators to manage printers, print queues, and print jobs,
including monitoring, setting priorities, and configuring properties.
Print Policies: Rules that control and manage the use of printers on the network, such as setting
quotas, restricting access, or implementing cost-saving measures.
Print Logging and Auditing: Features that track print activities, such as monitoring printer
usage, troubleshooting problems, or generating reports.
Windows server Update Server
WSUS: A Microsoft tool for managing updates for Microsoft products in a corporate network. It
acts as a local update repository and allows administrators to approve, distribute, and monitor
updates.
Update Management: WSUS categorizes updates into different types, such as security, critical,
or service packs. Administrators can configure WSUS to automatically approve and deploy
specific categories of updates to client computers.
Deployment Rings: WSUS enables administrators to
organize computers into deployment rings, which help in testing updates on a subset of
computers before rolling them out to the entire organization.
Reporting and Monitoring: WSUS provides reporting and monitoring features that allow
administrators to track the status of updates across the network. Reports include information on
update compliance, failed installations, and update history.
Web server(IIS)
Internet Information Services (IIS), a web server software developed by Microsoft.
It explains the following aspects of IIS:
Web Server Functionality: How IIS handles web requests and delivers web content.
HTTP and HTTPS Protocols: How IIS supports secure and unsecure web communication
using SSL/TLS encryption.
Hosted Content Types: What types of web content IIS can host, including static and
dynamic content generated by server-side technologies.
Application Pools: How IIS separates and isolates web applications for stability and security
purposes.
Integration with ASP.NET: How IIS works with ASP.NET, a server-side web application
framework based on the .NET framework.
Modular Architecture: How IIS allows administrators to customize and optimize their web
server configuration by installing only the necessary components.
Centralized Management Console: How IIS provides a user-friendly interface for
managing and configuring server roles and features.
Routing and remote access server
Routing and Remote Access Service (RRAS) feature in Windows Server operating systems.
It explains that RRAS provides a range of networking services, such as routing, VPN, and dial-
up, that enable different scenarios for remote access and network interconnection.
It also lists some key aspects of RRAS, such as:
RRAS Multitenant Gateway: A software gateway and router that allows network traffic
routing between virtual and physical networks, including the Internet. It supports Hyper-V
Network Virtualization and VLANs, and enables VPN and NAT for tenants.
Remote Access: A service that allows end users and sites to connect to a corporate network
or another network by using VPN or dial-up connections.
Routing: A service that offers routing and
networking capabilities for LAN-to-LAN, LAN-to-WAN, VPN, and NAT scenarios. It
supports various routing protocols and features.
Microsoft Azure virtualization solutions: A link to learn more about how Microsoft Azure
provides similar functionality in the cloud, such as hybrid virtualization and VPN.
3.2. Defining scope and applicability of testing
The scope and applicability of testing are critical aspects of the software testing process that define
what will be tested, the objectives of testing, and the boundaries of the testing effort. Here is an
overview of the scope and applicability of testing:
Scope of Testing: The scope of testing outlines the boundaries and extent of the testing effort. It
defines what aspects of the software will be tested and what will not be tested.
The scope typically includes:
Functional Features: Identify the specific functionalities, features, and use cases that will be
tested. This includes both primary and secondary functions of the software.
Non-functional Features: Identify the quality attributes, such as performance, usability,
security, and reliability, that will be tested. This includes both quantitative and qualitative
measures of the software.
Test Levels: Identify the different levels of testing, such as unit, integration, system, and
acceptance, that will be performed. This includes the scope and objectives of each level, as well
as the dependencies and interactions between them.
Test Types: Identify the different types of testing, such as functional, non-functional, regression,
and exploratory, that will be conducted. This includes the scope and objectives of each type, as well
as the techniques and tools used for them.
Test Environment: Identify the hardware, software, network, and data requirements for the testing
activities.
3.3. Developing test plan
A test plan is a document that outlines the scope, objectives, and strategy of testing a software product.
Entry Criteria: The conditions that must be met before testing can start, such as the completion
of development and the availability of test environments.
