1
http://inetsolution.co.in contact no.8081883614
Chapter-1: Installation of Server 2008
Introduction—
What is Server 2008?
Server 2008 is a network operating system (NOS) which is used to provide a centralized control over the
network.
Microsoft windows server 2008 editions—
Enterprise—used for large organization
Datacenter—used for data storage
Standard—used for small businesses
Web—used for web hosting
Itanium—used for titanium based system
Minimum hardware requirements—
PROCESSOR Minimum 1GHz for 32-bit processor/1.4GHz for 64 bit processor
MEMORY Minimum 512MB/Recommended:2GB RAM
Available Disk Space Minimum 10GB/Recommended:40GB
Drive DVD-ROM drive
Display Super VGA (Resolution of monitor—800x600
KEYBOARD
MOUSE
Login Request
Rights & Permissions
Client
Server
Fundamentals of Server 2008-R2: Raj Solanki
2
http://inetsolution.co.in contact no.8081883614
Chapter-2: Planning Storage Solution
Introduction—
The planning of a server storage solution depends on the following factors—
The amount of storage space a server needs
The number of users will be accessing the server
The sensitivity and importance of data that is to be stored on the server
Storage technology—
Disk technology(DAS) Direct Attached Storage
PATA HDD
SATA HDD
External Drive Arrays
SCSI HDD, USB 2.0 HDD
SAN-Storage Area Network
NAS-Network attached storage
SAN-Storage Area Network
A Separate network that helps you to attached remote storage devices to server
NAS-Network Area Storage
A data storage technology, which allows you to store the data on a network storage location and
provides data accessibility to multiple clients
Planning storage fault tolerance—
In windows server 2008, there are two ways in which fault tolerance can be achieved:
Using Disk Mirroring
Using redundant Array of Independent Disks (RAID)
Fundamentals of Server 2008-R2: Raj Solanki
3
http://inetsolution.co.in contact no.8081883614
Using Disk Mirroring
RAID 1—Minimum 2 hard disk
Disk mirroring is a technique in which data is written to two disks simultaneously. This is because, if one disk fails, the server
can automatically switch to the second disk, without any loss of data.
Using RAID
RAID 0— Minimum 2 hard disk
RAID 0 provides the fastest read and writes performance, but it does not offer fault tolerance. There for this RAID level should
be selected for high performance workstations and not for critical servers.
RAID 5—Minimum 3 hard disk—Provide Fault Tolerance
Ensure that a block and its equivalent information are not stored on the same disk. This feature is very useful as in case of
failure, it can rebuild the missing data when the drive is repaired or replaced.
Exploring Disk Types—
Basic Disk
Primary partition
Extended partition
Logical partition
Note: A disk using MBR (Master Boot Record) partition style allows you to create four partitions, or three primary
partitions and one extended partition.
Note: A disk using Globally Unique Identifier (GUID) Partition table partition style allows you to create up to 128
primary partitions.
Fundamentals of Server 2008-R2: Raj Solanki
4
http://inetsolution.co.in contact no.8081883614
Dynamic Disk
Note: A dynamic disk supports the following five types of volumes:
Simple
Spanned
Mirrored
Striped
RAID-5
A spanned volume is a dynamic volume that consists of disk space on more than one physical disk.
A mirrored volume is a hard drive or other form of storage media that stores an exact copy of the
data from another volume. It is used for fault tolerance.
A striped volume is a dynamic volume that stores data in stripes on two or more physical disks (RAID-0).
Spanned volume
Mirrored volume
Striped volume
Fundamentals of Server 2008-R2: Raj Solanki
5
http://inetsolution.co.in contact no.8081883614
Chapter-3:Active directory
What is active directory?
Active directory is a database of your users, groups, Resources and services.
Active directory is a centralized collection of objects.
What is object in Active Directory?
Collection of users, groups, resources and services are called Objects.
What is active directory domain service?
Active directory domain service provides authentication services in your network.
When any client login in a domain network Active directory domain services check user
name and its password in Active directory and if user name and password match with its
data base then it authenticate and allow him to log in.
Provides centralized authentication service for Microsoft network.
Benefits:
o Hierarchical organizational structure
o MultiMate authentication and MultiMate replication. (Ability to access and modify
ADDS from multipoint of administration.)
o Its mean we can modify AD from anywhere as administrator as well as user can also
access our resources from anywhere.
o Ability to create trust relationship with external network running previous version of AD
and even UNIX.
o It avoids single point of failure, because your data is stored on multiple locations.
Login Request
Rights & Permissions
Fundamentals of Server 2008-R2: Raj Solanki
6
http://inetsolution.co.in contact no.8081883614
Installation of ADDS
FQDN= Fully Qualified Domain Name
FQDN= Fully Qualified Domain Name (inetsolution.co.in, raj.com, wds.com)
Location for database, Log file and SYSVOL
C:\Windows\NTDS---------store AD objects Database
C:\Windows\NTDS--------------store log files
C:\Windows\SYSVOL-----------------store group policies
Restore mode password
Note: This password is used to restore Active directory domain services.
Login Request
Rights & Permissions
IP=192.168.1.100
Subnet mask=255.255.255.0
DNS server= 192.168.1.100
IP=192.168.1.101
Subnet mask=255.255.255.0
DNS server= 192.168.1.100
Client
Server
Fundamentals of Server 2008-R2: Raj Solanki
7
http://inetsolution.co.in contact no.8081883614
Chapter-4: Create users & Groups in server-2008
How will you create user and groups in server-2008?
In server-2008 we can create user and groups using the following methods.
By using the windows interface
By using the command prompt
By using the windows power shell script
By using the VBScript
Q1. Which command is used to create a new user in active directory?
Answer: - Dsadd Command is used to create a new user in Active Directory.
Command Description
Dsadd computer Adds a single computer to the directory.
Dsadd contact Adds a single contact to the directory.
Dsadd group Adds a single group to the directory.
Dsadd ou Adds a single organizational unit to the directory.
Dsadd user Adds a single user to the directory.
Dsadd quota Adds a quota specification to a directory partition.
Fundamentals of Server 2008-R2: Raj Solanki
8
http://inetsolution.co.in contact no.8081883614
Multiple Users in the forest
Which command is used to create multiple users in a forest?
You can use the LDIFDE Command to create multiple users and perform your task immediately.
Requirement:
1. PC/Server with windows server 2008 OS-1
2. AD (Active Directory)
3. Notepad
Open a blank Notepad.
Type the following query in the Notepad:
Save the file with the name “muser.ldf” on desktop
Now type the following query in command Prompt
C:\USERS\Administrator\Desktop>LDIFDE -I –F muser.ldf -k
10
http://inetsolution.co.in contact no.8081883614
Schema master Roles
Schema is the collection of our objects and attributes.
First domain controller is Responsible for schema updates.
After updates replicates changes to other domain controller.
In the absence of schema master role no changes can be made.
Domain naming master
Responsible for adding and removing domains.
Responsible for checking domain name is valid or not.
After updates replicate changes to other domains.
If unavailable, cannot add or remove domains.
Domain naming master must also be a global catalog server.
RID Master
In our active directory each objects eg. User and groups have a unique security identifier (SID).
And this SID is the combination of Domain SID and unique relative identifier (RID).
The main role of RID Master is to allocate RIDs to each Domain controller.
In the absence of RID Master you cannot create new security principals(i.e. User and Groups )
Infrastructure Master Role
Object in domain referencing object in another domain and it uses GUID,SID and DN
E.g. Group in one domain referencing user or group in another domain
Infrastructure master updates SID and DN in cross-domain references
E.g. if referenced object moves
Multiple-domain, infrastructure master role must not be held by GC Server
Not a problem in single-domain forests (because no external references )
In simple word the main role of infrastructure master role is to help in mapping of user to group
or group to user in multi domain environment.
PDC Emulator
Acts as NT PDC to NT BDCs
Password changes replicated preferentially to PDC emulator
Authentication failures due to bad password at another DC forwarded to emulator
before failing completely
Acts as domain master browser(time synchronization )
13
http://inetsolution.co.in contact no.8081883614
Hierarchical organizational structure
Q1. What do you mean by hierarchical organizational structure of active directory?