Exit Criteria: The conditions that must be met for testing
to be considered complete, such as achieving a certain level of test coverage and meeting quality
criteria.
Test Schedule: The timeline for testing activities, including the start and end dates for each
testing phase, the milestones and the dependencies.
Resource Planning: The allocation of resources for testing, such as the roles and responsibilities
of the test team, the tools and equipment needed, and the budget and risks involved.
3.4. Running system test
System testing involves several steps, such as setting up the test environment, creating and executing
test cases, reporting and logging defects, performing regression testing, and retesting. System testing
also includes various types of testing, such as performance testing, load testing, security testing,
usability testing, etc.
3.5. Analyzing error report and making changes
Brief description of a general process for analyzing error reports and implementing changes in
software development. It consists of three main steps:
This step involves analyzing the error reports to find out why the error occurred, what factors
contributed to it, and how it can be prevented or fixed.
Root cause analysis can help identify the underlying problems in the code, design, logic, or
environment of the software. Examples of root cause analysis methods are defect reports and
error classification.
Changes should be tested and verified before deployment to ensure they work as expected
and do not introduce new errors.
3.6. Validating changes
Process and purpose of validating changes in a system, product, or process. Here are some
elaborations and additional facts
Validation vs Verification
Validation is different from verification, which is the process of checking whether the system,
product, or process meets the design specifications.
Verification answers the question “Are we building the product right?” while validation answers the
question "Are we building the right product?"
Validation Methods
There are different methods of validation depending on the type and scope of the changes.
Some common methods include testing, inspection, analysis, simulation, demonstration, and review.
Each method has its own advantages and limitations, and the choice of method depends on factors
such as cost, time, risk, and complexity.
Self-Test 3
Instruction: -Read all questions which given below and you to answer the correct one. (2 points each)
1. __________A server is a computer that provides services or resources to other computers or devices on
a network
2. ________A web server is a type of server that hosts and delivers web pages to clients using the HTTP
protocol
3. ________A proxy server is a type of server that acts as an intermediary between clients and other
servers, providing security, caching, or filtering functions
4. _________ A mail server is a type of server that handles the sending and receiving of emails using
protocols such as SMTP, POP3, or IMAP
1. What is the main advantage of using a blade server over a tower server?
2. What is the name of the technology that allows multiple operating systems to run on a single
physical server? A. Server clustering B. Server virtualization
3. What is the name of the protocol that allows remote access and management of servers over a
network? A. RDP (Remote Desktop Protocol) B. SSH (Secure Shell) C. SNMP (Simple Network
Management Protocol) D. Telnet Answer: B. SSH (Secure Shell)
4. What is the name of the device that connects multiple servers to a shared storage system, such as a
SAN (Storage Area Network)? A. Switch B. Router C. Hub D. HBA (Host Bus Adapter)
Operation sheet 3: Install DNS Server
Launch Server Manager by clicking Start > Administrative Tools > Server Manager.
Click Roles and then Add Roles.
• Select DNS Server from the list and then click Next button.
• A little introduction to DNS Server and a few useful links for further details as shown in
below image. Click Next to move on.
• DNS Server has been installed successfully as per
below snapshot. Click Close to finish the Add Roles Wizard.
server too you should use the same ip as the preferred DNS server. Next step is to install the Active directory
roles. Unlikely the older version of windows servers Microsoft highly recommend to use server manager option
to install roles before you run dcpromo.
From the roles list select the "Active Directory Domain Services" role and Click "Next "
It will take few minutes to complete and when its done you will get this confirmation. And then click on
"Close"
So please click on that link and it will start the DCPROMO wizard.
So next step to go through the DC promo wizard.To start the installation click on "Next"
Click on "Next"
Since we going to install New Domain Controller in new forest please select the option "Create a new
domain in new forest" option and click on "Next"
Now we have to provide the name for our domain controller. It must be FQDN. In our case I used
rebeladmin.com as the domain. Please click "Next" after it.
In this window it will ask to select forest function level. If you going to add server 2003 domain controller to your
forest later don't select the function level as server 2008. If you going to use full features of 2008 Ad you must
select forest function level as server 2008. In my case I used server 2008. Click on "Next" after the select.