Hierarchical organizational structure includes the active directory forest, domains in the forest,
and organizational units (OUs) in each domain.
Q2. Which server is known as Domain controller?
A server that is running AD DS is called domain controller.
Q3. Which server is called Global catalog server?
First domain controller in a forest must me a global catalog server.
Q4. What is PDC (Primary Domain Controller)?
Domain controller is used to store information about different network objects and also used for
centralized managements.
Q5. What is the ADC (Additional Domain Controller)?
a. ADC is also known as Backup Domain controller and if your primary domain controller
facing some problem or database corrupted from PDC or main domain controller is not
working in this condition we close the services of main domain controller and start the
services of additional domain controller .
b. It is also used to restore the data or information of objects.
c. It also used for load balancing.
Q6. What is the CDC (Child Domain Controller)?
a. If both PDC & ADC are not working properly then we start the child domain for
continuing the work of our company.
b. A Child domain is low permission then Additional domain and Additional domain is less
permission then Main Domain Controller.
DC ADC CDC RODC
Fundamentals of Server 2008-R2: Raj Solanki
14
http://inetsolution.co.in contact no.8081883614
DC
ADC
Advantages of ADC
ADC is also known as Backup Domain controller and if your primary domain controller facing
some problem or database corrupted from PDC or main domain controller is not working in this
condition we close the services of main domain controller and start the services of additional
domain controller .
It is also used to restore the data or information of objects.
It also used for load balancing.
Provide infrastructure support and fault tolerance.
In case the first domain controller fails or is disconnected, the additional domain controller
makes it possible for the domain to continue functioning.
Fundamentals of Server 2008-R2: Raj Solanki
15
http://inetsolution.co.in contact no.8081883614
What is the RODC (Read Only Domain Controller)?
Advantages of RODC
RODC is a Read Only Domain Controller it a feature introduced in Windows server 2008 to solve the problems related to speed,
Security, and integrity in an enterprise (project/activity).
When the domain controller is placed in the corporate office, the overall network performance is decreased. This is because all
the authentications (verify) from the branch office take place on domain controller in the corporate office, which take time and
may result in network congestion.
If we placed a domain controller in each branch office it may cause following problems:
Security – when the domain controller are placed in the branch office, the verification of the user permissions become fast and
reliable but may cause security problems . As you know a domain controller maintains a copy of all the objects such as
username and password. Suppose that the domain controller in a branch office is stolen or accessed by intruder, you may have
to change the password of all the users in the entire domain.
Integrity – (originality) when the domain controllers are placed in the branch offices, the changes at the branch office domain
controller must be replicated (copy) to the domain controllers in the entire domain. Therefore, any changes or corruption of
data on the branch office domain controllers can affect the integrity (originality) of the entire domain.
Administration-Assigning administrative rights to the users in the branch offices may cause serious problems. Managing the
changes performed by the domain administrators in branch offices is a time consuming and tedious task for the enterprise
administrators.
What is child domain?
A child domain, also called as sub domain
A child domain is a part of the root domain tree
It shares the same AD schema and configuration information
A transitive trust relationship always exits between child domain and root domains.
inetsolution.co.in
Fundamentals of Server 2008-R2: Raj Solanki
17
http://inetsolution.co.in contact no.8081883614
Chapter-6: DHCP Server
Q1. What is DHCP?
DHCP Dynamic Host Configuration Protocol एक client/server प्रोटोकॉल है जो network host
को automatically IP addresses provide करता है |
DHCP Client Server Model पर based है |
Q2. What are the advantages of DHCP?
Advantages of DHCP Server.
Centralized IP- address management
Provide automatically IP-Address for client
Make administration easy.
Q3. What is DHCP Scope?
DHCP scopes are used to define ranges of addresses from which a DHCP server can assign
IP addresses to clients.
Q4. Give some devices which act as DHCP Server?
ADSL Router (MODEM)
Router
Server PC
Q5. Name different types of DHCP Scope in windows?
Normal Scope-it is used to assign IP-Address Range for v Class A,B & C
network including subnet masks, exclusions and Reservation,
Multicast Scope-it is used to assign IP-Address Range for class D networks.
o Multicast scope doesn’t have subnet masks, Reservation or other TCP/IP
Options.
Super scope- essentially a collection of scoops grouped together such that they
can be enabled or disabled as a single entity.
Q6. What is address pool?
Address range for distribution is called address pool.
Q7. What is address leases?
Address leases define client IP Address, Computer Name, lease expiration date etc.
Q8. What are IP-reservations?
It provides information for a reserved client. For this MAC address of client pc is
required.
Q9. What is exclusion range?
IP-Address in this range will not assign to any client pc. These IP-Addresses excluded
from distribution.
Q10. What is the use of filter in DHCP Server?
Allow—DHCP Services are provided to any MAC addresses in this list.
Deny---DHCP Server are denied to any MAC addresses in this list.
Fundamentals of Server 2008-R2: Raj Solanki
18
http://inetsolution.co.in contact no.8081883614
What is DORA Process in DHCP?
Ans. DORA process explains that how DHCP assign IP-address for the client. DORA is the combination
four processes.
Discover
Offer
Request
Acknowledge
In this process client broadcast a discover message to all network devices to find out the
DHCP server. Discover message contains source port no 68 and destination port no 67. DHCP
server received this message and broadcast offer message to all the network devices but this
message contains MAC address of the client PC, only this PC read the message in this
message DHCP server offer IP-Address for the client. After reading offer message client pc
again broadcast a request message to the DHCP server and request for the offered IP-Address.
DHCP Server read this message and broadcast an acknowledgement message and assigns an
IP-address on the client PC this whole process is called DORA process.
DHCP Relay Agent:- It is used load balancing.
Fundamentals of Server 2008-R2: Raj Solanki
19
http://inetsolution.co.in contact no.8081883614
Chapter-7:DNS Server
Q1. What is DNS? What is its importance?
The full form of DNS is Domain Name System a technique which resolve domain name
to IP address or IP address to Domain name.
Importance: it is a difficult task to remember the 32 bit or 128 bit IP address of each
computer on the network. For example you can use http://rajiteducation.com instead of
the http://192.168.1.240/ IP address to access the rajiteducation website. Hence name
can easily remember but not IP Address. This is similar to your phone book, you can dial
number or by name. So DNS is used to resolve ip to name or name to ip.
Q2. What are the three elements of DNS?
DNS namespace: A logical tree structure of domain names is called DNS namespace.
DNS servers: The computer on which we install DNS server service is called DNS server.
It store or manage DNS database (Example name and address).
DNS resolvers: The client side of the DNS is called DNS resolver. It is used for DNS query
to request information from DNS server.
Q3. What is DNS Zone?
A Zone is a unit that stores the object information in to various records.
Q4. Explain different types of Zones?
Primary zone-it stores the master copy of a specific domain .It stores the information in
text file and this file can be edited by an administrator.(Read/write zone).
Secondary zone- Secondary zone is the copy of Primary Zone that is hosted/store on
another server. It cannot be stored in ADS.
Stub zone- It store a copy of the zone that contains record essential to identify the
authoritative (confidential) DNS servers for that particular Zone.
Q5. How many records in DNS server?
Host A & AAAA
Alias(Second Name)
MX
PTR(Pointer Records)
SRV
SOA Etc.
Q6. What is WINS?
WINS stand for windows internet Name Service it is similar to DNS that is use for
resolved computer name (NetBIOS) to the IP address and IP to NetBIOS name locally.
Caching only DNS server
This type of DNS servers does not have any zones in it, and purely depends on
caching. They contain the information of what has been cached while resolving
queries.
Stub DNS server
It is a DNS server hosting a stub zone. This kind of servers has a copy of a zone
containing only a list of the authoritative DNS servers for its master zone.
A stub zone is a read-only copy of a zone that contains basic information of the
master zone. It contains- SOA resource record for the zone, NS records, and Host
records.
Q1. What is a zone transfer?
Zone transfer is the process through which the DNS database is copied from one server
to other.
Q2. What is forward lookup zone in DNS?
Forward DNS lookup is used in domain name to find an IP address.
Q3. What is Reverse lookup zone in DNS?
Reverse DNS lookup is using in IP address to find a domain name.
Q1. What is DNS Zone?
A Zone is a unit that stores the object information in to various records.