In next window since it's the first DC we should make it as DNS server too. Leave the default selection
and click on "Next"
If the wizard cannot create a delegation for the DNS server, it displays a message to indicate that you can create the
delegation manually. To continue, click "Yes"
In next window it will show up the database location. It its going to be bigger AD its good if you can keep NTDS
database in different partition. Click on "Next" after changes.
In next window its asking to define a restore mode password. Its more important if you had to do a
restore from backup in a server crash. Click on "Next" after filling it.
Next window is giving you a brief of the installation. Click on "Next"
Then it will start the installation of the AD. It will take some time to complete. After complete of the installation
perform a server reboot.
After the reboot now you can login to the domain. Please use the login as following example
User name : your domain\administrator
Password : XXXXXXXX
Now its done and you can view the active directory options on administrative tools menu
Operation sheet 3.3. Configure DHCP server
1 In Server Manager click Add Roles
2 Click Next
4 Click Next
5 Choose the network interface, from which the DHCP server will service the clients. As you can see I
have three NICs, one is for heartbeat communication among the cluster nodes (192.168.2.20), one is for
iSCSI connection to the shared storage (192.168.1.20), while the last one is the only one connected to
the production environment, so that is the one I have chosen here.
8 Do not add any scopes for now. You can obviously add or import scopes later, when the clustered
DHCP server service has been created.
9 Unless your DHCP servers are going to service DHCPv6 clients,
choose disable DHCPv6 stateless mode for this server, and then do not add any IPv6 scopes later on.
11 Click Install, and then click Close. Repeat the same procedure on the second node of the cluster.
Operation sheet 3.4: Create users using server 2012
Open Server Manager and click Tools > Active Directory Users and Computers.
Right-click the OU where you want to create the user and select New
> User:
Review the details you specified and click Finish to create the user in Active Directory.
Operation sheet 3.5: Create a GPO in domain server 2012
Open the Group Policy Management Console (GPMC) by going into Server Manager>Tools and
select Group Policy Management as shown below:
As the GPMC opens up, you will see the tree hierarchy of the domain. Now expand the
domain, firewall. Local in our case, and you will see the FW Users OU which is where our users
reside. From here, right-click this OU and select the first option Create a GPO in this domain and
Link it here:
Now type the Name for this GPO object and click the OK button. We selected WallPaper GPO:
Next, right-
click the GPO object and click edit:
To find the Desktop Wallpaper, go to Expand User Configuration> Policies> Administrative
Templates> Desktop> Desktop. At this point we should be able to see the setting in right
window. Right-click the Desktop Wallpaper setting and select Edit
First we need to activate the policy by selecting the Enabled. When ready click Apply and then Ok
Now that we’ve configured our GPO, we need to apply it. To do
so, we can simply log off and log back in the client computer or type following command in domain
controller’s command prompt to apply the settings immediately
As we can see below, our user's desktop now has the background image configured in the group policy we created
LAB Test 3.1 Install Operating System
Instructions: Given necessary templates, workshop, tools and materials you are required to perform the
following tasks within 4 hours.
Task1: Installing server 2012 operating system
Task2: Install Driver
Task3: Create Domain
Task 4: Join client computer
Task 5: Create Users
Task 6: Create DHCP sever
Task 7: Create Organizational Unit
Task 8: Create Group Policy
Reference
1. Pakuwal, Bivek. “Graphical User Interface.” LinkedIn SlideShare, 17 Apr. 2015, Available
2. “Command-Line Interface.” Wikipedia, Wikimedia Foundation, 16 July 2018, Available here.
3. Windows Server 2019 Administration Inside Out:
4. Learn Windows PowerShell in a Month of Lunches
5. Linux Bible:
6. Ubuntu Unleashed 2023 Edition.
7. CompTIA Server+ Study Guide: Exam SK0-004
8. Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7: A
9. Mastering Windows Server 2016
10. Pro Linux System Administration
Participants of this Module preparation
Organization/
No Name Qualification Field of Study Mobile number E-mail
Institution