Q2. Explain different types of Zones?
Primary zone-it stores the master copy of a specific domain .It stores the information in
text file and this file can be edited by an administrator.(Read/write zone).
Secondary zone- Secondary zone is the copy of Primary Zone that is hosted/store on
another server. It cannot be stored in ADS.
Stub zone- It store a copy of the zone that contains record essential to identify the
authoritative (confidential) DNS servers for that particular Zone.
Fundamentals of Server 2008-R2: Raj Solanki
22
http://inetsolution.co.in contact no.8081883614
Primary zone in primary DNS Server
Fundamentals of Server 2008-R2: Raj Solanki
23
http://inetsolution.co.in contact no.8081883614
Create a Secondary zone in Secondary DNS server
Fundamentals of Server 2008-R2: Raj Solanki
24
http://inetsolution.co.in contact no.8081883614
Q4. Which two types of records a new zone contains?
Start of authority (SOA)
Name Server(NS)
Note:-
SOA(Start of Authority) defines the basic properties of the zone such as
Name of the primary server
The refresh interval of the server
Time period for which the secondary zone should retain the zone record
Who is the responsible person for manage zone.
Name Server (NS)
`NS Record specifies a server that is authoritative for a given zone.
Q5. What is SRV record?
SRV stands for service location record.
Service record allows administrators to use several servers for a single DNS
domain, to easily move a TCP/IP service from one host to another host and to
designate some service provider hosts as primary servers for a service and other
hosts as backups.
ZONE TRANSFER (Primary DNS Server to Secondary DNS Server)
Q1. What is a zone transfer?
Zone transfer is the process through which the DNS database is copied from one server
to other.
Using Two LAN Card
PC-1 Client PC-2
LAN-1 ICS Host computer LAN-2 LAN
IP=192.168.1.10 Set on Obtain an IP Address IP=192.168.137.10
Subnet Mask=255.255.255.0 This LAN Will take
Automatic IP Address
192.168.137.1
Subnet Mask=255.255.255.0
Default Gateway=192.168.1.1 Default Gateway=192.168.137.1
Preferred DNS server=192.168.1.1 Preferred DNS server=192.168.137.1
ICS Host PC ICS Client PC
Fundamentals of Server 2008-R2: Raj Solanki
31
http://inetsolution.co.in contact no.8081883614
Using WLAN Card
PC-1 Client PC-2
WLAN-1 ICS Host computer LAN-2 LAN
IP=192.168.1.10 Set on Obtain an IP Address IP=192.168.137.10
Subnet Mask=255.255.255.0 This LAN Will take
Automatic IP Address
192.168.137.1
Subnet Mask=255.255.255.0
Default Gateway=192.168.1.1 Default Gateway=192.168.137.1
Preferred DNS server=192.168.1.1 Preferred DNS server=192.168.137.1
OR
Automatic IP Address
CLINT- PC
Now on client pc configure IP Address
Of the range of 192.168.137.10 using
gateway and DNS =192.168.137.1
1
2
3
Fundamentals of Server 2008-R2: Raj Solanki
32
http://inetsolution.co.in contact no.8081883614
Chapter-10:File server
What is file server?
In the client/server model, a file server is a computer responsible for the central storage and
management of data files so that other computers on the same network can access the files.
Planning file services
You can share and manage folders by performing the following tasks.
Installing the file services server role
Sharing folders across network
Accessing a shared folder
How to install file services server role?
Note: you can share folders in windows server 2008 without installing any server roles. But
installing the file services server role adds useful management tools in the server manager
console. Using this server role, you can perform functions, such as enable DFS, Configure disk
quotas, and generate storage reports.
Start/Administrative Tools /Server Manager /Add Roles /Next /File
Services/Next/Next/File Server/Next/Next/Install.
FSRM (File server Resource Manager Role Service)
FSRM is a set of tools by which administrators can control and manage the type of data stored
on servers.
By installing FSRM Administrators can create disk quotas on folders and volumes, screen files,
and generate storage reports.
Fundamentals of Server 2008-R2: Raj Solanki
33
http://inetsolution.co.in contact no.8081883614
Chapter-11: Sharing Folders across Networks
You can Share folders across network by:
Using Windows Explorer
Using the provision shared folder wizard
Using command Prompt or Script
Using Windows Explorer
When you share a folder Using Windows Explorer you can provide the following four permission levels
to users.
Reader-Provide Read-only access on the shared folder.
Contributor-Provide Read and Write access on the shared folder Same as change
Co-owner-Provide full read and write access on the shared folder and also enable the user to
change file permissions, if required same as Full control.
Owner- Provides full read and write access on the shared folder same as Full access.
Using Command Prompt or Script
Net share-----To display information about shared resources on the computer, type: Net Share
To share a computer's E:\Book directory with the share name Data-4G and include a remark, type:
Fundamentals of Server 2008-R2: Raj Solanki
34
http://inetsolution.co.in contact no.8081883614
To stop sharing the Data-4G folder you created in the previous example, type:
Accessing a shared folder
A client computer accesses a shared folder on a network by Dir\\ServerName\ShareName
Map network drive
Note: You can also access shared folders by using a network drive. Now let us know how to map a
network drive using command. (Net use)
Fundamentals of Server 2008-R2: Raj Solanki
35
http://inetsolution.co.in contact no.8081883614
FSRM (File server Resource Manager Role Service)
FSRM is a set of tools by which administrators can control and manage the type of data stored
on servers.
By installing FSRM Administrators can create disk quotas on folders and volumes, screen files,
and generate storage reports.
With the help of FSRM we can monitor and manage our Network Storage.
With the help of this you can apply quota on folder.
With the help of this you can file screening.(restrict to copy any particular type of file such as audio or
video files or cannot store any particular type of file))
You can also generate storage report.
How to install FSRM Role service?
Go to server manager\Expand Roles\Right Click on File services\Add Role Services\Select-FSRM
(File server resource manager)\Next\Next\Install\Close.
-------------------------------------------------------------------------------------------------------------------------------
Configure Quota on shared Folder.
Start\Administrative Tools\File server resource manager \Expand Quota
Management\Quotas\Right click\Create Quota…..\Browse Shared Folder on which you wants to
apply quota\OK\Drive properties from this quota template\100 MB Limit\Create.
-------------------------------------------------------------------------------------------------------------------------------
Create Quota Templates.
What are templates? ...... A template is a form, or pattern used as a guide to making something
Start\Administrative Tools\File server resource manager\Expand Quota Management\Quota
Templates\Right click\Create Quota Template…..\Template name: 10 MB Limit\Space
limit=10MB\OK
-------------------------------------------------------------------------------------------------------------------------------
What is the difference between hard quota and Soft quota?
There are two types of quotas.
Hard quota: Do not allow users to exceed limit
Soft quota: Allow users to exceed limit ( use for monitoring)
Fundamentals of Server 2008-R2: Raj Solanki
36
http://inetsolution.co.in contact no.8081883614
File screening Management
What is file screening management in FSRM?
File screening management in FSRM is used to control the types of files that users can save, and
generate notifications when users attempt to save unauthorized files.
File Screening Management
File screens
File screen Templates
File groups
------------------------------------------------------------------------------------------------------------------------------------------
How to configure file screening?
Start\Administrative Tools\File server resource manager\Expand File screening management \File
screens\Right click\Create File Screen…..\File screen path….Browse (select the shared folder on
which you want to configure file screening)\ Drive properties from this File Screen
template\select-Block image files\create.
------------------------------------------------------------------------------------------------------------------------------
How to create file screen templates?
Start\Administrative Tools\File server resource manager\Expand File screening management \File
screens Templates\Right click\Create File Screen Templates…..\Template name=New
FST\screening type-Active screening\Select file group to block\OK.
What is the difference between Active screening and passive screening?
There are two types of file screening.
Active screening: Do not allow users to save unauthorized files
passive screening: Allow users to save unauthorized files ( use for monitoring)
-------------------------------------------------------------------------------------------------------------------------------
What is file group?
File group is a group of files in file screening management which is used to create your own file
group and include files that you want to control.
Fundamentals of Server 2008-R2: Raj Solanki
37
http://inetsolution.co.in contact no.8081883614
Storage Reports management
With the help of File server resource manager we can also generate storage report on shared folder. We
can generate storage report for the following.
Duplicate files
File screening audit
Large file
Least recently accessed files
Most recently accessed files
Quota usage
How will you generate storage report?
Start\Administrative Tools\File server resource manager\schedule a New Report
Task….\Add\Select shared Folder on which you wants to generate storage report\OK\Select
Report to generate (Example: Large Files, Duplicate Files, Least Recently Accessed files)\Select
report format (DHTML, HTML, XML, CSV, Text)\Schedule\create schedule\New\OK\OK\Select
report task\Run Report Task Now….\Select-wait for reports to be generated and then
display\OK.
Q1. What is FSRM?
FSRM is a tool to generate storage reports, configure quotas, and define file
screening policies.
Q2. What is DFS (Distributed File System)?
DFS Namespace is a collection of shared folder at one location.
Q3. What is SMB?
SMB (Server Message Block) is a protocol which allows you to share folder on the
network.
Q4. What is NFS?
NFS (Network File System) is a protocol which allows you to share files between
Microsoft client and UNIX or Linux client.
Q5. Which command is used to configure file screening when running windows server 2008
server core or while using command prompt.
FileScrn.exe command
Fundamentals of Server 2008-R2: Raj Solanki
38
http://inetsolution.co.in contact no.8081883614
Q6. You can limit the number of users that can access the share at the same time using……………
a. NTFS permission
b. Share protocol
c. SMB Settings
d. Quota policy
Q7. When you share a folder using windows explorer, you can provide the following four
permission levels to users?
a. Reader
b. Contributor
c. Co-owner
d. Owner
e. All the above
Q8. You can share folders across networks by
a. Using windows explorer
b. Using the provision shared folder wizard
c. Using command prompt or script
d. All the above
Q9. Which command is used to configure DFS?
a. NET USE
b. DFSUtil
c. FileScrn.exe
d. None
Q10. What should you do to check if the DFS replication is working efficiently?
a. Use Dfsdiag command
b. Use Dfsradmin command
c. Use DFS Management snap-in
d. Use File Server Resource Manager Snap-in
Fundamentals of Server 2008-R2: Raj Solanki
39
http://inetsolution.co.in contact no.8081883614
Chapter-12: Working with Distributed File System
Objective: An enterprise can have hundreds of file servers and it quite difficult for each user to
remember which file is stored on a specific file server.DFS enables the use of a single namespace that
allows users to connect to any shared folder in a network. By using DFS, you can access all the shared
folders on a network using a single Network drive letter.
Allow user to access shared folders located on different location which appear on a single machine.
What is DFS Namespace?
Ans: DFS Namespace is a collection of shared folder at one location.
How to install DFS after installing File server role
Start/Administrative Tools/Server Manager/Expand the Role/File Services Node/Add Role
Services/Distributed file systemDFS NamespaceDFS Replication/Create a Namespace later using
the DFS Management snap-in server manager/NEXT/Finish.
How to create a DFS Namespace?
Start/Administrative Tools/DFS Management/Right clicks on Namespace/Enter the IP
Address=100.100.100.1(Main-Server)/Enter the Name for the namespace example=DFSNamespace/Next/Select
Stand-alone namespace/Next/Create/Close
How to add Folders to the DFS Namespace?
Start/Administrative Tools/DFS Management/Expand Namespace/Right click on DFSNamespace/New
Folder/Name=PC-WIN7/Add/Enter the ip address of client pc\\100.100.100.10 (client)\Browse\Select Shared
Folder=Datas\OK\OK.
Start/Administrative Tools/DFS Management/Expand Namespace/Right click on DFSNamespace/New
Folder/Name=PC-XP/Add/Enter the ip address of client pc\\100.100.100.11 (client)\Browse\Select Shared
Folder=NewData\OK\OK.
Fundamentals of Server 2008-R2: Raj Solanki
40
http://inetsolution.co.in contact no.8081883614
Note: Similarly you can add More Folder in Same namespace.
Now how will you check the output of above Practical?
Fundamentals of Server 2008-R2: Raj Solanki
41
http://inetsolution.co.in contact no.8081883614
Chapter-13: Group policy Object